Csma/ CD: What Is Multiplexing?
Csma/ CD: What Is Multiplexing?
transmit data frames. The CSMA/CD protocol works with a medium access control layer. Therefore,
it first senses the shared channel before broadcasting the frames, and if the channel is idle, it
transmits a frame to check whether the transmission was successful. If the frame is successfully
received, the station sends another frame. If any collision is detected in the CSMA/CD, the station
sends a jam/ stop signal to the shared channel to terminate data transmission. After that, it waits
for a random time before sending a frame to a channel.
CSMA/ CA It is a carrier sense multiple access/collision avoidance network protocol for
carrier transmission of data frames. It is a protocol that works with a medium access control layer.
When a data frame is sent to a channel, it receives an acknowledgment to check whether the
channel is clear. If the station receives only a single (own) acknowledgments, that means the data
frame has been successfully transmitted to the receiver. But if it gets two signals (its own and one
more in which the collision of frames), a collision of the frame occurs in the shared channel.
Detects the collision of the frame when a sender receives an acknowledgment signal
Following are the methods used in the CSMA/ CA to avoid the collision: 1)Interframe space: In
this method, the station waits for the channel to become idle, and if it gets the channel is idle, it
does not immediately send the data. Instead of this, it waits for some time, and this time period is
called the Interframe space or IFS. However, the IFS time is often used to define the priority of the
station2).Contention window: In the Contention window, the total time is divided into different
slots. When the station/ sender is ready to transmit the data frame, it chooses a random slot
number of slots as wait time. If the channel is still busy, it does not restart the entire process,
except that it restarts the timer only to send data packets when the channel is
inactive.3)Acknowledgment: In the acknowledgment method, the sender station sends the data
frame to the shared channel if the acknowledgment is not received ahead of time.
What is Multiplexing? Multiplexing is a technique used to combine and send the multiple
data streams over a single medium. The process of combining the data streams is known as
multiplexing and hardware used for multiplexing is known as a multiplexer.Multiplexing is achieved
by using a device called Multiplexer (MUX) that combines n input lines to generate a single output
line. Multiplexing follows many-to-one, i.e., n input lines and one output line.Demultiplexing is
achieved by using a device called Demultiplexer (DEMUX) available at the receiving end. DEMUX
separates a signal into its component signals (one input and n outputs). Therefore, we can say that
demultiplexing follows the one-to-many approach.
Advantages of Multiplexing:1)More than one signal can be sent over a single medium.2)The
bandwidth of a medium can be utilized effectively.
Network Devices: Network devices, also known as networking hardware, are physical devices that allow
hardware on a computer network to communicate and interact with one another. For example Repeater,
Hub, Bridge, Switch, Routers, Gateway, Brouter, and NIC, etc.
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted to extend the length to which the signal can be
transmitted over the same network. An important point to be noted about repeaters is that they not only
amplify the signal but also regenerate it. When the signal becomes weak, they copy it bit by bit and
regenerate it at its star topology connectors connecting following the original strength. It is a 2-port
device.
2. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of
filtering content by reading the MAC addresses of the source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single output port, thus
making it a 2 port device.
Types of Bridges 1)Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e. bridge
forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by the source station and the
frame specifies which route to follow. The host can discover the frame by sending a special frame called
the discovery frame, which spreads through the entire network using all possible paths to the destination.
3. Switch – A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large
number of ports imply less traffic) and performance. A switch is a data link layer device. The switch can
perform error checking before forwarding data, which makes it very efficient as it does not forward
packets that have errors and forward good packets selectively to the correct port only. In other words, the
switch divides the collision domain of hosts, but the broadcast domain remains the same.
Types of Switch1)Unmanaged switches: These switches have a simple plug-and-play design and do not
offer advanced configuration options. They are suitable for small networks or for use as an expansion to a
larger network.2)Managed switches: These switches offer advanced configuration options such as VLANs,
QoS, and link aggregation. They are suitable for larger, more complex networks and allow for centralized
management.3)Smart switches: These switches have features similar to managed switches but are
typically easier to set up and manage. They are suitable for small- to medium-sized networks.
Error Detection Errors in the received frames are detected by means of Parity Check and Cyclic
Redundancy Check (CRC). In both cases, few extra bits are sent along with actual data to confirm that bits
received at other end are same as they were sent. If the counter-check at receiver’ end fails, the bits are
considered corrupted.
Cyclic Redundancy Check (CRC)CRC is a different approach to detect if the received frame contains
valid data. This technique involves binary division of the data bits being sent. The divisor is generated using
polynomials. The sender performs a division operation on the bits being sent and calculates the remainder.
