CN Notes
CN Notes
Types of Networks
1. L
AN (Local Area Network): Covers a small geographicarea, such as a home or office. It allows
high-speed data transfer between devices within close proximity, typically using wired connections. LANs
are usually privately owned and managed.
2. M
AN (Metropolitan Area Network): Spans a larger areathan LANs, typically covering a city or large
campus. MANs connect multiple LANs, providing faster data transmission than WANs but slower than
LANs due to greater distances involved .
3. W
AN (Wide Area Network): Encompasses a vast geographicarea, often connecting multiple MANs and
LANs across cities or countries. The internet is the most notable example of a WAN, characterized by
lower data transfer speeds compared to LAN and MAN due to its expansive nature .
1. A
pplication Layer: This top layer provides networkservices directly to end-user applications, facilitating
communication and data exchange between users.
2. T
ransport Layer: Responsible for end-to-end communicationand error recovery, ensuring reliable data
transfer between systems.
3. N
etwork Layer: Manages the routing of data packetsacross the network, determining optimal paths for
data transmission.
4. D
ata Link Layer: Handles the node-to-node transferof data and error detection/correction during
transmission over physical links.
5. P
hysical Layer: The lowest layer that defines thehardware specifications for transmitting raw bits over
physical media.
his model promotes interoperability among diverse systems by establishing common protocols at each layer,
T
enabling seamless communication across different platforms.
1. T
ime Division Multiplexing (TDM): Allocates distincttime slots for each signal on the same channel,
allowing multiple signals to share the same transmission medium without interference.
2. F
requency Division Multiplexing (FDM): Divides theavailable bandwidth into separate frequency bands
for each signal, enabling simultaneous transmission without overlap.
3. W
avelength Division Multiplexing (WDM): A form ofFDM used in fiber optics where different
wavelengths (colors) of light carry separate signals concurrently over the same fiber.
4. C
ode Division Multiple Access (CDMA): Assigns uniquecodes to each signal so they can coexist on
the same frequency band without interference, commonly used in mobile communications.
hese techniques enhance communication efficiency by maximizing resource utilization while minimizing costs
T
associated with infrastructure.
1. B
asic Rate Interface (BRI): Comprises two B-channelsfor voice/data (each 64 Kbps) and one D-channel
for signaling (16 Kbps). This configuration supports multiple simultaneous calls or data sessions at home.
2. T
erminal Equipment: Devices such as telephones orcomputers connect to ISDN through terminal
adapters or ISDN-compatible devices.
3. ISDN Switches: These manage call routing and signalingbetween different users on the network,
ensuring efficient communication.
4. N
etwork Termination: The point where the ISDN lineconnects to the home network; it may include
additional features like integrated routers or firewalls for enhanced functionality.
ISDN's architecture enables homes to utilize digital services effectively while supporting various applications like
video conferencing and high-speed internet access.
1. T
wisted Pair Cable: Consists of pairs of insulatedcopper wires twisted together to reduce
electromagnetic interference; commonly used in telephone networks and local area networks (LANs).
2. C
oaxial Cable: Comprises a central conductor surrounded by insulation and an outer conductive shield; it
offers higher bandwidth and is used for cable television and broadband internet services.
3. F
iber Optic Cable: Utilizes glass or plastic fibersto transmit light signals over long distances with minimal
loss; it supports high-speed data transmission and is increasingly used in telecommunications
infrastructure.
uided media provide reliable communication channels with predictable performance characteristics compared to
G
unguided media like radio waves.
A
○ n enhancement of CSMA where nodes continue monitoring the channel during transmission.
○ If two nodes transmit simultaneously causing a collision, they detect it immediately.
○ Upon detecting a collision, both nodes stop transmitting and wait for a random time before
attempting retransmission, reducing chances of repeated collisions.
his protocol efficiently manages access in shared networks like Ethernet, minimizing delays while maximizing
T
throughput under varying load conditions.
1. P
olling Protocols: A central controller polls eachdevice in turn to see if it has data to send; only polled
devices can transmit, reducing chances of collisions significantly.
