0% found this document useful (0 votes)
7 views44 pages

Unit 4,5 CN-1

Uploaded by

raviharish296
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views44 pages

Unit 4,5 CN-1

Uploaded by

raviharish296
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

‭UNIT IV ROUTING‬

‭ outing and protocols: Unicast routing - Distance Vector Routing - RIP - Link State‬
R
‭Routing – OSPF– Path-vector routing - BGP - Multicast Routing: DVMRP – PIM‬

‭4.1‬‭Routing‬

‭●‬ A ‭ Router is a process of selecting path along which the data can be transferred from‬
‭source to the destination. Routing is performed by a special device known as a router.‬
‭●‬ ‭A Router works at the network layer in the OSI model and internet layer in‬
‭TCP/IP model‬
‭●‬ ‭A router is a networking device that forwards the packet based on the information‬
‭available in the packet header and forwarding table.‬
‭●‬ ‭The routing algorithms are used for routing the packets. The routing algorithm is‬
‭nothing but a software responsible for deciding the optimal path through which‬
‭packet can be transmitted.‬
‭●‬ ‭The routing protocols use the metric to determine the best path for the packet‬
‭delivery. The metric is the standard of measurement such as hop count, bandwidth,‬
‭delay, current load on the path, etc. used by the routing algorithm to determine the‬
‭optimal path to the destination.‬
‭●‬ ‭The routing algorithm initializes and maintains the routing table for the process‬
‭of path determination.‬

‭The most common metric values are given below:‬

‭●‬ H ‭ op count:‬‭Hop count is defined as a metric that specifies‬‭the number of passes‬


‭through internetworking devices such as a router, a packet must travel in a route to‬
‭move from source to the destination. If the routing protocol considers the hop as a‬
‭primary metric value, then the path with the least hop count will be considered as the‬
‭best path to move from source to the destination.‬
‭●‬ ‭Delay:‬‭It is a time taken by the router to process,‬‭queue and transmit a datagram to‬
‭an interface. The protocols use this metric to determine the delay values for all the‬
‭links along the path end-to-end. The path having the lowest delay value will be‬
‭considered as the best path.‬
‭●‬ ‭Bandwidth:‬‭The capacity of the link is known as a‬‭bandwidth of the link. The‬
‭bandwidth is measured in terms of bits per second. The link that has a higher transfer‬
‭rate like gigabit is preferred over the link that has the lower capacity like 56 kb. The‬
‭protocol will determine the bandwidth capacity for all the links along the path, and‬
‭the overall higher bandwidth will be considered as the best route.‬
‭●‬ ‭Load:‬‭Load refers to the degree to which the network resource such as a router or‬
‭network link is busy. A Load can be calculated in a variety of ways such as CPU‬
‭utilization, packets processed per second. If the traffic increases, then the load value‬
‭will also be increased. The load value changes with respect to the change in the‬
‭traffic.‬
‭●‬ ‭Reliability:‬‭Reliability is a metric factor may be‬‭composed of a fixed value. It‬
‭depends on the network links, and its value is measured dynamically. Some‬
‭networks go down more often than others. After network failure, some network‬
‭links repaired more easily than other network links. Any reliability factor can be‬
‭considered for the assignment of reliability ratings, which are generally numeric‬
‭values assigned by the system administrator.‬

‭Types of Routing‬
‭Routing can be classified into three categories:‬

‭ ‬ ‭Static Routing‬

‭●‬ ‭Default Routing‬
‭●‬ ‭Dynamic Routing‬

‭Static Routing‬

‭‬ S
● ‭ tatic Routing is also known as Nonadaptive Routing.‬
‭●‬ ‭It is a technique in which the administrator manually adds the routes in a‬
‭routing table.‬
‭●‬ ‭A Router can send the packets for the destination along the route defined by‬
‭the administrator.‬
‭●‬ ‭In this technique, routing decisions are not made based on the condition or topology‬
‭of the networks‬

‭Advantages Of Static Routing‬

‭Following are the advantages of Static Routing:‬

‭●‬ N ‭ o Overhead:‬‭It has ho overhead on the CPU usage of‬‭the router. Therefore, the‬
‭cheaper router can be used to obtain static routing.‬
‭●‬ ‭Bandwidth:‬‭It has not bandwidth usage between the‬‭routers.‬
‭●‬ ‭Security:‬‭It provides security as the system administrator‬‭is allowed only to‬
‭have control over the routing to a particular network.‬

‭Disadvantages of Static Routing:‬

‭Following are the disadvantages of Static Routing:‬

‭●‬ F ‭ or a large network, it becomes a very difficult task to add each route manually to‬
‭the routing table.‬
‭●‬ ‭The system administrator should have a good knowledge of a topology as he has‬
‭to add each route manually.‬

‭Default Routing‬

‭●‬ D ‭ efault Routing is a technique in which a router is configured to send all the‬
‭packets to the same hop device, and it doesn't matter whether it belongs to a‬
‭particular network or not. A Packet is transmitted to the device for which it is‬
‭configured in default routing.‬
‭●‬ ‭Default Routing is used when networks deal with the single exit point.‬
‭●‬ ‭It is also useful when the bulk of transmission networks have to transmit the data‬
‭to the same hp device.‬
‭●‬ ‭When a specific route is mentioned in the routing table, the router will choose the‬
‭specific route rather than the default route. The default route is chosen only when‬
‭a specific route is not mentioned in the routing table.‬

‭Dynamic Routing‬

‭ ‬ I‭ t is also known as Adaptive Routing.‬



‭●‬ ‭It is a technique in which a router adds a new route in the routing table for each‬
‭packet in response to the changes in the condition or topology of the network.‬
‭●‬ ‭Dynamic protocols are used to discover the new routes to reach the destination.‬
‭●‬ ‭In Dynamic Routing, RIP and OSPF are the protocols used to discover the new routes.‬
‭●‬ ‭If any route goes down, then the automatic adjustment will be made to reach‬
‭the destination.‬
‭The Dynamic protocol should have the following features:‬

‭●‬ A ‭ ll the routers must have the same dynamic routing protocol in order to exchange‬
‭the routes.‬
‭●‬ ‭If the router discovers any change in the condition or topology, then router broadcast‬
‭this information to all other routers.‬

‭Advantages of Dynamic Routing:‬

‭ ‬ I‭ t is easier to configure.‬

‭●‬ ‭It is more effective in selecting the best route in response to the changes in the‬
‭condition or topology.‬

‭Disadvantages of Dynamic Routing:‬

‭ ‬ I‭ t is more expensive in terms of CPU and bandwidth usage.‬



‭●‬ ‭It is less secure as compared to default and static routing.‬

‭4.2‬‭Unicast routing‬

‭ nicast –‬‭Unicast means the transmission from a single‬‭sender to a single receiver. It is a‬


U
‭point-to-point communication between sender and receiver. There are various unicast‬
‭protocols such as TCP, HTTP, etc.‬

‭●‬ T ‭ CP is the most commonly used unicast protocol. It is a connection-oriented protocol‬


‭that relies on acknowledgement from the receiver side.‬
‭●‬ ‭HTTP stands for HyperText Transfer Protocol. It is an object-oriented protocol for‬
‭communication.‬

‭There are three major protocols for unicast routing:‬

1‭ .‬ D ‭ istance Vector Routing‬


‭2.‬ ‭Link State Routing‬
‭3.‬ ‭Path-Vector Routing‬

‭4.2.1‬‭Distance Vector Routing‬

‭ istance vector routing algorithm is also called as‬‭Bellman-Ford algorithm‬‭or‬‭Ford‬


D
‭Fulkerson algorithm‬‭as this algorithm is used to find‬‭the shortest route from one node‬
‭to another node in the network.‬

‭ he routing protocol is used to calculate the best route from source to destination based on‬
T
‭the distance or hops as its primary metric to define an optimal path. The distance vector‬
‭refers to the distance to the neighbor nodes, where routing defines the routes to the‬
‭established node.‬

‭ he‬‭Distance Vector routing algorithm‬‭(DVR) shares‬‭the information of the routing table‬


T
‭with the other routers in the network and keeps the information up-to-date to select an‬
‭optimal path from source to destination.‬

‭The Bellman-Ford algorithm is defined as :‬


‭ here,‬‭dx(y)=dx(y)= The least distance from x to y‬
w
‭c(x,v)=c(x,v)= Node x's cost from each of its neighbour v‬
‭dv(y)=dv(y)= Distance to each node from initial node‬
‭minv=minv= selecting shortest distance‬

‭It works in the following steps-‬

‭Step-01:‬
‭Each router prepares its routing table. By their local knowledge. each router knows about-‬

‭‬ A
● ‭ ll the routers present in the network‬
‭●‬ ‭Distance to its neighboring routers‬

‭ tep-02:‬
S
‭Each router exchanges its distance vector with its neighboring routers.‬
‭●‬ ‭Each router prepares a new routing table using the distance vectors it has‬
‭obtained from its neighbors.‬
‭●‬ ‭This step is repeated for (n-2) times if there are n routers in the network.‬
‭●‬ ‭After this, routing tables converge / become stable.‬

‭Example − Distance Vector Router Protocol‬

I‭ n the network shown below, there are three routers, A, B, and C, with the following weights‬
‭− AB =2, BC =3 and CA =5.‬

‭ tep‬‭1‬‭−‬‭In‬‭this‬‭DVR‬‭network,‬‭each‬‭router‬‭shares‬‭its‬‭routing‬‭table‬‭with‬‭every‬‭neighbor.‬‭For‬
S
‭example,‬‭A‬‭will‬‭share‬‭its‬‭routing‬‭table‬‭with‬‭neighbors‬‭B‬‭and‬‭C‬‭and‬‭neighbors‬‭B‬‭and‬‭C‬‭will‬
‭share their routing table with A.‬

‭ orm A‬
F ‭ ‬
A ‭ ‬
B ‭ ‬
C
‭A‬ ‭0‬ ‭2‬ ‭3‬
‭B‬
‭C‬

‭ orm B‬
F ‭A‬ ‭B‬ ‭C‬
‭A‬
‭B‬ ‭2‬ ‭0‬ ‭1‬
‭C‬
‭ orm C‬
F ‭A‬ ‭B‬ ‭C‬
‭A‬
‭B‬
‭C‬ ‭3‬ ‭1‬ ‭0‬
‭ tep‬‭2‬‭−‬‭If‬‭the‬‭path‬‭via‬‭a‬‭neighbor‬‭has‬‭a‬‭lower‬‭cost,‬‭then‬‭the‬‭router‬‭updates‬‭its‬‭local‬‭table‬
S
‭to‬‭forward‬‭packets‬‭to‬‭the‬‭neighbor.‬‭In‬‭this‬‭table,‬‭the‬‭router‬‭updates‬‭the‬‭lower‬‭cost‬‭for‬‭A‬‭and‬
‭C by updating the new weight from 4 to 3 in router A and from 4 to 3 in router C.‬

‭ orm A‬
F ‭ ‬
A ‭ ‬
B ‭ ‬
C
‭A‬ ‭0‬ ‭2‬ ‭3‬
‭B‬
‭C‬

‭ orm B‬
F ‭A‬ ‭B‬ ‭C‬
‭A‬
‭B‬ ‭2‬ ‭0‬ ‭1‬
‭C‬

‭ orm C‬
F ‭A‬ ‭B‬ ‭C‬
‭A‬
‭B‬
‭C‬ ‭3‬ ‭1‬ ‭0‬

‭ tep 3‬‭− The final updated routing table with lower‬‭cost distance vector routing protocol for‬
S
‭all routers A, B, and C is given below –‬

