0% found this document useful (0 votes)
26 views26 pages

Difference in CN - PD

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views26 pages

Difference in CN - PD

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Detailed Notes on Application Layer Technologies

1. DNS (Domain Name System)


• What it is: Converts human-readable domain names (e.g., google.com) into IP addresses.
• Advantage:
• Simplifies internet usage by allowing users to remember domain names instead of
numeric IP addresses.
• Distributed and scalable, enabling efficient query resolution.
• Disadvantage:
• Vulnerable to attacks like DNS spoofing, where users are redirected to malicious
sites.
• Dependency on DNS servers can cause disruptions if servers fail.

2. DDNS (Dynamic DNS)


• What it is: Updates DNS records dynamically for devices with frequently changing IP
addresses.
• Advantage:
• Ideal for environments with dynamic IPs, such as home networks or IoT devices.
• Keeps DNS entries up-to-date automatically, ensuring accessibility.
• Disadvantage:
• Relies on third-party DDNS providers, which may charge fees.
• Can pose security risks if not configured properly.

3. TELNET
• What it is: A protocol for remotely accessing and managing computers over a network.
• Advantage:
• Enables network troubleshooting and remote server management.
• Lightweight and easy to implement.
• Disadvantage:
• Transmits data in plaintext, making it highly insecure.
• Largely replaced by SSH (Secure Shell) for secure communication.

4. EMAIL (SMTP, POP3, IMAP)


• What it is: Used for sending (SMTP) and retrieving emails (POP3, IMAP).
• Advantage:
• Provides fast and reliable communication globally.
• Supports attachments, enabling document sharing.
• Disadvantage:
• Susceptible to spam, phishing, and other email-based attacks.
• Requires stable internet connectivity.
5. FTP (File Transfer Protocol)
• What it is: A protocol for transferring files between computers.
• Advantage:
• Handles large files efficiently.
• Allows resuming interrupted downloads/uploads.
• Disadvantage:
• Data is transmitted in plaintext, making it insecure.
• Has been replaced by secure alternatives like SFTP (Secure FTP).

6. WWW (World Wide Web)


• What it is: A system of interlinked web pages and multimedia resources accessed via the
internet.
• Advantage:
• Provides access to information and services globally.
• Supports multimedia, e-commerce, and interactive platforms.
• Disadvantage:
• Dependency on internet connectivity.
• Risk of misinformation and content overload.

7. HTTP (HyperText Transfer Protocol)


• What it is: A protocol for transferring hypertext (web pages) over the internet.
• Advantage:
• Lightweight, simple, and easy to implement for delivering web content.
• Supports multimedia elements and dynamic web applications.
• Disadvantage:
• Lacks encryption, making it insecure for transmitting sensitive data.
• Replaced by HTTPS, which adds encryption and security.

8. SNMP (Simple Network Management Protocol)


• What it is: A protocol for monitoring and managing devices on a network.
• Advantage:
• Automates the management of network devices like routers and switches.
• Centralized monitoring ensures efficient troubleshooting.
• Disadvantage:
• Early versions lack encryption, leading to potential security vulnerabilities.
• Misconfigured SNMP settings can expose sensitive network information.

9. Bluetooth
• What it is: A wireless communication technology for short-range data exchange.
• Advantage:
• Consumes low power and is suitable for portable devices.
• Simple pairing process for device connectivity.
• Disadvantage:
• Limited range (typically 10 meters).
• Vulnerable to attacks like Bluejacking and Bluesnarfing.

10. Firewalls
• What it is: A security device or software that filters and monitors incoming/outgoing traffic
based on rules.
• Advantage:
• Protects networks from unauthorized access and potential threats.
• Blocks malicious traffic and prevents data breaches.
• Disadvantage:
• May slow down traffic due to inspection processes.
• Cannot detect threats originating from inside the network.

Here are detailed explanations of Stop-and-Wait, Go-Back-N ARQ, Selective Repeat ARQ,
Sliding Window, and Piggybacking, along with their workings, advantages, and disadvantages:

1. Stop-and-Wait ARQ
• What it is: A simple Automatic Repeat reQuest (ARQ) protocol for reliable data
transmission where the sender sends one frame and waits for an acknowledgment (ACK)
before sending the next frame.
• Working:
1. Sender transmits a frame and waits for an ACK.
2. If the ACK is received, the next frame is sent.
3. If no ACK is received within a timeout period, the sender retransmits the frame.
• Advantages:
1. Simple and easy to implement.
2. Ensures reliability by checking each frame individually.
• Disadvantages:
1. Inefficient for high-speed networks, as the sender remains idle while waiting for the
ACK.
2. Utilization of the link is low, especially with long delays.

2. Go-Back-N ARQ
• What it is: An ARQ protocol that allows the sender to transmit multiple frames before
waiting for an acknowledgment, but it can resend a batch of frames if an error occurs.
• Working:
1. The sender maintains a window size (N) of frames it can send without receiving an
ACK.
2. If a frame is lost or corrupted, the sender retransmits that frame and all subsequent
frames in the window.
• Advantages:
1. Better utilization of the network compared to Stop-and-Wait.
2. Suitable for networks with low error rates.
• Disadvantages:
1. Inefficient when errors occur, as it retransmits all frames from the lost frame onward,
even if they were received correctly.

3. Selective Repeat ARQ


• What it is: An improved ARQ protocol that retransmits only the specific frames that are lost
or corrupted.
• Working:
1. The sender also uses a window size (N) to send multiple frames.
2. The receiver acknowledges each frame individually.
3. If a frame is lost or corrupted, only that frame is retransmitted.
• Advantages:
1. Efficient compared to Go-Back-N, as only erroneous frames are retransmitted.
2. Reduces bandwidth wastage.
• Disadvantages:
1. More complex to implement due to the need for buffering out-of-order frames at the
receiver.