2. T
oken Passing Protocols: A token circulates aroundthe network; only the device holding the token can
transmit data. This method ensures orderly access but requires additional overhead for token
management.
3. R
eservation Protocols: Devices request permissionfrom a central controller before transmitting; this
approach allows devices to reserve bandwidth in advance for their transmissions based on expected
traffic patterns.
hese controlled access methods enhance efficiency by managing how multiple devices share bandwidth while
T
minimizing collisions and ensuring fair access among users on the network.
D
○ etects errors introduced by noise or interference during transmission.
○ Prevents corrupted data from being processed by receiving applications.
○ Enhances overall reliability of communication protocols by allowing retransmission of erroneous
messages.
2. Internet Checksum Method:
○ simple error detection scheme used primarily in TCP/IP protocols.
A
○ The sender calculates a checksum value by summing all 16-bit words in the message.
○ The resulting sum is complemented (inverted) and appended to the message as checksum.
○ The receiver recalculates the checksum upon receipt; if it matches the transmitted checksum, no
errors are detected; otherwise, an error has occurred requiring retransmission.
his method provides basic error detection capabilities suitable for many types of digital communications while
T
being computationally efficient .
S
○ upports various network layer protocols including IP.
○ Provides authentication mechanisms such as PAP (Password Authentication Protocol) and CHAP
(Challenge Handshake Authentication Protocol).
○ Facilitates error detection through checksums ensuring reliable communication.
2. W
orking Mechanism:
Initiation involves establishing a link between two devices using LCP (Link Control Protocol).
○
○ After link establishment, PPP negotiates configuration parameters like maximum frame size.
○ Data encapsulation occurs where higher-layer protocols are framed within PPP packets before
transmission.
PP is commonly utilized in dial-up connections and direct serial links due to its simplicity and versatility across
P
different types of networks .
T
○ he sender transmits several frames sequentially up to a predetermined window size NN.
○ Each frame has a unique sequence number allowing identification during acknowledgment
processes.
2. E
rror Handling Process:
○ If an error occurs in any frame within the window, all subsequent frames must be resent starting
from that erroneous frame.
○ The receiver only acknowledges frames received correctly; if frame kk fails verification, it will not
acknowledge any frames after kk.
his approach ensures reliable delivery but can lead to inefficiencies if packet loss occurs frequently since all
T
subsequent frames must be resent even if they were transmitted correctly .
A
○ ims at minimizing total path cost defined by metrics such as distance or time taken.
○ Commonly used in routing protocols like OSPF (Open Shortest Path First) which utilizes link-state
algorithms.
2. A
lgorithms Used:
○ D ijkstra’s Algorithm: Iteratively selects nodes withminimum cumulative distance from source
until all nodes are processed.
○ Bellman-Ford Algorithm: Handles graphs with negativeweights by relaxing edges repeatedly
until no further improvements can be made.
hortest path routing enhances network efficiency by ensuring that packets traverse optimal routes while
S
reducing congestion .
○ V
isualized as a bucket with holes at its base allowing water (data packets) to leak out at a constant
rate regardless of incoming flow.
2. F
unctionality:
○ Incoming packets are added into the bucket until it reaches capacity; excess packets are
discarded when overflow occurs.
○ The outgoing rate remains steady even if bursts occur intermittently which smoothens traffic flow
into the network.
his algorithm effectively mitigates congestion by preventing sudden spikes in traffic that could overwhelm
T
network resources .
he TIP protocol stands for "Transaction Internet Protocol," designed primarily for managing transactions over
T
internet-based systems efficiently:
● It provides mechanisms for ensuring reliability during transaction processing through acknowledgments
and retries.
● TIP supports various transaction types such as financial exchanges or database updates while
maintaining consistency across distributed systems.
UDP Protocol
The User Datagram Protocol (UDP) is one of the core protocols within the Internet Protocol suite:
● U nlike TCP, UDP operates without establishing connections beforehand; it sends messages called
datagrams without guarantees on delivery or order.
