0% found this document useful (0 votes)
1 views

computer networks

The document provides an overview of the internet, detailing its history, functionality, and key components such as protocols, IP addresses, and routers. It distinguishes between the internet and the World Wide Web, highlights the internet's features, uses, and security concerns, and discusses the social impact and benefits of internet connectivity. Additionally, it covers concepts related to the network edge and edge computing, emphasizing their importance in improving efficiency and security in data transmission.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

computer networks

The document provides an overview of the internet, detailing its history, functionality, and key components such as protocols, IP addresses, and routers. It distinguishes between the internet and the World Wide Web, highlights the internet's features, uses, and security concerns, and discusses the social impact and benefits of internet connectivity. Additionally, it covers concepts related to the network edge and edge computing, emphasizing their importance in improving efficiency and security in data transmission.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

-Internet

-Network edge
-circuit switching
-Packet Switching
-Delay , Loss & Throughput | PPT (slideshare.net)

What is the internet?


The internet, sometimes simply called the net, is a worldwide system of
interconnected computer networks and electronic devices that communicate
with each other using an established set of protocols.

The internet was conceived by the Advanced Research Projects Agency


(ARPA) of the U.S. government in 1969. ARPA was later renamed the
Defense Advanced Research Projects Agency (DARPA) in 1972. DARPA's
first known packet-switching network was known as the Advanced Research
Projects Agency Network (ARPANET). The original goal was to create a
network that would let users of a research computer at one university talk
to research computers at other universities. A side benefit of ARPANET's
design was that because messages could be routed or rerouted in more than
one direction, the network could continue to function even if parts of it were
destroyed in the event of a military attack or other disaster.

How the internet works


The process of transferring information over the internet from one device to
another relies on packet switching. The internet is a packet-routing network
that uses IP and TCP protocols for communication. When a person visits a
website, their computer or mobile device sends a request to the server over
one of these protocols.
he following examines how the process works:

 Every device attempting to access the internet is initially linked either physically
through cables or wirelessly. For instance, a computer can establish a physical
connection to a modem using an Ethernet cable or connect wirelessly through Wi-
Fi or Bluetooth signals.

 Each computer connected to the internet is also assigned a unique IP address that
enables the device to be recognized.

 When one device attempts to send a message to another device, the data is sent
over the internet in the form of packets and each packet is assigned a port
number that will connect it to its endpoint.

 A packet that has both a unique IP address and port number can be translated from
alphabetic text into electronic signals by traveling through the layers of the Open
Systems Interconnection (OSI) model from the top application layer to the
bottom physical layer.

 The message is then sent over the internet where it's received by the internet
service provider's (ISP) router.

 The router examines the destination address assigned to each packet and
determines where to send it.

 Eventually, the packet reaches the client and travels in reverse from the bottom
physical layer of the OSI model to the top application layer. During this process,
the routing data -- the port number and IP address -- is stripped from the packet,
thus enabling the data to be translated back into alphabetic text and completing the
transmission process.
The four layers of the TCP/IP model provide a suite
of protocols.
The main components of the internet
The internet is comprised of hardware, software and various protocols. The following
are the primary components of the internet:

 Client or endpoint devices. These are the multitude of interconnected


components or clients that access and contribute to the internet. These can include
computers, smartphones, tablets, routers, web servers and IoT devices.

 Servers. Servers are the computers that provide services or share stored resources
with the client devices. Their main job is to comply with client requests by
providing the requested information or performing the requested tasks.

 Internet protocols. To retrieve the required data on the internet, a set of


guidelines and procedures known as protocols must be adhered to as they
guarantee accurate and effective data transmission. Common internet protocols
include IP, TCP/IP, HTTP, HTTP Secure (HTTPS) and file transfer protocol.
Other protocols, such as Session Initiation Protocol for voice-over IP, Post Office
Protocol 3 (POP3) and Internet Message Access Protocol for email are also used.

 IP addresses. IP addresses are used to identify devices on the internet. These can
include IPv4 addresses such as 192.168.1.1, which is the default IP address
many router manufacturers use to access a router's interface. IPv4 addresses are
shorter than IPv6 addresses, which are designed to handle the increasing number
of connected devices.

