UNIT I Computer Networks
UNIT I Computer Networks
UNIT I Computer Networks
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
21CS501
Computer Networks
Department of
Artificial Intelligence and Data Science
Computer Science and Engineering
Information Technology
Batch/Year
2021-2025 / III Year
Created by
Date
7.08.2023
Table of Contents
S NO CONTENTS
1 Contents
2 Course Objectives
5 Course Outcomes
7 Lecture Plan
9 Notes
10 Assignments
11 Part A (Q & A)
12 Part B Qs
16 Assessment Schedule
• To gain the knowledge of various protocols and techniques used in the data link
layer.
• To learn the services of network layer and network layer protocols.
C Programming
Data Structures
SYLLABUS
UNIT –I INTRODUCTION AND PHYSICAL LAYER
Data Communications – Network Types – Protocol Layering – Network Models (OSI, TCP/IP)
Networking Devices: Hubs, Bridges, Switches – Performance Metrics – Transmission media -
Guided media -Unguided media- Switching-Circuit Switching - Packet Switching
CO1: Understand the fundamental concepts of computer networks and physical layer.
CO2: Gain knowledge of various protocols and techniques used in the data link layer.
CO3: Learn the network layer services and network layer protocols.
POs/PSOs
PS
COs PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO O3
1 2 3 4 5 6 7 8 9 0 1 2 1 2
CO1 3 3 3 - - - - - - - - - 3 2 2
CO2 3 2 2 - - - - - - - - - 3 2 2
CO3 3 2 2 - - - - - - - - - 3 2 2
CO4 3 2 2 - - - - - - - - - 3 2 2
CO5 3 2 2 - - - - - - - - - 3 2 2
LECTURE PLAN
UNIT – I
Taxonomy level
Actual Lecture
Proposed date
pertaining CO
No of periods
Mode of
delivery
Date
S No Topics
Chalk
6 Networking Device 1 14.08.2023 K3
CO1 & Talk
Chalk
7 Performance Metric 1 16.08.2023 K2
CO1 & Talk
17.08.2023 Chalk
8 Transmission Media 1 K2
CO1 & Talk
Introduction
The word data refers to information presented in whatever form is agreed upon by
the parties creating and using the data.
Data communications are the exchange of data between two devices via some form
of transmission medium such as a wire cable.
Delivery: The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
Accuracy: The system must deliver the data accurately. Data that have been
altered in transmission and left uncorrected are unusable.
Timeliness: The system must deliver data in a timely manner. Data delivered late
are useless. In the case of video and audio, timely delivery means delivering data as
they are produced, in the same order that they are produced, and without
significant delay. This kind of delivery is called real-time transmission.
UNIT – I
Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay
in the delivery of audio or video packets. For example, let us assume that video
packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and
others with 40-ms delay, an uneven quality in the video is the result.
Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and soon.
Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and soon.
Network Criteria
1. Performance
Transit time is the amount of time required for a message to travel from one
device to another. Response time is the elapsed time between an inquiry and
a response.
3. Security
Physical Structures
1. Type of Connection
The term physical topology refers to the way in which a network is laid out
physically. The topology of a network is the geometric representation of the
relationship of all the links and linking devices (usually called nodes) to one
another. There are four basic topologies possible: mesh, star, bus, and ring.
Mesh Topology
Every device has a dedicated point-to-point link to every other device. The term
dedicated means that the link carries traffic only between the two devices it
connects. The number of physical links in a fully connected mesh network with n
nodes, we need n (n–1) physical links (simplex links). We need n (n – 1) / 2
duplex-mode links. Every device on the network must have n – 1 input/output
(I/O) ports.
Advantages
The use of dedicated links guarantees that each connection can carry its
own data load, thus eliminating traffic problems.
A mesh topology is robust.
There is an advantage of privacy or security. When every message travels
along a dedicated line, only the intended recipient sees it. Physical
boundaries prevent other users from gaining access to messages.
Point-to-point links make fault identification and fault isolation easy.
UNIT – I
Disadvantages
Amount of cabling and the number of I/O ports required.
Because every device must be connected to every other device,
installation and reconnection aredifficult.
Star Topology
Less expensive.
Each device needs only one link and one I/O port to connect it to any
number of others.
Easy to installand reconfigure.
Less cabling needs to be housed, and additions, moves, and deletions
involve only one connection: between that device and the hub.
Robustness. If one link fails,
only that link is affected
Disadvantages
Dependency of the whole topology on one single point, the hub. If the hub
goes down, the whole system is dead.
A bus topology is multipoint. One long cable acts as a backbone to link all the
devices in a network.
Nodes are connected to the bus cable by drop lines and taps.
