1 - CN Unit-1
1 - CN Unit-1
Credits – 03
Unit -1: Introduction Hours
Network Topologies, WAN, LAN, MAN. OSI Reference Model, TCP/IP Reference
Model, Multiplexing (Frequency Division, Wavelength Division, Synchronous
08
Time Division and Statistical Time Division Multiplexing Techniques), Switching
Techniques (Circuit-switching, Datagram, Virtual Circuit Networks).
Page 1
Unit -1: Introduction
Network Topologies, WAN, LAN, MAN. OSI Reference Model, TCP/IP Reference
Model, Multiplexing (Frequency Division, Wavelength Division, Synchronous Time
Division and Statistical Time Division Multiplexing Techniques), Switching Techniques
(Circuit-switching, Datagram, Virtual Circuit Networks).
1) Bus Topology
o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message
over the network. All the stations available in the network will receive the
message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and
802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other
topologies.The backbone cable is considered as a "single lane"
through which the message is broadcast to all the stations.
o The most common access method of the bus topologies is CSMA
(Carrier Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so that data
integrity is maintained, i.e., the packets do not get lost. There are two alternative
ways of handling the problems that occur when two nodes send the messages
simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to
detect the collision. Once the collision is detected, the sender will stop
Page 2
o transmitting the data. Therefore, it works on "recovery after the
collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used
to avoid the collision by checking whether the transmission media is busy
or not. If busy, then the sender waits until the media becomes idle. This
technique effectively reduces the possibility of the collision. It does not
work on "recovery after the collision".
Advantages of Bus topology:
o Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is
low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-
based networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the
installation and troubleshooting techniques are well known, and hardware
components are easily available.
o Limited failure: A failure in one node will not have any effect on other
nodes.
Disadvantages of Bus topology:
o Extensive cabling: A bus topology is quite simpler, but still it requires a
lot of cabling.
o Difficult troubleshooting: It requires specialized test equipment to
determine the cable faults. If any fault occurs in the cable, then it would
disrupt the communication for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then
the signals of both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow
down the network.Attenuation: Attenuation is a loss of signal leads to
communication issues. Repeaters are used to regenerate the signal.
2) Ring Topology
Page 6
o Full Mesh Topology: In a full mesh topology, each computer is
connected to all the computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain
computers are connected to those computers with which they
communicate frequently.
Advantages of Mesh topology:
Reliable: The mesh topology networks are very reliable as if any link breakdown
will not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the
communication between other devices.
Disadvantages of Mesh topology
o Cost: A mesh topology contains a large number of connected devices
such as a router and more transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to
maintain and manage. If the network is not monitored carefully, then the
communication link failuregoes undetected.
o Efficiency: In this topology, redundant connections are high that reduces
the efficiency of the network.
6) Hybrid Topology
Page 7
functioning of the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new
devices without affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a
way that the strength of the network is maximized and weakness of the
network is minimized.
Disadvantages of Hybrid topology
o Complex design: The major drawback of the Hybridtopology is
the design of the Hybrid network. It is very difficult to design the
architecture of the Hybrid network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as
these hubs are different from usual Hubs used in other topologies.
o Costly infrastructure: The infrastructure cost is very high as a hybrid
network requires a lot of cabling, network devices, etc.
What is a Computer Network?
A Computer Network is a group of two or more interconnected computer
systems that use common connection protocols for sharing various resources and
files. You can establish a computer network connection using either cable or
wireless media. Every network involves hardware and software thatconnects
computers and tools.
Different Types of Computer Networks
There are various types of Computer Networking options available. The
classification of network in computers can be done according to their size as
well as their purpose.
The size of a network should be expressed by the geographic area and number of
computers, which are a part of their networks. It includes devices housed in a single
room to millions of devices spread across the world. Following are the popular types
of Computer Network:
Types of Computer Networks
Some of the most popular computer network types are:
Page 8
It is mostly personal devices network equipped within a limited area.
Allows you to handle the interconnection of IT devices at the surrounding
of a single user.
PAN includes mobile devices, tablet, and laptop.
