Professional Documents
Culture Documents
Introduction of Networking Advantages of Networking Classification of Networking Component Roles Network Features
Introduction
Data Communications
The term data refers to raw facts, letters or symbols that are processed into meaningful information. Communication is the process of transferring messages from one point to another. Data communication is the transmission of signals in a reliable and efficient manner.
How do the computers send and receive the data across communication links?
By data communication softwares; instruct computers and devices as to how exactly data is to be transferred from one place to another. The procedure of data transmission in the form of software is called protocol.
Communication Model
The main purpose of a communication system is the exchange of data between two entities. The model is as follows:
Destination
Data Communication
Figure 1.1
Figure 1.2
Simplex
Figure 1.3
Half-duplex
Figure 1.4
Full-duplex
What is Network?
For examples,
The cities connected by roads make a type of network in which the cities are as nodes and roads are as connected lines called arcs, Water-flow mechanism, Type of graph, Electric circuit, Building structure, Computer Network And so on..
10
Computer Network
Definition
A computer network is a connected set of autonomous computers and able to exchange data. It can be defined as a communications system that links two or more computers and peripherals and enables transfer of data between the computers. It is a hardware mechanism that computers use to communicate. Basically, the computers in a network share information, software, peripherals devices and processing mechanism.
11
Resource SharingSingle printer or any other hardware can be shared by many machines instead of requiring each machine to have its own printer. Information SharingElectronic mail, WWW, and news groups. Reduced costsMore processing power and storage capacity by buying many PCs and workstations than a single main frame machine. Improved ReliabilityEliminate single points of failure through replication. Effect on Society.
12
Equipment and support can be costly. Level of maintenance continues to grow. Private ownership possible. Some types of hardware may not interoperate.
13
Types of Network
14
Broadcast Networks
15
Networks on Scale
16
Figure 1.12
Categories of networks
17
Figure 1.13
LAN
18
Figure 1.13
LAN (Continued)
19
Introduction
Two computers linked together at home or office are the simplest form of a LAN. In a typical LAN configuration, one computer is designated as the file server. Computer are connected to the file server are called workstations. The server stores all of the software that controls the entire network.
20
Characteristics of LANs
Smaller scope as a single building or campus, i.e., 10m to 1km. Usually owned by same organization as attached devices. Small size restriction binds the worst-case transmission time and simplifies network management. Distinguished from other networks by size
21
Figure 1.14
MAN
22
Figure 1.15
WAN
23
WAN Characteristics
24
Computers (desktop PC, PDA, shared peripherals Entertainment (TV, DVD, VCR, camera, stereo, MP3) Telecomm (telephone, cell phone, intercom, fax) Appliances (microwave, fridge, clock, furnace, airco) Telemetry (utility meter, burglar alarm, babycam).
25
Network Software
Protocol Hierarchies Design Issues for the Layers Connection-Oriented and Connectionless Services Service Primitives The Relationship of Services to Protocols
26
Network Software
Protocol Hierarchies
27
28
29
Service Primitives
31
Figure 1.5
Point-to-point connection
32
Figure 1.6
Multipoint connection
33
Figure 1.7
Categories of topology
34
Mesh Topology
Mesh topology is an architecture and a way to route data, voice and instructions between nodes as shown in next slide. It allows for continuous connections and reconfigurations around broken or blocked paths by hopping from node to node until the destination is reached. It is in two categories:
Mesh Topology
Fully Connected
The type of network topology in which each of the nodes of the network is connected to each of other nodes in the network with a point-topoint link. This makes it possible for data to be simultaneously transmitted from any single node to all of the other nodes. In which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link.
36
Partially connected
Fully connected
Partially connected
Figure 1.8
37
Mesh Topology
Advantages:
The use of dedicated links guarantees that each connection can carry its own data load, thus eliminating traffic problems. A mesh topology is robust because the failure of any computer does not bring the entire network. It provides security and privacy because every message sent travels along a dedicated line. Point-to-point links make fault diagnose easy.
38
Mesh Topology
Disadvantages:
Since every computer must be connected to every other computer installation and reconfiguration is difficult. The hardware require to connect each link input/output and cable is expensive. Cabling cost is more.