4. Sliding Window Protocol


• What it is: A protocol used in Go-Back-N and Selective Repeat ARQ to manage the flow of
frames between sender and receiver using a window size.
• Working:
1. The window defines the number of frames that can be sent without waiting for an
ACK.
2. As ACKs are received, the window slides forward, allowing new frames to be sent.
3. Both sender and receiver maintain windows:
• Sender window tracks unacknowledged frames.
• Receiver window tracks acceptable frames.
• Advantages:
1. Efficiently utilizes the network by allowing multiple frames in transit.
2. Handles flow control and ensures reliability.
• Disadvantages:
1. Increased complexity due to the need for window management.
5. Piggybacking
• What it is: A technique used in bidirectional communication where acknowledgments are
included with data frames instead of sending them separately.
• Working:
1. When a node sends data to another, it includes the ACK for the last received frame in
the same packet.
2. This reduces the need for separate control messages.
• Advantages:
1. Reduces the overhead of sending separate ACK packets.
2. Improves efficiency in bidirectional communication.
• Disadvantages:
1. Delays acknowledgment if the node has no data to send.
2. Increases protocol complexity.

Comparison of Protocols
Selective Sliding
Feature Stop-and-Wait Go-Back-N Piggybacking
Repeat Window
Depends
Efficiency Low Medium High on High
protocol
Retransmits Retransmits Efficient
Included in data
Error Handling Frame-by-frame from error only erroneous error
frames
point onward frames handling
Implementation
Low Medium High High Medium
Complexity
Reliable
Networks with Networks with Bidirectional
Ideal Use Case Simple networks data
low error rates high error rates communication
streams

Let me know if you'd like further clarifications or examples!


Here are detailed explanations of Stop-and-Wait, Go-Back-N ARQ, Selective Repeat ARQ,
Sliding Window, and Piggybacking, along with their workings, advantages, and disadvantages:

1. Stop-and-Wait ARQ
• What it is: A simple Automatic Repeat reQuest (ARQ) protocol for reliable data
transmission where the sender sends one frame and waits for an acknowledgment (ACK)
before sending the next frame.
• Working:
1. Sender transmits a frame and waits for an ACK.
2. If the ACK is received, the next frame is sent.
3. If no ACK is received within a timeout period, the sender retransmits the frame.
• Advantages:
1. Simple and easy to implement.
2. Ensures reliability by checking each frame individually.
• Disadvantages:
1. Inefficient for high-speed networks, as the sender remains idle while waiting for the
ACK.
2. Utilization of the link is low, especially with long delays.

2. Go-Back-N ARQ
• What it is: An ARQ protocol that allows the sender to transmit multiple frames before
waiting for an acknowledgment, but it can resend a batch of frames if an error occurs.
• Working:
1. The sender maintains a window size (N) of frames it can send without receiving an
ACK.
2. If a frame is lost or corrupted, the sender retransmits that frame and all subsequent
frames in the window.
• Advantages:
1. Better utilization of the network compared to Stop-and-Wait.
2. Suitable for networks with low error rates.
• Disadvantages:
1. Inefficient when errors occur, as it retransmits all frames from the lost frame onward,
even if they were received correctly.

3. Selective Repeat ARQ


• What it is: An improved ARQ protocol that retransmits only the specific frames that are lost
or corrupted.
• Working:
1. The sender also uses a window size (N) to send multiple frames.
2. The receiver acknowledges each frame individually.
3. If a frame is lost or corrupted, only that frame is retransmitted.
• Advantages:
1. Efficient compared to Go-Back-N, as only erroneous frames are retransmitted.
2. Reduces bandwidth wastage.
• Disadvantages:
1. More complex to implement due to the need for buffering out-of-order frames at the
receiver.

4. Sliding Window Protocol


• What it is: A protocol used in Go-Back-N and Selective Repeat ARQ to manage the flow of
frames between sender and receiver using a window size.
• Working:
1. The window defines the number of frames that can be sent without waiting for an
ACK.
2. As ACKs are received, the window slides forward, allowing new frames to be sent.
3. Both sender and receiver maintain windows:
• Sender window tracks unacknowledged frames.
• Receiver window tracks acceptable frames.
• Advantages:
1. Efficiently utilizes the network by allowing multiple frames in transit.
2. Handles flow control and ensures reliability.
• Disadvantages:
1. Increased complexity due to the need for window management.

5. Piggybacking
• What it is: A technique used in bidirectional communication where acknowledgments are
included with data frames instead of sending them separately.
• Working:
1. When a node sends data to another, it includes the ACK for the last received frame in
the same packet.
2. This reduces the need for separate control messages.
• Advantages:
1. Reduces the overhead of sending separate ACK packets.
2. Improves efficiency in bidirectional communication.
• Disadvantages:
1. Delays acknowledgment if the node has no data to send.
2. Increases protocol complexity.

Comparison of Protocols
Selective Sliding
Feature Stop-and-Wait Go-Back-N Piggybacking
Repeat Window
Depends
Efficiency Low Medium High on High
protocol
Retransmits Retransmits Efficient
Included in data
Error Handling Frame-by-frame from error only erroneous error
frames
point onward frames handling
Implementation
Low Medium High High Medium
Complexity
Reliable
Networks with Networks with Bidirectional
Ideal Use Case Simple networks data
low error rates high error rates communication
streams

Let me know if you'd like further clarifications or examples!


Here’s a detailed comparison of the ARQ protocols in a tabular format:

Window
Protocol How it Works Advantages Disadvantages Limitations
Size
Sender transmits
one frame and
Simple to Inefficient for Poor bandwidth
waits for
Stop-and-Wait implement, low high-latency or utilization due to
1 acknowledgment
ARQ buffer high-bandwidth waiting for each
(ACK) before
requirements. networks. acknowledgment.
sending the next
frame.
Sender transmits
up to N frames Buffer size
N (can Allows multiple
without waiting Requires requirement
send N frame
Go-Back-N for individual retransmitting increases, high
frames transmission
ARQ ACKs; receiver all frames after retransmission in
before before
acknowledges the a lost one. error-prone
waiting) acknowledgment.
last correctly networks.
received frame.
Sender transmits
multiple frames, Complex to
N (only and receiver Efficient, only implement, Receiver needs
Selective retransmits acknowledges lost frames are requires more buffer space to
Repeat ARQ lost each individually; retransmitted, buffer space for reorder out-of-
frames) retransmits only better throughput. out-of-order sequence frames.
lost/corrupted frames.
frames.
A "window" of
frames is allowed
More complex
Variable to be sent without Efficient Protocol-specific,
Sliding than Stop-and-
(depends waiting for an bandwidth usage, window size
Window Wait ARQ,
on acknowledgment. dynamic flow affects efficiency
Protocol needs more
protocol) The window control. and flow control.
buffer space.
slides after each
acknowledgment.
Combines data
and Only works when
N (for data acknowledgment Reduces Both sides need both devices have
and ACK in a single frame overhead, better data to send for data to send; not
Piggybacking
in one to reduce bandwidth piggybacking to applicable for
frame) overhead and utilization. work. one-way
improve communication.
efficiency.