A drop line is a connection running between the device and the main cable. A
tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core.
As a signal travels along the backbone, some of its energy is transformed into
heat. Therefore, it becomes weaker and weaker as it travels farther and
farther.
For this reason there is a limit on the number of taps a bus can support and
on the distance between those taps.
Advantages
Ease of installation. Backbone cable can be laid along the most efficient path. Each
drop line has to reachonly as far as the nearest point on the backbone.
Disadvantages
A fault or break in the bus cable stops all transmission, even between devices
on the same side of the problem. The damaged area reflects signals back in
the direction of origin, creating noise in both directions.
UNIT – I
Ring Topology
Each device has a dedicated point-to-point connection with only the two devices
on either side of it.
A signal is passed along the ring in one direction, from device to device, until it
reaches its destination. Each device in the ring incorporates a repeater. When a
device receives a signal intended for another device, its repeater regenerates
the bits and passes them along.
Disadvantages
A break in the ring can disable the entire network. This weakness can be solved by
using a dual ring or aswitch capable of closing off the break.
A local area network (LAN) is usually privately owned and connects some
hosts in a single office, building, or campus. Depending on the needs of an
organization, a LAN can be as simple as two PCs and a printer in someone’s
home office, or it can extend throughout a company and include audio and
video devices.
Point-to-Point WAN
Switched WAN
A switched WAN is a network with more than two ends. A switched WAN, as we
will see shortly, is used in the backbone of global communication today. A
switched WAN is a combination of several point-to-point WANs that are
connected by switches.
It is larger than LAN and limited to a city or a group of nearby corporate offices.
The data transfer rate is from 34 Mbps to 150 Mbps. It is designed with two
unidirectional buses with independent traffic in each.
In data communication and networking, a protocol defines the rules that both
the sender and receiver and all intermediate devices need to follow to be able
to communicate effectively. When communication is simple, we may need only
one simple protocol; when the communication is complex, we may need to
divide the task between different layers, in which case we need a protocol at
each layer, or protocol layering.
UNIT – I
Protocol layering enables us to divide a complex task into several smaller and
simpler tasks. Modularity means independent layers. A layer (module) can be
defined as a black box with inputs and outputs, without concern about how inputs
are changed to outputs.
Advantages:
Layered Architecture
However, the duty of the data-link and physical layers is hop-to-hop, in which
a hop is a host or router. In the top three layers, the data unit (packets)
should not be changed by any router or link-layer switch.
In the bottom two layers, the packet created by the host is changed only by
the routers, not by the link-layer switches.
UNIT – I
Physical Layer
The physical layer is responsible for carrying individual bits in a frame across
the link. Physical layer is the lowest level in the TCP/IP protocol Suite.
The communication between two devices at the physical layer is still a logical
communication because there is another, hidden layer, the transmission
media, under the physical layer.
The bits received in a frame from the data- link layer are transformed and
sent through the transmission media, but we can think that the logical unit
between two physical layers in two devices is a bit.
The data-link layer is responsible for taking the datagram and moving it
across the link. The link can be a wired LAN with a link-layer switch, a
wireless LAN, a wired WAN, or a wireless WAN.
Network Layer
Internet Protocol (IP), that defines the format of the packet, called a
datagram at the network layer. IP also defines the format and the structure
of addresses used in this layer. IP is also responsible for routing a packet from
its source to its destination, which is achieved by each router forwarding the
datagram to the next router in its path.
but it creates forwarding tables for routers to help them in the routing process.
The network layer also has some auxiliary protocols that help IP in its delivery
and routing tasks.
The Internet Group Management Protocol (IGMP) is another protocol that helps
IP in multitasking.
The Dynamic Host Configuration Protocol (DHCP) helps IP to get the network-
layer address for a host.
The Address Resolution Protocol (ARP) is a protocol that helps IP to find the
link-layer address of a host or a router when its network-layer address is
given.
Transport Layer
The transport layer at the source host gets the message from the application
layer, encapsulates it in a transport layer packet (called a segment or a user
datagram in different protocols) and sends it, through the logical (imaginary)
connection, to the transport layer at the destination host.
There are a few transport-layer protocols in the Internet, each designed for
some specific task. Transmission Control Protocol (TCP), is a connection-
oriented protocol that first establishes a logical connection between transport
layers at two hosts before transferring data.
UNIT – I
It creates a logical pipe between two TCPs for transferring a stream of bytes.
TCP provides flow control (matching the sending data rate of the source host
with the receiving data rate of the destination host to prevent overwhelming
the destination), error control (to guarantee that the segments arrive at the
destination without error and resending the corrupted ones), and congestion
control to reduce the loss of segments due to congestion in the network.
