Networking Unit 2
Networking Unit 2
Layers of OSI Model:-OSI stands for Open Systems Interconnection. It has been
developed by ISO – ‘International Organization for Standardization‘, in the year
1984. It is 7-layer architecture with each layer having specific functionality to
perform. All these 7 layers work collaboratively to transmit the data from one
person to another across the globe.
Framing: Framing is a function of the data link layer. It provides a way for a
sender to transmit a set of bits that are meaningful to the receiver. This can
be accomplished by attaching special bit patterns to the beginning and end of
the frame.
Physical addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of
each frame.
Error control: The data link layer provides the mechanism of error control in
which it detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data
may get corrupted thus; flow control coordinates the amount of data that
can be sent before receiving an acknowledgment.
Access control: When a single communication channel is shared by multiple
devices, the MAC sub-layer of the data link layer helps to determine which
device has control over the channel at a given time.
Function of DLL
Routing: The network layer protocols determine which route is suitable from
source to destination. This function of the network layer is known as routing.
Logical Addressing: To identify each device on Internetwork uniquely, the
network layer defines an addressing scheme. The sender & receiver’s IP
addresses are placed in the header by the network layer. Such an address
distinguishes each device uniquely and universally.
Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the
segments produced has a header associated with it. The transport layer at
the destination station reassembles the message.
Service Point Addressing: To deliver the message to the correct process, the
transport layer header includes a type of address called service point address
or port address. Thus by specifying this address, the transport layer makes
sure that the message is delivered to the correct process.
Services Provided by Transport Layer
1. Connection-Oriented Service
2. Connectionless Service
manipulated in the
required format for
transmission.
Establishes
Connection,
Session
5 Maintenance, Ensures Message Gateway
Layer
Authentication, and
Ensures security.
Transmission of data
Network from one host to
3 Packet Router
Layer another, located in
different networks.
Connections between
Layer Modem, Cables
Devices.
Bandwidth
The range of frequencies that are used for transmitting a signal without being
substantially attenuated is called the bandwidth. It is calculated as the difference
between the highest and the lowest frequencies. It is expressed in Hertz (Hz).
For example, if the minimum frequency is 100 Hz and the maximum frequency is
1000 Hz, the bandwidth will be 900 Hz.
The bandwidth of a transmission medium is the frequency width of the medium
and is dependent upon its physical characteristics like thickness, material, length
etc. For example, the bandwidth of a coaxial cable is 750 MHz (Megahertz).
Bandwidth – Limited Signal
A signal is called bandwidth – limited or simply band-limited when the amplitude
of the spectrum goes to zero whenever its frequency crosses the allowable limits.
Thus, its Fourier transform is non-zero only for a finite frequency interval. A
band-limited signal is represented by a finite number of harmonics.
In most applications, an analog signal is sampled, converted to digital form on
which operations are performed, which is finally reconstructed to analog form.
For data communications, a signal, which is to be transmitted, has an infinite
number of terms in its Fourier transform. However, when this signal needs to be
transmitted through a channel of fixed bandwidth, band-limiting is required. It
can be observed that among the infinite Fourier components, only the first few
terms (harmonics) suffice to reconstruct the signal. So, if the bandwidth of the
channel permits these harmonics to be transmitted, then the original signal can
be reconstructed with sufficient accuracy.
Limiting the bandwidth of a signal will limit the data rate, even if the channel is
perfect with very less noise. A solution is to use coding schemes with different
voltage levels.
Transmission media?
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the
signal decreases with increasing the distance which causes the loss of
energy.
o Distortion: Distortion occurs when there is a change in the shape of the
signal. This type of distortion is examined from different signals having
different frequencies. Each frequency component has its own propagation
speed, so they reach at a different time which leads to the delay distortion.
o Noise: When data is travelled over a transmission medium, some unwanted
signal is added to it which creates the noise.