● UDP offers minimal overhead making it suitable for applications requiring speed over reliability such as
video streaming or online gaming where real-time performance is critical.
oth TIP and UDP serve distinct purposes within networking environments—TIP focuses on transaction integrity
B
while UDP emphasizes speed and efficiency.
ARPANET
ARPANET was one of the first operational packet-switching networks developed by DARPA in 1969:
● It laid foundational concepts for modern internet technologies through its pioneering use of
packet switching instead of circuit switching.
● Initially connecting four universities, ARPANET expanded rapidly leading to innovations such as
email protocols which remain integral today .
Packet Switching
acket switching is a method where messages are broken into smaller packets transmitted
P
independently across networks:
● E ach packet may take different paths based on current network conditions optimizing resource
usage effectively compared with traditional circuit-switched methods.
● This technique enhances resilience against failures since individual packets can reroute
dynamically improving overall communication reliability .
ALDHA
LDHA stands for "Asynchronous Link Data Handling Architecture," focusing on managing
A
asynchronous communications efficiently:
● It supports diverse applications including real-time communications while maintaining low
latency through effective buffering strategies.
● ALDHA enables seamless integration with existing networking infrastructures enhancing
compatibility across various platforms .
CRC
Cyclic Redundancy Check (CRC) is an error-detecting code used widely in digital networks:
● It involves appending redundancy bits calculated from message content enabling receivers to
check integrity upon receipt easily.
● CRC’s effectiveness lies in its ability to detect common errors caused by noise during
transmission ensuring high reliability across various communication protocols
2017 Qp
- ommunication: Enables email, instant messaging, andvideo conferencing, facilitating real-time
C
interaction among users globally.
- Resource Sharing: Allows multiple users to share devicessuch as printers and storage systems,
enhancing efficiency and reducing costs.
- Data Management: Supports centralized data storageand management systems, making it easier to
access and manage data across different locations.
- Remote Access: Provides remote access capabilities,allowing users to connect to networks from various
locations, which is crucial for telecommuting.
- Entertainment: Facilitates streaming services, onlinegaming, and social media platforms, creating a
connected entertainment ecosystem.
. T
1 erminal Equipment (TE): Devices that connect to theISDN network, such as telephones or computers.
2. Network Termination (NT): Interfaces between userequipment and the ISDN network, ensuring
compatibility and managing signal processing.
3. ISDN Switch: Manages connections between differentISDN users for both voice and data traffic.
ISDN architecture enhances communication efficiency by allowing multiple services over a single line while
maintaining high-quality transmission.
- onsists of a central conductor surrounded by insulation, a metallic shield, and an outer insulating
C
layer.
- Offers higher bandwidth compared to twisted pair cables and is used for cable television and
broadband internet services.
- Provides better resistance to signal interference due to its shielding.
- tilizes thin strands of glass or plastic fibers to transmit light signals over long distances with
U
minimal loss.
- Supports high-speed data transmission suitable for internet backbones and high-demand
applications like video conferencing.
- Offers immunity to electromagnetic interference and higher bandwidth capabilities compared to
copper cables.
uided media provide predictable performance characteristics essential for maintaining data integrity during
G
transmission while ensuring efficient use of available bandwidth.
Go-back N Protocol:
he Go-back N Automatic Repeat reQuest (ARQ) protocol is a flow control method that allows multiple frames to
T
be sent before needing an acknowledgment:
- If an error occurs in any frame within the window, all subsequent frames must be resent starting
from the erroneous frame.
- The receiver acknowledges only those frames that are received correctly; if frame $$k$$ fails
verification, it will not acknowledge any frames after $$k$$.
- his approach can lead to inefficiencies if packet loss occurs frequently since all subsequent
T
frames must be resent even if they were transmitted correctly.
- owever, it allows for efficient utilization of bandwidth when the error rate is low since multiple
H
frames can be sent before waiting for acknowledgments.
he Go-back N protocol balances throughput with reliability by allowing multiple transmissions while still providing
T
mechanisms for error recovery in a systematic manner.
1. Framing:
- raming involves dividing the stream of bits into manageable units called frames.