 Routers. Routers forward data packets between computer networks. By


using routing tables, routers determine the best routes or paths for data transfer
between devices.

 Domain name system. DNS converts human-readable domain names, such as


www.example.com, into machine-readable IP addresses. It also acts as a
decentralized directory that helps users navigate the internet.

 Web browsers. Web browsers or search engines -- including Apple


Safari, Google Chrome, Microsoft Edge and Mozilla Firefox -- let users access and
engage with material on the internet and also decipher and present web pages to
them.

 ISPs. ISPs are companies that provide users with internet connectivity. They
operate the infrastructure, including the cables and routers needed to connect users
to the global network.

 Social media platforms. Social media platforms, such as Facebook, X (formerly


known as Twitter) and Instagram, let users connect, share content and
communicate with people all over the world.

 Firewalls and security measures. Incoming and outgoing network traffic on the
internet is monitored and controlled by different types of security firewalls and
security measures. Firewalls safeguard networks and devices against unauthorized
internet access, cyber threats and malicious activities.
Difference between the World Wide Web and the
internet
The key difference between the internet and the World Wide Web (WWW or web) is
that the internet is a global connection of networks, while the web is a collection of
information or websites that can be accessed using the internet. In other words, the
internet is the infrastructure and the web is a service on top of it.
The web is the most widely used part of the internet. Its outstanding feature is
hypertext, a method of instantly cross-referencing text. Used in blog posts, Hypertext
Markup Language (HTML) web pages, social media posts and online shopping
websites, hypertext appears in a different color than the rest of the text and is often
also underlined. When a user clicks on one of these words or phrases, they're
transferred to the related site or webpage. Buttons, images or portions of images are
also used as hyperlinks.

The web provides access to billions of pages of information. Web browsing is done
through a web browser, such as Chrome, Edge or Firefox. The appearance of a
particular website can vary slightly, depending on the browser used. Newer versions
of a particular browser can render more complex features, such as animation, virtual
reality, sound and music files.

What are the key features of the internet?


The internet has certain features that make it a powerful and versatile tool for
communication, information sharing and diverse online activities. Some key features
of the internet include the following:

 Worldwide availability. The internet is a global resource that's accessible to


everyone. Today, most people can use the internet even if they live in the most
remote and deserted parts of the world.

 Compatibility with other media types. Due to the standardized protocols and
formats that it offers, the internet facilitates compatibility with various media
types. This enables seamless integration and interaction across diverse multimedia
such as photos, videos and audio files.

 Easy accessibility. Web browsers such as Chrome or Firefox are used to access
the internet. For end users and developers, these programs are simple to use,
comprehend and easy to develop.
 Affordability. The expenses associated with developing and maintaining internet
services are low. However, the costs vary depending on the type of services and
providers being used.
Uses of the internet
In general, the internet can be used to communicate across large or small distances,
share information from any place in the world, and access information or answers to
almost any question in moments.

Some specific examples of how the internet is used include the following:

 Social media and content sharing.

 Email and other forms of communication, such as Internet Relay Chat, internet
telephony, instant messaging and video conferencing.

 Education and self-improvement through access to online degree programs,


courses and workshops.

 Searching for jobs -- both employers and applicants use the internet to post open
positions, apply for jobs and recruit individuals found on social networking sites
such as LinkedIn.

 Entertainment such as streaming TV shows, movies, videos and music.

 Remote working using online collaboration platforms and messaging apps.


Security and the internet
Large amounts of information, both public and private, are collected across the
internet, opening users up to the risk of data breaches and other security threats such
as malware infections, ransomware attacks
and phishing attempts. Hackers and crackers can break into networks and systems and
steal login information or bank and credit card account records.
Internet security refers to a set of techniques and methods targeted at safeguarding
online activities and transactions. Users can take the following steps to protect their
online privacy:

 Install antivirus and antimalware software on devices and endpoints.

 Create difficult, varied passwords that are impossible to guess.