It can be wirelessly connected to the internet called WPAN.
Appliances use for PAN: cordless mice, keyboards, and
Bluetooth systems.
Advantages of PAN
Here are the important pros/benefits of PAN network:
PAN networks are relatively secure and safe
It offers only short-range solution up to ten meters
Strictly restricted to a small areaDisadvantages of PAN
Here are the cons/drawbacks of using PAN network:
It may establish a bad connection to other networks at the same radio
bands.
Distance limits.
What is a LAN (Local Area Network)?
A Local Area Network (LAN) is a group of computer and peripheral devices
which are connected in a limited area such as school, laboratory, home, and
office building. It is a widely useful network for sharing resources like files,
printers, games, and other application. The simplest type of LAN network is to
connect computers and a printer in someone‘s home or office. In general, LAN will
be used as one type of transmission medium. It is a network which consists of
less than 5000 interconnected devices across several buildings.
Local Area Network (LAN)
Characteristics of LAN
Here are the important characteristics of a LAN network:
Advantages of LAN
Here are the pros/benefits of LAN:
Computer resources like hard-disks, DVD-ROM, and printers can share
local area networks. This significantly reduces the cost of hardware
purchases.
You can use the same software over the network instead of purchasing the
licensed software for each client in the network.
Data of all network users can be stored on a single hard disk of the
server computer.
Page 9
You can easily transfer data and messages over networkedcomputers.
It will be easy to manage data at only one place, which makes data more
secure.
Local Area Network offers the facility to share a single internet
connection among all the LAN users.
Disadvantages of LAN
Here are the cons/drawbacks of LAN:
LAN will indeed save cost because of shared computer resources, but the
initial cost of installing Local Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it
does not offer good privacy.
Unauthorized users can access critical data of an organization in case LAN
admin is not able to secure centralized data repository.
Local Area Network requires a constant LAN administration as there are
issues related to software setup and hardware failures
What is WAN (Wide Area Network)?
WAN (Wide Area Network) is another important computer network that which is
spread across a large geographical area. WAN network system could be a
connection of a LAN which connects with other LAN‘s using telephone lines and
radio waves. It is mostly limited to an enterprise or an organization.
Wide Area Network (WAN)
Characteristics of WAN
Page 13
Network Layers Diagram
Let‘s Study each layer in detail:
Physical Layer
The physical layer helps you to define the electrical and physical specifications
of the data connection. This level establishes the relationship between a device
and a physical transmission medium. The physical layer is not concerned with
protocols or other such higher-layer items.
Examples of hardware in the physical layer are network adapters, ethernet,
repeaters, networking hubs, etc.
Data Link Layer:
Data link layer corrects errors which can occur at the physical layer. The
layer allows you to define the protocol to establish and terminates a connection
between two connected network devices. It is IP address understandable layer,
which helps you to define logical addressing so that any endpoint should be
identified.
The layer also helps you implement routing of packets through a network. It
helps you to define the best path, which allows you to take data from the source
to the destination.
The data link layer is subdivided into two types of sublayers:
1. Media Access Control (MAC) layer- It is responsible for controlling how
device in a network gain access to medium and permits to transmit data.
2. Logical link control layer- This layer is responsible for identity and
encapsulating network-layer protocols and allows you to find the error.
Important Functions of Datalink Layer:
Framing which divides the data from Network layer into frames.
Allows you to add header to the frame to define the physical address of
the source and the destination machine
Adds Logical addresses of the sender and receivers
It is also responsible for the sourcing process to the
destination process delivery of the entire message.
It also offers a system for error control in which it detects retransmits
damage or lost frames.
Datalink layer also provides a mechanism to transmit data over
independent networks which are linked together.
Transport Layer:
The transport layer builds on the network layer to provide data transport from a
process on a source machine to a process on a destination machine. It is hosted
using single or multiple networks, and also maintains the quality of service
functions.
It determines how much data should be sent where and at what rate. This layer
builds on the message which are received from the application layer. It helps
ensure that data units are delivered error-free and in sequence.
Transport layer helps you to control the reliability of a link through flow control,
error control, and segmentation or desegmentation.
