Computer Network PDF Free
Computer Network PDF Free
ON
COMPUTER NETWORK
CONTENTS
1. What Is Network………………………………...8
2. Models of Network Computing.…….…….12
3. Networking Model…………………….….……16
4. Network Hardware…………………….………18
5. Topologies………………………………….…….23
6. Switching……………………………….…….…...39
7. Network Services…………………………….….46
8. OSI Model…………………………………...…..48
9. TCP/IP……………………………………………..62
10. UDP………………………………………………65
11. Subnetting……………………………………….68
12. Supernetting…………………………………….72
13. Protocol Suit……………………..…………….76
14. Internet Protocols………………..…………..80
15. Media Connectivity………………..…………87
16. Connectivity Devices………………………...96
17. Network Printing………………………………107
18. Cryptography……………………………………117
1
19. Bluetooth…………………………………………121
20. Broadband……………………………………….125
21. Wi-Fi………………………………..…………….126
22. Network Troubleshooting……..…………..130
23. LAN Setup……………………………………….134
Purpose
Computer networks can be used for several purposes:
Facilitating communications: Using a network, people can
communicate efficiently and easily via email, instant
messaging, chat rooms, telephone, video telephone calls,
and video conferencing.
Sharing hardware: In a networked environment, each
computer on a network may access and use hardware
resources on the network, such as printing a document on
a shared network printer.
Sharing files, data, and information: In a network
environment, authorized user may access data and
2
information stored on other computers on the network.
The capability of providing access to data and information
on shared storage devices is an important feature of many
networks.
Sharing software Users connected to a network may run
application program on remote computers.
Information preservation.
Security.
Speed up.
What is a Network?
A network is a set of devices connected by media links.
A node can be a computer, printer or any other device
capable of sending and receiving data generated by other
nodes on the network.
3
Network
The links connecting the devices are often called
communication channels.
4
Transit time:-It is amount of time required for a
message to travel from one device to another.
Response time:-Response time is the elapsed
time between an inquiry and a response.
The performance of a network depending on a number
of factors including the number of users , the type of
transmission medium, the capability of the connected
hardware and the efficiency of the software.
5
Hardware:-The type of hardware included in a
network in a network affects both the speed and
capacity of transmission.
Software:-The software used to process data at
the sender, receiver and intermediate modes also
affects network performance. Well designed
software can speed the process and make
transmission more effective and efficient.
Performance is often evaluated by to network matrices:-
throughput and delay. We often need more throughputs
and less delay try to send more data to the network, we
may increase the delay because of traffic congestion in
the network.
Throughput: - It is the total output of a network is
known as the throughput.
Delay: - The time lack behind while completing the
task is called as delay.
2.RELIABILITY: - Network reliability is measured by
the frequency of failure, the time it takes a link to
receiver from a failure and the networks robustness in
a catastrophe.
Frequency of failure: - All networks fail occasionally. A
Network that fails often however is more useful than one
that does not.
6
Catastrophe: - Networks must be protected from
catastrophic events such as fire, earthquake, or theft.
One protection against unforeseen damage is a reliability
system to back up network software.
3.SECURITY: - Network security issues include
protecting data from unauthorized access, protecting
data from damage and development and
implementing policies and procedures for recovery
from breaches and data losses.
Unauthorized access:-For a network to be useful
sensitive data must be protected from unauthorized
access .Protection can be accomplished at a number of
levels .At the lowest level are user identification codes
and passwords. At the higher level are encryption
techniques. In these mechanisms, data are
systematically altered in such a way that if they are
intercepted by an unauthorized user, there will be
unintelligible.
Viruses:-Because a network is accessible from many
points, it can be susceptible to computer viruses. A
virus is illicitly introduced code that damages the
system. A good network is protected from viruses by
hardware and software designed specifically for that
purpose.
Uses of network:-
7
1) Resource Sharing:-The mainly purpose of
networking is resource sharing. The resources can be
shared as many as we want and this also reduced cost
.For e.g. a printer is being shared by many computers.
2) Communication:-The other purpose of networking
is communication. We can communicate from one
device to another by networking.
8
3) Security: - This system provides the security from
unauthorized person’s .We can secure our data by using
the password at server.
Centralized
Disadvantages:-
1) Low speed:-The system has low speed for
transferring of data from one system to another. So
it is also time consuming.
2) Dependency:-If the server fails then the whole
system will fail because the system is dependent on
the server.
2) Distributed: - It uses the bus topology. All the
devices are connected through one main cable to
another. If one device wants to communicate with
9
another then it can easily communicate. There is no
server in the system and data can transfer directly
from one system to another.
Distributed
Advantages:-
1) Direct communication: - There is no complexity in
the system so there direct communication is easily
available from one system to another.
2) Quick Access: - The data can be reach to their
destination very fast without any server so it having quick
access of data.
3) Independently working: - The systems are
independently working means that they are not
dependent on any server.
4) Multiple users can work:-This system can be
accessed by many users as wants to access the data at a
time.
10
Disadvantages:-
1) More acceptable to virus: - In this the virus can
transfer from one computer to another very easily
through data because only one main cable is
responsible for this system. So it is very prone to
virus.
2) Backup difficult:- If one system fails then the data
also will destroy but if the main cable fails then whole
system will broken as there is backup very difficult.
11
2) Backup difficult:-There is very much difficulty
for backup.
NETWORKING MODELS
Network model tells us how the computer can be inter-
connected .Computer network are created by different
entities. Standard are needed so that these
heterogeneous networks can communicate with one
another. The two best known standards are the OSI
model and the internet model.
There are the two types of connection-:
1) Peer to peer
2) Client to server
Peer to peer-: In peer to peer networking each node
acts as a client as well as server. A peer to peer network
exploits diverse connectivity between nodes in the
network and the commutative band width of network
node rather than conventional centralized resources
where a relatively low no. of servers provides the
centralized resources where a relatively low no. of servers
provides the centralized management. Every person can,
in principle, communicate with one or more other
people; there is no fixed division into clients and servers.
Peer to peer communication really hit the big time
12
around 2000 with a service called nester, which at its
peak had over 50 million music fans swapping music, in
what was probably the biggest copyright infringement in
all of recorded history. The idea was fairly simple.
Client to server-: It is a computing architecture which
separates the client from a server and is almost
implemented over a computer network. Each client or
server connected to a network can also be refers as a
node. This type of architect is sometime refers to as two
tier. It allows devices to show files and resources. Each
client software can sent data request to more connected
to a server in other end a server accepts their request
process them and return the requested information to
the particular client .it is widely used and forms the basis
of much network usage it is applicable when the client
and server are both in same building, but also when they
are far apart. For example when a person at home
accesses a page on the www, the same model is
employed, with the remote web server being the server
and the user’s personal computer being the client.
Undermost condition one server can handle a large
number of clients.
NETWORK HARDWARE:-
1) TRANSMISSON TECHNOLOGY
13
2) SCALE
14
delivered to all machines subscribing to that
group.
2. Point to point links: - Point to point network
consist of many connections between individual
pairs of machines. To go from the source to the
destination a packet on this type of network may
have to first visit one or more intermediate
machines often multiple routes, of different
lengths are possible, so finding good ones is
important in point-to-point networks. Smaller,
geographically localized networks tend to use
broadcasting, whereas larger networks usually
point-to-point. Point-to-point transmission with
one sender and one receiver is sometimes called
unicasting.
2) Scale-: According to scale the network are
divided into three categories:-
LAN
WAN
MAN
1. LAN:-Local Area Network
LAN’s are privately owned networks within a single
building or campus of up to a few kilometers in size.
They are widely used to connect personal
computers and workstations in company offices and
15
factories to share resources and exchange
information.
LAN
LAN’s are distinguishing from other kinds of
networks by three characteristics:-
Size
Transmission Technology
Topology
LAN’s are restricted in size, which means that worst
case transmission time is bounded and known in
advance. It also simplifies network management. LAN’s
uses a transmission technology consisting of a cable to
which all the machines are attached like the telephone
company used in rural areas.
Traditional LAN’s run at speeds of 10 MBPS to 100
MPBS, have low delay and make very few errors. Newer
LAN’s operate at up to 10 GBPS. LAN uses ring
topology and ring topology.
