0% found this document useful (0 votes)
636 views93 pages

Computer Network Notes For All MSBTE Stu

The document provides notes on computer networks. It defines what a computer network is and discusses the need for computer networks. It then describes key components of computer networks like servers, clients, transmission media, and network interface cards. It also covers network benefits such as sharing information, resources, and facilitating centralized management.

Uploaded by

Manthan Jagatkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
636 views93 pages

Computer Network Notes For All MSBTE Stu

The document provides notes on computer networks. It defines what a computer network is and discusses the need for computer networks. It then describes key components of computer networks like servers, clients, transmission media, and network interface cards. It also covers network benefits such as sharing information, resources, and facilitating centralized management.

Uploaded by

Manthan Jagatkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 93

COMPUTER By Mr. Thoke V.

NETWORKS NOTES
AITP,Vita(Virendra.
[email protected]
)(8928135013)

The notes are more preferable because of its taken from


reference book like TCP/IP by Forouzan(Mcgraw Hill
Publication) , Module Answer of MSBTE and resources like
Internet. So use it and do your study best. THAKING YOU.
Course Name: Computer Engineering Group Course Code: CO/CD/CM/CW

Semester: Fourth Subject Title: Computer Network Subject Code: 17429

Viren Sir ([email protected])(8928135013) Page 1


Viren Sir ([email protected])(8928135013) Page 2
CHAPTER 1 BESIC NETWORK CONCEPT

1.1 Fundamentals Of Computer Networks:

1. Definition: a) Networks: - A network is a set of devices (often referred to as


nodes) connected by communication links. A node can be a computer,
printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network
2. Definition of Computer Network: A set of devices interconnected to each
other for sharing information/data, resources within a particular time limit.

Need of Computer Network:

Computer networks help users on the network to share the resources and in
communication.

1. Hardware sharing: Users can share devices such as printers, scanners, CD-
ROM drives, hard drives etc. Without computer networks, device sharing is
not possible.
2. File sharing: Networking of computers helps the network users to share
data files.

3. Application sharing: Applications can be shared over the network, and this
allows to implement client/server applications
4. User communication: Networks allow users to communicate using e-mail,
newsgroups, and video conferencing etc.
5. Network gaming: A lot of network games are available, which allow multi-
users to play from different locations.
6. Voice over IP (VoIP): Voice over Internet Protocol (IP) is a revolutionary
change in telecommunication which allows to send telephone calls (voice
data) using standard Internet Protocol (IP) rather than by traditional PSTN.

Viren Sir ([email protected])(8928135013) Page 3


Applications:

1) Banking 2) Video conferencing 3) Marketing 4) School 5) Radio 6)


Television 7) E-mail 8) Companies
OR
1. Sharing the resources such as printers among all the users.
2. Sharing of expensive software & hardware.
3. Communication from one computer to other.
4. Exchange of data & information amongst the users, via the network.
5. Sharing of information over the geographically wide areas.
6. for connecting the computers between various buildings of an
organization.
7. for educational purposes. 8. Maintenance is limited to the servers &
clients.
8. Maintenance is limited to the servers & clients.

Computer network components

Computer networks share common devices, functions, and features including


servers, clients, transmission media, shared data, shared printers and other
hardware and software resources, network interface card(NIC), local operating
system(LOS), and the network operating system (NOS).

Viren Sir ([email protected])(8928135013) Page 4


 Servers - Servers are computers that hold shared files, programs, and the
network operating system. Servers provide access to network resources to all
the users of the network. There are many different kinds of servers, and one
server can provide several functions. For example, there are file servers,
print servers, mail servers, communication servers, database servers, print
servers, fax servers and web servers, to name a few.
 Clients - Clients are computers that access and use the network and shared
network resources. Client computers are basically the customers (users) of
the network, as they request and receive services from the servers.
 Transmission Media (Cables) - Transmission media are the facilities used
to interconnect computers in a network, such as twisted-pair wire, coaxial
cable, and optical fiber cable. Transmission media are sometimes called
channels, links or lines.
 Shared data - Shared data are data that file servers provide to clients such
as data files, printer access programs and e-mail.
 Shared printers and other peripherals - Shared printers and peripherals
are hardware resources provided to the users of the network by servers.
Resources provided include data files, printers, software, or any other items
used by clients on the network.
 Network Interface Card - Each computer in a network has a special
expansion card called a network interface card (NIC). The NIC prepares
(formats) and sends data, receives data, and controls data flow between the
computer and the network. On the transmit side, the NIC passes frames of
data on to the physical layer, which transmits the data to the physical link.
On the receiver's side, the NIC processes bits received from the physical
layer and processes the message based on its contents.
 Local Operating System - A local operating system allows personal
computers to access files, print to a local printer, and have and use one or
more disk and CD drives that are located on the computer. Examples are
MS-DOS, UNIX, Linux, Windows 2000, Windows 98, Windows XP etc.
 Network Operating System - The network operating system is a program
that runs on computers and servers, and allows the computers to
communicate over the network.
 Hub - Hub is a device that splits a network connection into multiple
computers. It is like a distribution center. When a computer request
Viren Sir ([email protected])(8928135013) Page 5
information from a network or a specific computer, it sends the request to
the hub through a cable. The hub will receive the request and transmit it to
the entire network. Each computer in the network should then figure out
whether the broadcast data is for them or not.
 Switch - Switch is a telecommunication device grouped as one of computer
network components. Switch is like a Hub but built in with advanced
features. It uses physical device addresses in each incoming messages so that
it can deliver the message to the right destination or port.

Network Benefits

1. Sharing Information

 File sharing :- is the practice of distributing or providing access to digital


media, such as computer programs, multimedia (audio, images and video),
documents or electronic books. File sharing may be achieved in a number of
ways. Common methods of storage, transmission and dispersion include
manual sharing utilizing removable media, centralized servers on computer
networks,.
 Email is an information and communications technology. It uses technology
to communicate a digital message over the Internet. Users use email
differently, based on how they think about it. There are many software
platforms available to send and receive. Popular email platforms include
Gmail, Hotmail, Yahoo! Mail, Outlook, and many others

2. Sharing Resources:-

 Printer sharing: - Printers, like other pieces of computer hardware, include


drivers and utilities for connecting the devices to a home or corporate
network. You can even connect multiple printers to one network for sharing
the devices with others. Having multiple printers on a network confers
several advantages, including the ability to select which printer you want to
send documents to and offering an available printer in the event that one or
more printers is not working correctly.
 Application Services:-

 Directory services

Viren Sir ([email protected])(8928135013) Page 6


 e-Mail
 File sharing
 Instant messaging
 Online game
 Printing
 File server
 Voice over IP
 Video on demand
 Video telephony
 World Wide Web
 Simple Network Management Protocol
 Time service
 Wireless sensor network

3. Facilitating Centralized Management-

Managing Software, Maintaining the Network, Backing up data

4. Classification of Network by their geographical area.

PAN:- A personal area network (PAN) is a computer network used for


data transmission among devices such as computers, telephones and
personal digital assistants. PANs can be used for communication among the
personal devices themselves (intrapersonal communication), or for
connecting to a higher level network and the Internet
CAN:- A campus network, campus area network, corporate area
network or CAN is a computer network made up of an interconnection of
local area networks (LANs) within a limited geographical area.[1][2] The
networking equipment’s (switches, routers) and transmission media (optical
fiber, copper plant, Cat5 cabling etc.) are almost entirely owned by the
campus tenant / owner: an enterprise, university, government etc.

University campuses:-College or university campus area networks often


interconnect a variety of buildings, including administrative buildings,
academic buildings, university libraries, campus or student centers,

Viren Sir ([email protected])(8928135013) Page 7


residence halls, gymnasiums, and other outlying structures, like conference
centers, technology centers, and training institutes.

Corporate campuses:- Much like a university campus network, a


corporate campus network serves to connect buildings. Examples of such are
the networks at Googleplex and Microsoft's campus. Campus networks are
normally interconnected with high speed Ethernet links operating over
optical fiber such as gigabit Ethernet and 10 Gigabit Ethernet.

LAN vs. MAN vs. WAN:-

Viren Sir ([email protected])(8928135013) Page 8


Disadvantages of LAN:-
 Power - a good LAN is required to be on all the times.
 Security - each computer and device become another point of entry
for undesirables.
 Investment in Higher Costs due to server systems.
 Frustration if having a problem setting up.
 A lot of times a network shares one Internet connection - if all
computers running at once, can reduce speed for each.
 Area covered is limited.

Explain PAN with suitable diagram. Differentiate between PAN and CAN.
(Two points only)

A personal area network (PAN) is a network organized


around an individual person. A PAN can also be used for communication among
personal devices themselves (interpersonal communication).PAN network can be
constructed using cables or it can be wireless. A personal area network (PAN) is
the interconnection of information technology devices within the range of an
individual person, typically within a range of 10 meters. For example, a person
traveling with a laptop, a personal digital assistant (PDA), and a portable printer
could interconnect them without having to plug anything in, using some form of
wireless technology. Typically, this kind of personal area network could also be
interconnected without wires to the Internet or other networks.

Viren Sir ([email protected])(8928135013) Page 9


PAN CAN
1. PAN is definitively the smallest type
1. This is a network spanning multiple
of network you can currently use and
LANs within a limited geographical
the name comes from Personal Area
area.
Network
2. PAN is the interconnected network of 2.It can connect different buildings in its
technologic devices within the reach of campus such as various departments,
an individual library etc.
3. Range of maximum 10 meters. 3. The range of CAN is 1KM to 5KM
4. PAN is mainly used for personal 4. CAN is mainly used for corporate
communication. campuses

Viren Sir ([email protected])(8928135013) Page 10


CHAPTER 2- NETWORK TOPOLOGIES AND NETWORKING DEVICES

Give any four selection criteria for selecting network topology. Selection
criteria for selecting network topology.

1. Size of the network & number of devices or nodes being connected.

2. Ease of configuration & installing.

3. The ease of adding new device in an existing network.

4. The ease of fault indication & reflection.

5. Number of physical links required to be used for connecting the devices.

6. Need of network connecting devices such as repeaters, switches, hubs etc.

7. Costs involved.

8. Need of security.

9. Need of network administration.

DIFFERENT NETWORKING DEVICES:-

The components of computer network are:


 Hub
 Router
 Modem
 Bridge
 Switches
 Network Interface Card
 Cables and connectors
 Crimping tool
 LAN tester

Viren Sir ([email protected])(8928135013) Page 11


EXPLANATION:
1) HUB: Hub is a connecting device; it is also known as multiport repeater.

It is normally used for connecting stations in a physical star topology All networks
require a central location to bring media segments together. These central locations
are called hubs. A hub organizes the cables and relays signals to the other media
segments.

There are three main types of hubs: 1) Passive 2) Active 3) Intelligent

Passive Hubs: A passive hubs simply combines the signals of a network segments.
There is no signal processing or regeneration. A passive hub reduces the cabling
distance by half because it does not boost the signals and in fact absorbs some of
the signal. With the passive hub each computer receives the signal sent from all the
other computers connected to the hub.

Active hubs: They are like passive hubs but have electronic components for
regeneration and amplification of signals. by using active hubs the distance
between devices can be increased. The main drawback of active hubs is that the
amplify noise along with the signals. They are also much expensive than passive
hubs.
Intelligent hubs: in addition to signal regeneration, intelligent hubs perform some
network management and intelligent path selection. One advantage to this is that
all transmission media segment can be connected permanently because each
segment will be used only when a signal is sent to a device using that segment.

Viren Sir ([email protected])(8928135013) Page 12


2) ROUTER: Router is a device that connects 2 or more networks. It consists
of hardware and software .hardware includes the physical interfaces to the various
networks in the internetwork. Software in a router is OS and routing protocols
management software.
1) Router use logical and physical addressing to connect two or more logically
separate networks.

2) They accomplish this connection by organizing the large network into logical
network called subnets.

3) Each of the subnet is given a logical address. This allows the network to be
separate but still access to each other and exchange data.

4) Data is grouped into packets. Each packet has physical device address and
logical network address.

