CDN Unit1 Notes
CDN Unit1 Notes
1. Delivery:
The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
2. Accuracy:
The system must deliver the data accurately. Data that have been altered
in transmission and left uncorrected are unusable.
3. Timeliness:
The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering
data as they are produced, in the same order that they are produced, and
without significant delay. This kind of delivery is called real-time
transmission.
4. Jitter:
Jitter refers to the variation in the packet arrival time. It is the uneven
delay in the delivery of audio or video packets. For example, let us
assume that video packets are sent every 3D ms. If some of the packets
arrive with 3D-ms delay and others with 4D-ms delay, an uneven quality
in the video is the result.
2. Sender:
A data must has to be sent to a destination from a source. This source is called the
sender. The device that sends the data to the destination or target is the Sender. It
can be a computer, cell phone, video camera and so on.
3. Receiver:
The destination of a transmitted data is the receiver which will receive the data. The
device that receives the data that was sent by the Sender is the Receiver. A receiver
can again be a computer, cell phone, video camera and so on.
4. Transmission medium:
In data communication network, the transmission medium is the physical path for the
data to travel to its destination after being sent by the Sender. Receiver receives the
data at one end of this path and the sender sent from another end of the path.
Transmission medium could be like twisted-pair cable, coaxial cable, fiber-optic
cable etc.
5. Protocol:
A protocol is nothing but a set of rules that applies on the full data communication
procedure. This is like an agreement between the two devices to successfully
communicate with each other. For example, how the data will be sent, how the data
will be traveling, how to ensure that full data has received, how to handle errors in
transmission etc. Both devices follow the same set of rules or protocol so that they
understand each other.
Network Standards
Networking standards define the rules for data communications that are needed for
interoperability of networking technologies and processes. Standards help in creating
and maintaining open markets and allow different vendors to compete on the basis
of the quality of their products while being compatible with existing market products.
During data communication, a number of standards may be used simultaneously at
the different layers. The commonly used standards at each layer are:
Types of Standards
Standards are of two types
1. De facto: These are the standards that are followed without any formal plan or
approval by any organization. They have come into existence due to traditions
or facts. For example, the HTTP had started as a de facto standard.
2. De jure: These standards are the ones which have been adopted through
legislation by any officially recognized standards organization. Most of the
communication standards that are used today are de jure standards.
Standards Organizations
Some of the noted standards organizations are
Input transducer : convert i/p Signal Voice or image into Binary signal .i.e 0 1 1 0
Channel Encoder : Used Error Detection or correction scheme such as CRC code
and Hamming code .
Digital Modulator : Used carrier and ASK, PSK, QPSK, QAM scheme to Modulate Binary Signal.
• it is easier to program;
• and data is sent faster.
Although parallel transmission can transfer data faster, it requires more transmission
channels than serial transmission. This means that data bits can be out of sync,
depending on transfer distance and how fast each bit loads. A simple of example of
where this can be seen is with a voice over IP (VOIP) call when distortion or
interference is noticeable. It can also be seen when there is skipping or interference
on a video stream.
When is parallel transmission used to send data?
Isochronous transmission :-
1.4 Transmission characteristics: Signalling rate, data rate, bit rate, baud rate :
Bit Rate : The speed of the data is expressed in bits per second (bits/s or bps). The
data rate R is a function of the duration of the bit or bit time (TB) (Fig. 1, again): R =
1/TB Rate is also called channel capacity C. If the bit time is 10 ns, the data rate
equals: R = 1/10 x 10–9 = 100 million bits/s This is usually expressed as 100 Mbits/s.
Baud Rate :The term “baud” originates from the French engineer Emile Baudot,
who invented the 5-bit teletype code. Baud rate refers to the number of signal or
symbol changes that occur per second. A symbol is one of several voltage,
frequency, or phase changes. NRZ binary has two symbols, one for each bit 0 or 1,
that represent voltage levels. In this case, the baud or symbol rate is the same as the
bit rate. However, it’s possible to have more than two symbols per transmission
interval, whereby each symbol represents multiple bits. With more than two symbols,
data is transmitted using modulation techniques. When the transmission medium
can’t handle the baseband data, modulation enters the picture. Of course, this is true
of wireless. Baseband binary signals can’t be transmitted directly; rather, the data is
modulated on to a radio carrier for transmission. Some cable connections even use
modulation to increase the data rate, which is referred to as “broadband
transmission.”
By using multiple symbols, multiple bits can be transmitted per symbol. For example,
if the symbol rate is 4800 baud and each symbol represents two bits, that translates
into an overall bit rate of 9600 bits/s. Normally the number of symbols is some power
of two. If N is the number of bits per symbol, then the number of required symbols is
S = . Thus, the gross bit rate is: R = baud rate x log2S = baud rate x 3.32 log10S If
the baud rate is 4800 and there are two bits per symbol, the number of symbols is
= 4. The bit rate is: R = 4800 x 3.32 log(4) = 4800 x 2 = 9600 bits/s If there’s only
one bit per symbol, as is the case with binary NRZ, the bit and baud rates remain the
same.
