Computer Networks (3) (1)
Computer Networks (3) (1)
Types of PAN
● Wireless Personal Area Networks: Wireless Personal Area Networks are created
by simply utilising wireless technologies such as WiFi and Bluetooth. It is a low-
range network.
● Wired Personal Area Network: A wired personal area network is constructed using
a USB.
Advantages of PAN
● PAN is relatively flexible and provides high efficiency for short network ranges.
● It needs easy setup and relatively low cost.
● It does not require frequent installations and maintenance
● It is easy and portable.
● Needs fewer technical skills to use.
Disadvantages of PAN
Applications of PAN
Local Area
Network (LAN)
Advantages of a LAN
● Privacy: LAN is a private network, thus no outside regulatory body controls it, giving
it a privacy.
● High Speed: LAN offers a much higher speed(around 100 mbps) and data transfer
rate comparatively to WAN.
● Supports different transmission mediums: LAN support a variety of
communications transmission medium such as an Ethernet cable (thin cable, thick
cable, and twisted pair), fiber and wireless transmission.
● Inexpensive and Simple: A LAN usually has low cost, installation, expansion and
maintenance and LAN installation is relatively easy to use, good scalability.
Disadvantages of LAN
● The initial setup costs of installing Local Area Networks is high because there is
special software required to make a server.
● Communication devices like an ethernet cable, switches, hubs, routers, cables are
costly.
● LAN administrator can see and check personal data files as well as Internet history
of each and every LAN user. Hence, the privacy of the users are violated
● LANs are restricted in size and cover only a limited area
● Since all the data is stored in a single server computer, if it can be accessed by an
unauthorized user, can cause a serious data security threat.
3. Campus Area Network (CAN)
CAN is bigger than a LAN but smaller than a MAN. This is a type of computer network
that is usually used in places like a school or colleges. This network covers a limited
geographical area that is, it spreads across several buildings within the campus. CAN
mainly use Ethernet technology with a range from 1km to 5km. Its transmission speed is
very high with a moderate maintenance cost and moderate cost. Examples of CAN are
networks that cover schools, colleges, buildings, etc.
Campus Area
Network (CAN)
Advantages of CAN
● Speed: Communication within a CAN takes place over Local Area Network (LAN) so
data transfer rate between systems is little bit fast than Internet.
● Security: Network administrators of campus take care of network by continuous
monitoring, tracking and limiting access. To protect network from unauthorized
access firewall is placed between network and internet.
● Cost effective: With a little effort and maintenance, network works well by providing
fast data transfer rate with multi-departmental network access. It can be enabled
wirelessly, where wiring and cabling costs can be managed. So to work with in a
campus using CAN is cost-effective in view of performance
4. Metropolitan Area Network (MAN)
A MAN is larger than a LAN but smaller than a WAN. This is the type of computer
network that connects computers over a geographical distance through a shared
communication path over a city, town, or metropolitan area. This network mainly uses
FDDI, CDDI, and ATM as the technology with a range from 5km to 50km. Its
transmission speed is average. It is difficult to maintain and it comes with a high cost.
Examples of MAN are networking in towns, cities, a single large city, a large area within
multiple buildings, etc.
Metropolitan
Area Network
(MAN)
Advantages of MAN
● MAN offers high-speed connectivity in which the speed ranges from 10-100 Mbps.
● The security level in MAN is high and strict as compared to WAN.
● It support to transmit data in both directions concurrently because of dual bus
architecture.
● MAN can serve multiple users at a time with the same high-speed internet to all the
users.
● MAN allows for centralized management and control of the network, making it easier
to monitor and manage network resources and security.
Disadvantages of MAN
Wide Area
Network (WAN)
Advantages of WAN
Disadvantages of WAN
Personal Campus
Full Local Area Metropolitan Wide Area
Area Area
Name Network Area Network Network
Network Network
Bluetooth, Leased
Technolo Ethernet & FDDI, CDDi.
IrDA,Zigbe Ethernet Line, Dial-
gy Wifi ATM
e Up
Above 50
Range 1-100 m Upto 2km 1 – 5 km 5-50 km
km
Transmis
sion Very High Very High High Average Low
Speed
Maintena Very
Very Easy Easy Moderate Difficult
nce Difficult
WLAN is a type of computer network that acts as a local area network but makes use of
wireless network technology like Wi-Fi. This network doesn’t allow devices to
communicate over physical cables like in LAN but allows devices to communicate
wirelessly. The most common example of WLAN is Wi-Fi.
Wireless Local
Area Network
(WLAN)
There are several computer networks available; more information is provided below.
SAN is a type of computer network that is high-speed and connects groups of storage
devices to several servers. This network does not depend on LAN or WAN. Instead, a
SAN moves the storage resources from the network to its high-powered network. A
SAN provides access to block-level data storage. Examples of SAN are a network of
disks accessed by a network of servers.
Storage Area
Network (SAN)
Passive Optical
Local Area
Network
(POLAN)
4. Enterprise Private Network (EPN)
EPN is a type of computer network mostly used by businesses that want a secure
connection over various locations to share computer resources.
Enterprise
Private Network
(EPN)
A VPN is a type of computer network that extends a private network across the internet
and lets the user send and receive data as if they were connected to a private network
even though they are not. Through a virtual point-to-point connection users can access
a private network remotely. VPN protects you from malicious sources by operating as a
medium that gives you a protected network connection.
Virtual Private
Network (VPN)
Many of the houses might have more than a computer. To interconnect those
computers and with other peripheral devices, a network should be established similar to
the local area network (LAN) within that home. Such a type of network that allows a
user to interconnect multiple computers and other digital devices within the home is
referred to as Home Area Network (HAN). HAN encourages sharing of resources, files,
and programs within the network. It supports both wired and wireless communication.
Home Area
Network (HAN)
Internetwork
An internet network is defined as two or more computer network LANs, WANs, or
computer network segments that are connected by devices and configured with a local
addressing system. The method is known as internetworking. There are two types of
Internetwork.
● Intranet: An internal network within an organization that enables employees to share
data, collaborate, and access resources. Intranets are not accessible to the public
and use private IP addresses.
● Extranet: Extranets extend the intranet to authorized external users, such as
business partners or clients. They provide controlled access to specific resources
while maintaining security.
Advantages of Computer Network
● Central Storage of Data: Files are stored on a central storage database which
helps to easily access and available to everyone.
● Connectivity: A single connection can be routed to connect multiple computing
devices.
● Sharing of Files: Files and data can be easily shared among multiple devices which
helps in easily communicating among the organization.
● Security through Authorization: Computer Networking provides additional security
and protection of information in the system.
Disadvantages of Computer Network
● Virus and Malware: A virus is a program that can infect other programs by
modifying them. Viruses and Malware can corrupt the whole network.
● High Cost of Setup: The initial setup of Computer Networking is expensive
because it consists of a lot of wires and cables along with the device.
● loss of Information: In case of a System Failure, might lead to some loss of data.
● Management of Network: Management of a Network is somehow complex for a
person, it requires training for its proper use.
Conclusion
In conclusion, computer networks are essential components that connect various
computer devices in order to efficiently share data and resources. PAN, LAN, CAN,
MAN, and WAN networks serve a wide range of applications and purposes, each with
its own set of advantages and drawbacks. Understanding these networks and their
applications improves connectivity, data exchange, and resource utilization in a variety
of applications from personal use to global communications.
Network applications
Application of Computer Network
There are a variety of fields in computer networks that are used in industries. Some of
them are as follows:
In computer networks, we have a global internet, also known as the World Wide Web,
that offers us various features like access to websites, online services and retrieval of
information. With the help of the World Wide Web, we can browse, and we can do
search, and access web pages and multimedia content.
2. Communication
With the help of computer networks, communication is also easy because we can do
email, instant messaging, voice and video calls and video conferencing, which helps us
to communicate with each other effectively. People can use these features in their
businesses and organizations to stay connected with each other.
Data transfer and file sharing are made possible by networks that connect different
devices. This covers file sharing within a business setting, file sharing between personal
devices, and downloading/uploading of content from the internet.
4. Online gaming
Multiplayer online games use computer networks to link players from all over the world,
enabling online competitions and real-time gaming experiences.
Networks enable users to access and control systems and devices from a distance.
This is helpful when accessing home automation systems, managing servers, and
providing remote IT support.
6. Social media
With the help of a computer network, we can use social media sites like Facebook,
Twitter and Instagram to help people set up their profiles, and we can connect with
others and share content on social media.
7. Cloud Computing
9. Enterprise Networks
In Computer networks, we have some networks that are only used in businesses and
organizations so they can store data and share files and resources like printers,
scanners, etc.
10. Healthcare
With the help of computer networks in the health industry, we can share patient records
and store the records in the form of data that is easy and secure compared to the file
method. Networks are also necessary for telemedicine and remote patient monitoring.
11. Education
Schools use networks to access online courses, virtual classrooms, and other online
learning materials. Campuses of colleges and universities frequently have extensive
computer networks.
The transportation sector uses Computer Networks to manage and track shipments,
plan the best routes, and coordinate logistics activities.
Through the Internet of Things (IoT), smart homes use networks to connect to and
manage a variety of devices, including thermostats, security cameras, and smart
appliances.
With the help of computer networks, we can communicate, share data, and advance
national defence. Government agencies and the military rely on secure networks.
These are just a few instances of the many areas of our lives where computer networks
are used. Computer networks are fundamental to facilitating communication, teamwork,
and the effective exchange of knowledge and resources globally.
Network Hardware
The basic computer hardware components that are needed to set up a network are as
follows −
Network Cables
Network cables are the transmission media to transfer data from one device to another.
A commonly used network cable is category 5 cable with RJ – 45 connector, as shown
in the image below:
Routers
A router is a connecting device that transfers data packets between different computer
networks. Typically, they are used to connect a PC or an organization’s LAN to a
broadband internet connection. They contain RJ-45 ports so that computers and other
devices can connect with them using network cables.
Repeaters, Hubs, and Switches
Repeaters, hubs and switches connect network devices together so that they can
function as a single segment.