39
Star Topology
It consists of one central switch, hub or computer which acts as a conduit to transmit messages. It does not amplify or regenerate the signal. An active star network has an active central node that usually has the means to prevent echo-related problems.
40
Figure 1.9
Star topology
41
Star Topology
Advantages:
Good performance Scalable, easy to setup and to expand Any non-centralized failure will have very little effect on the network, whereas on a ring network it would all fail with one fault. Easy to detect fault Data packets are sent quickly as they do not have to travel through any unnecessary nodes.
42
Star Topology
Disadvantages:
Expensive to install Extra hardware to required If the hub/switch fails the entire system is affected
43
Bus Topology
In which a set of computers are connected via a shared communication line, called bus. Problem occurs when two clients want to transmit at the same time on the same bus.
44
Bus Topology
Advantages:
Easy to implement and extend Require less cable length than a star topology Well suited for temporary or small networks not requiring high speeds(quick setup) Cheaper than other topologies.
45
Bus Topology
Disadvantages:
Difficult to administer/troubleshoot Limited cable length and number of stations If there is a problem with the cable, the entire network goes down Maintenance costs may be higher in the long run Performance degrades as additional computers are added or on heavy traffic If many computers are attached, the amount of data flowing causes the network to slow down.
46
Figure 1.10
Bus topology
47
Ring Topology
In which each node connects to exactly two other nodes, forming a circular pathway for signals: a ring Data travels from node to node, with each node handling every message. Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure or cable break might isolate every node to attached to the ring.
48
49
50
Networking Hardware
File Servers Workstations Network Interface Cards Hubs Repeaters Bridges Routers Switches
51
File Servers
A file server is a very fast computer with a large amount of RAM and storage space, along with a fast network interface card. The network operating system software resides on this computer, along with any software applications and data files that need to be shared. The file server controls the communication of information between the nodes on a network.
52
Workstations
All the computers connected to the file server on a network are called workstations. A workstation is a computer that is configured with a interface card, networking software, and the appropriate cables.
53
54
Reference Models
The OSI Reference Model The TCP/IP Reference Model A Comparison of OSI and TCP/IP A Critique of the OSI Model and Protocols A Critique of the TCP/IP Reference Model
55
Reference Models
56
57
58
Functions of Protocols
Encapsulation Segmentation Connection Control Ordered Delivery Flow Control Error Control Addressing Multiplexing Transmission Services
59
Encapsulation
Encapsulation is the process of inserting the information of upper layer into the data field of a lower layer. Let's say you want to send email from your PC to another PC on the Internet. First you type a message that you want to send. This message is converted into 1s and 0s by the application layer. Then, the presentation layer takes this message, and adds it's own header and footer bytes to it. Your message itself has not been changed, it is contained in the data field of the presentation layer. Then the session layer takes the resulting message and adds it's own header and footer to it. The process repeats until it gets to the physical layer. It states that data as well as control information are contained in each PDU (Protocol Data Unit). The specifics of the address are encapsulated into the message.
60
Segmentation
It implies to segment the data stream into smaller bounded size blocks / PDUs.
Connection Control
each
PDU
is
61
It is used if stations are to be connected for long time or protocol details are to be worked out dynamically. It is also known as virtual circuits with three phases: Establish connection Transfer data Terminate connection
Ordered Delivery
PDUs may not arrive in order in which they are sent. The connection-oriented protocols are require the PDU order to be maintained. So the PDU numbered sequentially as they are generated. There is problem if sequence numbers repeat after over-flow.
62
Addressing level
At which an entity is named in the communications architecture Global non-ambiguity- one system to one address Global applicability- any system can be identified from anywhere. Individual or unicast address Multicast or broadcast address
63
Addressing mode
64
APPLICATION GATEWAYS
TRANSPORT GATEWAY ROUTER BRIDGE, SWITCH REPEATER, HUB
65
Bridges:
The device that can be used to interconnect two separate LANs is known as a bridge. It is commonly used to connect two similar or dissimilar LANs. The interconnected individual LANs are called as segments. The bridge filters or forwards the traffic between two electrically independent cable systems attached to it. It operates in layer 2, i.e., data link layer and that is why it is called level-2 relay with reference to the OSI model.