Viren Sir ([email protected])(8928135013) Page 13


3) MODEM: Modem works as modulator as well as demodulator. Modem
converts analog signal to digital signal and vice versa. In case of networking data
has to be transferred from one location to another location. At present to transfer
such data whatever the infrastructure (PSTN) is available .it is of analog
technology but computer sends digital data to transfer this data to another location
it is needed to convert into analog format so that it can be transferred by using
currently available infrastructure.

4) SWITCH:-

On the surface, a switch looks much like a hub. Despite their similar
appearance, switches are far more efficient than hubs and are far more desirable for
today’s network environments. Figure 3.4 shows an example of a 32-port Ethernet
switch.

As with a hub, computers connect to a switch via a length of twisted-pair


cable. Multiple switches are often interconnected to create larger networks. Despite
their similarity in appearance and their identical physical connections to
computers, switches offer significant operational advantages over hubs.
As discussed earlier in the chapter, a hub forwards data to all ports,
regardless of whether the data is intended for the system connected to the port.
This arrangement is inefficient; however, it requires little intelligence on the part of
the hub, which is why hubs are inexpensive.

Viren Sir ([email protected])(8928135013) Page 14


Rather than forwarding data to all the connected ports, a switch forwards
data only to the port on which the destination system is connected. It looks at the
Media Access Control (MAC) addresses of the devices connected to it to
determine the correct port. A MAC address is a unique number that is stamped into
every NIC. By forwarding data only to the system to which the data is addressed,
the switch decreases the amount of traffic on each network link dramatically. In
effect, the switch literally channels (or switches, if you prefer) data between the
ports. Figure 3.5 illustrates how a switch works.

―Cabling Standards, Media, and Connectors,‖ that collisions occur on the


network when two devices attempt to transmit at the same time. Such collisions
cause the performance of the network to degrade. By channeling data only to the
connections that should receive it, switches reduce the number of collisions that
occur on the network. As a result, switches provide significant performance
improvements over hubs.
Switches can also further improve performance over the performance of
hubs by using a mechanism called full-duplex. On a standard network connection,
the communication between the system and the switch or hub is said to be half-
duplex. In a half-duplex connection, data can be either sent or received on the wire
but not at the same time. Because switches manage the data flow on the
connection, a switch can operate in full-duplex mode—it can send and receive data
on the connection at the same time. In a full-duplex connection, the maximum data
throughput is double that for a half-duplex connection—for example, 10Mbps

Viren Sir ([email protected])(8928135013) Page 15


becomes 20Mbps, and 100Mbps becomes 200Mbps. As you can imagine, the
difference in performance between a 100Mbps network connection and a 200Mbps
connection is considerable.

5) GATEWAY:-

Although some textbooks use the terms gateway and router interchangeably,
most of the literature distinguishes between the two. A gateway is normally a
computer that operates in all five layers of the Internet or seven layers of OSI
model. A gateway takes an application message, reads it, and interprets it. This
means that it can be used as a connecting device between two internetworks that
use different models. For example, a network designed to use the OSI model can
be connected to another network using the Internet model. The gateway connecting
the two systems can take a frame as it arrives from the first system, move it up to
the OSI application layer, and remove the message. Gateways can provide security.
We learn that the gateway is used to filter unwanted application-layer messages.

Viren Sir ([email protected])(8928135013) Page 16


State the situations under which gateways are necessary in the network.
(Necessary2Marks. example2Marks)
Gateway operates at all 7 layers of the OSI model. It is a device, which
connects two different dissimilar n/w which have same function of communication.
Situation where gateways are necessary for different n/w like Ethernet, Token
Ring, and FDDI etc. It can communicate if they are using same protocol for
communication like TCP/IP 08 Apple talk if they are using different protocol from
a gateway cash forward packet across different n/w s that may also use different
protocol. Eg: if n/w A is a Token Ring network using TCP/IP & network B is a
Novell Network, a gateway can relay frames between two. This means that a
gateway has not only had, but also between different protocols. In certain
situations the only changes required are to the frame header. In other cases, the
gateway must take case of different frame sizes, data rates, format,
acknowledgement schemes, and priority schemes tec.

6) BRIDGE:-
Bridges are networking devices that connect networks. Sometimes it
is necessary to divide networks into subnets to reduce the amount of traffic on each
larger subnet or for security reasons. Once divided, the bridge connects the two
subnets and manages the traffic flow between them. Today, network switches have
largely replaced bridges. A bridge functions by blocking or forwarding data, based
on the destination MAC address written into each frame of data. If the bridge
believes the destination address is on a network other than that from which the data
was received, it can forward the data to the other networks to which it is connected.
If the address is not on the other side of the bridge, the data is blocked from
passing. Bridges ―learn‖ the MAC addresses of devices on connected networks by
―listening‖ to network traffic and recording the network from which the traffic
originates. The advantages of bridges are simple and significant. By preventing
unnecessary traffic from crossing onto other network segments, a bridge can
dramatically reduce the amount of network traffic on a segment. Bridges also make
it possible to isolate a busy network from a not-so-busy one, thereby preventing
pollution from busy nodes.

Viren Sir ([email protected])(8928135013) Page 17


7) NIC: - Network Interface Card:-

NICs—sometimes called network cards—are the mechanisms by which


computers connect to a network. NICs come in all shapes and sizes, and they come
in prices to suit all budgets.
 Network compatibility—perhaps this is a little obvious, but sometimes
people order the wrong type of NIC for the network. Given the prevalence of
Ethernet networks, you are likely to have to specify network compatibility
only when buying a NIC for another networking system.
 Bus compatibility—newly purchased NICs will almost certainly use the
Peripheral Component Interconnect (PCI) bus, although if you are replacing
a card in an older system, you might have to specify an Industry Standard
Architecture (ISA) bus card instead. If the card you are buying is PCI, check
to see what kind of PCI interface is being used. Many high-end server
systems now come with 64-bit PCI slots; if you have them, it is definitely
worth taking advantage of the extra performance they offer. Such 64-bit PCI
slots can be easily identified because they are the same color and width as
32-bit PCI slots but are longer. 64-bit slots are referred to as PCI-X and are
backward compatible with 32-bit PCI. Figure 3.18 shows 32-bit PCI slots on
a system board.

Viren Sir ([email protected])(8928135013) Page 18


 Port compatibility—generally a NIC has only one port, for twisted-pair
cabling. If you want some other connectivity, you need to be sure to specify
your card accordingly; for example, you might need a fiber-optic or coaxial
cable port.
 Hardware compatibility—before installing a network card into a system,
you must verify compatibility between the network card and the operating
system on the PC in which you are installing the NIC. If you are using good-
quality network cards from a recognized manufacturer, such verification
should be little more than a formality.

Installing Network Cards


o At some point in your networking career, it is likely that you will have
to install a NIC into a system. For that reason, an understanding of the
procedures and considerations related to NIC installations is useful.
Here are some of the main things to consider:
 A driver: - Almost every NIC is supplied with a driver disk, but the
likelihood of the drivers on the disk being the latest drivers is slim. Always
make sure that you have the latest drivers by visiting the website of the NIC
manufacturer. The drivers play an important role in the correct functioning
of the NIC, so spend a few extra minutes to make sure that the drivers are
installed and configured correctly.
 NIC configuration utilities--in days gone by, NICs were configured with
small groups of pins known as jumpers, or with small plastic blocks of
switches known as dipswitches. Figure 3.23 shows an example of jumpers.
Unless you are working with very old equipment, you are unlikely to
encounter dip switches.
Although these methods were efficient and easy to use, they have now
largely been abandoned in favor of software configuration utilities, which
allow you to configure the settings for the card (if any) and to test whether
the card is working properly. Other utilities can be used through the
operating system to obtain statistical information, help, and a range of other
features.
 System resources:- To function correctly, NICs must have certain system
resources allocated to them: the interrupt request (IRQ) and memory
addresses. In some cases, you might need to assign the values for these
Viren Sir ([email protected])(8928135013) Page 19
manually. In most cases, you can rely on plug-and-play, which assigns
resources for devices automatically.
 Physical slot availability:- Most modern PCs have at least three or four
usable expansion slots. Not only that, but the increasing trend toward
component integration on the motherboard means that devices such as serial
and parallel ports and sound cards are now built in to the system board and
therefore don’t use up valuable slots. If you’re working on older systems or
systems that have a lot of add-in hardware, you might be short of slots.
Check to make sure that a slot is available before you begin.
 Built-in network interfaces:- A built-in network interface is a double-edged
sword. The upsides are that it doesn’t occupy an expansion slot, and
hardware compatibility with the rest of the system is almost guaranteed. The
downside is that a built-in component is not upgradeable. For this reason,
you might find yourself installing an add-in NIC and at the same time
disabling the on-board network interface. Disabling the onboard interface is
normally a straightforward process, achieved by going into the BIOS setup
screen or, on some systems, a system configuration utility. In either case,
consult the documentation that came with the system or look for information
on the manufacturer’s website.
As time goes on, NIC and operating system manufacturers are making it
increasingly easy to install NICs in systems of all sorts and sizes. By understanding
the requirements of the card and the correct installation procedure, you should be
able to install cards simply and efficiently.

NETWORK TOPOLOGY

Computer networks may be classified according to the network topology


upon which the network is based, such as bus network, star network, ring network,
mesh network, star-bus network, tree or hierarchical topology network. Network
topology signifies the way in which devices in the network see their logical
relations to one another. The use of the term "logical" here is significant. That is,
network topology is independent of the "physical" layout of the network. Even if
networked computers are physically placed in a linear arrangement, if they are
connected via a hub, the network has a Star topology, rather than a bus topology.

Viren Sir ([email protected])(8928135013) Page 20


In this regard the visual and operational characteristics of a network are distinct;
the logical network topology is not necessarily the same as the physical layout.
Networks may be classified based on the method of data used to convey the data,
these include digital and analog networks.

Network topology is the physical interconnections of the elements (links, nodes,


etc.) of a computer network.[1][2] A local area network (LAN) is one example of a
network that exhibits both a physical topology and a logical topology. Any given
node in the LAN has one or more links to one or more other nodes in the network
and the mapping of these links and nodes in a graph results in a geometrical shape
that may be used to describe the physical topology of the network. Likewise, the
mapping of the data flows between the nodes in the network determines the logical
topology of the network. The physical and logical topologies may or may not be
identical in any particular network.

Any particular network topology is determined only by the graphical mapping of


the configuration of physical and/or logical connections between nodes. The study
of network topology uses graph theory. Distances between nodes, physical
interconnections, transmission rates, and/or signal types may differ in two
networks and yet their topologies may be identical.

The study of network topology recognizes four basic topologies:

 Bus topology
 Star topology

Viren Sir ([email protected])(8928135013) Page 21


 Ring topology
 Tree topology

Physical topologies

The mapping of the nodes of a network and the physical connections between them
– i.e., the layout of wiring, cables, the locations of nodes, and the interconnections
between the nodes and the cabling or wiring system[1].

BUS

Bus network topology:-

In local area networks where bus technology is used, each machine is


connected to a single cable. Each computer or server is connected to the
single bus cable through some kind of connector. A terminator is required at
each end of the bus cable to prevent the signal from bouncing back and forth
on the bus cable. A signal from the source travels in both directions to all
machines connected on the bus cable until it finds the MAC address or IP
address on the network that is the intended recipient. If the machine address
does not match the intended address for the data, the machine ignores the
data. Alternatively, if the data does match the machine address, the data is
accepted. Since the bus topology consists of only one wire, it is rather
inexpensive to implement when compared to other topologies. However, the
low cost of implementing the technology is offset by the high cost of
managing the network. Additionally, since only one cable is utilized, it can
be the single point of failure. If the network cable breaks, the entire network
will be down, since there is only one cable. Since there is one cable, the
transfer speeds between the computers on the network is faster.

Viren Sir ([email protected])(8928135013) Page 22


Advantages

 Easy to implement and extend


 Well suited for temporary or small networks not requiring high speeds
(quick setup)
 Cheaper than other topologies.
 Cost effective as only a single cable is used
 Cable faults are easily identified.
 Weight reduction due to less wires

Disadvantages

 Limited cable length and number of stations.