 Use a virtual private network or, at least, a private browsing mode, such as Google
Chrome's Incognito window.

 Use secure protocols, such as HTTPS, instead of HTTP for online transactions.

 Make all social media accounts private.

 Deactivate autofill.

 Turn off the device's Global Positioning System (GPS).

 Update cookies so an alert is sent anytime a cookie is installed.

 Log out of accounts instead of just closing the tab or window.

 Use caution with spam emails and never open or download content from unknown
sources.

 Use caution when accessing public Wi-Fi or hotspots.

 Regularly back up important data both offsite and on the cloud.

Additionally, there's an element of the internet called the dark web. The dark web is
hidden and inaccessible through standard browsers. Instead, it uses the Tor and I2P
browsers which let users remain completely anonymous. While this anonymity can be
a great way to protect an online user's security and free speech, or for the government
to keep classified data hidden, the dark web also creates an environment that
facilitates cybercrime, the transfer of illegal goods and terrorism.

Social impact of the internet


The internet has both positive and negative social effects. On one side, people argue
that the internet has increased the risk of isolation, alienation and withdrawal from
society, pointing to increases in an emotional response called FOMO, or the fear of
missing out. Also, there are major differences in terms of access to the internet,
bandwidth, efficiency and cost. This digital divide results in unequal access to
information and opportunities among individuals based on their backgrounds and
other socio-economic factors.

On the other side, people believe the internet increases civic engagement, sociability
and the intensity of relationships.

Whether the effects are good or bad, the internet has changed the way society interacts
and connects. People are constructing social relationships based on individual
interests, projects and values. Communities are being formed by like-minded
individuals not only offline and in person, but through the internet and the multitude
of online environments it creates and offers. Social networking sites -- like Facebook
and LinkedIn -- have become the preferred platforms for both businesses and
individuals looking to perform all kinds of tasks and communicate with others.

Benefits of the internet


The internet offers numerous advantages that have transformed people's lives in the
following ways:

 Provides access to endless information, knowledge and education.

 Increases users' ability to communicate, connect and share.

 Allows users to work remotely, collaborate and access a global workforce.

 Gives businesses or individuals an avenue to sell and make money.

 Provides access to an unlimited supply of entertainment sources, such as movies,


music, videos and games.
 Amplifies the influence of a message, enabling charities and other organizations to
reach a wider audience and increase the amount of donations.

 Provides access to the IoT, which enables home appliances and devices to connect
to and be controlled from a computer or smartphone.

 Provides access to health-related information and resources, letting people make


informed decisions regarding their well-being.

 Allows users to save data and easily share files with cloud storage on cloud
computing platforms.

 Enables users to monitor and control personal accounts instantly, such as bank
accounts or credit card bills.

Without network protocols, it's impossible to access or communicate through the


internet. Explore the most common network protocols and learn how they operate.

This was last updated in April 2024

The network edge is the point where a device or local network connects to the
internet. It's the first step between the core of the network and the endpoints.
What does it include?
 Endpoints
Personal computers (PCs), modems, adapters, and other devices that
connect to them
 Edge devices
Routers, switches, firewalls, wide-area networks (WANs), and integrated
access devices (IADs)
 Converging locations
Regional data centers, fixed wireline access points, wireless access base
stations, and radio access networks (RANs)
 On-premises locations
Universal customer premises equipment (uCPE) devices
What's its importance?
 It's a crucial security boundary
 It can improve throughput, which can lead to more efficient operation
 It can be used to deliver services and content to end-users efficiently
What are some technologies used at the network edge? Content Delivery
Networks (CDNs), Network Function Virtualization (NFV), and Software-
Defined Wide Area Networking (SD-WAN).

What Is Edge Computing And How Does It Differ From


Network Edge?
Edge computing involves processing data in real time near the data’s source. This is
different from the network edge in that while it can be a component of the edge, it does not
include the other devices used to transmit data from the outer edge toward the core.