66
Bridges (contd)
The bridges are designed to store and forward frames and it is protocol independent and transparent to the end stations. Bridges inspect incoming traffic and decide whether to forward or discard it. At each port of bridge it has physical layer and MAC sublayer. The physical layer and MAC sublayer protocols at each port of bridge match with the protocols of the respective LAN. The MAC sublayer have relay and routing function between them.
67
Bridges (contd)
When a MAC frame is received by the bridge, it examines the destination address, it reformats the frame as required by the other LAN. A bridge does not change the physical (MAC) addresses in a frame.
68
Function of Bridges:
Frame filtering and forwarding Learning the Address Routing- the process of deciding which frames to forward and to where is called bridge routing. Transparent bridges Source routing bridges
Types of bridges:
69
Routers:
A router is considered as a layer-3 relay that operates in the network layer, which acts on network layer frames. It can be used to link two dissimilar LANs. A router isolates LANs into subnets to manage and control network traffic. Schema diagram
70
Input ports
Output ports
Port n
. .
Port n
Switching Fabric
. .
Port 1 Port 2
Port 1 Port 2
71
Routers:
Schema diagram of the router has four basic componentsInput ports Output ports The routing processor The switching fabric
Input port performs physical and data link layer functions of the router. The ports are also provided with buffer to hold the packet before forwarding to the switching fabric. Output port performs the same functions as the input ports, but in the reverse order. The routing processor performs the function of the network layer. The process involves table lookup. The switching fabric moves the packet from the input queue to the output queue by using specialized mechanisms.
72
Input Port
Output Port
73
Gateways:
A gateway works above the network layer, such as application layer. It is also called layer-7 relay. The application layer gateways can look into the content application layer packets such as email before forwarding it to the other side. This property has made it suitable for use in firewalls.
Application Presentation Session Transport Network Data-Link Physical Application Presentation Session Transport Network Data-Link Physical Application Presentation Session Transport Network Data-Link Physical Application Presentation Session Transport Network Data-Link Physical
74
Repeaters:
A repeater can be considered as two transreceivers joined together and connected to two different segments of coaxial cable. The repeater passes the digital signal bit-by-bit in both directions between the two segments. As the signal passes through a repeater, it is amplified and regenerated at the other end. A repeater is considered as a level-1 relay.
75
Repeaters:
Important features
A repeater can connects different segments of a LAN. A repeater forwards every frame it receives. A repeater is a regenerator, not an amplifier. It can be used to create a single extended LAN.
76
Switches:
A network switch or switching hub is a computer networking device that connects network segments. A switch is a fast bridge having additional sophistication that allows faster processing of frames. Switches may operate at one or more layers of the OSI model, including data link and network. A device that operates simultaneously at more than one of these layers is known as a multilayer switch. Some of its important functionalities are:
Ports are provided with buffer Switch maintains a directory: address port Each frame is forwarded after examining the address and forwarded to the proper port.
77
Switches:
Cut-through A switch forwards a frame immediately after receiving the destination address. As a consequence, the switch forwards the frame without collision and error detection. Collision-free In this case, the switch forwards the frame after receiving 64 bytes, which allows detection of collision. Fully buffered In this case, the switch forwards the frame only after receiving the entire frame. So, the switch can detect both collision and error free frames are forwarded.
78
Physical Layer
The physical layer is responsible for two functions:
Communication with the Data Link layer Transmission and receipt of data.
It is responsible also for sending bits from one computer to another. The physical layer receive digital data from data link layer and process to convert as digital signal. It defines transmission media, transmission devices, physical topologies, data signaling.
79
1.
The transmission media can be a copper cable, a fiber optic cable, or a radio channel. The transmission devices are responsible to send and receive signals over each type of physical medium. It can not detect errors in data transmission. Four important characteristics
Mechanical: physical properties of the interface to transmission medium. Electrical: representation of bits in terms of voltage levels. Functional: functions of individual circuits of physical interface between a system and transmission medium. Procedural: Sequence of events by which bit streams are exchanged.
