Compute Network Notes
Compute Network Notes
Guided and unguided, Attenuation, distortion, noise, throughput, propagation speed and
time, wavelength, Shannon capacity, comparison of media
UNIT-III Telephony:
Multiplexing, error detection and correction: Many to one, One to many, WDM, TDM, FDM,
Circuit switching, packet switching and message switching. Data link control protocols: Line
discipline, flow control, error control, synchronous and asynchronous protocols, character
and bit oriented protocols, Link access procedures. Point to point controls: Transmission
states, PPP layers, LCP, Authentication, NCP. ISDN: Services, Historical outline,
subscriber’s access, ISDN Layers and broadcast ISDN.
UNIT-IV Devices:
Repeaters, bridges, gateways, routers, The Network Layer; Design issues, Routing
algorithms, Congestion control Algorithms, Quality of service, Internetworking,
Network-Layer in the internet.
1. Message:
○ The data to be communicated. It can be text, numbers, images, audio, or
video.
○ Example: Sending an image via WhatsApp.
2. Sender:
○ The device that originates the message.
○ Example: A laptop, smartphone, or workstation.
3. Receiver:
○ The device that accepts the message.
○ Example: Receiving an email on a smartphone.
4. Transmission Medium:
○ The physical path or channel through which data is transmitted.
■ Examples:
■ Guided Medium: Copper wires, fiber optic cables.
■ Unguided Medium: Radio waves, microwaves.
5. Protocol:
○ A set of rules governing data communication, ensuring proper transmission
and understanding.
○ Examples: HTTP (web browsing), FTP (file transfer), TCP/IP (internet).
2. Distributed Processing
Distributed processing involves splitting tasks among multiple devices instead of relying
on a single computer. This ensures faster processing and reduced workload.
Advantages:
Example:
Google Search uses distributed processing. When you search something, your query is
sent to multiple servers, which process parts of the data simultaneously, returning results
quickly.
Example:
The IEEE 802.11 standard defines Wi-Fi communication rules. If you connect your phone to
a Wi-Fi network, it follows this standard to ensure compatibility.
4. Line Configuration
Types:
1. Point-to-Point:
○ Direct link between two devices.
○ Example: A printer directly connected to a computer with a USB cable.
2. Multipoint:
○ A single communication line is shared by multiple devices.
○ Example: A bus topology in a LAN where multiple computers connect to the
same cable.
5. Topology
Types:
1. Bus Topology:
○ All devices share a single backbone cable.
○ Example: Older Ethernet networks.
○ Advantage: Cost-effective.
○ Disadvantage: Single point of failure.
2. Star Topology:
○ All devices connect to a central hub or switch.
○ Example: Home Wi-Fi networks.
○ Advantage: Easy to troubleshoot.
○ Disadvantage: Failure of the hub affects all connections.
3. Ring Topology:
○ Devices form a closed loop. Data flows in one direction.
○ Example: Token Ring networks.
4. Mesh Topology:
○ Every device connects to every other device.
○ Example: Internet backbone.
○ Advantage: Redundancy ensures fault tolerance.
5. Hybrid Topology:
○ Combination of two or more topologies.
○ Example: A corporate network using both star and mesh configurations.
6. Transmission Modes
Transmission modes describe the direction of data flow.
Types:
1. Simplex:
○ Data flows in one direction only.
○ Example: TV broadcast.
2. Half-Duplex:
○ Data flows in both directions but one at a time.
○ Example: Walkie-talkie communication.
3. Full-Duplex:
○ Data flows in both directions simultaneously.
○ Example: Phone calls.
7. Categories of Networks
Comparison:
9. Digital Transmission
DTE-DCE Interface:
Modems:
● Converts digital signals to analog (modulation) for transmission over telephone lines.
● Example: Dial-up internet connection.
Cable Modems:
Transmission media are the physical pathways used to transmit data from one device to
another.
1. Radio Waves:
○ Low-frequency signals for wireless transmission.
○ Used in broadcasting (FM/AM), Wi-Fi, and mobile communication.