The transport layer also offers an acknowledgment of the successful data
transmission and sends the next data in case no errors occurred. TCP is the best-
known example of the transport layer.
Important functions of Transport Layers:
It divides the message received from the session layer into segments and
numbers them to make a sequence.
Page 14
Transport layer makes sure that the message is delivered to the correct
process on the destination machine.
It also makes sure that the entire message arrives without any error else it
should be retransmitted.
Network Layer:
The network layer provides the functional and procedural means of transferring
variable length data sequences from one node to another connected in ―different
networks‖.
Message delivery at the network layer does not give any guaranteed to be reliable
network layer protocol.
Layer-management protocols that belong to the network layer are:
1. routing protocols
2. multicast group managementnetwork-layer address assignment.
Session Layer
Session Layer controls the dialogues between computers. It helps you to establish
starting and terminating the connections between the local and remote
application.
This layer request for a logical connection which should be established on end
user‘s requirement. This layer handles all the important log-on or password
validation.
Session layer offers services like dialog discipline, which can be duplex or half-
duplex. It is mostly implemented in application environments that use remote
procedure calls.
Important function of Session Layer:
It establishes, maintains, and ends a session.
Session layer enables two systems to enter into a dialog
It also allows a process to add a checkpoint to steam of data.
Presentation Layer
Presentation layer allows you to define the form in which the data is to exchange
between the two communicating entities. It also helps you to handles data
compression and data encryption.
This layer transforms data into the form which is accepted by the application. It
also formats and encrypts data which should be sent across all the networks. This
layer is also known as a syntax layer.
The function of Presentation Layers:
Character code translation from ASCII to EBCDIC.
Data compression: Allows to reduce the number of bits that needs to be
transmitted on the network.
Data encryption: Helps you to encrypt data for security purposes — for
example, password encryption.
It provides a user interface and support for services like email and file
transfer.
Application Layer
Application layer interacts with an application program, which is the highest
level of OSI model. The application layer is the OSI layer, which is closest to the
end-user. It means OSI application layer allows users to interact with other
software application.
Application layer interacts with software applications to implement a
communicating component. The interpretation of data by the application program
is always outside the scope of the OSI model.
Page 15
Example of the application layer is an application such as file transfer, email,
remote login, etc.The function of the Application Layers are:
Application-layer helps you to identify communication partners,
determining resource availability, and synchronizing communication.
It allows users to log on to a remote host
This layer provides various e-mail services
This application offers distributed database sources and access for global
information about various objects and services.
Interaction Between OSI Model Layers
Information sent from a one computer application to another needs to pass
through each of the OSI layers.
This is explained in the below-given example:
Every layer within an OSI model communicates with the other two layers
which are below it and its peer layer in some another networked
computing system.
In the below-given diagram, you can see that the data link layer of the first
system communicates with two layers, the network layer and the physical
layer of the system. It also helps you to communicate with the data link
layer of, the second system.
Page 16
Differences between OSI & TCP/IP
Here, are some important differences between the OSI & TCP/IP model:
Layer 2 Data Link To organize bits into frames. To provide RAPA, PPP,
hop-to-hop delivery Frame Relay,
ATM,
Fiber Cable,
etc.
Page 18
Layer 1 Physical To transmit bits over a medium. RS232,
To provide 100BaseTX,
mechanical and electrical ISDN, 11.
specifications
Page 20
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.
Demerits of TCP/IP
1. In this, the transport layer does not guarantee delivery of packets.
2. The model cannot be used in any other application.
3. Replacing protocol is not easy.
4. It has not clearly separated its services, interfaces and protocols.
It is an analog method.
Frequency Division Multiplexing is a method that divides the
available bandwidth of a single transmission medium into several
channels.
Modulation methods are used to convert the input signals into
frequency bands, which are then merged by a multiplexer to produce a
composite signal.
The primary goal of FDM is to divide available bandwidth into
multiple frequency channels and assign them to various devices.
The modulation process divides the input signals into frequency
bands, which are subsequently merged to produce a composite
signal.