 If there is a problem with the cable, the entire network goes down.
 Maintenance costs may be higher in the long run.
 Performance degrades as additional computers are added or on heavy
traffic.(shared bandwidth)
 Proper termination is required (loop must be in closed path).
 Significant Capacitive Load (each bus transaction must be able to stretch to
most distant link).
 It works best with limited number of nodes.
 It is slower than the other topologies.

Standing Wave: As in bus topology there is necessity of proper termination if there


is no termination the waves get reflected at the ends and gets added in other
incoming waves causing cancellation. this addition and cancellation of waves leads
to a standing wave.

Linear bus

The type of network topology in which all of the nodes of the network are
connected to a common transmission medium which has exactly two
endpoints (this is the 'bus', which is also commonly referred to as the
backbone, or trunk) – all data that is transmitted between nodes in the
network is transmitted over this common transmission medium and is able to

Viren Sir ([email protected])(8928135013) Page 23


be received by all nodes in the network virtually simultaneously
(disregarding propagation delays)[1].

Note: The two endpoints of the common transmission medium are normally
terminated with a device called a terminator that exhibits the characteristic
impedance of the transmission medium and which dissipates or absorbs the
energy that remains in the signal to prevent the signal from being reflected
or propagated back onto the transmission medium in the opposite direction,
which would cause interference with and degradation of the signals on the
transmission medium (See Electrical termination).

Distributed bus

The type of network topology in which all of the nodes of the network are
connected to a common transmission medium which has more than two
endpoints that are created by adding branches to the main section of the
transmission medium – the physical distributed bus topology functions in
exactly the same fashion as the physical linear bus topology (i.e., all nodes
share a common transmission medium).

Notes:

1.) All of the endpoints of the common transmission medium are normally
terminated with a device called a 'terminator' (see the note under linear bus).

2.) The physical linear bus topology is sometimes considered to be a special


case of the physical distributed bus topology – i.e., a distributed bus with no
branching segments.

3.) The physical distributed bus topology is sometimes incorrectly referred


to as a physical tree topology – however, although the physical distributed
bus topology resembles the physical tree topology, it differs from the
physical tree topology in that there is no central node to which any other
nodes are connected, since this hierarchical functionality is replaced by the
common bus.

Viren Sir ([email protected])(8928135013) Page 24


STAR

Star network topology

In local area networks where the star topology is used, each machine is connected
to a central hub. In contrast to the bus topology, the star topology allows each
machine on the network to have a point to point connection to the central hub. All
of the traffic which transverses the network passes through the central hub. The
hub acts as a signal booster or repeater which in turn allows the signal to travel
greater distances. As a result of each machine connecting directly to the hub, the
star topology is considered the easiest topology to design and implement. An
advantage of the star topology is the simplicity of adding other machines. The
primary disadvantage of the star topology is the hub is a single point of failure. If
the hub were to fail the entire network would fail as a result of the hub being
connected to every machine on the network.

Notes:

1.) A point-to-point link (described above) is sometimes categorized as a


special instance of the physical star topology – therefore, the simplest type
of network that is based upon the physical star topology would consist of
one node with a single point-to-point link to a second node, the choice of
which node is the 'hub' and which node is the 'spoke' being arbitrary[1].

2.) after the special case of the point-to-point link, as in note 1.) above, the
next simplest type of network that is based upon the physical star topology
would consist of one central node – the 'hub' – with two separate point-to-
point links to two peripheral nodes – the 'spokes'.

Viren Sir ([email protected])(8928135013) Page 25


3.) Although most networks that are based upon the physical star topology
are commonly implemented using a special device such as a hub or switch as
the central node (i.e., the 'hub' of the star), it is also possible to implement a
network that is based upon the physical star topology using a computer or
even a simple common connection point as the 'hub' or central node –
however, since many illustrations of the physical star network topology
depict the central node as one of these special devices, some confusion is
possible, since this practice may lead to the misconception that a physical
star network requires the central node to be one of these special devices,
which is not true because a simple network consisting of three computers
connected as in note 2.) above also has the topology of the physical star.

4.) Star networks may also be described as either broadcast multi-access or


non-broadcast multi-access (NBMA), depending on whether the technology
of the network either automatically propagates a signal at the hub to all
spokes, or only addresses individual spokes with each communication.

Extended star

A type of network topology in which a network that is based upon the


physical star topology has one or more repeaters between the central node
(the 'hub' of the star) and the peripheral or 'spoke' nodes, the repeaters being
used to extend the maximum transmission distance of the point-to-point
links between the central node and the peripheral nodes beyond that which is
supported by the transmitter power of the central node or beyond that which
is supported by the standard upon which the physical layer of the physical
star network is based.

Note: If the repeaters in a network that is based upon the physical extended
star topology are replaced with hubs or switches, then a hybrid network
topology is created that is referred to as a physical hierarchical star topology,
although some texts make no distinction between the two topologies.

Distributed Star

A type of network topology that is composed of individual networks that are


based upon the physical star topology connected together in a linear fashion

Viren Sir ([email protected])(8928135013) Page 26


– i.e., 'daisy-chained' – with no central or top level connection point (e.g.,
two or more 'stacked' hubs, along with their associated star connected nodes
or 'spokes').

Advantages

 Better performance: The star topology prevents the passing of data packets
through an excessive number of nodes. At most, 3 devices and 2 links are
involved in any communication between any two devices. Although this
topology places a huge overhead on the central hub, with adequate capacity,
the hub can handle very high utilization by one device without affecting
others.
 Isolation of devices: Each device is inherently isolated by the link that
connects it to the hub. This makes the isolation of individual devices
straightforward and amounts to disconnecting each device from the others.
This isolation also prevents any non-centralized failure from affecting the
network.
 Benefits from centralization: As the central hub is the bottleneck,
increasing its capacity, or connecting additional devices to it, increases the
size of the network very easily. Centralization also allows the inspection of
traffic through the network. This facilitates analysis of the traffic and
detection of suspicious behavior.
 Simplicity: This topology is easy to understand, establish, and navigate. Its
simplicity obviates the need for complex routing or message passing
protocols. And, as noted earlier, the isolation and centralization it allows
simplify fault detection, as each link or device can be probed individually.

Disadvantages

The primary disadvantage of a star topology is the high dependence of the


system on the functioning of the central hub. While the failure of an individual link
only results in the isolation of a single node, the failure of the central hub renders
the network inoperable, immediately isolating all nodes. The performance and
scalability of the network also depend on the capabilities of the hub. Network size
is limited by the number of connections that can be made to the hub, and
performance for the entire network is capped by its throughput. While in theory

Viren Sir ([email protected])(8928135013) Page 27


traffic between the hub and a node is isolated from other nodes on the network,
other nodes may see a performance drop if traffic to another node occupies a
significant portion of the central node's processing capability or throughput.
Furthermore, wiring up of the system can be very complex.

RING (ACCESS METHOD : TOKEN RING)

Ring network topology

In local area networks where the ring topology is used, each computer is
connected to the network in a closed loop or ring. Each machine or computer
has a unique address that is used for identification purposes. The signal
passes through each machine or computer connected to the ring in one
direction. Ring topologies typically utilize a token passing scheme, used to
control access to the network. By utilizing this scheme, only one machine
can transmit on the network at a time. The machines or computers connected
to the ring act as signal boosters or repeaters which strengthen the signals
that transverse the network. The primary disadvantage of ring topology is
the failure of one machine will cause the entire network to fail.

Advantages

 Very orderly network where every device has access to the token and the
opportunity to transmit
 Performs better than a star topology under heavy network load
 Can create much larger network using Token Ring
 Does not require network server to manage the connectivity between the
computers

Viren Sir ([email protected])(8928135013) Page 28


Disadvantages

 One malfunctioning workstation or bad port in the MAU can create


problems for the entire network
 Moves, adds and changes of devices can affect the network
 Network adapter cards and MAU's are much more expensive than Ethernet
cards and hubs
 Much slower than an Ethernet network under normal load

MESH

The value of fully meshed networks is proportional to the exponent of the number
of subscribers, assuming that communicating groups of any two endpoints, up to
and including all the endpoints, is approximated by Reed's Law.

Fully connected mesh topology

Fully connected

The type of network topology in which each of the nodes of the network is
connected to each of the other nodes in the network with a point-to-point
link – this makes it possible for data to be simultaneously transmitted from
any single node to all of the other nodes.

Note: The physical fully connected mesh topology is generally too costly
and complex for practical networks, although the topology is used when
there are only a small number of nodes to be interconnected.

Viren Sir ([email protected])(8928135013) Page 29


Partially connected mesh topology

Partially connected

The type of network topology in which some of the nodes of the network are
connected to more than one other node in the network with a point-to-point
link – this makes it possible to take advantage of some of the redundancy
that is provided by a physical fully connected mesh topology without the
expense and complexity required for a connection between every node in the
network.

Note: In most practical networks that are based upon the physical partially
connected mesh topology, all of the data that is transmitted between nodes in
the network takes the shortest path (or an approximation of the shortest path)
between nodes, except in the case of a failure or break in one of the links, in
which case the data takes an alternate path to the destination. This requires
that the nodes of the network possess some type of logical 'routing'
algorithm to determine the correct path to use at any particular time.

TREE

Tree network topology

Also known as a hierarchical network.

Viren Sir ([email protected])(8928135013) Page 30


The type of network topology in which a central 'root' node (the top level of the
hierarchy) is connected to one or more other nodes that are one level lower in the
hierarchy (i.e., the second level) with a point-to-point link between each of the
second level nodes and the top level central 'root' node, while each of the second
level nodes that are connected to the top level central 'root' node will also have one
or more other nodes that are one level lower in the hierarchy (i.e., the third level)
connected to it, also with a point-to-point link, the top level central 'root' node
being the only node that has no other node above it in the hierarchy (The hierarchy
of the tree is symmetrical.) Each node in the network having a specific fixed
number, of nodes connected to it at the next lower level in the hierarchy, the
number, being referred to as the 'branching factor' of the hierarchical tree.

1.) A network that is based upon the physical hierarchical topology must
have at least three levels in the hierarchy of the tree, since a network with a
central 'root' node and only one hierarchical level below it would exhibit the
physical topology of a star.

2.) A network that is based upon the physical hierarchical topology and with
a branching factor of 1 would be classified as a physical linear topology.

3.) The branching factor, f, is independent of the total number of nodes in


the network and, therefore, if the nodes in the network require ports for
connection to other nodes the total number of ports per node may be kept
low even though the total number of nodes is large – this makes the effect of
the cost of adding ports to each node totally dependent upon the branching
factor and may therefore be kept as low as required without any effect upon
the total number of nodes that are possible.

4.) The total number of point-to-point links in a network that is based upon
the physical hierarchical topology will be one less than the total number of
nodes in the network.

5.) If the nodes in a network that is based upon the physical hierarchical
topology are required to perform any processing upon the data that is
transmitted between nodes in the network, the nodes that are at higher levels
in the hierarchy will be required to perform more processing operations on

Viren Sir ([email protected])(8928135013) Page 31


behalf of other nodes than the nodes that are lower in the hierarchy. Such a
type of network topology is very useful and highly recommended.

Hybrid Topology:-

Hybrid topology is one that uses two or more basic topologies together Fig.1
depicts this. In this case, the bus, star & ring topologies are used to create this
hybrid topology. There are multiple ways in which this can be created. The hybrid
topology which is to be used for a particular application depends on the
requirements of that application. In practice, many networks are quite complex but
they can be reduced to some form of hybrid topology.

ADVANTAGES of Hybrid Topology

1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in


this type of topology. The part in which fault is detected can be isolated from the
rest of network and required corrective measures can be taken, WITHOUT
affecting the functioning of rest of the network.
2) Scalable: It’s easy to increase the size of network by adding new components,
without disturbing existing architecture.