16
2. WAN:-Wide Area Network
A WAN, spans a large geographical area, often a
country or continent. It contains a collection of
machines intended for running programs. In WAN,
the subnet consists of two distinct components:
Transmission lines
Switching elements
Subnet is a collection of routers and communication
lines that moved packets from the source host to the
destination. Transmission lines move bits between
machines. They can be made of copper wire, optical
fiber or even radio links. In most WAN’s, the network
contains numerous transmission lines, each one
connecting a pair of router. Nearly all WAN’s have store
and forward subnets.
17
WAN
3) MAN:-Metropolitan area network
A MAN covers a city .The best example of MAN is
the cable television network available in many cities.
TOPOLOGIES:-
18
The term topology refers to the way in which a network s
laid out physically. Two or more devises connect to a
link two or more links form a topology. The topology of
a network is geometric representation of the relationship
of all the links and linking devices to one another.
Network topology is the layout pattern of
interconnections of the various elements (links, nodes
etc.) of a computer network.
Classification of topology:-
Physical Topology
Logical Topology
Signal Topology
Any particular network topology is determined only by
the graphical mapping of the configuration of physical
and/or logical connections between nodes. A local area
network (LAN) is one example of a network that exhibits
both a physical topology and a logical topology.
I. Physical Topology: - Physical topology means the
physical design of a network including the devices,
location and cable installation. Any given node in
the LAN has one or more links to one or more
nodes in the network and the mapping of these links
and nodes in a graph results in a geometric shape
19
that may be used to describe the physical topology
of the network.
II. Logical Topology: - Likewise, the mapping of the
data flow between the nodes in the network
determines the logical topology of the network. The
physical and logical topologies may or may not be
identical in any particular network. Logical
topologies are often closely associated with media
access control (MAC) methods and protocols. The
logical topologies are generally determined by
network protocols as opposed to being determined
by the physical layout of cables, wires, and network
devices or by the flow of the electrical signals,
although in many cases the paths that the electrical
signals take between nodes may closely match the
logical flow of data, hence the convention of using
the terms 'logical topology' and 'signal topology'
interchangeably. Logical topologies are able to be
dynamically reconfigured by special types of
equipment such as routers and switches.
III. Signal Topology: - The mapping of the actual
connections between the nodes of a network, as
evidenced by the path that the signals take when
propagating between the nodes.
Types of Topologies:-
20
1) Bus Topology: - It is a multipoint point topology.
One long cable acts as a backbone to link the devices
in a network. Nodes are connected to bus cable by
drop line and taps. A drop line is a connection
running between the device and the main cable.
21
ADVANTAGES:
1. Less Cabling:-Bus uses less cabling because
devices are connected only through a single main
cable.
2. Ease of installation
3. Easy to extend
4. Simple wiring and cheaper
DISADVANTAGES:-
1. Difficult fault recognisation or isolation.
2. If main cable fails then all the network will broke
down.
3. It is difficult to move and change since they are all
link up together.
Bus Topology
Types of bus topology:-
22
Linear bus: - The type of network topology in which
all of the nodes of the network are connected to a
common transmission medium which has exactly
two endpoints (this is the 'bus', which is also
commonly referred to as the backbone) all data that
is transmitted between nodes in the network is
transmitted over this common transmission medium
and is able to be received by all nodes in the
network virtually simultaneously.
Distributed bus: - The type of network topology in
which all of the nodes of the network are connected
to a common transmission medium which has more
than two endpoints that are created by adding
Distributed Star
branches to the main section of the transmission
medium – the physical distributed bus topology
functions in exactly the same fashion as the physical
linear bus topology?
2) Star Topology: - Each device has a dedicated
point to point link only to the central controller,
23
usually called a hub. The devices are not directly
linked to each other.
Star Topology
If one device wants to send data to anther it sends
the data to the controller, which then relays the data
to the other connected device. In a Star Network the
entire network is dependent on the hub so if the
entire network is not working then there could be a
problem with the hub.
24
This feature makes it easy to troubleshoot by offering a
single point for error connection ad at the same time the
dependency is also very high on that single point.
ADVANTAGES:-
1. A Star Network Topology is very easy to
manage because of its simplicity in functionality.
2. The problems can be easily located logically in a
Star Topology and therefore is easy to
troubleshoot also.
3. The Star Topology is very simple in format so it
is very easy to expand on the Star Topology.
DISADVANTAGES:-
1. The Star Topology is fully dependant on the hub
and the entire working of the network depends on
the hub.
2. If there are many nodes and the cable is long then
the network may slow down and also it is difficult
to expand.
Extended Star
Between the central node and the peripheral nodes
beyond that this is supported by the transmitter power of
the central node or beyond that which is supported by
the standard upon which the physical layer of the
physical star network is based. If the repeaters in a
network that is based upon the physical extended star
topology is replaced with hubs or switches, then a hybrid
network topology is created that is referred to as a
physical hierarchical star topology, although some texts
make no distinction between the two topologies.
26
Distributed Star
27
Ring topologies typically utilize a token passing
scheme, used to control access to the network. By
utilizing this scheme, only one machine can transmit
on the network at a time. A token is used for
addressing which is a kind of value, address or
identification.
The device which has the token can transmit the data
and token can be one system at one time. A signal is
circulate at all time. If one device does not receive a
signal within a specified period, it can issue an alarm.
The alarm alerts the network operator to the
problem and its location.
Dual ring: - It is bidirectional that it can transmit
the data in both the directions. But at a time it can
transmit data only in one direction either clockwise
or anticlockwise.
Dual Ring
28
ADVANTAGES:-
1. Less cabling: - As devices are connected point to
point line configuration so less cabling is required.
2. Easy to install and reconfigure: - Each device is
linked only to its immediate neighbors. To add or
delete a device require moving only two
connections.
DISADVANTAGES:-
1. Time consuming: - It takes time to transmit data
from one computer to another because each
device has to wait for token to transfer the data.
2. Difficult to diagnose fault: - A break in the
network can break the entire network.
4) Mesh Topology: - In a mesh topology, every
device as a dedicated point to point link to every
other device. The term dedicated means that the link
carries traffic only between the two devices it
connects.
Mesh Topology
29
The value of fully meshed networks is proportional to
the exponent of the number of subscribers, assuming
that communicating groups of any two endpoints, up to
and including all the endpoints, is approximated.
31
The type of network topology in which a central
'root' node (the top level of the hierarchy) is
connected to one or more other nodes that are one
level lower in the hierarchy (i.e., the second level)
with a point-to-point link between each of the second
level nodes and the top level the central 'root' node,
while each of the second level nodes that are
connected to the top level central 'root' node will also
have one or more other nodes that are one level
lower in the hierarchy (i.e., the third level) connected
to it, also with a point-to-point link, the top level
central 'root' node being the only node that has no
other node above it in the hierarchy (The hierarchy
of the tree is symmetrical.)
Tree Topology
Each node in the network having a specific fixed
number, of nodes connected to it at the next lower level
32
in the hierarchy, the number, being referred to as the
'branching factor' of the hierarchical tree.
An example of tree topology is in cable TV technology
where the main cable from the main office is divided
into main branches and each branch is divided into
smaller branches and so on.
ADVANTAGES:-
1. It allows mare devices to be attached to a single
central hub and can therefore increase the
distance a signal can travel through the devices.
2. It allows the network to isolate and priories
communication from different computers
3. It is easy to expand as many nodes can be
connected.
DISADVANTAGES:-
1. If the root fails than the entire network will broke
down.
2. It requires more cables.
33
A hybrid topology is always produced when two
different basic network topologies are connected.
Two common examples for Hybrid network are: star
Ring network and star bus network
Hybrid Topology
A Star Ring network consists of two or more star
topologies connected using a multi-station access
unit (MAU) as a centralized hub.
A Star Bus network consists of two or more star
topologies connected using a bus trunk (the bus
trunk serves as the network's backbone).
ADVANTAGES:-
1. It can expand easily.
2. Provides more paths to transmit the data.
DISADVANTAGES:-
1. Requires more cabling.
2. Fault isolation is difficult.
34
SWITCHING
Switching is a method of joining various computers and
other networking components with each other without
having wires links from every one component to each
other.
