Network Baiscs
Network Baiscs
Network Baiscs
UNIT – I:
Introduction to network:
Network Meaning: A network is two or more computers (or other electronic devices)
that are connected together, usually by cables, telephone lines, radio waves, satellites,
or infrared light beams or Wi-Fi. Some computer networks will have a server. A web
server stores and shares websites. A network consists of two or more computers that
are linked in order to share resources (such as printers and CDs), exchange files, or
allow electronic communications.
Uses of Network:
● A network allows sharing of files, data, and other types of information giving
authorized users the ability to access information stored on other computers on
the network.
● Distributed computing uses computing resources across a network to
accomplish tasks.
● Sharing files.
● Downtime: How much time does your network to recover from incidents?
How does it graph over time?
● Failure Frequency: This is the frequency with which your network fails to act or
respond the way it is designed to.
Types of connections:
A computer network is a connection between two or more network devices, like
computers, routers, and switches, to share network resources.
LAN
Ethernet is the foundation of all existing LANs, whether wired or wireless.
Computers and servers can connect via cables or wirelessly. WiFi Access Points
provide wireless connectivity in combination with a wired network. WAP-enabled
devices serve as a link between PCs and networks. A WAP may connect a hundred or
even a thousand wireless individuals to a network. Servers on a LAN are generally
connected by wire.
MAN
A metropolitan area network combines many LANs with a fiber optic as the basis. It
offers services akin to those offered by an internet service provider for broad area
networks. MANs can use microwave or infrared lasers to connect Local Area
Networks wirelessly. MANs are often owned by just one significant organization and
are mainly created for towns or cities to give a high data connection.
WAN
Users and computers in one area may interact with users and computers in other
locations via a WAN, composed of two or more interconnected Local Area Networks
or Metropolitan Area Networks. Computers in a Wide Area Network are linked by
public networks such as phone lines, satellite connections, or leased lines. To extend
the network's capabilities across locations, costly leased lines are usually used to build
WANs. At each end of a leased line, a router is attached.
Point – to – point:
Point-to-point networks are used to connect two locations together via a private,
dedicated line. This allows companies to transfer data between multiple buildings (for
example) without the security risks of data being intercepted associated with a public
internet connection.
Definition of Point-to-Point Connection
The point-to-point is a kind of line configuration which describes the method to
connect two communication devices in a link. The point-to-point connection is a
unicast connection. There is a dedicated link between an individual pair of sender and
receiver. The capacity of the entire channel is reserved only for the transmission of
the packet between the sender and receiver.
If the network is made up of point-to-point connections, then the packet will have to
travel through many intermediate devices. The link between the multiple intermediate
devices may be of different length. So, in point-to-point network finding the smallest
distance to reach the receiver is most important.
● A Point to Point Network is a private data connection securely connecting two
or more locations for private data services.
● A point to point network is a closed network data transport service which does
not traverse the public Internet and is inherently secure with no data encryption
needed.
● Point to Point links are used by businesses to provide reliable, secure point to
point network data service for applications including credit card processing, file
sharing, data backup, VOIP, and video conferencing.
● A point to point network can also be configured to carry voice, video, Internet,
and data services together over the same point to point connection. Point to
Point circuits are also known as a Point to Point Link, Wavelength, Private
Line, Leased Line, or Data Line.
In the fig above, you can see that the five workstations share the common link
between the main frame and the workstations. The multipoint networks are also
called “Broadcast network”.
In a broadcast network, the packet transmitted by the sender is received and
processed by every device on the link. But, by the address field in the packet, the
receiver determines whether the packet belongs to it or not, if not, it discards the
packet. If packet belongs to the receiver then keeps the packet and respond to the
sender accordingly.
Difference Between Point-to-point and Multipoint Connection:
The point-to-point and Multipoint are two types of line configuration. Both of them
describes a method to connect two or more communication devices in a link. The
main difference between point-to-point and multipoint connection is that in a point-
to-point connection the link is only between two devices i.e. a sender and a receiver.
On the other hand, in a multipoint connection, the link is between a sender and
multiple receivers.
Comparison Chart
BASIS FOR
POINT-TO-POINT MULTIPOINT
COMPARISON
Link There is dedicated link The link is shared between more
between two devices. than two devices.
Channel Capacity The channel's entire The channel's capacity is shared
capacity is reserved for the temporarily among the devices
two connected devices. connected to the link.
Transmitter and There is a single There is a single transmitter and
Receiver transmitter and a single multiple receivers.
receiver.
Example Frame relay, T-carrier, Frame relay, token ring, Ethernet,
X.25, etc. ATM, etc.
Key Differences Between Point-to-Point and Multipoint Connection
1. When there is a single dedicated link only between two devices, it is a point-to-
point connection whereas, if a single link is shared by more than two devices
then it is said to be a multipoint connection.
2. In multipoint connection, the channel capacity is shared temporarily by the
devices in connection. On the other hand, in a point-to-point connection, the
entire channel capacity is reserved only for the two devices in the connection.
3. In point-to-point connection, there can only be a single transmitter and a single
receiver. On the other hand, in multipoint connection,
Similarities
The point-to-point and multipoint both are the types of line configuration, that refers
the technique to connect two or more communication devices.
Uses of Network:
A computer network refers to a group of two or more computing devices that are
connected by a communication medium allowing the computers to communicate
electronically. A computing device on a network is usually referred to as a node, being
connected to one another, it allows nodes to exchange data with one another using a
connection media between them. The links can be established either over cable media
such as wires or via a wireless media such as Wi-Fi.