80
1.
Physical layer
From data link layer L2 data To data link layer L2 data
1010110100
Physical layer
1010110100
Physical layer
81
2.
Communication with Network layer above. Segmentation of upper layer packets/datagrams into frames in size that can be handled by the communications hardware. Bit Ordering Organizing the pattern of data bits before transmission Communication with the Physical layer below.
The IEEE has divided the data link layer into two sublayers:
MAC sublayer LLC sublayer
82
2.
Frame format Mechanism for controlling access to the network medium. One or more physical layer specifications for use with the protocol.
83
T2
1010110100 Frame
H2
T2
1010110100
H2
10101011010010
To Physical layer
10101011010010
From Physical layer
84
3.
Network Layer
Network layer provides connectivity and path selection between two end systems. Network layer is the layer at which routing occurs. The network layer is concerned with the following primary functions:
Communication with the transport layer above. Management of connectivity and routing between hosts or networks. Communication with the Data link layer below.
85
86
To the transport layer, it appears as a uniform data transfer service, regardless of the communicating devices and how they are connected.
87
3. Network Layer
From Transport layer L4 data To Transport layer L4 data
H3
H3
Network layer
Network layer
L3 data
To Data link layer
L3 data
From Data link layer
88
4.
Transport Layer
This layer is responsible for reliable network communication between nodes. The primary functions of transport layer are:
Communication with the Session layer above. Detect errors and lost data, retransmit data, reassemble datagrams into data streams. Communicate with the Network layer below.
The aim of transport layer is to isolate the upper three layers from the network, so that any changes to the network equipment technology will be confined to the lower three layers.
89
90
The transport layer protocols are concerned with the following issues:
Establishment and termination of host-to-host connections. Efficient and cost-effective delivery of data across the network from one host to another. Multiplexing of data, if necessary, to improve use of network bandwidth, and de-multiplexing at the other end. Flow control between hosts. Addressing of messages to their corresponding connections. The address information appears as a part of the message header.
91
4. Transport Layer
From Session layer L5 data To Session layer L5 data
H4
H4
H4
H4
H4
H4
5.
Session Layer
The most important services of session layer are:
Responsible for opening and closing session, i.e., it allows applications on connecting system to establish a session. Provides synchronization between communicating computers/nodes, messages are sent between layers Also places checkpoints in the data flow, so that if transmission fails, only the data after the last checkpoint needs to be the transmitted. Handles remote procedure calls.
93
94
6.
Presentation Layer
The presentation layer performs the following functions:
Communication with the Application layer above. Translation of standard data formats to formats understood by the local machine. Communication with session layer below.
The presentation layer deals with the format or representation, of computer information. It provides security by encrypting and decrypting data. It also compress the data before transmitting it.
95
96
7.
Application Layer
The application layer provides services to application processes such as electronic mail, file transfer, etc., that are outside of the OSI model. It identifies and establishes the availability of intended communication partners, synchronizes cooperating applications, and establishes agreement on procedures for error recovery and control of data integrity.
97
7.
98
TCP/IP reference model is the network model used in the current Internet architecture. The name TCP/IP refers to a suite of data communication protocols. Generally, TCP/IP applications use four layers:
Application layer Transport layer Network layer Host to Network layer
99
TCP/IP Features
The popularity of the TCP/IP protocols did not grow rapidly just because the protocols were there, or because connecting to the Internet mandated their use. They had several important features as Open protocol standards, freely available and developed independently from any specific computer hardware or operating system. Because it is so widely supported TCP/IP is ideal for uniting different hardware and software, even if you dont communicate over the internet.
100
TCP/IP Features
Independence from specific physical network hardware. This allows TCP/IP integrate many different kinds of networks. A common addressing scheme that allows any TCP/IP device to uniquely address any other device in the entire network, even if the network is as large as the worldwide Internet. Standardized high-level protocols for consistent, widely available user services.
101
Application layer
This layer includes all applications protocols that use the host to host transport protocols to deliver the data. Instead of using term session, TCP/IP uses the terms socket and port to describe the path over which cooperating applications communicate. Data encryption and decryption and compression and decompression can also reside at the application layer.
