(Notes Index) : Unit - I Fundamentals & Link Layer
(Notes Index) : Unit - I Fundamentals & Link Layer
3. Internet Architecture
Network Architecture (Q)
Protocol Graph (Q)
Layers of TCP/IP Architecture
4. Network Software
Application Programming Interface (Socket) (Q)
5. Performance
Factors that Affect Performance of the Network (Q)
FRAMING :
Framing ( Q)
- Byte-oriented Protocol
- Bit-Oriented Protocol
ERROR DETECTION:
Errors and its Types (Q&Q)
Error Detection and Correction (Q)
Vertical Redundancy Check (VRC) (Q)
Longitudinal Redundancy Check (LRC) (Q)
Error Detection Methods (Q)
FLOW CONTROL
Flow control. (Q)
Acknowledgement.(Q)
Automatic Repeat Request (Q)
Various Flow Control Mechanisms (Q)
- Stop & Wait
- Sliding Window ARQ
UNIT – II (NOTES INDEX)
3. Bluetooth (Q)
ROUTING
Routing (RIP, OSPF, metrics) – Switch Basics – Global Internet (Areas, BGP, IPV6), Multicast
– Addresses – Multicast routing (DVMRP, PIM)
3. Routing Metrics
Routing Metrics in ARPANET (Qno.17)
4. Switch Basics
Switch Functions (Qno.16)
5. Global Internet
a. Areas (Qno.15)
b. Border Gateway Protocol (BGP - 4) (Qno.6)
c. Internet Protocol Ver.6 – IPV6 (Qno.7)
6. Multicast Addresses
- IP Multicasting (Qno.14)
- Multicast Addressing (Qno.13)
TRANSPORT LAYER
Overview of Transport layer – UDP – Reliable byte stream (TCP) – Connection Management –
Flow Control – Retransmission – TCP Congestion control – Congestion Avoidance (DECbit,
RED) – QOS – Application Requirements.
4. Connection Management
Connection Establishment and Connection Termination (Qno.6)
5. Flow Control
TCP Flow control or Adaptive flow control (Qno.10)
6. Retransmission
Silly Window Syndrome (Qno.11)
- Nagle’s Algorithm
Adaptive Retransmission (Qno.12)
- Original Algorithm
- Karn/Partridge Algorithm
- Jacobson/Karels Algorithm
8. Congestion Avoidance
Congestion. (Qno.13)
Flow control vs Congestion control (Qno.14)
TCP Avoidance algorithms (Qno.15)
- DECbit
- Random Early Detection (RED)
- explicit congestion notification (Q)
9. QOS (Qno.29)
10. Application Requirements (Qno.30)
UNIT – V (NOTES INDEX)
APPLICATION LAYER
Traditional applications – Electronic Mail (SMTO, POP3, IMAP, MIME) – HTTP – Web
Services – DNS – SNMP.
1. Traditional Applications
Electronic Mail (SMTP, MIME, IMAMP)
- Components of an Email system and the Protocols used (Qno.2)
- Functions of POP3 (Qno.3)
- Advantages of IMAP over POP3(Qno.4)
2. HTTP
Hypertext (Qno.5)
WWW or HTTP protocol (Qno.6)
4. DNS
Role of Domain Name Services (DNS) in computer Network (Qno.12)
5. SNMP
SNMP (Qno.15)
ENCODING TECHNIQUES
A digital signal is sequence of discrete , discontinuous voltage pulses. Each pulses a signal
element. Encoding scheme is an important factor in how successfully the receiver interprets the
incoming signal.
Encoding Techniques
Non return to zero(NRZ) NRZ codes share the property that voltage level is constant
during a bit interval. High level voltage = bit 1 and Low level voltage = bit 0. A problem
arises when there is a long sequence of 0s or 1s and the volatage level is maintained at the
same value for a long time. This creates a problem on the recieving end because now, the
clock synchronization is lost due to lack of any transitions and hence, it is difficult to
determine the exact number of 0s or 1s in this sequence.
1. NRZ-Level: In NRZ-L encoding, the polarity of the signal changes only when the
incoming signal changes from a 1 to a 0 or from a 0 to a 1. NRZ-L method looks
just like the NRZ method, except for the first input one data bit. This is because
NRZ does not consider the first data bit to be a polarity change, where NRZ-L
does.
2. NRZ-Inverted: Transition at the beginning of bit interval = bit 1 and No
Transition at beginning of bit interval = bit 0 or vicecersa. This technique is
known as differential encoding.
NRZ-I has an advantage over NRZ-L. Consider the situation when two data wires are
wrongly connected in each other's place.In NRZ-L all bit sequences will get reversed
(B'coz voltage levels get swapped).Whereas in NAZ-I since bits are recognized by
transition the bits will be correctly interpreted. A disadvantage in NRZ codes is that a
string of 0's or 1's will prevent synchronization of transmitter clock with receiver clock
and a separate clock line need to be provided.
Error Correction
Backward Error Correction: When the receiver detects an error in the data received, it
requests back the sender to retransmit the data unit.
Forward Error Correction: When the receiver detects some error in the data received,
it uses an error-correcting code, which helps it to auto-recover and correct some kinds of
errors.
The first one, Backward Error Correction, is simple and can only be efficiently used where
retransmitting is not expensive, for example fiber optics. But in case of wireless transmission
retransmitting may cost too much. In the latter case, Forward Error Correction is used.
To correct the error in data frame, the receiver must know which bit (location of the bit in the
frame) is corrupted. To locate the bit in error, redundant bits are used as parity bits for error
detection. If for example, we take ASCII words (7 bits data), then there could be 8 kind of
information we need. Up to seven information to tell us which bit is in error and one more to tell
that there is no error.
For m data bits, r redundant bits are used. r bits can provide 2r combinations of information. In
m+r bit codeword, there is possibility that the r bits themselves may get corrupted. So the
number of r bits used must inform about m+r bit locations plus no-error information, i.e. m+r+1.