A hub is a multiport repeater having several input/output ports, so that input at any port
is available at every other port.
A switch receives data from a port, uses packet switching to resolve the destination
device and then forwards the data to the particular destination, rather than broadcasting
it as a hub.
Bridges
A bridge connects two separate Ethernet network segments. It forwards packets from
the source network to the destined network.
Gateways
A gateway connects entirely different networks that work upon different protocols. It is
the entry and the exit point of a network and controls access to other networks.
Network Interface Cards
Network Software
SDN Framework
The Software Defined Networking framework has three layers as depicted in the
following diagram −
OSI Model
TCP/IP Protocol Suite
OSI Model
The seven layers of the OSI Model are a physical layer, data link layer, network layer,
transport layer, session layer, presentation layer, and application layer. The hierarchy is
depicted in the following figure −
TCP / IP PROTOCOL SUITE
TCP stands for Transmission Control Protocol, while IP stands for Internet Protocol. It is
a suite of protocols for communication structured in four layers. It can be used for
communication over the internet as well as for private networks.
The four layers are application layer, transport layer, internet layer and network access
layer, as depicted in the following diagram −
OSI stands for Open Systems Interconnection, where open stands to say non-
proprietary. It is a 7-layer architecture with each layer having specific functionality to
perform. All these 7 layers work collaboratively to transmit the data from one person to
another across the globe. The OSI reference model was developed by ISO –
‘International Organization for Standardization‘, in the year 1984.
The OSI model provides a theoretical foundation for understanding network
communication. However, it is usually not directly implemented in its entirety in real-
world networking hardware or software. Instead, specific protocols and
technologies are often designed based on the principles outlined in the OSI model to
facilitate efficient data transmission and networking operations.
What is OSI Model?
The OSI model, created in 1984 by ISO, is a reference framework that explains the
process of transmitting data between computers. It is divided into seven layers that
work together to carry out specialised network functions, allowing for a more
systematic approach to networking.
OSI Model
Data Flow In OSI Model
When we transfer information from one device to another, it travels through 7 layers of
OSI model. First data travels down through 7 layers from the sender’s end and then
climbs back 7 layers on the receiver’s end.
Data flows through the OSI model in a step-by-step process:
● Application Layer: Applications create the data.
● Presentation Layer: Data is formatted and encrypted.
● Session Layer: Connections are established and managed.
● Transport Layer: Data is broken into segments for reliable delivery.
● Network Layer: Segments are packaged into packets and routed.
● Data Link Layer: Packets are framed and sent to the next device.
● Physical Layer: Frames are converted into bits and transmitted physically.
Each layer adds specific information to ensure the data reaches its destination correctly,
and these steps are reversed upon arrival.
● Bit Synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at the bit level.
● Bit Rate Control: The Physical layer also defines the transmission rate i.e. the
number of bits sent per second.
● Physical Topologies: Physical layer specifies how the different, devices/nodes are
arranged in a network i.e. bus, star, or mesh topology.
● Transmission Mode: Physical layer also defines how the data flows between the
two connected devices. The various transmission modes possible are Simplex, half-
duplex and full-duplex.
Note:
● Hub, Repeater, Modem, and Cables are Physical Layer devices.
● Network Layer, Data Link Layer, and Physical Layer are also known as Lower
Layers or Hardware Layers.
Data Link Layer (DLL) – Layer 2
The data link layer is responsible for the node-to-node delivery of the message. The
main function of this layer is to make sure data transfer is error-free from one node to
another, over the physical layer. When a packet arrives in a network, it is the
responsibility of the DLL to transmit it to the Host using its MAC address.
The Data Link Layer is divided into two sublayers:
● Logical Link Control (LLC)
● Media Access Control (MAC)
The packet received from the Network layer is further divided into frames depending on
the frame size of the NIC(Network Interface Card). DLL also encapsulates Sender and
Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address Resolution
Protocol) request onto the wire asking “Who has that IP address?” and the destination
host will reply with its MAC address.
Functions of the Data Link Layer
● Framing: Framing is a function of the data link layer. It provides a way for a sender
to transmit a set of bits that are meaningful to the receiver. This can be
accomplished by attaching special bit patterns to the beginning and end of the
frame.
● Physical Addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of each
frame.
● Error Control: The data link layer provides the mechanism of error control in which
it detects and retransmits damaged or lost frames.
● Flow Control: The data rate must be constant on both sides else the data may get
corrupted thus, flow control coordinates the amount of data that can be sent before
receiving an acknowledgment.
● Access Control: When a single communication channel is shared by multiple
devices, the MAC sub-layer of the data link layer helps to determine which device
has control over the channel at a given time.
Note:
● Packet in the Data Link layer is referred to as Frame.
● Data Link layer is handled by the NIC (Network Interface Card) and device drivers of
host machines.
● Switch & Bridge are Data Link Layer devices.
Network Layer – Layer 3
The network layer works for the transmission of data from one host to the other located
in different networks. It also takes care of packet routing i.e. selection of the shortest
path to transmit the packet, from the number of routes available. The sender &
receiver’s IP addresses are placed in the header by the network layer.
● Routing: The network layer protocols determine which route is suitable from source
to destination. This function of the network layer is known as routing.
● Logical Addressing: To identify each device inter-network uniquely, the network
layer defines an addressing scheme. The sender & receiver’s IP addresses are
placed in the header by the network layer. Such an address distinguishes each
device uniquely and universally.
Note:
● Segment in the Network layer is referred to as Packet.
● Network layer is implemented by networking devices such as routers and switches.
Transport Layer – Layer 4
The transport layer provides services to the application layer and takes services from
the network layer. The data in the transport layer is referred to as Segments. It is
responsible for the end-to-end delivery of the complete message. The transport layer
also provides the acknowledgment of the successful data transmission and re-transmits
the data if an error is found.
At the sender’s side: The transport layer receives the formatted data from the upper
layers, performs Segmentation, and also implements Flow and error control to
ensure proper data transmission. It also adds Source and Destination port numbers in
its header and forwards the segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s
application.
Generally, this destination port number is configured, either by default or manually. For
example, when a web application requests a web server, it typically uses port number
80, because this is the default port assigned to web applications. Many applications
have default ports assigned.
At the receiver’s side: Transport Layer reads the port number from its header and
forwards the Data which it has received to the respective application. It also performs
sequencing and reassembling of the segmented data.
Functions of the Transport Layer
● Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the segments
produced has a header associated with it. The transport layer at the destination
station reassembles the message.
● Service Point Addressing: To deliver the message to the correct process, the
transport layer header includes a type of address called service point address or port
address. Thus by specifying this address, the transport layer makes sure that the
message is delivered to the correct process.
Services Provided by Transport Layer
● Connection-Oriented Service
● Connectionless Service
1. Connection-Oriented Service: It is a three-phase process that includes:
● Connection Establishment
● Data Transfer
● Termination/disconnection
In this type of transmission, the receiving device sends an acknowledgment, back to the
source after a packet or group of packets is received. This type of transmission is
reliable and secure.
2. Connectionless service: It is a one-phase process and includes Data Transfer. In
this type of transmission, the receiver does not acknowledge receipt of a packet. This
approach allows for much faster communication between devices. Connection-oriented
service is more reliable than connectionless Service.
Note:
● Data in the Transport Layer is called Segments.
● Transport layer is operated by the Operating System. It is a part of the OS and
communicates with the Application Layer by making system calls.
● The transport layer is called as Heart of the OSI model.
● Device or Protocol Use : TCP, UDP NetBIOS, PPTP
Session Layer – Layer 5
This layer is responsible for the establishment of connection, maintenance of sessions,
and authentication, and also ensures security.
● Session Establishment, Maintenance, and Termination: The layer allows the two
processes to establish, use, and terminate a connection.
● Synchronization: This layer allows a process to add checkpoints that are
considered synchronization points in the data. These synchronization points help to
identify the error so that the data is re-synchronized properly, and ends of the
messages are not cut prematurely and data loss is avoided.
● Dialog Controller: The session layer allows two systems to start communication
with each other in half-duplex or full-duplex.
Note:
● All the below 3 layers(including Session Layer) are integrated as a single layer in the
TCP/IP model as the “Application Layer”.
● Implementation of these 3 layers is done by the network application itself. These are
also known as Upper Layers or Software Layers.
● Device or Protocol Use : NetBIOS, PPTP.
Example
Let us consider a scenario where a user wants to send a message through some
Messenger application running in their browser. The “Messenger” here acts as the
application layer which provides the user with an interface to create the data. This
message or so-called Data is compressed, optionally encrypted (if the data is sensitive),
and converted into bits (0’s and 1’s) so that it can be transmitted.
7 Helps in
identifying
the client and
Application
synchronizin Message SMTP
Layer
g
communicati
on.
6 Data from
the
application
layer is
extracted
Presentation
and Message JPEG, MPEG, GIF
Layer
manipulated
in the
required
format for
transmission.
5 Establishes
Connection,
Maintenance,
Message (or
Session Ensures
encrypted Gateway
Layer Authenticatio
message)
n and
Ensures
security.
4 Take Service
from Network
Layer and
Transport
provide it to Segment Firewall
Layer
the
Application
Layer.
3 Transmission
of data from
one host to
Network
another, Packet Router
Layer
located in
different
networks.
2 Node to
Data Link Node
Frame Switch, Bridge
Layer Delivery of
Message.
1 Establishing
Physical
Physical Hub, Repeater,
Connections Bits
Layer Modem, Cables
between
Devices.
OSI vs TCP/IP
Why Does The OSI Model Matter?
Even though the modern Internet doesn’t strictly use the OSI Model (it uses a simpler
Internet protocol suite), the OSI Model is still very helpful for solving network problems.
Whether it’s one person having trouble getting their laptop online, or a website being
down for thousands of users, the OSI Model helps to identify the problem. If you can
narrow down the issue to one specific layer of the model, you can avoid a lot of
unnecessary work.
Imperva Application Security
Imperva security solutions protect your applications at different levels of the OSI model.