102
Functions of layers
1.
Application layer
The following TCP/IP protocols are essential: application layer
File Transfer Protocol (FTP) TELNET Simple Mail Transfer Protocol (SMTP) Hyper Text Transfer Protocol (HTTP) Domain Name System (DNS) Routing Information Protocol (RIP) Network File System (NFS) Simple Network Management Protocol (SNMP)
103
TELNET
It enables users to execute terminal sessions with remote hosts. The network terminal protocol (TELNET) allows a user to log in on any other computer on the network. You start a remote session by specifying a computer to connect to. From that time until you finish the session, anything you type is directly sent to the other computer.
105
5.
2. Transport Layer
It is designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI transport layer. Two end-to-end transport protocols have been classified:TCP (Transmission Control Protocol) UDP (User Datagram Protocol)
108
110
TELNET
Protocols
FTP TCP IP
SMTP UDP
DNS
Application
Transport
Network
Networks
ARPANET
SATNET
PKT RADIO
LAN
111
2.
3.
4.
TCP/IP model did not originally clearly distinguish between service, interface and protocol. TCP/IP model does not provide specific protocols for bottom two layers that correspond to physical layer and data link layer.
112
5.
Transmission Media
113
Transmission Media
Digital data can be transmitted over many different types of media. As we know that selecting a transmission medium is guided by comparing transmission requirements against the medium characteristics as shown in the next slide:
114
Transmission Media
Bandwidth:
It is the maximum frequency range that can be practically supported by a medium. The greater bandwidth of the signal, the higher the data rate can be achieved. The cost of installing the medium, including the medium specific equipment that may be needed. The cost of running and maintaining the medium and its equipment.
115
Transmission Media
Reliability Coverage:
The physical characteristics of a medium dictate how long a signal can travel in it before it is distorted beyond recognition. To cover larger areas, repeaters are needed to restore the signal, and this increases the costs.
116
Figure 7.2
117
118
Figure 7.3
Twisted-pair cable
119
In twisted pair technology, two copper wires are strung between two points:
The two wires are typically twisted together in a helix to reduce interference between the two conductors as shown in the previous slide. Twisting decreases the cross-talk interference between adjacent pairs in a cable. Data rates of twisted pair cable has several Mbps. It can be used for several kilometers.
120
It can carry both analog and digital signals. Data rate determined by wire thickness and length.
Characteristics:-The data rate that can be supported over a twisted-pair is inversely proportional to the square of the line length. For analog voice signals, amplifiers are required about every 6 km and for digital signals, repeaters are needed for about 2 km.
121
Figure 7.4
122
1
2
very low
< 2 MHz
Analog
Analog/digital
Telephone
T-1 lines
3
4 5 6 (draft) 7 (draft)
16 MHz
20 MHz 100 MHz 200 MHz 600 MHz
10 Mbps
20 Mbps 100 Mbps 200 Mbps 600 Mbps
Digital
Digital Digital Digital Digital
LANs
LANs LANs LANs LANs
123
Coaxial cable
It is made up of a copper core surrounded by insulating material and a braided outer conductor. Physical connection consists of metal pin touching the copper core. Two kinds of coaxial cable are widely used:
One kind, 50-ohm cable for digital transmission from the start. The other kind, 75-ohm cable for analog transmission and cable television.
124
Figure 7.7
Coaxial cable
125
Fiber Optics
The detector
The detector generates an electrical pulse when light falls on it.
126
Fiber Optics
By attaching a light source to one end of an optical fiber and a detector to the other; a unidirectional data transmission system that accepts an electrical signal, converts and transmits it by light pulses, and then reconverts the output to an electrical signal at the receiving end.
127
Fiber Optics
A light ray is said to have a different mode, so a fiber having this property is called a multimode fiber. The light can propagate only in a straight line without bouncing, yielding a singlemode fiber.
128
Figure 7.12
Propagation modes
129
Figure 7.13
Modes
130
Fiber Cables
Fiber optical cables are similar to coax, except without the braid. At the center is the glass core through which the light propagates. The core is surrounded by a glass cladding to keep all the light in the core. Next comes a thin plastic jacket to protect the cladding. Fibers are typically grouped in bundles, protected by an outer sheath.
