Unit-2 CN
Unit-2 CN
Bridging and Network Defines standards for network bridging (e.g., Spanning Tree
IEEE 802.1
Management Protocol), VLANs (802.1Q), and network management protocols.
Logical Link Control Specifies the LLC sublayer, providing a uniform interface for the
IEEE 802.2
(LLC) MAC sublayer across different physical media.
IEEE Broadband Wireless Defines standards for wireless MANs, providing high-speed
802.16 Access (WiMAX) internet access over large areas.
IEEE Specifies protocols for ring-based MANs, aiming for efficient data
Resilient Packet Ring
802.17 transport and resilience.
Wireless Regional
IEEE Utilizes unused television broadcast bands to provide broadband
Area Networks
802.22 access in rural areas.
(WRAN)
For a comprehensive overview and the latest developments in IEEE 802 standards, you can visit the
official IEEE 802 LAN/MAN Standards Committee website
📚 Key IEEE 802 Standards for LAN and MAN
Standard Focus Area Description
Bridging and Network Defines standards for network bridging (e.g., Spanning Tree
IEEE 802.1
Management Protocol), VLANs (802.1Q), and network management protocols.
Logical Link Control Specifies the LLC sublayer, providing a uniform interface for the
IEEE 802.2
(LLC) MAC sublayer across different physical media.
Wireless Personal
IEEE Focuses on short-range communication standards, including
Area Networks
802.15 Bluetooth (802.15.1) and Zigbee (802.15.4).
(WPAN)
IEEE Broadband Wireless Defines standards for wireless MANs, providing high-speed
802.16 Access (WiMAX) internet access over large areas.
IEEE Specifies protocols for ring-based MANs, aiming for efficient data
Resilient Packet Ring
802.17 transport and resilience.
Wireless Regional
IEEE Utilizes unused television broadcast bands to provide broadband
Area Networks
802.22 access in rural areas.
(WRAN)
🔄 Virtual Circuits
X.25 supports two types of virtual circuits:
Switched Virtual Circuits (SVCs): Established dynamically for each session and
terminated after the session ends.
Permanent Virtual Circuits (PVCs): Pre-established paths that remain active,
suitable for consistent and long-term connections.
Each virtual circuit is identified by a Logical Channel Identifier (LCI), allowing multiple
simultaneous connections over a single physical link.
📦 Packet Types
X.25 defines various packet types for control and data transmission:
Call Setup and Clearing: Includes Call Request, Call Accepted, Clear Request, and
Clear Confirmation packets.
Data Transfer: Data packets carry user information, while Interrupt packets handle
urgent data.
Flow Control and Error Handling: Packets like Receive Ready (RR), Receive Not
Ready (RNR), Reject (REJ), Reset, and Restart manage flow control and error
recovery.
Diagnostic and Registration: Provide network status and manage terminal
registration.
📡 Addressing
X.25 uses the X.121 addressing scheme, comprising:
Data Network Identification Code (DNIC): A 4-digit code identifying the country
and network.
National Terminal Number (NTN): Up to 10 digits identifying the specific terminal
within the network.
Later revisions introduced support for Network Service Access Point (NSAP) addresses,
enhancing compatibility with OSI protocols.
Working:
Frame relay switches set up virtual circuits to connect multiple LANs to
build a WAN. Frame relay transfers data between LANs across WAN by
dividing the data in packets known as frames and transmitting these
packets across the network. It supports communication with multiple LANs
over the shared physical links or private lines.
Frame relay network is established between Local Area Networks (LANs)
border devices such as routers and service provider network that
connects all the LAN networks. Each LAN has an access link that
connects routers of LAN to the service provider network terminated by the
frame relay switch. The access link is the private physical link used for
communication with other LAN networks over WAN. The frame relay
switch is responsible for terminating the access link and providing frame
relay services.
For data transmission, LAN’s router (or other border device linked with
access link) sends the data packets over the access link. The packet sent
by LAN is examined by a frame relay switch to get the Data Link
Connection Identifier (DLCI) which indicates the destination of the packet.
Frame relay switch already has the information about addresses of the
LANs connected to the network hence it identifies the destination LAN by
looking at DLCI of the data packet. DLCI basically identifies the virtual
circuit (i.e. logical path between nodes that doesn’t really exist) between
source and destination network. It configures and transmits the packet to
frame relay switch of destination LAN which in turn transfers the data
packet to destination LAN by sending it over its respective access link.
Hence, in this way, a LAN is connected with multiple other LANs by
sharing a single physical link for data transmission.