Switching
A switched network consists of a series of interlinked
nodes called switches. Switches are hardware and
software device capable of creating temporary
connections between two or more devices link to the
switch but not to each other. In a switch network, some
of the nodes are connected to the communicating
devices. Others are used only for routing. There are
three methods for switching:-
1) Circuit switching:-Circuit switching creates a physical
connection between two devices such as phones or
computers. When one computer places a telephone
35
call, the switching equipment within the telephone
system seeks our physical path all the way from
telephone to receiver’s telephone. This technique is
called circuit switching. A circuit switching switch is a
device with n inputs and m inputs that creates a
temporary connection between as input link and an
output link. The no. of inputs does not have to
match the number of outputs.
Message Switching
Two types of message switching:-
1) Store and forward: - In this path is established
dynamic (it can change) there can be many
receivers but there need only the sender to send
the data.
38
2) Broadcasting: - In broadcasting there is one
address field and it checks the address and
accepted by that which having data address.
ADVANTAGES:-
1. There is no physical connection between then so
there will be no wastage of time to establish
connection between then.
2. Connection are dynamic means path for
communication can change, it is not fixed.
DISADVANTAGES:-
1. The buffer has the limited length and the message
can be large or small so for small message the space
for storage will be wasted.
2. The buffer has to wait for the entire data to
transmit, so it is time consuming.
3) Packet switching: - In a packet switched
network, data are transmitted in discrete units of
potentially variable length blocks called packets.
Packet Switching
39
The maximum length of the packet is established by the
network. Larger transmissions are broken up into
multiple packets. Each packet contains not only data but
also has a header with control information. The packets
are sending over node to node. At each node, the packet
is stored briefly then routed according to the information
in its header.
Two types:-
1) Datagram protocol:-in this each packet is treated
indecently from all others. Even when one packet
represents just as piece of multiple packet
transmission the network treats it as through it
existed alone. Packets in this technology are
referred to as datagram.
In this approach dynamic path is established. It is
connectionless. It also contain routing table which
having destination addressed port address. In this
there is a routing table which contains the
destination address and the port address.
2) Virtual circuit approach:-in this the relationship
between all packets belonging to a message or
session is preserved. A single route is chosen
between sender and receiver at the beginning of the
session. When the data are sent all packets of the
40
transmission travel one after another along that
route.
Three phases: -
1) Connection establish: - Need of user to establish
connection.
2) Data transfer: - Whether the data transferring is
through routing table.
3) Connection release: - After transferring the data
connection is release.
Two types of virtual circuit approach:-
1 ) Switched virtual circuit:-it is comparable
conceptually to dialup lines in circuit switching. In
this method a virtual circuit is created whenever it is
needed and exists only for the duration of the
specific exchange.
2 Permanent virtual circuit:-these are comparable to
leased lines in circuit switching. In this method, the
same virtual circuit is provided between two users on
a continuo’s basis.
Advantages:-
1) There are small sizes of packets and it is very fast.
2) It follows the dynamic path.
3) There are no chances of data loss.
Disadvantages:-
41
1) Data can be out of order when the source sends
the data to destination.
2) At destination the data has to reassemble to
create whole data.
NETWORK SERVICES:-
The network services can be services provided by the
network. Computer networking provides by the network
computer networking provides several important
services, both to organization and individual used. These
services can be provided in two ways:-
42
1) Connection Oriented: To use a connection
oriented network service, the service user first
establishes a connection, uses the connection and
then release the connection. The essential aspect of
a connection .The essential aspect of a connection is
that it acts like a tube, the sender pushes objects in
at one end and the receiver takes them one to the
other end.
43
OSI MODEL
OPEN SYSTEM INTERCONNECTION
It was established in 1947, the international standard
organization (ISO) is a multinational dedicated to over
wide. The purpose of OSI model is to show how to
facility communication between different systems without
requiring changes to the logic of the underlying hardware
and software. The OSI model it is not a protocol it is a
model for understanding and designed network
architecture that is flexible.
LAYERED ARCHITECTURE:-
The OSI model is composed of seven ordered layer
Physical, Data link, Network, Transport, Session,
Presentation, and Application. As the message travels, it
may pass through many intermediate nodes. These
intermediate nodes usually involve only the first
three layers of OSI model. This communication is
governed by an agreed-upon series of rules and
conventions called protocols. The process on each
machine that communicates at a given layer is peer to
peer process.
44
Layered Architecture of OSI Model
Interfaces between Layers:-
The passing of the data and networks information down
through the layers of the sending device and back up
through the layers of the receiving devices mode possible
by an interface between each pair of adjacent layers.
45
1) PHYSICAL LAYER: - It defines the
procedures and functions that physical devices and
interfaces have to perform for transmission to occur.
FUNCTIONS:
1. Physical characteristics of interfaces and
medium: - It defines the characteristics of the
interface between the device and transmission
medium, also defines type of transmission media.
2. Representation of bits: - It consists of stream of
bits with no interpretation. To be transmitted bits
must be encoded into signals electrical or optical,
and defines type of encoding.
46
3. Data Rate: - The transmission rate i.e. the number
of bits sent in each second is also defined by the
physical layer.
4. Synchronization of bits: - The sender and receiver
not only must use the same bit rate but also must be
synchronized at bit level.
5. Line Configuration: - It is concerned with the
connecting of devices in the media in a point- to –
point configuration two devices are connected
through a dedicated link.
6. Physical Topology: - It defines how devices are
connected to make a network by using any topology.
7. Transmission Mode: - It defines direction of
transmission between two devices as simplex, half-
duplex or full-duplex.
8. Signals: - Data is transmitted from one computer to
another computer in the form of signals. These
signals can be analog signals or digital signals.
9. Switching: - It defines how a link will be created
from sender to receiver and how data would be
transferred through this link. It used circuit
switching.
10. Frequency Spectrum: - The frequency
spectrum of a signal refers to its range of frequencies
from the lowest to the highest frequency carried by
the signal.
47
2) DATA LINK LAYER: - It transforms the
physical layer, a raw transmission facility to a reliable
link and is responsible for node to node delivery. It
makes the physical layer appear error free to the
upper layer.
Functions:
1. Framing: - It divides the stream of bits received
from the network layer into manageable data units
called frames.
2. Physical Addressing: - It adds header to a frame to
define the physical address of the sender or receiver
of the frame.
3. Flow- Control: - The data link layer imposes of
flow control mechanism to prevent overwhelming to
the receiver.
4. Error Control: - The data link layer adds the
reliability to the physical layer by adding mechanism
to detect and retransmit damaged or lost frames.
5. Access Control: - When two or more devices are
connected to a same link the data link layer
protocols are necessary to determine which device
has control over the link at any given time.
48
Data Link Layer is divided into two parts:-
i. MAC (Media Access Control):- The MAC sub layer
defines the methods by which multiple devices share
the same media channel. It includes the contention
methods and other media details. The MAC
address is the unique hardware address that is
burned into the hardware device.
Protocols used in MAC Layer:
I. Channel allocation problem
Two Types:
1. Static Channel Allocation method: It uses FDM
(Frequency Division Multiplexing). Channels are
divided into groups. In this more number of users
cannot access the channel so there can be wastage of
channels.
2. Dynamic Allocation method: In this channel is
allocated randomly according to the requirement of
the user. For e.g. 10 users can use 1 channel.
Terms Used:
Station Model: - It can be sender.
Single Channel assumption: - In this only one channel is
assumed and that is divided into multiple servers.
49
Collision Assumption:-
Continuous Time and Slotted Time: - Data can be
sending continuously or is divided into slots.
Carrier Sense: - Station model before sending the data,
sends a false signal and checked if channel is free then
only it will send data.
Protocols used in Dynamic allocation methods are:
Random Access Protocol:
ALOHA: - It was designed for radio LAN but it is used
on shares medium. It is based on contiguous data. When
the station sends data to another station, it may attempt
to do so at same time. So, the data from two stations
having collisions.
Slotted ALOHA: - In this time is divided into slots and
force the station to send only at the beginning of the time
slot. If station misses this movement, it must wait until
the beginning of next time slot. It is mainly used to
overcome the disadvantage of ALOHA.
Disadvantage: There is a possibility of collision if two
stations try to send at the beginning of the same time slot.
ii. CSMA (Carrier sense media access): - In the CSMA
false signals are send to check whether the station is
empty or not. It can reduce the possibility of
50
collision but it cannot eliminate it because of
propagation delay. When a station sends a frame, it
still takes time for the first bit to reach every station
and for every station to sense it.