It is defined as the physical medium through which the signals are transmitted. It
is also known as Bounded media.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each
other. A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable. The
frequency range for twisted pair cable is from 0 to 3.5 KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.The degree of reduction in noise interference is determined by the
number of turns per foot. Increasing the number of turns per foot decreases noise
interference.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire
that allows the higher transmission rate.
o The cost of the shielded twisted pair cable is not very high and not very
low.
o An installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example, TV
wire is usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to
each other.
o It has a higher frequency as compared to twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the
outer conductor is made up of copper mesh. The middle core is made up of
non-conductive cover that separates the inner conductor from the outer
conductor.
o The middle core is responsible for the data transferring whereas the copper
mesh prevents from the EMI (Electromagnetic interference).
o Core: The optical fiber consists of a narrow strand of glass or plastic known
as a core. A core is a light transmission area of the fiber. The more the area
of the core, the more light will be transmitted into the fiber.
o Cladding: The concentric layer of glass is known as cladding. The main
functionality of the cladding is to provide the lower refractive index at the
core interface as to cause the reflection within the core so that the light
waves are transmitted through the fiber.
o Jacket: The protective coating consisting of plastic is known as a jacket. The
main purpose of a jacket is to preserve the fiber strength, absorb shock and
extra fiber protection.
Unguided Transmission
Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o The range in frequencies of radio waves is from 3 KHz to 1 kHz.
o In the case of radio waves, the sending and receiving antenna are not
aligned, i.e., the wave sent by the sending antenna can be received by any
receiving antenna.
o An example of the radio wave is FM radio.
Applications of Radio waves:
o A Radio wave is useful for multicasting when there is one sender and many
receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
o Radio transmission is mainly used for wide area networks and mobile
cellular phones.
o Radio waves cover a large area, and they can penetrate the walls.
o Radio transmission provides a higher transmission rate.
o Terrestrial microwave
o Satellite microwave communication.
Terrestrial Microwave Transmission
o Terrestrial Microwave transmission is a technology that transmits the
focused beam of a radio signal from one ground-based microwave
transmission antenna to another.
o Microwaves are the electromagnetic waves having the frequency in the
range from 1GHz to 1000 GHz.
o Microwaves are unidirectional as the sending and receiving antenna is to be
aligned, i.e., the waves sent by the sending antenna are narrowly focused.
o In this case, antennas are mounted on the towers to send a beam to
another antenna which is km away.
o It works on the line of sight transmission, i.e., the antennas mounted on the
towers are the direct sight of each other.
Characteristics of Microwave:
Advantages of Microwave:
The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth station.
o Satellite designing and development requires more time and higher cost.
o The Satellite needs to be monitored and controlled on regular periods so
that it remains in orbit.
o The life of the satellite is about 12-15 years. Due to this reason, another
launch of the satellite has to be planned before it becomes non-functional.
Infrared
o An infrared transmission is a wireless technology used for communication
over short ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between
two cell phones, TV remote operation, data transfer between a computer
and cell phone resides in the same closed area.
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared
communication in one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum
interference.
o Infrared communication is unreliable outside the building because the sun
rays will interfere with the infrared waves.
o In the OSI model, the data link layer is a 4 th layer from the top and 2nd layer
from the bottom.
o The communication channel that connects the adjacent nodes is known as
links, and in order to move the datagram from source to the destination,
the datagram must be moved across an individual link.
o The main responsibility of the Data Link Layer is to transfer the datagram
across an individual link.
o The Data link layer protocol defines the format of the packet exchanged
across the nodes as well as the actions such as Error detection,
retransmission, flow control, and random access.
o The Data Link Layer protocols are Ethernet, token ring, FDDI and PPP.
o An important characteristic of a Data Link Layer is that datagram can be
handled by different link layer protocols on different links in a path. For
example, the datagram is handled by Ethernet on the first link, PPP on the
second link.
o Framing & Link access: Data Link Layer protocols encapsulate each network
frame within a Link layer frame before the transmission across the link. A
frame consists of a data field in which network layer datagram is inserted
and a number of data fields. It specifies the structure of the frame as well
as a channel access protocol by which frame is to be transmitted over the
link.
o Reliable delivery: Data Link Layer provides a reliable delivery service, i.e.,
transmits the network layer datagram without any error. A reliable delivery
service is accomplished with transmissions and acknowledgements. A data
link layer mainly provides the reliable delivery service over the links as they
have higher error rates and they can be corrected locally, link at which an
error occurs rather than forcing to retransmit the data.
o Flow control: A receiving node can receive the frames at a faster rate than
it can process the frame. Without flow control, the receiver's buffer can
overflow, and frames can get lost. To overcome this problem, the data link
layer uses the flow control to prevent the sending node on one side of the
link from overwhelming the receiving node on another side of the link.
o Error detection: Errors can be introduced by signal attenuation and noise.