Sub-carriers are the carriers that are utilised to modulate the signals.
They are denoted as f1,f2,…fn.
Guard bands divide the channels. A guard band is a frequency
that neither channel uses.
Applications of FDM
FDM is widely used in television networks.
It‘s utilised in FM and AM radio broadcasts. Each FM radio station
broadcasts at a distinct frequency, which is multiplexed to produce a
composite signal. The multiplexed signal is broadcast over the air.
Advantages of FDM:
For analogue signals, FDM is utilised.
The FDM modulation technique is relatively basic and
straightforward.
An FDM may send a large number of signals at the same time.
It does not need any sort of synchronisation between the transmitter
and the recipient.
Disadvantages of FDM:
When low-speed channels are required, the FDM method is employed.
It has an issue of crosstalk.
This is necessary to use a large number of modulators.
It needs a channel with a high bandwidth.
Page 22
Wavelength Division Multiplexing is similar to Frequency Division
Multiplexing except for the fact that optical signals are delivered over
fibre optic cable.
WDM is a technique used in fibre optics to enhance the capacity of
a single fibre.
It is utilised to take advantage of the high data rate capabilities
of fibre optic cable.
It is a technique for analogue multiplexing.
With the aid of a multiplexer, optical signals from several sources are
merged to produce a broader spectrum of light.
The signals are separated at the receiving end by a
demultiplexer before being sent to their respective destinations.
A prism can be used to do multiplexing and demultiplexing.
Prism can function as a multiplexer by mixing several optical signals to
produce a composite signal, which is then sent through a fibre optical
connection.
Prism also does a reverse process, which is signal
demultiplexing.
Dense wavelength division multiplexing merges a large number of
channels (30, 40, 50, or more) onto a single fibre. DWDM channels have
a very high capacity that is constantly improving.
Only a few wavelengths are combined using coarse wavelength
division multiplexing. This has more widely spread channels and is a
less expensive variant of DWDM.
Page 23
It is a digital method.
In the case of Frequency Division Multiplexing, all signals operate at the
same time but at various frequencies, whereas in the case of Time
Division Multiplexing, all signals operate at the same frequency but at
different times.
The total time available in the channel is divided among multiple users
using the Time Division Multiplexing method. As a result, each user is
assigned a unique time interval known as a Time slot during which data is
to be delivered by the sender.
For a set period of time, a user assumes control of the channel.
Data is not sent concurrently in the Time Division
Multiplexing method, but rather one at a time.
The signal is sent in the form of frames in TDM. Frames include a cycle of
time slots, with one or more slots allotted to each user in each frame.
It can multiplex both digital and analogue signals, although it is most
commonly used to multiplex digital signals.
Page 24
Asynchrono
us TDM is sometimes referred to as Statistical TDM.
This is a method in which time slots are not fixed, as in Synchronous
TDM. Only those devices with data to send are assigned time slots. As a
result, we may claim that an Asynchronous Time Division multiplexer
only sends data from active workstations.
The time slots are dynamically assigned to the devices using an
asynchronous TDM method.
The overall speed of the input lines in asynchronous TDM might be
more than the channel capacity.
Asynchronous Time Division multiplexor takes incoming data
streams and generates a frame with no empty slots.
Each slot in Asynchronous TDM has an address part that identifies
the data source.
The distinction between Asynchronous TDM and Synchronous TDM is
that many slots in Synchronous TDM go unused, whereas slots in
Asynchronous TDM are completely used. This results in shorter
transmission times and more efficient channel usage.
If there are n transmitting devices in Synchronous TDM, there are n
time slots. If there are n transmitting devices in Asynchronous TDM,
there are m time slots where m is less than n (mn).
The number of slots in a frame is determined by a statistical examination
of the number of input lines.
Advantages of Asynchronous TDM:
There is the effective utilization of transmission capacity in this
multiplexing.
Disadvantages:
Frames of varying sizes are used in this Multiplexing.
Because there are no distinct slots allotted to each user, the buffer address
information is also required.
This method does not guarantee a certain waiting time.
4. Code Division Multiplexing (CDM):
Code Division Multiplexing allows several data signals to be delivered
over a single frequency.