Key Takeaways:
• Stop-and-Wait ARQ: Simple but inefficient for high-latency networks.
• Go-Back-N ARQ: Allows multiple frames but retransmits all subsequent frames after a loss.
• Selective Repeat ARQ: More efficient as only lost frames are retransmitted, but requires
more buffer space.
• Sliding Window Protocol: Used for flow control with a sliding window, allowing efficient
use of bandwidth.
• Piggybacking: A technique to reduce overhead by combining data and acknowledgment in
one frame.
Let me know if you need any further clarification!

1. Subnetting
What it is: Subnetting is the process of dividing a larger network into smaller, more manageable
sub-networks (subnets). It helps in better utilization of IP addresses by allowing multiple logical
networks within a single physical network.
• How it works:
• A network is divided using a subnet mask.
• The subnet mask determines the boundary between the network and host portions of
the IP address.
• The number of subnets created depends on the number of bits borrowed from the
host portion.
• Advantages:
• Optimizes IP address usage.
• Enhances security by isolating networks.
• Reduces network congestion by segmenting traffic.
• Example:
• Given IP address: 192.168.1.0/24, subnetting can split it into smaller subnets
like 192.168.1.0/26, 192.168.1.64/26, etc.

2. Supernetting
What it is: Supernetting is the process of combining multiple subnets into a larger network. It is the
opposite of subnetting and is often used to reduce the number of routing entries in routing tables.
• How it works:
• Supernetting involves combining the network portions of multiple smaller subnets to
form a larger network.
• The combined networks are referred to as a supernet.
• This is done by reducing the subnet mask and aggregating the networks into a single
address range.
• Advantages:
• Reduces the number of routing entries, improving routing efficiency.
• Simplifies the routing process by aggregating multiple networks into one.
• Example:
• Combining 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24
into a supernet 192.168.0.0/22.
3. Difference between MAC Address and IP Address
Feature MAC Address IP Address
Media Access Control (MAC) address is Internet Protocol (IP) address identifies
a unique identifier assigned to network devices on a network and provides the
Definition
interfaces for communication within a location for routing packets over the
local network. internet or intranet.
Type Physical address (hardware address). Logical address (software address).
48-bit (6 bytes) address, usually written 32-bit (IPv4) or 128-bit (IPv6), written in
Format in hexadecimal (e.g., dotted decimal notation (e.g.,
00:1A:2B:3C:4D:5E). 192.168.1.1 for IPv4).
Assigned by the manufacturer of the Assigned by the network administrator or
Assigned by
network interface card (NIC). automatically assigned by DHCP.
Layer of Operates at the Data Link Layer (Layer Operates at the Network Layer (Layer 3)
Operation 2) of the OSI model. of the OSI model.
Used within a local network to uniquely Used across networks for routing and
Scope
identify devices. communication between devices globally.
To ensure proper communication To identify and route packets to devices
Purpose
between devices on the same network. across different networks.
Static or Static, as it is hardcoded into the Dynamic, can be assigned and changed
Dynamic network device. (e.g., using DHCP).
Can be assigned dynamically, so multiple
Uniqueness Unique to each network device. devices might share the same IP address
in certain cases (e.g., NAT).

Key Differences:
• MAC Address: Identifies the device on the local network, remains constant, and operates at
the data link layer.
• IP Address: Identifies the device on a network, used for routing packets across networks,
and can change based on network configuration.
Let me know if you need more details or examples!
Here’s a comparison of CSMA, CSMA/CA, and CSMA/CD in a tabular format for easy
understanding:

Feature CSMA CSMA/CA CSMA/CD


Carrier Sense Multiple Carrier Sense Multiple
Carrier Sense Multiple
Full Name Access with Collision Access with Collision
Access
Avoidance Detection
Prevents multiple devices Detects and resolves
Avoids collisions before they
from transmitting at the collisions after they
Purpose happen, especially in
same time by sensing the happen, mainly in wired
wireless networks.
channel. networks.
Transmission Senses if the channel is Senses if the channel is free Senses if the channel is
Process free before sending data. and uses random backoff or free, and if a collision
RTS/CTS to avoid collisions. occurs, it stops and
Feature CSMA CSMA/CA CSMA/CD
retries.
Collisions are avoided by Detects collisions while
Collision No collision detection or
waiting for a random time transmitting and retries
Handling avoidance mechanism.
before transmission. after a random backoff.
Simple method for Mainly used in wireless Used in wired networks
Usage controlling access to a networks like Wi-Fi to avoid like Ethernet to manage
shared medium. collisions. collisions.
Used in wireless
Typically used in shared Mainly used in wired
communication where
Channel Type channels (e.g., coaxial networks (e.g.,
collision detection is
cable). Ethernet).
difficult.
Moderate efficiency but
Lower efficiency due to Higher efficiency due to
Efficiency decreases as traffic
possible collisions. collision avoidance.
increases due to retries.
A basic access control A proactive method to avoid A reactive method to
Protocol Type method without collision collisions in wireless handle collisions in
detection. systems. wired systems.

Explanation:
1. CSMA:
• Devices listen to the channel before transmitting. If it’s clear, they send the data. No
mechanism for preventing or resolving collisions.
2. CSMA/CA:
• Used mostly in wireless networks like Wi-Fi. It not only listens to the channel but
also tries to avoid collisions by waiting for a random time (backoff) before
transmitting or using RTS/CTS for communication.
3. CSMA/CD:
• Commonly used in wired networks like Ethernet. It detects collisions during
transmission and takes corrective action (retries after a random wait) to recover from
the collision.
This table simplifies the differences and explains each protocol's role in preventing or handling
collisions in shared communication channels.
Here’s a comparison of TDMA (Time Division Multiple Access), FDMA (Frequency Division
Multiple Access), and CDMA (Code Division Multiple Access) in a tabular format for easy
understanding:

FDMA (Frequency
TDMA (Time Division CDMA (Code Division
Feature Division Multiple
Multiple Access) Multiple Access)
Access)
Time Division Multiple Frequency Division Code Division Multiple
Full Name
Access Multiple Access Access
Method Divides the channel into Divides the available Assigns unique codes to
time slots and allocates frequency spectrum each user to allow
different time slots to into separate simultaneous transmission
different users. frequency bands for over the same frequency
FDMA (Frequency
TDMA (Time Division CDMA (Code Division
Feature Division Multiple
Multiple Access) Multiple Access)
Access)
different users. band.
Different frequency Each user is assigned a
Time slots are allocated to
Channel bands are assigned to unique code, and all users
users, and each user
Allocation different users for share the same frequency
transmits in its own slot.
transmission. spectrum.
High, as multiple users can
Moderate, as users only Moderate, as users are transmit simultaneously on
Capacity
transmit during their limited to their own the same frequency without
Efficiency
assigned time slots. frequency bands. interference, thanks to
unique codes.
Low, since users Low, since interference is
Low, since users transmit at
Interference transmit on different reduced using orthogonal
different times.
frequencies. codes.
Used in GSM (Global
Used in analog Used in 3G networks and
System for Mobile
Usage systems and some certain satellite
Communications), satellite
early mobile systems. communication systems.
communications.
Efficient in terms of Less efficient in
Very efficient in bandwidth
bandwidth, as it allows bandwidth usage, as it
Bandwidth usage, as multiple users
multiple users to share the requires separate
Efficiency share the same frequency
same channel using time frequency bands for
using unique codes.
slots. each user.
3G (CDMA2000), IS-95,
Example Analog radio, Early
GSM, IS-136 WCDMA (Wideband
Technologies mobile systems
CDMA)
Complex, involves spreading
Signal Simple, involves timing Simple, involves
signals with codes and using
Processing synchronization. frequency division.
correlators for detection.
Low power consumption, Simple and easy to
Very efficient use of
Advantages no interference as users implement, good for
bandwidth, high capacity.
transmit at different times. low traffic.
Requires precise Limited capacity due
Complex signal processing,
synchronization, lower to fixed frequency
Disadvantages prone to interference in
capacity as the number of bands, less efficient in
noisy environments.
users grows. bandwidth usage.

Explanation:
1. TDMA (Time Division Multiple Access):
• How it works: The available time is divided into fixed time slots. Each user is
assigned a specific time slot, and users transmit in their designated slots. This
prevents collisions as users don’t transmit at the same time.
• Example: GSM networks use TDMA, where each user gets a slice of time in which
they can transmit.
2. FDMA (Frequency Division Multiple Access):
• How it works: The available frequency spectrum is divided into separate frequency
bands, and each user is allocated a distinct frequency band. Users transmit
simultaneously but on different frequencies.
• Example: Early mobile communication systems and radio broadcasts use FDMA.
3. CDMA (Code Division Multiple Access):
• How it works: Each user is assigned a unique code that is used to spread their signal
over the entire frequency spectrum. Multiple users can transmit at the same time on
the same frequency, but their signals are separated using unique codes.
• Example: 3G mobile networks (e.g., CDMA2000) and some satellite communication
systems use CDMA.
This table helps you understand the fundamental differences between TDMA, FDMA, and CDMA,
highlighting their unique methods of dividing resources like time, frequency, and codes to allow
multiple users to share the same communication medium.
Here’s a comparison of Repeater, Router, Hub, Switch, and Bridge in a tabular format for easy
understanding:

Feature Repeater Router Hub Switch Bridge


Routes data Connects two
Forwards data to Forwards data
Amplifies or between or more
all connected only to the
regenerates different network
devices in a device it is
Purpose signals to extend networks or segments and
network intended for,
the range of a subnets based forwards data
segment based on MAC
network. on IP based on MAC
(broadcast). addresses.
addresses. addresses.
Directs traffic Divides a
Learns the MAC
Extends the between Sends data to all network into
addresses of
signal in a different connected segments,
Functionality devices and
network to cover networks, devices, without reducing traffic
forwards data
longer distances. managing IP any filtering. by filtering
accordingly.
routing. data.
Network
Layer in OSI Physical Layer Physical Layer Data Link Layer Data Link
Layer (Layer
Model (Layer 1) (Layer 1) (Layer 2) Layer (Layer 2)
3)
Filters and
forwards Forwards data
Broadcasts all Filters data and
Does not filter or packets based based on MAC
Data data to every forwards it
manage data, on IP addresses, only
Handling port, no based on MAC
just amplifies it. addresses, to the intended
filtering. addresses.
performs device.
routing.
Traffic No traffic Manages No traffic Efficient traffic Reduces
Management management. network management, management by network traffic
traffic can cause learning and by filtering
between network forwarding to data and
different congestion. specific devices. dividing the
networks, network into
including segments.
routing
Feature Repeater Router Hub Switch Bridge
policies.
Common in
Used to Used in basic local area
Used in long- Used to
connect networking networks
distance network connect two or
different setups, but not (LANs),
Usage connections more LANs,
networks, common in especially in
(e.g., Wi-Fi or often in larger
typically the modern switched
Ethernet). networks.
internet. networks. Ethernet
networks.
Creates
Each router Each port separate
Creates a single
Extends the port creates a creates a collision
Collision collision domain
collision separate separate domains for
Domain for all connected
domain. collision collision each connected
devices.
domain. domain. network
segment.
Splits the
Creates a single Creates a single
Each router broadcast
Extends the broadcast broadcast
Broadcast creates a new domain by
broadcast domain for all domain for all
Domain broadcast connecting
domain. connected devices in the
domain. different
devices. LAN.
segments.
Can operate
at high Works at
Generally Works at high
speeds, speeds based
operates at lower Works at lower speeds (e.g.,
especially in on the network
Speed speeds due to speeds, typically Gigabit Ethernet
modern segment but
signal 10/100 Mbps. or 10G
routers (e.g., can reduce
amplification. Ethernet).
Gigabit traffic.
routing).
Home routers,
Ethernet Ethernet switch, Network
Example enterprise
repeater, Wi-Fi Ethernet hub. managed/unman bridge, wireless
Devices routers, core
range extender. aged switches. bridge.
routers.