Data Link Layer protocol provides a mechanism to detect one or more
errors. This is achieved by adding error detection bits in the frame and then
receiving node can perform an error check.
o Error correction: Error correction is similar to the Error detection, except
that receiving node not only detects the errors but also determine where
the errors have occurred in the frame.
o Half-Duplex & Full-Duplex: In a Full-Duplex mode, both the nodes can
transmit the data at the same time. In a Half-Duplex mode, only one node
can transmit the data at the same time.
Error Detection
When data is transmitted from one device to another device, the system does not
guarantee whether the data received by the device is identical to the data
transmitted by another device. An Error is a situation when the message received
at the receiver end is not identical to the message transmitted.
Types of Errors
o Single-Bit Error
o Burst Error
Single-Bit Error:
The only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.
In the above figure, the message which is sent is corrupted as single-bit, i.e., 0 bit
is changed to 1.
Pause Next
Unmute
Durational 18:10
Loaded: 6.24%
Â
Full screen
Single-Bit Error does not appear more likely in Serial Data Transmission. For
example, Sender sends the data at 10 Mbps, this means that the bit lasts only for
1? S and for a single-bit error to occurred, a noise must be more than 1? S.
Single-Bit Error mainly occurs in Parallel Data Transmission. For example, if eight
wires are used to send the eight bits of a byte, if one of the wires is noisy, then
single-bit is corrupted per byte.
Burst Error:
The two or more bits are changed from 0 to 1 or from 1 to 0 are known as Burst
Error.
The Burst Error is determined from the first corrupted bit to the last corrupted
bit.
The duration of noise in Burst Error is more than the duration of noise in Single-
Bit.
The number of affected bits depends on the duration of the noise and data rate.
Error Detecting Techniques:
Error Detection, the receiver only needs to know that the received code word is
invalid; but in Error Correction the receiver needs to guess the Original code word
that is sent. In this way, error Correction is much more difficult than Error
Detection...
Let us take a look at the Structure of the encoder and decoder in the Error
Correction:
In order to detect or correct the errors, there is a need to send some extra bits
along with the data. These extra bits are commonly known as redundant bits.
The original data is divided into segments of k bits; it is referred to as data word.
When we add r redundant bits to each block in order to make the length
n=k+r then it is referred to as Code word.
1. Whenever an error discovered, the receiver can have the sender in order to
retransmit the entire data unit. This technique is known as the Backward
Error correction technique. This technique is simple and inexpensive in the
case of wired transmission like fiber optics; there is no expense in
retransmitting the data. In the case of wireless transmission, retransmission
costs too much thus forward error correction technique is used then.
2. The receiver can use an error-correcting code that automatically contains
certain errors. This technique is known as the Forward Error Correction
technique.
In order to correct the errors, one has to know the exact position of the error. For
example, In case if we want to calculate a single-bit error, the error correction
code then mainly determines which one of seven bits is in the error.
Suppose r (as the redundant bits) and d indicates the total number of data bits. In
order to calculate the redundant bits(r), the given formula is used;
2r= d+r+1
Error correction is mainly done with the help of the Hamming code.
Hamming Code
Let's say you have received a 7-bit Hamming code which is 1011011.
The redundant bits are some extra binary bits that are not part of the original
data, but they are generated & added to the original data bit. All this is done to
ensure that the data bits don't get damaged and if they do, we can recover them.
Now the question arises, how do we determine the number of redundant bits to
be added?
We use the formula, 2r >= m+r+1; where r = redundant bit & m = data bit.
From the formula we can make out that there are 4 data bits and 3 redundancy
bits, referring to the received 7-bit hamming code.
To proceed further we need to know about parity bit, which is a bit appended to
the data bits which ensures that the total number of 1's are even (even parity) or
odd (odd parity).
While checking the parity, if the total number of 1's are odd then write the value
of parity bit P1(or P2 etc.) as 1 (which means the error is there ) and if it is even
then the value of parity bit is 0 (which means no error).