‭Router A‬
‭Form A‬ ‭A‬ ‭B‬ ‭C‬

‭A‬ ‭0‬ ‭2‬ ‭3‬

‭B‬ ‭2‬ ‭0‬ ‭1‬

‭C‬ ‭3‬ ‭1‬ ‭0‬

‭Router B‬
‭Form B‬ ‭A‬ ‭B‬ ‭C‬

‭A‬ ‭0‬ ‭2‬ ‭3‬

‭B‬ ‭2‬ ‭0‬ ‭1‬

‭C‬ ‭3‬ ‭1‬ ‭0‬


‭Router C‬
‭Form C‬ ‭A‬ ‭B‬ ‭C‬

‭A‬ ‭0‬ ‭2‬ ‭3‬

‭B‬ ‭2‬ ‭0‬ ‭1‬

‭C‬ ‭3‬ ‭1‬ ‭0‬

‭RIP Protocol‬

‭ IP stands for Routing Information Protocol. RIP is an intra-domain routing protocol used‬
R
‭within an autonomous system. Here, intra-domain means routing the packets in a defined‬
‭domain, for example, web browsing within an institutional area. To understand the RIP‬
‭protocol, our main focus is to know the structure of the packet, how many fields it contains,‬
‭and how these fields determine the routing table.‬

‭Before understanding the structure of the packet, we first look at the following points:‬

‭●‬ R ‭ IP‬‭is‬‭based‬‭on‬‭the‬‭distance‬‭vector-based‬‭strategy,‬‭so‬‭we‬‭consider‬‭the‬‭entire‬‭structure‬
‭as a graph where nodes are the routers, and the links are the networks.‬
‭●‬ ‭In‬ ‭a‬ ‭routing‬ ‭table,‬ ‭the‬ ‭first‬ ‭column‬ ‭is‬ ‭the‬ ‭destination,‬ ‭or‬ ‭we‬ ‭can‬ ‭say‬ ‭that‬ ‭it‬ ‭is‬ ‭a‬
‭network address.‬
‭●‬ ‭The‬ ‭cost‬ ‭metric‬ ‭is‬ ‭the‬ ‭number‬ ‭of‬ ‭hops‬ ‭to‬ ‭reach‬ ‭the‬ ‭destination.‬ ‭The‬ ‭number‬ ‭of‬
‭hops‬ ‭available‬ ‭in‬ ‭a‬ ‭network‬ ‭would‬ ‭be‬ ‭the‬ ‭cost.‬ ‭The‬ ‭hop‬ ‭count‬ ‭is‬ ‭the‬ ‭number‬ ‭of‬
‭networks required to reach the destination.‬
‭●‬ ‭In RIP, infinity is defined as 16, which means that the RIP is useful for smaller‬
‭networks or small autonomous systems. The maximum number of hops that RIP‬
‭can contain is 15 hops, i.e., it should not have more than 15 hops as 16 is infinity.‬
‭●‬ ‭The next column contains the address of the router to which the packet is to be sent‬
‭to reach the destination.‬

‭How is hop count determined?‬

‭When the router sends the packet to the network segment, then it is counted as a single hop.‬

I‭ n the above figure, when the router 1 forwards the packet to the router 2 then it will count as‬
‭1 hop count. Similarly, when the router 2 forwards the packet to the router 3 then it will count‬
a‭ s 2 hop count, and when the router 3 forwards the packet to router 4, it will count as 3 hop‬
‭count. In the same way,‬‭RIP‬‭can support maximum upto‬‭15 hops, which means that the 16‬
‭routers can be configured in a RIP.‬

‭RIP Message Format‬

‭ ow, we look at the structure of the RIP message format. The message format is used to‬
N
‭share information among different routers. The RIP contains the following fields in a‬
‭message:‬

‭●‬ C ‭ ommand: It is an 8-bit field that is used for request or reply. The value of the request‬
‭is 1, and the value of the reply is 2.‬
‭●‬ ‭Version: Here, version means that which version of the protocol we are using.‬
‭Suppose we are using the protocol of version1, then we put the 1 in this field.‬
‭●‬ ‭Reserved: This is a reserved field, so it is filled with zeroes.‬
‭●‬ ‭Family: It is a 16-bit field. As we are using the TCP/IP family, so we put 2 value in‬
‭this field.‬
‭●‬ ‭Network Address: It is defined as 14 bytes field. If we use the IPv4 version, then‬
‭we use 4 bytes, and the other 10 bytes are all zeroes.‬
‭●‬ ‭Distance: The distance field specifies the hop count, i.e., the number of hops used‬
‭to reach the destination.‬

‭4.2.2‬‭Link State Routing‬

‭ ink‬‭state‬‭routing‬‭has‬‭a‬‭different‬‭philosophy‬‭from‬‭that‬‭of‬‭distance‬‭vector‬‭routing.‬‭In‬‭link‬‭state‬
L
‭routing,‬ ‭if‬ ‭each‬ ‭node‬ ‭in‬ ‭the‬ ‭domain‬ ‭has‬ ‭the‬ ‭entire‬‭topology‬‭of‬‭the‬‭domain‬‭the‬‭list‬‭of‬‭nodes‬
‭and‬‭links,‬‭how‬‭they‬‭are‬‭connected‬‭including‬‭the‬‭type,‬‭cost‬‭(metric),‬‭and‬‭condition‬‭of‬‭the‬‭links‬
‭(up or down)-the node can use Dijkstra's algorithm to build a routing table.‬
‭ he figure shows a simple domain with five nodes. Each node uses the same topology to‬
T
‭create a routing table, but the routing table for each node is unique because the calculations‬
‭are based on different interpretations of the topology. This is analogous to a city map. While‬
‭each person may have the same map, each needs to take a different route to reach her specific‬
‭destination‬

‭Building Routing Tables:‬

I‭ n link state routing,‬‭four sets of actions are required‬‭to ensure that each node has the‬
‭routing table showing the least-cost node to every other node.‬

‭a)‬‭Creation of the states of the links by each node, called the link state packet (LSP).‬

b‭ )‬ ‭Dissemination of LSPs to every other router, called‬‭flooding,‬‭in an efficient and‬


‭reliable way.‬

‭c)‬ ‭Formation of a shortest path tree for each node.‬

‭d)Calculation of a routing table based on the shortest path‬

‭tree.‬‭Types of Links‬

I‭ n OSPF terminology, a connection is called a‬‭link.‬‭Four types of links have been defined:‬
‭point-to-point, transient, stub, and virtual.‬
I‭ n OSPF terminology, a connection is called a‬‭link.‬‭Four types of links have been defined:‬
‭point-to-point, transient, stub, and virtual.‬

‭Open Shortest Path First (OSPF)‬

‭●‬‭OSPF is a link state routing protocol.‬

‭ ‬‭Following is the features of the OSPF.‬



‭1.‬‭OSPF supports multiple circuit load balancing..‬
‭2.‬‭OSPF can converge very quickly to network topology change.‬
‭3.‬‭OSPF support multiple metrics.‬
‭4.‬‭OSPF support for variable length sub netting.‬

‭ ‬‭OSPF uses four types of routers.‬



‭1.‬ ‭An internal router is a router with allits links connected to the networks within the‬
‭same area.‬
‭2.‬‭An area border router is a router that has its links connected to more than one area.‬
‭3.‬‭A backbone router is a router that has its links connected to the backbone.‬
‭4.‬ ‭An Autonomous System Boundary Router (ASBR) is a router that has its links‬
‭connected to another autonomous system.‬

‭ ‬‭As shown in the Fig. routers R1, R2 andR7 are internal routers. Routers R3, R6,‬

‭R8are area border routers. Routers R3, R4, R5, R6, R8are backbone routers. Router R4 is‬
‭an ASBR‬

‭●‬‭The header format for OSPF is shown in the Fig.‬


‭ ‬‭OSPF header analysis is given below :‬

‭1.‬‭Version: This field specifies the protocol version.‬
‭2.‬‭Type: This field indicates messages as one of the following type.‬

a‭ . Hello b. Database description‬


‭c. Link status d. Link status update e. Link status acknowledgement.‬

3‭ .‬‭Packet length: This field specifies the length of OSPF packet in bytes,‬
‭4.‬‭Router ID: It identifies the sending router.‬

5‭ .‬‭Area ID: Network ID of destination networks.‬


‭6.‬‭Checksum: The checksum field is used to detect errors in the packet.‬
‭7.‬‭Authentication type: It identifies the authentication type that is used.‬
‭8.‬‭Authentication: This field includes a value from the authentication type.‬
‭OSPF Advantages‬
‭1.Low traffic overhead.‬
‭2.‬‭Fast convergence.‬
‭3.‬‭Larger network metrics.‬
‭4.‬‭Area based topology.‬
‭5.‬‭Route summaries.‬
‭6.‬‭Support for complex address structures.‬
‭7.‬‭Authentication.‬
‭ SPF Disadvantages‬
O
‭1.‬‭Memory overhead.‬
‭2.‬‭Processor overhead.‬
‭3.‬‭Configuration OSPF can be complex to configure.‬
‭4.‬‭Path Vector Routing‬

‭ istance‬ ‭vector‬ ‭and‬ ‭link‬ ‭state‬ ‭routing‬ ‭are‬ ‭both‬ ‭intradomain‬ ‭routing‬ ‭protocols.‬ ‭They‬‭can‬‭be‬
D
‭used‬ ‭inside‬ ‭an‬ ‭autonomous‬ ‭system,‬ ‭but‬ ‭not‬ ‭between‬ ‭autonomous‬ ‭systems.‬ ‭These‬ ‭two‬
‭protocols‬‭are‬‭not‬‭suitable‬‭for‬‭interdomain‬‭routing‬‭mostly‬‭because‬‭of‬‭scalability.‬‭Both‬‭of‬‭these‬
‭routing‬‭protocols‬‭become‬‭intractable‬‭when‬‭the‬‭domain‬‭of‬‭operation‬‭becomes‬‭large.‬‭Distance‬
‭vector‬ ‭routing‬ ‭is‬ ‭subject‬ ‭to‬ ‭instability‬ ‭if‬ ‭there‬ ‭are‬ ‭more‬ ‭than‬ ‭a‬ ‭few‬ ‭hops‬ ‭in‬ ‭the‬ ‭domain‬ ‭of‬
‭operation.‬
‭ ink‬‭state‬‭routing‬‭needs‬‭a‬‭huge‬‭amount‬‭of‬‭resources‬‭to‬‭calculate‬‭routing‬‭tables.‬‭It‬‭also‬‭creates‬
L
‭heavy‬‭traffic‬‭because‬‭of‬‭flooding.‬‭There‬‭is‬‭a‬‭need‬‭for‬‭a‬‭third‬‭routing‬‭protocol‬‭which‬‭we‬‭call‬
‭path vector routing.‬

‭ ath‬‭Vector‬‭Routing‬‭is‬‭a‬‭routing‬‭algorithm‬‭in‬‭unicast‬‭routing‬‭protocol‬‭of‬‭network‬‭layer,‬‭and‬‭it‬
P
‭is‬ ‭useful‬ ‭for‬ ‭interdomain‬ ‭routing.‬ ‭The‬ ‭principle‬ ‭of‬ ‭path‬ ‭vector‬ ‭routing‬ ‭is‬ ‭similar‬ ‭to‬ ‭that‬ ‭of‬
‭distance‬‭vector‬‭routing.‬‭It‬‭assumes‬‭that‬‭there‬‭is‬‭one‬‭node‬‭in‬‭each‬‭autonomous‬‭system‬‭that‬‭acts‬
‭on‬ ‭behalf‬ ‭of‬ ‭the‬ ‭entire‬ ‭autonomous‬ ‭system‬ ‭is‬ ‭called‬ ‭Speaker‬ ‭node‬ ‭.‬ ‭It‬‭is‬‭different‬‭from‬‭the‬
‭distance‬ ‭vector‬ ‭routing‬ ‭and‬ ‭link‬ ‭state‬ ‭routing.‬ ‭Each‬ ‭entry‬ ‭in‬ ‭the‬ ‭routing‬ ‭table‬ ‭contains‬ ‭the‬
‭destination network, the next router and the path to reach the destination.‬

‭ unctions‬
F
‭Prevention Of Loop‬

‭Policy Routing‬

‭Optimum Path‬

‭BGP‬

‭ order Gateway Protocol (BGP) is used to Exchange routing information for the internet,‬
B
‭used to route traffic from one autonomous system (AS) to another.‬
‭ ifferent Types of Autonomous Systems?‬
D
‭Since the BGP helps in routing between different autonomous systems, it is important to‬
‭learn about different types of autonomous systems:‬