However, with edge computing, you can experience improved response times and cost
savings. The edge computing device, because it is closer to the data source, makes faster
transmissions possible. It may also reduce expenditures related to setting up and
maintaining core devices because much of the computational workload is handled by the
edge computing device.
Edge devices

An edge device is one that serves as an entry point to an organization or service provider’s
network core. It includes routers, switches, wide-area networks (WANs), firewalls, and
integrated access devices (IADs).

Router

A router transmits packets of data between two different networks. This traffic includes the
content of websites as well as communications like video chat, email, and Voice over
Internet Protocol (VoIP) transmissions. Routers direct traffic on the internet, sending it from
one point to another, allowing different edge devices to communicate with each other.

Switch

A network switch connects devices within a computer network through packet switching,
which receives data then forwards it to the device for which it is intended. A switch allows
edge devices to interact and share resources without using devices at the core.

Wide-area network

A WAN consists of local-area networks (LANs) that connect to each other. In this way, the
WAN edge connects the edges of LANs. For example, an organization can connect three
offices, each with its own LAN, using a WAN or software-defined WAN (SD-WAN).

Firewall

A firewall controls the data that is allowed to enter and exit a network infrastructure
according to predefined rules. Firewalls inspect data packets, looking for anything that
raises suspicion, then discard any packets containing potential threats. Firewalls are a
primary line of defense at the network edge, keeping threats from entering or exiting.

Integrated access device

An IAD converts different types of data input and renders them into a common format. For
example, an IAD is used to convert analog and digital phone signals into one common
digital signal. IADs help simplify communications and enable more efficient transmissions at
the edge.

Benefits of Computing at the Network Edge


Placing compute at the network edge makes it possible to
intelligently manage workload placement and provides key
operational benefits:

 Increased speed and lower latency. Moving data


processing and analysis to the edge helps speed system
response, enabling faster transactions and better
experiences that could be vital in near-real-time
applications.
 Improved network traffic management. Minimizing
the amount of data sent over the network to the cloud
can reduce the bandwidth and costs of transmitting and
storing large volumes of data.
 Greater reliability. The amount of data that networks
can transmit at one time is limited. For locations with
subpar internet connectivity, being able to store and
process data at the edge improves reliability when the
cloud connection is disrupted.
 Enhanced security features. An edge computing
solution may help increase data security by limiting the
transmission of data over the internet. In healthcare, for
example, there may even be local or regional
requirements to limit the storage or transmission of
personal data.
 Agility and scalability. With the ability to distribute
computing strategically across the network, companies
can ensure applications settle in the place of highest
value and make the best use of their resources. This
opens up a range of opportunities such as establishing
new services, targeting service delivery between
localized markets, or expanding capacity without the
need to open a new data center.

Delays in Computer Network


Last Updated : 28 Dec, 2024



The delays, here, means the time for which the processing of a
particular packet takes place. We have the following types of delays
in computer networks:
1. Transmission Delay:
The time taken to transmit a packet from the host to the
transmission medium is called Transmission delay.

Aiming for a top All India Rank in the GATE CS/IT or GATE DA
2026 exam but unsure about your preparation level?
We've got you covered! Our GATE Courses for CSE & DA at
GeeksforGeeks are designed to give you the competitive edge you
need. Get live classes from GATE experts (Khaleel Sir, Chandan
Jha Sir, Vijay Agarwal Sir, and many others), practice
problems, doubt-support, previous year questions, quizzes,
all India mock tests, and much more - all in one place.
For example, if bandwidth is 1 bps (every second 1 bit can be
transmitted onto the transmission medium) and data size is 20 bits
then what is the transmission delay? If in one second, 1 bit can be
transmitted. To transmit 20 bits, 20 seconds would be required.
Let B bps is the bandwidth and L bit is the size of the data then
transmission delay is,
Tt = L/B
This delay depends upon the following factors:
 If there are multiple active sessions, the delay will become
significant.
 Increasing bandwidth decreases transmission delay.
 MAC protocol largely influences the delay if the link is shared
among multiple devices.
 Sending and receiving a packet involves a context switch in the
operating system, which takes a finite time.
2. Propagation delay:
After the packet is transmitted to the transmission medium, it has to
go through the medium to reach the destination. Hence the time
taken by the last bit of the packet to reach the destination is called
propagation delay.