As we go through the example, the first step is to identify the bit position of the
data & all the bit positions which are powers of 2 are marked as parity bits (e.g. 1,
2, 4, 8, etc.). The following image will help in visualizing the received hamming
code of 7 bits.
First, we need to detect whether there are any errors in this received hamming
code.
Step 1: For checking parity bit P1, use check one and skip one method, which
means, starting from P1 and then skip P2, take D3 then skip P4 then take D5, and
then skip D6 and take D7, this way we will have the following bits,
As we can observe the total number of bits is odd so we will write the value of
parity bit as P1 = 1. This means the error is there.
Step 2: Check for P2 but while checking for P2, we will use the check two and skip
two methods, which will give us the following data bits. But remember since we
are checking for P2, so we have to start our count from P2 (P1 should not be
considered).
As we can observe that the number of 1's are even, then we will write the value
of P2 = 0. This means there is no error.
Step 3: Check for P4 but while checking for P4, we will use the check four and
skip four methods, which will give us the following data bits. But remember since
we are checking for P4, so we have started our count from P4 (P1 & P2 should not
be considered).
As we can observe that the number of 1's is odd, then we will write the value
of P4 = 1. This means the error is there.
So, from the above parity analysis, P1 & P4 are not equal to 0, so we can clearly
say that the received hamming code has errors.
Since we found that the received code has an error, so now we must correct
them. To correct the errors, use the following steps:
Now we have to determine the decimal value of this error word 101 which is 5 (22
*1 + 21 * 0 + 20 *1 = 5).
We get E = 5, which states that the error is in the fifth data bit. To correct it, just
invert the fifth data bit.
So the correct data will be:
Example –
If the source wants to transmit data unit 1100111 using even parity to the
destination. The source will have to pass through Even Parity Generator.
Parity generator will count number of 1s in data unit and will add parity bit. In
the above example, number of 1s in data unit is 5; parity generator appends a
parity bit 1 to this data unit making the total number of 1s even i.e. 6 which is
clear from above figure.
Data along with parity bit is then transmitted across the network. In this case,
11001111 will be transmitted. At the destination, this data is passed to parity
checker at the destination. The number of 1s in data is counted by parity
checker.
If the number of 1s counts out to be odd, e.g. 5 or 7 then destination will come
to know that there is some error in the data. The receiver then rejects such an
erroneous data unit.
Advantages:
Example –
If the original data is 1100111. After adding VRC, data unit that will be
transmitted is 11001111. Suppose on the way 2 bits are 01011111. When this
data will reach the destination, parity checker will count number of 1s in data
and that comes out to be even i.e. 8. So, in this case, parity is not changed, it is
still even. Destination will assume that there is no error in data even though
data is erroneous.
Erroneous data accepted by receiver with number of changed bits
In this matrix of bits, a parity bit (odd or even) is calculated for each column. It
means 32 bits data plus 8 redundant bits are transmitted to receiver. Whenever
data reaches at the destination, receiver uses LRC to detect error in data.
Advantage:
LRC is used to detect burst errors.
Example: Suppose 32 bit data plus LRC that was being transmitted is hit by a burst
error of length 5 and some bits are corrupted as shown in the following figure:
In this example 1st and 6th bit in one data unit is changed. Also the 1st and 6th bit
in second unit is changed.
11
Checksums
This is a block code method where a checksum is created based on the data
values in the data blocks to be transmitted using some algorithm and appended
to the data. When the receiver gets this data, a new checksum is calculated and
compared with the existing checksum. A non-match indicates an error.
Error Detection by Checksums
For error detection by checksums, data is divided into fixed sized frames or
segments.
Sender’s End − the sender adds the segments using 1’s complement
arithmetic to get the sum. It then complements the sum to get the
checksum and sends it along with the data frames.
Receiver’s End − the receiver adds the incoming segments along with
the checksum using 1’s complement arithmetic to get the sum and
then complements it.
If the result is zero, the received frames are accepted; otherwise they are
discarded.
Example
Suppose that the sender wants to send 4 frames each of 8 bits, where the frames
are 11001100, 10101010, 11110000 and 11000011.
The sender adds the bits using 1s complement arithmetic. While adding two
numbers using 1s complement arithmetic, if there is a carry over, it is added to
the sum.