‭1.‬‭Stub AS:‬

‭‬
● ‭ here is only one connection to another AS in the Stub AS.‬
T
‭●‬ ‭Data traffic cannot pass through a stub autonomous system.‬
‭●‬ ‭The traffic can move within an autonomous system.‬
‭●‬ ‭A stub is either a source or a sink‬

‭2.‬‭Multi-Homed AS:‬

‭ ‬ I‭ t has more than one connection to other Autonomous Systems.‬



‭●‬ ‭Still, it is still one source or sink for data traffic.‬
‭●‬ ‭There is no transient traffic.‬
‭3.‬‭Transit AS:‬

‭ ‬ I‭ t is a multi-homed autonomous system that allows transit traffic.‬



‭●‬ ‭For example, ISP (Internet Backbone) is a transit AS.‬

‭BGP performs three functional procedures‬

1‭ . Neighbour acquisition 2. Neighbour reachability 3. Network reachability.‬


‭Neighbour acquisition procedures used for exchanging the routing information between two‬
‭routers in different Autonomous System (AS).‬

‭ GP‬‭connections‬‭inside‬‭an‬‭autonomous‬‭system‬‭are‬‭called‬‭internal‬‭BGP‬‭(iBGP)‬‭and‬‭BGP‬
B
‭connections‬‭between‬‭different‬‭autonomous‬‭systems‬‭are‬‭called‬‭external‬‭BGP(eBGP).‬‭Fig.‬
‭shows the internal and external BGP‬
‭ GP‬ ‭messages‬ ‭:‬ ‭Header‬ ‭of‬ ‭the‬ ‭all‬ ‭BGP‬ ‭messages‬ ‭is‬ ‭fixed‬ ‭size‬ ‭that‬ ‭identifies‬ ‭the‬
B
‭message type. Fig. shows the BGP message header format‬

1‭ .‬‭Marker: Marker field is used for authentication.‬


‭2.‬‭Length: This field indicates the total length of the message.‬
‭3.‬‭Type: Type field indicates type of message. BGP defines four message type.‬
‭a) OPEN b) UPDATE c) NOTIFICATION d) KEEPALIVE‬
‭Following Fig. 3.11.3 shows the four types of BGP message formats.‬
‭ dvantages of BGP‬
A
‭1.‬‭BGP is a very robust and scalable routing protocol.‬
‭2.‬‭BGP easily solves the count-to-infinity problem.‬

‭ isadvantages of BGP‬
D
‭1.‬‭BGP is complex.‬
‭2.‬‭BGP routes to destination networks, rather than to specific hosts or routers.‬
‭Multicast Routing: DVMRP – PIM‬
‭ ulticast‬‭is a method of group communication where‬‭the sender sends data to multiple‬
M
‭receivers or nodes present in the network simultaneously. Multicasting is a type of one-to-‬
‭many and many-to-many communication as it allows sender or senders to send data‬
‭packets to multiple receivers at once across LANs or WANs. This process helps in‬
‭minimizing the data frame of the network‬

‭There are different‬‭Multicast Routing Protocols‬‭used‬‭for multicst routing‬

‭‬
● ‭ istance Vector Multicast Routing Protocol (DVMRP)‬
D
‭●‬ ‭Multicast Source Discovery Protocol (MSDP)‬
‭●‬ ‭MOSPF (Multicast OSPF)‬
‭●‬ ‭Multicast BGP‬
‭●‬ ‭Protocol Independent Multicast (PIM)‬

‭Distance Vector Multicast Routing Protocol (DVMRP):‬


‭A‬‭distance-vector routing (DVR)‬‭protocol requires‬‭that a router inform its neighbors of‬
‭topology changes periodically.‬

1‭ .‬ A ‭ router transmits its distance vector to each of its neighbors in a routing packet.‬
‭2.‬ ‭Each router receives and saves the most recently received distance vector from‬
‭each of its neighbors.‬
‭3.‬ ‭A router recalculates its distance vector when:‬
‭o‬ ‭It receives a distance vector from a neighbor containing different‬
‭information than before.‬
‭o‬ ‭It discovers that a link to a neighbor has gone down.‬
‭ he DV calculation is based on minimizing the cost to each destination‬
T
‭Dx(y) = Estimate of least cost from x to y‬
‭C(x,v) = Node x knows cost to each neighbor v‬
‭Dx = [Dx(y): y‬‭∈‬‭N ] = Node x maintains distance vector‬
‭Node x also maintains its neighbors' distance vectors‬
‭– For each neighbor v, x maintains Dv = [Dv(y): y‬‭∈‬‭N ]‬
‭Example –‬‭Consider 3-routers X, Y and Z as shown in‬‭figure. Each router have their routing table.‬
‭Every routing table will contain distance to the destination nodes.‬

‭ onsider‬‭router‬‭X‬‭,‬‭X‬‭will‬‭share‬‭it‬‭routing‬‭table‬‭to‬‭neighbors‬‭and‬‭neighbors‬‭will‬‭share‬
C
‭it‬ ‭routing‬ ‭table‬ ‭to‬ ‭it‬ ‭to‬ ‭X‬ ‭and‬ ‭distance‬ ‭from‬ ‭node‬ ‭X‬ ‭to‬‭destination‬‭will‬‭be‬‭calculated‬
‭using bellmen- ford equation.‬

‭Dx(y) = min { C(x,v) + Dv(y)} for each node y‬‭∈‬‭N‬

‭ s we can see that distance will be less going from X to Z when Y is intermediate node(hop)‬
A
‭so it will be update in routing table X.‬
‭Similarly for Z also –‬

‭Finally the routing table for all –‬

‭Advantages of Distance Vector routing –‬

‭●‬ ‭It is simpler to configure and maintain than link state routing.‬
‭Disadvantages of Distance Vector routing –‬

‭ ‬ I‭ t is slower to converge than link state.‬


o
‭o‬ ‭It is at risk from the count-to-infinity problem.‬

‭PIM‬

‭ IM (Protocol Independent Multicast)‬‭is a multicast‬‭routing protocol, that is used to send‬


P
‭traffic from a single source to multiple destinations across a network.‬

‭ IM is a collection of three protocols - PIM Sparse Mode, PIM Dense Mode and PIM Bi-‬
P
‭directional . PIM is termed protocol-independent because PIM does not include its own‬
‭topology discovery mechanism, but instead uses routing information supplied by other‬
‭routing protocols‬

‭PIM Sparse Mode‬

‭ IM‬‭Sparse‬‭Mode‬‭(PIM-SM)‬‭is‬‭a‬‭multicast‬‭routing‬‭protocol‬‭designed‬‭on‬‭the‬‭assumption‬‭that‬
P
‭recipients‬ ‭for‬ ‭any‬ ‭particular‬ ‭multicast‬ ‭group‬ ‭will‬ ‭be‬ ‭sparsely‬ ‭distributed‬ ‭throughout‬ ‭the‬
‭network.‬ ‭In‬ ‭other‬ ‭words,‬ ‭it‬ ‭is‬ ‭assumed‬ ‭that‬ ‭most‬ ‭subnets‬ ‭in‬ ‭the‬ ‭network‬ ‭will‬ ‭not‬‭want‬‭any‬
‭given‬ ‭multicast‬ ‭packet.‬ ‭In‬ ‭order‬ ‭to‬ ‭receive‬ ‭multicast‬ ‭data,‬ ‭routers‬ ‭must‬ ‭explicitly‬ ‭tell‬ ‭their‬
‭upstream‬ ‭neighbors‬ ‭about‬ ‭their‬ ‭interest‬ ‭in‬ ‭particular‬ ‭groups‬ ‭and‬ ‭sources.‬ ‭Routers‬ ‭use‬ ‭PIM‬
‭Join and Prune messages to join and leave multicast distribution trees.‬

‭PIM Dense Mode‬

‭ IM‬ ‭Dense‬ ‭Mode‬ ‭(PIM-DM)‬ ‭is‬ ‭a‬ ‭multicast‬ ‭routing‬ ‭protocol‬ ‭designed‬ ‭with‬ ‭the‬ ‭opposite‬
P
‭assumption‬ ‭to‬ ‭PIM-SM,‬ ‭namely‬ ‭that‬ ‭the‬ ‭receivers‬ ‭for‬ ‭any‬ ‭multicast‬ ‭group‬ ‭are‬ ‭distributed‬
‭densely‬‭throughout‬‭the‬‭network.‬‭That‬‭is,‬‭it‬‭is‬‭assumed‬‭that‬‭most‬‭(or‬‭at‬‭least‬‭many)‬‭subnets‬‭in‬
‭the‬‭network‬‭will‬‭want‬‭any‬‭given‬‭multicast‬‭packet.‬‭Multicast‬‭data‬‭is‬‭initially‬‭sent‬‭to‬‭all‬‭hosts‬
‭in‬‭the‬‭network.‬‭Routers‬‭that‬‭do‬‭not‬‭have‬‭any‬‭interested‬‭hosts‬‭then‬‭send‬‭PIM‬‭Prune‬‭messages‬
‭to remove themselves from the tree.‬

‭Bi-directional PIM‬

‭ i-directional‬ ‭PIM‬‭(BIDIR-PIM)‬‭is‬‭a‬‭third‬‭PIM‬‭protocol,‬‭based‬‭on‬‭PIM-SM.‬‭The‬‭main‬‭way‬
B
‭BIDIR-PIM‬‭differs‬‭from‬‭PIM-SM‬‭is‬‭in‬‭the‬‭method‬‭used‬‭to‬‭send‬‭data‬‭from‬‭a‬‭source‬‭to‬‭the‬‭RP.‬
‭Whereas‬‭in‬‭PIM-SM‬‭data‬‭is‬‭sent‬‭using‬‭either‬‭encapsulation‬‭or‬‭a‬‭source-based‬‭tree,‬‭in‬‭BIDIR-‬
‭PIM‬ ‭the‬ ‭data‬ ‭flows‬ ‭to‬ ‭the‬ ‭RP‬ ‭along‬ ‭the‬ ‭shared‬ ‭tree,‬ ‭which‬ ‭is‬ ‭bi-directional‬ ‭-‬‭data‬‭flows‬‭in‬
‭both directions along any given branch.‬
‭ NIT V DATA LINK AND PHYSICAL LAYERS‬
U
‭Data Link Layer – Framing – Flow control – Error control – Data-Link Layer Protocols –‬
‭HDLC –PPP - Media Access Control – Ethernet Basics – CSMA/CD – Virtual LAN –‬
‭Wireless LAN (802.11)- Physical Layer: Data and Signals - Performance – Transmission‬
‭media- Switching – Circuit‬

‭5.1‬‭Data Link Layer‬

‭​‬ ‭In‬‭the‬‭OSI‬‭model,‬‭the‬‭data‬‭link‬‭layer‬‭is‬‭a‬‭4‭t‬h‬ ‭layer‬‭from‬‭the‬‭top‬‭and‬‭2‭n‬ d‬ ‭layer‬‭from‬‭the‬


‭bottom.‬
‭​‬ ‭The‬ ‭communication‬ ‭channel‬ ‭that‬‭connects‬‭the‬‭adjacent‬‭nodes‬‭is‬‭known‬‭as‬‭links,‬‭and‬
‭in‬ ‭order‬ ‭to‬ ‭move‬ ‭the‬ ‭datagram‬ ‭from‬‭source‬‭to‬‭the‬‭destination,‬‭the‬‭datagram‬‭must‬‭be‬
‭ oved across an individual link.‬
m
‭​‬ ‭Data‬ ‭link‬ ‭layer‬ ‭is‬ ‭responsible‬ ‭for‬ ‭converting‬ ‭data‬ ‭stream‬ ‭to‬‭signals‬‭bit‬‭by‬‭bit‬‭and‬‭to‬
s‭ end‬‭that‬‭over‬‭the‬‭underlying‬‭hardware.‬‭At‬‭the‬‭receiving‬‭end,‬‭Data‬‭link‬‭layer‬‭picks‬‭up‬
‭data‬ ‭from‬ ‭hardware‬ ‭which‬ ‭are‬ ‭in‬ ‭the‬ ‭form‬ ‭of‬‭electrical‬‭signals,‬‭assembles‬‭them‬‭in‬‭a‬
‭recognizable frame format, and hands over to upper layer.‬