Frame relay also deals with congestion within a network. Following
methods are used to identify congestion within a network:
1. Forward Explicit Congestion Network (FECN) –
FECN is a part of the frame header that is used to notify the destination
about the congestion in the network. Whenever a frame experiences
congestion while transmission, the frame relay switch of the destination
network sets the FECN bit of the packet that allows the destination to
identify that packet has experienced some congestion while
transmission.
2. Backward Explicit Congestion Network (BECN) –
BECN is a part of the frame header that is used to notify the source
about the congestion in the network. Whenever a frame experiences
congestion while transmission, the destination sends a frame back to
the source with a set BECN bit that allows the source to identify that
packet that was transmitted had experienced some congestion while
reaching out to the destination. Once, source identifies congestion in
the virtual circuit, it slows down to transmission to avoid network
overhead.
3. Discard Eligibility (DE) –
DE is a part of the frame header that is used to indicate the priority for
discarding the packets. If the source is generating a huge amount of
traffic on the certain virtual network then it can set DE bits of less
significant packets to indicate the high priority for discarding the
packets in case of network overhead. Packets with set DE bits are
discarded before the packets with unset DE bits in case of congestion
within a network.
Types:
Advantages:
1. High speed
2. Scalable
3. Reduced network congestion
4. Cost-efficient
5. Secured connection
Disadvantages:
🔄 Comparative Overview
Narrowband ISDN (N-
Feature Broadband ISDN (B-ISDN)
ISDN)
Channel 1.5 Mbps
64 kbps (B-channel)
Bandwidth
Switching
Circuit-switched Packet-switched (ATM)
Technique
Primary Use Cases Voice, fax, basic data Video, multimedia, high-speed data
Infrastructure Existing copper lines Requires new infrastructure
Limited due to competition from other
Adoption Widely adopted initially
technologies
While both N-ISDN and B-ISDN played significant roles in the evolution of digital
communication, advancements in networking technologies have led to the adoption of more
efficient and higher-capacity systems, rendering traditional ISDN services largely obsolete in
modern networks.
Asynchronous Transfer Mode (ATM):
It is an International Telecommunication Union- Telecommunications
Standards Section (ITU-T) efficient for call relay and it transmits all
information including multiple service types such as data, video, or voice
which is conveyed in small fixed-size packets called cells. Cells are
transmitted asynchronously and the network is connection-oriented.
ATM is a technology that has some event in the development of
broadband ISDN in the 1970s and 1980s, which can be considered an
evolution of packet switching. Each cell is 53 bytes long – 5 bytes header
and 48 bytes payload. Making an ATM call requires first sending a
message to set up a connection.
Subsequently, all cells follow the same path to the destination. It can
handle both constant rate traffic and variable rate traffic. Thus it can carry
multiple types of traffic with end-to-end quality of service. ATM is
independent of a transmission medium, they may be sent on a wire or
fiber by themselves or they may also be packaged inside the payload of
other carrier systems. ATM networks use “Packet” or “cell” Switching with
virtual circuits. Its design helps in the implementation of high-performance
multimedia networking.
ATM Cell Format –
As information is transmitted in ATM in the form of fixed-size units
called cells. As known already each cell is 53 bytes long which consists of
a 5 bytes header and 48 bytes payload.
Working of ATM:
ATM standard uses two types of connections. i.e., Virtual path
connections (VPCs) which consist of Virtual channel connections (VCCs)
bundled together which is a basic unit carrying a single stream of cells
from user to user. A virtual path can be created end-to-end across an
ATM network, as it does not rout the cells to a particular virtual circuit. In
case of major failure, all cells belonging to a particular virtual path are
routed the same way through the ATM network, thus helping in faster
recovery.
Switches connected to subscribers use both VPIs and VCIs to switch the
cells which are Virtual Path and Virtual Connection switches that can have
different virtual channel connections between them, serving the purpose
of creating a virtual trunk between the switches which can be handled as
a single entity. Its basic operation is straightforward by looking up the
connection value in the local translation table determining the outgoing
port of the connection and the new VPI/VCI value of connection on that
link.
Advantages
The advantages of switching are as follows:
The bandwidth of the network increases with the help of a switch.
It tries to reduce the workload on individual PCs because it always
sends the information to specified addressed devices.
It increases the overall performance of the network by reducing the
traffic on the network.
There will be less frame collision because; switch creates the collision
domain for each connection.
Advertisement
-
Advertisement: 0:08
Disadvantages
The disadvantages of switching are as follows −
A Switch is more expensive than network bridges.
It cannot determine the network connectivity issues easily.
The proper designing and configuration of the switch are required to
handle multicast packets.