Before sending the actual bits, the sender adds the remainder at the end of the actual bits. Actual data bits
plus the remainder is called a codeword. The sender transmits data bits as codewords.
Error Correction In the digital world, error correction can be done in two ways:
Backward Error Correction When the receiver detects an error in the data received, it requests back the
sender to retransmit the data unit.
Forward Error Correction When the receiver detects some error in the data received, it executes error-
correcting code, which helps it to auto-recover and to correct some kinds of errors.
The first one, Backward Error Correction, is simple and can only be efficiently used where retransmitting is
not expensive. For example, fiber optics. But in case of wireless transmission retransmitting may cost too
much. In the latter case, Forward Error Correction is used.
Routing 1A Router is a process of selecting path along which the data can be transferred from
source to the destination. Routing is performed by a special device known as a router.2 )A Router
works at the network layer in the OSI model and internet layer in TCP/IP model A router is a
networking device that forwards the packet based on the information available in the packet
header and forwarding table.3)The routing algorithms are used for routing the packets. The
routing algorithm is nothing but a software responsible for deciding the optimal path through
which packet can be transmitted.4) The routing algorithm initializes and maintains the routing
table for the process of path determination.
Types of routing
Dynamic Routing1)It is also known as Adaptive Routing.2)It is a technique in which a
router adds a new route in the routing table for each packet in response to the changes in the
condition or topology of the network.3)Dynamic protocols are used to discover the new routes to
reach the destination.4)In Dynamic Routing, RIP and OSPF are the protocols used to discover the
new routes.5)If any route goes down, then the automatic adjustment will be made to reach the
destination.
Static Routing1)Static Routing is also known as Nonadaptive Routing.2)It is a technique in
which the administrator manually adds the routes in a routing table.3)A Router can send the
packets for the destination along the route defined by the administrator.4)In this technique,
routing decisions are not made based on the condition or topology of the networks
1. Distance Vector Routing Protocol :These protocols select the best path on the basis of hop counts to
reach a destination network in a particular direction. Dynamic protocol like RIP is an example of a
distance vector routing protocol. Hop count is each router that occurs in between the source and the
destination network. The path with the least hop count will be chosen as the best path.
Features – 1)Updates of the network are exchanged periodically. 2)Updates (routing information) is not
broadcasted but shared to neighbouring nodes only. 3)Full routing tables are not sent in updates but only
distance vector is shared.
2. Link State Routing Protocol :These protocols know more about Internetwork than any other distance
vector routing protocol. These are also known as SPF (Shortest Path First) protocol. OSPF is an example
of link-state routing protocol.
Features – 1)Hello, messages, also known as keep-alive messages are used for neighbor discovery and
recovery. 2)Concept of triggered updates is used i.e updates are triggered only when there is a topology
change. 3)Only that many updates are exchanged which is requested by the neighbor router.
Congestion control Congestion causes choking of the communication channel. When too many
packets are displayed in a part of the subnet, the subnet's performance degrades. Hence, the network's
communication channel is called congested if packets are traversing the path experience primarily over the
path propagation delay.
Closed-loop solutions It makes the decision based on the concept of a feedback loop. The feedback Notes
loop enables the closed-loop system to monitor the procedure to detect when and where congestion occurs.
After that, it passes the information to the places where they can take actions.The system's monitoring
depends on the percentage of all packets discarded for drawback of buffer area, the average queue lengths,
the multiple packets that time out and are retransmitted, the normal packet delay and the standard deviation
of packet delay.
Congestion control algorithm
Token bucket Algorithm
1)The leaky bucket algorithm has a rigid output design at an average rate independent of the bursty
traffic.2)In some applications, when large bursts arrive, the output is allowed to speed up. This calls for a
more flexible algorithm, preferably one that never loses information. Therefore, a token bucket algorithm
finds its uses in network traffic shaping or rate-limiting.3)It is a control algorithm that indicates when
traffic should be sent. This order comes based on the display of tokens in the bucket. 4)The bucket
contains tokens. Each of the tokens defines a packet of predetermined size. Tokens in the bucket are
deleted for the ability to share a packet.5)When tokens are shown, a flow to transmit traffic appears in the
display of tokens.6) No token means no flow sends its packets. Hence, a flow transfers traffic up to its
peak burst rate in good tokens in the bucket.
Load Shedding
It is one of the approaches to congestion control. Router contains a buffer to store packets and route it to
destination. When the buffer is full, it simply discards some packets. It chooses the packet to be discarded
based on the strategy implemented in the data link layer. This is called load sheddingLoad shedding will use
dropping the old packets than new to avoid congestion. Dropping packets that are part of the difference is
preferable because a future packet depends on full frame.To implement an intelligent discard policy,
applications must mark their packets to indicate to the network how important they are. When packets have
to be discarded, routers can first drop packets from the least important class, then the next most important
class, and so on.