Explanation:
1. Repeater:
• Function: A repeater takes an incoming signal, amplifies it, and retransmits it to
extend the network's reach. It doesn’t filter or modify the signal in any way, only
amplifies it to overcome distance limitations.
• Example: Used in networks where the signal needs to be transmitted over long
distances, such as Ethernet or Wi-Fi.
2. Router:
• Function: A router is responsible for directing data between different networks, like
the internet and a local area network (LAN). It uses IP addresses to route packets
between networks, creating different network segments.
• Example: Home routers that connect local networks to the internet.
3. Hub:
• Function: A hub is a basic networking device that forwards data to all connected
devices, irrespective of the destination. It creates a single collision domain and can
lead to network congestion in busy networks.
• Example: Early networking devices before switches became common.
4. Switch:
• Function: A switch operates at the Data Link Layer (Layer 2) and forwards data
based on MAC addresses. It creates separate collision domains for each port,
improving network efficiency compared to a hub.
• Example: Modern Ethernet switches that connect devices in a local area network
(LAN).
5. Bridge:
• Function: A bridge connects two or more network segments and filters data based on
MAC addresses. It helps reduce network traffic by segmenting large networks into
smaller ones, improving performance and reducing collisions.
• Example: A bridge can be used to connect two Ethernet networks in different
locations within the same organization.
This table simplifies the differences between these devices, focusing on their functions, layers in the
OSI model, and their role in network communication.
Here’s a comparison of DNS (Domain Name System), Default Gateway, and Subnet Mask in a
tabular format for easy understanding:

DNS (Domain Name


Feature Default Gateway Subnet Mask
System)
Full Name Domain Name System Default Gateway Subnet Mask
Provides the route for
Defines the network and
Resolves human-readable
devices to communicate
host portions of an IP
domain names (like
Purpose outside their local address, determining
www.example.com) to IP
network (typically used
which devices are in the
addresses.
to access the internet).
same network.
Divides an IP address into
Translates domain names to
Routes traffic from a the network and host part,
IP addresses (e.g., DNS
local network to external helping devices
Functionality server converts
networks, such as the understand their local
"google.com" to an IP
internet. network and the devices
address like 8.8.8.8).
within it.
Layer in OSI Network Layer (Layer
Application Layer (Layer 7) Network Layer (Layer 3)
Model 3)
Web browsers, email All devices that need to
Devices on a network to
servers, and other network send data outside the
Used By identify the boundaries of
applications to resolve local network (e.g.,
the local network.
domain names. accessing the internet).
Example DNS servers (e.g., 8.8.8.8, Routers, gateway IP addresses with their
Devices/System 8.8.4.4, etc.), domain devices, or the router’s corresponding subnet
s registration services. IP address in a home or masks (e.g.,
office network. 192.168.1.0/255.255.255.0
DNS (Domain Name
Feature Default Gateway Subnet Mask
System)
).
Configured as the IP
Configured as an IP address Configured as part of the
address of the router or a
(often from an ISP or a IP address settings,
Configuration device acting as the
custom DNS like Google commonly set by network
gateway to external
DNS). administrators or DHCP.
networks.
DNS Server Address: Default Gateway: Subnet Mask:
Example 8.8.8.8 (Google DNS) or 192.168.1.1 (Common 255.255.255.0 (commonly
1.1.1.1 (Cloudflare DNS) in home networks) used in small networks)
Ensures that the device
Helps devices locate other Acts as a bridge knows whether a
systems or services by between a local network destination IP is within the
Role in Routing
resolving domain names to and external networks, local network or needs to
IPs. forwarding traffic. be routed through a
gateway.
Enabling Enabling devices to
Ensuring internet browsing
communication between identify which other
Important for and access to domain-based
different networks or to devices are local to the
services.
the internet. network versus external.

Explanation:
1. DNS (Domain Name System):
• Function: DNS is essentially the "phone book" of the internet. It translates human-
readable domain names (like www.example.com) into IP addresses (like
192.168.1.1) that computers use to locate and connect to each other.
• Example: When you type google.com into your browser, DNS translates this into
the IP address of Google's server (e.g., 8.8.8.8).
2. Default Gateway:
• Function: The default gateway is the device (usually a router) that forwards traffic
from a local network (LAN) to external networks, such as the internet. It allows
devices on your local network to communicate with devices outside the local
network.
• Example: In a home network, the default gateway is often the router, with an IP
address like 192.168.1.1. Devices within the network use this gateway to reach
the internet.
3. Subnet Mask:
• Function: The subnet mask divides an IP address into two parts: the network portion
(which identifies the network) and the host portion (which identifies the individual
device on that network). It helps determine whether an IP address is local or remote,
aiding in routing decisions.
• Example: A common subnet mask for a small network is 255.255.255.0, which
means that the first three octets of an IP address identify the network, and the last
octet identifies the device on that network.
This table helps you understand the distinct roles of DNS, default gateway, and subnet mask in
networking. Each of them plays a crucial part in facilitating communication, both within a local
network and with external resources like the internet.
Here’s a comparison of Static Routing, Dynamic Routing, and Default Routing in a tabular
format for easy understanding:

Feature Static Routing Dynamic Routing Default Routing


A routing method A routing method where
A routing method where routes where routes are traffic that cannot be
Definition are manually configured by a automatically matched to a specific
network administrator. discovered and updated route is sent to a default
by routing protocols. route.
Routing tables are
A default route is set to
Routes are manually added to automatically
forward all traffic that
Configuration the routing table by the populated and updated
does not match any
network administrator. using dynamic routing
known route.
protocols.
Used for networks with
Suitable for large,
Best suited for small or simple large numbers of routes or
Network Size complex, and scalable
networks. uncertain destination
networks.
paths.
Highly scalable as new
routes are Limited scalability, as it
Not very scalable, as each new
Scalability automatically only handles unspecified
route must be manually added.
discovered and routes.
updated.
High flexibility, as
routes are Low flexibility, as it only
Low flexibility, as any changes
Flexibility automatically adjusted forwards traffic to a
require manual updates.
when the network predefined default route.
topology changes.
Routes are
automatically updated Minimal maintenance, as
Requires manual intervention
based on the current it only defines a single
Maintenance for network changes (e.g.,
network topology, route for unmatched
adding/removing routes).
reducing maintenance traffic.
needs.
Uses routing protocols
Routing Does not use routing
No routing protocols are used. like RIP, OSPF,
Protocols protocols.
EIGRP, BGP.
Potentially higher
High performance, as routes overhead due to the
Very low overhead as it
are fixed and do not require routing protocol’s
Performance simply forwards traffic to
computation or protocol exchange of updates
a default route.
overhead. and route
computations.
Usage Used in small networks or for Used in larger, more Used to ensure that
specific, unchanging routes. dynamic networks packets with no specific
where the topology route are forwarded to a
changes frequently. default location, typically
Feature Static Routing Dynamic Routing Default Routing
the router.
A manually configured route to A dynamic route
reach a specific subnet, e.g., learned via OSPF or A default route that
Example ip route 192.168.2.0 RIP that changes as the forwards all unmatched
255.255.255.0 network topology traffic to 192.168.1.1.
192.168.1.1. changes.