FDM divides the frequency into smaller channels, but CDM allows
users to use the entire bandwidth and broadcast signals at all times using
a unique code. To disseminate signals, CDM employs orthogonal
coding.
Each station is given a unique code, known as a chip.Signals move
independently with these codes over the whole bandwidth. The chip-code
signal that the receiver must receive is known in advance.
Page 25
Statistical Time Division Multiplexing (STDM, StatMUX) What Does
Statistical Time Division Multiplexing (STDM, StatMUX) Mean?
Statistical time-division multiplexing (STDM) is a form of
communication link sharing, which is almost identical to dynamic
bandwidth allocation (DBA).
In STDM, a communication channel is split into a random range of variable bit-
rate data streams or digital channels. The link sharing is tailored for the
instantaneous traffic requirements of the data streams which are transmitted over
every channel.
STDM is same as TDM, with the exception that every signal is assigned a slot
based on priority and demand. This indicates that STDM is an "on-demand"
service as opposed to a fixed one.
Standard TDM and various other circuit switchings are executed at the physical
layer in the OSI and TCP/IP model, while STDM is executed at the data link
layer and above.Scenarios of statistical time-division multiplexing are:
The MPEG transport stream used for digital TV transmission. STDM is used
to permit multiple data, audio and video streams of different data rates to be
broadcasted across a bandwidth- limited channel.
The TCP and UDP protocols, in which data streams from various
application processes are multiplexed together.
The Frame relay packet-switching and X.25 protocols, in which the
packets have different lengths.
The Asynchronous Transfer Mode packet-switched protocol, in which the
packets maintain a fixed length.
Difference between Synchronous TDM and Statistical TDM
1. Synchronous TDM :
Synchronous time division multiplexing (STDM), every device which is present
in this has given the same time slot to transmit data. This does not consider
whether the device contains data or not. The devices place their data on the link
when their time slots arrive, when any device does not contain data its time-slot
remains empty. There are various kinds of time slots that are organized into
frames and each frame consist of one or more time slots dedicated to each
sending device.
2. Statistical TDM :
Statistical time division multiplexing (STDM) is technique for transmitting
several types of data at the same time across a single transmission cable or
line. It is often used for managing data being transmitted via a local area
network (LAN) or a wide area network (WAN). In this situations, the data is
often transmitted at the same time from any number of input devices attached
to the network, including computers, printers, or fax machines. It can also be
used in telephone switchboard settings to manage the simultaneous calls going
to or coming from multiple, internal telephone lines.
Page 26
Difference between Synchronous TDM and Statistical TDM :
S.No. Synchronous TDM Statistical TDM
1. The data flow of each input The slots are allotted dynamically.
connection is divided into Input line is
units and each input control one given slots in output frame only
output time slot. if it has data to send.
2. In this, number of slots in each In this, number of slots in each
frame are equal to frame are less than
number of input lines. the number of input lines.
3. The maximum bandwidth The volume of link is normally is
utilization is done when all less than the sum of the volume
inputs have data to send. of each
channel.
Page 27
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The
switching technique will decide the best route for data transmission.
Switching technique is used to connect the systems for making one-to-one
communication.
Classification Of Switching Techniques
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated
path between sender and receiver.
o In the Circuit Switching Technique, once the connection is established
then the dedicated path will remain to exist until the connection is
terminated.
o Circuit switching in a network operates in a similar way as the
telephone works.
o A complete end-to-end path must exist before the
communication takes place.
o In case of circuit switching technique, when any user wantsto send the
data, voice, video, a request signal is sent to the receiver then the receiver
sends back the acknowledgment to ensure the availability of the dedicated
path. After receiving the acknowledgment, dedicated path transfers the
data.
o Circuit switching is used in public telephone network. It is used for
voice transmission.
o Fixed data can be transferred at a time in circuit switching technology.