Application Layer
The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World
Wide Web (WWW).
The Simple Mail Transfer Protocol (SMTP) is the main protocol used in
electronic mail (e-mail) service. The File Transfer Protocol (FTP) is used for
transferring files from one host to another.
The Terminal Network (TELNET) and Secure Shell (SSH) are used for accessing
a site remotely.
UNIT – I
The Simple Network Management Protocol (SNMP) is used by an
administrator to manage the Internet at global and local levels.
The Domain Name System (DNS) is used by other protocols to find the
network-layer address of acomputer.
The Internet Group Management Protocol (IGMP) is used to collect membership
in a group.
Encapsulation and Decapsulation
2. The network layer takes the transport-layer packet as data or payload and
adds its own header to the payload. The header contains the addresses of
the source and destination hosts and some more information used for error
checking of the header, fragmentation information, and so on.
UNIT – I
The result is the network-layer packet, called a datagram. The network layer then
passes the packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or payload and adds
its own header, which contains the link-layer addresses of the host or the next hop
(the router). The result is the link-layer packet, which is called a frame. The frame
is passed to the physical layer for transmission.
1. After the set of bits are delivered to the data-link layer, this layer
decapsulates the datagram from the frame and passes it to the network
layer.
2. The network layer only inspects the source and destination addresses in the
datagram header and consults its forwarding table to find the next hop to
which the datagram is to be delivered. The contents of the datagram should
not be changed by the network layer in the router unless there is a need to
fragment the datagram if it is too big to be passed through the next link. The
datagram is then passed to the data-link layerof the next link.
3. The data-link layer of the next link encapsulates the datagram in a frame and
passes it to the physical layer for transmission.
At the destination host, each layer only decapsulates the packet received, removes
the payload, and delivers the payload to the next-higher layer protocol until the
message reaches the application layer. It is necessary to say that decapsulation in
the host involves error checking.
UNIT – I
Addressing
Any communication that involves two parties needs two addresses: source
address and destination address. At the transport layer, addresses are called
port numbers, and these define the application-layer programs at the source
and destination. Port numbers are local addresses that distinguish between
several programs running at the same time. At the network-layer, the
addresses are global, with the whole Internet as the scope. A network-layer
address uniquely defines the connection of a device to the Internet. The link-
layer addresses, sometimes called MAC addresses, are locally defined
addresses, each of which defines a specific host or router in a network (LAN or
WAN).
Multiplexing means that a protocol at a layer can encapsulate a packet from several
next-higher layer protocols (one at a time). Demultiplexing means that a protocol
can decapsulate and deliver a packet to several next-higher layer protocols (one at a
time). To be able to multiplex and demultiplex, a protocol needs to have a field in its
header to identify to which protocol the encapsulated packets belong. At the
transport layer, either UDP or TCP can accept a message from several application-
layer protocols. At the network layer, IP can accept a segment from TCP or a user
datagram from UDP. IP can also accept a packet from other protocols such as ICMP,
IGMP, and so on. At the data-link layer, a frame may carry the payload coming from
IP or other protocols such as ARP.
An open system is a set of protocols that allows any two different systems to
communicate.
The OSI model is a layered framework for the design of network systems
that allows communicationbetween all types of computer systems.
There are 7 Layers in the OSI model. Each layer has a specific function.
UNIT – I
Physical Layer:
Framing: The data link layer divides the stream of bits received from the
network layer intomanageable data units called frames.
Flow Control: If the rate at which the data absorbed by the receiver is less
than the rate produced in the sender, the data link layer imposes a flow control
mechanism to overwhelming the receiver.
Error control: Reliability is added to the physical layer by data link layer to
detect and retransmit loss or damaged frames and also to prevent duplication
of frames.
Access control: When two or more devices are connected to the same link
it determines whichdevice has control over the link at any given time.
Network Layer:
These numbers enable the Transport layer to reassemble the message correctly
upon arriving at the destination.
Session Layer:
Mail services: This application provides the basis for e-mail forwarding and
storage.
Directory services: It provides distributed database sources and access to global
information about various objects and services.
Networking Devices
Hub
• A hub connects multiple wires coming from different branches, for example, the
connector in star topology which connects different stations.
• Hubs cannot filter data, so data packets are sent to all connected devices.
• In other words, the collision domain of all hosts connected through Hub remains
one.
• Also, they do not have the intelligence to find out the best path for data packets
which leads to inefficiencies and wastage.
• The stations connect to the hub with an RJ-45 connector having a maximum
segment length is 100 meters.
