DCCN Notes
DCCN Notes
Unit-1
Types of Connec ons
Here are some of the commonly men oned types:
Unit -2
OSI Model :
TCP:
Unit -3
Transmission Impairment :
Transmission impairments refer to the degrada on or altera on of
signals as they travel through a transmission medium in data
communica on. These impairments can affect both analog and
digital signals and can lead to signal quality degrada on, bit errors, or
changes in signal amplitude or shape. The main causes of
transmission impairments are a enua on, distor on, and noise.
Unit-4
Unit 5
**Circuit Switching**:
Circuit Switching is a tradi onal method used in telecommunica ons
networks. It involves establishing a dedicated communica on path
between the sender and receiver before data transmission begins.
The key characteris cs of circuit switching include:
Unit 7
Error detec on and error correc on:
**Error Detec on**:
Error detec on is the process of iden fying whether errors have
occurred during data transmission. It involves adding extra bits to the
transmi ed data to enable the receiver to check for errors. Some
commonly used error detec on techniques include:
Unit- 8
**ALOHA**:
ALOHA is a random access protocol used in wireless networks. It
allows devices to transmit data whenever they have data to send,
without checking for channel availability. If collisions occur, devices
wait for a random me before retransmi ng. ALOHA is simple but
has lower efficiency compared to other protocols.
Unit 10
IPV4 and IPV6 :
**UDP Checksum:**
- The UDP checksum is a field in the UDP header used for error
detec on.
- It helps ensure the integrity of the UDP segment during
transmission.
- The checksum is calculated by the sender and included in the UDP
header.
- Upon receiving a UDP segment, the recipient uses the checksum
value in the UDP header to verify the integrity of the received data.
- If the calculated checksum at the receiver's end does not match the
checksum in the header, it indicates that the data might have been
corrupted during transmission.
- In such cases, the receiver may choose to discard the corrupted
segment or take other appropriate ac ons based on the applica on's
requirements.
- The checksum calcula on is performed over the en re payload, as
well as certain fields from the IP header, using a pseudo-header.
- The pseudo-header includes informa on such as source and
des na on IP addresses, protocol number, and UDP length.
Unit-14
**RTP (Real- me Transport Protocol):**
- RTP is a network protocol used for delivering real- me audio and
video media over the internet, enabling Voice over IP (VoIP) and
other streaming applica ons.
- It works in conjunc on with a signaling protocol like SIP (Session
Ini a on Protocol) to set up connec ons and manage the
transmission of media.
- RTP is typically used with the User Datagram Protocol (UDP) for
faster delivery of data, although it can also use the Transmission
Control Protocol (TCP).
- It uses Synchroniza on Source (SSRC) values to keep track of
synchroniza on sources within an RTP session, ensuring that no two
sources have the same iden fier.
- RTP carries con nuous streams of audio or video packets across the
network from the transmi er to the receiver.
- It is commonly used in applica ons such as video conferencing,
streaming media, and real- me gaming.
Unit-15
SNMP and its applica ons:
SNMP (Simple Network Management Protocol) is a protocol used for
managing and monitoring network devices and systems. It has
various applica ons in data communica ons. Here are some key
applica ons of SNMP:
**Security Monitoring:**
- SNMP can be used to monitor security-related events and ac vi es
on network devices.
- It provides informa on about unauthorized access a empts,
firewall logs, and other security-related metrics.
- SNMP traps can be configured to alert administrators about
poten al security breaches or suspicious ac vi es.