Communication through circuit switching has 3 phases:
o Circuit establishment
o Data transfer
o Circuit Disconnect
Page 28
Circuit Switching can use either of the two technologies: Space Division
Switches:
o Space Division Switching is a circuit switching technology in which a
single transmission path is accomplished in a switch by using a
physically separate set of crosspoints.
o Space Division Switching can be achieved by using crossbar switch. A
crossbar switch is a metallic crosspoint or semiconductor gate that can be
enabled or disabled by a control unit.
o The Crossbar switch is made by using the semiconductor. For
example, Xilinx crossbar switch using FPGAs.
o Space Division Switching has high speed, high capacity, and
nonblocking switches.
Space Division Switches can be categorized in two ways:
o Crossbar Switch
o Multistage Switch
Crossbar Switch
The Crossbar switch is a switch that has n input lines and n output lines. The
crossbar switch has n2 intersection points known as crosspoints.
Disadvantage of Crossbar switch:
The number of crosspoints increases as the number of stations is increased.
Therefore, it becomes very expensive for a large switch.The solution to this is to
use a multistage switch.
Multistage Switch
o Multistage Switch is made by splitting the crossbar switch into the
smaller units and then interconnecting them.
o It reduces the number of crosspoints.
o If one path fails, then there will be an availability of another path.
Advantages Of Circuit Switching:
o In the case of Circuit Switching technique, the
communication channel is dedicated.
o It has fixed bandwidth.
Disadvantages Of Circuit Switching:
o Once the dedicated path is established, the only delay occurs in
the speed of data transmission.
o It takes a long time to establish a connection approx 10 seconds
during which no data can be transmitted.
o It is more expensive than other switching techniques as a dedicated
path is required for each connection.
o It is inefficient to use because once the path is established and no data is
transferred, then the capacity of the path is wasted.
o In this case, the connection is dedicated therefore no other data can be
transferred even if the channel is free.
Message Switching
Page 29
o Message Switching is a switching technique in which a message is
transferred as a complete unit and routed through intermediate
nodes at which it is stored and forwarded.
o In Message Switching technique, there is no establishment of a
dedicated path between the sender and receiver.
o The destination address is appended to the message. Message Switching
provides a dynamic routing as the message is routed through the
intermediate nodes based on the information available in the message.
o Message switches are programmed in such a way so that they can
provide the most efficient routes.
o Each and every node stores the entire message and then forward it to the
next node. This type of network is known as store and forward
network.
o Message switching treats each message as an independent entity.
Page 30
acknowledgment message will be sent.
Page 31
Approaches Of Packet Switching:
There are two approaches to Packet Switching: Datagram
Packet switching:
o It is a packet switching technology in which packet is known as a
datagram, is considered as an independent entity. Each packet contains
the information about the destination and switch uses this information to
forward the packet to the correct destination.
o The packets are reassembled at the receiving end in correct order.
o In Datagram Packet Switching technique, the path is not fixed.
o Intermediate nodes take the routing decisions to forward the packets.
o Datagram Packet Switching is also known as connectionless switching.
Virtual Circuit Switching
o Virtual Circuit Switching is also known as connection- oriented
switching.
o In the case of Virtual circuit switching, a preplanned route is
established before the messages are sent.
o Call request and call accept packets are used to establish the
connection between sender and receiver.
o In this case, the path is fixed for the duration of a logical connection.
Let's understand the concept of virtual circuit switching through a diagram:
o In the above diagram, A and B are the sender and receiver respectively.
1 and 2 are the nodes.
o Call request and call accept packets are used to establish a connection
between the sender and receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the
receiver that the message has been received.
o If the user wants to terminate the connection, a clear signal is sent for the
Page 32
termination.
Differences b/w Datagram approach and Virtual Circuit approach
Datagram approach Virtual Circuit approach
Node takes routing decisions Node does not take any routing
to forward the decision.
packets.
Congestion cannot occur as all Congestion can occur when the node is
the packets travel in busy, and it does not allow
different directions. other packets to pass through.
It is more flexible as all the It is not very flexible.
packets are treated as an
independent entity.