There are two methods for CSMA:-
CAMA/AD:- Collision Avoided
CSMA/CD: - Collision Detected
i. LLC (Logical Link Control):- The LLC sub
layers establish and maintain links between
communicating devices.
Protocols Used in LLC:-
Noisy Channel: - The noisy channel is the error creating
protocols.
a. Stop and Wait ARQ: - Stop and Wait Automatic
Repeat Request add a simple error control
mechanism to the stop and wait protocol. Error
correction is done by keeping a copy of the sent
frames and retransmitting of the frame when timer
expires. Since the protocol uses the stop and wait
mechanism there is only one specific frame that needs
an ACK, even through several copies of the same
frame can be in the network.
b. Go back N ARQ: - In this protocol we can send
several frames before receiving acknowledgement. We
51
keep a copy of these frames until the
acknowledgement arrives. If acknowledgement is not
received than all the frames have to send.
c. Selective repeat ARQ: - In a noisy link of a frame has
a higher probability of damage, which means the
resending of multiple frames. In this mechanism it
does not resend N frames, when just one frame is
damaged. Only then the damaged is resend.
Noiseless Channel: - It is the error free channel in which
no frames are lost, duplicated or corrupted.
a) Simplest Protocol: - It is a unidirectional protocol in
which data frames are travelling in only one direction-
from the sender to receiver. The receiver can
immediately handle any frames it receives with a
processing time that is small enough to be negligible.
The data link layer of the receiver immediately removes
the header from the frame and hands the data packet to
its network layer, which can also accept the packet
immediately. And the receiver can never be overloaded
with incoming frames.
b ) Stop and Wait:- In this the sender sends one frame,
stops until it receives confirmation from the receiver and
then sends the next frame it is also unidirectional
communication for data frames.
52
3) NETWORK LAYER: - It is responsible for
source to destination delivery of a packet possibly
across multiple networks. It ensures that each packet
gets from its point of arise in to its final destination.
Functions:-
Logical Addressing: - The physical addressing
implemented by the data link layer handles the
addressing problem locally. If a packet passes the
network boundary we need another addressing system to
help distinguish the source and destination systems. The
network layer adds a header to the packet coming from
the upper layer that among the other thongs includes the
logical addresses of the sender and receiver.
Routing: - When independent networks or links are
connected together to create an internetwork or a large
network. The connecting devices route the packets to
there their final destination.
Protocols in Network Layer:-
ARP: - Address Resolution Protocol
It finds the physical address from logical address.
RARP:-Reverse Address Resolution Protocol
It finds the logical address from the physical address.
53
IP: - Internet Protocol
It is of 32 bits used TCP and from TCP/IP to provide
communication between two devices.
ICMP: - Internet Control Message Protocol
It deals with the message that is datagram. If any error
occurs in datagram while sending data from source to
destination using IP then it is used to detect the errors.
IGMP: - Internet Group Management Protocol
It is used to handle the group membership.
4) TRANSPORT LAYER: - It is responsible for
source to destination delivery of the entire message.
It treats each one independently as though each
piece belonged to a separate message, weather or it
does.
Functions:
1. Service Point Addressing: - The transport layer
header interface must include a type of address called
as service-point address.
2. Segmentation and reassemble: - A message is
divided into segment and each segment contains a
sequence number. These numbers enables the
transport layer to reassemble the message correctly in
the destination end.
54
3. Connection- Control: - The transport layer can
either connectionless or connection oriented. The
connectionless transport layer treats each segment as
an independent packet and delivers it to the transport
layer at the destination machine.
4. Flow Control: - It performs end to end link rather
than across the single link.
5. Error Control: - The sending transport layers make
sure that the entire message arrives at the receiving
transport layer without errors, it usually achieved
through retransmission.
Protocols used in Transport Layer:
a) TCP/IP Protocol suit: - In this the IP is not used
but UDP and TCP is used.
b) IPX/SPX Protocol: - Internet Protocol Exchange-
It is a connectionless Protocol.
Sequenced Packet Exchanged- It is connection
oriented Protocol.
55
5) SESSION LAYER: - It is the network dialog
controller established maintained and synchronizes
the interaction between communication systems.
Functions:
1. Dialog Control: - It allows communication between
two processes to take either in half -duplex or full-
duplex mode.
2. Synchronization: - It allows process to add check
points into a stream of bits. It sends the data
sequentially and provides sequence of all data.
3. Token- Management: - It manages the token for
transferring data.
6) PRESENTATION LAYER: - It is concerns
with the syntax and semantics of the information
exchanged between two systems.
Functions:-
1. Translation: - The processes in two systems are
usually exchanging information in the forms of
character strings number and source.
2. Encryption: - It means that the sender transforms the
original information to another form and sends the
resulting message over the network.
3. Compression: - Data compression reduce the number
of bits that be transmitted.
56
7) APPLICATION LAYER: - It enables the
user weather human or software to access the
network. It provides user interfaces and support for
services such as electronic mail, remote file access
and other type of services.
Functions:-
1. Network Virtual Terminal: - It is software version of
physical terminal and allows a user to log-on to
remote host.
2. File Transfer and Management: - It allows a user to
access files in a remote computer to retrieve file
from a remote computer and to manage or control
files in a remote computer.
3. Mail Services: - It provides basis for E-mail
forwarding and storage.
Protocols used in application layer:
1. FTP: File Transfer Protocol
2. HTTP: Hyper Text Transfer Protocol
57
TCP/IP
Transmission Control Protocol (TCP) was developed
before the OSI Model.TCP/IP protocol is made of five
layers: Physical Layer. Data link Layer, Network,
Transport and Application. The application layer in
TCP/IP can be equated with the combination of session,
presentation and application layer of the OSI model. At
the transport layer, TCP/IP two protocols TCP and user
datagram protocol. At the network layer the main
protocol defined by TCP/IP is internetworking protocol
(IP), although there are some other protocols that
support data movement in this layer. At this physical and
data link layer TCP/IP does not defines any specific
protocol. A network in a TCP/IP internetwork can be
LAN, MAN, WAN.
TELNET FTP SMTP DNS
TCP UDP
IP
ARPANET SATNET LAN
TCP is a connection oriented end to end protocol. The
protocol works in collaboration with IP and adds security
and reliability to the features of IP.
TCP SEGMENT:-
TCP segment is the unit of data transfer between any two
devices that use TCP. The segment is divided into two
58
parts. The part is called as header part and other one is
called is data part.
TCP header format:
60
conventional additional information to the receiver or
for alignment purpose.
UDP
User Datagram Protocol
The user datagram protocol is the simpler of the
two standards TCP/IP protocols. It is an end to end
transport protocol that adds only port addresses,
checksum error control and length information to
the data from the upper layer. UDP is called
connectionless, unreliable transport protocol.
UDP Packet Format:
62
Host Address:-It is the address of each computer and
separate address of each host computer.
Network Address: - It is the address of whole network.
The total number of networks in a class can be
calculated by n*n where n is the number of bits used to
identify the network number.
Types of Classes:-
Class A: - It is designed for large organization with the
large number of attached hosts. In this first octet of the
address is used to identify the network number and next
three octets are used to identify the host. The range of
class A is from 0 to 127.
Class B:-This is designed for mid size organizations with
tens of thousands of attached hosts. In this first two
octets are used to identify the network and next two for
host address. The range of class B varies from 128 to
191.
Class C: - It is designed for small organization with a
small number of attached hosts. The first three octets are
used to identify the network identification and last one
octet is used to identify the host address. The range of
class C is from 192 to 233.
Class D: - It is used for multicasting. Multicasting allows
copies of a datagram to be passed to a select group of
63
host rather than to individual host. The range of class D
is from 224 to 239.
Subnetting
The sub netting procedure divides a network into several
sub networks in such a way that each of these subnets has
its own address. The subnet address is created by
dividing the host address into network address.
There are five steps in subnetting:-
1. Requirement Analysis
2. Partitioning network address and host address
3. Determining the subnetting mask
64
4. Determining subnet address
5. Determining the host address for each subnet
For e.g. IP address is 211.71.9.0
And subnets that have to create are 8 subnets by
following the five steps:
1 Requirement analysis: In this step which class has to
do subnetting and how many subnets will be there?