Factors affecting propagation delay:


1. Distance – It takes more time to reach the destination if the
distance of the medium is longer.
2. Velocity – If the velocity(speed) of the medium is higher, the
packet will be received faster.
Tp = Distance / Velocity
Note:
Velocity =3 X 10^8 m/s (for air)
Velocity= 2.1 X 10^8 m/s (for optical fibre)
3. Queueing delay:
Let the packet is received by the destination, the packet will not be
processed by the destination immediately. It has to wait in a queue
in something called a buffer. So the amount of time it waits in queue
before being processed is called queueing delay.
In general, we can’t calculate queueing delay because we don’t
have any formula for that.
This delay depends upon the following factors:
 If the size of the queue is large, the queuing delay will be huge. If
the queue is empty there will be less or no delay.
 If more packets are arriving in a short or no time interval, queuing
delay will be large.
 The less the number of servers/links, the greater is the queuing
delay.
4. Processing delay:
Now the packet will be taken for the processing which is called
processing delay.
Time is taken to process the data packet by the processor that is the
time required by intermediate routers to decide where to forward
the packet, update TTL, perform header checksum calculations.
It also doesn’t have any formula since it depends upon the speed of
the processor and the speed of the processor varies from computer
to computer.
Note: Both queueing delay and processing delay doesn’t have any
formula because they depend on the speed of the processor
This delay depends upon the following factors:
 It depends on the speed of the processor.
Ttotal = Tt + Tp + Tq + Tpro

Ttotal = Tt+Tp
(when taking Tq and Tpro equals to 0)