Explore our latest online courses and learn new skills at your own pace.
Enroll and become a certified expert to boost your career.
Circuit Switching
In circuit switching a path will be set-up before the transmission of the data.
Now the data follows the path specified.
For example, telephone lines.
Packet Switching
The data packets will contain the source and destination addresses. Every
router in between will check the destination address, select the next router to
which the packet should be forwarded and send it via an appropriate path. As
there is no path specified, different packets may follow different paths.
📦 IP Packet Structure
An IP packet is the fundamental unit of data transmitted across IP networks. It consists of
two main components:
1. Header: Contains control information required for routing and delivery.
2. Payload: Carries the actual data being transmitted, such as a segment from a TCP
connection or a datagram from a UDP service.
🔹 IPv4 Header Fields
The IPv4 header includes several fields, each serving a specific purpose:
Version (4 bits): Indicates the IP version; for IPv4, this is set to 4.
Header Length (4 bits): Specifies the length of the header in 32-bit words.
Type of Service (8 bits): Indicates the quality of service desired.
Total Length (16 bits): Specifies the entire packet size, including header and data, in
bytes.
Identification (16 bits): Used for uniquely identifying the group of fragments of a
single IP datagram.
Flags (3 bits): Control or identify fragments.
Fragment Offset (13 bits): Indicates the position of the fragment in the original
datagram.
Time to Live (8 bits): Limits the packet's lifetime to prevent it from circulating
indefinitely.
Protocol (8 bits): Indicates the protocol used in the data portion of the IP datagram
(e.g., TCP, UDP).
Header Checksum (16 bits): Provides error-checking for the header.
Source Address (32 bits): The IP address of the sender.
Destination Address (32 bits): The IP address of the receiver.
Options (variable): Allows for additional options; this field is optional and not
commonly used.
The payload follows the header and contains the actual data being transmitted.
🔹 IPv6 Header Differences
IPv6, the successor to IPv4, was developed to address the exhaustion of IPv4 addresses and
includes several enhancements:
Larger Address Space: IPv6 uses 128-bit addresses, significantly increasing the
number of available IP addresses.
Simplified Header: The IPv6 header has a fixed length and a simplified structure,
improving processing efficiency.
Extension Headers: Optional extension headers are used for additional features,
allowing for more flexibility.
These improvements make IPv6 more suitable for the modern internet's needs.
Transport Layer
The Transport Layer (Layer 4 in the OSI model) is responsible for end-to-end communication
between hosts. It ensures complete data transfer with mechanisms for error checking, flow control,
and congestion control.
🔹 Design Issues
1. Multiplexing and Demultiplexing: Allows multiple applications to use the network
simultaneously by assigning unique port numbers.
2. Reliable Data Transfer: Ensures data is delivered accurately and in order, using
acknowledgments and retransmissions.
3. Flow Control: Prevents the sender from overwhelming the receiver by controlling the data
transmission rate.
4. Congestion Control: Manages network traffic to prevent congestion by adjusting the rate of
data transmission.
🔹 Connection Management
TCP (Transmission Control Protocol): A connection-oriented protocol that establishes a
connection using a three-way handshake before data transfer
UDP (User Datagram Protocol): A connectionless protocol that sends data without
establishing a connection, suitable for applications where speed is crucial and occasional
data loss is acceptable.
🔹 TCP Segment Format
A TCP segment consists of:
Source Port: 16 bits
Destination Port: 16 bits
Sequence Number: 32 bits
Acknowledgment Number: 32 bits
Data Offset: 4 bits
Reserved: 3 bits
Flags: 9 bits (e.g., SYN, ACK, FIN)
Window Size: 16 bits
Checksum: 16 bits
Urgent Pointer: 16 bits
Options: Variable length
🔹 UDP Segment Format
A UDP segment consists of: Source Port: 16 bits
Destination Port: 16 bits
Length: 16 bits (header + data)
Checksum: 16 bits
📁 Application Layer
The Application Layer (Layer 7 in the OSI model) provides network services directly to user
applications. It facilitates various functionalities like file transfers, email, and remote access.VSSUT
🔹 File Transfer, Access, and Management (FTAM)
FTAM: A protocol that allows users to access and manage files on remote systems,
supporting operations like reading, writing, and deleting files.
FTP (File Transfer Protocol): Enables the transfer of files between a client and server over a
TCP-based network.
🔹 E-Mail
SMTP (Simple Mail Transfer Protocol): Used for sending emails from a client to a server or
between servers.
POP3 (Post Office Protocol 3): Allows clients to retrieve emails from a server, downloading
them for offline access.