The class A and class B avoid creating subnetting
because there are many host computers, and class C
has the minimum number of hosts. Subnets are always
created in the power of 2. Therefore 2*2*2=8 subnets
Convert the address into binary format i.e.
11011011.01000111.00001001.00000000
2 Partitioning network address and host address: -
000.00000:- In this first three bits are assigned for
subnet bits and last five bits are assigned for host bits.
So, 2*2*2*2*2-2=30 host computers.
3 Determining the subnet mask
000 0000
111 0000 -224
Convert the subnet bits into 1’s:
255.255.255.0
65
255.255.255.224
4 Determine the address of subnet
211.71.9.0
000:00000-0
001:00000-32
010:00000-64
011:00000-96
100:00000-128
101:00000-160
110:00000-192
111:00000-224
Subnet Address:
211.71.9.0
211.71.9.32
211.71.9.64
211.71.9.96
211.71.9.128
211.71.9.160
211.71.9.192
66
211.71.9.224
5 Determining the host address:-
211.71.9.0
000 0000
000 11110-30
211.71.9.32
001 00001
001 11110-62
211.71.9.64
010 00001
010 11110-94
211.71.9.96
011 00001
011 11110-126
211.71.9.128
100 00001
67
100 11110-158
211.71.9.160
101 00001
101 11110-190
211.71.9.192
110 00001
110 11110-222
211.71.9.224
111 00001
111 11110-255
Supernetting: -
Most of the class A and class B address were depleted
how ever there was still a huge demand for mid size
blocks. In this super netting decrease the number of
ones in the mask. But the main disadvantages of super
netting is, there is wastage of host computers, so to
68
overcome use CIDR (classless inter domain outing)
notation. To overcome address depletion to give more
organization access to the internet, classless addressing
was designed and implemented. Here are no classes, but
the addresses are still granted in blocks.
IPV4:-Internet protocol version 4
The network layer protocol in TCP/IP protocol suite is
currently IPV4.it provides host to host communication
between systems in the internet. It is connectionless and
data is divided into packets.
IPV4 PACKET FORMAT:-
69
3) Type of services: - It is 8bit field and it provides 8 type
of service.
In this field 8th, 9th, 10th are precedence field.
11th bit is for delay.
12th bit is for throughput.
13th bit is for reliability.
14th and 15th are reserved for future use.
4) Total length:-It determines the total length of data.
5) Identification: - Identify the packet from the source. It
identifies the source and used in destination.
6) Flags:-Two types of flag
1. Don’t fragment:-Cannot either packet further
2. More fragments:-It is used at destination, it check
destination have received data not
7) Fragment offset:-it fragment address.
8) Time to live:-It indicates that till how much time
packet alive in the protocol. It is used for checking status
that page can displayed.
9) Protocol:-whether to use TCP/IP or UDP.
10) Checksum:-for detecting the errors.
70
11) Source address:-It having the sender addresses and it
is of 32 bits.
12) Destination address:-Receiver address it is of 32 bits.
13) Optional:-It can be used or not.
Three types of connections:-
1) Security:-the security can be used or not.
2) Stick management:-if it is set path is used or one
prescribing path can be used.
3) Loose source routing:-It can go to any path as the
user wants.
14) Data:-The actual data is to be transmitted.
71
Protocol Suite
Every layer has different protocols:
Lower Layer Protocol-MLID
Middle Layer Protocols-IPX,SPX,RIP & NLSP
Upper Layer Protocols-NCP,SAP
Protocol Suit
Lower Layer Protocol:-
MLID: - It stands for multiple inter face driver.
It deals with media. It is a LAN driver which
works on media access and data link layer. It
may be different at each station.
72
It uses two mechanisms for passing data:-
1. Random Access or Contention Method: - In this
there is no static allocation of channels. In this
sender can check the channel by sending dummy
signal that the channel is empty or not. If channel
found to be empty then the sender can send data
otherwise it has to wait. The channels are not fixed,
when a channel is used by one sender than it can be
used by the other sender when it will be free.
2. Token Passing: - Token is a unique identification
number. Which is having the token can only send
the data.
MLID work as software. It provides the interface
between user and NIC. Its main purpose is to
communicate with NIC.
Middle Layer Protocol:-
IPX: - Internet Packet Exchange or Internetwork
Packet Exchange.
It works on network layer of OSI model and works
on Internet Layer of IPX/SPX model.
It has two functions: -
1. Logical Addressing
2. Routing
73
It is used to route the packets in an internet work which
is called routing. Routing is the shortest and efficient path
from source to destination. It performs dynamic route
selection i.e. data can pass through any path and uses
RIP protocol for dynamic route selection.
It is a connection less datagram approach and also
unreliable protocol and not suitable for various types of
services.
It deals with the IP addresses and responsible for source
to destination delivery of packets.
SPX: - Sequenced Packet Exchange
It works on transport layer of OSI model and
provides reliability, segmentation of data and
reassembles data at destination. It received
acknowledge after receiving the data.
RIP: - Routing Information Protocol
It contains a routing table which contains the
address and information of different ports.
It uses a technique called as distance vector routing
to check how many hop counts a data packet can go
through.
Hop Count: - It is the number of intermediate
nodes between the sender and the receiver.
NLSP : - Network Link Service Protocol
74
It works on Internet layer of IPX/SPX but also on
network layer of OSI model. When any change
occurs on the network then NLSP broadcast the
information i.e. adding of node, deletion of node,
insertion of node. It can also work as routing.
Upper Layer Protocols:-
NCP: - Network Core Protocol.
This protocol is used to share the devices on the
network. For e.g. if a printer is connected in the
network then the number of computers or nodes
can share it.
It is also responsible for sending and receiving the E-
mail.
Services provided by NCP include the file access,
printer access, accounting, security and file
synchronization.
SAP:- Service Advertisement Protocol
It is used by file and print servers to announce their
services and addresses.
SAP advertisement is sent via SAP after 60 seconds.
These services are identified by hexadecimal number
called SAP identifier.
75
INTERNET PROTOCOLS
IP is also known as ARPANET (Advanced Research
Project Agency of Networks).IP works in collaboration
with TCP because it is connectionless and unreliable
protocol.
IP protocols divided into two parts:-
Middle layer protocol-IP, ARP, ICMP,
RIP,IGMP,OSPF, DNS, RARP
Upper Layer Protocol-FTP, TELNET, SMTP
Middle Layer Protocols
IP: - Internet Protocol
It is unreliable protocol because it is a connectionless
protocol. IP assumes that the reliability of underlying
layers and its best to transmission through to its
destination but with no guarantees. If the reliability is
important then it must be paired with protocol like TCP.
Two versions are used:
IPV4
IPV6
ARP:- Address Resolution Protocol
It is used to find the physical address from the logical
address. When sender wants to send data then both
76
physical and logical address are needed but if sender
does know the receivers physical address then it generate
an ARP request which contains sender logical and
physical address and receiver’s logical address, only. The
ARP packet is broadcasting then only those node
responses which have the physical address.
PROTOCOL STACK OF ARP:-
Hardware Type (16- Protocol Type (16-
bits) bits)
Hardware Protocol Operation
Length (8- Length (8- Request
bit) bit) Reply (16-
bit)
Sender Physical Address
Sender logical Address
Destination Physical Address
Destination Logical Address
78
2) Time exceeded: - in this the time to live expire
then message come time exceeded.
3) Redirection: - If message is transferred to wrong
direction then message come to redirect.
4) Echo request reply: - Echo request is used to
check whether the destination is present or not
and the reply is to corresponding request.
5) Source quench: - To slow down the speed from
sender side (because sender send it very fast and
receiver cannot receive it.
IGMP: - The IGMP gives the multicasting routers
information about the membership. A multicast router
receives thousands of packets everyday for different
groups. If a router has no knowledge about the
membership status of the hosts. It must broadcast all
the packets. It helps to create or update the list.
Packet format of IGMP:-
Type (8-bit) Maximum Checksum
Response (16-bit)
Time (8-bit)
Rest of Data
Group Address
80
FTP Connection
Although transferring files from one to system to another
seems simple and straight forward. For e.g. two systems
may be different filename conventions. Two systems may
have different way to represent text and data. Two
systems may be different directory structure.
2) TELNET:- TELNET stands for terminal networks.