‭Data link layer has two sub-layers:‬

‭​‬ ‭Logical Link Control:‬‭It deals with protocols, flow-control, and error control‬
‭​‬ ‭Media Access Control:‬‭It deals with actual control of media‬

‭Following services are provided by the Data Link Layer:‬

‭​‬ ‭Framing‬

‭​‬ ‭Addressing‬

‭​‬ ‭Error Control‬

‭​‬ ‭Flow Control‬


‭5.2‬‭Framing‬
‭ raming‬ ‭is‬ ‭a‬ ‭point-to-point‬ ‭connection‬ ‭between‬ ‭two‬ ‭computers‬ ‭or‬ ‭devices‬ ‭consisting‬ ‭of‬ ‭a‬
F
‭wire‬‭in‬‭which‬‭data‬‭is‬‭transmitted‬‭as‬‭a‬‭stream‬‭of‬‭bits.‬‭However,‬‭these‬‭bits‬‭must‬‭be‬‭framed‬‭into‬
‭discernible blocks of information.‬
‭Framing‬‭is‬‭a‬‭function‬‭of‬‭the‬‭data‬‭link‬‭layer.‬‭It‬‭provides‬‭a‬‭way‬‭for‬‭a‬‭sender‬‭to‬‭transmit‬‭a‬‭set‬‭of‬
b‭ its‬‭that‬‭are‬‭meaningful‬‭to‬‭the‬‭receiver.‬‭Frames‬‭have‬‭headers‬‭that‬‭contain‬‭information‬‭such‬‭as‬
‭error-checking codes.‬
‭ t‬‭the‬‭data‬‭link‬‭layer,‬‭it‬‭extracts‬‭the‬‭message‬‭from‬‭the‬‭sender‬‭and‬‭provides‬‭it‬‭to‬‭the‬‭receiver‬
A
‭by providing the sender’s and receiver’s addresses.‬
‭ he‬‭process‬‭of‬‭dividing‬‭the‬‭data‬‭into‬‭frames‬‭and‬‭reassembling‬‭it‬‭is‬‭transparent‬‭to‬‭the‬‭user‬‭and‬
T
‭is handled by the data link layer.‬
‭ raming‬ ‭is‬ ‭an‬ ‭important‬ ‭aspect‬ ‭of‬ ‭data‬ ‭link‬ ‭layer‬ ‭protocol‬ ‭design‬ ‭because‬ ‭it‬ ‭allows‬ ‭the‬
F
‭transmission of data to be organized and controlled.‬

‭A frame has the following parts −‬

‭‬
● ‭ rame Header − It contains the source and the destination addresses of the frame.‬
F
‭●‬ ‭Payload field − It contains the message to be delivered.‬
‭●‬ ‭Trailer − It contains the error detection and error correction bits.‬
‭●‬ ‭Flag − It marks the beginning and end of the frame.‬

‭Types of framing‬

‭There are two types of framing:‬

1‭ .‬ ‭Fixed-size:‬‭The frame is of fixed size and there is‬‭no need to provide boundaries‬
‭to the frame, the length of the frame itself acts as a delimiter.‬

‭ rawback:‬‭It suffers from internal fragmentation if‬‭the data size is less than the‬
D
‭frame size‬

‭Solution:‬‭Padding‬

2‭ .‬ ‭Variable‬ ‭size:‬ ‭The‬ ‭size‬ ‭of‬ ‭the‬ ‭frame‬ ‭is‬ ‭variable‬ ‭during‬ ‭this‬ ‭form‬ ‭of‬ ‭framing.‬ ‭In‬
‭variable-size‬ ‭framing,‬ ‭we‬ ‭are‬ ‭in‬ ‭need‬ ‭of‬ ‭a‬ ‭way‬ ‭to‬ ‭outline‬ ‭the‬ ‭tip‬ ‭of‬ ‭the‬ ‭frame‬‭and‬‭also‬‭the‬
‭starting‬‭of‬‭the‬‭succeeding‬‭frame.‬‭This‬‭can‬‭be‬‭utilized‬‭in‬‭local‬‭area‬‭networks‬‭(LAN).There‬‭are‬
‭2 different methods to define the frame boundaries, such as length field and finish decimeters.‬

2‭ .1‬ ‭Length field‬‭–To confirm the length of the field, a‬‭length field is used. It is‬
‭utilized in Ethernet (1EEE 802.3).‬
2‭ .2‬ ‭End‬ ‭Delimeter‬‭–To‬ ‭confirm‬ ‭the‬ ‭size‬ ‭of‬ ‭the‬ ‭frame,‬ ‭a‬ ‭pattern‬ ‭is‬ ‭worn‬ ‭as‬ ‭a‬ ‭delimiter.‬
‭This‬ ‭methodology‬ ‭is‬ ‭worn‬ ‭in‬ ‭the‬ ‭token‬ ‭ring.‬ ‭In‬‭short,‬‭it‬‭is‬‭referred‬‭to‬‭as‬‭ED.‬‭Two‬‭different‬
‭methods are used to avoid this condition if the pattern happens within the message.‬

‭2.2.1‬‭Bit-Oriented Framing‬

‭ ost‬‭protocols‬‭use‬‭a‬‭special‬‭8-bit‬‭pattern‬‭flag‬‭01111110‬‭as‬‭a‬‭result‬‭of‬‭the‬‭delimiter‬‭to‬
M
‭stipulate‬ ‭the‬ ‭beginning‬ ‭and‬ ‭so‬ ‭the‬ ‭end‬ ‭of‬ ‭the‬‭frame.‬‭Bit‬‭stuffing‬‭is‬‭completed‬‭at‬‭the‬
‭sender end and bit removal at the receiver end.‬

I‭ f we have a tendency to get a zero(0) after 5 1s. we have a tendency to tend to still‬
‭stuff a zero(0). The receiver will remove the zero. Bit stuffing is in addition said as bit‬
‭stuffing.‬

‭2.2.2‬‭Byte-Oriented Framing‬

‭ yte‬‭stuffing‬‭is‬‭one‬‭of‬‭the‬‭methods‬‭of‬‭adding‬‭an‬‭additional‬‭byte‬‭once‬‭there‬‭is‬‭a‬‭flag‬‭or‬
B
‭escape‬ ‭character‬ ‭within‬ ‭the‬ ‭text.‬ ‭Take‬ ‭an‬ ‭illustration‬ ‭of‬ ‭byte‬‭stuffing‬‭as‬‭appeared‬‭in‬
‭the given diagram.‬

‭ he‬ ‭sender‬ ‭sends‬ ‭the‬ ‭frame‬ ‭by‬ ‭adding‬ ‭three‬ ‭additional‬ ‭ESC‬ ‭bits‬ ‭and‬ ‭therefore‬ ‭the‬
T
‭destination‬ ‭machine‬ ‭receives‬ ‭the‬ ‭frame‬ ‭and‬ ‭it‬ ‭removes‬ ‭the‬ ‭extra‬ ‭bits‬ ‭to‬ ‭convert‬ ‭the‬
‭frame into an identical message.‬
‭5.3‬‭Flow Control‬

‭ low control‬‭is a set of procedures that restrict‬‭the amount of data a sender should send‬
F
‭before it waits for some acknowledgment from the receiver.‬

‭​‬ ‭Flow Control is an essential function of the data link layer.‬


‭​‬ ‭It determines the amount of data that a sender can send.‬
‭​‬ ‭It makes the sender wait until an acknowledgment is received from the receiver’s end.‬
‭​‬ ‭Methods of Flow Control are‬‭Stop-and-wait‬‭, and‬‭Sliding‬‭window‬‭.‬

‭Stop-and-wait Protocol‬

‭ top-and-wait protocol‬‭works under the assumption‬‭that the communication channel is‬


S
‭noiseless‬‭and transmissions are‬‭error-free‬‭.‬

‭Working :‬

‭​‬ ‭The sender sends data to the receiver.‬


‭​‬ ‭The sender stops and waits for the acknowledgment.‬
‭​‬ ‭The receiver receives the data and processes it.‬
‭​‬ ‭The receiver sends an acknowledgment for the above data to the sender.‬
‭​‬ ‭ he sender sends data to the receiver after receiving the acknowledgment of‬
T
‭previously sent data.‬
‭​‬ ‭The process is unidirectional and continues until the sender sends the‬‭End‬
‭of Transmission (EoT)‬‭frame.‬
‭Sliding Window Protocol‬

‭ he‬‭sliding‬‭window‬‭protocol‬‭is‬‭the‬‭flow‬‭control‬‭protocol‬‭for‬‭noisy‬‭channels‬‭that‬‭allows‬‭the‬
T
‭sender‬ ‭to‬ ‭send‬ ‭multiple‬ ‭frames‬ ‭even‬ ‭before‬ ‭acknowledgments‬ ‭are‬ ‭received.‬ ‭It‬ ‭is‬ ‭called‬ ‭a‬
‭Sliding‬ ‭window‬ ‭because‬ ‭the‬ ‭sender‬‭slides‬‭its‬‭window‬‭upon‬‭receiving‬‭the‬‭acknowledgments‬
‭for the sent frames.‬

‭Working:‬

‭​‬ ‭ he sender and receiver have a “window” of frames. A window is a space that‬
T
‭consists of multiple bytes. The size of the window on the receiver side is always 1.‬
‭​‬ ‭Each frame is sequentially numbered from 0 to n - 1, where n is the window size‬
‭at the sender side.‬
‭​‬ ‭The sender sends as many frames as would fit in a window.‬
‭​‬ ‭ fter receiving the desired number of frames, the receiver sends an‬
A
‭acknowledgment. The acknowledgment (ACK) includes the number of the next‬
‭expected frame.‬

‭5.4‬‭Error Control‬

‭ rror control in data link layer is the process of detecting and correcting data frames that have‬
E
‭been corrupted or lost during transmission.‬

I‭ n‬ ‭case‬ ‭of‬ ‭lost‬‭or‬‭corrupted‬‭frames,‬‭the‬‭receiver‬‭does‬‭not‬‭receive‬‭the‬‭correct‬‭data-frame‬‭and‬


‭sender‬ ‭is‬ ‭ignorant‬ ‭about‬‭the‬‭loss.‬‭Data‬‭link‬‭layer‬‭follows‬‭a‬‭technique‬‭to‬‭detect‬‭transit‬‭errors‬
‭and‬ ‭take‬ ‭necessary‬ ‭actions,‬ ‭which‬‭is‬‭retransmission‬‭of‬‭frames‬‭whenever‬‭error‬‭is‬‭detected‬‭or‬
‭frame is lost. The process is called Automatic Repeat Request (ARQ).‬

‭The error control mechanism in data link layer involves the following phases −‬

‭​‬ ‭ etection of Error‬‭− Transmission error, if any, is‬‭detected by either the sender or‬
D
‭the receiver.‬
‭​‬ ‭Acknowledgment‬‭− acknowledgment may be positive or‬‭negative.‬
‭o‬ ‭Positive ACK‬‭− On receiving a correct frame, the receiver‬‭sends a positive‬
‭acknowledge.‬
‭o‬ ‭Negative ACK‬‭− On receiving a damaged frame or a duplicate‬‭frame, the‬
‭receiver sends a negative acknowledgment back to the sender.‬
‭​‬ ‭ etransmission‬‭− The sender maintains a clock and‬‭sets a timeout period. If an‬
R
‭acknowledgment of a data-frame previously transmitted does not arrive before the‬
‭timeout, or a negative acknowledgment is received, the sender retransmits the frame.‬