Explanation:
1. Static Routing:
• How it works: Static routes are manually configured by a network administrator.
These routes are fixed and do not change unless manually updated. Static routing is
typically used for small, simple networks where the network topology is not expected
to change frequently.
• Example: If you want a network device to always use a specific path to reach a
destination, you configure a static route. For instance, ip route 192.168.2.0
255.255.255.0 192.168.1.1 forces the device to use the IP address
192.168.1.1 as the next hop to reach 192.168.2.0.
2. Dynamic Routing:
• How it works: Dynamic routing uses routing protocols like RIP, OSPF, or BGP to
automatically discover and maintain routes. When the network topology changes
(e.g., a new router or link is added), dynamic routing protocols automatically update
the routing table. This is suitable for large or complex networks where routes need to
be updated frequently.
• Example: A router running OSPF will automatically learn and update routes based
on the OSPF protocol’s exchange of routing information between routers in the
network.
3. Default Routing:
• How it works: A default route is a "catch-all" route used when a router cannot find a
match for the destination address in its routing table. It forwards the traffic to a
default gateway. This is often used in smaller networks or edge routers to send any
non-specific traffic to a particular next-hop device.
• Example: A router may be configured with a default route like ip route
0.0.0.0 0.0.0.0 192.168.1.1 to forward all traffic that doesn’t match any
other route to the IP address 192.168.1.1.

Summary:
• Static Routing is useful for small, simple networks but requires manual updates.
• Dynamic Routing is ideal for larger networks that frequently change, as it automatically
adjusts to topology changes.
• Default Routing is used as a last-resort route when no other specific route is found,
simplifying routing for traffic that doesn’t match any other entries.
Here’s a comparison of Link-State Routing and Distance-Vector Routing with examples of RIP
(Routing Information Protocol) and OSPF (Open Shortest Path First) in a tabular format:
Feature Link-State Routing Distance-Vector Routing
RIP (Routing Information Protocol),
Routing Protocols OSPF (Open Shortest Path First), IS-IS
IGRP
Routers exchange information about the Routers share information about the
Basic Concept state of their links (direct connections) distance to reach a destination and
and construct a full network topology. rely on the next-hop router.
Routing Each router has a complete map of the Routers know only the distance (cost)
Information network, including all routers and links. to the destination and the next hop.
Type of Dijkstra's algorithm (Shortest Path First,
Bellman-Ford algorithm
Algorithm SPF)
Routers periodically exchange link-state Routers periodically exchange routing
Routing Table
advertisements (LSAs) and update their tables with neighbors to update
Updates
routing tables accordingly. distances.
Faster convergence, as all routers have Slower convergence due to the
Convergence
the same view of the network and can periodic exchange of routing tables
Time
compute the shortest path quickly. and reliance on neighbors’ data.
Less scalable, struggles with larger
More scalable to larger networks due to
Scalability networks due to slow convergence
efficient and faster updates.
and higher overhead.
Network Each router only knows the distance
Each router has full knowledge of the
Topology to each destination and its immediate
network's topology.
Knowledge neighbors.
More resilient to network changes (e.g., Slower to react to network failures
Fault Tolerance link failures) because of faster updates due to periodic updates and reliance
and global network awareness. on neighbors' information.
Higher bandwidth usage due to the
Lower bandwidth usage, as only
Bandwidth Usage exchange of link-state information,
routing table updates are exchanged.
especially in large networks.
OSPF: More complex and efficient,
Example RIP: Simpler, uses hop count as a
uses LSAs and SPF to calculate the
Protocols metric to determine the shortest path.
shortest path.
More complex due to maintaining full Simpler to implement, but can lead to
Complexity network topology and using advanced issues like routing loops and slow
algorithms. convergence.
Link cost, based on parameters like Hop count (maximum of 15 hops in
Metric
bandwidth, delay, etc. RIP).
Less suitable for large networks due
Suitability for Suitable for larger networks, as it scales
to slower updates and limited
Large Networks better and offers faster updates.
scalability.

Explanation:
1. Link-State Routing (OSPF):
• How it works: In Link-State Routing, each router has a complete map of the network
topology. Every router sends Link-State Advertisements (LSAs) to all other routers
in the network, informing them about the state of their links (such as whether a link
is up or down). Each router then uses this information to independently calculate the
best path to every destination in the network using Dijkstra's Shortest Path First
(SPF) algorithm.
• Example Protocol - OSPF: OSPF routers exchange LSAs to build a complete map
of the network. They use this map to calculate the shortest paths to destinations,
adjusting quickly when there are network changes.
2. Distance-Vector Routing (RIP):
• How it works: In Distance-Vector Routing, each router sends its routing table (which
includes information about distances to various destinations) to its neighbors.
Routers update their own routing tables based on the information received from
neighbors. The metric used for deciding the best path is typically the hop count,
meaning the number of routers between the source and destination.
• Example Protocol - RIP: RIP uses hop count as its metric and updates routing tables
periodically (every 30 seconds). It is simple but can become inefficient as the
network size grows due to slow convergence and the possibility of routing loops.

Key Differences:
• OSPF (Link-State) offers better scalability and faster convergence by sharing detailed link-
state information, allowing each router to have an accurate picture of the entire network. It’s
more complex but works better for larger networks.
• RIP (Distance-Vector) is simpler and works by sending routing tables to neighboring
routers, but it suffers from slower convergence and limited scalability (since it only allows
for a maximum of 15 hops).