They use DDoS mitigation to secure the network layer and provide web application
firewall (WAF), bot management, and API security to protect the application layer.
To secure applications and networks across the OSI stack, Imperva offers multi-layered
protection to ensure websites and applications are always available, accessible, and
safe. The Imperva application security solution includes:
● DDoS Mitigation: Protects the network layer from Distributed Denial of Service
attacks.
● Web Application Firewall (WAF): Shields the application layer from threats.
● Bot Management: Prevents malicious bots from affecting the application.
● API Security: Secures APIs from various vulnerabilities and attacks.
Advantages of OSI Model
The OSI Model defines the communication of a computing system into 7 different
layers. Its advantages include:
● It divides network communication into 7 layers which makes it easier to understand
and troubleshoot.
● It standardizes network communications, as each layer has fixed functions and
protocols.
● Diagnosing network problems is easier with the OSI model.
● It is easier to improve with advancements as each layer can get updates separately.
Disadvantages of OSI Model
● Complexity: The OSI Model has seven layers, which can be complicated and hard
to understand for beginners.
● Not Practical: In real-life networking, most systems use a simpler model called the
Internet protocol suite (TCP/IP), so the OSI Model isn’t always directly applicable.
● Slow Adoption: When it was introduced, the OSI Model was not quickly adopted by
the industry, which preferred the simpler and already-established TCP/IP model.
● Overhead: Each layer in the OSI Model adds its own set of rules and operations,
which can make the process more time-consuming and less efficient.
● Theoretical: The OSI Model is more of a theoretical framework, meaning it’s great
for understanding concepts but not always practical for implementation.
Conclusion
In conclusion, the OSI (Open Systems Interconnection) model is a conceptual
framework that standardizes the functions of a telecommunication or computing system
into seven distinct layers: Physical, Data Link, Network, Transport, Session,
Presentation, and Application. Each layer has specific responsibilities and interacts with
the layers directly above and below it, ensuring seamless communication and data
exchange across diverse network environments. Understanding the OSI model helps in
troubleshooting network issues, designing robust network architectures, and facilitating
interoperability between different networking products and technologies.
The physical Layer is the bottom-most layer in the Open System Interconnection
(OSI) Model which is a physical and electrical representation of the system. It consists
of various network components such as power plugs, connectors, receivers, cable
types, etc. The physical layer sends data bits from one device(s) (like a computer) to
another device(s). The physical Layer defines the types of encoding (that is how the 0’s
and 1’s are encoded in a signal). The physical Layer is responsible for the
communication of the unstructured raw data streams over a physical medium.
Functions Performed by Physical Layer
The following are some important and basic functions that are performed by the
Physical Layer of the OSI Model –
● The physical layer maintains the data rate (how many bits a sender can send per
second).
● It performs the Synchronization of bits.
● It helps in Transmission Medium decisions (direction of data transfer).
● It helps in Physical Topology (Mesh, Star, Bus, Ring) decisions (Topology
through which we can connect the devices with each other).
● It helps in providing Physical Medium and Interface decisions.
● It provides two types of configuration Point Point configuration and Multi-Point
configuration.
● It provides an interface between devices (like PCs or computers) and
transmission medium.
● It has a protocol data unit in bits.
● Hubs, Ethernet, etc. device is used in this layer.
● This layer comes under the category of Hardware Layers (since the hardware
layer is responsible for all the physical connection establishment and processing
too).
● It provides an important aspect called Modulation, which is the process of
converting the data into radio waves by adding the information to an electrical or
optical nerve signal.
● It also provides a Switching mechanism wherein data packets can be forwarded
from one port (sender port) to the leading destination port.
●
Physical Topologies
Physical Topology or Network Topology is the Geographical Representation of Linking
devices. Following are the four types of physical topology-
● Mesh Topology: In a mesh topology, each and every device should have a
dedicated point-to-point connection with each and every other device in the
network. Here there is more security of data because there is a dedicated point-
to-point connection between two devices. Mesh Topology is difficult to install
because it is more complex.
● Star Topology: In star topology, the device should have a dedicated point-to-
point connection with a central controller or hub. Star Topology is easy to install
and reconnect as compared to Mesh Topology. Star Topology doesn’t have Fault
Tolerance Technique.
● Bus Topology: In a bus topology, multiple devices are connected through a
single cable that is known as backbone cable with the help of tap and drop lines.
It is less costly as compared to Mesh Topology and Star Topology. Re-
connection and Re-installation are difficult.
● Ring Topology: In a ring topology, each device is connected with repeaters in a
circle-like ring that’s why it is called Ring Topology. In Ring Topology, a device
can send the data only when it has a token, without a token no device can send
the data, and a token is placed by Monitor in Ring Topology.
Line Configuration
Transmission media refer to the physical pathways through which data is transmitted
from one device to another within a network. These pathways can be wired or wireless.
The choice of medium depends on factors like distance, speed, and interference. In this
article, we will discuss the transmission media.
What is Transmission Media?
A transmission medium is a physical path between the transmitter and the receiver i.e. it
is the channel through which data is sent from one place to another. Transmission
Media is broadly classified into the following types:
Types of Transmission Media
Guided Media
Guided Media is also referred to as Wired or Bounded transmission media. Signals
being transmitted are directed and confined in a narrow pathway by using physical links.
Features:
● High Speed
● Secure
● Used for comparatively shorter distances
There are 3 major types of Guided Media:
Twisted Pair Cable
It consists of 2 separately insulated conductor wires wound about each other. Generally,
several such pairs are bundled together in a protective sheath. They are the most
widely used Transmission Media. Twisted Pair is of two types:
● Unshielded Twisted Pair (UTP): UTP consists of two insulated copper wires
twisted around one another. This type of cable has the ability to block interference
and does not depend on a physical shield for this purpose. It is used for telephonic
applications.
Unshielded Twisted Pair
Least expensive
● Easy to install
● High-speed capacity
Microwave Transmission
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency
Range:300GHz – 400THz. It is used in TV remotes, wireless mouse, keyboard, printer,
etc.
These are
Direct These are omni-directional These are unidirectional in
unidirectional
ion in nature. nature.
in nature.
At low frequency, they can At low frequency, they can They cannot
penetrate through solid penetrate through solid penetrate
Penet
objects and walls but high objects and walls. at high through any
ration
frequency they bounce off frequency, they cannot solid object
the obstacle. penetrate. and walls.
Frequency
Frequ
Frequency range: 3 KHz to Frequency range: 1 GHz range: 300
ency
1GHz. to 300 GHz. GHz to 400
range
GHz.
Secur These offers poor security. These offers medium These offers
ity security. high security.
Atten Attenuation is
Attenuation is high. Attenuation is variable.
uation low.
Gover There is no
Some frequencies in the Some frequencies in the
nmen need of
radio-waves require microwaves require
t government
government license to use government license to use
Licen license to use
these. these.
se these waves.
Usag
Setup and usage Cost is Setup and usage Cost is Usage Cost is
e
moderate. high. very less.
Cost
Transmission Impairment
● Attenuation – It means loss of energy. The strength of signal decreases with
increasing distance which causes loss of energy in overcoming resistance of
medium. This is also known as attenuated signal. Amplifiers are used to amplify the
attenuated signal which gives the original signal back and compensate for this loss.
● Distortion – It means changes in the form or shape of the signal. This is generally
seen in composite signals made up with different frequencies. Each frequency
component has its own propagation speed travelling through a medium. And thats
why it delay in arriving at the final destination Every component arrive at different
time which leads to distortion. Therefore, they have different phases at receiver end
from what they had at senders end.
● Noise – The random or unwanted signal that mixes up with the original signal is
called noise. There are several types of noise such as induced noise, crosstalk
noise, thermal noise and impulse noise which may corrupt the signal.
Conclusion
In conclusion, transmission media are fundamental ways for data transmission in
networks, and they are classified as directed (wired) or unguided (wireless). Guided
media, such as twisted pair cables, coaxial cables, and optical fibers, provide secure,
fast, and dependable data transmission over short distances. Unguided media, such as
radio waves, microwaves, and infrared, provide wireless communication at various
distances, with security and attenuation trade-offs. The choice of transmission media is
determined by bandwidth, transmission impairment, and interference..
Radio frequency is easier to generate and because of its large wavelength it can
penetrate through walls and structures a like. Radio waves can have wavelength from 1
mm – 100,000 km and have frequency ranging from 3 Hz (Extremely Low Frequency) to
300 GHz (Extremely High Frequency). Radio frequencies are sub-divided into six
bands.
Radio waves at lower frequencies can travel through walls whereas higher RF can
travel in straight line and bounce back. The power of low frequency waves decreases
sharply as they cover long distance. High frequency radio waves have more power.
Lower frequencies such as VLF, LF, MF bands can travel on the ground up to 1000
kilometers, over the earth’s surface.
Radio waves of high frequencies are prone to be absorbed by rain and other obstacles.
They use Ionosphere of earth atmosphere. High frequency radio waves such as HF and
VHF bands are spread upwards. When they reach Ionosphere, they are refracted back
to the earth.
Microwave Transmission
Electromagnetic waves above 100 MHz tend to travel in a straight line and signals over
them can be sent by beaming those waves towards one particular station. Because
Microwaves travels in straight lines, both sender and receiver must be aligned to be
strictly in line-of-sight.
Microwaves can have wavelength ranging from 1 mm – 1 meter and frequency ranging
from 300 MHz to 300 GHz.
Microwave antennas concentrate the waves making a beam of it. As shown in picture
above, multiple antennas can be aligned to reach farther. Microwaves have higher
frequencies and do not penetrate wall like obstacles.
Microwave transmission depends highly upon the weather conditions and the frequency
it is using.
Infrared Transmission
Infrared wave lies in between visible light spectrum and microwaves. It has wavelength
of 700-nm to 1-mm and frequency ranges from 300-GHz to 430-THz.
Infrared wave is used for very short-range communication purposes such as television
and it’s remote. Infrared travels in a straight line hence it is directional by nature.