• This type of interconnected set of stations is easy to maintain and diagnose. The
figure shows how several hubs can be connected in a hierarchical manner to
realize a single LAN of a bigger size with a large number of nodes.
Bridge
A bridge operates at data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of source and
destination.
It is also used for interconnecting two LANs working on the same protocol. It has a
single input and single output port, thus making it a 2 port device.
The device that can be used to interconnect two separate LANs is known as a
bridge. It is commonly used to connect two similar or dissimilar LANs as shown in
Figure. The bridge operates in layer 2, that is the data-link layer and that is why it is
called level-2 relay with reference to the OSI model.
It links similar or dissimilar LANs, designed to store and forward frames, it is protocol
independent and transparent to the end stations.
The flow of information through a bridge is shown in Fig. 6.1.5. Use of bridges offer
a number of advantages, such as higher reliability, performance, security,
convenience and larger geographic coverage. But, it is desirable that the quality of
service (QOS) offered by a bridge should match that of a single LAN.
The parameters that define the QOS include availability, frame mishaps, transit
delay, frame lifetime, undetected bit errors, frame size and priority. Key features of a
bridge are mentioned below:
The first, produced as an extension of IEEE 802.1 and applicable to all IEEE 802
LANs, is known as transparent bridge.
And the other, developed for the IEEE 802.5 token rings, is based on source routing
approach. It applies to many types of LAN including token ring, token bus and
CSMA/CD bus.
Switch
A switch is a multi port bridge with a buffer and a design that can boost its
efficiency(large number of ports imply less traffic) and performance.
Switch is data link layer device. Switch can perform error checking before
forwarding data, that makes it very efficient as it does not forward packets that have
errors and forward good packets selectively to correct port only.
In other words, switch divides collision domain of hosts, but broadcast domain
remains same. A switch is essentially a fast bridge having additional sophistication
that allows faster processing of frames.
• Each frame is forwarded after examining the #address and forwarded to the
proper port#
Collision-free: In this case, the switch forwards the frame after receiving 64 bytes,
which allows detection of collision. However, error detection is not possible because
switch is yet to receive the entire frame.
Fully buffered: In this case, the switch forwards the frame only after receiving the
entire frame. So, the switch can detect both collision and error free frames are
forwarded.
UNIT – I
1.6 Network Performance
It is measured in two ways:
Throughput
Solution
The latency or delay defines how long it takes for an entire message to
completely arrive at the destination from the time the first bit is sent out from the
source. We can say that latency is made of four components: propagation time,
transmission time, queuing time and processing delay.
Propagation time measures the time required for a bit to travel from the
source to the destination. The propagation time is calculated by dividing the
distance by the propagation speed.
Example
What is the propagation time if the distance between the two points is 12,000 km?
Assume the propagationspeed to be 2.4 × 108 m/s in cable.
Solution
The transmission time of a message depends on the size of the message and the
bandwidth of the channel.
Transmission time = (Message size) / Bandwidth
Example: What are the propagation time and the transmission time for a 2.5-KB
(kilobyte) message (an email) if the bandwidth of the network is 1 Gbps? Assume
that the distance between the sender and the receiver is 12,000 km and that light
travels at 2.4 × 108 m/s.
UNIT – I
Solution
What are the propagation time and the transmission time for a 5-MB (megabyte) message
(an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between
the sender and the receiver is 12,000km and that light travels at 2.4 × 108 m/s.
Solution
Jitter
Jitter is a problem if different packets of data encounter different delays and the
application using the data at the receiver site is time-sensitive (audio and video
data, for example). If the delay for the first packet is 20 ms, for the second is 45
ms, and for the third is 40 ms, then the real-time application that uses the packets
endures jitter.
UNIT – I
1.7 Transmission media
Transmission media are actually located below the physical layer and are directly
controlled by the physicallayer.
Guided media, which are those that provide a conduit from one
device to another, include twisted-pair cable, coaxial cable, and
fiber-optic cable.
Optical fiber is a cable that accepts and transports signals in the form
of light.
Twisted-Pair Cable
A twisted pair consists of two conductors, each with its own plastic insulation,
twisted together.
Twisted-pair cable
One of the wires is used to carry signals to the receiver, and the other is used
only as a ground reference. In addition to the signal sent by the sender on
one of the wires, interference (noise) and crosstalk may affect both wires and
create unwanted signals.
UNIT – I
Figure 1.29 UTP and STP cables
UNIT – I
Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those
in twisted-pair cable, in part because the two media are constructed quite
differently.
The outer metallic wrapping serves both as a shield against noise and as the
second conductor, which completes the circuit.
This outer conductor is also enclosed in an insulating sheath, and the whole
cable is protected by a plastic cover.