Summary:
• Link-State Routing protocols like OSPF are better suited for larger and more complex
networks due to their faster convergence and more efficient routing calculations, although
they are more resource-intensive.
• Distance-Vector Routing protocols like RIP are simpler to configure and use but are less
suitable for larger networks due to slower convergence and potential issues like routing
loops.
Here’s a comparison of Mesh, Star, Ring, Bus, and Binary network topologies in a tabular format:

Mesh Binary
Feature Star Topology Ring Topology Bus Topology
Topology Topology
Devices are
All devices are
All devices are connected in a All devices are A binary tree-
interconnected
connected to a circular manner, connected to a like structure
with each other,
Definition central node where each single where each
creating a
(hub or device connects communication node has two
mesh-like
switch). to two other line (bus). child nodes.
structure.
devices.
Single central
Fully connected Centralized Each node has
Devices form a backbone (the
network with with a central two branches,
loop where data bus) with
Structure direct links hub or switch forming a
circulates in one devices
between each connecting all hierarchical
direction. connected along
pair of devices. devices. structure.
it.
Reliability Very high, as If the central If a single device If the bus cable High reliability,
Mesh Binary
Feature Star Topology Ring Topology Bus Topology
Topology Topology
as failure of a
or connection
multiple paths node fails, the single node
fails, the entire fails, the entire
exist for data to entire network only affects
network can be network fails.
travel. fails. part of the
disrupted.
network.
Highly
Very scalable,
scalable, as
but as the Less scalable, as Scalable, but
new devices Low scalability
number of adding devices or can become
can be added due to the single
Scalability devices troubleshooting complex with
easily by communication
increases, the can become more nodes and
connecting line (bus).
complexity and difficult. layers.
them to the
cost increase.
hub.
Expensive to Medium cost
Relatively low Moderate cost,
implement due Low cost, as due to
cost due to but the need for
to a large only one hierarchical
Cost simple continuous data
number of communication connections
connections to flow can add
cables and line is needed.and node
a central hub. complexity.
connections. requirements.
Good
performance as
Excellent Can experience Low
Performance traffic is
performance, as congestion if performance in
degrades as more directed in a
multiple paths too many large networks
Performance devices are binary fashion,
reduce the devices are due to shared
added due to though it can
chance of connected to bandwidth and
increased delays. become slow
congestion. the hub. congestion.
with too many
levels.
High fault
Low fault tolerance for
High fault tolerance; a Very low fault lower-level
Moderate fault
tolerance, as failure in the tolerance; failures, but
tolerance; failure
Fault there are central hub failure of the can be
of one link can
Tolerance multiple paths results in bus cable affects disrupted if the
disrupt
for data complete the entire root node or
communication.
transmission. network network. key
failure. connections
fail.
Simple to
Easy to Maintenance can maintain, but Maintenance is
Difficult to
maintain, as be complicated, disruptions to moderate;
maintain due to
Maintenance the central hub as disruptions in the bus cable failure of one
the complexity
manages all the ring affect all can cause node can be
of connections.
connections. devices. widespread localized.
issues.
Data Flow Data can flow Data flows Data circulates in Data flows in Data flows in a
in multiple through the one direction, one direction binary manner,
directions and central hub, with a delay in along the bus; creating a clear
paths, making it creating a reaching the collisions can path but can be
Mesh Binary
Feature Star Topology Ring Topology Bus Topology
Topology Topology
bottleneck at slower with
highly efficient. destination. occur.
times. more layers.
Small to Legacy
Large-scale Hierarchical
medium-sized networks,
networks Small to medium systems such as
Example networks, simple
requiring high networks, like DNS or file
Usage home networks, or
reliability, such token ring LANs. directory
networks, and temporary
as data centers. structures.
office LANs. setups.

Explanation:
1. Mesh Topology:
• How it works: In mesh topology, each device is connected to every other device in
the network, creating multiple paths for data to travel. This provides high redundancy
and fault tolerance but increases the complexity and cost of implementation as the
number of devices increases.
• Example: Large corporate networks, data centers.
2. Star Topology:
• How it works: In star topology, all devices are connected to a central hub or switch.
The hub or switch is responsible for managing communication between devices. If
the central node fails, the entire network becomes inoperable.
• Example: Home networks, office networks.
3. Ring Topology:
• How it works: In ring topology, each device is connected to two other devices,
forming a closed loop. Data travels in one direction around the ring until it reaches
its destination. A failure in one device or connection can disrupt the entire network.
• Example: Legacy token ring networks.
4. Bus Topology:
• How it works: In bus topology, all devices share a single communication channel
(the bus). Data is transmitted along the bus and received by all devices, but only the
device with the matching address processes it. A failure in the bus cable can bring
down the whole network.
• Example: Older networks, simple networks, or temporary setups.
5. Binary Topology:
• How it works: A binary topology organizes devices in a hierarchical tree-like
structure, where each node has two child nodes. It is used for structured data or
systems that require branching, such as file systems or DNS.
• Example: DNS system, hierarchical file systems.

Summary:
• Mesh topology is ideal for high-reliability and fault-tolerant networks but is expensive and
complex.
• Star topology is easy to maintain and is scalable but suffers from reliance on a central node.
• Ring topology can experience delays and is less fault-tolerant but is useful for smaller, more
controlled environments.
• Bus topology is simple and cost-effective for small networks but is limited in scalability and
fault tolerance.
• Binary topology is useful for hierarchical data structures but becomes complex as the
network grows.
Here’s a comparison of ARP vs RARP and Classless vs Classful Addressing in a tabular format:

ARP vs RARP:
RARP (Reverse Address
Feature ARP (Address Resolution Protocol)
Resolution Protocol)
Resolves an IP address to a MAC Resolves a MAC address to an IP
Purpose
(hardware) address. address.
Used by devices to find the MAC address Used by devices to find the IP
Usage
associated with an IP. address associated with a MAC.
Broadcasts an ARP request to find the Broadcasts a RARP request to find
Operation
MAC address. the IP address.
Protocol Type Layer 2 (Data Link) Protocol. Layer 2 (Data Link) Protocol.
Common Used in Ethernet and other networks to Typically used by diskless
Application map IP addresses to MAC addresses. workstations to obtain an IP address.

Classful vs Classless Addressing:


Feature Classful Addressing Classless Addressing (CIDR)
IP addressing based on fixed IP addressing without fixed classes, using
Definition
classes (A, B, C, D, E). variable-length subnet masks (VLSM).
Fixed subnet masks for each class Variable subnet masks to allow more
Subnet Masks
(e.g., Class A: 255.0.0.0). flexibility in subnetting.
Network Less efficient due to rigid class
More efficient as subnets can be customized.
Efficiency sizes.
IP Address Limited range of IP addresses per No class limits, more flexible distribution of IP
Ranges class. addresses.
Less flexible, uses class-based More flexible, uses CIDR (Classless Inter-
Routing
routing (class A, B, C). Domain Routing) for routing.
Common Used in early networks (pre- Common in modern networks for efficient IP
Usage CIDR). address management.