F
- Different techniques like byte-oriented or bit-oriented framing are used based on the protocol
requirements.
- echanisms are needed to detect errors introduced during transmission due to noise or
M
interference.
- Techniques such as checksums, cyclic redundancy checks (CRC), or automatic repeat requests
(ARQ) are employed for error handling.
- low control prevents the sender from overwhelming the receiver by regulating the rate of data
F
transmission.
- Methods include stop-and-wait ARQ, sliding window protocols like Go-back N or Selective Repeat
that allow multiple frames in transit before requiring acknowledgment.
- AC protocols determine how multiple devices share the same communication medium without
M
collisions.
- Techniques include contention-based methods like ALOHA or CSMA/CD and controlled access
methods like token passing or polling.
- ach device on a local network requires a unique identifier known as a MAC address for proper
E
routing within the same network segment.
- arious protocols operate at this layer such as Ethernet for wired connections or Wi-Fi for wireless
V
communications, each with its specifications regarding framing, addressing, and error handling.
ddressing these design issues ensures reliable communication over physical networks while optimizing
A
performance across diverse applications and environments.
2019 QP
omputer networks play a crucial role in various sectors, including healthcare for patient record sharing,
C
education for remote learning, and businesses for operational efficiency.
.
1 hysical Layer: Deals with the physical connectionbetween devices, including cables and switches.
P
2. Data Link Layer: Responsible for node-to-node datatransfer and error detection/correction.
3. Network Layer: Manages routing of data packets betweendevices across different networks.
4. Transport Layer: Ensures reliable data transfer betweenend systems through error recovery and flow
control.
5. Session Layer: Manages sessions between applications,establishing, maintaining, and terminating
connections.
. Presentation Layer: Translates data between the applicationlayer and the network format; handles
6
encryption and compression.
7. Application Layer: Provides network services directlyto user applications, such as email or file transfer.
| Application Layer |
+---------------------+
| Presentation Layer |
+---------------------+
| Session Layer |
+---------------------+
| Transport Layer |
+---------------------+
| Network Layer |
+---------------------+
+---------------------+
| Physical Layer |
+---------------------+
he OSI model helps standardize communication functions to enable interoperability among different systems
T
and technologies.
- Structure:
- Advantages:
| Outer Jacket |
+-------------------------+
| Shielding (Metal) |
+-------------------------+
| Insulation |
+-------------------------+
| Inner Conductor |
+-------------------------+
- Structure:
- Advantages:
| Jacket |
+-------------------------+
| Cladding |
+-------------------------+
| Core |
+-------------------------+
oth co-axial cables and optical fibers are essential components of modern communication networks, providing
B
reliable connections for various applications.
xplain Error Detection Using CRC with Example. What is ARQ? Explain
E
Stop and Wait ARQ.
If the received message does not match the expected CRC value upon recalculation at the receiver's end, an
error is detected.
What is ARQ?
utomatic Repeat reQuest (ARQ) is an error-control protocol for reliable data transmission that uses
A
acknowledgments (ACKs) and timeouts to ensure successful delivery of packets.
Stop-and-Wait ARQ
In Stop-and-Wait ARQ:
1. T he sender transmits one frame at a time and waits for an acknowledgment from the receiver before
sending the next frame.
2. If an acknowledgment is not received within a specified timeout period, the sender retransmits the same
frame.
Process:
F1
1. Sender sends frame .
A1
2. Waits for ACK .
A1is received within timeout, sends frame
3. If F2
.
A1received within timeout, retransmits
4. If no F1
.
This method ensures reliability but can lead to inefficiencies due to idle time while waiting for acknowledgments.
Flow Control
low control is a technique used in networking to manage the rate of data transmission between sender and
F
receiver, ensuring that the sender does not overwhelm the receiver with too much data at once.
. T
1 he sender can transmit several frames up to a specified window size $$N$$.
2. If an error occurs in any frame within this window, all subsequent frames must be resent starting from that
erroneous frame.