Coaxial cable
BNC connectors
Coaxial cable was widely used in analog telephone networks where a single
coaxial network could carry 10,000 voice signals.
Later it was used in digital telephone networks where a single coaxial cable
could carry digital data up to 600 Mbps.
Cable TV networks also use coaxial cables. Another common application of
coaxial cable is in traditional Ethernet LANs.
Fiber-Optic Cable
Optical fiber
Current technology supports two modes, multimode and single mode for
propagating light along optical channels, each requiring fiber with different
physical characteristics.
UNIT – I
Multimode can be implemented in two forms: step-index or graded-index
Multimode is so named because multiple beams from a light source move
through the core in different paths.
In multimode step-index fiber, the density of the core remains constant from
the center to the edges. A beam of light moves through this constant density in
a straight line until it reaches the interface of the core and the cladding. At the
interface, there is an abrupt change due to a lower density. The term step-index
refers to the suddenness of this change, which contributes to the distortion of
the signal as it passes through the fiber. A second type of fiber, called
multimode graded-index fiber, decreases this distortion of the signal through the
cable. The word index here refers to the index of refraction.
Single-mode uses step-index fiber and a highly focused source of light that
limits beams to a small range of angles, all close to the horizontal. The single-
mode fiber itself is manufactured with a much smaller diameter than that of
multimode fiber, and with substantially lower density.
There are three types of connectors for fiber-optic cables. The subscriber
channel (SC) connector is used for cable TV. It uses a push/pull locking system.
The straight-tip (ST) connector is used for connecting cable to networking
devices. It uses a bayonet locking system and is more reliable than SC. MT-RJ
is a connector that is the same size as RJ45.
Attenuation is flatter than in the case of twisted-pair cable and coaxial cable.
The performance is such that we need fewer repeaters when we use fiber-optic
cable.
Fiber-optic cable is often found in backbone networks because its wide
bandwidth is cost-effective. Some cable TV companies use a combination of
optical fiber and coaxial cable, thus creating a hybrid network.
UNIT – I
Advantages and Disadvantages of Optical Fiber
Disadvantages
Cost. The cable and the interfaces are relatively more expensive than
those of other guided media. If the demand for bandwidth is not high,
often the use of optical fiber cannot be justified.
UNIT – I
Unguided Media: Wireless
Propagation Modes
In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth. These low-frequency signals emanate in all
directions from the transmitting antenna. The greater the power, the greater
the distance.
We can divide wireless transmission into three broad groups: radio waves,
microwaves, and infrared waves.
UNIT – I
Radio Waves
Radio waves, particularly those waves that propagate in the sky mode,
can travel long distances. This makes radio waves a good candidate for
long-distance broadcasting such as AM radio.
The radio wave band is relatively narrow, just under 1 GHz, compared
to the microwave band. When this band is divided into subbands, the
subbands are also narrow, leading to a low data rate for digital
communications.
AM and FM radio, television, maritime radio, cordless phones, and paging are
examples of multicasting.
Microwaves
The microwave band is relatively wide, almost 299 GHz. A high data rate is
possible.
Use of certain portions of the band requires permission from authorities.
Microwaves are used in cellular phones, satellite networks, and wireless LANs.
Applications
Microwaves, due to their unidirectional properties, are very useful when unicast
(one-to-one) communication is needed between the sender and the receiver.
Microwaves are used in cellular phones, satellite networks, and wireless LANs.
Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz can be used for short-
range communication. There is no interference. Infrared signals can be used for
short-range communication in a closed area using line-of-sight propagation.
When we use our infrared remote control, we do not interfere with the
use of the remote by our neighbors. However, this same characteristic makes
infrared signals useless for long-range communication. In addition, we cannot
use infrared waves outside a building because the sun's rays contain infrared
waves that can interfere with the communication.
UNIT – I
Applications
The infrared band, almost 400 THz, has an excellent potential for data
transmission. Such a wide bandwidth can be used to transmit digital data with a
very high data rate.
The Infrared Data Association (IrDA), an association for sponsoring the use
of infrared waves, has established standards for using these signals for
communication between devices such as keyboards, mice, PCs, and printers.
For example, some manufacturers provide a special port called the IrDA port
that allows a wireless keyboard to communicate with a PC. The standard
originally defined a data rate of 75 kbps for a distance up to 8 m.
1.8 Switching
Whenever we have multiple devices, we have the problem of how to connect them
to make one-to-one communication possible. media and equipment. A better
solution is switching. A switched network consists of a series of interlinked nodes,
called switches. Switches are devices capable of creating temporary connections
between two or more devices linked to the switch. In a switched network, some of
these nodes are connected to the end systems. Others are used only for routing.