Viren Sir ([email protected])(8928135013) Page 32


3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given
to nodes
where traffic is high as well as where chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we
can design it in such a way that strengths of constituent topologies are maximized
while there weaknesses are neutralized.

DISADVANTAGES of Hybrid Topology

1) Complexity of Design: One of the biggest drawbacks of hybrid topology is its


design. Its not easy to design this type of architecture and its a tough job for
designers. Configuration and installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very
expensive. These hubs are different from usual hubs as they need to be intelligent
enough to work with different architectures and should be function even if a part of
network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they
require a lot of cables, cooling systems, sophisticate network devices, etc.

Applications: widely used in WAN.

Viren Sir ([email protected])(8928135013) Page 33


CHAPTER 3 TRANSMISSION MEDIA

In a data transmission system, the transmission medium is the physical


path between transmitter and receiver. For guided media, electromagnetic waves
are guided along a solid medium, such as copper twisted pair, copper coaxial cable,
and optical fiber. For unguided media, wireless transmission occurs through the
atmosphere, outer space, or water.
The characteristics and quality of a data transmission are determined both by
the characteristics of the medium and the characteristics of the signal. In the case
of guided media, the medium itself is more important in determining the
limitations of transmission.
For unguided media, the bandwidth of the signal produced by the
transmitting antenna is more important than the medium in determining
transmission characteristics.
One key property of signals transmitted by antenna is directionality. In
general, signals at lower frequencies are omnidirectional; that is, the signal
propagates in all directions from the antenna. At higher frequencies, it is possible
to focus the signal into a directional beam.
In considering the design of data transmission systems, key concerns are
data rate and distance: the greater the data rate and distance the better. A number of
design factors relating to the transmission medium and the signal determine the
data rate and distance:
• Bandwidth: All other factors remaining constant, the greater the bandwidth of a
signal, the higher the data rate that can be achieved.
• Transmission impairments: Impairments, such as attenuation, limit the
distance.
For guided media, twisted pair generally suffers more impairment than
coaxial cable, which in turn suffers more than optical fiber.
• Interference: Interference from competing signals in overlapping frequency
bands can distort or wipe out a signal. Interference is of particular concern for
unguided media but is also a problem with guided media. For guided media,
interference can be caused by emanations from nearby cables. For example,
twisted pairs are often bundled together and conduits often carry multiple cables.
Interference can also be experienced from unguided transmissions.

Viren Sir ([email protected])(8928135013) Page 34


Proper shielding of a guided medium can minimize this problem.
• Number of receivers: A guided medium can be used to construct a point-to point
link or a shared link with multiple attachments. In the latter case, each attachment
introduces some attenuation and distortion on the line, limiting distance and/or data
rate.

State the factors to be considered for selecting transmission media. (Eight


points) ( 1/2 marks for any eight factors)
Eight factors to be considered:
1. Type of medium.
2. No of conductors/connectors.
3. Flexibility.
4. Durability.
5. Bandwidth.
6. Reliability of connection
7. Required speed

Viren Sir ([email protected])(8928135013) Page 35


8. Distance
9. Ease of installation and maintenance access
10. Technical expertise required to install and utilize
11. Resistance to internal EMI , cross talk of parallel wires
12. Resistance to external EMI outside the cable.
13. Attenuation characteristics
14. Cost
OR
1. Cost & Ease of installation: Costing is an important factor, when we select a
media. Because absolute cost and ease of installation data are difficult to provide
without referring to specific implementations, one can make relative judgments by
comparing each medium to the others.
2. Type of cable: Coaxial cable, Twisted Pair Cable, Fiber Optic Cable
3. No of conductors/connectors: RJ-45, BNC, LC & ST
4. Noise: It leads to distortion of a signal. Noise immunity of transmission media is
considered at the time of selecting particular network.
5. Bandwidth: Higher bandwidth transmission media support higher data rate.
6. Radiation: It is leakage of signal from media caused by undesirable
characteristics of media.
7. Durability: Life span of media
8. Interference: interference occurs when undesirable electromagnetic waves affect
the signal. Interference can be caused by many factors, including
• Electromagnetic Interference (EMI)
• Radio wave interference (RFI)
9. Attenuation: Attenuation refers to the tendency of electromagnetic waves to
weaken or become distorted during transmission. It is loss of energy as the signals
propagates outwards. Attenuation increases with distance, as a wave passes
through a medium, some of its energy is absorbed or scattered by the medium’s
physical properties.

GUIDED TRANSMISSION MEDIA:-


For guided transmission media, the transmission capacity, in terms of either
data rate or bandwidth, depends critically on the distance and on whether the
medium is point-to-point or multipoint. Table 4.1 indicates the characteristics

Viren Sir ([email protected])(8928135013) Page 36


typical for the common guided media for long-distance point-to-point applications;
we defer a discussion of the use of these media for multipoint LANs to Part Four.

Transmission capacity (bandwidth and data rate) depends on distance and


type of network (point-to-point or multipoint)
TWISTED PAIR
 Least expensive and most widely used
 Physical description
o Two insulated copper wires arranged in regular spiral pattern
o Number of pairs are bundled together in a cable
o Twisting decreases the crosstalk interference between adjacent pairs
in the cable, by using different twist length for neighboring pairs

Applications
 Most common transmission media for both digital and analog signals
 Transmission Media 25
 Less expensive compared to coaxial cable or optical fiber
 Limited in terms of data rate and distance
 Telephone network
o Individual units (residence lines) to local exchange (end once)
o Subscriber loops
o Supports voice track using analog signaling
o May handle digital data at modest rates using modems
 Communications within buildings
Connection to digital data switch or digital pbx within a building

Viren Sir ([email protected])(8928135013) Page 37


 Allows data rate of 64 kbps

Transmission characteristics
 Requires amplifiers every 5-6 km for analog signals
 Requires repeaters every 2-3 km for digital signals
 Attenuation is a strong function of frequency
o Higher frequency implies higher attenuation
 Susceptible to interference and noise
 Improvement possibilities
o Shielding with metallic braids or sheathing reduces interference
o Twisting reduces low frequency interference
 Different twist length in adjacent pairs reduces crosstalk

UNSHIELDED AND SHIELDED TWISTED PAIRS


 Unshielded twisted pair (utp)
o Ordinary telephone wire
o Subject to external electromagnetic interference

 Shielded twisted pair (stp)


o Shielded with a metallic braid or sheath
o Reduces interference
o Better performance at higher data rates
o More expensive and difficult to work compared to utp
Category 3 and Category 5 utp
 Most common is the 100-ohm voice grade twisted pair
 Most useful for LAN applications
 Category 3 utp
o Transmission characteristics specified up to 16 mhz
o Voice grade cable in most once buildings
o May have data rates up to 16 Mbps over limited distances
o Typical twist length 7.5 to 10 cm
 Category 4 utp
o Transmission characteristics specified up to 20 mhz
 Category 5 utp
o Transmission characteristics specified up to 100 mhz
Viren Sir ([email protected])(8928135013) Page 38
o Data grade cable in newer buildings
o May have data rates up to 100 Mbps over limited distances
o Much more tightly twisted, with typical twist length 0.6 to 0.85 cm,
for better performance

Explain twisted pair cable with neat sketch. (Diagram - 2Marks Explanation -
2Marks)
Ans: A type of cable that consists of two independently insulated wires twisted
around one another. The use of two wires twisted together helps to reduce crosstalk
and electromagnetic induction. While twisted-pair cable is used by older telephone
networks and is the least expensive type of local-area network (LAN) cable, most
networks contain some twisted-pair cabling at some point along the network.
Types :
i ) Unshielded Twisted Pair Cable (UTP) Unshielded twisted pair is the most
common kind of copper telephone wiring. Twisted pair is the ordinary copper wire
that connects home and many business computers to the telephone company. To
reduce crosstalk or electromagnetic induction between pairs of wires, two insulated
copper wires are twisted around each other. Each signal on twisted pair requires
both wires.

SHIELDED TWISTED PAIR CABLE (STP)


STP is a type of copper telephone wiring in which each of the two copper
wires that are twisted together are coated with an insulating coating that functions

Viren Sir ([email protected])(8928135013) Page 39


as a ground for the wires. The extra covering in shielded twisted pair wiring
protects the transmission line from electromagnetic interference leaking into or out
of the cable. STP cabling often is used in Ethernet networks, especially fast data
rate Ethernets.

Advantages of Twisted pair cable


1. It can be used to carry both analog and digital data.
2. It is relatively easy to implement and terminate.
3. It is the least expensive media of transmission for short distances.
4. If portion of a twisted pair cable is damaged it does not affect the
entire network.

COAXIAL CABLE:-

Physical description
 Consists of two conductors with construction that allows it to operate over a
wider range of frequencies compared to twisted pair
 Hollow outer cylindrical conductor surrounding a single inner wire
conductor
 Inner conductor held in place by regularly spaced insulating rings or solid
di-electrical material
 Outer conductor covered with a jacket or shield
 Diameter from 1 to 2.5 cm
 Shielded concentric construction reduces interference and crosstalk
 Can be used over longer distances and support more stations on a shared
line than twisted pair
Viren Sir ([email protected])(8928135013) Page 40
Applications
 Most common use is in cable TV.
 Traditionally part of long distance telephone network
 Can carry more than 10,000 voice channels simultaneously using frequency-
division multiplexing
 Short range connections between devices
Transmission characteristics
 Used to transmit both analog and digital signals
 Superior frequency characteristics compared to twisted pair
 Can support higher frequencies and data rates
 Shielded concentric construction makes it less susceptible to interference
and crosstalk than twisted pair
 Constraints on performance are attenuation, thermal noise, and
intermodulation noise
 Requires appliers every few kilometers for long distance transmission
 Usable spectrum for analog signaling up to 500 mhz
 Requires repeaters every few kilometers for digital transmission
 For both analog and digital transmission, closer spacing is necessary for
higher frequencies/data rates

Draw and explain Co-axial cable. (Diagram 1 mark, explaination 1 mark, any
2 advantages & disadvantages 1 mark each)
Coaxial cable (also called as coax) has an inner central copper conductor
surrounded by an insulating sheath, which in turn is enclosed in the metal mesh.
This outer conductor (shield) acts not only as a second conductor for completing
the circuit but also acts as shield against noise. This whole arrangement is enclosed
in protective plastic cover as shown in fig. Co-axial cables are divided into various
categories depending upon the thickness & size of the shields, insulators and the
outer coating & other considerations. They are commonly used by cable companies
to carry cable transmissions. The various coaxial cable standards are RG8, RG-
9,RG-11,RG-58 and RG-59.
Advantages of coaxial cable are:-
1. It carries signals of higher frequency ranges than twisted pair cable.
2. Lower attenuation than twisted pair cable.
3. Supports higher bandwidth.
Viren Sir ([email protected])(8928135013) Page 41
Disadvantages of coaxial cable are:-
1. Cost of coaxial cable is more than twisted pair cable.
2. Less flexible.
3. More difficult to install in a building where a number of twists and turns are
required.
4. Limited to size of network.

OPTICAL FIBER
Thin, flexible material to guide optical rays, cylindrical cross-section with three
concentric links

 Innermost section of the fiber


1. Core

 One or more very thin (dia. 8-100 _m) strands or fibers


2. Cladding
 Surrounds each strand
 Plastic or glass coating with optical properties different from core
 Interface between core and cladding prevents light from escaping the core

 Outermost layer, surrounding one or more claddings


3. Jacket

 Made of plastic and other materials


 Protects from environmental elements like moisture, abrasions, and crushing
 Comparison with twisted pair and coaxial cable
Capacity
 Much higher bandwidth
 Can carry hundreds of Gbps over tens of kms
 Smaller size and light weight
 Very thin for similar data capacity

Viren Sir ([email protected])(8928135013) Page 42


Draw and explain fiber optic cable.(2 marks for diagram, 2 marks for
explanation)

As shown in the figure, at the center is the glass core through which the light
propagates. In multimode fibers, the core is typically 50 microns in diameter. In
single mode fibers, the core is 8 to 10 microns. The core is surrounded by a glass
cladding with a lower index of refraction than the core, to keep all the light in the
core. A thin plastic jacket is used to protect the cladding. Fibers are grouped in
bundles, protected by an outer sheath. Fibers can be connected in three different
ways. First they can terminate in connectors and be plugged into fiber sockets.
Connectors lose about 10 to 20 percent of the light, but they make it easy to
reconfigure systems. Second they can be spliced mechanically. Mechanical splices
just lay the two carefully – cut ends next to each other in a special sleeve and
clamp them in place. Alignment can be improved by passing light through the
junction and then making small adjustments to maximize the signal. Third, two
pieces of fiber can be fused to form a solid connection. A fusion splice is almost as
good as a single drawn fiber.