○ Example: Home Wi-Fi router.
2. Microwaves:
○ Higher frequency signals, requiring line of sight.
○ Used in satellite communication and telephone systems.
○ Example: Satellite TV (DTH).
3. Infrared:
○ Short-range communication using infrared light signals.
○ Example: Remote controls and IR data transfer.
4. Bluetooth:
○ Wireless technology for short-distance data transfer.
○ Example: Wireless earphones and mobile-to-laptop data transfer.
1. Attenuation:
○ The loss of signal strength over distance.
○ Example: In wired networks, signals weaken as they travel over long cables.
○ Solution: Use amplifiers or repeaters to boost signals.
2. Distortion:
○ Changes in the shape of the signal during transmission.
○ Cause: Different frequency components travel at different speeds.
3. Noise:
○ Unwanted electrical signals that interfere with data transmission.
○ Types of Noise:
■ Thermal noise (due to heat).
■ Crosstalk (interference between two signals).
○ Example: Crackling sound during phone calls.
3. Throughput, Propagation Speed, and Time
1. Throughput:
○ The amount of data transmitted successfully over a medium in a given time.
○ Example: If 10 MB of data is transmitted in 5 seconds, the throughput is 2
MB/s.
2. Propagation Speed:
○ The speed at which signals travel through a medium.
○ Example: Light signals in fiber optics travel at nearly the speed of light.
3. Propagation Time:
○ The time it takes for a signal to travel from sender to receiver.
○ Formula: Propagation Time=DistancePropagation Speed\text{Propagation
Time} = \frac{\text{Distance}}{\text{Propagation Speed}}Propagation
Time=Propagation SpeedDistance
1. Wavelength:
○ The distance between two consecutive peaks of a signal.
○ Wavelength and frequency are inversely related: Wavelength=Speed of
LightFrequency\text{Wavelength} = \frac{\text{Speed of
Light}}{\text{Frequency}}Wavelength=FrequencySpeed of Light
2. Shannon Capacity:
○ Defines the maximum data rate a channel can support without errors.
○ Formula:
C=Blog2(1+S/N)C = B \log_2(1 + S/N)C=Blog2(1+S/N)
■ C: Channel capacity (bps).
■ B: Bandwidth (Hz).
■ S/N: Signal-to-noise ratio.
○ Example: If bandwidth is 1 MHz and signal-to-noise ratio is 10, the channel
capacity can be calculated.
5. Comparison of Media
Property Twisted Pair Coaxial Cable Fiber Optic Wireless
1. Multiplexing
Multiplexing is the process of combining multiple signals into one channel for transmission.
It maximizes the use of bandwidth.
Types of Multiplexing:
Errors occur during data transmission due to noise or interference. These errors need to be
detected and corrected.
Error Detection Methods:
1. Parity Check:
○ Adds a parity bit (even or odd) to ensure data integrity.
○ Example:
■ Data: 1010 → Parity bit added: 10101.
2. Checksum:
○ Data blocks are summed, and the sum is sent with the data. The receiver
verifies it.
3. Cyclic Redundancy Check (CRC):
○ A more complex method using division and polynomial coding.
○ Used in Ethernet and communication protocols.
Error Correction:
3. Switching Techniques
Types of Switching:
1. Circuit Switching:
○ Establishes a dedicated path for the entire communication session.
○ Example: Traditional telephone calls.
2. Packet Switching:
○ Data is broken into packets and sent independently. Packets are
reassembled at the destination.
○ Example: Internet data transfer (TCP/IP).
3. Message Switching:
○ Entire messages are stored and forwarded node by node.
○ Example: Email transmission.
4. Data Link Control Protocols
Data link control ensures reliable communication between two directly connected nodes.
Components:
1. Synchronous Protocols:
○ Data is sent in a continuous stream with a clock signal.
○ Example: Ethernet.
2. Asynchronous Protocols:
○ Data is sent in small chunks with start and stop bits.
○ Example: Serial communication (e.g., USB).