TELNET
It is the standard TCP/IP protocol for virtual terminal
service. TELNET enables the establishment of a
connection to create a remote system in such a way
81
that the logical terminal appear to be a terminal at the
remote system.
3) SMTP: - Simple mail transfer protocol. The actual
transfer mail transfer is done through message transfer
agents.
SMTP
To send mail a system must have the client MTA
(message transfer agent) and to receive mail, a system
must have a system must have a server MTA. SMTP is
used three times b/w the sender and the sender’s mail,
server and b/w two mail servers and unauthorized
protocol is needed b/w the mail server and the receiver.
82
MEDIA CONNECTIVITY:
It is defined as how connections are establishing in
voice, video, text and simple comprise media.
Techniques:
1) Leased Lines: - Leased line is a permanent
telephone connection between two points setup by the
telecommunication carrier. A leased line is also
sometime referring to as a dedicated line. They can be
used for telephone data or Internet services. A leased
line is a telephone line that has been leased for private
use.
Leased Line
Benefits:-
1. Faster download and upload speed
2. Wide choice of bandwidth
3. Guaranteed bandwidth for business usage
83
Typically leased lines are used by business to connect
geographically distant offices. Unlike, normal dialup
connection a leased line is always active. The fee for the
connection is fixed monthly rate.
Types:-
i. T-1: - It is a type of leased line that provides a
maximum transmission speed of 1.544 mbps and
channel supported by leased line are 24-channels
each of 64-kbps.T-1 support full-duplex
transmission mode.
Disadvantages:-
It uses 24- channels if there are less than 24
channels than other channels will be wasted so
to overcome this, fractional T-1 line is used.
Fractional T-1:- In this according to the
requirement of user the channels are granted.
ii. T-3: - It support maximum transmission speed
44.736 mbps.
Optical fiber is used and supports high data rate so.
It is useful to
Transfer movies and also cost effective.
2) VSAT: - It stands for very small aperture terminal. It
is a satellite communication device that allows reliable
data transmission via a satellite uses small antennas of
0.9 to 1.9 meters which is about 3.7 feet. VSAT has
84
got terminal arranged in a star configuration into the
central hub station that is connected to the host
computer. VSAT configuration is made of two
segments where one segment is known as the earth
segment this segment
VSAT
Has equipment both at the central hub and at
remote location. The other segment is known as
space segment.
Frequencies:-
C-band
Extended C-band
Ku-band
85
VSAT Architecture:-
1. Single channel per carrier: - Permanent channel
is establishes between user and VSAT and flexibility
of adding new devices and cost increases.
2. Multi-Channel per carrier: - Multi channel
between user and VSAT, data send with higher
speed.
3. Time- Division Multiplexing: - In this links are
shared.
VSAT Access Technology: -
PAMA: - Pre assigned multiple accesses.
Permanent VSAT connection exists between user
and VSAT and user need to pay entire link.
DAMA: - Demand assigned Multiple Access.
According to the demand channel are allocated to
the user and connection is not permanently setup.
Disadvantages:-
1. Heavy wind and rain can degrade the quality of
connection.
2. It is less fast than digital subscriber line but faster
than dialup.
3) PSTN: - Public Switch Telephone Network
When two computers owned by the same company
and located close to each other need to
86
communicate it is easy to run a cable between them.
However when the distance are large or there are
many computers or the cable have to pass through a
public
Road the cost of running private cables are usually
prohibited
Major Components: -
1. Local loops: - Twisted pair cables that connects
the subscriber telephone to the nearest end office or
local central office. One number is associated with
the local loops. First three numbers define the
office and next digit defines the local loops number.
2. Trunks: - Digital fiber optics connects to switching
offices.
PSTN
3. Switching Offices: - Where calls are moved from
one trunk to another.
87
Working: - If a subscriber connected to a given end
office calls another subscriber attached to same end
office the switching mechanism with in the office setup a
direct electrical connection between two local loops. This
connection remains instant for duration of call.
If the caller and cally do not have a toll offices common
then the calls are made via a regional offices called inter
toll trunk. Regional offices are at the top hierarchy of
offices being used in telephone network.
4) ICDN: - Integrated content delivery Network
It is a system of computers network together across the
Internet that cooperate transparently to deliver content to
end user.
Content Network Technique: -
Web Cashing: - Popular content sore in server when
request comes than send the content.
Server Load Balancing: - It uses switches, web content
and multilayer switch used to share the traffic among
different stations.
Request Routing: - Request only where the contents are
available.
Content Services: - Load balance
Protocols:
88
Internet Content Adaptation protocol:- Used to
connect server only open pluggable edge service.
P2P:- Peer to peer, low cost and efficient distribution
of content.
5) IPLC: - International Private leased circuit
Dedicated links that offers point-to –point
transmission. Capacity to connect office to other
location allows secure and reliable transfer of
information in the form of text and data.
IPLC
Features:
High speed large volume application requiring mbps
speed.
Dedicated point to point linkage, security and privacy
for an exclusive corporate network.
High Quality, high availability and extreme reliability.
89
6) RF:- Radio Frequency
Radio frequency (RF) is a rate of oscillation in the
range of about 30 kHz to 300 GHz, which
corresponds to the frequency of electrical signals
normally used to produce and detect radio waves. RF
usually refers to electrical rather than mechanical
oscillations, although mechanical RF systems do exist.
90
The frequency of an RF link usually expressed in hertz.
1 Hz=1cycle/second
1 MHz=1million cycle/second
91
CONNECTIVITY DEVICES
1 NIC: - Network Interface Card
Network Interface Card or Network Adaptor Card
works in physical and data link. Used to transmit data
from one computer to another.NIC address called as
physical address and it is unique for all devices. Now it
is inbuilt in the motherboard.
Working: When computer send data from one
computer to another it is divided into frames and it
will deliver data through cable in the form of signal.
Functions:
1 Host-To-Card communication
2 Buffering
3 Frame Creation
4 Parallel to Serial conversion
5 Encoding
NIC
92
Factors that effects the performance of NIC:
Bus speed
PCI slots are best for performance
Memory
DMA
I/O main memory
Hardware Configuration: Jumper, DIP Switches
Software Configuration: CD
2 HUB: - It is a central concentrating point for
computer networks. It provides a central data point
for network cabling only co-axial cable Ethernet
does not uses hub at all. Most of the LAN used hub
to interconnect computers and other device.
HUB
Classification:
1. Passive Hub: They are only used to combine the
signal from several network cable segments.
93
All devices attached to a passive hub receive all
packets that pass through the hub. The distance
between the computer and the hub can be no more
than half the maximum permissible distance
between two computers on the network. It do not
amplify the signal and provide interface.
2. Active Hub: It regenerate the signal distance
between two network components can be increased.
In this electrical power is required.
3. Intelligent Hub: It is similar to active hub but having
additional features.
Repeater
Even though repeaters enable signals to travel further
the maximum propagation delay still sets a limit to the
maximum size of the network.
94
4 ROUTER: It finds the shortest path then forwards
the massage. It is used to connect subnets. Two
planes should be there:
Control Plane: Only determine possible path to send the
data.
Forward Plane: Send the data through actual path.
Router
Types:
1. Provide edge router: These are placed on the
Internet side or provider side.
2. Subscriber Router: It is placed at the subscriber side.
3. Inter Provider Border Router: When different ISP is
needed then it is used.
4. Core Router: Router that is lie in the middle of the
LAN.
5 MULTIPLEXER/DEMULTIPLEXER:
This device is used for multiplexing and for de-
multiplexing.
95
Multiplexing: It is a technique of transmitting signals
from several sources over a single communication
channel for maximum utilization and to save the cost of
the channel.
96
6 MODEM: It is a modulator and demodulator that
are used for modulation and demodulation. It
converts digital to analog called modulation. Modem
is used for Internet purpose.
DCE (Data Circuit Equipment): Used to connect
DTE (Data Terminal Equipment)
Modem
Features:
Speed at which data is send
Auto Dial and Redial
Types:
1. External Modem: Connected with serial port
2. Internal Modem: Inbuilt in motherboard
97
7 SWITCHES: It works on data link layer and it is
used to connect two different segment of same
network. When data reach to switch than divided
into frame and that frame contain the MAC address
of destination. Switch contains the list of address
MAC.
Methods for transmitting data:
1. Cut-Through Switch: Simply transmit the data
through switch. It is fast to transmit data but error
prone.