Circuit Switching in Computer Network




Circuit Switching is a type of switching, in which a connection is


established between the source and destination before
communication. This connection receives the complete bandwidth of
the network until the data is transferred completely. However,
circuit switching can be inefficient and costly due to its requirement
for dedicated resources, making it less suitable for high-traffic or
large-scale networks. In this article, we will discuss every point
about Circuit Switching.
What is Circuit Switching?
In circuit switching network resources (bandwidth) are divided into
pieces and the bit delay is constant during a connection. The
dedicated path/circuit established between the sender and receiver
provides a guaranteed data rate. Data can be transmitted without
any delays once the circuit is established.
The telephone system network is one of the examples of Circuit
switching. FDM (Frequency Division Multiplexing) and TDM
(Time Division Multiplexing) are two methods of multiplexing
multiple signals into a single carrier.
 Frequency Division Multiplexing: Frequency Division
Multiplexing or FDM is used when multiple data signals are
combined for simultaneous transmission via a shared
communication medium. It is a technique by which the total
bandwidth is divided into a series of non-overlapping frequency
sub-bands, where each sub-band carries different signal. Practical
use in radio spectrum & optical fiber to share multiple
independent signals.
 Time Division Multiplexing: Time-division multiplexing
(TDM) is a method of transmitting and receiving independent
signals over a common signal path using synchronized switches
at each end of the transmission line. TDM is used for long-
distance communication links and bears heavy data traffic loads
from the end user. Time-division multiplexing (TDM) is also known
as a digital circuit switch.
Phases of Circuit Switching
 Circuit Establishment: A dedicated circuit between the source
and destination is constructed via a number of intermediary
switching center’s. Communication signals can be requested and
received when the sender and receiver communicate signals over
the circuit.
 Data Transfer: Data can be transferred between the source and
destination once the circuit has been established. The link
between the two parties remains as long as they communicate.
 Circuit Disconnection: Disconnection in the circuit occurs when
one of the users initiates the disconnect. When the disconnection
occurs, all intermediary linkages between the sender and receiver
are terminated.
What is Circuit Switching Used For?
 Continuous connections: Circuit switching is used for
connections that must be maintained for long periods, such as
long-distance communication. Circuit switching technology is
used in traditional telephone systems.
 Dial-up network connections: When a computer connects to
the internet through a dial-up service, it uses the public switched
network. Dial-up transmits Internet Protocol (IP) data packets via
a circuit-switched telephone network.
 Optical circuit switching: Data centre networks also make use
of circuit switching. Optical circuit switching is used to expand
traditional data centres and fulfil increasing bandwidth demands.
Advantages of Circuit Switching
 The main advantage of circuit switching is that a committed
transmission channel is established between the computers which
give a guaranteed data rate.
 In circuit switching, there is no delay in data flow because of the
dedicated transmission path.
 Reliability: Circuit switching provides a high level of reliability
since the dedicated communication path is reserved for the entire
duration of the communication. This ensures that the data will be
transmitted without any loss or corruption.
 Quality of service: Circuit switching provides a guaranteed
quality of service, which means that the network can prioritize
certain types of traffic, such as voice and video, over other types
of traffic, such as email and web browsing.
 Security: Circuit switching provides a higher level of security
compared to packet switching since the dedicated
communication path is only accessible to the two communicating
parties. This can help prevent unauthorized access and data
breaches.
 Ease of management: Circuit switching is relatively easy to
manage since the communication path is pre-established and
dedicated to a specific communication. This can help simplify
network management and reduce the risk of errors.
 Compatibility: Circuit switching is compatible with a wide range
of devices and protocols, which means that it can be used with
different types of networks and applications. This makes it a
versatile technology for various industries and use cases.
Disadvantages of Circuit Switching
 Limited scalability: Circuit switching is not well-suited for large-
scale networks with many nodes, as it requires a dedicated
communication path between each pair of nodes. This can result
in a high degree of complexity and difficulty in managing the
network.
 Vulnerability to failures: Circuit switching relies on a dedicated
communication path, which can make the network vulnerable to
failures, such as cable cuts or switch failures. In the event of a
failure, the communication path must be re-established, which
can result in delays or loss of data.
 Limited Flexibility: Circuit switching is not flexible as it requires
a dedicated circuit between the communicating devices. The
circuit cannot be used Waste of Resources for any other purpose
until the communication is complete, which limits the flexibility of
the network.
 Waste of Resources: Circuit switching reserves the bandwidth
and network resources for the duration of the communication,
even if there is no data being transmitted. This results in the
wastage of resources and inefficient use of the network.
 Expensive: Circuit switching is an expensive technology as it
requires dedicated communication paths, which can be costly to
set up and maintain. This makes it less feasible for small-scale
networks and applications.
 Susceptible to Failure: Circuit switching is susceptible to failure
as it relies on a dedicated communication path. If the path fails,
the entire communication is disrupted. This makes it less reliable
than other networking technologies, such as packet switching.
 Not suitable for high traffic: Circuit switching is not suitable
for high traffic, where data is transmitted intermittently at
irregular intervals. This is because a dedicated circuit needs to be
established for each communication, which can result in delays
and inefficient use of resources.
 Delay and latency: Circuit switching requires the establishment
of a dedicated communication path, which can result in delay
and latency in establishing the path and transmitting data. This
can impact the real-time performance of applications, such as
voice and video.
 High cost: Circuit switching requires the reservation of
resources, which can result in a high cost, particularly in large-
scale networks. This can make circuit switching less practical for
some applications.
 No prioritization: Circuit switching does not provide any
mechanism for prioritizing certain types of traffic over others.
Difference between Circuit Switching and
Packet Switching
Circuit Switching Packet Switching

In-circuit switching, each data unit In Packet switching, each data unit just knows
knows the entire path address which is the final destination address intermediate path is
provided by the source. decided by the routers.

In-Circuit switching, data is processed at In Packet switching, data is processed at all


the source system only intermediate nodes including the source system.

The delay between data units in circuit The delay between data units in packet
switching is uniform. switching is not uniform.

Circuit switching is more reliable. Packet switching is less reliable.

Wastage of resources is more in Circuit Less wastage of resources as compared to


Switching Circuit Switching

Circuit switching is not convenient for Packet switching is suitable for handling
handling bilateral traffic. bilateral traffic.