After adding all the 4 frames, the sender complements the sum to get the
checksum, 11010011, and sends it along with the data frames.
The receiver performs 1s complement arithmetic sum of all the frames including
the checksum. The result is complemented and found to be 0. Hence, the
receiver assumes that no error has occurred.
Types of Bridges:
There are three types of bridges in computer networks, which are as follows:
1. Transparent bridge
2. Source routing bridge
3. Translational bridge
Transparent Bridge:
Transparent bridges are invisible to other devices on the network. This bridge
doesn’t reconfigure the network on the addition or deletion of any station. The
prime function of the transparent bridge is to block or forward the data according
to the MAC address.
Source routing bridges were developed and designed by IBM specifically for token
ring networks. The frame’s entire route is embedded with the data frames by the
source station to perform the routing operation so that once the frame is
forwarded it must follow a specific defined path/route.
Translational Bridge:
Translational bridges convert the received data from one networking system to
another. Or it is used to communicate or transmit data between two different
types of networking systems. Like if we are sending data from a token ring to an
Ethernet cable, the translational cable will be used to connect both the
networking system and transmit data.
Advantages:
Bridges can be used as a network extension like they can connect two network
topologies together.
It has a separate collision domain, which results in increased bandwidth.
It can create a buffer when different MAC protocols are there for different
segments.
Highly reliable and maintainable. The network can be divided into multiple
LAN segments.
Simple installation, no requirement of any extra hardware or software except
the bridge itself.
Protocol transparency is higher as compared to other protocols.
Disadvantages:
Expensive as compared to hubs and repeaters.
Slow in speed.
Poor performance as additional processing is required to view the MAC
address of the device on the network.
As the traffic received is in bulk or is broadcasted traffic, individual filtering of
data is not possible.
During the broadcasting of data, the network has high broadcast traffic and
broadcast storms can be formed.
Uses of Bridge in Computer Network:
Bridges are used to increase the network capacity as they can integrate
multiple LANs together.
On receiving a data frame, databases use the bridge to decide whether to
accept or reject the data.
In the OSI model, it can be used to transmit the data to multiple nodes of the
network.
Used to broadcast the data even if the MAC address or destination address is
unavailable.
It forwards data packets despite faulty nodes.
The data packet can be forwarded or discarded by the bridge when the MAC
address is available.
Functions of Bridges in the Network
The bridge is used to divide LANs into multiple segments.
To control the traffic in the network.
It can interconnect two LANs with similar protocols.
It can filter the data based on destination/MAC address.
Network Layer Services- Packetizing, Routing and Forwarding
The network Layer is the third layer in the OSI model of computer networks. Its
main function is to transfer network packets from the source to the destination. It
is involved both the source host and the destination host. At the source, it accepts
a packet from the transport layer, encapsulates it in a datagram, and then delivers
the packet to the data link layer so that it can further be sent to the receiver. At
the destination, the datagram is de-capsulated, and the packet is extracted and
delivered to the corresponding transport layer.
Features of Network Layer
1. The main responsibility of the Network layer is to carry the data packets from
the source to the destination without changing or using them.
2. If the packets are too large for delivery, they are fragmented i.e., broken down
into smaller packets.
3. It decides the route to be taken by the packets to travel from the source to the
destination among the multiple routes available in a network (also called
routing).
4. The source and destination addresses are added to the data packets inside the
network layer.
Services Offered by Network Layer
The services which are offered by the network layer protocol are as follows:
1. Packetizing
2. Routing
3. Forwarding
1. Packetizing
The process of encapsulating the data received from the upper layers of the
network (also called payload) in a network layer packet at the source and de-
capsulated the payload from the network layer packet at the destination is known
as packetizing.
The source host adds a header that contains the source and destination address
and some other relevant information required by the network layer protocol to
the payload received from the upper layer protocol and deliver the packet to the
data link layer.
The destination host receives the network layer packet from its data link layer, de-
capsulate the packet, and delivers the payload to the corresponding upper layer
protocol. The routers in the path are not allowed to change either the source or
the destination address. The routers in the path are not allowed to de-capsulate
the packets they receive unless they need to be fragmented.