‭Error control technique‬

‭There are three main techniques for error control –‬


‭Stop and Wait ARQ‬

‭This protocol involves the following transitions −‬

‭​‬ ‭A timeout counter is maintained by the sender, which is started when a frame is sent.‬
‭​‬ I‭ f the sender receives acknowledgment of the sent frame within time, the sender is‬
‭confirmed about successful delivery of the frame. It then transmits the next frame‬
‭in queue.‬
‭​‬ ‭If‬‭the‬‭sender‬‭does‬‭not‬‭receive‬‭the‬‭acknowledgment‬‭within‬‭time,‬‭the‬‭sender‬‭assumes‬
‭that‬‭either‬‭the‬‭frame‬‭or‬‭its‬‭acknowledgment‬‭is‬‭lost‬‭in‬‭transit.‬‭It‬‭then‬‭retransmits‬‭the‬
‭frame.‬
‭​‬ ‭If the sender receives a negative acknowledgment, the sender retransmits the frame.‬

‭Go-Back-N ARQ‬

‭The working principle of this protocol is −‬

‭​‬ ‭The sender has buffers called sending window.‬


‭​‬ ‭ he sender sends multiple frames based upon the sending-window size, without‬
T
‭receiving the acknowledgment of the previous ones.‬
‭​‬ ‭The receiver receives frames one by one. It keeps track of incoming frame’s sequence‬
‭number and sends the corresponding acknowledgment frames.‬
‭​‬ ‭After the sender has sent all the frames in window, it checks up to what sequence‬
‭number it has received positive acknowledgment.‬
‭​‬ ‭If the sender has received positive acknowledgment for all the frames, it sends next‬
‭set of frames.‬
‭​‬ ‭If sender receives NACK or has not receive any ACK for a particular frame, it‬
‭retransmits all the frames after which it does not receive any positive ACK‬

‭Selective Repeat ARQ‬

‭​‬ ‭ oth the sender and the receiver have buffers called sending window and receiving‬
B
‭window respectively.‬
‭​‬ ‭The sender sends multiple frames based upon the sending-window size, without‬
‭receiving the acknowledgment of the previous ones.‬
‭​‬ ‭The receiver also receives multiple frames within the receiving window size.‬
‭​‬ ‭ he receiver keeps track of incoming frame’s sequence numbers, buffers the frames in‬
T
‭memory.‬
‭​‬ ‭It sends ACK for all successfully received frames and sends NACK for only frames‬
‭which are missing or damaged.‬
‭​‬ ‭The sender in this case, sends only packet for which NACK is received.‬

‭5.5‬‭Data Link Layer Protocols‬


‭Data‬‭link‬‭layer‬‭protocol‬‭is‬‭generally‬‭responsible‬‭to‬‭simply‬‭ensure‬‭and‬‭confirm‬‭that‬‭the‬‭bits‬
a‭ nd‬ ‭bytes‬ ‭that‬ ‭are‬ ‭received‬ ‭are‬ ‭identical‬ ‭to‬ ‭bits‬ ‭and‬ ‭bytes‬ ‭being‬ ‭transferred.‬ ‭SDLC,‬
‭HDLC, SLIP, PPP, LCP, LAP, and NCP are some of the data link layer protocols.‬

‭SDLC:‬

‭ DLC stands for synchronous data link control protocol, is a communication protocol of a‬
S
‭computer.‬

I‭ t is usually used to carry system network architecture traffic. Synchronous data link protocol‬
‭connects all the remote devices to the mainframe computer at the Central location.‬

‭This‬‭connection‬‭is‬‭done‬‭in‬‭two‬‭formats,‬‭point‬‭to‬‭point‬‭format‬‭i.e.‬‭one‬‭to‬‭one‬‭connection,‬‭and‬
p‭ oint to multipoint format, i.e. one to many connections.‬

‭SDLC support one to many connections even in case of error detection or error recovery.‬

‭SDLC‬‭ensures‬‭that‬‭all‬‭the‬‭received‬‭data‬‭units‬‭are‬‭correct‬‭and‬‭flow‬‭is‬‭right‬‭from‬‭one‬‭network‬
p‭ oint to the next network point.‬

‭HDLC:‬

‭ DLC‬ ‭stands‬ ‭for‬ ‭High-level‬ ‭data‬ ‭link‬ ‭control‬ ‭protocol,‬ ‭is‬ ‭a‬ ‭bit-orientated‬‭code‬‭transparent‬
H
‭synchronous‬ ‭protocol‬ ‭developed‬ ‭by‬ ‭ISO‬ ‭(International‬ ‭organization‬ ‭for‬ ‭standardization)‬
‭in1979.‬

I‭ t‬‭provides‬‭both‬‭connection-orientated‬‭and‬‭connectionless‬‭services.‬‭HDLC‬‭protocol‬‭contains‬
‭various wide-area protocols.‬

‭It‬ ‭is‬ ‭based‬ ‭on‬ ‭the‬ ‭SDLC‬ ‭protocol‬ ‭that‬ ‭supports‬ ‭both‬ ‭point-to-point‬ ‭and‬ ‭multipoint‬
c‭ ommunication.‬

‭ DLC‬‭frames‬‭are‬‭transferred‬‭over‬‭synchronous‬‭or‬‭asynchronous‬‭serial‬‭communication‬‭links.‬
H
‭HDLC‬ ‭uses‬ ‭various‬ ‭modes‬ ‭such‬ ‭as‬ ‭normal‬ ‭response‬ ‭mode,‬ ‭asynchronous‬ ‭response‬ ‭mode,‬
‭asynchronous balanced mode.‬

‭ ormal‬ ‭response‬ ‭mode‬ ‭is‬ ‭used‬ ‭to‬ ‭share‬ ‭the‬ ‭secondary‬ ‭to‬ ‭primary‬ ‭link‬ ‭without‬ ‭contention.‬
N
‭asynchronous‬ ‭response‬ ‭mode‬ ‭is‬ ‭used‬ ‭for‬ ‭full-duplex‬ ‭links.‬ ‭asynchronous‬ ‭balanced‬ ‭mode,‬
‭support combined terminal which can act as both primary and secondary.‬
‭SLIP:‬

‭ LIP‬‭stands‬‭for‬‭Serial‬‭line‬‭interface‬‭protocol‬‭which‬‭is‬‭used‬‭to‬‭add‬‭framing‬‭byte‬‭at‬‭the‬‭end‬‭of‬
S
‭the‬ ‭IP‬ ‭Packet.‬ ‭SLIP‬ ‭is‬ ‭a‬ ‭data‬‭link‬‭layer‬‭protocol‬‭That‬‭transforms‬‭the‬‭IP‬‭packets‬‭among‬‭ISP‬
‭(Internet Service Providers) and home user over dial-up links.‬

‭ LIP‬ ‭is‬ ‭designed‬ ‭to‬ ‭work‬ ‭with‬ ‭ports‬ ‭and‬ ‭router‬ ‭connections.‬ ‭SLIP‬ ‭does‬ ‭not‬ ‭provide‬ ‭error‬
S
‭detection,‬ ‭being‬ ‭reliant‬ ‭on‬ ‭upper-layer‬ ‭protocols‬ ‭for‬ ‭this.‬‭Therefore,‬‭SLIP‬‭on‬‭its‬‭own‬‭is‬‭not‬
‭satisfactory over an error-prone dial-up connection.‬

‭PPP:‬

‭ PP stands for Point to point protocol. PPP is a data link layer protocol that provides the‬
P
‭same services as the Serial line interface protocol.‬

I‭ t‬ ‭is‬ ‭a‬ ‭robust‬ ‭protocol‬ ‭that‬ ‭transfers‬ ‭the‬ ‭other‬ ‭types‬ ‭of‬ ‭pockets‬ ‭also‬ ‭with‬ ‭the‬‭IP‬‭packets.‬‭It‬
‭provides‬‭two‬‭protocols‬‭LCP‬‭and‬‭NCP,‬‭that‬‭we‬‭will‬‭discuss‬‭in‬‭the‬‭next‬‭section.‬‭Point‬‭to‬‭point‬
‭protocol uses framing methods that describe the frames.‬

‭ oint‬ ‭to‬ ‭point‬ ‭protocol‬ ‭is‬ ‭also‬ ‭called‬ ‭character‬ ‭oriented‬ ‭protocol‬ ‭which‬ ‭is‬ ‭used‬ ‭to‬ ‭detect‬
P
‭errors.‬ ‭PPC‬ ‭provides‬ ‭Connection‬ ‭authentication,‬ ‭data‬ ‭compression,‬ ‭encryption,‬ ‭and‬
‭transmission.‬‭It‬‭is‬‭used‬‭over‬‭various‬‭networks‬‭such‬‭as‬‭phone‬‭lines,‬‭cellular‬‭telephones,‬‭serial‬
‭cables, trunk lines, ISDNs, Specialized radio links, etc.‬

‭LCP:‬

‭ CP stands for Link control protocol, is a part of point-to-point control protocol. LCP packets‬
L
‭determine the standards of data transmission.‬

‭LCP protocol is used to determine the identity of the linked devices, if the device is correct it‬
‭accepts it otherwise it rejects the device.‬

I‭ t also determines whether the size of the packet is accepted or not. If requirements exceed‬
‭the parameters, then the link control protocol terminates that link.‬

‭LAP:‬

‭ AP stands for Link access procedure is a data link layer protocol that is used for framing‬
L
‭and transfer the data across point-to-point links.‬

‭ here are three types of Link access procedure – LAPB ( Link Access procedure balanced),‬
T
‭LAPF ( Link Access Procedure Frame-Mode Bearer Services), and LAPD (Link Access‬
‭Procedure D-Channel.‬

‭ AP was originally derived from HDLC (High-Level Data Link Control), but was later‬
L
‭updated and renamed LAPB (LAP Balanced).‬

‭NCP:‬

‭ CP stands for Network control protocol, is a part of the point-to-point protocol. The‬
N
‭network control protocol is used to negotiate the parameter and facilities for the network‬
‭layer.‬
‭ or‬‭every‬‭higher-layer‬‭protocol‬‭supported‬‭by‬‭PPP,‬‭one‬‭NCP‬‭is‬‭there.‬‭IPCP‬‭(‬‭Internet‬‭Protocol‬
F
‭control‬ ‭protocol),‬ ‭DNCP‬ ‭(DECnet‬ ‭Phase‬ ‭IV‬ ‭Control‬ ‭Protocol),‬ ‭OSINLCP‬ ‭(OSI‬ ‭Network‬
‭Layer‬ ‭Control‬ ‭Protocol),‬ ‭IPXCP‬ ‭(Internetwork‬‭Packet‬‭Exchange‬‭Control‬‭Protocol),‬‭NBFCP‬
‭(NetBIOS Frames Control Protocol), IPV6CP (IPv6 Control Protocol) are some of the NCPs.‬

‭5.6‬‭HDLC‬
‭ igh-level Data Link Control (HDLC) is a group of communication protocols of the data link‬
H
‭layer for transmitting data between network points or nodes. Since it is a data link protocol,‬
‭data is organized into frames. A frame is transmitted via the network to the destination that‬
‭verifies its successful arrival. It is a bit - oriented protocol that is applicable for both point - to‬
‭-‬‭point and multipoint communications.‬

‭Transfer Modes‬

‭ DLC supports two types of transfer modes, normal response mode and asynchronous‬
H
‭balanced mode.‬
‭Normal Response Mode (NRM)‬‭− Here, two types of stations‬‭are there, a primary‬
‭station that send commands and secondary station that can respond to received‬
‭commands. It is used for both point - to - point and multipoint communications.‬

‭ synchronous Balanced Mode (ABM)‬‭− Here, the configuration‬‭is balanced, i.e. each‬
A
‭station can both send commands and respond to commands. It is used for only point - to -‬
‭point communications.‬