131
Fiber Cables
(a) Side view of a single fiber. (b) End view of a sheath with three fibers.
132
Fiber Cables
Two kinds of light sources are used to do the signaling, LEDs (Light emitting Diodes) and semiconductor lasers.
133
TEST SERIES # 1 Note: Attempt all the following questions: What do you mean by OSI? What are the seven layers of ISOs OSI model? What are the key functions of data link layer?
Unguided transmission is used when running a physical cable (either fiber or copper) between two end points is not possible. Infrared signals typically used for short distances; Microwave signals commonly used for longer distances. Difficulties
Weather interferes with signals, may adversely affect communication. Signals bouncing off of structures may lead to out-of-phase signals that the receiver must filter out.
135
Radio Transmission
Radio signals have been used for long distance communication. It may operate at a variety of frequency bands, ranging from hundreds of Hz to hundreds of GHz. Microwave signals are used for radio transmission. It operates in the GHz range with data rates in order of 100s of Mbps per channel. Example, a satellite system, which is essentially a microwave system has a large repeater in the sky. The signals transmitted by earth stations are received, amplified, and retransmitted to other earth stations by the satellite.
136
Radio Transmission
Because of their high bandwidths, satellites are capable of supporting an enormous number and variety of channels, including TV, telephone, and data etc. It is recently being used by carriers for providing mobile telephone networks. These operate in the VHF band and subdivide their coverage area into conceptual cells, where each cell represents a limited area which served by a lowerpower transmitter and receiver station. As the mobile user moves from one cell area to another, its communication is handed over from one station to another .
137
It is a technology which allows the various users to share the channel simultaneously. It reduces the cost of transmission media and modem. In functioning, the MUX is connected to the DEMUX by a single data link. The MUX combines data from these n input lines and transmits them through the single high capacity data link, which is being demultiplexed at the other end and is delivered to the suitable output lines. Thus, multiplexing can also be defined as a technique that allows simultaneous transmission of multiple signals across a single data link.
139
140
It is used extensively in radio and TV transmission. The frequency spectrum is divided into several logic channels, giving each user exclusive possession of a particular frequency band. It is also called synchronous TDM, which is commonly used for multiplexing digitized voice stream.
Statistical TDM
This is also called asynchronous TDM. This scheme simply improves on the efficiency of synchronous TDM.
141
143
Broadcast radio and television, cable television, and cellular phone systems use frequency division multiplexing.
This technique technique. is the oldest multiplexing
144
145
146
147
148
149
150
So that the receiver may stay synchronized with the incoming data stream, the transmitting multiplexor can insert alternating 1s and 0s into the data stream.
151
152
The T1 (1.54 Mbps) multiplexor stream is a continuous series of frames of both digitized data and voice channels.
Data Communications and Computer Networks Chapter 5 The ISDN multiplexor stream is also a continuous stream of frames. Each frame contains various control and sync info.
154
Data Communications and Computer Networks SONET massive data rates Chapter 5
155
Synchronous TDM
Very popular Line will require as much bandwidth as all the bandwidths of the sources
156
157
158
159
Dense Wavelength Division Multiplexing (DWDM) Dense wavelength division multiplexing is often called just wavelength division multiplexing Dense wavelength division multiplexing multiplexes multiple data streams onto a single fiber optic line. Different wavelength lasers (called lambdas) transmit the multiple signals. Each signal carried on the fiber can be transmitted at a different rate from the other signals. Dense wavelength division multiplexing combines many (30, 40, 50, 60, more?) onto one fiber.
160
161
162
163
SWITCHING
As we know that the telephone consists of three major components: system
Local loops
analog twisted pairs going into houses and businesses
Trunks
digital fiber optics connecting the switching offices
Switching offices
where calls are moved from one trunk to another
164
Local loops
Modems When a computer wishes to send digital data over an analog dial-up line, the data must first be converted to analog form for transmission over the local loop. This conversion is done by a device called a modem. The modem is inserted between the (digital) computer and the (analog) telephone system.