PPP is a data link layer protocol that establishes a direct connection between two nodes.
PPP Layers:
1. LCP (Link Control Protocol): Establishes, configures, and tests the connection.
2. Authentication:
○ Verifies the identity of devices using protocols like PAP (Password
Authentication Protocol) and CHAP (Challenge Handshake Authentication
Protocol).
3. NCP (Network Control Protocol): Configures network layer protocols like IP.
7. ISDN (Integrated Services Digital Network)
Features:
Components:
● ISDN Layers: Uses physical, data link, and network layers for communication.
UNIT-IV: Network Devices, Network Layer, and
Internet
1. Network Devices
Network devices are hardware components that connect computers and facilitate
communication.
Types of Devices:
1. Repeaters:
○ Amplify or regenerate signals to extend the range of transmission.
○ Example: Used in Ethernet to extend cable length.
2. Bridges:
○ Connect two LAN segments and filter traffic based on MAC addresses.
○ Example: A bridge can connect a wired LAN with a wireless LAN.
3. Routers:
○ Connect different networks and determine the best path for data.
○ Operate at the Network Layer (Layer 3).
○ Example: Home internet router connects devices to the internet.
4. Gateways:
○ Connect networks with different protocols.
○ Example: A gateway connects an email system to an SMS system.
The Network Layer (Layer 3 in the OSI model) is responsible for logical addressing, routing,
and packet forwarding.
3. Routing Algorithms
Routing algorithms decide how packets are sent through the network.
Types of Routing:
1. Static Routing:
○ Routing tables are manually configured.
○ Example: Small networks where paths rarely change.
2. Dynamic Routing:
○ Routers update routing tables automatically based on network conditions.
○ Protocols:
■ RIP (Routing Information Protocol): Uses hop count.
■ OSPF (Open Shortest Path First): Uses link state and Dijkstra’s
algorithm.
Example:
Congestion occurs when network traffic exceeds capacity, leading to delays or packet loss.
QoS Parameters:
Example:
● In a video call, QoS prioritizes voice and video over file downloads.
6. Internetworking
Components:
Example:
Key Protocols:
1. IPv4:
○ 32-bit addresses, written in dotted decimal format.
○ Example: 192.168.1.1.
2. IPv6:
○ 128-bit addresses, written in hexadecimal format.
○ Example: fe80::1.
3. ICMP (Internet Control Message Protocol):
○ Used for error messages and diagnostic purposes.
○ Example: The ping command uses ICMP.
UNIT-V: Transport and Upper Layers in the OSI
Model
The Transport Layer is responsible for reliable data delivery between processes running on
two different devices.
1. Connection-Oriented Communication:
○ A connection is established before data transfer.
○ Ensures reliable delivery.
○ Example: TCP.
2. Connectionless Communication:
○ Data is sent without establishing a connection.
○ Faster but less reliable.
○ Example: UDP (User Datagram Protocol).
1. Session Establishment:
○ Starts and manages communication sessions.
2. Synchronization:
○ Adds checkpoints (synchronization points) to the data stream.
○ Example: In a large file download, checkpoints allow resuming from the last
point if interrupted.
3. Session Termination:
○ Properly closes the session once the data transfer is complete.
The Presentation Layer deals with the formatting, encryption, and compression of data
for proper interpretation.
1. Data Translation:
○ Converts data into a format understood by the application.
○ Example: Converts ASCII to EBCDIC.
2. Data Compression:
○ Reduces the size of data for faster transmission.
○ Example: Compressing images using JPEG or PNG.
3. Encryption and Decryption:
○ Encrypts data for security during transmission and decrypts it at the
destination.
○ Example: HTTPS uses SSL/TLS for encryption.
The Application Layer is the topmost layer of the OSI model. It provides services directly to
users and applications.
1. Network Services:
○ Provides access to network services like file transfer, email, and remote login.
2. Resource Sharing:
○ Enables sharing of resources like printers or files over a network.
3. Application Access:
○ Provides access to applications like web browsers, email clients, and FTP
tools.