In-Circuit Switching there is a physical


In Packet Switching there is no physical path
path between the source and the
between the source and the destination
destination

The Takeaway
Traditional telecommunications systems and landlines rely on circuit
switching for their functioning. Packet switching is the foundation of
the modern Internet. Each has both advantages and disadvantages.
Sometimes they overlap, like when a packet-switching network
emulates circuit-switching technology and establishes a connection-
oriented manner of data transport. The internet and most phone
services now rely on packet switching. However, most legacy
networks were intended to handle circuit-switched traffic. A new
optical routing architecture could help overcome this gap.
Formulas Used in Circuit Switching
Transmission rate = Link Rate or Bit rate /
no. of slots = R/h bps
Transmission time = size of file / transmission rate
= x / (R/h)
= (x*h)/R second
Total time to send packet to destination = Transmission time +
circuit setup time
Question for Practice based on Circuit
switching
Question 1 : How long it takes to send a file of ‘x bits’ from host A
to host B over a circuit switched network that uses TDM with ‘h
slots’ and have a bit rate of ‘R Mbps’, circuit establish time is k
seconds. Find total time?
 Transmission rate = Link Rate or Bit rate / no. of slots = R/h bps
 Transmission time = size of file/ transmission rate = x / (R/h) =
(x*h)/R
 Total time = transmission time + circuit setup time = (x*h)/R secs
+ k secs
Question 2 : If a link transmits F frames/sec and each slot has B
bits then find the transmission rate?
Since it is not mention how many slots in each frame we take one
frame has one slot.
The transmission rate is the amount of data sent in 1 second.
Transmission rate = F * B bits/sec
Conclusion
Before data transfer, circuit switching provides a dedicated
connection between the source and destination, ensuring a
consistent data flow with minimal latency. While it provides great
dependability and service quality, its resource-intensive nature and
higher prices make it inappropriate for high-traffic or large-scale
networks. Packet switching, on the other hand, is more adaptable
and resource-efficient, making it ideal for dealing with irregular
traffic patterns.
Packet Switching and Delays in
Computer Network



Packet Switching in computer networks is a method of transferring data to a
network in the form of packets. In order to transfer the file fast and efficiently
over the network and minimize the transmission latency, the data is broken
into small pieces of variable length, called Packet. At the destination, all
these small parts (packets) have to be reassembled, belonging to the same
file. A packet is composed of a payload and various control information. No
pre-setup or reservation of resources is needed.

Packet Switching uses the Store and Forward technique while switching the
packets; while forwarding the packet each hop first stores that packet then
forwards. This technique is very beneficial because packets may get
discarded at any hop for some reason. More than one path is possible
between a pair of sources and destinations. Each packet contains the
Source and destination address using which they independently travel
through the network. In other words, packets belonging to the same file may
or may not travel through the same path. If there is congestion at some path,
packets are allowed to choose different paths possible over an existing
network.
Diagram of Packet Switching
In packet switching the data is divided into small packets which allow faster
movement of data. Each packet contains two parts that is Header and
Payload, the header on each packet conation information. Below is the
diagram of how packet switching works.

Packet Switching
Types of Delays in Packet Switching
 Transmission Delay: Time required by the spent station to transmit data
to the link.
 Propagation Delay: Time of data propagation through the link.
 Queueing Delay: Time spent by the packet at the destination’s queue.
 Processing Delay: Processing time for data at the destination.
Advantages of Packet Switching over Circuit
Switching
 More efficient in terms of bandwidth, since the concept of reserving a
circuit is not there.
 Minimal transmission latency.
 More reliable as a destination can detect the missing packet.
 More fault tolerant because packets may follow a different path in case
any link is down, Unlike Circuit Switching.
 Cost-effective and comparatively cheaper to implement.
Disadvantage of Packet Switching over Circuit
Switching
 Packet Switching doesn’t give packets in order, whereas Circuit Switching
provides ordered delivery of packets because all the packets follow the
same path.
 Since the packets are unordered, we need to provide sequence numbers
for each packet.
 Complexity is more at each node because of the facility to follow multiple
paths.
 Transmission delay is more because of rerouting.
 Packet Switching is beneficial only for small messages, but for bursty data
(large messages) Circuit Switching is better.
Types of Packet Switching
1. Connection-oriented Packet Switching (Virtual Circuit)
Before starting the transmission, it establishes a logical path or virtual
connection using a signaling protocol, between sender and receiver and all
packets belongs to this flow will follow this predefined route. Virtual Circuit ID
is provided by switches/routers to uniquely identify this virtual connection.
Data is divided into small units and all these small units are appended with
help of sequence numbers. Packets arrive in order at the destination.
Overall, three phases take place here- The setup, data transfer and tear-
down phases.
Virtual Circuit