165
Local loops
ADSL (Asymmetric Digital Subscriber Line) ADSL modem is actually a digital signal processor that has been set up to act as 250 QAM modems operating in parallel at different frequencies. Wireless Local Loops (WLL) In a certain sense, a fixed telephone using a wireless local loop is a bit like a mobile phone.
166
Switching
The phone system is divided into two main parts:
Outside plant (the local loops and trunks, since they are physically outside the switching offices)
Inside plant (the switches)
167
Switching
Circuit switching
When you or your computer places a telephone call, the switching equipment within telephone system seeks out a physical path all the way from your telephone to the receivers telephone. This technique is called circuit switching.
168
Circuit Switching
Message Switching
Packet Switching
Services Provided to the Network Layer Framing Error Control Flow Control
172
Provide service interface to the network layer Dealing with transmission errors Regulating data flow
173
174
Framing
A character stream: (a) Without errors. (b) With one error.
176
Framing (2)
(a) A frame delimited by flag bytes. (b) Four examples of byte sequences before and after stuffing.
177
Framing (3)
Bit stuffing:-(a) The original data. (b) The data as they appear on the line. (c) The data as they are stored in receivers memory after destuffing.
178
179
Error-Correcting Codes
Use of a Hamming code to correct burst errors.
180
Error-Detecting Codes
181
An Unrestricted Simplex Protocol A Simplex Stop-and-Wait Protocol A Simplex Protocol for a Noisy Channel
182
A One-Bit Sliding Window Protocol A Protocol Using Go Back N A Protocol Using Selective Repeat
183
A sliding window of size 1, with a 3-bit sequence number. (a) Initially. (b) After the first frame has been sent. (c) After the first frame has been received. (d) After the first acknowledgement has been received.
184
Two scenarios for protocol 4. (a) Normal case. (b) Abnormal case. The notation is (seq, ack, packet number). An asterisk indicates where a network layer accepts a packet.
185
Pipelining and error recovery. Effect on an error when (a) Receivers window size is 1. (b) Receivers window size is large.
186
187
HDLC High-Level Data Link Control The Data Link Layer in the Internet
188
189
Control field of (a) An information frame. (b) A supervisory frame. (c) An unnumbered frame.
190
191
192
194
It is a naming scheme that uses a hierarchical, domain-based naming scheme on a distributed database system. The domain names are case insensitive, so com and COM have same meaning. Every node has a label which is 63 characters long. The top-level domains are divided into two categories: generic and countries. For example,
195
Each domain name is named by the path upward from it to the root. The components are separated by dots. Whenever a new system is installed in a zone, the DNS administrator for the zone allocates name and IP address for the new servers database. A zone is a subtree of the DNS tree that is administrated separately.
196
8
9
ac
in,uk,fr,it
Academic institutions
Symbols for countries like india, united kingdom, france, italy etc.
197
DNS Components
It is defined by the DNS as being the sequence of names and domain. For exp, sharda.ac.in could be the name of domain. Software (programs) maps names to addresses. It does this mapping domain name to IP address. It is a software that functions as a client interacting with a name server.
Name server
Name resolver
Name Cache
It is the storage used by the name resolver to store information frequently used.
part of domain.
198
Zone :
Each user, who intends to participate in e-mail communication, is assigned a mailbox, where outgoing and incoming messages are buffered, allowing the transfer to take place in the background.
The message contains the header that specifies the sender, recipients, and subject, followed by a body that contains message. The TCP/IP protocol that supports e-mail on the internet is called Simple Mail Transfer Protocol (SMTP).
199
Sending a message to one or many recipients. Sending messages that include text, voice, video, or graphics.
A software package, known as User Agent, is used to compose, read, reply or forward e-mails and handle mailboxes. The e-mail address consists of two parts divided by a @ character. The first part is the local name that identifies mailbox and the second part is a domain name.
200
E-mail operation
201
As, we know that the e-mail delivery takes place in three stages. The first and second stage use SMTP but the third stage does not use SMTP because it is push protocol, so the third stage uses a mail access protocol. There are two mail access protocols being used:
POP3 (Post office protocol version 3) IMAP4 (Internet Mail Access protocol version 4)
202