Because of high frequency range, Infrared cannot cross wall-like obstacles.
Light Transmission
Highest most electromagnetic spectrum which can be used for data transmission is light
or optical signaling. This is achieved by means of LASER.
Because of frequency light uses, it tends to travel strictly in straight line.Hence the
sender and receiver must be in the line-of-sight. Because laser transmission is
unidirectional, at both ends of communication the laser and the photo-detector needs to
be installed. Laser beam is generally 1mm wide hence it is a work of precision to align
two far receptors each pointing to lasers source.
Lasers cannot penetrate obstacles such as walls, rain, and thick fog. Additionally, laser
beam is distorted by wind, atmosphere temperature, or variation in temperature in the
path.
Laser is safe for data transmission as it is very difficult to tap 1mm wide laser without
Properties of PSTN
Mobile telephone system is used for wide area voice and data communication. Cell
phones have gone through three different generations, called 1G, 2G and 3G. The
generations are as following:
1. Analog voice
2. Digital voice
3. Digital voice and data
These are explained as following below.
First generation (1G) Mobile Phones: Analog Voice 1G system used a single large
transmitter and had a single channel, used for both receiving and sending. If a user
wants to talk then he has to push the button that enabled the transmitter and disabled
the receiver. Such systems were called push-to-talk systems, and they were installed in
the late 1950’s. In 1960’s IMTS (Improved Mobile Telephone System) was installed. It
also used a high-powered (20-watt) transmitter on top of a hill but it had two
frequencies, one for sending and one for receiving, so push to talk button was no longer
needed.
Second generation (2G) Mobile phones: Digital voice The first generation mobile
phones was analog though second generation is digital. It enables new services such
as text messaging. There was no worldwide standardization during second generation.
Several different systems were developed and three have been deployed. GSM (Global
System for Mobile Communications). It is the dominant 2G system.
Third generation (3G) Mobile Phones: Digital Voice and Data The first generation
was analog voice and second generation was digital voice but 3rd generation is about
digital voice and data. 3G mobile telephony is all about providing enough wireless
bandwidth to keep future users happy. Apple’s iPhone is the kind of 3G device but
actually it is not using exactly 3G , they used enhanced 2G network i.e. 2.5G and there
is not enough data capacity to keep users happy.
Fourth generation (4G) Mobile Phones: Broadband Internet Access with Digital
Voice and Data The fourth-generation mobile phone is to access internet along with
digital voice and digital data. It is faster than 3G phones. 4G phones are capable to
work like a computer. 4G phones made cloud services usable. Even after decades still
there are remote areas where 4G network is not available.
Fifth generation (5G) Mobile Phones: Super Fast Connectivity and More Than 4G
The fifth generation mobile phones are to provide super fast connectivity. It provides
superior performance with low latency. You will be able to connect more devices than
4G. As 4G network is not available all places so 5G network will take time to make a
perfect level of coverage.
Mobile telephone service (MTS) connects mobile radio telephones with other networks
like public switched telephone networks (PSTN), other mobile telephones and
communication systems like Internet.
Mobile phones and other mobile devices, called mobile stations are connected to base
stations. Communication between the mobile stations and the base stations are done by
wireless radio signals, which may be both data signals and voice signals. Each base
station has a coverage area around it, such that mobile stations within this area can
connect provided they have access permissions. Base stations contain transmitters and
receivers to convert radio signals to electrical signals and vice versa. Base stations
transmit the message in form of electrical signals to the mobile switching center (MSC).
MSCs are connected to other MSCs and public networks like PSTNs.
1G (First Generation) − They were standards for analog voice mobile phone
communications.
2G(Second Generation) − They were standards for digital voice mobile phone
communications.
After Completion of Unit, I you should be able to answer the following Questions
Unit – II
Design issues
The data link layer in the OSI (Open System Interconnections) Model, is in between the
physical layer and the network layer. This layer converts the raw transmission facility
provided by the physical layer to a reliable and error-free link.
The main functions and the design issues of this layer are
In the OSI Model, each layer uses the services of the layer below it and provides
services to the layer above it. The data link layer uses the services offered by the
physical layer. The primary function of this layer is to provide a well-defined service
interface to network layer above it.
Framing
The data link layer encapsulates each data packet from the network layer into frames
that are then transmitted.
● Frame Header
● Payload field that contains the data packet from network layer
● Trailer
Error Control
The data link layer ensures error free link for data transmission. The issues it caters to
with respect to error control are −
Flow Control
The data link layer regulates flow control so that a fast sender does not drown a slow
receiver. When the sender sends frames at very high speeds, a slow receiver may not
be able to handle it. There will be frame losses even if the transmission is error-free.
The two common approaches for flow control are −
Data-link layer uses error control techniques to ensure that frames, i.e. bit streams of
data, are transmitted from the source to the destination with a certain extent of
accuracy.
Errors
When bits are transmitted over the computer network, they are subject to get corrupted
due to interference and network problems. The corrupted bits leads to spurious data
being received by the destination and are called errors.
Types of Errors
Errors can be of three types, namely single bit errors, multiple bit errors, and burst
errors.
Single bit error − In the received frame, only one bit has been corrupted, i.e. either
changed from 0 to 1 or from 1 to 0.
Multiple bits error − In the received frame, more than one bits are corrupted.
Burst error − In the received frame, more than one consecutive bits are corrupted.
Error Control
Error detection − Error detection involves checking whether any error has occurred or
not. The number of error bits and the type of error does not matter.
Error correction − Error correction involves ascertaining the exact number of bits that
has been corrupted and the location of the corrupted bits.
For both error detection and error correction, the sender needs to send some additional
bits along with the data bits. The receiver performs necessary checks based upon the
additional redundant bits. If it finds that the data is free from errors, it removes the
redundant bits before passing the message to the upper layers.
There are three main techniques for detecting errors in frames: Parity Check,
Checksum, and Cyclic Redundancy Check (CRC).
Parity Check
The parity check is done by adding an extra bit, called parity bit to the data to make a
number of 1s either even in case of even parity or odd in case of odd parity.
While creating a frame, the sender counts the number of 1s in it and adds the parity bit
in the following way
In case of even parity: If a number of 1s is even then parity bit value is 0. If the number
of 1s is odd then parity bit value is 1.
In case of odd parity: If a number of 1s is odd then parity bit value is 0. If a number of 1s
is even then parity bit value is 1.
On receiving a frame, the receiver counts the number of 1s in it. In case of even parity
check, if the count of 1s is even, the frame is accepted, otherwise, it is rejected. A
similar rule is adopted for odd parity check.
The parity check is suitable for single bit error detection only.
Checksum
The sender adds the segments using 1’s complement arithmetic to get the sum. It then
complements the sum to get the checksum and sends it along with the data frames.
The receiver adds the incoming segments along with the checksum using 1’s
complement arithmetic to get the sum and then complements it.
If the result is zero, the received frames are accepted; otherwise, they are discarded.
Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC) involves binary division of the data bits being sent by
a predetermined divisor agreed upon by the communicating system. The divisor is
generated using polynomials.
Here, the sender performs binary division of the data segment by the divisor. It then
appends the remainder called CRC bits to the end of the data segment. This makes the
resulting data unit exactly divisible by the divisor.
The receiver divides the incoming data unit by the divisor. If there is no remainder, the
data unit is assumed to be correct and is accepted. Otherwise, it is understood that the
data is corrupted and is therefore rejected.
Error Correction Techniques
Error correction techniques find out the exact number of bits that have been corrupted
and as well as their locations. There are two principle ways
Forward Error Correction − If the receiver detects some error in the incoming frame, it
executes error-correcting code that generates the actual frame. This saves bandwidth
required for retransmission. It is inevitable in real-time systems. However, if there are
too many errors, the frames need to be retransmitted.
Hamming Codes
Binary Convolution Code
Reed – Solomon Code
Low-Density Parity-Check Code
Hamming Codes
Elementary data link protocols
Protocols in the data link layer are designed so that this layer can perform its
basic functions: framing, error control and flow control. Framing is the process of
dividing bit - streams from physical layer into data frames whose size ranges
from a few hundred to a few thousand bytes. Error control mechanisms deals
with transmission errors and retransmission of corrupted and lost frames. Flow
control regulates speed of delivery and so that a fast sender does not drown a
slow receiver.
Simplex Protocol
The Simplex protocol is hypothetical protocol designed for unidirectional data
transmission over an ideal channel, i.e. a channel through which transmission
can never go wrong. It has distinct procedures for sender and receiver. The
sender simply sends all its data available onto the channel as soon as they are
available its buffer. The receiver is assumed to process all incoming data
instantly. It is hypothetical since it does not handle flow control or error control.
Go – Back – N ARQ
Go – Back – N ARQ provides for sending multiple frames before receiving the
acknowledgement for the first frame. It uses the concept of sliding window, and
so is also called sliding window protocol. The frames are sequentially numbered
and a finite number of frames are sent. If the acknowledgement of a frame is
not received within the time period, all frames starting from that frame are
retransmitted.
Sliding window protocols are data link layer protocols for reliable and
sequential delivery of data frames. The sliding window is also used
in Transmission Control Protocol.
The size of the sending window determines the sequence number of the
outbound frames. If the sequence number of the frames is an n-bit field, then
the range of sequence numbers that can be assigned is 0 to 2 𝑛−1.
Consequently, the size of the sending window is 2 𝑛−1. Thus in order to
accommodate a sending window size of 2 𝑛−1, a n-bit sequence number is
chosen.
The sequence numbers are numbered as modulo-n. For example, if the sending
window size is 4, then the sequence numbers will be 0, 1, 2, 3, 0, 1, 2, 3, 0, 1,
and so on. The number of bits in the sequence number is 2 to generate the
binary sequence 00, 01, 10, 11.
The size of the receiving window is the maximum number of frames that the
receiver can accept at a time. It determines the maximum number of frames
that the sender can send before receiving acknowledgment.
Example
Suppose that we have sender window and receiver window each of size 4. So
the sequence numbering of both the windows will be 0,1,2,3,0,1,2 and so on.