‭HDLC Frame‬

‭ DLC is a bit - oriented protocol where each frame contains up to six fields. The structure‬
H
‭varies according to the type of frame. The fields of a HDLC frame are −‬
‭●‬ F ‭ lag‬ ‭−‬ ‭It‬ ‭is‬ ‭an‬ ‭8-bit‬ ‭sequence‬ ‭that‬ ‭marks‬ ‭the‬ ‭beginning‬ ‭and‬ ‭the‬‭end‬‭of‬‭the‬‭frame.‬
‭The bit pattern of the flag is 01111110.‬
‭●‬ ‭Address‬‭−‬‭It‬‭contains‬‭the‬‭address‬‭of‬‭the‬‭receiver.‬‭If‬‭the‬‭frame‬‭is‬‭sent‬‭by‬‭the‬‭primary‬
‭station,‬ ‭it‬ ‭contains‬ ‭the‬ ‭address(es)‬ ‭of‬ ‭the‬ ‭secondary‬ ‭station(s).‬ ‭If‬ ‭it‬ ‭is‬ ‭sent‬ ‭by‬ ‭the‬
‭secondary‬ ‭station,‬ ‭it‬ ‭contains‬ ‭the‬ ‭address‬ ‭of‬ ‭the‬ ‭primary‬ ‭station.‬ ‭The‬ ‭address‬ ‭field‬
‭may be from 1 byte to several bytes.‬
‭●‬ ‭Control‬‭− It is 1 or 2 bytes containing flow and error‬‭control information.‬
‭●‬ ‭Payload‬‭− This carries the data from the network layer.‬‭Its length may vary from one‬
‭network to another.‬
‭●‬ ‭FCS‬‭− It is a 2 byte or 4 bytes frame check sequence‬‭for error detection. The standard‬
‭code used is CRC (cyclic redundancy code)‬

‭5.7‬‭PPP‬
‭ oint‬ ‭-‬ ‭to‬ ‭-‬ ‭Point‬ ‭Protocol‬ ‭(PPP)‬ ‭is‬ ‭a‬ ‭communication‬ ‭protocol‬ ‭of‬ ‭the‬ ‭data‬‭link‬‭layer‬‭that‬‭is‬
P
‭used‬ ‭to‬ ‭transmit‬ ‭multiprotocol‬ ‭data‬ ‭between‬ ‭two‬ ‭directly‬ ‭connected‬ ‭(point-to-point)‬
‭computers.‬ ‭It‬‭is‬‭a‬‭byte‬‭-‬‭oriented‬‭protocol‬‭that‬‭is‬‭widely‬‭used‬‭in‬‭broadband‬‭communications‬
‭having heavy loads and high speeds.‬
‭Components of PPP‬

‭Point - to - Point Protocol is a layered protocol having three components −‬

‭​‬ ‭ ncapsulation Component‬‭− It encapsulates the datagram‬‭so that it can be transmitted‬


E
‭over the specified physical layer.‬
‭​‬ ‭Link‬ ‭Control‬ ‭Protocol‬ ‭(LCP)‬ ‭−‬ ‭It‬ ‭is‬ ‭responsible‬ ‭for‬ ‭establishing,‬ ‭configuring,‬
‭testing,‬‭maintaining‬‭and‬‭terminating‬‭links‬‭for‬‭transmission.‬‭It‬‭also‬‭imparts‬‭negotiation‬
‭for set up of options and use of features by the two endpoints of the links.‬
‭​‬ ‭Authentication Protocols (AP)‬‭− These protocols authenticate‬‭endpoints for use of‬
‭services. The two authentication protocols of PPP are −‬
‭o‬ ‭Password Authentication Protocol (PAP)‬
‭o‬ ‭Challenge Handshake Authentication Protocol (CHAP)‬
‭​‬ ‭ etwork‬ ‭Control‬ ‭Protocols‬ ‭(NCPs)‬ ‭−‬ ‭These‬ ‭protocols‬ ‭are‬‭used‬‭for‬‭negotiating‬‭the‬
N
‭parameters‬ ‭and‬ ‭facilities‬ ‭for‬ ‭the‬ ‭network‬ ‭layer.‬ ‭For‬ ‭every‬ ‭higher-layer‬ ‭protocol‬
‭supported by PPP, one NCP is there. Some of the NCPs of PPP are −‬
‭o‬ ‭Internet Protocol Control Protocol (IPCP)‬
‭o‬ ‭OSI Network Layer Control Protocol (OSINLCP)‬
‭o‬ ‭Internetwork Packet Exchange Control Protocol (IPXCP)‬
‭o‬ ‭DECnet Phase IV Control Protocol (DNCP)‬
‭o‬ ‭NetBIOS Frames Control Protocol (NBFCP)‬
‭o‬ ‭IPv6 Control Protocol (IPV6CP)‬
‭PPP Frame‬

‭ PP is a byte - oriented protocol where each field of the frame is composed of one or more‬
P
‭bytes. The fields of a PPP frame are −‬

‭​‬ ‭ lag‬‭− 1 byte that marks the beginning and the end‬‭of the frame. The bit pattern of‬
F
‭the flag is 01111110.‬
‭​‬ ‭Address‬‭− 1 byte which is set to 11111111 in case‬‭of broadcast.‬
‭​‬ ‭Control‬‭− 1 byte set to a constant value of 11000000.‬
‭​‬ ‭Protocol‬‭− 1 or 2 bytes that define the type of data contained in the payload field.‬
‭​‬ ‭ ayload‬‭− This carries the data from the network layer.‬‭The maximum length of the payload‬
P
‭field is 1500 bytes. However, this may be negotiated between the endpoints of‬
‭communication.‬
‭​‬ ‭FCS‬‭− It is a 2 byte or 4 bytes frame check sequence‬‭for error detection. The standard‬
‭code used is CRC (cyclic redundancy code)‬

‭5.8‬‭Media Access Control‬


‭The medium access control (MAC) is a sublayer of the data link layer.‬
I‭ t is responsible for flow control and multiplexing for transmission medium. It controls the‬
‭transmission of data packets via remotely shared channels. It sends data over the network‬
‭interface card.‬
5‭ .8.1‬‭MAC Layer in the OSI Model‬
‭The Open System Interconnections (OSI) model is a layered networking framework that‬
‭conceptualizes how communications should be done between heterogeneous systems. The‬
‭data link layer is the second lowest layer. It is divided into two sublayers −‬
‭•‬‭The logical link control (LLC) sublayer‬
‭•‬‭The medium access control (MAC) sublayer‬

‭5.8.2‬‭MAC Addresses‬

‭ AC address or media access control address is a unique identifier allotted to a network‬


M
‭interface controller (NIC) of a device. It is used as a network address for data transmission‬
‭within a network segment like Ethernet, Wi-Fi, and Bluetooth. MAC address is assigned to a‬
‭network adapter at the time of manufacturing. It is hardwired or hard-coded in the network‬
‭interface card (NIC). A MAC address comprises of six groups of two hexadecimal digits,‬
‭separated by hyphens, colons, or no separators. An example of a MAC address is‬
‭00:0A:89:5B:F0:11.‬
‭5.8.3‬‭ALOHA:‬
‭ LOHA‬ ‭is‬ ‭a‬ ‭system‬ ‭for‬ ‭coordinating‬ ‭and‬ ‭arbitrating‬ ‭access‬ ‭to‬ ‭a‬ ‭shared‬ ‭communication‬
A
‭Networks‬ ‭channel.‬ ‭A‬ ‭shared‬ ‭communication‬ ‭system‬ ‭like‬ ‭ALOHA‬ ‭requires‬ ‭a‬ ‭method‬ ‭of‬
‭handling‬ ‭collisions‬‭that‬‭occur‬‭when‬‭two‬‭or‬‭more‬‭systems‬‭attempt‬‭to‬‭transmit‬‭on‬‭the‬‭channel‬
‭at‬ ‭the‬ ‭same‬ ‭time.‬ ‭Aloha‬ ‭means‬ ‭"Hello".‬ ‭Aloha‬ ‭is‬ ‭a‬ ‭multiple‬ ‭access‬‭protocol‬‭at‬‭the‬‭datalink‬
‭layer‬ ‭and‬ ‭proposes‬ ‭how‬ ‭multiple‬ ‭terminals‬ ‭access‬ ‭the‬ ‭medium‬ ‭without‬ ‭interference‬ ‭or‬
‭collision.‬
‭There are two different versions of ALOHA‬

‭ ure ALOHA‬
P
‭•‬‭In pure ALOHA, the stations transmit frames whenever they have data to send.‬
‭•‬ ‭When two or more stations transmit simultaneously, there is collision and the‬
‭frames are destroyed.‬
‭•‬‭In pure ALOHA, whenever any station transmits a frame, it expects the acknowledgement‬
‭from the receiver.‬
‭•‬‭If acknowledgement is not received within specified time, the station assumes that the frame‬
‭(or acknowledgement) has been destroyed.‬
I‭ f‬ ‭the‬‭frame‬‭is‬‭destroyed‬‭because‬‭of‬‭collision‬‭the‬‭station‬‭waits‬‭for‬‭a‬‭random‬‭amount‬‭of‬‭time‬
‭and‬ ‭sends‬ ‭it‬ ‭again.‬ ‭This‬ ‭waiting‬ ‭time‬ ‭must‬ ‭be‬ ‭random‬ ‭otherwise‬ ‭same‬ ‭frames‬ ‭will‬ ‭collide‬
‭again and again.‬

•‭ ‬ ‭Therefore‬‭pure‬‭ALOHA‬‭dictates‬‭that‬‭when‬‭time-out‬‭period‬‭passes,‬‭each‬‭station‬‭must‬
‭wait‬ ‭for‬ ‭a‬ ‭random‬ ‭amount‬ ‭of‬ ‭time‬ ‭before‬ ‭resending‬ ‭its‬ ‭frame.‬ ‭This‬ ‭randomness‬ ‭will‬ ‭help‬
‭avoid more collisions.‬
‭•‬‭Figure shows an example of frame collisions in pure ALOHA.‬
•‭ ‬ ‭In‬ ‭fig‬ ‭there‬ ‭are‬ ‭four‬ ‭stations‬ ‭that‬ ‭.contended‬ ‭with‬ ‭one‬ ‭another‬ ‭for‬ ‭access‬ ‭to‬ ‭shared‬
‭channel.‬ ‭All‬ ‭these‬ ‭stations‬ ‭are‬ ‭transmitting‬ ‭frames.‬ ‭Some‬ ‭of‬ ‭these‬ ‭frames‬ ‭collide‬ ‭because‬
‭multiple‬ ‭frames‬ ‭are‬ ‭in‬ ‭contention‬ ‭for‬ ‭the‬ ‭shared‬ ‭channel.‬ ‭Only‬ ‭two‬ ‭frames,‬ ‭frame‬ ‭1.1‬ ‭and‬
‭frame 2.2 survive. All other frames are destroyed.‬

•‭ ‬ ‭Whenever‬ ‭two‬ ‭frames‬ ‭try‬ ‭to‬ ‭occupy‬ ‭the‬ ‭channel‬ ‭at‬ ‭the‬ ‭same‬ ‭time,‬ ‭there‬ ‭will‬ ‭be‬ ‭a‬
‭collision‬‭and‬‭both‬‭will‬‭be‬‭damaged.‬‭If‬‭first‬‭bit‬‭of‬‭a‬‭new‬‭frame‬‭overlaps‬‭with‬‭just‬‭the‬‭last‬‭bit‬‭of‬
‭a‬ ‭frame‬ ‭almost‬ ‭finished,‬ ‭both‬ ‭frames‬ ‭will‬ ‭be‬ ‭totally‬ ‭destroyed‬ ‭and‬ ‭both‬ ‭will‬ ‭have‬ ‭to‬ ‭be‬
‭retransmitted.‬

‭Slotted ALOHA‬

•‭ ‬‭Slotted ALOHA was invented to improve the efficiency of pure ALOHA as chances of‬
‭collision in pure ALOHA are very high.‬

•‭ ‬ ‭In‬‭slotted‬‭ALOHA,‬‭the‬‭time‬‭of‬‭the‬‭shared‬‭channel‬‭is‬‭divided‬‭into‬‭discrete‬‭intervals‬
‭called‬‭slots.‬‭The‬‭stations‬‭can‬‭send‬‭a‬‭frame‬‭only‬‭at‬‭the‬‭beginning‬‭of‬‭the‬‭slot‬‭and‬‭only‬‭one‬
‭frame is sent in each slot.‬