Advantages The advantages of load shedding are given below −1)It can be used in detection of
congestion.2)It can recover from congestion.3)reduces the network traffic flow.4)Synchronised flow of
packets across a network.5)Removes the packets before congestion occurs.
What is a Web Browser? The web browser is an application software to explore www (World Wide
Web). It provides an interface between the server and the client and requests to the server for web
documents and services. It works as a compiler to render HTML which is used to design a webpage.
Whenever we search for anything on the internet, the browser loads a web page written in HTML,
including text, links, images, and other items such as style sheets and JavaScript functions. Google
Chrome, Microsoft Edge, Mozilla Firefox, and Safari are examples of web browsers.
What is World Wide Web World Wide Web, which is also known as a Web, is a collection
of websites or web pages stored in web servers and connected to local computers through the
internet. These websites contain text pages, digital images, audios, videos, etc. Users can access the
content of these sites from any part of the world over the internet using their devices such as
computers,laptops, cell phones, etc. The WWW, along with internet, enables the retrieval and
display of text and media to your device.
HTTP 1)HTTP stands for HyperText Transfer Protocol.2)It is a protocol used to access the
data on the World Wide Web (www).3)The HTTP protocol can be used to transfer the data in the
form of plain text, hypertext, audio, video, and so on.4)This protocol is known as HyperText
Transfer Protocol because of its efficiency that allows us to use in a hypertext environment where
there are rapid jumps from one document to another document.5)HTTP is similar to the FTP as it
also transfers the files from one host to another host. But, HTTP is simpler than FTP as HTTP uses
only one connection, i.e., no control connection to transfer the files.6)HTTP is used to carry the
data in the form of MIME-like format.
Working of Email:1)When the sender sends the email using the mail program, then it gets redirected
to the simple mail transfer protocol which checks whether the receiver’s email address is of another
domain name or it belongs to the same domain name as that of the sender (Gmail, Outlook, etc.). Then the
email gets stored on the server for later purposes transfer using POP or IMAP protocols. 2)If the receiver
has another domain name address then, the SMTP protocol communicates with the DNS (domain name
server) of the other address that the receiver uses. Then the SMTP of the sender communicates with the
SMTP of the receiver which then carries out the communication and the email gets delivered in this way
to the SMTP of the receiver. 3)If due to certain network traffic issues, both the SMTP of the sender and
the receiver are not able to communicate with each other, the email to be transferred is put in a queue of
the SMTP of the receiver and then it finally gets receiver after the issue resolves. And if due to very bad
circumstances, the message remains in a queue for a long time, then the message is returned back to the
sender as undelivered.
7) Application LayerAn application layer serves as a window for users and application
processes to access network service.2)It handles issues such as network transparency, resource
allocation, etc.3)An application layer is not an application, but it performs the application layer
functions.4)This layer provides the network services to the end-users. Funcation: File transfer,
access, and management (FTAM): An application layer allows a user to access the files in a
remote computer, to retrieve the files from a computer and to manage the files in a remote
computer.2)Mail services: An application layer provides the facility for email forwarding and
storage.
Types of network: Local Area Network (LAN) –LAN or Local Area Network connects network
devices in such a way that personal computers and workstations can share data, tools, and programs. The
group of computers and devices are connected together by a switch, or stack of switches, using a private
addressing scheme as defined by the TCP/IP protocol. Private addresses are unique in relation to other
computers on the local network. Routers are found at the boundary of a LAN, connecting them to the
larger W Advantages:1)Provides fast data transfer rates and high-speed communication.2)Easy to set
up and manage.3)Can be used to share peripheral devices such as printers and scanners.
ATM Adaption Layer (AAL) – It is meant for isolating higher-layer protocols from details of
ATM processes and prepares for conversion of user data into cells and segments it into 48-byte
cell payloads. AAL protocol excepts transmission from upper-layer services and helps them in
mapping applications, e.g., voice, data to ATM cells.
Physical Layer – It manages the medium-dependent transmission and is divided into two parts
physical medium-dependent sublayer and transmission convergence sublayer. The main functions
are as follows: 1)It converts cells into a bitstream.2)It controls the transmission and receipt of bits
in the physical medium.3)It can track the ATM cell boundaries.
ATM Layer – It handles transmission, switching, congestion control, cell header processing,
sequential delivery, etc., and is responsible for simultaneously sharing the virtual circuits over the
physical link known as cell multiplexing and passing cells through an ATM network known as
cell relay making use of the VPI and VCI information in the cell header.