The following diagram shows the positions of the windows after sending the
frames and receiving acknowledgments.
Types of Sliding Window Protocols
The Sliding Window ARQ (Automatic Repeat reQuest) protocols are of two
categories −
● Go – Back – N ARQ
Go – Back – N ARQ provides for sending multiple frames before receiving
the acknowledgment for the first frame. It uses the concept of sliding
window, and so is also called sliding window protocol. The frames are
sequentially numbered and a finite number of frames are sent. If the
acknowledgment of a frame is not received within the time period, all
frames starting from that frame are retransmitted.
● Selective Repeat ARQ
This protocol also provides for sending multiple frames before receiving
the acknowledgment for the first frame. However, here only the erroneous
or lost frames are retransmitted, while the good frames are received and
buffered.
Block coding
Block coding is a technique used in computer networks to improve
the reliability and efficiency of data transmission. It involves dividing
the data into blocks or packets and adding extra bits, known as
error-correction codes, to each block. These codes can be used to
detect and correct errors that may occur during transmission.
There are several different types of block codes, including linear
block codes, cyclic codes, and convolutional codes. Linear block
codes are the most commonly used, and they work by adding parity
bits to the data blocks. Cyclic codes are similar to linear block codes,
but they use a different algorithm to generate the error-correction
codes. Convolutional codes are a type of error-correcting code that
uses a sliding window to encode the data.
Block coding is an important technique in computer networks, as it
helps to ensure that the data being transmitted is accurate and
complete. It is used in a variety of applications, including data
storage, satellite communication, and wireless networks.
Hamming Distance
Hamming distance is a metric for comparing two binary data strings. While
comparing two binary strings of equal length, Hamming distance is the number
of bit positions in which the two bits are different.
Example
Suppose there are two strings 1101 1001 and 1001 1101.
11011001 ⊕ 10011101 = 01000100. Since, this contains two 1s, the Hamming
distance, d(11011001, 10011101) = 2.
Example
Suppose there are four strings 010, 011, 101 and 111.
CRC
Sender Side:
Therefore, the remainder is 001 and hence the encoded
data sent is 100100001.
Receiver Side:
Code word received at the receiver side 100100001
Sender Side:
Therefore, the remainder is 001 and hence the
code word sent is 100100001.
Receiver Side
Let there be an error in transmission media
Code word received at the receiver side - 100000001
Since the remainder is not all zeroes, the error
is detected at the receiver side.
• Flow Control and Error control protocols - Stop and Wait, Go-back–N
ARQ, Selective Repeat ARQ
Conclusion
Flow control and error control are two vital sub layers of the Data
Link Layer that assists in data communication to be smooth. Flow is
mainly concerned with the control of data flow rate to avoid
overloading of the receiver while error control is mainly concerned
with the identification and elimination of errors in the stream of
data.
Difference Between Go-Back-N and Selective Repeat
Protocol
Go-Back-N Protocol Selective Repeat Protocol
Conclusion
The main difference between these two protocols is that after
finding the suspect or damage in sent frames go-back-n protocol re-
transmits all the frames whereas selective repeat protocol re-
transmits only that frame which is damaged.
● The protocol is designed to share multiple frames at a time, with the receiver end,
before expecting any acknowledgment from it. This simultaneous exchange of data is
termed protocol pipelining.
● If the acknowledgment is not shared to the sender side within a certain time frame, all
the frames after the non-acknowledged frame are to be retransmitted to the receiver
side.
Moving on, let’s look into the working of the Go-Back-N ARQ protocol.
The working of the Go-Back-N ARQ protocol involves applying the sliding window
method for the basis of sharing data, and the number of frames to be shared is decided
by the window size.
Then using the main points we discussed and the mentioned features, let’s discuss the
steps involved in the working of the protocol:
1. To begin with, the sender side will share the data frames simultaneously according to
the window size assigned, over to the receiver side, and wait for the acknowledgment.
2. After the receiver side receives the frames, it will use the first frame and send the
acknowledgment to the sender side.
3. After the sender receive’s the acknowledgment for the first frame, the sender will
share the next frame with the receiver.
4. This exchange continues until, due to some external or internal interruption in the
network, the acknowledgment is not received by the sender side.
5. Then, the sender side will go back to the unacknowledged frame and retransmit that
frame, along with all the frames shared after that frame with the receiver. This
represents the Go-Back-N ARQ protocol method.
Let’s move on to some advantages and disadvantages of applying the Go-Back-N ARQ
protocol in the network.CEH v12 - Certified Ethical Hacking
Advantages and Disadvantages
Applying the Go-Back-N arq protocol has both advantages and disadvantages, some of
which are:
Advantages
● Increase the efficiency of the data transfer and has more control over the flow of
frames.
With the end of this topic, we are completed with our article on ‘Go-Back-N ARQ
Protocol.’
In the selective repeat, the sender sends several frames specified by a window
size even without the need to wait for individual acknowledgement from the
receiver as in Go-Back-N ARQ. In selective repeat protocol, the retransmitted
frame is received out of sequence.
In Selective Repeat ARQ only the lost or error frames are retransmitted, whereas
correct frames are received and buffered.
The receiver while keeping track of sequence numbers buffers the frames in
memory and sends NACK for only frames which are missing or damaged. The
sender will send/retransmit a packet for which NACK is received.
Example
Given below is an example of the Selective Repeat ARQ −
Explanation
Step 1 − Frame 0 sends from sender to receiver and set timer.
Step 3 − In the same way frame2 is also sent to the receiver by setting the
timer without waiting for previous acknowledgement.
Step 4 − Whenever sender receives the ACK0 from receiver, within the frame 0
timer then it is closed and sent to the next frame, frame 3.
Step 5 − whenever the sender receives the ACK1 from the receiver, within the
frame 1 timer then it is closed and sent to the next frame, frame 4.
Step 6 − If the sender doesn’t receive the ACK2 from the receiver within the
time slot, it declares timeout for frame 2 and resends the frame 2 again,
because it thought the frame2 may be lost or damaged.
• Sliding Window
Piggybacking
Network switching is the process of forwarding data frames or packets from one
port to another leading to data transmission from source to destination. Data
link layer is the second layer of the Open System Interconnections (OSI) model
whose function is to divide the stream of bits from physical layer into data
frames and transmit the frames according to switching requirements. Switching
in data link layer is done by network devices called bridges.
Bridges
A data link layer bridge connects multiple LANs (local area networks) together to
form a larger LAN. This process of aggregating networks is called network
bridging. A bridge connects the different components so that they appear as
parts of a single network.
The bridge is not responsible for end to end data transfer. It is concerned with
transmitting the data frame from one hop to the next. Hence, they do not
examine the payload field of the frame. Due to this, they can help in switching
any kind of packets from the network layer above.
● simple bridging
● multi-port bridging
● learning or transparent bridging
Unit – III
The Network Layer
●
●
●
The Network layer is majorly focused on getting packets from the source to
the destination, routing error handling, and congestion control. Before learning
about design issues in the network layer, let’s learn about its various
functions.
● Addressing: Maintains the address at the frame header of both source
and destination and performs addressing to detect various devices in the
network.
● Packeting: This is performed by Internet Protocol. The network layer
converts the packets from its upper layer.
● Routing: It is the most important functionality. The network layer chooses
the most relevant and best path for the data transmission from source to
destination.
● Inter-networking: It works to deliver a logical connection across multiple
devices.
Routing Algorithms
1. Adaptive Algorithms
These are the algorithms that change their routing decisions whenever
network topology or traffic load changes. The changes in routing decisions are
reflected in the topology as well as the traffic of the network. Also known
as dynamic routing, these make use of dynamic information such as current
topology, load, delay, etc. to select routes. Optimization parameters are
distance, number of hops, and estimated transit time.
Further, these are classified as follows:
● Isolated: In this method each, node makes its routing decisions using the
information it has without seeking information from other nodes. The
sending nodes don’t have information about the status of a particular link.
The disadvantage is that packets may be sent through a congested
network which may result in delay. Examples: Hot potato routing, and
backward learning.
● Centralized: In this method, a centralized node has entire information
about the network and makes all the routing decisions. The advantage of
this is only one node is required to keep the information of the entire
network and the disadvantage is that if the central node goes down the
entire network is done. The link state algorithm is referred to as a
centralized algorithm since it is aware of the cost of each link in the
network.
● Distributed: In this method, the node receives information from its
neighbors and then takes the decision about routing the packets. A
disadvantage is that the packet may be delayed if there is a change in
between intervals in which it receives information and sends packets. It is
also known as a decentralized algorithm as it computes the least-cost path
between source and destination.
2. Non-Adaptive Algorithms
These are the algorithms that do not change their routing decisions once they
have been selected. This is also known as static routing as a route to be taken
is computed in advance and downloaded to routers when a router is booted.
Further, these are classified as follows:
● Flooding: This adapts the technique in which every incoming packet is
sent on every outgoing line except from which it arrived. One problem with
this is that packets may go in a loop and as a result of which a node may
receive duplicate packets. These problems can be overcome with the help
of sequence numbers, hop count, and spanning trees.
● Random walk: In this method, packets are sent host by host or node by
node to one of its neighbors randomly. This is a highly robust method that
is usually implemented by sending packets onto the link which is least
queued.
Random Walk
3. Hybrid Algorithms
As the name suggests, these algorithms are a combination of both adaptive
and non-adaptive algorithms. In this approach, the network is divided into
several regions, and each region uses a different algorithm.
Further, these are classified as follows:
● Link-state: In this method, each router creates a detailed and complete
map of the network which is then shared with all other routers. This allows
for more accurate and efficient routing decisions to be made.
● Distance vector: In this method, each router maintains a table that contains
information about the distance and direction to every other node in the
network. This table is then shared with other routers in the network. The
disadvantage of this method is that it may lead to routing loops.
May give the shortest path. Always gives the shortest path.
Internetworking
Internetwork Addressing –
Challenges to Internetworking –
Switching
What is Switching?