Packetizing
2. Routing
Routing is the process of moving data from one device to another device. These
are two other services offered by the network layer. In a network, there are a
number of routes available from the source to the destination. The network layer
specifies some strategies which find out the best possible route. This process is
referred to as routing. There are a number of routing protocols that are used in
this process and they should be run to help the routers coordinate with each
other and help in establishing communication throughout the network.
routing
3. Forwarding
Forwarding is simply defined as the action applied by each router when a packet
arrives at one of its interfaces. When a router receives a packet from one of its
attached networks, it needs to forward the packet to another attached network
(unicast routing) or to some attached networks (in the case of multicast routing).
Routers are used on the network for forwarding a packet from the local network
to the remote network. So, the process of routing involves packet forwarding
from an entry interface out to an exit interface.
Forwarding
Work is based on Forwarding Table. Checks the forwarding table and work
Routing Forwarding
according to that.
o Hop count: Hop count is defined as a metric that specifies the number of
passes through internetworking devices such as a router, a packet must
travel in a route to move from source to the destination. If the routing
protocol considers the hop as a primary metric value, then the path with
the least hop count will be considered as the best path to move from
source to the destination.
o Delay: It is a time taken by the router to process, queue and transmit a
datagram to an interface. The protocols use this metric to determine the
delay values for all the links along the path end-to-end. The path having the
lowest delay value will be considered as the best path.
o Bandwidth: The capacity of the link is known as a bandwidth of the link.
The bandwidth is measured in terms of bits per second. The link that has a
higher transfer rate like gigabit is preferred over the link that has the lower
capacity like 56 kb. The protocol will determine the bandwidth capacity for
all the links along the path and the overall higher bandwidth will be
considered as the best route.
o Load: Load refers to the degree to which the network resource such as a
router or network link is busy. A Load can be calculated in a variety of ways
such as CPU utilization, packets processed per second. If the traffic
increases, then the load value will also be increased. The load value
changes with respect to the change in the traffic.
o Reliability: Reliability is a metric factor may be composed of a fixed value. It
depends on the network links, and its value is measured dynamically. Some
networks go down more often than others. After network failure, some
network links repaired more easily than other network links. Any reliability
factor can be considered for the assignment of reliability ratings, which are
generally numeric values assigned by the system administrator.
Types of Routing
Play Next
Unmute
Durational 18:10
Loaded: 0.37%
Full screen
Static Routing
o Static Routing is also known as No adaptive Routing.
o It is a technique in which the administrator manually adds the routes in a
routing table.
o A Router can send the packets for the destination along the route defined
by the administrator.
o In this technique, routing decisions are not made based on the condition or
topology of the networks
o For a large network, it becomes a very difficult task to add each route
manually to the routing table.
o The system administrator should have a good knowledge of a topology as
he has to add each route manually.
Default Routing
o Default Routing is a technique in which a router is configured to send all the
packets to the same hop device, and it doesn't matter whether it belongs to
a particular network or not. A Packet is transmitted to the device for which
it is configured in default routing.
o Default Routing is used when networks deal with the single exit point.
o It is also useful when the bulk of transmission networks have to transmit
the data to the same HP device.
o When a specific route is mentioned in the routing table, the router will
choose the specific route rather than the default route. The default route is
chosen only when a specific route is not mentioned in the routing table.
Dynamic Routing
o It is also known as Adaptive Routing.
o It is a technique in which a router adds a new route in the routing table for
each packet in response to the changes in the condition or topology of the
network.
o Dynamic protocols are used to discover the new routes to reach the
destination.
o In Dynamic Routing, RIP and OSPF are the protocols used to discover the
new routes.
o If any route goes down, then the automatic adjustment will be made to
reach the destination.
o All the routers must have the same dynamic routing protocol in order to
exchange the routes.
o If the router discovers any change in the condition or topology, then router
broadcast this information to all other routers.
1. Retransmission Policy:
It is the policy in which retransmission of the packets are taken care of. If the
sender feels that a sent packet is lost or corrupted, the packet needs to be
retransmitted. This transmission may increase the congestion in the network.
To prevent congestion, retransmission timers must be designed to prevent
congestion and also able to optimize efficiency.
2. Window Policy:
The type of window at the sender’s side may also affect the congestion.