3. The receiver acknowledges only those frames that are received correctly; if frame $$k$$ fails verification,
it will not acknowledge any frames after $$k$$.
his approach balances throughput with reliability but can lead to inefficiencies if packet loss occurs frequently
T
since all subsequent frames must be resent even if they were transmitted correctly.
ALOHA Concept
LOHA is one of the simplest networking protocols designed for wireless communication where multiple users
A
share a common channel:
- sers transmit whenever they have data to send without checking if the channel is free.
U
- If two users transmit simultaneously, a collision occurs, causing both transmissions to fail.
- Each user waits a random amount of time before attempting retransmission after detecting a
collision.
- ime is divided into discrete slots; users can only transmit at the beginning of these slots.
T
- This reduces collisions because transmissions are synchronized within time slots.
- The maximum throughput for Slotted ALOHA is about 37%, compared to about 18% for Pure
ALOHA due to reduced collision chances.
ALOHA protocols are foundational in understanding random access methods in networking environments.
- ses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol for managing
U
access to shared communication channels.
- Allows multiple devices on a network segment to share bandwidth while minimizing collisions
through listening before transmitting.
i) Polling
olling is a method where a central controller or master device sequentially checks each connected device (or
P
slave device) on the network for data transmission readiness:
oth polling and token passing are effective methods for managing access in networks but serve different use
B
cases depending on network requirements and configurations.
2018 QP
2. Internet Layer: This layer is responsible for logicaladdressing and routing of data packets across
networks. The primary protocol at this layer is the Internet Protocol (IP), which facilitates communication
between different networks.
3. T
ransport Layer: This layer ensures reliable end-to-endcommunication between devices. It manages
error detection and correction, as well as flow control. Key protocols in this layer include Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP).
4. A
pplication Layer: The topmost layer that providesnetwork services directly to user applications. It
encompasses various protocols such as HTTP, FTP, SMTP, and DNS, facilitating different types of
communication over the internet.
| Application Layer |
+------------------------+
| Transport Layer |
+------------------------+
| Internet Layer |
+------------------------+
| Link Layer |
+------------------------+
he TCP/IP model simplifies networking concepts by combining functionalities into fewer layers compared to the
T
OSI model, making it widely adopted in real-world networking scenarios.
Diagram:
Device1 ---- Device2 ---- Device3
|
Bus
Diagram:
Hub
/ | \
D1 D2 D3
- ach device is connected to two other devices, forming a circular pathway for data.
E
- Data travels in one direction; if one device fails, it can disrupt the entire network.
Diagram:
D1
/ \
\ /
D4
4. Mesh Topology:
Diagram:
D1
/ | \
D2--D3--D4
\ | /
D5
Diagram:
Root Hub
/ | \
/ \ | \
D1 D2 D3 D4
ach topology has its advantages and disadvantages, impacting factors such as performance, scalability, and
E
fault tolerance.
- Types:
- Unshielded Twisted Pair (UTP): No additional shielding;cost-effective but more susceptible to
interference.
- Shielded Twisted Pair (STP): Includes shielding thatprotects against interference; used in
environments with high EMI.
| Outer Insulation |
+-------------------------------------+
+-------------------------------------+
| Insulation |
+-------------------------------------+
| Twisted Pairs |
| +---------+ +---------+ |
| | Wire 1 | | Wire 2 | |
| +---------+ +---------+ |
+-------------------------------------+
- Components:
- Core: The central part that carries light signals.
- Cladding: Surrounds the core and reflects light backinto it.
- Jacket: Protects the fiber from environmental damage.
| Jacket |
+-------------------------------------+
| Cladding |
+-------------------------------------+
| Core |
| (Light Transmission) |
+-------------------------------------+
Comparison:
- andwidth: Fiber optics offer significantly higherbandwidth compared to twisted pair cables.
B
- Distance: Fiber optics can transmit data over longerdistances without loss compared to twisted pair
cables.
- Interference: Fiber optics are immune to electromagneticinterference, while twisted pair cables can be
affected by EMI.
oth twisted pair and fiber optics are essential components in modern networking infrastructure, each serving
B
specific purposes based on requirements.