●
●
●
The address through which any computer communicates with our computer is
simply called an Internet Protocol Address or IP address. For example, if we
want to load a web page or download something, we require the address to
deliver that particular file or webpage. That address is called an IP Address.
There are two versions of IP: IPv4 and IPv6. IPv4 is the older version, while
IPv6 is the newer one. Both have their own features and functions, but they
differ in many ways. Understanding these differences helps us see why we
need IPv6 as the internet grows and evolves.
What is IP?
An IP, or Internet Protocol address, is a unique set of numbers assigned to
each device connected to a network, like the Internet. It’s like an address for
your computer, phone, or any other device, allowing them to communicate
with each other. When you visit a website, your device uses the IP address to
find and connect to the website’s server.
Types of IP Addresses
● IPv4 (Internet Protocol Version 4)
● IPv6 (Internet Protocol Version 6)
To deepen your understanding of networking concepts like IPv4 and IPv6,
consider enrolling in the GATE CS Self-Paced course. This course covers
crucial topics needed for GATE preparation and provides a strong foundation
in computer science, equipping you with the skills needed to excel in your
studies and career.
What is IPv4?
IPv4 addresses consist of two things: the network address and the host
address. It stands for Internet Protocol version four. It was introduced in
1981 by DARPA and was the first deployed version in 1982 for production on
SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal
Notation. It is represented by 4 numbers separated by dots in the range of 0-
255, which have to be converted to 0 and 1, to be understood by Computers.
For Example, An IPv4 Address can be written as 189.123.123.90.
IPv4 Address Format
IPv4 Address Format is a 32-bit Address that comprises binary digits
separated by a dot (.).
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It can generate 4.29×10 9 address The address space of IPv6 is quite large it can
space produce 3.4×10 38 address space
The Security feature is dependent IPSEC is an inbuilt security feature in the IPv6
on the application protocol
In IPv4 Packet flow identification In IPv6 packet flow identification are Available and
is not available uses the flow label field in the header
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are separated by a
separated by addresses dot (.) colon (:)
Example of IPv6:
Example of IPv4: 66.94.29.13
2001:0000:3238:DFE1:0063:0000:0000:FEFB
Quality of Service
Advantages of BOOTP
● Automates IP Configuration: Devices can easily and automatically
get IP address and other network settings as required by a
network.
● Supports Additional Configurations: It also contains other
information like the gateway and the subnet mask which is useful
in complicated network configuration.
● Widely Supported: BOOTP is widely supported by many routers
and servers making its implementation quite easy.
Disadvantages of BOOTP
● Static Configuration: Configuration of the server is done by the
coder and it does not support assigning of IPs like the DHCP.
● Limited Features: On the same note, BOOTP has been observed
to have fewer options and high rigidity as compared to other
emerging protocols such as DHCP.
What is RARP?
Reverse Address Resolution Protocol (RARP) is a type of internet
protocol that is used by the client machine to deal with the Internet
Protocol address (IPv4) which asks the server for gateway router
protocol and the request for the connection in the local area
network (LAN) gets accepted by the host machine. A table in the
gateway router of the host machine is created by the administrator
of the network which grants the user with the access to the creating
of new IP address of the machine and linking it to its MAC address of
the same machine. It is most popularly known as the network layer
protocol which deals with the configuration and mapping of a device
with the IP address and the MAC address of the same device.
Advantages of RARP
● Simple Operation: RARP has a quite simple operation which
makes its implementation rather more convenient in systems that
require purely IP address assignment only.
● Low Overhead: In terms of functionality, RARP is rather limited as
it is only in charge of allocating IP addresses and, therefore, is not
very resource-intensive.
Disadvantages of RARP
● Limited Functionality: As mentions earlier, RARP only replies the
IP address of this machine and does not contain other
configuration information such as subnet mask or gateway etc.
● Dependency on Broadcasts: RARP totally relies on broadcasts;
thus, it is less efficient and slower as the contemporary protocols
like BOOTP or DHCP.
Differences between BOOTP and RARP
BOOTP RARP
Conclusion
In computer networking, BOOTP and RARP protocols are networking
protocols that promote communication between devices. Both
protocols have distinguishable features, the BOOTP protocol is more
advanced than the RARP protocol. BOOTP can dynamically allot IP
addresses and bootstrap information to network devices during
bootup. It is more secure and stable. Whereas RARP protocol is not
used much nowadays because of its limited flexibility and involves
the manual configuration of MAC addresses. It is mainly used for
mapping the MAC addresses of devices to IP addresses in LAN (Local
Area Network).
Dynamic Host Configuration Protocol (DHCP)
●
●
●
Working of DHCP
Now, for the offer message, the source IP address is 172.16.32.12 (server’s
IP address in the example), the destination IP address is 255.255.255.255
(broadcast IP address), the source MAC address is 00AA00123456, the
destination MAC address is 00:11:22:33:44:55 (client’s MAC address). Here,
the offer message is broadcast by the DHCP server therefore destination IP
address is the broadcast IP address and destination MAC address is
00:11:22:33:44:55 (client’s MAC address)and the source IP address is the
server IP address and the MAC address is the server MAC address.
Also, the server has provided the offered IP address 192.16.32.51 and a lease
time of 72 hours(after this time the entry of the host will be erased from the
server automatically). Also, the client identifier is the PC MAC address
(08002B2EAF2A) for all the messages.
3. DHCP Request Message: When a client receives an offer message, it
responds by broadcasting a DHCP request message. The client will produce a
gratuitous ARP in order to find if there is any other host present in the network
with the same IP address. If there is no reply from another host, then there is
no host with the same TCP configuration in the network and the message is
broadcasted to the server showing the acceptance of the IP address. A Client
ID is also added to this message.
Now the server will make an entry of the client host with the offered IP
address and lease time. This IP address will not be provided by the server to
any other host. The destination MAC address is 00:11:22:33:44:55 (client’s
MAC address) and the destination IP address is 255.255.255.255 and the
source IP address is 172.16.32.12 and the source MAC address is
00AA00123456 (server MAC address).
5. DHCP Negative Acknowledgment Message: Whenever a DHCP server
receives a request for an IP address that is invalid according to the scopes
that are configured, it sends a DHCP Nak message to the client. Eg-when the
server has no IP address unused or the pool is empty, then this message is
sent by the server to the client.
6. DHCP Decline: If the DHCP client determines the offered configuration
parameters are different or invalid, it sends a DHCP decline message to the
server. When there is a reply to the gratuitous ARP by any host to the client,
the client sends a DHCP decline message to the server showing the offered
IP address is already in use.
7. DHCP Release: A DHCP client sends a DHCP release packet to the server
to release the IP address and cancel any remaining lease time.
8. DHCP Inform: If a client address has obtained an IP address manually
then the client uses DHCP information to obtain other local configuration
parameters, such as domain name. In reply to the DHCP inform message, the
DHCP server generates a DHCP ack message with a local configuration
suitable for the client without allocating a new IP address. This DHCP ack
message is unicast to the client.
Note – All the messages can be unicast also by the DHCP relay agent if the
server is present in a different network.
Security Considerations for Using DHCP
To make sure your DHCP servers are safe, consider these DHCP security
issues:
● Limited IP Addresses : A DHCP server can only offer a set number of IP
addresses. This means attackers could flood the server with requests,
causing essential devices to lose their connection.
● Fake DHCP Servers : Attackers might set up fake DHCP servers to give
out fake IP addresses to devices on your network.
● DNS Access : When users get an IP address from DHCP, they also get
DNS server details. This could potentially allow them to access more data
than they should. It’s important to restrict network access, use firewalls,
and secure connections with VPNs to protect against this.
Protection Against DHCP Starvation Attack
A DHCP starvation attack happens when a hacker floods a DHCP server with
requests for IP addresses. This overwhelms the server, making it unable to
assign addresses to legitimate users. The hacker can then block access for
authorized users and potentially set up a fake DHCP server to intercept and
manipulate network traffic, which could lead to a man-in-the-middle attack.
Reasons Why Enterprises Must Automate DHCP?
Automating your DHCP system is crucial for businesses because it reduces
the time and effort your IT team spends on manual tasks. For instance,
DHCP-related issues like printers not connecting or subnets not working with
the main network can be avoided automatically.
Automated DHCP also allows your operations to grow smoothly. Instead of
hiring more staff to handle tasks that automation can manage, your team can
focus on other important areas of business growth.
Advantages
● Centralized management of IP addresses.
● Centralized and automated TCP/IP configuration .
● Ease of adding new clients to a network.
● Reuse of IP addresses reduces the total number of IP addresses that are
required.
● The efficient handling of IP address changes for clients that must be
updated frequently, such as those for portable devices that move to
different locations on a wireless network.
● Simple reconfiguration of the IP address space on the DHCP server
without needing to reconfigure each client.
● The DHCP protocol gives the network administrator a method to configure
the network from a centralized area.
● With the help of DHCP, easy handling of new users and the reuse of IP
addresses can be achieved.
Disadvantages
● IP conflict can occur.
● The problem with DHCP is that clients accept any server. Accordingly,
when another server is in the vicinity, the client may connect with this
server, and this server may possibly send invalid data to the client.
● The client is not able to access the network in absence of a DHCP Server.
● The name of the machine will not be changed in a case when a new IP
Address is assigned.
Conclusion
In conclusion, DHCP is a technology that simplifies network setup by
automatically assigning IP addresses and network configurations to devices.
While DHCP offers convenience, it’s important to manage its security
carefully. Issues such as IP address exhaustion, and potential data access
through DNS settings highlight the need for robust security measures like
firewalls and VPNs to protect networks from unauthorized access and
disruptions. DHCP remains essential for efficiently managing network
connections while ensuring security against potential risks.
unicasting
In this communication there is one source and one destination.There is one to
one relationship between source and the destination.The address of the
source and the destination in the IP diagram are the unicast address which
are assigned to the host.In the unicasting when the router receives the
packets the packet is forwarded through only one of its interfaces as
described in the routing table.A packet can be discarded by the router if it is
unable to find the destination address in the routing table.