2. Sore and Forward: First data is stored and then
forward, until the data becomes error free. It is error
free but slow speed.
7 Bridges: They exist in data link layer and physical
layer. They are used in same LAN but different
protocols. It contains MAC and port Address.
Local Bridge: They are used in small networks.
Remote Bridge: They are used to connect far
networks.
Switch
98
Types:
1. Transparent Bridge: It is used for filtering. In filtering
packets are discarded which are part of same
network.
2. Forwarding: It forwards the packets.
3. Source Bridge: It sends dump packet to multiple
paths and then selects one path.
8 GATEWAY: It connects heterogeneous network
works on seven layers.
Three Types:
1. Network Gateway: It connects different network
that uses same network layer protocol.
2. Protocol Gateway: It connects different network
used different protocol.
3. Tunnel Gateway: In this source adds the
header of the receiver so that data can reach at
destination.
99
Firewall
Types:
1. Packet Filter: In this according to IP or
destination port packet is to be sending or
discard.
VOIP
SIP: Session Initiated Protocol
It is the protocol which used to establish communication
link.
101
Types of messages:
Invite: Caller initialize the request to the cally through
invite message.
Ack: Cally will send ok to caller and caller will
recognize acknowledgement.
Bye: Caller will terminate the connection by bye
message.
Cancel: Used to cancel the message.
Register: If person is not available on system than the
message will send through register message.
Address mechanism in SIP:
103
3. TEXT: - It is used to send a simple text print job
to a printer that cannot interprets simple text.
The spooler creates a new print job, embedding
the text in print instructions that are derived from
the printer’s defaults for font, form and
orientation.
The TEXT data type uses the ANSI character set.
Network Printing Architecture:-
Network printing components include a server
spooler on a print server running a product in the
Windows server 2003 family and a client spooler
running on a client computer. Because print job
usually originate on a client computer, this section
first describes the architecture of the client spooler.
Client Spooler:-The client spooler
(Winspool.drb) is the component on windows
operating systems that delivers print jobs from
applications on the client computer to print server.
On client computers running Windows XP
Professional or Windows 2000 operating system,
prints jobs are delivered directory to client spooler;
on other Windows operating systems, a redirector is
necessary to deliver print jobs to the client spooler.
104
Windows clients and non Windows clients include the
following operating system:-
Client Spooler
Windows clients: - Client computer run Windows 95,
Windows 98, Windows Millennium edition, Windows
2000, Windows XP or Windows server 2003.
Non-Windows clients: - Clients computers run UNIX,
Apple Macintosh or MA-DOS.
105
Components of client computers that generate and send
print jobs:-
Components Description
Windows Application Any program that creates
printable data.
Non-Windows Application Any programs that creates
printable data.
Client Spooler Processes and sends print
jobs from the client to print
serve.
GDI(Graphics device Provides services to the
interface) printer driver,
Including caching, client-
server communication and
character conversion.
Printer Driver Communicates with print
devices to generate output
from data supplied by the
GDI.
LPR(Line printer remote ) Protocol that sends print
jobs to a server running the
server side protocol,
LPD(Line printer daemon)
AppleTalk Protocol used by
Macintosh clients and
Windows server.
106
Netware Protocol used by NetWare
clients for file and print
services.
Server Spooler
Components of network printing on Windows server
2003:-
Component Description
Print Spooler service Manages the printing
process, Which includes
retrieving the location of
the correct printer driver,
loading the driver, spooling
high level function calls into
a print job, scheduling the
108
print job for printing.
Print Router Routes print jobs.
Local Print Provider Provides job control and
printer management
capabilities.
Print Monitor Directs print jobs to the
language monitor and port
monitor.
Language Monitor Provides by directional
communication between
the print device and the
client.
Local and remote port Sends print jobs to print
Monitors devices that are attached to
local and
Remote ports.
GDI(Graphics Device Provides services to the
Interface) printer driver, including
caching, client-server.
Communication and
character conversion.
Printer driver Communicate with print
devices to generate output
from supplied by the GDI.
Remote print provider Directs print jobs to remote
print servers.
Local print devices Prints device-specific data.
This device is attached to a
local port on the server.
Remote print device Prints device-specific data.
109
This device directly
connected to the network
and managed by this print
server.
Remote print server Accepts print job for print
devices it manages.
111
Press next and the necessary printer software will be
copied from the desktop to your laptop. In some cases,
you may need to insert the CDROM with the printer
driver, but usually not. The Printers and Faxes window
should show your newly configured printer. If you have
more than one printer defined, take note of which is the
default printer. When you print from the laptop, the
print job will go to whatever printer you have defined as
your default printer. To change the default printer, right-
click on the desired printer and select the Set as default
option, or just select the printer you want to use from the
application that you're working in.
112
CRYPTOGRAPHY
It is used to kept secret data from the competitor in the
organization. Two techniques are used in cryptography
.One is called ENCRYPTION and other is called
DECRYPTION.
Encryption-: It is a process of changing the data into
some other form that looks meaningless to other person
.This form of data is called cipher text.
Decryption-: it is a process to transferring cipher text into
plain text.
113
1) Conventional Method-: This method is used same
encryption and decryption key and keeps it as secret
.This method is further divided into two categories.
a) Character Level -: In this method encryption is done
at character level.
In this mainly two method are used-
1) Substitution-: It is the simplest form of encryption. In
this each character is replaced by some other valid
character set. This type of encryption is called mono
alphabetic encryption. The logic of this encryption is just
add a no in ASCI code of each character .For example –
if the encryption key is 4 then and language is used en
gilt then each character is represented by the character
that is located 4 digits ahead of the character . This
means the word HEMANT is encrypted as LIQERX.
Other type of substitution encryption is:
Poly alphabetic: In this different occurrence of same
character is represented by different codes .For example
–the string DEAR DEAR will be encrypted as EGDV
JLIA.
b) Transposition encryption-: In this type of encryption
the original plaintext form is retained but their position is
changed to create cipher text. Text is organized into rows
114
and columns and columns are interchanged with each
other.
2) Bit level encryption-: This type of encryption is used
with text, graphics, audio and video formats.
In this data first divided into blocks and then different
encryption technique used on data.
a) Encoding and decoding-: In this technique encoder
and decoder are used to change the no of bits of data. A
decoder change n bits input into 2n bits output.
b) Permutation-: Transposition at bit level is called as
permutation. In this process the no of bits in input and
output remain the same but the position of bits is
changed to create cipher text.
c) Substitution-: Encoder, decoder and P boxes can be
combined to substitute n bits in the input n bits in the
cipher text
d) Product-: P box and s box are combined to form a
combined structure called as product. There may be
several stages of P box and S box in a product.
e) Exclusive-OR-: This operation is same as used in logic
gates. The output of the operation is 1 if both the bits are
same. In this process a secret key is taken and it’s
exclusive OR operation is done with the input and
creates cipher text.
115
f) Rotation-: In this method the individual bits are shifted
either from left to right or from right to left. The no. of
bits rotated is used as the key for encryption.
116
BLUETOOTH
Bluetooth is a wireless LAN technology. It is designed to
connect devices of different functions such as telephone,
notebooks, computers, cameras. A Bluetooth LAN is an
adhoc network which means that n/w is formed
simultaneously. IEEE standard for Bluetooth is
802.15.this standard defines a wireless personal area
network (PAN) operable in an area the size of room or
hall.
Applications:-
1) Peripheral devices such as a wireless mouse or
keyboard can communicate with the computer
through this technology.
2) Mounting devices can communicate with sensor
devices in a small health care center.
ARCHITECTURE OF BLUETOOTH:-
1) PICONET: - Bluetooth network is called piconet.
A piconet can have up to 8 stations, one of which is
called primary and the other is called secondary.
117
Piconet
2) SCATTERNET: - Piconet can be combined to
form a scatter net.
Scatternet
A secondary station in one piconet can be primary of
other station. The station can receive messages from
primary in the first piconet.
BLUETOOTH DEVICES: - It has a build in short
range radio transmitter. The current data rate is
1mbps.this means that there is possibility of interference
between the IEEE 802.11b wireless LANs and
Bluetooth LANs.
118
BLUETOOTH LAYERS:-
1) Radio layer: - it is the physical layer of internet
model. Bluetooth devices are low-power and have a
range of 10m.