Summary:
• ARP resolves IP to MAC addresses, while RARP resolves MAC to IP addresses.
• Classful Addressing uses fixed classes and subnet masks, while Classless Addressing
(CIDR) allows flexible subnetting for better efficiency.
Here’s a comparison between Symmetric and Asymmetric in a tabular format:

Feature Symmetric Asymmetric


Uses a pair of keys: a public key for
Uses the same key for both encryption
Definition encryption and a private key for
and decryption.
decryption.
Feature Symmetric Asymmetric
Two keys are used: a public key for
Single key is used for both encryption
Key Usage encryption and a private key for
and decryption.
decryption.
Generally faster due to simpler
Speed Slower due to more complex algorithms.
algorithms.
Secure, but key management is a Very secure, as the private key is never
Security challenge, as the key must be kept shared and only the public key is
secret. available.
Used for secure key exchange, digital
Suitable for encrypting large amounts
Use Cases signatures, and authentication (e.g.,
of data (e.g., AES).
RSA, ECC).
Example
DES, AES, 3DES, RC4. RSA, ECC, DSA.
Algorithms
Less scalable for large networks More scalable as each participant only
Scalability because of the need to securely share needs a public key, which can be shared
keys. openly.
Requires a secure way to distribute Public key can be shared openly, while
Key Distribution
keys. the private key remains secret.
Common Use in VPNs, file encryption, secure HTTPS, digital signatures, email
Systems communications. encryption (PGP).

Summary:
• Symmetric encryption uses a single key for both encryption and decryption, making it
faster but challenging in terms of key distribution.
• Asymmetric encryption uses a pair of keys (public and private), making it more secure and
scalable but slower than symmetric encryption.
Here’s a comparison of IPv4 vs IPv6 and BOOTP vs DHCP in a tabular format:

IPv4 vs IPv6:
Feature IPv4 IPv6
32-bit (4 bytes), supports around 128-bit (16 bytes), supports a virtually
Address Length
4.3 billion addresses. unlimited number of addresses.
Written in hexadecimal, separated by
Written in dotted-decimal colons (e.g.,
Address Format
format (e.g., 192.168.0.1). 2001:0db8:85a3:0000:0000:8a2e:0370:73
34).
More complex header structure with 8
Simpler header structure with 12
Header Complexity fields, but designed to be more efficient
fields.
for routing.
Can auto-configure IP addresses (Stateless
Address Requires manual or DHCP for
Address Autoconfiguration) and supports
Configuration IP assignment.
DHCPv6.
Supports broadcast for Does not support broadcast; uses multicast
Broadcast Support
communication. instead.
Routing Less efficient routing due to More efficient routing with a hierarchical
limited address space and structure and support for larger address
Feature IPv4 IPv6
classful routing. space.
Security features were added IPSec is mandatory and integrated into
Security
later (IPSec is optional). IPv6.
NAT (Network Commonly used to handle No need for NAT due to the large address
Address Translation) address shortages. space.
Unicast, Multicast, Anycast (no
Address Types Unicast, Broadcast, Multicast.
broadcast).
Commonly used in most Used in modern networks and future-
Example Usage
existing networks. proofing for the internet.

BOOTP vs DHCP:
DHCP (Dynamic Host Configuration
Feature BOOTP (Bootstrap Protocol)
Protocol)
Automatically assigns IP addresses,
Used to assign an IP address to a
Purpose subnet masks, gateways, and other
device on a network.
configuration information.
Dynamic IP address assignment, with
IP Address Static IP address assignment
the option to lease IP addresses for a
Assignment (pre-configured).
specific time period.
Can automatically assign and reassign IP
Requires manual configuration
Configuration addresses, and includes options like
of a server with the client’s IP.
lease times.
Less flexible; mainly used in Highly flexible; used in most modern
Flexibility
bootstrapping devices. networks for IP address management.
The client sends a request for an The client sends a request for network
Client Request
IP address. configuration (IP address, gateway, etc.).
No lease time; the IP address is IP address lease time is configurable
Lease Time
static. (ranging from minutes to days).
Uses broadcast for initial
Uses broadcast for
Broadcast/Multicast communication and unicast once a lease
communication.
is obtained.
Used in older systems for
Used in most modern networks for
Common Usage diskless workstations and
dynamic IP address assignment.
network booting.
Support for Does not provide advanced
Supports additional configurations like
Additional configuration like DNS, routers,
DNS, domain name, router, etc.
Configurations etc.

Summary:
• IPv4 uses 32-bit addresses and has a limited address space, whereas IPv6 uses 128-bit
addresses and offers a much larger address space, improved routing, and better security.
• BOOTP is an older protocol for IP address assignment and lacks flexibility, while DHCP is
a more modern and dynamic protocol that supports IP address leasing and additional
configurations, making it widely used in most networks today.
Here’s a comparison of Pure Aloha and Slotted Aloha in a tabular format:
Feature Pure Aloha Slotted Aloha
Time is continuous; there are no time
Time Division Time is divided into fixed-size slots.
slots.
Transmission Stations can only transmit at the
Stations can transmit at any time.
Timing beginning of a time slot.
Less efficient due to possible More efficient as collisions are
Efficiency
collisions. minimized.
Collisions happen randomly, and Collisions are reduced as
Collision Handling retransmissions occur after a random transmissions are synchronized to time
time. slots.
Probability of Lower collision probability because of
Higher collision probability.
Collision time slot synchronization.
Lower throughput due to increased Higher throughput due to reduced
Throughput
collisions. collisions.
No synchronization of transmission Synchronization is required, as
Synchronization
times. transmissions are slot-aligned.
Efficiency = Ge−2G\text{G} e^{-2G} Efficiency = Ge−G\text{G} e^{-G}
Efficiency
(where G is the average number of (where G is the average number of
Formula
attempts per frame time). attempts per time slot).
Use Case Suitable for low-traffic networks. Suitable for higher-traffic networks.
Typically used in systems like satellite
Used in systems like Ethernet (e.g.,
Applications communications where exact timing
with time slots for access).
isn't easy.

Summary:
• Pure Aloha allows transmissions at any time but is less efficient due to higher collision
probabilities.
• Slotted Aloha synchronizes transmission times into fixed slots, reducing collisions and
improving efficiency, but requires time synchronization.

You might also like