IMAP (Internet Message Access Protocol): Enables clients to access and manage emails
directly on the mail server, supporting multiple devices.
🔹 Virtual Terminal
A Network Virtual Terminal allows users to interact with remote systems as if they were directly
connected. It provides a standardized interface for remote login and command execution.
🔹 Public Network
Public networks refer to networks accessible by the general public, such as the Internet. They
provide various services like web browsing, email, and file sharing, often using standardized
protocols to ensure interoperability.
At the data link layer, it extracts the message from the sender and provides
it to the receiver by providing the sender’s and receiver’s addresses. The
advantage of using frames is that data is broken up into recoverable
chunks that can easily be checked for corruption.
The process of dividing the data into frames and reassembling it is
transparent to the user and is handled by the data link layer.
Framing is an important aspect of data link layer protocol design because it
allows the transmission of data to be organized and controlled, ensuring
that the data is delivered accurately and efficiently.
Problems in Framing
Detecting start of the frame: When a frame is transmitted, every
station must be able to detect it. Station detects frames by looking out
for a special sequence of bits that marks the beginning of the frame i.e.
SFD (Starting Frame Delimiter).
How does the station detect a frame: Every station listens to link for
SFD pattern through a sequential circuit. If SFD is detected, sequential
circuit alerts station. Station checks destination address to accept or
reject frame.
Detecting end of frame: When to stop reading the frame.
Handling errors: Framing errors may occur due to noise or other
transmission errors, which can cause a station to misinterpret the frame.
Therefore, error detection and correction mechanisms, such as cyclic
redundancy check (CRC), are used to ensure the integrity of the frame.
Framing overhead: Every frame has a header and a trailer that
contains control information such as source and destination address,
error detection code, and other protocol-related information. This
overhead reduces the available bandwidth for data transmission,
especially for small-sized frames.
Framing incompatibility: Different networking devices and protocols
may use different framing methods, which can lead to framing
incompatibility issues. For example, if a device using one framing
method sends data to a device using a different framing method, the
receiving device may not be able to correctly interpret the frame.
Framing synchronization: Stations must be synchronized with each
other to avoid collisions and ensure reliable communication.
Synchronization requires that all stations agree on the frame boundaries
and timing, which can be challenging in complex networks with many
devices and varying traffic loads.
Framing efficiency: Framing should be designed to minimize the
amount of data overhead while maximizing the available bandwidth for
data transmission. Inefficient framing methods can lead to lower network
performance and higher latency.
Types of framing
There are two types of framing:
1. Fixed-size: The frame is of fixed size and there is no need to provide
boundaries to the frame, the length of the frame itself acts as a delimiter.
Drawback: It suffers from internal fragmentation if the data size is less
than the frame size
Solution: Padding
2. Variable size: In this, there is a need to define the end of the frame as
well as the beginning of the next frame to distinguish. This can be done in
two ways:
1. Length field – We can introduce a length field in the frame to indicate
the length of the frame. Used in Ethernet(802.3). The problem with this
is that sometimes the length field might get corrupted.
2. End Delimiter (ED) – We can introduce an ED(pattern) to indicate the
end of the frame. Used in Token Ring. The problem with this is that ED
can occur in the data. This can be solved by:
. Character/Byte Stuffing: Used when frames consist of characters. If
data contains ED then, a byte is stuffed into data to differentiate it from
ED.
Bit Stuffing: Let ED = 01111 and if data = 01111
–> Sender stuffs a bit to break the pattern i.e. here appends a 0 in data =
011101.
–> Receiver receives the frame.
–> If data contains 011101, receiver removes the 0 and reads the data.
Error Control in Data Link Layer
Data-link layer uses the techniques of error control simply to ensure and
confirm that all the data frames or packets, i.e. bit streams of data, are
transmitted or transferred from sender to receiver with certain accuracy.
Using or providing error control at this data link layer is an optimization, it
was never a requirement. Error control is basically process in data link
layer of detecting or identifying and re-transmitting data frames that might
be lost or corrupted during transmission. In both of these cases, receiver
or destination does not receive correct data frame and sender or source
does not even know anything about any such loss regarding data frames.
Therefore, in such type of cases, both sender and receiver are provided
with some essential protocols that are required to detect or identify such
types of errors as loss of data frames. The Data-link layer follows a
technique known as re-transmission of frames to detect or identify transit
errors and also to take necessary actions that are required to reduce or
remove such errors. Each and every time an error is detected during
transmission, particular data frames are retransmitted and this process is
known as ARQ (Automatic Repeat Request).
Ways of doing Error Control : There are basically two ways of doing
Error control as given below :