.2)multicasting
multicasting
In this type of the communication there is one source and group of the
destinations.The relation is one to many type.The source address is the
unicast address but the destination address is the group address i.e it defines
one or more destinations.The group address identifies the members of the
group.When the router receives the packet it forwards it through the several of
its interfaces.In this type of the communication technique the router forwards
the received packets.
3.Broadcasting
In this communication on the relationship between the source and the
destination is one to all. In this one host is the source and other hosts are the
destinations.The internet does not support the broadcasting as there is huge
amount of the traffic and because of the bandwidth it needs.
APPLICATIONS
Multicasting technique has many applications in day today.
1)Access to the distributed databases.
The information is stored in more than one location at the time of the
production.The user who needs to access the data does not know about the
location of the information.In the multi cast to all the data base location and
the location has the information responds.
2)Information Dissemination
Bussiness often sends the information to the customers and the nature of the
information has to be same for each customer.
3)Teleconferencing
It involves multicasting.The indivisual attending the teleconference.Temporary
or permanent groups can be formed for this purpose.
4)Distance Learning
One growing area in the use of multicasting is the distance learning.It is
convenient for the students who find it difficult to attend the classes on the
campus.
Multicast Routing
In the case of the multicasting the concept of the optimal routing is to be
considered.
Optimal routing routing:shortest path trees
In this the root of the tree is the source and the leaves are the potential
destination.The path from the roots to the destination is considered as the
shortest path.
The formation of the trees and the number of the trees varies in the
multicating and unicasting.
In the multicast routing when the router receives the multicast packet,it might
have destinations in more than one network.Forwarding it requires the
shortest path of the tree.if there are n groups then n shortest path trees are
needed.
Routing Protocols
1)Distance Vector Multicast Routing Protocol is an implementation of the
multicast distance vector routing.It can said as the source based routing
protocol which is based on the RIP.
2)Core based tree protocol is nothing but a group shared protocol that uses
the core as the root of the tree.The AS system is divided into various regions
and the core is chosen from this region
3)Protocol independent Multicast is the name which is given to the two
independent multicast routing protocols.
a)Protocol Independent multicast Dense Mode(PIM-DM)
b)Protocol Independent.Multicast Sparse mode(PIM-SM)
PIM-DM is used in the case when there is the probability that each router is
involved in the multicasting.In this all the routers are involved in the process to
broadcast the packets.
PIM-SM is used when there is possibility that each router is involved in the
multi casting.The use of the protocols that are used to broadcast the packet
are not justified.It is basically used in the multicast environment such as WAN.
Related Questions and Answers
Q.What are the delivery techniques??
There are two types of the delivery techniques
1. direct delivery 2.indirect delivery
Q what is the concept of forwarding??
The Forwarding is the process in which the data are forwarded to the
destination.
Q.What is multicasting??
In the multi casting the data packet is to be delivered from the single source to
the multiple destinations.
Q what do you mean by the term Routing??
The term routing means the way the routing tables are created to help out in
the forwarding process.
After Completion of Unit II and III you should be able to answer the following
Questions
1. Explain Design issues of the data link layer and services to the network layer with the
help of diagram.
3. What are 4 main error correction codes? Explain any one in detail with example.
10. Suppose there are four strings 010, 011, 101 and 111. Calculate the minimum
Hamming distance.
11. Differentiate between Go-Back-N and Selective Repeat Protocol in tabular form.
12. Describe the Channel allocations problem of the Medium Access Sublayer.
13. Draw the flow chart of the types of multiple access protocols.
16. What are the main differences between Adaptive and Non-Adaptive Routing
Algorithms?
The Transport Layer in the OSI (Open Systems Interconnection) model is responsible for
providing reliable and efficient data transfer between computers on a network. It serves as a
bridge between the application layer (layer 7) and the network layer (layer 3). It ensures that data
is transmitted accurately and efficiently from the source to the destination by handling various
functions like error detection, flow control, and connection management.
TCP (Connection-
Feature UDP (Connectionless)
Oriented)
Connection Requires handshake No connection required
Reliability Guaranteed delivery No guarantee
Order of
Maintains order No ordering guarantee
delivery
Error Basic error detection
Yes, with acknowledgments
correction only
Faster, minimal
Speed Slower, more overhead
overhead
Streaming, gaming,
Use cases Web, email, file transfer
DNS
1. Segmentation and Reassembly: Divides large messages into smaller segments and
reassembles them at the destination.
2. Flow Control: Manages the rate of data transmission to prevent overwhelming the
receiver.
3. Error Detection and Correction: Identifies errors during data transfer and attempts to
correct them.
4. Multiplexing and Demultiplexing: Allows multiple applications to share a single
network connection by using port numbers.
5. Connection Establishment and Termination: Manages the setup and closing of
connections (TCP only).
Conclusion
The Transport Layer is crucial for enabling seamless communication between networked
devices. By providing services like reliable delivery, error correction, and flow control, it ensures
that data is transferred accurately and efficiently.
A transport protocol defines the rules and methods that the transport layer uses to deliver data
reliably and efficiently between hosts over a network. Examples of widely used transport
protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
The elements of a transport protocol include several mechanisms and techniques to ensure
reliable, ordered, and error-checked communication. These elements are crucial for providing
transport services to the upper layers of the OSI model.
0. SYN (synchronize)
1. SYN-ACK (synchronize acknowledgment)
2. ACK (acknowledgment)
o After data transfer, the connection is closed gracefully using a termination
sequence.
2. Data Segmentation and Reassembly
o Large messages are divided into smaller segments to fit within the maximum
transmission unit (MTU) of the network.
o Each segment is assigned a sequence number for correct reassembly at the
receiver's side.
o This process ensures data integrity and proper ordering.
3. Multiplexing and Demultiplexing
o Multiplexing allows multiple applications to use the same network connection by
assigning unique port numbers.
o Demultiplexing at the receiver’s end ensures that incoming data is delivered to
the correct application.
4. Error Detection and Correction
o Error detection is performed using checksums in TCP and UDP headers to
detect any corruption in transmitted segments.
o TCP supports error correction through automatic retransmission of lost or
corrupted segments (using acknowledgments and timeouts).
o UDP only detects errors but does not correct them.
5. Flow Control
o Flow control mechanisms, like TCP's sliding window protocol, prevent a fast
sender from overwhelming a slower receiver.
o The window size adjusts dynamically based on the network conditions to control
the flow of data.
6. Congestion Control
o Prevents network congestion by adjusting the rate of data transmission based on
the network’s capacity.
o TCP uses algorithms like Slow Start, Congestion Avoidance, and Fast Recovery
to handle congestion.
o UDP does not have built-in congestion control, which makes it suitable for
applications that prioritize speed over reliability.
7. Sequence Numbers and Acknowledgments
o TCP assigns a sequence number to each segment to ensure that they are received
in the correct order.
o The receiver sends back an acknowledgment number indicating the next
expected byte.
o This mechanism helps detect lost or duplicated segments.
8. Timers and Retransmission
o Transport protocols use various timers to manage retransmission, connection
timeouts, and connection termination.
o If an acknowledgment is not received within a certain timeframe, TCP
retransmits the segment, assuming it was lost.
9. Checksum
o A checksum is used to detect errors in the header and data portions of a segment.
o If the checksum computed by the receiver does not match the value in the header,
the segment is considered corrupted and may be discarded.
Element Description
Identifies source and destination applications using port
Addressing
numbers.
Connection Establishment Sets up and tears down connections (TCP).
Data Segmentation Splits data into smaller segments for transmission.
Multiplexing/
Manages multiple connections on the same network interface.
Demultiplexing
Error Detection/Correction Ensures data integrity with checksums and retransmissions.
Controls data flow between sender and receiver to avoid
Flow Control
overload.
Prevents network congestion with dynamic rate adjustments
Congestion Control
(TCP).
Ensures segments are delivered in order and without
Sequence Numbers
duplication.
Timers/Retransmission Manages timeouts and retransmission of lost segments.
Checksum Validates segment integrity.
These elements work together to ensure that data is delivered reliably, accurately, and
efficiently between communicating hosts. The choice of transport protocol (TCP vs. UDP)
depends on the application's requirements, such as reliability vs. speed.
The transport layer is the fourth layer in the OSI model and the
second layer in the TCP/IP model. The transport layer provides with
end to end connection between the source and the destination and
reliable delivery of the services. Therefore transport layer is known
as the end-to-end layer. The transport layer takes the services from
its upward layer which is the application layer and provides it to the
network layer. Segment is the unit of data encapsulation at the
transport layer.
In this article, we are going to discuss all the important aspects of
Transport Layer Protocol which include: Functions of Transport Layer
protocol, characteristics of TLP, UDP & UDP Segemnts and their
Advantages and Disadvantages, TCP & TCP Segemnts and their
Advantages and Disadvantages, SCTP and its Advantages &
Disadvantages.
Functions of Transport Layer
● The process to process delivery
● End-to-end connection between devices
● Multiplexing and Demultiplexing
● Data integrity and error Correction
● Congestion Control
● Flow Control
Characteristics of Transport Layer Protocol
● The two protocols that make up the transport layer are TCP and
UDP.
● A datagram is sent by the IP protocol at the network layer from a
source host to a destination host.
● These days, an operating system can support environments with
multiple users and processes; a programme under execution is
referred to as a process.
● A source process is transmitting a process to a destination
process when a host sends a message to another host. Certain
connections to certain ports, referred to as protocol ports, are
defined by the transport layer protocols.
● A positive integer address, consisting of 16 bits, defines each
port.
Transport Layer Protocols
The transport layer is represented majorly by TCP and UDP
protocols. Today almost all operating systems support
multiprocessing multi-user environments. This transport layer
protocol provides connections to the individual ports. These ports
are known as protocol ports. Transport layer protocols work above
the IP protocols and deliver the data packets from IP serves to
destination port and from the originating port to destination IP
services. Below are the protocols used at the transport layer.