Circuit-Switched Networks
However, each connection uses only one dedicated channel on each link.
A circuit-switched network is made of a set of switches connected by physical
links, in which each link is divided into n channels.
UNIT – I
Figure 8.3 shows a trivial circuit-switched network with four switches and four
links. Each link is divided into n (n is 3 in the figure) channels by using FDM or
TDM.
The end systems, such as computers or telephones, are directly connected to
a switch.
When end system A needs to communicate with end system M, system A
needs to request a connection to M that must be accepted by all switches as
well as by M itself. This is called the setup phase; a circuit (channel) is
reserved on each link, and the combination of circuits or channels defines the
dedicated path.
After the dedicated path made of connected circuits (channels) is
established, data transfer can take place. After all data have been
transferred, the circuits are torn down.
The end systems are normally connected through dedicated lines to the switches,
so connection setup means creating dedicated channels between the switches.
Note that end-to-end addressing is required for creating a connection between the
two end systems.
Data-Transfer Phase
After the establishment of the dedicated circuit (channels), the two parties can
transfer data.
Teardown Phase
When one of the parties needs to disconnect, a signal is sent to each switch to
release the resources.
Efficiency
Although a circuit-switched network normally has low efficiency, the delay in this
type of network is minimal. During data transfer the data are not delayed at each
switch; the resources are allocated for the duration of the connection.
Packet Switching
The size of the packet is determined by the network and the governing
protocol.
This means that there is no reserved bandwidth on the links, and there is no
scheduled processing time for each packet. Resources are allocated on
demand.
When a switch receives a packet, no matter what the source or destination is,
the packet must wait if there are other packets being processed.
Packets may arrive at the destination out of order. Packets may also be lost or
dropped because of a lack of resources. The datagram networks are
sometimes referred to as connectionless networks.
The term connectionless here means that the switch (packet switch) does not
keep information about the connection state. There are no setup or teardown
phases.
Routing Table
Each switch (or packet switch) has a routing table which is based on the
destination address. The routing tables are dynamic and are updated
periodically. The destination addresses and the corresponding forwarding
output ports are recorded in the tables.
UNIT – I
Every packet in a datagram network carries a header that contains, among
other information, the destination addresses of the packet.
When the switch receives the packet, this destination address is examined;
the routing table is consulted to find the corresponding port through which
the packet should be forwarded.
Efficiency
Delay
There may be greater delay in a datagram network. Since not all packets in a
message necessarily travel through the same switches, the delay is not
uniform for the packets of a message.
The packet travels through two switches. There are three transmission times
(3T), three propagation delays (slopes 3τ of the lines), and two waiting
times (w1 + w2). We ignore the processing time in each switch. The total
delay is
Total delay = 3T + 3τ + w1 + w2
UNIT – I
Virtual-Circuit Networks
The identifier that is actually used for data transfer is called the virtual-circuit
identifier (VCI) or the label. A VCI, unlike a global address, is a small number
that has only switch scope; it is used by a frame between two switches. When a
frame arrives at a switch, it has a VCI; when it leaves, it has a different VCI.
There are three phases in a virtual-circuit network: setup, data transfer, and
teardown.
In the setup phase, the source and destination use their global addresses to
help switches make table entries for the connection. In the teardown phase, the
source and destination inform the switches to delete the corresponding entry.
A frame arriving at port 1 with a VCI of 14. When the frame arrives, the switch
looks in its table to find port 1 and a VCI of 14. When it is found, the switch
knows to change the VCI to 22 and send out the frame from port 3. The data-
transfer phase is active until the source sends all its frames to the destination.
Setup Phase
In the setup phase, a switch creates an entry for a virtual circuit. For example,
suppose source A needs to create a virtual circuit to B. Two steps are required:
the setup request and the acknowledgment.
Setup Request
3. The switch creates an entry in its table for this virtual circuit, but it is only
able to fill three of the four columns. The switch assigns the incoming port (1)
and chooses an available incoming VCI (14) and the outgoing port (3). It does
not yet know the outgoing VCI, which will be found during the acknowledgment
step. The switch then forwards the frame through port 3 to switch 2.
a. Switch 2 receives the setup request frame. The same events happen
here as at switch 1; three columns of the table are completed: in this
case, incoming port (1), incoming VCI (66), and outgoing port (2).
b. Switch 3 receives the setup request frame. Again, three columns are
completed: incoming port (2), incoming VCI (22), and outgoing port
(3).