Explain different modes of fibre optic cable.(For each mode 2 marks)


Current technology supports two modes for propagating light along optical
channels. 1. Multimode. 2. Single mode.
Viren Sir ([email protected])(8928135013) Page 43
Multimode can be implemented in two form:
1. Step index.
2. Graded index.

Multimode:
 Multiple beams from a light source move through the core in different paths.
 How these beams move within the cable depends on the structure of the core
as shown in the fig. In multimode step-index fiber, the density of the core
remains constant from the center to the edges.
 A beam of light moves through this constant density in a straight line until it
reaches the interface of the core and the cladding.
 At the interface, there is an abrupt change due to a lower density, this alters
the angle of the beam‟s motion.
 The term step index refers to the suddenness of this change, which
contributes to the distortion of the signal as it passes through the fiber.
 A multimode graded index fiber decreases this distortion of the signal
through the cable.
 In this, density is highest at the center of the core and decreases gradually to
its lowest at the edge.
 Following fig shows the impact of this variable density on the propagation
of light beams.

Viren Sir ([email protected])(8928135013) Page 44


Single mode:
 The single mode fiber is manufactured with a much smaller diameter than
that of multimode fiber and with substantially lower density.
 The decrease in density results in a critical angle that is close enough to 900
to make the propagation of beams almost horizontal.
 In this case propagation is almost identical and delays are negligible.
 All the beams arrive at the destination together and can be recombined with
little distortion to the signal.

Compare guided and unguided media(WIRED or WIRELESS MEDIA) used


in computer network.

Viren Sir ([email protected])(8928135013) Page 45


How cross cable is created? Draw figure and explain. Give its application.
(Creation: 4M; Diagram : 2M; Application : 2M)
Crossover cable is created by connecting the two UTP cables by swapping
transmission and reception signals as shown below: Here, One end of the cable is
crimped in the same way as straight cable, on the other end the following change
has to be done, 1-White and 3 orange- white are to be connected 2 –Green and 6
orange are to be connected as shown in the fig below.

 While connecting one computer to another without going through router,


Application:

switch or hub, the crossover cables are used.


 These are also used when connecting one computer to a device directly,
without any other connecting device.
 Cross cable is used for connecting similar level devices.
 For example : two computers or connecting computer with hub since all are
level 1devices.

What is the frequency band used for cellular telephony? How a mobile call is
transmitted and received? (Explanation of cellular telephony – 2 Marks,
Explanation of mobile call transmission & reception – 2 Marks) What is the
frequency band used for cellular telephony? How a mobile call is transmitted
and received.

Viren Sir ([email protected])(8928135013) Page 46


Analog transmission is used for cellular telephony. Frequency modulation is
used for communication between the mobile phone and cell office. Two frequency
bands are allocated for this purpose. One band of them is for the communication
that is initiated by mobile phone & the other band for the land phone. Each channel
requires a full-duplex dialog. For preventing interference, adjacent channels are
rarely allocated; some of them are also required for control purposes. This reduces
the number of channels available for each cell. The same frequency band can be
used for multiple non-adjacent cells as shown in fig.

Calls using Mobile phones: Call is made from the mobile phone by entering 7-,
8-, or 10-digit phone number; the mobile phone itself scans the band & seeks a
channel for setting up the call. After seeking, it sends this number to the closest
cell office, which in turn, sends it to the CTO. If the called party is available, CTO
lets MTSO (mobile telephone switching office) know. At this point, MTSO
allocates an empty voice channel to the cell to establish the connection. The mobile
phone adjust its tuning to the new channel & the dialog begins. When a land phone
places a call to a mobile phone, the telephone central office sends the number to
the MTSO. The MTSO performs a lookup to see where the mobile phone is
currently placed by sending appropriate query signal to all the cells. This process is
known paging. The cell where the mobile phone is currently located responds to
the MTSO. Incoming calls work differently. To start with idle phone is
continuously listen to paging channel to detect messages at directed at them. The
MTSO then transmit the incoming call signal to that mobile phone & when the
mobile phone is answered, the MTSO assigns a voice channel to the call, thus
enabling the conversation.

Viren Sir ([email protected])(8928135013) Page 47


Explain handoff procedure of cellular mobile phone. (Handoff Procedure -2
Marks, Types of Handoff – 2 Marks)
Ans: Assume that there is a call going on between two parties over a voice
channel. When the mobile unit moves out of coverage area of a particular cell site
the reception becomes weak. Then the cell site will request a hand off.
The system will switch the call to a new cell site without interrupting the call or
changing the user. This procedure is called as the hand off procedure or handover
procedure.
Following are various types of handoffs. Supported by a Mobile Station (MS):
1. Hard Hand Off
2. Soft Hand off
3. Queued hand off
4. Delayed hand off
5. Forced hand off

1. Hard hand off:


A hard handoff is a handoff technique used with cellular networks that
requires the user's connection to be entirely broken with an existing base station
before being switched to another base station.
2. Soft hand off:
The hand off is known as soft handoff if the MS starts communication with a
new base station without stopping the communication with the older base station.
3. Delayed Hand off:
In many situations, instead of one level, a two level handoff procedure is
used, in order to provide a high opportunity for a successful handoff. A hand off
can be delayed if on available cell take the call.
4. Forced Handoff:
A forced handoff is defined as the off which would normally occur but
prevented from happening or a handoff that should not occur but is forced to
happen.
5. Queued handoff:
In the queued handoff process, the MTSO arranges the handoff requests in a
queue instead of rejecting them, if the new cell sites are busy.

Viren Sir ([email protected])(8928135013) Page 48


SATELLITE COMMUNICATION:
In satellite communication, signal transferring between the sender and
receiver is done with the help of satellite. In this process, the signal which is
basically a beam of modulated microwaves is sent towards the satellite called
UPLINK (6 GHz). Then the satellite amplifies the signal and sent it back to the
receiver’s antenna present on the earth’s surface called as DOWNLINK (4 GHz),
as shown in the diagram given

 As the entire signal transferring is happening in space. Thus this type


of communication is known as space communication.
 The satellite does the functions of an antenna and the repeater
together.
 If the earth along with its ground stations is revolving and the satellite
is stationery, the sending and receiving earth stations and the satellite
can be out of sync over time.
 Therefore Geosynchronous satellites are used which move at same
RPM as that of the earth in the same direction.
 So the relative position of the ground station with respect to the
satellite never changes.
 However 3 satellites are needed to cover earth’s surface entirely.

Viren Sir ([email protected])(8928135013) Page 49


Application of satellite:
 Satellite television
 digital cinema
 satellite radio
 satellite internet access

What is Bluetooth?
1. A cable-replacement technology that can be used to connect almost any
device to any other device
2. Radio interface enabling electronic devices to communicate wirelessly via
short range (10 meters) ad-hoc radio connections
3. a standard for a small , cheap radio chip to be plugged into computers,
printers, mobile phones, etc.
4. Uses the radio range of 2.45 GHz
5. Theoretical maximum bandwidth is 1 Mb/s
6. Bluetooth is short range wireless technology.
7. Range of Bluetooth is 10 meters.
8. Bluetooth Architecture defines 2 types of networks.
1) Piconet
2) Scatternet

 It consists of 1 master node and 7 slave nodes.


Piconet

 Piconet has 8 active nodes (7+1) in the range of 10 meters.


 There can be only 1 master station in each piconet.
 Communication is between master and slave, Slave-slave
communication is not possible.

Viren Sir ([email protected])(8928135013) Page 50


 Piconet can have 255 parked nodes, that can not take part in
communication. There will be 7 slaves in active state and 255 nodes
in parked state.

Scatter net
 It is formed by combining various piconets.
 Slave in one piconet can act as master in other piconet.
 Such a node can receive message from the master in the first
piconet and deliver the message in second piconet.
 Station can be member of two piconets.
 Station cannot be master of two piconets.

Viren Sir ([email protected])(8928135013) Page 51


INFRA RED
Today, two different basic transmission technologies can be used to set up
WLANs.
One technology is based on the transmission of infra red light (e.g., at 900
nm wavelength), the other one, which is much more popular, uses radio
transmission in the GHz range (e.g., 2.4 GHz in the license-free ISM band). Both
technologies can be used to set up ad-hoc connections for work groups, to connect,
e.g., a desktop with a printer without a wire, or to support mobility within a small
area.
Infra-red technology uses diffuse light reflected at walls; furniture etc. or directed
light if a line-of-sight (LOS) exists between sender and receiver. Senders can be
simple light emitting diodes (LEDs) or laser diodes. Photodiodes act as receivers.
Details about infra-red technology, such as modulation, channel impairments etc.
can be found in Wesel (1998) and Santa Maria (1994).
● The main advantages of infra-red technology are its simple and extremely cheap
senders and receivers which are integrated into nearly all mobile devices available
today. PDAs, laptops, notebooks, mobile phones etc. have an infra-red data
association (IrDA) interface. Version 1.0 of this industry standard implements data
rates of up to 115 kbit/s, while IrDA 1.1 defines higher data rates of 1.152 and 4
Mbit/s. No licenses are needed for infra-red technology and shielding is very
simple. Electrical devices do not interfere with infra-red transmission.
● Disadvantages of infra-red transmission are its low bandwidth compared to
other LAN technologies. Typically, IrDA devices are internally connected to a
serial port limiting transfer rates to 115 kbit/s. Even 4 Mbit/s is not a particularly
high data rate. However, their main disadvantage is that infra-red is quite easily
shielded. Infra-red transmission cannot penetrate walls or other obstacles.
Typically, for good transmission quality and high data rates a LOS, i.e., direct
connection, is needed.

Viren Sir ([email protected])(8928135013) Page 52


CHAPTER 4 THE OSI MODEL

The layered model that dominated data communication and networking


literature before 1990 was the Open Systems Interconnection (OSI) model.
Everyone believed that the OSI model would become the ultimate standard for data
communications—but this did not happen. The TCP/IP protocol suite became the
dominant commercial architecture because it was used and tested extensively in the
Internet; the OSI model was never fully implemented.

Services: - Each layer at the sending site uses the services of the layer immediately
below it. The sender at the higher layer uses the services of the middle layer. The
middle layer uses the services of the lower layer. The lower layer uses the services
of the carrier.

THE OSI MODEL

Established in 1947, the International Standards Organization (ISO) is a


multinational body dedicated to worldwide agreement on international standards.
Almost three-fourths of countries in the world are represented in the ISO. An ISO
standard that covers all aspects of network communications is the Open Systems
Interconnection (OSI) model. It was first introduced in the late 1970s.

An open system is a set of protocols that allows any two different systems to
communicate regardless of their underlying architecture. The purpose of the OSI
model is to show how to facilitate communication between different systems
without requiring changes to the logic of the underlying hardware and software.
The OSI model is not a protocol; it is a model for understanding and designing a
network architecture that is flexible, robust, and interoperable. The OSI model was
intended to be the basis for the creation of the protocols in the OSI stack. The OSI
model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven
separate but related layers, each of which defines a part of the process of moving
information across a network.