2) Baseband layer: - MAC sub layer in LAN. It uses
TDMA which divides the time is into sots.
119
Channel ID: - Defines a unique identifier to the virtual
channel created.
Data & control: - Original data that has to be send. Data
can be up to 0 to 65,535 bytes.
FRAME FORMAT:-
THREE TYPES OF FRAMES:-
One slot:-625ms
Three slot:-3*625ms
Five slots:-5*625ms
Access Code Header (54- Data (0 To
(72-Bits) Bits) N Bits)
120
BROADBAND
WIRELESS MAN or WI-MAX.
The IEEE standard of wi-max is IEEE 802.16. Provide
the interconnectivity if several kilometers.
Protocol stack of broadband:-
Upper Layer
Service Specific Convergence Layer
Mac Sub layer
Security Sub layer
Transmission Convergence Sub layer
QPSK (2-Bit) QAM-16 QAM-64
121
2) DLL: - consists of three sub layer-
Security sub layer: - deals with security like
encryption or decryption.
Mac sub layer: - used for actual data transmission.
Deals with channel management.
WI-FI
The standard of Wi-Fi is 802.11b. It stands for wireless
fidelity. It is the technique of sending OFDM. Invent by
integrand cooperation. Connections are peer to peer.
Speed is high providing more provide VOIP.
Advantages:-
1) No wires.
2) Inbuilt in laptops.
3) Compatible with other Wi-Fi standard.
Disadvantages:-
1) Limited range.
2) As a distance will increase the performance
will degrade.
3) Radio waves are use to transmit the data.
Wireless Network: -
Wireless network refers to any type of computer network
that is wireless, and is commonly associated with a
telecommunications network whose interconnections
122
between nodes are implemented without the use of
wires. Wireless telecommunications networks are
generally implemented with some type of remote
information transmission system that uses
electromagnetic waves, such as radio waves, for the
carrier and this implementation usually takes place at the
physical level or "layer" of the network.
Wireless Network
123
Wireless LAN
A wireless local area network (WLAN) links two or
more devices using a wireless distribution method
(typically spread-spectrum or OFDM radio), and usually
providing a connection through an access point to the
wider internet. This gives users the mobility to move
around within a local coverage area and still be
connected to the network.
Fixed Wireless Network: This implements point to
point links between computers or networks at two
locations, often using dedicated laser beams. It is often
used in cities to connect networks in two or more
buildings without physically wiring the buildings together.
Wireless MAN
Wireless metropolitan Area Network is a type of wireless
network that connects several Wireless LANs. WIMAX
is the term used to refer to wireless MANs and is
covered in IEEE 802.16d/802.16e.
Wireless WAN
Wireless Wide Area Network is wireless networks that
typically cover large outdoor areas. These networks can
be used to connect branch offices of business or as a
public internet access system. They are usually deployed
on the 2.4 GHz band. A typical system contains base
station gateways, access points and wireless bridging
relays.
124
Mobile devices network
Mobile Telecommunication
With the development of cellular telephone network
routinely carry data in addition to telephone
conversations:
Global system for mobile communication (GSM): The
GSM network is divided into three major systems: the
switching system, the base station system, and the
operation and support system. The cell phone connects
to the base system station which then connects to the
operation and support station; it then connects to the
switching station where the call is transferred to where it
needs to go. GSM is the most common standard and is
used for a majority of cell phones.
Personal communication service (PCS): PCS is a radio
band that can be used by mobile phones in North
America and South Asia. Sprint happened to be the first
service to set up a PCS.
D-AMPS: Digital Advanced Mobile Phone Service, an
upgraded version of AMPS, is being phased out due to
advancement in technology. The newer GSM networks
are replacing the older system.
125
Network Troubleshooting
It is defines as to recognizing and diagnosing networking
problems with the goal of keeping your network running
optimally.
Type of problems that occur in network:-
1) Connectivity problem: - It occurs when stations
cannot communicate with area of your LANs or
WANs. It include:-
Connectivity problem: - User not able to access the
network.
Intermittent problem: - It comes when system not
properly works there is hang problem.
Time out problem: - When your time finishes before
delivery of packet.
2) Performance problem: - It comes due to slow
speed, slow response time. Throughput is very
inefficient.
Troubleshooting Strategies: - It specify the how various
steps troubleshoot that where is any problem occur or
not. If you notice change your n/w asks following
question:-
1) Is the change expected or unusual?
2) Has the event occurred or not?
126
3) Does the change involve the device or n/w
path?
Troubleshooting
Network troubleshooting framework:
127
1) Status watch: - It stores the information of sending
or discard packet.
2) LANs entry manager: - in this there is
3) Traffic manager: - it controls the traffic and
routing.
Various steps involving troubleshooting:-
1) Recognizing the problem: - the first step is to identify
and interpret the symptoms.
2) Understanding the problem: - in this step is to
determine the physical connection.
Following steps for the understanding the problem:-
Valid service:-in this check the device service
configuration.
Restricted access: - in this step station supposed to
able to connect with specific device.
Correct configuration: - check the configuration of IP
address, subnet mask, gateway or broadcast address.
3) Identify And Testing the cause of the problem
4) Solve the problem
Troubleshooting Tools:-
1 Protocol analyzer: - It can be hardware or software so
which is used to measure monitor or your traffic.
128
2 Digital voltmeter: - Electronic measure tool to check
the measure voltage of multimeter also used to find the
break.
3 Time domain reflect meter: - It uses the sound waves.
Signal send to the n/w cable.
4 Oscilloscope: - We see the functions in the signal
voltage. And helps to find fault in the cable.
5 Send and receive package: - It is software tool. It is
used to connect two computers through NIC card.
Some commands are used in n/w tool:-
1) Ping: - It tells that we are connected to server or
not.
2) IP config: - Display current status of n/w used in
Windows 95.
3) ARP: - It is used to deal with duplication of IP
address.
4) SNOOP: - It is used to write files on your systems.
5) NDD: - It is used to correct the syntax. It is used
to set the particular syntax.
6) NETSAT: - It is used to check the n/w status.
7) Trace out: - It is used to check the root of
network.
129
LAN-SETUP
Setting up a local area network (LAN) today is easier
than ever before with plenty of low-cost networking
technology options available. Further, for internal LANs,
security devices and software are more accessible and
also less expensive. Whether you want to connect users
internally within an organization or at home, setup
internal LAN for easy Internet and Intranet access.
Difficulty: Moderately Challenging
LAN Setup
Instructions
Things that Needed:
Server
Routers
Security software
Connection wires
1 Know that internal LANs allow related and
authorized users to share information on a local
130
network. Connect multiple computers within
your home or organization. Allow users to
easily share important information, programs
and the Internet.
2 Designate one computer within your LAN area
as your server. Use a computer that won't likely
be moved since it will be the focal point of your
internal LAN. Keep it in a safe and secure
location.
3 Purchase and install a router. Attach either a
wireless or another type of router to your
server. Run the software that comes with the
router. Follow the directions and hook up
appropriate wires between your Internet
connection, the router and your server.
4 Make sure you have a connection to the
Internet. Check other computers to setup
internal LAN. See if you can connect to the
network from each computer in your LAN.
Realize if you set up a wired LAN, you need to
run wires throughout your organization or
home to connect computers to the server. Run
wires through air conditioning vents to avoid
drilling into walls, hanging wires against walls or
running them along the floor.
5 Add a firewall to your server and to computers
on your network to setup internal LAN. See
that some routers come with security features,
including firewall protection. Use password
protection also when installing your router to
131
keep outsiders from accessing your internal
LAN.
6 Understand that some LANs include
computers located around the world, but users
on those computers are authorized to enter and
utilize the LAN. Find also that many LANs are
connected in multiple ways (e.g., satellite,
wireless and Ethernet).
132
LIMITATIONS
133
CONCLUSION
A network is a set of devices connected by media links.
A node can be a computer, printer or any other device
capable of sending and receiving data generated by other
nodes on the network.
From computer network project we conclude that we can
share many devices through networking. So networking
is time saving and less costly. We can access the
information from anywhere through computer
networking or it is fastest source for accessing the
information.
134
BIBLIOGRAPHY
ONLINE RESOURCES:
http://www.google.com
http://www.wikipedia.org
135
136
138