ISDN Services:
1. V oice Services: Allows multiple voice calls over asingle line using digital technology for clearer
communication.
2. Data Services: Supports high-speed internet accessand data transfer between devices with minimal
latency.
3. Video Conferencing: Facilitates real-time video communicationfor remote meetings and collaboration.
4. Integrated Services: Combines voice, video, and dataservices through a single interface, enhancing
efficiency for businesses.
ISDN Interface:
ISDN provides two main types of interfaces:
- omprises two B channels (64 Kbps each) for user data and one D channel (16 Kbps) for
C
signaling.
- Suitable for small businesses or home users requiring moderate bandwidth.
- onsists of either 23 B channels in North America or 30 B channels in Europe plus one D channel.
C
- Designed for larger organizations needing higher bandwidth capabilities.
| |
| ISDN Switch |
| |
+-------------------+
|
| BRI or PRI
|
+-------+-------+
| |
| Terminal |
| Equipment |
+---------------+
ISDN interfaces enable efficient communication by allowing multiple services over a single line while maintaining
high-quality transmission standards suitable for various applications.
Types of Multiplexing:
1. Time Division Multiplexing (TDM):
- Allocates distinct time slots for each signal on the same channel.
- Allows multiple signals to share the same transmission medium without interference.
Diagram of TDM
+-------+-------+-------+-------+
+-------+-------+-------+-------+
Diagram of FDM
Frequency Range
-------------------------------------------------
-------------------------------------------------
Diagram of WDM
Wavelength Range
-------------------------------------------------
Diagram of CDMA
Frequency Range
-------------------------------------------------
-------------------------------------------------
ultiplexing techniques enhance communication efficiency by maximizing resource utilization while minimizing
M
costs associated with infrastructure development in telecommunications systems.
2020 QP
- his is the topmost layer that provides network services directly to user applications.
T
- Protocols at this layer include HTTP (for web browsing), FTP (for file transfer), SMTP (for email),
and DNS (for domain name resolution).
- It facilitates user interaction with the network.
- lso known as the Network Access Layer, it encompasses the physical and data link layers of the
A
OSI model.
- Responsible for the physical transmission of data over network media.
- It handles error detection, framing, and access control to the physical medium.
| Application Layer |
+------------------------+
| Transport Layer |
+------------------------+
| Internet Layer |
+------------------------+
| Link Layer |
+------------------------+
he TCP/IP model is essential for understanding how different protocols interact to facilitate communication over
T
the internet, providing a standardized approach to networking.
- overs a larger geographic area than a LAN but smaller than a WAN, such as a city or large
C
campus.
- ften used to connect multiple LANs within a specific region.
O
- Example: A network connecting various branches of a university across a city.
- small network typically used for personal devices within a short range (a few meters).
A
- Often utilizes Bluetooth technology for device connectivity.
- Example: Connecting smartphones, tablets, and laptops in a home environment.
- network that connects multiple LANs within a specific campus environment such as universities
A
or business campuses.
- Provides high-speed connections between buildings on the campus.
Summary
omputer networks enable efficient communication and resource sharing among devices, playing a crucial role in
C
various applications from personal use to large-scale enterprise operations.
Types of Multiplexing:
1. Time Division Multiplexing (TDM):
- Allocates distinct time slots for each signal on the same channel.
- Each signal transmits during its allocated time slot without interference from others.
Diagram of TDM
+-------+-------+-------+-------+
+-------+-------+-------+-------+
Diagram of FDM
Frequency Range
-------------------------------------------------
Diagram of WDM
Wavelength Range
-------------------------------------------------
-------------------------------------------------
Diagram of CDMA
Frequency Range
-------------------------------------------------
-------------------------------------------------
ultiplexing techniques enhance communication efficiency by maximizing resource utilization while minimizing
M
costs associated with infrastructure development in telecommunications systems.
- Types:
- Unshielded Twisted Pair (UTP): No additional shielding;cost-effective but more susceptible to
interference.