Signalling Rate :-In telecommunication, data signaling rate (DSR), also known
as gross bit rate, is the aggregate rate at which data pass a point in
the transmission path of a data transmission system.
Data Rate : The data rate is a term to denote the transmission speed, or the
number of bits per second transferred. The useful data rate for the user is usually
less than the actual data rate transported on the network. One reason for this is that
additional bits are transferred for e.g. signalling, the address, the recovery of timing
information at the receiver or error correction to compensate for possible
transmission errors.
1.Sharing files. You can access files on other network computers. This can be
very handy, for example, when you’re paying bills on a laptop in the living
room, and you need a file that’s on the computer in your home office. With a
network, you can access that file without having to physically go to the other
computer. And you’re in control: with a network, you can share what you want
to share and keep private what you want to keep private.
2. Streaming media. Media streaming refers to the process of sending digital
media, such as photos, music, or video, over a network to a device that can play
the media. For instance, you can view your photos or movies on some current-
generation TVs, or you can play music on some compatible stereo receivers that
are connected to your network.
3. Organization. A variety of scheduling software is available that makes it
possible to arrange meetings without constantly checking everyone’s schedules.
This software usually includes other helpful features, such as shared address
books and to-do lists.
4. Remote access. Having your own network allows greater mobility while
maintaining the same level of productivity. With remote access in place, users
are able to access the same files, data, and messages even when they’re not
in the office. This access can even be given to mobile handheld devices.
5. Playing network games. You can play computer games with other people on
the Internet, and you can even connect game consoles (such as Microsoft
Xbox, Nintendo Wii, and Sony PlayStation) to your network.
6. Sharing a printer. Instead of buying a printer to connect to each computer, you
can use one printer and connect it to the network. Then everyone on the
network can use it.
7. Data protection. You should know by now that it’s vital to back up your
computer data regularly. A network makes it easier to back up all of your
company’s data on an offsite server, a set of tapes, CDs, or other backup
systems.
The major criteria that a Data Communication Network must meet are:
a. Performance
b. Consistency
c. Reliability
d. Recovery
e. Security
• Number of Users: More users on a network - slower the network will run
• Transmission Speed: speed that data will be transmitted measured in bits per
second (bps)
• Media Type: Type of physical connection used to connect nodes together
• Hardware Type: Slow computers such as XT or fast such as Pentiums
• Software Program: How well is the network operating system (NOS) written
• Users prefer to have consistent response times, they develop a feel for
normal operating conditions. For example: if the "normal" response time is 3
sec. for printing to a Network Printer and a response time of over 30 sec
happens, we know that there is a problem in the system!
• Accuracy of Data determines if the network is reliable! If a system loses data,
then the users will not have confidence in the information and will often not
use the system.
Conclusion
Computer networking will always be a fast and convenient means of transferring and
sharing information, but people should be aware of its consequences as well. They
should remember that often relying on this system can put them at certain risks that
can be cause by its flaws and other malfunctions.
1.6 Network topologies: Mesh, Star, Bus, Tree, Ring and Hybrid topologies -
Schematic diagram, working, advantages, disadvantages and applications
Bus Topology :
A bus topology is a topology for a Local Area Network (LAN) in which all the nodes
are connected to a single cable. The cable to which the nodes connect is called a
"backbone". If the backbone is broken, the entire segment fails. Bus topologies are
relatively easy to install and don't require much cabling compared to the alternatives.
The bus topology is e.g. used by Ethernet networks.
1) Difficult to administer/troubleshoot
2) Limited cable length and number of stations
3) A cable break can disable the entire network; no redundancy
4) Maintenance costs may be higher in the long run
5) Performance degrades as additional computers are added
Star Topology :- diagram
Star Topology working :- A star topology is a topology for a Local Area Network
(LAN) in which all nodes are individually connected to a central connection point, like
a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a
cable fails, only one node will be brought down.
All traffic emanates from the hub of the star. The central site is in control of all
the nodes attached to it. The central hub is usually a fast, self contained computer
and is responsible for routing all traffic to other nodes. The main advantages of a star
network is that one malfunctioning node does not affect the rest of the network.
However this type of network can be prone to bottleneck and failure problems at the
central site.
Application of Star topology :-
Tree Topology :-
Tree or Expanded Star Topology :- A tree topology combines characteristics of linear
bus and star topologies. It consists of groups of star-configured workstations
connected to a linear bus backbone cable as shown in above figure. Tree topologies
allow for the expansion of an existing network, and enable schools to configure a
network to meet their needs.
There are certain special cases where tree topology is more effective:
• Communication between two networks
• A network structure which requires a root node, intermediate parents node,
and leaf nodes (just like we see in an n-tree) or a network structure which
exhibits three level of hierarchy because two level of hierarchy is already
displayed in the star topology.