A special frame, called the acknowledgment frame, completes the entries in the
switching tables.
a. The destination sends an acknowledgment to switch 3. The acknowledgment
carries the global source and destination addresses so the switch knows
which entry in the table is to be completed. The frame also carries VCI 77,
chosen by the destination as the incoming VCI for frames from A. Switch 3
uses this VCI to complete the outgoing VCI column for this entry. Note that
77 is the incoming VCI for destination B, but theoutgoing VCI for switch 3.
b. Switch 3 sends an acknowledgment to switch 2 that contains its incoming
VCI in the table, chosen in the previous step. Switch 2 uses this as the
outgoing VCI in the table.
c. Switch 2 sends an acknowledgment to switch 1 that contains its incoming
VCI in the table, chosen in the previous step. Switch 1 uses this as the
outgoing VCI in the table.
d. Finally switch 1 sends an acknowledgment to source A that contains its
incoming VCI in the table, chosen in the previous step.
e. The source uses this as the outgoing VCI for the data frames to be sent to
destination B.
Teardown Phase
In this phase, source A, after sending all frames to B, sends a special frame called
a teardown request. Destination B responds with a teardown confirmation frame.
All switches delete the corresponding entry from their tables.
UNIT – I
Efficiency
Resource reservation in a virtual-circuit network can be made during the setup or
can be on demand during the data-transfer phase. The delay for each packet is
the same or different. In the first case, the delay for each packet is the same; in
the second case, each packet may encounter different delays. There is one big
advantage in a virtual-circuit network even if resource allocation is on demand.
The source can check the availability of the resources, without actually reserving
it.
Delay
The packet is traveling through two switches (routers). There are three
transmission times (3T ), three propagation times (3τ), data transfer depicted
by the sloping lines, a setup delay (which includes ransmission and propagation
in two directions), and a teardown delay. The total delay time is
1. Assume six devices are arranged in a mesh topology. How many cables are
needed? How many ports are needed for each device?
• Network Simulator 3
• Opnet
•
Qualnet
•
OMNeT++
Unit – I Question Bank
Part – A
1. Define networks.(Nov 12) (K1,CO1)
A computer network is a group of computer systems and other computing hardware
devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users. Networks are
commonly categorized based on their characteristics.
Scope of Local Area Network is Scope of Wide Area Network spans over
restricted to a small/ single building large geographical area country/ Continent
A part of n/w asserts are owned or
not
LAN is owned by some organization. owned.
Data rate of LAN 10-.10-100mbps. Data rate of WAN is Gigabyte.
The two types of line configuration are Point to point line configuration and multipoint
line configuration.
Point to point line configuration It provides a dedicated link between 2 devices.
Entire capacity of the link is reserved for transmission between 3 devices only Eg:
connection between remote control and TV’s control system
Multipoint line configuration
If many devices share the link simultaneously it is called spatially shared connection
Point to point – A point to point connection provides a dedicated link between two
devices
Multipoint – A multipoint connection is one in which more than two specific devices share
a single link.
Topology, Transmission medium and Medium access control technique are the
technology that determines nature of a LAN. Star Topology, Ring Topology, Bus
Topology and Tree Topology are the topologies available for LAN.
10. What is a protocol? What are the key elements of a protocol? (Nov 15)
(K1,CO1)
Protocol is used for communications between entities in a system and must speak
the same language. Protocol is the set of rules governing the exchange of data
between two entities. It defines what is communicated, how it is communicated,
when it is communicated. The Key elements of a Protocol are as follows,
Syntax –It refers to the structure or format of data meaning the order in
which they are presented.
Semantics –It refers to the meaning of each section of bit. How to do interpretation.
Timing –When data should be sent and how fast they can be sent.
OSI (Open Systems Interconnection) is reference model for how applications can
communicate over a network. It is partitioned into seven layers. It was developed by the
International Organization for Standardization (ISO).
At each layer, protocols are used to communicate and Control information is added to
user data at each layer. Transport layer may fragment user data. Each fragment has a
transport header added and header consists of destination SAP, sequence number and
error detection code.
A layer is created when a different level of abstraction occurs at protocol. Each layer
should perform a well defined function.
Function of each layer should be chosen using internationality standardized protocols.
Boundaries between should be chosen to minimize information flow across the
interfaces.
A set of layers and protocol is called network architecture. A list of protocols used by a
system is called protocol stack.
16. Compare OSI and TCP. (K4,CO1)
17. How do layers of the internet model correlate to the layers of the OSI
model? (K1,CO1)
OSI TCP/IP
Session Layer
Application layer
18. What is the use of data link layer in OSI? (Nov 15) (K1,CO1)
Frame synchronization: Data is divided by data link layer as frames, a
manageableunit.
Access Control: When two or more devices are connected to the same link,
Accesscontrol mechanism is needed to determine which device has control
over the link at any given time.