Advantages Of Packet Switching:
o Cost-effective: In packet switching technique, switching devices do not
require massive secondary storage to store the packets, so cost is
minimized to some extent. Therefore, we can say that the packet
switching technique is a cost- effective technique.
o Reliable: If any node is busy, then the packets can be rerouted. This
ensures that the Packet Switching technique provides reliable
communication.
o Efficient: Packet Switching is an efficient technique. It does not require
any established path prior to the transmission,and many users can use the
same communication channel simultaneously, hence makes use of
available bandwidth very efficiently.
Disadvantages Of Packet Switching:
o Packet Switching technique cannot be implemented in those applications
that require low delay and high-quality services.
o The protocols used in a packet switching technique are very complex and
requires high implementation cost.
o If the network is overloaded or corrupted, then it requires retransmission of lost
packets. It can also lead to the loss of critical information if errors are nor
recovered.
o Difference between Datagram and Virtual Circuit Packet Switching:
Datagram Packet Virtual Circuit Packet Switching
Switching
To forward packets, the node There is no routing decision made by the
makes routing decisions. nodes.
Page 33
Advantages of Packet Switching:
Because packet switching devices do not require huge secondary
storage to hold packets, costs are reduced to some extent. As a
result, we can claim that the packet switching approach is cost-
effective.
If any of the nodes are busy, packets can be redirected. This guarantees
that the Packet Switching method delivers consistent communication.
Packet switching is a time-saving method. It does not require any
established path prior to transmission, and several users can utilise the
same communication channel at the same time, making effective use of
available bandwidth.
Disadvantages of Packet Switching:
Packet Switching cannot be used in applications that need low latency
and high-quality services.
The protocols used in packet-switching are quite complicated and
have a significant implementation cost.
If the network is overcrowded or damaged, lost packets must be
retransmitted. It can also result in the loss of crucial data if
mistakes are not recovered.
Summary
This article covers the concepts of the switching techniques that are used in
computer networking. We looked at the different kinds of message switching
techniques that are in use today, and also at the advantages and disadvantages of
each. We also looked at the two subtypes of Packet Switching, namely
Datagram and Virtual Circuit and also the differences between them.
What is Circuit Switching? Circuit switching is defined asThe switching
technique is a connection-oriented network that is divided into pieces and has
a dedicated path established between the sender and receiver providing a
guaranteed data rate.
Circuit Switching Diagram
Page 35
Datagram Networks
In data communications, we need to send messages from one end system to
another. If the message is going to pass through a packet-switched network, it
needs to be divided into packets of fixed or variable size. The size of the packet
is determined by the network and the governing protocol.
In a datagram network, each packet is treated independently of all others.
Even if a packet is part of a multi packet transmission, the network treats it as
though it existed alone. Packets in this approach are referred to as datagrams.
Datagram switching is normally done at the network layer.
The following figure shows how the datagram approach is used to deliver four
packets from station A to station X. The switches in a datagram network are
traditionally referred to as routers.
In this example, all four packets (or datagrams) belong to the same message, but
may travel different paths to reach their destination. This is so because the links
may be involved in carrying packets from other sources and do not have the
necessary bandwidth available to carry all the packets from A to
X.
Routing Table:
In this type of network, each switch (or packet switch) has a routing table which is
based on the destination address. The routing tables are dynamic and are updated
periodically. The destination addresses and the corresponding forwarding output
ports are recorded in the tables.
Destination Address:
Every packet in a datagram network carries a header that contains, among other
information, the destination address of the packet. When the switch receives the
packet, this destination address is examined; the routing table is consulted to find
the corresponding port through which the packet should be forwarded.
Efficiency:
The efficiency of a datagram network is better than that of a circuit-switched
network. Resources are allocated only when there are packets to be transferred.
If a source sends a packet and there is a delay of a few minutes before another
packet can be sent, the resources can be reallocated during these minutes for
other packets from other sources.
Delay:
There may be greater delay in a datagram network than in a virtual-circuit
network. Although there are no setup and teardown phases, each packet may
experience a wait at a switch before it is forwarded. In addition, since not all
packets in a message necessarily travel through the same switches, the delay is
not uniform for the packets of a message. The following figure gives an example
of delay in a datagram network for one single packet.
Page 36