•‭ ‬ ‭In‬‭slotted‬‭ALOHA,‬‭if‬‭any‬‭station‬‭is‬‭not‬‭able‬‭to‬‭place‬‭the‬‭frame‬‭onto‬‭the‬‭channel‬‭at‬‭the‬
‭beginning‬‭of‬‭the‬‭slot‬‭i.e.‬‭it‬‭misses‬‭the‬‭time‬‭slot‬‭then‬‭the‬‭station‬‭has‬‭to‬‭wait‬‭until‬‭the‬‭beginning‬
‭of the next time slot.‬

•‭ ‬‭In slotted ALOHA, there is still a possibility of collision if two stations try to send at the‬
‭beginning of the same time slot as shown in fig.‬
•‭ ‬ ‭Slotted ALOHA still has an edge over pure ALOHA as chances of collision are‬
‭reduced to one-half.‬
‭5.9‬‭Ethernet Basics‬
‭ thernet‬ ‭is‬ ‭a‬ ‭set‬ ‭of‬ ‭technologies‬ ‭and‬ ‭protocols‬ ‭that‬ ‭are‬ ‭used‬ ‭primarily‬ ‭in‬ ‭LANs.‬ ‭However,‬
E
‭Ethernet‬‭can‬‭also‬‭be‬‭used‬‭in‬‭MANs‬‭and‬‭even‬‭WANs.‬‭It‬‭was‬‭first‬‭standardized‬‭in‬‭the‬‭1980s‬‭as‬
‭IEEE‬ ‭802.3‬ ‭standard.‬ ‭Since‬ ‭then,‬ ‭it‬ ‭has‬ ‭gone‬ ‭through‬ ‭four‬ ‭generations,‬ ‭as‬ ‭shown‬ ‭in‬ ‭the‬
‭following chart‬

‭ tandard Ethernet has many physical layer implementations. The four main physical‬
S
‭layer implementations are shown in the following diagram‬

‭10Base5: Thick Ethernet‬

‭​‬ ‭The first implementation is called 10Base5, thick Ethernet, or Thicknet.‬

‭​‬‭10Base5 was the first Ethernet specification to use a bus topology with an external‬
‭transceiver(transmitter/receiver) connected via a tap to a thick coaxial cable.‬

‭10Base2: Thin Ethernet‬

‭​‬ ‭The second implementation is called 10Base2, thin Ethernet, or Cheapernet.‬


‭​‬ ‭10Base2 also uses a bus topology, but the cable is much thinner and more flexible.‬

‭​‬‭In this case, the transceiver is normally part of the network interface card (NIC),‬
‭which is installed inside the station.‬

‭10Base-T: Twisted-Pair Ethernet‬

‭​‬ ‭The‬ ‭third‬ ‭implementation‬ ‭is‬ ‭called‬ ‭10Base-T‬ ‭or‬ ‭twisted-pair‬ ‭Ethernet.‬

‭​‬‭10Base-T uses a physical star topology. The stations are connected to a hub via two‬
‭pairs of twisted cable.‬

‭10Base-F: Fiber Ethernet‬

‭​‬‭Although there are several types of optical fiber 10-Mbps Ethernet, the most‬
‭common is called 10Base-F.‬
‭​‬ ‭10Base-F uses a star topology to connect stations to a hub.‬

‭​‬ ‭The stations are connected to the hub using two fiber-optic cables.‬

‭ ast Ethernet (100 Mbps)‬


F
‭Fast Ethernet or 100BASE-T provides transmission speeds up to 100 megabits per second‬
‭and is typically used for LAN backbone systems.‬
‭The 100BASE-T standard consists of three different component specifications –‬
‭1.‬‭100 BASE-TX‬
‭2.‬‭100BASE-T4‬
‭3.‬‭100BASE-FX‬

‭ igabit Ethernet (1 Gbps)‬


G
‭●‬‭The Gigabit Ethernet upgrades the data rate to 1 Gbps(1000 Mbps).‬
‭●‬‭Gigabit Ethernet can be categorized as either a two-wire or a four-wire implementation.‬
‭●‬ ‭The two-wire implementations use fiber-optic cable (1000Base-SX, short-‬
‭wave, or 1000Base-LX, long-wave), or STP (1000Base-CX).‬
‭●‬‭The four-wire version uses category 5 twisted-pair cable (1000Base-T).‬

‭5.10‬‭CSMA/CD‬

‭¬‬‭Carrier Sense in CSMA/CD means that all the nodes‬‭sense the medium to check whether it‬
i‭s idle or busy.‬
‭●‬‭If the carrier sensed is idle, then the node transmits the entire frame.‬
‭●‬‭If the carrier sensed is busy, the transmission is postponed.‬
‭¬‬‭Collision Detect means that a node listens as it‬‭transmits and can therefore detect when a‬
‭frame it is transmitting has collided with a frame transmitted by another node.‬
‭Transmitter Algorithm in CSMA/CD‬
‭¬‬‭Transmitter Algorithm defines the procedures for‬‭a node that senses a busy medium.‬

‭¬‬‭Three types of Transmitter Algorithm exist.‬

‭¬‬‭They are‬
1‭ .‬‭Non-Persistent Strategy‬
‭2.‬‭Persistent Strategy : 1-Persistent & P-Persistent‬
‭Non-Persistent Strategy‬
‭●‬‭In the non-persistent method, a station that has a frame to send senses the line.‬
‭●‬‭If the line is idle, it sends immediately.‬
‭●‬‭If the line is not idle, it waits a random amount of time and then senses the line again.‬

‭‬
● ‭The non-persistent approach reduces the chance of collision because it is unlikely‬
‭that two or more stations will wait the same amount of time and retry to send‬
‭simultaneously.‬
‭●‬ ‭However, this method reduces the efficiency of the network because the medium‬
‭remains idle when there may be stations with frames to send.‬
‭ ersistent Strategy‬
P
‭1-Persistent :‬
‭ ‬‭The 1-persistent method is simple and straightforward.‬

‭●‬ ‭In this method, after the station finds the line idle, it sends its frame immediately‬
‭(with probability 1).‬

‭‬
● ‭This method has the highest chance of collision because two or more stations may‬
‭find the line idle and send their frames immediately.‬
‭ -Persistent :‬
P
‭●‬‭In this method, after the station finds the line idle it follows these steps:‬
‭●‬‭With probability p, the station sends its frame.‬
‭●‬‭With probability q = 1 − p, the station waits for the beginning of the next time slot and‬
‭checks the line again.‬

‭‬
● ‭The p-persistent method is used if the channel has time slots with a slot duration‬
‭equal to or greater than the maximum propagation time.‬
‭●‬ ‭The p-persistent approach combines the advantages of the other two strategies. It‬
‭reduces the chance of collision and improves efficiency‬
‭ XPONENTIAL BACK-OFF‬
E
‭●‬ ‭Once an adaptor has detected a collision and stopped its transmission, it waits a‬
‭certain amount of time and tries again.‬
‭●‬‭Each time it tries to transmit but fails, the adaptor doubles the amount of time‬
i‭t waits before trying again.‬
‭●‬ ‭This strategy of doubling the delay interval between each retransmission‬
‭attempt is a general technique known as‬‭exponential‬‭back-off.‬
‭5.11‬‭Virtual LAN‬
‭ irtual Local Area Networks or Virtual LANs (VLANs) are a logical group of computers that‬
V
‭appear to be on the same LAN irrespective of the configuration of the underlying physical‬
‭network. Network administrators partition the networks to match the functional requirements‬
‭of the VLANs so that each VLAN comprise of a subset of ports on a single or multiple‬
‭switches or bridges. This allows computers and devices in a VLAN to communicate in the‬
‭simulated environment as if it is a separate LAN.‬
‭Types of VLANs‬

‭​‬ ‭ rotocol VLAN‬‭− Here, the traffic is handled based‬‭on the protocol used. A switch or‬
P
‭bridge segregates, forwards or discards frames the come to it based upon the traffics‬
‭protocol.‬
‭​‬ ‭Port-based VLAN‬‭− This is also called static VLAN.‬‭Here, the network‬
‭administrator assigns the ports on the switch / bridge to form a virtual network.‬
‭​‬ ‭Dynamic VLAN‬‭− Here, the network administrator simply‬‭defines network‬
‭membership according to device characteristics.‬

‭5.12‬‭Wireless LAN (802.11)‬


‭ ‬‭Wireless communication is one of the fastest-growing technologies.‬

‭●‬‭The demand for connecting devices without the use of cables is increasing everywhere.‬
‭●‬ ‭Wireless LANs can be found on college campuses, in office buildings, and in many‬
‭public areas.‬
‭ADVANTAGES OF WLAN / 802.11‬
‭1.‬ ‭Flexibility: Within radio coverage, nodes can access each other as radio‬
‭waves can penetrate even partition walls.‬
‭2.‬ ‭Planning : No prior planning is required for connectivity as long as devices follow‬
‭standard convention‬
‭3.‬‭Design : Allows to design and develop mobile devices.‬
‭4.‬ ‭Robustness : Wireless network can survive disaster. If the devices‬
‭survive,communication can still be established.‬
‭ ISADVANTAGES OF WLAN / 802.11‬
D
‭1.‬ ‭Quality of Service : Low bandwidth (1 – 10 Mbps), higher error rates due to‬
‭interference, delay due to error correction and detection.‬
‭2.‬‭Cost : Wireless LAN adapters are costly compared to wired adapters.‬
‭3.‬ ‭Proprietary Solution : Due to slow standardization process, many solution are‬
‭proprietary that limit the homogeneity of operation.‬
‭4.‬ ‭Restriction : Individual countries have their own radio spectral policies. This‬
‭restricts the development of the technology‬
‭5.‬ ‭Safety and Security : Wireless Radio waves may interfere with other devices.‬
‭Eg; In a hospital, radio waves may interfere with high-tech equipment.‬
‭TECHNOLOGY USED IN WLAN / 802.11‬
‭¬‬‭WLAN’s uses Spread Spectrum (SS) technology.‬

‭¬‬‭The idea behind Spread spectrum technique is to‬‭spread the signal over a wider frequency‬
‭band than normal, so as to minimize the impact of interference from other devices.‬
‭¬‬‭There are two types of Spread Spectrum:‬
‭ ‬‭Frequency Hopping Spread Spectrum (FHSS)‬

‭●‬‭Direct Sequence Spread Spectrum (DSSS)‬
‭Frequency Hopping Spread Spectrum (FHSS)‬
‭¬‬‭Frequency hopping is a spread spectrum technique‬‭that involves transmitting the signal‬
‭over a random sequence of frequencies.‬
‭¬‬‭That is, first transmitting at one frequency, then‬‭a second, then a third, and so on.‬

‭¬‬‭The random sequence of frequencies is computed by‬‭a pseudorandom number generator.‬

‭¬‬‭The receiver uses the same algorithm as the sender‬‭and initializes it with the same seed and‬
‭hence is able to hop frequencies in sync with the transmitter to correctly receive the frame.‬
‭Direct Sequence Spread Spectrum (DSSS)‬
‭¬‬‭Each bit of data is represented by multiple bits‬‭in the transmitted signal.‬

‭¬‬‭DSSS takes a user data stream and performs an XOR‬‭operation with a pseudo –random‬
‭number.‬
‭¬‬‭This pseudo random number is called as chipping‬‭sequence.‬

‭ OPOLOGY IN WLAN / 802.11‬


T
‭WLANs can be built with either of the following two topologies /architecture:‬
‭●‬‭Infra-Structure Network Topology‬
‭●‬‭Ad Hoc Network Topology‬
‭Infra-Structure Topology‬‭(AP based Topology)‬