What are IEEE 802 wireless standards?IEEE 802 is a collection of networking
standards that cover the physical and data link layer specifications for technologies such as
Ethernet and wireless. These specifications apply to local area networks (LANs) and metropolitan
area networks (MANs). IEEE 802 also aids in ensuring multivendor interoperability by promoting
standards for vendors to follow.Essentially, the IEEE 802 standards help make sure internet
services and technologies follow a set of recommended practices so that network devices can all
work together smoothly.IEEE 802 is divided into different parts that cover the physical and data
link aspects of networking. The family of standards is developed and maintained by the Institute of
Electrical and Electronics Engineers (IEEE) 802 LAN/MAN Standards Committee, also called the
LMSC.
FRAMING Framing is a point-to-point connection between two computers or devices consisting of a wire
in which data is transmitted as a stream of bits. However, these bits must be framed into discernible blocks
of information. Framing is a function of the data link layer. It provides a way for a sender to transmit a set
of bits that are meaningful to the receiver. Ethernet, token ring, frame relay, and other data link layer
technologies have their own frame structures. Frames have headers that contain information such as error-
checking codes.
1. Character/Byte Stuffing: Used when frames consist 2. Bit Stuffing: Let ED = 01111 and if data =
of characters. If data contains ED then, a byte is stuffed
01111
into data to differentiate it from ED.
Let ED = “$” –> if data contains ‘$’ anywhere, it can be –> Sender stuffs a bit to break the pattern i.e.
escaped using ‘\O’ character. here appends a 0 in data = 011101.
–> if data contains ‘\O$’ then, use ‘\O\O\O$'($ is –> Receiver receives the frame.
escaped using \O and \O is escaped using \O). –> If data contains 011101, receiver removes
Disadvantage – It is very costly and obsolete method. the 0 and reads the data.
OSI Model 1)OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer moves through a physical
medium to the software application in another computer. 2)OSI consists of seven layers, and each
layer performs a particular network function. 3)OSI model was developed by the International
Organization for Standardization (ISO) in 1984, and it is now considered as an architectural model
for the inter-computer communications. 4)OSI model divides the whole task into seven smaller
and manageable tasks. Each layer is assigned a particular task.
1) Physical layer The main functionality of the 2) Data-Link Layer 1)This layer is
physical layer is to transmit the individual bits from one responsible for the error-free transfer of
node to another node. 2)It is the lowest layer of the OSI data frames.2)It defines the format of the
model. 3)It establishes, maintains and deactivates the data on the network. 3)It provides a reliable
physical connection. 4)It specifies the mechanical, and efficient communication between two
electrical and procedural network interface specifications. or more devices. 4)It is mainly responsible
Functions of a Physical layer: 1)Line for the unique identification of each device
Configuration: It defines the way how two or more that resides on a local network.
devices can be connected physically. 2)Data FUNCATION :Error Control: Error control
Transmission: It defines the transmission mode is achieved by adding a calculated value
whether it is simplex, half-duplex or full-duplex
CRC (Cyclic Redundancy Check) that is
mode between the two devices on the network.
placed to the Data link layer's trailer which
is added to the message frame before it is
3) Network Layer It is a layer 3 that manages device
sent to the physical layer. If any error seems
addressing, tracks the location of devices on the network.
to occurr, then the receiver sends the
It determines the best path to move data from source to
the destination based on the network conditions, the acknowledgment for the retransmission of
priority of service, and other factors. The Data link layer is the corrupted frames.
responsible for routing and forwarding the packets.
Functions of Network Layer:
1)Internetworking: An internetworking is the main 4) Transport Layer The Transport layer is
responsibility of the network layer. It provides a a Layer 4 ensures that messages are
logical connection between different transmitted in the order in which they are
devices.2)Addressing: A Network layer adds the sent and there is no duplication of data. The
source and destination address to the header of the main responsibility of the transport layer is to
frame. Addressing is used to identify the device on transfer the data completely. It receives the
the internet. data from the upper layer and converts them
5) Session Layer It is a layer 3 in the OSI model. into smaller units known as segments.
2)The Session layer is used to establish, maintain and FUNCATION Flow control: The transport
synchronizes the interaction between communicating layer also responsible for flow control but it
devices. FUNCATION: Dialog control: Session layer acts is performed end-to-end rather than across a
as a dialog controller that creates a dialog between two single link. Error control: The transport layer
processes or we can say that it allows the communication is also responsible for Error control. Error
between two processes which can be either half-duplex control is performed end-to-end rather than
or full-duplex.Synchronization: Session layer adds some across the single link. The sender transport
checkpoints when transmitting the data in a sequence. If layer ensures that message reach at the
some error occurs in the middle of the transmission of destination without any error.
data, then the transmission will take place again from the
What is Transmission media?