Several packets in the Go-back-n window are re-sent, although some packets
may be received successfully at the receiver side. This duplication may
increase the congestion in the network and make it worse.
Therefore, Selective repeat window should be adopted as it sends the specific
packet that may have been lost.
3. Discarding Policy:
A good discarding policy adopted by the routers is that the routers may
prevent congestion and at the same time partially discard the corrupted or less
sensitive packages and also be able to maintain the quality of a message.
In case of audio file transmission, routers can discard less sensitive packets to
prevent congestion and also maintain the quality of the audio file.
4. Acknowledgment Policy:
Since acknowledgements are also the part of the load in the network, the
acknowledgment policy imposed by the receiver may also affect congestion.
Several approaches can be used to prevent congestion related to
acknowledgment.
The receiver should send acknowledgement for N packets rather than sending
acknowledgement for a single packet. The receiver should send an
acknowledgment only if it has to send a packet or a timer expires.
5. Admission Policy:
In admission policy a mechanism should be used to prevent congestion.
Switches in a flow should first check the resource requirement of a network
flow before transmitting it further. If there is a chance of congestion or there is
congestion in the network, router should deny establishing a virtual network
connection to prevent further congestion.
All the above policies are adopted to prevent congestion before it happens in the
network.
1. Backpressure:
Backpressure is a technique in which a congested node stops receiving packets
from upstream node. This may cause the upstream node or nodes to become
congested and reject receiving data from above nodes. Backpressure is a node-to-
node congestion control technique that propagates in the opposite direction of
data flow. The backpressure technique can be applied only to virtual circuit where
each node has information of its above upstream node.
In above diagram the 3rd node is congested and stops receiving packets as a
result 2nd node may be get congested due to slowing down of the output data
flow. Similarly 1st node may get congested and inform the source to slow down.
3. Implicit Signaling:
In implicit signaling, there is no communication between the congested nodes
and the source. The source guesses that there is congestion in a network. For
example when sender sends several packets and there is no acknowledgment for
a while, one assumption is that there is congestion.
4. Explicit Signaling:
In explicit signaling, if a node experiences congestion it can explicitly sends a
packet to the source or destination to inform about congestion. The difference
between choke packet and explicit signaling is that the signal is included in the
packets that carry data rather than creating a different packet as in case of choke
packet technique.
Explicit signaling can occur in either forward or backward direction.
Forward Signaling: In forward signaling, a signal is sent in the direction of the
congestion. The destination is warned about congestion. The receiver in this
case adopts policies to prevent further congestion.
Backward Signaling: In backward signaling, a signal is sent in the opposite
direction of the congestion. The source is warned about congestion and it
needs to slow down.
Internetworking
Internetworking is combined of 2 words, inter and networking which implies an
association between totally different nodes or segments. This connection area
unit is established through intercessor devices akin to routers or gateway. The
first term for associate degree internetwork was castanet. This interconnection is
often among or between public, private, commercial, industrial, or governmental
networks. Thus, associate degree internetwork could be an assortment of
individual networks, connected by intermediate networking devices that function
as one giant network. Internetworking refers to the trade, products, and
procedures that meet the challenge of making and administering internet works.
To enable communication, every individual network node or phase is designed
with a similar protocol or communication logic that is Transfer Control Protocol
(TCP) or Internet Protocol (IP). Once a network communicates with another
network having constant communication procedures, it’s called Internetworking.
Internetworking was designed to resolve the matter of delivering a packet of
information through many links.
There is a minute difference between extending the network and
Internetworking. Merely exploitation of either a switch or a hub to attach 2 local
area networks is an extension of LAN whereas connecting them via the router is
an associate degree example of Internetworking. Internetworking is enforced in
Layer three (Network Layer) of the OSI-ISO model. The foremost notable example
of internetworking is the Internet.
There are chiefly 3 units of Internetworking:
1. Extranet
2. Intranet
3. Internet
Intranets and extranets might or might not have connections to the net. If there is
a connection to the net, the computer network or extranet area unit is usually
shielded from being accessed from the net if it is not authorized. The net isn’t
thought-about to be a section of the computer network or extranet, though it
should function as a portal for access to parts of the associate degree extranet.