19. What are the functions of physical layer and presentation layer?
(K1,CO1)
20. What are the functions of Application Layer? (May/June 2011) (K1,CO1)
22. What are the major duties of Network Layer? (May/June 2012)
(K1,CO1)
It is used to send the data from source to destination with help of logical address.
Bandwidth refers to the number of bits per second that a channel, a link, or even
a network can transmit.
Delay: Is the amount of time data (signal) takes to reach the destination. Now a
higher delay generally means congestion of some sort of breaking of the
communication link.
Jitter: Is the variation of delay time. This happens when a system is not in
deterministic state eg. Video Streaming suffers from jitter a lot because the size
of data transferred is quite large and hence no way of saying how long it might
take to transfer.
Coaxial Cable
Radio waves
Microwaves
Infrared
With Full duplex transmission, two stations can simultaneously send and receive
data from each other. This mode is known as two-way simultaneous. The signals
are transmitted in only one direction. One is the sender and another is the
receiver called simplex.
33. What are the three criteria necessary for an effective and efficient
network? (K1,CO2)
Security issues include protecting data from unauthorized access and viruses.
A Virtual Circuit Identifier that uniquely identifies the connection at this switch,
and which will be carried inside the header of the packets that belongs to this
connection.
3. Discuss in detail about Internet Architecture (TCP/IP Protocol Suite). (May 2017,
May/June 2015, May/June 2011) (K2,CO1)
4. Discuss in detail about the layers in OSI model. (Nov 10,11,12,15,16)( May 2018)
(K2,CO1)
9. How packet switching works in computer networks? Compare circuit switch and
packet switching. (K5,CO1)
10. Consider all links in the network use TDM with 24 slots and have a data rate of
1.536 Mbps. Assume that host A takes 500 ms to establish an end to end circuit
with host B before begin to transmit the file. If the file is 512 kilobytes, then how
much time will it take to send the file from host A to host B? (K5,CO1)
11. Consider the network having bandwidth of 1 MBps and message of size 1000
bytes has to be sent. Each packet contains a header of 100 bytes if packet
switching technique is used. Out of the following, in how many packets the
message must be divided so that total time taken is minimum- 1 packet 5 packets
10 packets 20 packets (K5,CO1)
SUPPORTIVE ONLINE COURSES
Course
S No Course title Link
provider
https://www.udemy.co
Introduction to Networking m/course/introduction-
1 Udemy
for Complete Beginners to-networking-for-
complete-beginners/
https://www.coursera.o
Fundamentals of Network rg/learn/fundamentals-
2 Coursera
Communication network-
communications/
https://www.coursera.o
Peer-to-Peer Protocols and rg/learn/peer-to-peer-
3 Coursera
Local Area Networks protocols-local-area-
networks/
https://www.coursera.o
Packet Switching Networks rg/learn/packet-
4 Coursera
and Algorithms switching-networks-
algorithms
https://www.coursera.o
5 Coursera TCP/IP and Advanced Topics rg/learn/tcp-ip-
advanced
https://www.edx.org/c
Computer Networks and the ourse/computer-
6 edX
Internet networks-and-the-
internet
REAL TIME APPLICATIONS IN DAY TO DAY LIFE
AND TO INDUSTRY
1. Examine the different networking technologies and applications that you are using
during this covid lockdown? In what ways it supports you. (K4, CO1)
2. Explore the networking resources available at your home and at your college?
(K3,CO2)
3. Summarize the role of system administrator for both the cases. (K2,CO2)
https://www.youtube.com/watch?v=KEG_sQrXtzE
https://www.youtube.com/watch?v=LhzF-Y8xXBc
Contents beyond the Syllabus
https://www.youtube.com/watch?v=BiYRaxKPnFY&feature=youtu.be
Assessment Schedule
• Tentative schedule for the Assessment During
2022-2023 odd semester
Name of the
S.NO Start Date End Date Portion
Assessment
114
Prescribed Text Books & Reference Books
TEXT BOOK
Data Communications and Networking, Behrouz A. Forouzan, McGraw Hill Education,
5th Ed., 2017.
REFERENCES
1. Computer Networking- A Top Down Approach, James F. Kurose, University of
Massachusetts and Amherst Keith Ross, 8th Edition, 2021.
2. Computer Networks, Andrew S. Tanenbaum, Sixth Edition, Pearson, 2021.
3. Data Communications and Computer Networks, P.C. Gupta, Prentice-Hall of
India, 2006.
4. Computer Networks: A Systems Approach , L. L. Peterson and B. S. Davie,
Morgan Kaufmann, 3rd ed., 2003.
Thank you
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.