A mesh topology is a network topology in which all the network nodes are
individually connected to most of the other nodes. There is not a concept of a central
switch, hub or computer which acts as a central point of communication to pass on
the messages.
On the other hand, a partially connected mesh topology does not have all the
nodes connected to each other.
In a ring network, packets of data travel from one device to the next until they reach
their destination. Most ring topologies allow packets to travel only in one direction,
called a unidirectional ring network. Others permit data to move in either direction,
called bidirectional.
The major disadvantage of a ring topology is that if any individual connection in the
ring is broken, the entire network is affected.
Ring topologies may be used in either LANs (local area networks) or WANs (wide
area networks). Depending on the type of network card used in each computer of the
ring topology, a coaxial cable or an RJ-45 network cable is used to connect
computers together.
1) All data flows in one direction, reducing the chance of packet collisions.
2) A network server is not needed to control network connectivity between
each workstation.
3) Data can transfer between workstations at high speeds.
4) Additional workstations can be added without impacting performance of
the network.
1) All data being transferred over the network must pass through each
workstation on the network, which can make it slower than a star topology.
2) The entire network will be impacted if one workstation shuts down.
3) The hardware needed to connect each workstation to the network is more
expensive than Ethernet cards and hubs/switches.
Hybrid Topology :-
Information from a given star topology reaching a connecting node in the main ring
topology like A flows either in a bidirectional or unidirectional manner. A bidirectional
flow will ensure that a failure in one node of the main ring topology doesn't lead to
the complete breakdown of information flow in the main ring topology.
2. Star-Wired Bus Network Topology
A star-wired bus topology is made up of a set of star topologies interconnected by
a central bus topology. Joining each star topology to the bus topology is a wired
connection.
In this setup, the main bus topology provides a backbone connection that
interconnects the individual star topologies. The backbone in this case is a wired
connection.
Connection of the lower levels like level 2 to higher levels like level 1 is done through
wired connection. The top most level, level 0, contains the parent (root) node. The
second level, level 1 contains the child nodes which in turn have child nodes in level
3. All the nodes in a given level have a higher parent node except for the nodes at
the top most level.
The nodes at the bottom most level are called leaf nodes, since they are peripheral
and are parent to no other node. At the basic level, a tree network topology is a
collection of star network topologies arranged in different levels. Each level, including
the top most, can contain one or more nodes.
Advantages of Hybrid Network Topology
1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, without affecting the functioning of rest of the
network.
2) Scalable: It is easy to increase the size of network by adding new components, without
disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of' the
organization and by optimizing the available resources. Special care can be given to nodes
where traffic is high as well as where chances of' fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can
design it in such a way that strengths of constituent topologies are maximized while there
weaknesses are neutralized. For example we saw Ring Topology has good data reliability
(achieved by use of tokens) and Star topology has high tolerance capability (as each node is
not directly connected to other but through central device), so these two can be used
effectively in hybrid star Bring topology.
• Automated Industry
• Banks
• Multi-National Offices
• Educational Institutes
• Research Organizations
• Air Ports.
Difference between Tree and Hybrid Topology
Differentiating
Tree Topology Hybrid Topology
Factors
Broadcast
Broadcasting is one of the five major techniques for routing computer network traffic.
The others are unicast, multicast, anycast, and geocast.
Wi-Fi hardware can be configured not to broadcast an SSID. In this case, the Wi-Fi
network is called a hidden network. Wireless devices can still connect to a hidden
network if the user manually enters the network name.
1.7 Based on physical size of Network (scale):
PAN, BAN, LAN, MAN, WAN,VPN
Based on Architecture: Peer to Peer, Client Server, advantages of Client Sever over
Peer-to-Peer Model.
Virtual Private Network (VPN):-
VPN stands for virtual private network. A virtual private network (VPN) is a
technology that creates a safe and encrypted connection over a less secure network,
such as the internet. Virtual Private network is a way to extend a private network
using a public network such as internet. The name only suggests that it is Virtual
“private network” i.e. user can be the part of local network sitting at a remote
location. It makes use of tunneling protocols to establish a secure connection.
Lets understand VPN by an example:
Think of a situation where corporate office of a bank is situated in
Washington,USA.This office has a local network consisting of say 100 computers.
Suppose another branches of bank are in Mumbai, India and Tokyo, Japan. The
traditional method of establishing a secure connection between head office and
branch was to have a leased line between the branches and head office which was
very costly as well as troublesome job. VPN let us overcome this issue in an
effective manner.
Features of VPN :-
1. VPN also ensures security by providing an encrypted tunnel between client
and vpn server.
2. VPN is used to bypass many blocked sites.
3. VPN facilitates Anonymous browsing by hiding your ip address.
4. Also most appropriate Search engine optimization(SEO) is done by analyzing
the data from VPN providers which provide country wise stats of browsing a
particular product . This method of SEO is used widely by many internet
marketing managers to form new strategies.
Peer to Peer Network Model