‭‬
● ‭An infrastructure network is the network architecture for providing communication‬
‭between wireless clients and wired network resources.‬
‭●‬ ‭The transition of data from the wireless to wired medium occurs via a Base Station‬
‭called AP(Access Point).‬
‭●‬‭An AP and its associated wireless clients define the coverage area.‬
‭ d-Hoc Topology‬‭(Peer-to-Peer Topology)‬
A
‭●‬‭An adhoc network is the architecture that is used to support mutual communication between‬
‭wireless clients.‬
‭●‬ ‭Typically, an ad- hoc network is created spontaneously and does not support‬
‭access to wired networks.‬
‭●‬‭An adhoc network does not require an AP.‬
‭5.13‬‭Physical Layer‬
‭ hysical layer in the OSI model plays the role of interacting with actual hardware and‬
P
‭signaling mechanism. Physical layer is the only layer of OSI network model which actually‬
‭deals with the physical connectivity of two different stations.‬
‭ hysical layer provides its services to Data-link layer. Data-link layer hands over frames to‬
P
‭physical layer. Physical layer converts them to electrical pulses, which represent binary‬
‭data.The binary data is then sent over the wired or wireless media.‬
‭5.13.1‬‭Data and signals‬
‭Data or the signal whichever is used in a network, it can be either digital or analog.‬

‭Analog and Digital Data‬

‭ nalog data refers to data that is of continuous format whereas digital data is one which has‬
A
‭discrete states. So the analog data takes continuous values and digital data takes discrete‬
‭values. Analog data can be directly converted into an analog signal or sampled and converted‬
‭to digital signal. In quite a similar fashion digital data can also be converted to digital signal‬
‭or into analog signal after modulation. These are converted so that efficient transmission can‬
‭take place.‬

‭Analog and Digital Signal‬

‭ imilar to data, the signals which represent these can also be digital or analog. Analog signals‬
S
‭are known to have many levels of intensity over a given period of time. As the wave moves‬
‭from one value to another, along the path it traverses via infinite number of values. Digital‬
‭signals rather have only definite set of values. These are represented using a pair of‬
‭perpendicular axes. The vertical axis represents the strength of the signal and the horizontal‬
‭axis gives the time period.‬
‭5.13.2‬‭Transmission Media‬
I‭ n data communication terminology, a transmission medium is a physical path between the‬
‭transmitter and the receiver i.e. it is the channel through which data is sent from one place‬
‭to another. Transmission Media is broadly classified into the following types:‬

1‭ .‬ ‭Guided‬ ‭Media:‬ ‭It‬ ‭is‬ ‭also‬ ‭referred‬ ‭to‬ ‭as‬‭Wired‬‭or‬‭Bounded‬‭transmission‬‭media.‬


‭Signals‬ ‭being‬ ‭transmitted‬ ‭are‬ ‭directed‬ ‭and‬ ‭confined‬ ‭in‬ ‭a‬ ‭narrow‬ ‭pathway‬ ‭by‬ ‭using‬
‭physical links. Features:‬

‭ ‬ ‭High Speed‬

‭●‬ ‭Secure‬
‭●‬ ‭Used for comparatively shorter distances‬

‭There are 3 major types of Guided Media:‬

(‭ i)‬‭Twisted Pair Cable –‬


‭It consists of 2 separately insulated conductor wires wound about each other. Generally,‬
‭several such pairs are bundled together in a protective sheath. They are the most widely used‬
‭Transmission Media. Twisted Pair is of two types:‬

‭●‬ ‭ nshielded Twisted Pair (UTP):‬


U
‭UTP consists of two insulated copper wires twisted around one another. This type of‬
‭cable has the ability to block interference and does not depend on a physical shield for‬
‭this purpose. It is used for telephonic applications.‬
‭Advantages:‬

‭‬ ⇢
● ‭ ‬‭Least expensive‬
‭●‬ ‭⇢‬‭Easy to install‬
‭●‬ ‭⇢‬‭High-speed capacity‬

‭Disadvantages:‬

‭‬ ⇢
● ‭ ‬‭Susceptible to external interference‬
‭●‬ ‭⇢‬‭Lower capacity and performance in comparison to‬‭STP‬
‭●‬ ‭⇢‬‭Short distance transmission due to attenuation‬

‭Applications:‬

‭●‬ ‭Used in telephone connections and LAN networks‬

‭●‬ ‭ hielded Twisted Pair (STP):‬


S
‭This type of cable consists of a special jacket (a copper braid covering or a foil shield)‬
‭to block external interference. It is used in fast-data-rate Ethernet and in voice and‬
‭data channels of telephone lines.‬

‭Advantages:‬

‭⇢‬‭Better performance at a higher data rate in comparison‬‭to UTP‬

‭⇢‬‭Eliminates crosstalk‬

‭⇢‬‭Comparatively faster‬

‭Disadvantages:‬

‭⇢‬‭Comparatively difficult to install and manufacture‬

‭⇢‬‭More expensive‬

‭⇢‬‭Bulky‬

(‭ ii)‬‭Coaxial Cable –‬
‭It has an outer plastic covering containing an insulation layer made of PVC or Teflon and 2‬
‭parallel conductors each having a separate insulated protection cover. The coaxial cable‬
‭transmits information in two modes: Baseband mode(dedicated cable bandwidth) and‬
‭Broadband mode(cable bandwidth is split into separate ranges). Cable TVs and analog‬
‭television networks widely use Coaxial cables.‬
‭Advantages:‬

‭‬
● ‭ igh Bandwidth‬
H
‭●‬ ‭Better noise Immunity‬
‭●‬ ‭Easy to install and expand‬
‭●‬ ‭Inexpensive‬

‭Disadvantages:‬

‭●‬ ‭Single cable failure can disrupt the entire network‬

i‭ii)‬‭Optical Fiber Cable –‬


‭It uses the concept of refraction of light through a core made up of glass or plastic. The core‬
‭is surrounded by a less dense glass or plastic covering called the cladding. It is used for the‬
‭transmission of large volumes of data.‬

‭●‬ T
‭ he cable can be unidirectional or bidirectional. The WDM (Wavelength Division‬
‭Multiplexer) supports two modes, namely unidirectional and bidirectional mode.‬

‭Advantages:‬

‭‬
● I‭ ncreased capacity and bandwidth‬
‭●‬ ‭Lightweight‬
‭●‬ ‭Less signal attenuation‬
‭●‬ ‭Immunity to electromagnetic interference‬
‭●‬ ‭Resistance to corrosive materials‬

‭Disadvantages:‬

‭‬ D
● ‭ ifficult to install and maintain‬
‭●‬ ‭High cost‬
‭●‬ ‭Fragile‬

‭(iv)‬‭Stripline‬

‭ tripline is a transverse electromagnetic (TEM) transmission line medium invented by Robert‬


S
‭M. Barrett of the Air Force Cambridge Research Centre in the 1950s. Stripline is the earliest‬
‭form of the planar transmission line. It uses a conducting material to transmit high-frequency‬
‭waves it is also called a waveguide. This conducting material is sandwiched between two‬
‭layers of the ground plane which are usually shorted to provide EMI immunity.‬

‭(v)‬‭Microstripline‬

‭In this, the conducting material is separated from the ground plane by a layer of dielectric.‬

2‭ .‬‭Unguided Media:‬
‭It is also referred to as Wireless or Unbounded transmission media. No physical medium is‬
‭required for the transmission of electromagnetic signals.‬
‭Features:‬

‭‬ T
● ‭ he signal is broadcasted through air‬
‭●‬ ‭Less Secure‬
‭●‬ ‭Used for larger distances‬

‭There are 3 types of Signals transmitted through unguided media:‬

(‭ i)‬‭Radio waves –‬
‭These are easy to generate and can penetrate through buildings. The sending and receiving‬
‭antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and‬
‭cordless phones use Radio waves for transmission.‬

(‭ ii)‬‭Microwaves –‬
‭It is a line of sight transmission i.e. the sending and receiving antennas need to be properly‬
‭aligned with each other. The distance covered by the signal is directly proportional to the‬
‭height of the antenna. Frequency Range:1GHz – 300GHz. These are majorly used for mobile‬
‭phone communication and television distribution.‬

(‭ iii)‬‭Infrared –‬
‭Infrared waves are used for very short distance communication. They cannot penetrate‬
‭through obstacles. This prevents interference between systems. Frequency Range:300GHz –‬
‭400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc.‬

‭5.13.3‬‭Switching‬

I‭ n large networks, there can be multiple paths from sender to receiver. The switching‬
‭technique will decide the best route for data transmission.‬

‭Switching technique is used to connect the systems for making one-to-one communication.‬

‭Classification Of Switching Techniques‬

‭Circuit Switching‬

‭●‬ C
‭ ircuit switching is a switching technique that establishes a dedicated path‬
‭between sender and receiver.‬
‭●‬ I‭ n the Circuit Switching Technique, once the connection is established then the‬
‭dedicated path will remain to exist until the connection is terminated.‬
‭●‬ ‭Circuit switching in a network operates in a similar way as the telephone works.‬
‭●‬ ‭Circuit switching is used in public telephone network. It is used for voice‬
‭transmission.‬
‭●‬ ‭Fixed data can be transferred at a time in circuit switching technology.‬
‭Communication through circuit switching has 3 phases:‬

‭‬ C
● ‭ ircuit establishment‬
‭●‬ ‭Data transfer‬
‭●‬ ‭Circuit Disconnect‬

‭Space Division Switches:‬

‭●‬ S
‭ pace Division Switching is a circuit switching technology in which a single‬
‭transmission path is accomplished in a switch by using a physically separate set‬
‭of crosspoints.‬

‭Time Division Switching‬

‭ he incoming and outgoing signals when received and re-transmitted in a different time‬
T
‭slot, is called‬‭Time Division Switching.‬

‭Message Switching‬

‭●‬ M ‭ essage Switching is a switching technique in which a message is transferred as‬


‭a complete unit and routed through intermediate nodes at which it is stored and‬
‭forwarded.‬
‭●‬ ‭In Message Switching technique, there is no establishment of a dedicated‬
‭path between the sender and receiver.‬
‭●‬ ‭The destination address is appended to the message. Message Switching provides a‬
‭dynamic routing as the message is routed through the intermediate nodes based on‬
‭the information available in the message.‬
‭●‬ ‭Message switches are programmed in such a way so that they can provide the‬
‭most efficient routes.‬
‭●‬ ‭Each and every node stores the entire message and then forward it to the next node.‬
‭This type of network is known as‬‭store and forward‬‭network.‬
‭●‬ ‭Message switching treats each message as an independent entity.‬

‭Packet Switching‬

‭●‬ T ‭ he packet switching is a switching technique in which the message is sent in one‬
‭go, but it is divided into smaller pieces, and they are sent individually.‬
‭●‬ ‭The message splits into smaller pieces known as packets and packets are given a‬
‭unique number to identify their order at the receiving end.‬
‭●‬ ‭Every packet contains some information in its headers such as source‬
‭address, destination address and sequence number.‬
‭●‬ ‭Packets will travel across the network, taking the shortest path as possible.‬
‭‬ A
● ‭ ll the packets are reassembled at the receiving end in correct order.‬
‭●‬ ‭If any packet is missing or corrupted, then the message will be sent to resend‬
‭the message.‬
‭●‬ ‭If the correct order of the packets is reached, then the acknowledgment message‬
‭will be sent.‬

‭Approaches Of Packet Switching:‬

‭There are two approaches to Packet Switching:‬

‭Datagram Packet switching:‬

‭●‬ I‭ t is a packet switching technology in which packet is known as a datagram, is‬


‭considered as an independent entity. Each packet contains the information about the‬
‭destination and switch uses this information to forward the packet to the correct‬
‭destination.‬
‭●‬ ‭The packets are reassembled at the receiving end in correct order.‬
‭●‬ ‭In Datagram Packet Switching technique, the path is not fixed.‬
‭●‬ ‭Intermediate nodes take the routing decisions to forward the packets.‬
‭●‬ ‭Datagram Packet Switching is also known as connectionless switching.‬

‭Virtual Circuit Switching‬

‭‬ V
● ‭ irtual Circuit Switching is also known as connection-oriented switching.‬
‭●‬ ‭In the case of Virtual circuit switching, a preplanned route is established before the‬
‭messages are sent.‬
‭●‬ ‭Call request and call accept packets are used to establish the connection‬
‭between sender and receiver.‬
‭●‬ ‭In this case, the path is fixed for the duration of a logical connection.‬

You might also like