Viren Sir ([email protected])(8928135013) Page 53


THE OSI 7 LAYERS

Layered Architecture

The OSI model is composed of seven ordered layers: physical (layer 1), data
link (layer 2), network (layer 3), transport (layer 4), session (layer 5), and
presentation (layer 6), and application (layer 7). The layers involved when a
message is sent from device A to device B. As the message travels from A to B, it
may pass through many intermediate nodes. These intermediate nodes usually
involve only the first three layers of the OSI model. They identified which
networking functions had related uses and collected those functions into discrete
groups that became the layers. Each layer defines a family of functions distinct
from those of the other layers. By defining and localizing functionality in this
fashion, the designers created an architecture that is both comprehensive and
flexible. Most important, the OSI model allows complete interoperability
between otherwise incompatible systems. Within a single machine, each layer
calls upon the services of the layer just below it. Layer 3, for example, uses the
services provided by layer 2 and provides services for layer 4. Between machines,
layer x on one machine logically communicates with layer x on another machine.
This communication is governed by an agreed-upon series of rules and
conventions called protocols.

Viren Sir ([email protected])(8928135013) Page 54


Horizontal communications

 The horizontal communication between the different layers is logical; there


is no direct communication between them. Information included in each
protocol header by the transmitting system is message that will be carried to
the same protocol in the destination system
 For two computers to communicate over a network, the protocols used at
each layer of the OSI model in the transmitting system must be duplicated at
the receiving system.
 The packet travels up through the protocol stack and each successive header
is stripped off by the appropriate protocol and processed.
 When the packet arrives as it destination, the process by which the headers
are applied at the source is respected in reverse.
 The protocol operating at the various layers communicate horizontally with
their counterparts in the other system, as shown in below fig..

Viren Sir ([email protected])(8928135013) Page 55


Vertical Communications

 In addition to communicating horizontally with the same protocol in the


other system, the header information also enables each layer to
communicate with the layer above and below it.
 The headers applied by the different protocols implemented the specific
functions carried out by those protocols.
 For Example: When a system receives a packets and passes it up through
the protocol stack, the data link layer protocol header includes afield that
identifies which network-layer protocol the system should use to process
the packet.
 Network –layer protocol header in tern specifies one of the transport-
layer protocols and the transport-layer protocol identifies the application
for which the data is ultimately destined.
 Vertical communication makes it possible for a computer to support
multiple protocols at each of the layers simultaneously.

Viren Sir ([email protected])(8928135013) Page 56


Data encapsulation in OSI: -

Each layer in the layered architecture provides service to the layers which
are directly above and below it. The outgoing information will travel down through
the layers to the lowest layer. While moving down on the source machine, it
acquires all the control information which is required to reach the destination
machine. The control information is in the form of headers and footers which
surrounds the data received from the layer above. This process of adding headers
and footers to the data is called as data encapsulation. The headers and footers
contain control information in the individual fields. It is used to make message
packet reach the destination. The headers and footers form the envelope which
carries the message to the desired destination.

Viren Sir ([email protected])(8928135013) Page 57


LAYERS IN THE OSI MODEL

Physical Layer

The physical layer coordinates the functions required to carry a bit stream over a
physical medium. It deals with the mechanical and electrical specifications of the
interface and transmission media. It also defines the procedures and functions that
physical devices and interfaces have to perform for transmission to occur.

The physical layer is also concerned with the following:

 Physical characteristics of interfaces and media. The physical layer


defines the characteristics of the interface between the devices and the
transmission media. It also defines the type of transmission media
 Representation of bits. The physical layer data consists of a stream of bits
(sequence of 0s or 1s) with no interpretation. To be transmitted, bits must be
encoded into signals—electrical or optical. The physical layer defines the
type of encoding (how 0s and 1s are changed to signals).
 Data rate. The transmission rate—the number of bits sent each second—is
also defined by the physical layer. In other words, the physical layer defines
the duration of a bit, which is how long it lasts.
 Synchronization of bits. The sender and receiver must not only use the
same bit rate but must also be synchronized at the bit level. In other words,
the sender and the receiver clocks must be synchronized.
 Line configuration. The physical layer is concerned with the connection of
devices to the media. In a point-to-point configuration, two devices are

Viren Sir ([email protected])(8928135013) Page 58


connected together through a dedicated link. In a multipoint configuration, a
link is shared between several devices.
 Physical topology. The physical topology defines how devices are
connected to make a network. Devices can be connected using a mesh
topology (every device connected to every other device), a star topology
(devices are connected through a central device), a ring topology (each
device is connected to the next, forming a ring), or a bus topology (every
device on a common link).
 Transmission mode. The physical layer also defines the direction of
transmission between two devices: simplex, half-duplex, or full-duplex. In
the simplex mode, only one device can send; the other can only receive. The
simplex mode is a one-way communication. In the half-duplex mode, two
devices can send and receive, but not at the same time. In a full-duplex (or
simply duplex) mode, two devices can send and receive at the same time.

Data Link Layer

The data link layer transforms the physical layer, a raw transmission
facility, to a reliable link. It makes the physical layer appear error-free to the upper
layer (network layer).
Viren Sir ([email protected])(8928135013) Page 59
Other responsibilities of the data link layer include the following:

 Framing. The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
 Physical /Local addressing. If frames are to be distributed to different
systems on the network, the data link layer adds a header to the frame to
define the sender and/or receiver of the frame. If the frame is intended for a
system outside the sender’s network, the receiver address is the address of
the connecting device that connects the network to the next one.
 Flow control. If the rate at which the data is absorbed by the receiver is less
than the rate produced at the sender, the data link layer imposes a flow
control mechanism to prevent overwhelming the receiver.
 Error control. The data link layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit damaged or lost frames. It also
uses a mechanism to recognize duplicate frames. Error control is normally
achieved through a trailer added to the end of the frame.
 Access control. When two or more devices are connected to the same link,
data link layer protocols are necessary to determine which device has control
over the link at any given time.

Network Layer

The network layer is responsible for the source-to-destination delivery of a


packet, possibly across multiple networks (links). Whereas the data link layer
oversees the delivery of the packet between two systems on the same network

Viren Sir ([email protected])(8928135013) Page 60


(link), the network layer ensures that each packet gets from its point of origin to its
final destination. If two systems are connected to the same link, there is usually no
need for a network layer. However, if the two systems are attached to different
networks (links) with connecting devices between the networks (links), there is
often a need for the network layer to accomplish source-to-destination delivery.
Other responsibilities of the network layer include the following:

 Logical addressing. The physical addressing implemented by the data link


layer handles the addressing problem locally. If a packet passes the network
boundary, we need another addressing system to help distinguish the source
and destination systems. The network layer adds a header to the packet
coming from the upper layer that, among other things, includes the logical
addresses of the sender and receiver.
 Routing. When independent networks or links are connected together to
create internetworks (network of networks) or a large network, the
connecting devices (called routers or switches) route or switch the packets to
their final destination. One of the functions of the network layer is to provide
this mechanism.

Viren Sir ([email protected])(8928135013) Page 61


Transport Layer

The transport layer is responsible for process-to-process delivery of the entire


message. A process is an application program running on the host. Whereas the
network layer oversees source-to-destination delivery of individual packets, it does
not recognize any relationship between those packets. It treats each one
independently, as though each piece belonged to a separate message, whether or
not it does.

The transport layer, on the other hand, ensures that the whole message
arrives intact and in order, overseeing both error control and flow control at the
source-to-destination level.

Other responsibilities of the transport layer include the following:

 Service-point addressing. Computers often run several programs at the


same time. For this reason, source-to-destination delivery means delivery not
only from one computer to the next but also from a specific process (running
program) on one computer to a specific process (running program) on the
other. The transport layer header must therefore include a type of address
called a service-point address (or port address). The network layer gets each
packet to the correct computer; the transport layer gets the entire message to
the correct process on that computer.
 Segmentation and reassembly. A message is divided into transmittable
segments, with each segment containing a sequence number. These numbers
enable the transport layer to reassemble the message correctly upon arriving
at the destination and to identify and replace packets that were lost in
transmission.
 Connection control. The transport layer can be either connectionless or
connection oriented. A connectionless transport layer treats each segment as
an independent packet and delivers it to the transport layer at the destination
machine. A connection oriented transport layer makes a connection with the
transport layer at the destination machine first before delivering the packets.
After all the data are transferred, the connection is terminated.

Viren Sir ([email protected])(8928135013) Page 62


 Flow control. Like the data link layer, the transport layer is responsible for
flow control. However, flow control at this layer is performed end to end
rather than across a single link.
 Error control. Like the data link layer, the transport layer is responsible for
error control. However, error control at this layer is performed process-to-
process rather than across a single link. The sending transport layer makes
sure that the entire message arrives at the receiving transport layer without
error (damage, loss, or duplication). Error correction is usually achieved
through retransmission.

Viren Sir ([email protected])(8928135013) Page 63


Session Layer

The services provided by the first four layers (physical, data link, network
and transport) are not sufficient for some processes. The session layer is the
network dialog controller. It establishes, maintains, and synchronizes the
interaction between communicating systems.

Specific responsibilities of the session layer include the following:

 Dialog control. The session layer allows two systems to enter into a dialog.
It allows the communication between two processes to take place in either
half duplex (one way at a time) or full-duplex (two ways at a time) mode.
 Synchronization. The session layer allows a process to add checkpoints
(synchronization points) into a stream of data. For example, if a system is
sending a file of 2,000 pages, it is advisable to insert checkpoints after every
100 pages to ensure that each 100-page unit is received and acknowledged
independently. In this case, if a crash happens during the transmission of
page 523, the only pages that need to be resent after system recovery are
pages 501 to 523. Pages previous to 501 need not be resent.

Viren Sir ([email protected])(8928135013) Page 64


Presentation Layer

The presentation layer is concerned with the syntax and semantics of the
information exchanged between two systems.

Specific responsibilities of the presentation layer include the following

 Translation. The processes (running programs) in two systems are


usually exchanging information in the form of character strings, numbers,
and so on. The information should be changed to bit streams before being
transmitted. Because different computers use different encoding systems,
the presentation layer is responsible for interoperability between these
different encoding methods. The presentation layer at the sender changes
the information from its sender-dependent format into a common format.
The presentation layer at the receiving machine changes the common
format into its receiver-dependent format.
 Encryption. To carry sensitive information a system must be able to
assure privacy. Encryption means that the sender transforms the original
information to another form and sends the resulting message out over the
network. Decryption reverses the original process to transform the
message back to its original form.
 Compression. Data compression reduces the number of bits contained in
the information. Data compression becomes particularly important in the
transmission of multimedia such as text, audio, and video.

Viren Sir ([email protected])(8928135013) Page 65


Application Layer

The application layer enables the user, whether human or software, to access
the network. It provides user interfaces and support for services such as
electronic mail, remote file access and transfer, shared database management,
and other types of distributed information services.

Specific services provided by the application layer include the following:

 Network virtual terminal. A network virtual terminal is a software


version of a physical terminal and allows a user to log on to a remote
host. To do so, the application creates a software emulation of a terminal
at the remote host. The user’s computer talks to the software terminal,
which, in turn, talks to the host, and vice versa. The remote host believes
it is communicating with one of its own terminals and allows you to log
on.
 File transfer, access, and management (FTAM). This application
allows a user to access files in a remote host (to make changes or read
data), to retrieve files from a remote computer for use in the local
computer, and to manage or control files in a remote computer locally.
 E-mail services. This application provides the basis for e-mail
forwarding and storage.
 Directory services. This application provides distributed database
sources and access for global information about various objects and
services.

Viren Sir ([email protected])(8928135013) Page 66


CHAPTER 5 TCP/IP SUITS

ADDRESSING
Four levels of addresses are used in an internet employing the TCP/IP
protocols: physical address, logical address, port address, and application-
specific address. Each address is related to a one layer in the TCP/IP architecture.
Physical Addresses
The physical address, also known as the link address, is the address of a
node as defined by its LAN or WAN. It is included in the frame used by the data
link layer. It is the lowest-level address. The physical addresses have authority
over the link (LAN or WAN). The size and format of these addresses vary
depending on the network. For example, Ethernet uses a 6-byte (48-bit) physical
address that is imprinted on the network interface card (NIC). LocalTalk (Apple),
however, has a 1-byte dynamic address that changes each time the station comes
up.
Example 2.3
In Figure a node with physical address 10 sends a frame to a node with
physical address 87. The two nodes are connected by a link (a LAN). At the data
link layer, this frame contains physical (link) addresses in the header. These are the
only addresses needed. The rest of the header contains other information needed at
this level. The trailer usually contains extra bits needed for error detection. As the
figure shows, the computer with physical address 10 is the sender, and the
computer with physical address 87 is the receiver. The data link layer at the sender
receives data from an upper layer. It encapsulates the data in a frame, adding a
header and a trailer. The header, among other pieces of information, carries the
receiver and the sender physical (link) addresses. Note that in most data link
protocols, the destination address 87 in this case, comes before the source address
(10 in this case). The frame is propagated through the LAN. Each station with a
physical address other than 87 drops the frame because the destination address in
the frame does not match its own physical address. The intended destination
computer, however, finds a match between the destination address in the frame and
its own physical address. The frame is checked, the header and trailer are dropped,
and the data part is DE capsulated and delivered to the upper layer.