All address information is only transferred during the setup phase. Once the
route to a destination is discovered, entry is added to the switching table of
each intermediate node. During data transfer, packet header (local header)
may contain information such as length, timestamp, sequence number, etc.

Connection-oriented switching is very useful in switched WAN. Some


popular protocols which use the Virtual Circuit Switching approach are X.25,
Frame-Relay, ATM, and MPLS(Multi-Protocol Label Switching).
2. Connectionless Packet Switching (Datagram)
Unlike Connection-oriented packet switching, In Connectionless Packet
Switching each packet contains all necessary addressing information such
as source address, destination address, port numbers, etc. Packets
belonging to one flow may take different routes because routing decisions
are made dynamically, so the packets that arrived at the destination might be
out of order. It has no connection setup and teardown phase, like Virtual
Circuits.
Packet delivery is not guaranteed in connectionless packet switching, so
reliable delivery must be provided by end systems using additional
protocols.

Datagram Packet Switching

A—R1—R2—BA is the sender (start)R1, R2 are two routers that store and
forward dataB is receiver(destination)
To send a packet from A to B there are delays since this is a Store and
Forward network.
Difference Between Packet Switching and Circuit
Switching
Packet Switching Circuit Switching

In packet switching data is divided into There is a dedicated path for each
Packet Switching Circuit Switching

packets, and packets is sent


packet in circuit switching.
independently.

In Packet switching, data is processed


In-Circuit switching, data is processed
at all intermediate nodes including the
at the source system only.
source system.

The delay between data units in packet The delay between data units in circuit
switching is not uniform. switching is uniform.

Packet switching is less reliable. Circuit switching is more reliable.

Transmission of the data is done not


Transmission of the data is done by the
only by the source but also by the
source.
intermediate routers.

Wastage of resources is more in Circuit


Less wastage of resources.
Switching.

In Packet Switching there is no physical In-Circuit Switching there is a physical


path between the source and the path between the source and the
destination. destination.

Call setup is not required in packet Call setup is required in circuit


switching. switching.

Packet switching requires complex Circuit switching requires simple


protocols for delivery. protocols for delivery.

Latency is high in Packet switching. Latency is low in circuit switching.

Littel bit more overheating in packet


Overheading is low in circuit switching.
switching.

Frequently Asked Question on Packet Switching –


FAQs
What is Packet Switching?
Packet switching in computer networks is a method of transferring data to a
network in the form of packets. In order to transfer the file fast and efficiently
manner over the network and minimize the transmission latency, the data is
broken into small pieces of variable length, called Packet
What is the role of routers in Packet Switching networks?
An apparatus that links two or more packet-switched networks or
subnetworks is called a router. By forwarding data packets to their intended
IP addresses, it manages traffic between these networks and let numerous
devices to share an Internet connection.
How does Packet Switching handle congestion?
The control unit of the output port sends all datagrams (packets),
acknowledgments included or not, straight to the outgoing connection if the
congestion signal from the load measuring unit shows that the load of the
switch is below a certain level.
Can packet-switched networks handle voice and video traffic?
Because packet switching can cause latency and packet loss, it is not
appropriate for real-time communication, including audio and video.
How does error handling work in Packet Switching?
Several methods at different tiers of the network protocol stack can be used
to detect problems at each node when employing packet switching. Typical
methods include the following – Checksum: A checksum is a number that a
mathematical function determines from the information in a packet.

You might also like