1. UDP
UDP stands for User Datagram Protocol. User Datagram Protocol
provides a nonsequential transmission of data. It is a connectionless
transport protocol. UDP protocol is used in applications where the
speed and size of data transmitted is considered as more important
than the security and reliability. User Datagram is defined as a
packet produced by User Datagram Protocol. UDP protocol adds
checksum error control, transport level addresses, and information
of length to the data received from the layer above it. Services
provided by User Datagram Protocol(UDP) are connectionless
service, faster delivery of messages, checksum, and process-to-
process communication.
UDP Segment
While the TCP header can range from 20 to 60 bytes, the UDP
header is a fixed, basic 8 bytes. All required header information is
contained in the first 8 bytes, with data making up the remaining
portion. Because UDP port number fields are 16 bits long, the range
of possible port numbers is defined as 0 to 65535, with port 0 being
reserved.
UDP
TCP Segment
A TCP segment’s header may have 20–60 bytes. The options take
about 40 bytes. A header consists of 20 bytes by default, although it
can contain up to 60 bytes.
Advantages of SCTP
● SCTP provides a full duplex connection. It can send and receive
the data simultaneously.
● SCTP protocol possesses the properties of both TCP and UDP
protocol.
● SCTP protocol does not depend on the IP layer.
● SCTP is a secure protocol.
Disadvantages of SCTP
● To handle multiple streams simultaneously the applications need
to be modified accordingly.
● The transport stack on the node needs to be changed for the
SCTP protocol.
● Modification is required in applications if SCTP is used instead of
TCP or UDP protocol.
Congestion Control
●
●
●
● Delay, Increase in delay means destination will find the packet later than
expected, Importance of delay changes according to the various
application.
● Jitter, Variation of the delay is jitter, If the delay is not at a constant rate, it
may result in poor quality.
1. Overprovisioning –
The logic of overprovisioning is to provide greater router capacity, buffer
space and bandwidth. It is an expensive technique as the resources are
costly. Eg: Telephone System.
2. Buffering –
Flows can be buffered on the receiving side before being delivered. It will
not affect reliability or bandwidth, but helps to smooth out jitter. This
technique can be used at uniform intervals.
3. Traffic Shaping –
It is defined as about regulating the average rate of data transmission. It
smooths the traffic on server side other than client side. When a
connection is set up, the user machine and subnet agree on a certain
traffic pattern for that circuit called as Service Level Agreement. It reduces
congestion and thus helps the carrier to deliver the packets in the agreed
pattern.
In the network layer, before the network can make Quality of service
guarantees, it must know what traffic is being guaranteed. One of
the main causes of congestion is that traffic is often bursty.
To understand this concept first we have to know little about traffic
shaping. Traffic Shaping is a mechanism to control the amount
and the rate of traffic sent to the network. Approach of congestion
management is called Traffic shaping. Traffic shaping helps to
regulate the rate of data transmission and reduces congestion.
There are 2 types of traffic shaping algorithms:
1. Leaky Bucket
2. Token Bucket
Suppose we have a bucket in which we are pouring water, at
random points in time, but we have to get water at a fixed rate, to
achieve this we will make a hole at the bottom of the bucket. This
will ensure that the water coming out is at some fixed rate, and also
if the bucket gets full, then we will stop pouring water into it.
The input rate can vary, but the output rate remains constant.
Similarly, in networking, a technique called leaky bucket can smooth
out bursty traffic. Bursty chunks are stored in the bucket and sent
out at an average rate.
Since n > size of the packet at the head of the Queue, i.e. n > 200
Therefore, n = 1000-200 = 800
Packet size of 200 is sent into the network.
Now, again n > size of the packet at the head of the Queue, i.e. n >
400
Therefore, n = 800-400 = 400
Packet size of 400 is sent into the network.
Since, n < size of the packet at the head of the Queue, i.e. n < 450
Therefore, the procedure is stopped.
Initialise n = 1000 on another tick of the clock.
This procedure is repeated until all the packets are sent into the
network.
Below is the implementation of above explained approach:
C++JavaPythonC#JavaScript
// cpp program to implement leakybucket
#include <bits/stdc++.h>
using namespace std;
int main()
{
int no_of_queries, storage, output_pkt_size;
int input_pkt_size, bucket_size, size_left;
When the host has to send a In this, the bucket holds tokens
packet , packet is thrown in generated at regular intervals of
bucket. time.
Unit – V
The Application Layer
Domain Name System
The Domain Name System (DNS) is a hierarchical and distributed system that
translates human-readable domain names into machine-readable IP
addresses:
● How it works
DNS acts like a phone book for the internet, connecting domain names to IP
addresses. When you type a domain name into your web browser, DNS servers
translate the request into an IP address, which allows your browser to access the
website.
● How it's used
DNS is an important part of the web's infrastructure. Every time you visit a website, your
computer performs a DNS lookup. Complex pages may require multiple DNS lookups
before they start loading.
● How it's implemented
DNS is part of the TCP/IP protocol suite. The DNS process involves four servers,
including a DNS recursor, which receives the query from the DNS client and
communicates with other DNS servers to find the IP address.
● Domain name rules
There are rules for domain names, including:
● A maximum of 127 levels of subdomains
● A maximum of 63 characters per label
● A maximum total domain character length of 253 characters
● Labels cannot start or end with hyphens
● TLD names cannot be fully numeric
You can find your computer's domain name by:
1. Clicking on the Start Menu
2. Going to Control Panel
3. Selecting System and Security
4. Selecting System
5. Looking at the bottom of the screen
Electronic Mail
●
●
●
Introduction:
Electronic mail, commonly known as email, is a method of
exchanging messages over the internet. Here are the
basics of email:
To send an email:
1. Compose a new message in your email client.
2. Enter the recipient’s email address in the “To” field.
3. Add a subject line to summarize the content of the message.
4. Write the body of the message.
5. Attach any relevant files if needed.
6. Click “Send” to deliver the message to the recipient’s email
server.
7. Emails can also include features such as cc (carbon copy) and bcc
(blind carbon copy) to send copies of the message to multiple
recipients, and reply, reply all, and forward options to manage the
conversation.
Electronic Mail (e-mail) is one of most widely used services
of Internet. This service allows an Internet user to send a message
in formatted manner (mail) to the other Internet user in any part
of world. Message in mail not only contain text, but it also contains
images, audio and videos data. The person who is sending mail is
called sender and person who receives mail is called recipient. It
is just like postal mail service. Components of E-Mail
System : The basic components of an email system are : User
Agent (UA), Message Transfer Agent (MTA), Mail Box, and Spool file.
These are explained as following below.
1. User Agent (UA) : The UA is normally a program which is used
to send and receive mail. Sometimes, it is called as mail reader. It
accepts variety of commands for composing, receiving and
replying to messages as well as for manipulation of the
mailboxes.
2. Message Transfer Agent (MTA) : MTA is actually responsible
for transfer of mail from one system to another. To send a mail, a
system must have client MTA and system MTA. It transfer mail to
mailboxes of recipients if they are connected in the same
machine. It delivers mail to peer MTA if destination mailbox is in
another machine. The delivery from one MTA to another MTA is
done by Simple Mail Transfer Protocol.
Advantages Or Disadvantages:
Advantages of email:
Disadvantages of email:
The World Wide Web (WWW), often called the Web, is a system of
interconnected webpages and information that you can access using
the Internet. It was created to help people share and find
information easily, using links that connect different pages together.
The Web allows us to browse websites, watch videos, shop online,
and connect with others around the world through our computers
and phones.
All public websites or web pages that people may access on their
local computers and other devices through the internet are
collectively known as the World Wide Web or W3. Users can get
further information by navigating to links interconnecting these
pages and documents. This data may be presented in text, picture,
audio, or video formats on the internet.
What is WWW?
WWW stands for World Wide Web and is commonly known as the
Web. The WWW was started by CERN in 1989. WWW is defined as
the collection of different websites around the world, containing
different information shared via local servers(or computers).
Web pages are linked together using hyperlinks which are HTML-
formatted and, also referred to as hypertext, these are the
fundamental units of the Internet and are accessed
through Hypertext Transfer Protocol(HTTP). Such digital
connections, or links, allow users to easily access desired
information by connecting relevant pieces of information. The
benefit of hypertext is it allows you to pick a word or phrase from
the text and click on other sites that have more information about it.
History of the WWW
It is a project created, by Tim Berner Lee in 1989, for researchers to
work together effectively at CERN. It is an organization, named
the World Wide Web Consortium (W3C), which was developed for
further development of the web. This organization is directed by Tim
Berner’s Lee, aka the father of the web. CERN, where Tim Berners
worked, is a community of more than 1700 researchers from more
than 100 countries. These researchers spend a little time on CERN
and the rest of the time they work at their colleges and national
research facilities in their home country, so there was a requirement
for solid communication so that they can exchange data.
System Architecture
From the user’s point of view, the web consists of a vast, worldwide
connection of documents or web pages. Each page may contain
links to other pages anywhere in the world. The pages can be
retrieved and viewed by using browsers of which internet explorer,
Netscape Navigator, Google Chrome, etc are the popular ones. The
browser fetches the page requested interprets the text and
formatting commands on it, and displays the page, properly
formatted, on the screen.
The basic model of how the web works are shown in the figure
below. Here the browser is displaying a web page on the client
machine. When the user clicks on a line of text that is linked to a
page on the abd.com server, the browser follows the hyperlink by
sending a message to the abd.com server asking it for the page.
Here the browser displays a web page on the client machine when
the user clicks on a line of text that is linked to a page on abd.com,
the browser follows the hyperlink by sending a message to the
abd.com server asking for the page.
Working of WWW
A Web browser is used to access web pages. Web browsers can be
defined as programs which display text, data, pictures, animation
and video on the Internet. Hyperlinked resources on the World Wide
Web can be accessed using software interfaces provided by Web
browsers. Initially, Web browsers were used only for surfing the Web
but now they have become more universal.
The below diagram indicates how the Web operates just like client-
server architecture of the internet. When users request web pages
or other information, then the web browser of your system request
to the server for the information and then the web server provide
requested services to web browser back and finally the requested
service is utilized by the user who made the request.