Viren Sir ([email protected])(8928135013) Page 67


Port Addresses
The IP address and the physical address are necessary for a quantity of data
to travel from a source to the destination host. However, arrival at the destination
host is not the final objective of data communications on the Internet. A system
that sends nothing but data from one computer to another is not complete. Today,
computers are devices that can run multiple processes at the same time. The end
objective of Internet communication is a process communicating with another
process. For example, computer A can communicate with computer C by using
TELNET. At the same time, computer A communicates with computer B by using
the File Transfer Protocol (FTP). For these processes to receive data
simultaneously, we need a method to label the different processes. In other words,
they need addresses. In the TCP/IP architecture, the label assigned to a process is
called a port address. A port address in TCP/IP is 16 bits in length.

Viren Sir ([email protected])(8928135013) Page 68


Unicast, Multicast, and Broadcast Addresses
A source address is always a unicast address—the frame comes from only
one station. The destination address, however, can be unicast, multicast, or
broadcast. How to distinguish a unicast address from a multicast address. If the
least significant bit of the first byte in a destination address is 0, the address is
unicast; otherwise, it is multicast.
A unicast destination address defines only one recipient; the relationship
between the sender and the receiver is one-to-one. A multicast destination address
defines a group of addresses; the relationship between the sender and the receivers
is one-to-many. The broadcast address is a special case of the multicast address;
the recipients are all the stations on the LAN. A broadcast destination address is
forty-eight 1s.

Introduction to IP Address;-

The identifier used in the IP layer of the TCP/IP protocol suite to identify
each device connected to the Internet is called the Internet address or IP address.
An IPv4 address is a 32-bit address that uniquely and universally defines the
connection of a host or a router to the Internet; an IP address is the address of the
interface.

IPv4 addresses are unique. They are unique in the sense that each addresses
defines one, and only one, connection to the Internet. Two devices on the Internet
can never have the same address at the same time. However, if a device has two

Viren Sir ([email protected])(8928135013) Page 69


connections to the Internet, via two networks, it has two IPv4 addresses. The IPv4
addresses are universal in the sense that the addressing system must be accepted by
any host that wants to be connected to the Internet.

Address Space

A protocol like IPv4 that defines addresses has an address space. An address
space is the total number of addresses used by the protocol. If a protocol uses b bits
to define an address, the address space is 2b because each bit can have two different
values (0 or 1). IPv4 uses 32-bit addresses, which means that the address space is
232 or 4,294,967,296 (more than four billion). Theoretically, if there were no
restrictions, more than 4 billion devices could be connected to the Internet.

Notation

 There are three common notations to show an IPv4 address:


 Binary notation (base 2),
 Dotted-decimal notation (base 256),
 Hexadecimal notation (base 16).

Binary Notation: Base 2

In binary notation, an IPv4 address is displayed as 32 bits. To make the


address more readable, one or more spaces is usually inserted between each octet
(8 bits). Each octet is often referred to as a byte. So it is common to hear an IPv4
address referred to as a 32-bit address, a 4-octet address, or a 4-byte address. The
following is an example of an IPv4 address in binary notation:

Dotted-Decimal Notation: Base 256

To make the IPv4 address more compact and easier to read, an IPv4 address
is usually written in decimal form with a decimal point (dot) separating the bytes.
This format is referred to as dotted-decimal notation. Note that because each byte
(octet) is only 8 bits, each number in the dotted-decimal notation is between 0 and
255.

Viren Sir ([email protected])(8928135013) Page 70


Hexadecimal Notation: Base 16

We sometimes see an IPv4 address in hexadecimal notation. Each


hexadecimal digit is equivalent to four bits. This means that a 32-bit address has 8
hexadecimal digits. This notation is often used in network programming.

Example 5.4

Change the following IPv4 addresses from binary notation to hexadecimal


notation. a. 10000001 00001011 00001011 11101111 b. 11000001 10000011
00011011 11111111

Solution

We replace each group of 4 bits with its hexadecimal equivalent .Note that
hexadecimal notation normally has no added spaces or dots; however, 0X (or 0x) is
added at the beginning or the subscript 16 at the end to show that the number is in
hexadecimal. a. 0X810B0BEF or 810B0BEF16 b. 0XC1831BFF or C1831BFF16

CLASSFUL ADDRESSING

IP addresses, when started a few decades ago, used the concept of classes.
This architecture is called classful addressing. In the mid-1990s, a new
architecture, called classless addressing, was introduced that supersedes the
original architecture.

Classes

In classful addressing, the IP address space is divided into five classes:

A, B, C, D, and E. Each class occupies some part of the whole address


space.

Viren Sir ([email protected])(8928135013) Page 71


Recognizing Classes

We can find the class of an address when the address is given either in
binary or dotted decimal notation. In the binary notation, the first few bits can
immediately tell us the class of the address; in the dotted-decimal notation, the
value of the first byte can give the class of an address. Note that some special
addresses fall in class A or E. We emphasize that these special addresses are
exceptions to the classification.

Netid and Hostid

In classful addressing, an IP address in classes A, B, and C is divided into


netid and hostid. These parts are of varying lengths, depending on the class of the
address. Figure 5.8 shows the netid and hostid bytes. Note that classes D and E are
not divided into netid and hostid, for reasons that we will discuss later.

Viren Sir ([email protected])(8928135013) Page 72


In class A, 1 byte defines the netid and 3 bytes define the hostid. In class B,
2 bytes define the netid and 2 bytes define the hostid. In class C, 3 bytes define the
netid and 1 byte defines the hostid.

In class A, 1 byte defines the netid and 3 bytes define the hostid. In class B, 2 bytes
define the netid and 2 bytes define the hostid. In class C, 3 bytes define the netid
and 1 byte defines the hostid.

CLASSES AND BLOCKS

One problem with classful addressing is that each class is divided into a
fixed number of blocks with each block having a fixed size. Let us look at each
class.

Class A

Since only 1 byte in class A defines the netid and the leftmost bit should be
0, the next 7 bits can be changed to find the number of blocks in this class.
Therefore, class A is divided into 27 = 128 blocks that can be assigned to 128
organizations (the number is less because some blocks were reserved as special
blocks). However, each block in this class contains 16,777,216 addresses, which
means the organization should be a really large one to use all these addresses.
Many addresses are wasted in this class.

Viren Sir ([email protected])(8928135013) Page 73


Class B

Since 2 bytes in class B define the class and the two leftmost bit should be
10 (fixed), the next 14 bits can be changed to find the number of blocks in this
class. Therefore, class B is divided into 214 = 16,384 blocks that can be assigned
to 16,384 organizations (the number is less because some blocks were reserved as
special blocks). However, each block in this class contains 65,536 addresses. Not
so many organizations can use so many addresses. Many addresses are wasted in
this class.

Class C

Since 3 bytes in class C define the class and the three leftmost bits should be
110 (fixed), the next 21 bits can be changed to find the number of blocks in this
class. Therefore, class C is divided into 221 = 2,097,152 blocks, in which each
block contains 256 addresses that can be assigned to 2,097,152 organizations (the
number is less because some blocks were reserved as special blocks). Each block
contains 256 addresses. However, not so many organizations were so small as to be
satisfied with a class C block.

Class D

There is just one block of class D addresses. It is designed for multicasting,


as we will see in a later section. Each address in this class is used to define one
group of hosts on the Internet. When a group is assigned an address in this class,

Viren Sir ([email protected])(8928135013) Page 74


every host that is a member of this group will have a multicast address in addition
to its normal (unicast) address.

Class E

There is just one block of class E addresses. It was designed for use as reserved
addresses

Network Mask

The methods we described previously for extracting the network address are
mostly used to show the concept. The routers in the Internet normally use an
algorithm to extract the network address from the destination address of a packet.
To do this, we need a network mask. A network mask or a default mask in
classful addressing is a 32-bit number with n leftmost bits all set to 1s and (32 − n)
rightmost bits all set to 0s. Since n is different for each class in classful addressing,
we have three default masks in classful addressing.

SUBNET:-

A subnet is a logical grouping of connected network devices. Nodes on a


subnet tend to be located in close physical proximity to each other on a LAN.
Network designers employ subnets as a way to partition networks into logical

Viren Sir ([email protected])(8928135013) Page 75


segments for greater ease of administration. When subnets are properly
implemented, both the performance and security of networks can be improved.

In Internet Protocol (IP) networking, devices on a subnet share contiguous


ranges of IP address numbers. A mask (known as the subnet mask or network
mask) defines the boundaries of an IP subnet. The correspondence between subnet
masks and IP address ranges follows defined mathematical formulas. IT
professionals use subnet calculators to map between masks and addresses. Subnet
masking for 2 subnet: To calculate the number of subnets or nodes, use the formula
(2n-2) where n = number of bits in either field, and 2n represents 2 raised to the nth
power. Multiplying the number of subnets by the number of nodes available per
subnet gives you the total number of nodes available for your class and subnet
mask. Also, note that although subnet masks with non-contiguous mask bits are
allowed, they are not recommended.

Super-netting:

To create a super network, the procedure is to be reversed. The networks are


combined by creating space for a larger number of hosts. To accomplish this, we
start with the default subnet mask of 255.255.255.0 and use some of the bits
reserved for the Netid to identify the Hostid. The following exampleshows we
would create a new supernetwork by combining four separate subnetworks.

Example: If a packet arrives at the router with the destination address

192.168.64.48, the supernet mask 255.255.252.0 is applied to the destination


address.

Viren Sir ([email protected])(8928135013) Page 76


11000000.10101000.01000000.00110000 (destination IP address)
AND
11111111.11111111.11111100.00000000 (supernet mask)
Returns
11000000.10101000.01000000.00000000

IP FUNCTIONS:-

1. Addressing: In order to perform the job of delivering datagrams, IP must know


where to deliver them to. For this reason, IP includes a mechanism for host
addressing. Furthermore, since IP operates over internetworks, its system is
designed to allow unique addressing of devices across arbitrarily large networks. It
also contains a structure to facilitate the routing of datagrams to distant networks if
that is required.

2. Data Encapsulation and Formatting/Packaging: IP accepts data from the


transport layer protocols UDP and TCP. It then encapsulates this data into an IP
datagram using a special format prior to transmission.

3. Fragmentation and Reassembly: IP datagrams are passed down to the data


link layer for transmission on the local network. However, the maximum frame
size of each physical/data-link network using IP may be different. For this reason,
IP includes the ability to fragment IP datagrams into pieces so they can each be
carried on the local network. The receiving device uses the reassembly function to
recreate the whole IP datagram again.