- Shielded Twisted Pair (STP): Includes shielding thatprotects against interference; used in
environments with high EMI.
| Outer Insulation |
+-------------------------------------+
| Shielding (if STP) |
+-------------------------------------+
| Insulation |
+-------------------------------------+
| Twisted Pairs |
| +---------+ +---------+ |
| | Wire 1 | | Wire 2 | |
| +---------+ +---------+ |
+-------------------------------------+
- Components:
- Core: The central part that carries light signals.
- Cladding: Surrounds the core and reflects light backinto it.
- Jacket: Protects the fiber from environmental damage.
| Jacket |
+-------------------------------------+
| Cladding |
+-------------------------------------+
| Core |
| (Light Transmission) |
+-------------------------------------+
Comparison:
- andwidth: Fiber optics offer significantly higherbandwidth compared to twisted pair cables.
B
- Distance: Fiber optics can transmit data over longerdistances without loss compared to twisted pair
cables.
- Interference: Fiber optics are immune to electromagneticinterference, while twisted pair cables can be
affected by EMI.
oth twisted pair and optical fibers are essential components in modern networking infrastructure, each serving
B
specific purposes based on requirements.
2016 QP
omputer networks primarily focus on enabling communication and resource sharing, while distributed systems
C
aim to perform complex tasks by distributing workloads across multiple nodes.
- eals with the physical connection between devices, including cables, switches, and signaling.
D
- Defines electrical, mechanical, and procedural specifications for data transmission.
- nsures reliable data transfer between end systems through error recovery and flow control.
E
- Key protocols include TCP (reliable) and UDP (unreliable).
- ranslates data between the application layer and the network format; handles encryption and
T
compression.
- Ensures that data is presented in a readable format for the application layer.
| Application Layer |
+---------------------+
| Presentation Layer |
+---------------------+
| Session Layer |
+---------------------+
| Transport Layer |
+---------------------+
| Network Layer |
+---------------------+
+---------------------+
| Physical Layer |
+---------------------+
he OSI model helps standardize communication functions to enable interoperability among different systems
T
and technologies.
Comparison Table:
Aspect OSI Model TCP/IP Model
he OSI model provides a comprehensive framework for understanding networking concepts, while the TCP/IP
T
model is more practical and widely used in actual implementations.
Structure:
. Inner Conductor: Transmits signals; usually made ofcopper.
1
2. Insulation: Separates the inner conductor from theouter shield; prevents signal loss.
3. Outer Shield: Reduces electromagnetic interference;typically made of braided metal or foil.
4. Outer Jacket: Protects against environmental damage.
| Outer Jacket |
+-----------------------------------------+
| Shielding |
+-----------------------------------------+
| Insulation |
+-----------------------------------------+
| Inner Conductor |
+-----------------------------------------+
Advantages:
- igh bandwidth capacity compared to twisted pair cables.
H
- Better resistance to signal interference due to its shielding.
- Suitable for long-distance transmission without significant signal loss.
o-axial cables are essential components in modern communication systems, providing reliable connections for
C
various applications.
Circuit Switching
ircuit switching is a method where a dedicated communication path or circuit is established between two
C
endpoints for the duration of their conversation or data transfer.
Characteristics:
- fixed bandwidth is allocated for the entire duration of the connection.
A
- Suitable for real-time applications like voice calls where consistent quality is required.
- Inefficient use of resources when the circuit remains idle during silence periods.
Example:
Traditional telephone networks use circuit switching to establish a dedicated line for each call until it ends.
Packet Switching
acket switching divides data into smaller packets that are sent independently over the network without
P
establishing a dedicated path beforehand.
Characteristics:
- ackets can take different routes to reach their destination based on current network conditions.
P
- More efficient use of bandwidth since multiple packets from different sources can share the same
transmission medium simultaneously.
- Suitable for bursty traffic patterns typical in data communications (e.g., internet traffic).
Example:
he internet uses packet switching to transmit data where packets are routed independently based on IP
T
addresses.
Comparison Table:
Aspect Circuit Switching Packet Switching
oth methods have their advantages depending on specific application requirements in telecommunications and
B
networking environments.
Chat link:perplexity