1. Extranet – It’s a network of the internetwork that’s restricted in scope to one
organization or entity however that additionally has restricted connections to
the networks of one or a lot of different sometimes, however not essential. It’s
the very lowest level of Internetworking, usually enforced in an exceedingly
personal area. Associate degree extranet may additionally be classified as a
Man, WAN, or different form of network however it cannot encompass one
local area network i.e. it should have a minimum of one reference to associate
degree external network.
2. Intranet – This associate degree computer network could be a set of
interconnected networks, which exploits the Internet Protocol and uses IP-
based tools akin to web browsers and FTP tools that are underneath the
management of one body entity. That body entity closes the computer
network to the remainder of the planet and permits solely specific users. Most
typically, this network is the internal network of a corporation or different
enterprise. An outsized computer network can usually have its own internet
server to supply users with brow sable data.
3. Internet – A selected Internetworking, consisting of a worldwide
interconnection of governmental, academic, public, and personal networks
based mostly upon the Advanced analysis comes Agency Network (ARPANET)
developed by ARPA of the U.S. Department of Defense additionally home to
the World Wide Web (WWW) and cited as the ‘Internet’ to differentiate from
all different generic Internetworks. Participants within the web, or their service
suppliers, use IP Addresses obtained from address registries that manage
assignments.
Internetwork Addressing –
Challenges to Internetworking –
The services provided by the transport layer are similar to those of the data link
layer. The data link layer provides the services within a single network while the
transport layer provides the services across an internetwork made up of many
networks. The data link layer controls the physical layer while the transport layer
controls all the lower layers.
The services provided by the transport layer protocols can be divided into five
categories:
o End-to-end delivery
o Addressing
o Reliable delivery
o Flow control
o Multiplexing
End-to-end delivery:
The transport layer transmits the entire message to the destination. Therefore, it
ensures the end-to-end delivery of an entire message from a source to the
destination.
Reliable delivery:
The transport layer provides reliability services by retransmitting the lost and
damaged packets.
o Error control
o Sequence control
o Loss control
o Duplication control
Error Control
o The primary role of reliability is Error Control. In reality, no transmission
will be 100 percent error-free delivery. Therefore, transport layer protocols
are designed to provide error-free transmission.
o The data link layer also provides the error handling mechanism, but it
ensures only node-to-node error-free delivery. However, node-to-node
reliability does not ensure the end-to-end reliability.
o The data link layer checks for the error between each network. If an error is
introduced inside one of the routers, then this error will not be caught by
the data link layer. It only detects those errors that have been introduced
between the beginning and end of the link. Therefore, the transport layer
performs the checking for the errors end-to-end to ensure that the packet
has arrived correctly.
Sequence Control
Loss Control
Loss Control is a third aspect of reliability. The transport layer ensures that all the
fragments of a transmission arrive at the destination, not some of them. On the
sending end, all the fragments of transmission are given sequence numbers by a
transport layer. These sequence numbers allow the receivers transport layer to
identify the missing segment.
Duplication Control
Flow Control
Flow control is used to prevent the sender from overwhelming the receiver. If the
receiver is overloaded with too much data, then the receiver discards the packets
and asking for the retransmission of packets. This increases network congestion
and thus, reducing the system performance. The transport layer is responsible for
flow control. It uses the sliding window protocol that makes the data transmission
more efficient as well as it controls the flow of data so that the receiver does not
become overwhelmed. Sliding window protocol is byte oriented rather than
frame oriented.
Multiplexing
The application layer in the OSI model is the closest layer to the end user which
means that the application layer and end user can interact directly with the
software application. The application layer programs are based on client and
servers.
Analogy
When a teacher presents a question in a classroom full of students and all the
students start replying simultaneously, chaos is created. The teacher must
manage the students and force them to respond one at a time. This is analogous
to when MAC protocols become necessary in data link layers.
Classification
In random access protocol, no station has a higher priority than another station.
Instead, all are equal. There is no predetermined time for sending data; it
depends on the channel's status. The order of the stations transmitting data is not
predefined. It is sub-divided into the following:
In the controlled access approach, all the stations communicate with each other
to determine which station has the authority to send data in order to avoid
collision. The following protocols fall under the category of controlled access:
Channelization protocol