4. Routing / Indirect Delivery: When an IP datagram must be sent to a destination


on the same local network, this can be done easily using the network's underlying
LAN/WLAN/WAN protocol using what is sometimes called direct delivery.
However, in many (if not most cases) the final destination is on a distant network
not directly attached to the source. In this situation the datagram must be delivered
indirectly. This is accomplished by routing the datagram through intermediate
devices

Viren Sir ([email protected])(8928135013) Page 77


IPv4 vs IPv6

Viren Sir ([email protected])(8928135013) Page 78


CONNECTION ORIENTED AND CONNECTIONLESS SERVICES.
Connection-oriented
Communication includes the steps of setting up a call from one computer to
another, transmitting/receiving data, and then releasing the call, just like a voice
phone call. However, the network connecting the computers is a packet switched
network, unlike the phone system's circuit switched network. Connection-oriented
communication is done in one of two ways over a packet switched network: with
and without virtual circuits. Connection oriented service is more reliable than
connectionless service. We can send the message in connection oriented service if
there is an error at the receivers end. Example of connection oriented is TCP
(Transmission Control Protocol) protocol.
Connectionless
Communication is just packet switching where no call establishment and
release occur. A message is broken into packets, and each packet is transferred
separately. Moreover, the packets can travel different route to the destination since
there is no connection. Connectionless service is typically provided by the UDP
(User Datagram Protocol. The packets transferred using UDP are also called
datagrams.

Difference between connection oriented and connectionless services:


1. In connection oriented service authentication is needed while connectionless
service does not need any authentication.
2. Connection oriented protocol makes a connection and checks (confirms delivery
of message) whether message is received or not and sends again if an error occurs
connectionless service protocol does not guarantees a delivery.
3. Connection oriented service is more reliable than connectionless service.
4. Connection oriented service interface is stream based and connectionless is
message based.

Viren Sir ([email protected])(8928135013) Page 79


PROTOCALS;- - Protocol is set of rules and conventions. Sender and receiver in
data communication must agree on common set of rules before they can
communicate with each other. Protocol defines.
a) Syntax (what is to be communicated)
b) Semantics (how is it to be communicated
c) Timing (When it should be communicated)

Connection Oriented: - 1) TCP 2) SLIP 3) PPP 4) SMTP

Connectionless protocols: 1) IP 2) ICMP 3) UDP

1. TCP:-
Following are some of the services offered by TCP to the process at the
application layer:
a) Stream delivery service
b) Sending and receiving buffers
c) Bytes and segments

Viren Sir ([email protected])(8928135013) Page 80


d) Full duplex service
e) Connection oriented service
f) Reliable service.
g) Process to process communication
a. Stream delivery service:
TCP is a stream oriented protocol. It allows the sending process to
deliver data as a stream of bytes and the receiving process to obtain as a
stream of bytes. TCP creates a working environment in such a way that the
sending and receiving processes seem to be connected by an imaginary
―tube‖ This is called as stream delivery service.
b. Sending and receiving buffers:
The sending and receiving process may not produce and receive data
at the same speed. Hence TCP needs buffers for storage. There are two types
of buffers used in each direction:
1) Sending buffer
2) Receiving buffer.
A buffer can be implemented by using a circular array of 1 byte
locations as shown .The movement of data in one direction on the sending
side the buffer has these types of locations:
1. Empty Locations
2. Location containing the bytes which have been sent but not
acknowledgement. These bytes are kept in the buffer till an
acknowledgement is received.
3. The locations containing the bytes to be sent by the sending TCP.

c. Bytes and segments:

 Buffering is used to handle the difference between the speed of data


transmission and data consumption.
 But only buffering is not enough.
 We need one more step before sending the data.
 The IP layer, as a service provider for TCP, need to send data in the
form of packets and as a stream of bytes.
 At the transport layer, TCP groups a number of bytes together into a
packet called a segment.

Viren Sir ([email protected])(8928135013) Page 81


 A header is added to each segment for the purpose of exercising
control. The segments are encapsulated in an IP datagram and then
transmitted.
 The entire operation is transparent to the receiving process.
 The segments may be receiver out of order, lost or corrupted when it
reaches the receiving end.

d. Full duplex service:

 TCP offers full duplex service where the data can flow in both the
direction simultaneously.
 Each TCP will then have a sending buffer and receiving buffer.
 The TCP segments are sent both the directions.

e. Connection oriented service:

TCP is a connection oriented protocol. When process –I wants to


communicate (send and receive) with another process (process-2), the
sequence of operations is as follows:

 TCP of process -1 informs TCP of process -2 and gets its approval.


 TCP of process -1 and TCP of process -2 exchange data in both the
directions.
 After completing the data exchange, when buffers on both sides are
empty, the two TCPs destroy their buffers.
1. The type of connection in TCP is not physical, it is virtual. The
TCP segment is encapsulated in an IP datagram and can be sent out
of order.
2. These segments can get lost or corrupted and have to be resent.
3. Each segment may take a different path to reach the destination.

f. Reliable services:

TCP is a reliable transport protocol. It uses an acknowledgment


mechanism for checking the safe and sound arrival of data.

Viren Sir ([email protected])(8928135013) Page 82


g. Process to process communication:

 The TCP user port numbers a transport layer addresses.


 Show some well-known port number used by TCP.
 Note that if an application can use both UDP and TCP, the
same port number is assigned to this application.
2. FTP

FTP is a stranded mechanism provided by the Internet for copying a file


from one host to the other.
1. Some of the problem in transferring files from one system to the other are
as follows:
 Two systems may use different file name conventions.
 Two systems may represent text data in different types.
1. The directory structure of the two systems may be different.
2. FTP provides a simple solution to all these problems.
3. The basic model of FTP is shown
4. FTP established two connections between the client and server. One is for
data transfer and the other is for the control information.
5. The fact that FTP separates control and data makes it very efficient.
6. The control connection uses simple rules of communication. Only one line
of command or a line of response is transferred at a time.
7. But the data connection uses more complex rules due to the variety of data
types being transferred.
8. FTP uses port 21 for the control connection and port 20 for the data
connection.
9. As shown in the figure client has three components namely:
i. User interface

ii. Control process and

iii. Data transfer process.


10.The Server has two components: the control process and data transfer
process.

Viren Sir ([email protected])(8928135013) Page 83


11.The control connection is maintained during the entire interactive FTP
session. The data connection is first opened, file is transferred and data
connection is closed. This is closed. This is done for transferring each file.

 This connection is created in the same way as the other application programs
CONTROL CONNECTION:

described earlier.
 Control connection remains alive during the entire process.
 The IP uses minimize delay type services because this is an interactive
connection between a user and server.

DATA CONNECTION:

 Data connection uses the port 20 at the site. This connection is opened when
data to be transferred is ready and it is closed when transfer of data is over.
 The service types used by IP is maximize throughput.

Viren Sir ([email protected])(8928135013) Page 84


3. TELNET
TELNET is abbreviation for Terminal Network. It is standard TCP/IP
protocol for virtual terminal services proposed by ISO. TELNET enables
establishment of connection to a remote system in such a way that a local
terminal appears to be terminal at remote system. TELNET is general
purpose client server application program.

Local Login

When user log in to local time sharing system it is called local login.
The keystrokes accepted by terminal driver. Terminal driver passes the
character to the operating system. Operating system, in tern interprets the
combination of character and invokes the desired application or utility.

Remote login

When user wants to access the application or utility located at the


remote machine, he or she performs remote login. Here the telnet client and
server program come into use. The user sends the keystrokes to local
operating system. Local operating system accept is, but do not interpret
them. The characters are sending to TELNET client. TELNET client
transform the character to a universal character set called Network Virtual
Terminal Character and deliver them to the local TCP/IP stack.

The command/text in NVT form travel through internet, and arrive at


TCP/IP stack of remote Machine. Here the characters are delivered to the
operating system and Passed to the TELNET server. Which changes the
characters to the understandable characters by the remote computer?
However characters could not directly pass to the operating system because
remote operating system is not designed to receive characters from TELNET
server. The solution is to add piece of software called Pseudo- terminal
driver, which pretends that characters are coming from terminal. The
operating system passes the characters to appropriate application program.

Viren Sir ([email protected])(8928135013) Page 85


4. IP
 IP is internet Protocol.
 It is unreliable protocol because it does not provide any error control
and flow control.
 Packets in IP are called ―Datagram‖
 Datagram is variable length packet with two parts –header and data

 It is internet control message protocol.


5. ICMP

Viren Sir ([email protected])(8928135013) Page 86


 It reports error and sends control messages.
 Error reporting messages include – destination unreachable, source
quench , time exceed, parameter problem , redirection etc.
 Query message includes –echo request and reply, time stamp request
and reply, router solicitation and advertisement. etc

 UDP is user datagram protocol.


6. UDP

 It is connectionless protocol because data is sent without establishing


a connection between sender and receiver before sending the data.
 UDP is unreliable because data is delivered without
acknowledgement.
 UDP does not perform Auto retransmission.
 UDP does not use flow control .
 UDP has high transmission speed.
7. SLIP
 SLIP is serial line internet protocol
 SLIP does not perform error detection and correction.
 SLIP does not provide any authentication.
 SLIP is not approved internet standard.
 SLIP supports only Internet protocol (IP)
 SLIP supports static IP address assignment
8. PPP
 PPP is point to point protocol.
 PPP perform error detection
 PPP provides authentication and security.
 PPP is approved internet standard.
 PPP supports IP and other protocols.
 PPP supports Dynamic IP address assignment

Viren Sir ([email protected])(8928135013) Page 87


 Networking H/W demands that a datagram contain the physical address
9. ARP:(Address resolution protocol)

of the intended recipient.


 If problem Address Resolution protocol (ARP) was developed.
 ARP takes the IP address of a host as input & gives its corresponding
physical address as the output.
 As if doesn’t know who must be having address if sends the broadcast
message to all the computer on the network.
 The computer whose IP address matches the broadcast IP address sends a
reply and along with if, its physical address to the broadcasting computer.
 All other computers lignose the broadcast message as IP address is
different now, when it is responding whose IP address gets match is
aware of the sender.
 So it doesn’t require sending broadcast message.

 As it knows sender hardware as well as IP address that the reason it


uncast the reply so that senders only receive it.

Viren Sir ([email protected])(8928135013) Page 88


 ARP is used for solving the problem of finding out which Ethernet
10.RARP: (Reverse Address Resolution protocol)

address corresponding to a given IP address.


 But sometimes we have to solve a reverse problem. That means we have
to obtain the IP address corresponding to the given Ethernet address.
 Such a problem can occur when booting a diskless workstation.
 The problem of obtaining the IP address when an Ethernet address is
given, can be solved by using RARP(Reverse Address Resolution
protocol)
 The newly booted workstation is allowed to broadcast its Ethernet
address. The RARP server looks at this request. Then it looks up the
Ethernet address in its configuration files and sends back the
corresponding IP address.
 Using RARP is actually better than embedding an IP address in the
memory image because it allows the same image to be used on all
machines.
 If the IP address were buried inside the image, each workstation would
need its own image.
 The disadvantage of RARP is that it uses a destination address of all
ls(limited broadcasting) to reach the RARP server.
 But such broadcasts are not forwarded by routers, so a RARP server is
needed on each network.

Viren Sir ([email protected])(8928135013) Page 89


11.BOOTP:
The Bootstrap Protocol (BOOTP) is a computer networking protocol
used in Internet Protocol networks to automatically assign an IP address to
network devices from a configuration server. The BOOTP was originally
defined in RFC 951. When a computer that is connected to a network is
powered up and boots its operating system, the system software broadcasts
BOOTP messages onto the network to request an IP address assignment. A
BOOTP configuration server assigns an IP address based on the request
from a pool of addresses configured by an administrator. BOOTP is
implemented using the User Datagram Protocol (UDP) as transport protocol,
port number 67 is used by the server to receive client requests and port
number 68 is used by the client to receive server responses. BOOTP operates
only on IPv4networks.

 It is Simple Mail transfer Protocol.


12.SMTP

 It is connection oriented text based protocol in which sender


communicates with receiver using a command and supplying data
over reliable TCP connection.
 SMTP is standard application layer protocol for delivery of email over
TCP/IP network.
 SMTP establish a TCP connection between Sender And port number
25 of receiver.
 It is limited in its ability to queue messages at the receiving end, it is
usually used with one of two other protocols, POP3 or IMAP, that let
the user save messages in a server mailbox and download them
periodically from the server

Viren Sir ([email protected])(8928135013) Page 90


Compare OSI reference model and TCP/IP network Mode.

Viren Sir ([email protected])(8928135013) Page 91


Viren Sir ([email protected])(8928135013) Page 92

You might also like