Transmission media is a communication channel that carries the information from the sender to
the receiver. Data is transmitted through the electromagnetic signals.
1 The main functionality of the transmission media is to carry the information in the form of bits
through LAN(Local Area Network). 2)It is a physical path between transmitter and receiver in data
communication. 3) In a copper-based network, the bits in the form of electrical signals.In a fibre
based network, the bits in the form of light pulses. 4)In OSI(Open System Interconnection) phase,
transmission media supports the Layer 1. Therefore, it is considered to be as a Layer 1 component.
5) The electrical signals can be sent through the copper wire, fibre optics, atmosphere, water, and
vacuum. Types of transmission media:
Guided Media It is defined as the physical medium through which the signals are
transmitted. It is also known as Bounded media.
Twisted pair:Twisted pair is a physical media made up of a pair of cables twisted with
each other. A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable. The frequency
range for twisted pair cable is from 0 to 3.5KHz. A twisted pair consists of two insulated
copper wires arranged in a regular spiral pattern.
1) Radio waves
Terrestrial Microwave Transmission
1)Radio waves are the electromagnetic waves Terrestrial Microwave transmission is a
that are transmitted in all the directions of free technology that transmits the focused beam of a
space. 2)Radio waves are omnidirectional, i.e., radio signal from one ground-based microwave
transmission antenna to another.Microwaves are
the signals are propagated in all the directions.
the electromagnetic waves having the frequency
3) The range in frequencies of radio waves is in the range from 1GHz to 1000 GHz.Microwaves
from 3Khz to 1 khz. 4)In the case of radio are unidirectional as the sending and receiving
waves, the sending and receiving antenna are antenna is to be aligned, i.e., the waves sent by
not aligned, i.e., the wave sent by the sending the sending antenna are narrowly focussed.In
antenna can be received by any receiving this case, antennas are mounted on the towers
to send a beam to another antenna which is km
antenna.
away.
What is Network Topology? Topology defines the structure of the network of how all
the components are interconnected to each other. There are two types of topology: physical and
logical topology. Types of topology:
2) Ring Topology Ring topology is like a bus
1) Bus Topology The bus topology is designed in
topology, but with connected ends. The node
such a way that all the stations are connected
that receives the message from the previous
through a single cable known as a backbone cable.
computer will retransmit to the next node. The
Each node is either connected to the backbone cable
data flows in one direction, i.e., it is
by drop cable or directly connected to the backbone
unidirectional. The data flows in a single loop
cable. When a node wants to send a message over
continuously known as an endless loop.
the network, it puts a message over the network.
Advantages of Ring topology
Advantages of Bus topology:1)Low-cost
1)Network Management: Faulty devices can
cable: In bus topology, nodes are directly connected
be removed from the network without bringing
to the cable without passing through a hub.
the network down. 2) Product
Therefore, the initial cost of installation is low.
availability: Many hardware and software tools
2)Moderate data speeds: Coaxial or twisted pair
for network operation and monitoring are
cables are mainly used in bus-based networks that
available. 3)Cost: Twisted pair cabling is
support upto 10 Mbps.
inexpensive and easily available. Therefore, the
3) Star Topology Star topology is an arrangement installation cost is very low.
of the network in which every node is connected to
the central hub, switch or a central computer.The 5) Mesh topology Mesh technology is an
central computer is known as a server, and the arrangement of the network in which
peripheral devices attached to the server are known computers are interconnected with each other
as clients.Coaxial cable or RJ-45 cables are used to through various redundant connections.There
connect the computers.Hubs or Switches are mainly are multiple paths from one computer to
used as connection devices in a physical star another computer.It does not contain the
topology. switch, hub or any central computer which
acts as a central point of communication.The
Advantage: 1)Network control: Complex network
Internet is an example of the mesh topology.
control features can be easily implemented in the star Advantage:1)Reliable: The mesh topology
topology. Any changes made in the star topology are networks are very reliable as if any link
automatically accommodated. 2)Limited failure: As breakdown will not affect the communication
each station is connected to the central hub with its between connected computers.2)Fast
own cable, therefore failure in one cable will not Communication: Communication is very fast
between the nodes.
affect the entire network. 3)Familiar technology: Star
topology is a familiar technology as its tools are cost- Easier Reconfiguration: Adding new devices
effective. would not disrupt the communication
between other devices.