The following are reasons for using networks:
1. COMMUNICATION
Everything, from the world wide web to online banking to multiplayer computer
games, depends on the ability of computers to communicate. However, it is not just
computers that communicate with each other, computer and telecommunication
networks also connect people. Whether this is through video calls on a smartphone,
emails from your computer, instant messaging services or social networks, computer
networks allow people from across the world to easily communicate with one another.
2. ACCESSING RESOURCES
Networks allow computers to share and access resources with other computing
devices connected to it.
● Data and information: Networks allow computers to share data and
information. This can most easily be seen on the internet, where websites like
Wikipedia share information on millions of different topics, but is also true for
smaller home and business networks.
● Printers and scanners: Hardware devices like printers and scanners are not
used that frequently by any single computer. A network allows several people to be
connected to one printer or scanner, thus making optimal use of these resources.
● Software: Networks also allow people and computers to share software.
Online applications like Office 365 and Google docs are examples of applications
installed on only a few servers and shared by people around the world.
● Labour and money: Resources are not just restricted to computer resources
but can also extend to real world resources like people and money. By seeking
advice on the internet, you can gain access to experts from all over the world who
can help you to resolve an issue you may be experiencing. Banking sites, investment
sites and crowdfunding sites like GoFundMe.com gives you access to information
on how to access funding and fundraising opportunities.
● Other hardware resources: Equipment such as portable disk drives, portable
DVD drives, and plotters can be shared amongst many users on a network.
3. CENTRALISATION OF DATA
Data can be stored on one server instead of several devices. For example, on a small
home network, all the data can be centralised by using a server. By doing this, anyone
with access to the network can work with the data stored on the central server
without needing to connect several external hard drives or flash drives to a computer.
4. TRANSFER OF FILES
One way in which data and information can be shared on a network is by sharing
files. By sharing files, you allow users connected to the same network (whether that is
a local network or the internet) to gain access to specific files.
Files can be shared in several different ways. These include:
● using the operating system’s file sharing utility
● using file sharing websites like Google Drive, One Drive and Dropbox.
Most of these services not only allow you to share files, but also give you the option
to limit how these files are used. For example, you may want to share the files for a
group project in such a way that all the group members can amend them. In contrast,
you may not want group members to change the details of, for example, a shared
birthday invitation, so the invitation can be shared using the View only option.
5. INCREASED PRODUCTIVITY
The use of networks allow most people to work and study more productively. This is
achieved by allowing people to:
● collaborate more easily.
● share files, thereby preventing work from being duplicated.
● multimedia
● books
Types of Networks
(i) PAN (Personal Area Network) (ii)LAN (Local Area Network)
(iii) MAN (Metropolitan Area Network) (iv) WAN (Wide Area Network)
Local Area Network (LAN):
The Local Area Network (LAN) is designed to connect multiple network devices and
systems within a limited geographical distance. The devices are connected using
multiple protocols for properly and efficiently exchanging data and services.
Attributes of LAN Network:
● The data transmit speed in the LAN network is relatively higher than the other
network types, MAN and WAN.
● LAN uses private network addresses for network connectivity for data and service
exchange, and it uses cable for network connection, decreasing error and
maintaining data security.
Advantages and Disadvantages of LAN Network
Advantages Disadvantages
The Network Server acts as a central unit for the Probability of leak of sensitive
whole network. data by LAN administration.
● Data transmission speed is relatively high due to the installation of optical cables
and wired connections.
Advantages and Disadvantages of MAN Network:
Advantages Disadvantages
Advantages Disadvantages
They also use radio towers and connect channels for It is difficult to prevent hacking
users. and debug a large network.
Several computers
The WAN
LAN is a network that enables can be connected
network
the communication between to MAN in the
extends to a
many linked devices. It is in same city or
much greater
Meaning charge of establishing separately. It
area. It can link
connections among encompasses a
multiple
neighborhood units, including greater region,
countries
universities and schools. including minor
together.
towns and cities.
MAN can be
A single
either public or
company may
LAN is a private and secured private. A lot of
Network not own WAN.
network. Hospitals, schools, businesses and
Authority It can be
offices, etc., can own it. telephone
private or
companies could
public.
own them.
MAN's
WAN
maintenance is
Maintenance LAN maintenance is very easy. maintenance is
easier compared
very difficult.
to LAN.
WAN
The bandwidth in LAN is very In MAN,
Bandwidth bandwidth is
high. bandwidth is less.
quite limited.
It isn't easy to It is
It is very easy to design a LAN
Designing design a MAN complicated to
network.
network. design WAN.
UNIT – III:
Reference Models:
In computer networks, reference models give a conceptual framework that
standardizes communication between heterogeneous networks.
The two popular reference models are
● OSI Model
OSI Model
OSI or Open System Interconnection model was developed by International
Standards Organization (ISO). It gives a layered networking framework that
conceptualizes how communication should be done between heterogeneous systems.
It has seven interconnected layers.
The seven layers of the OSI Model are aphysical layer, data link layer, network layer, transport l
The four layers are application layer, transport layer, internet layer and network access layer, as
OSI Reference Model:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework
used to describe the functions of a networking system. The OSI model characterizes
computing functions into a universal set of rules and requirements in order to support
interoperability between different products and software. In the OSI reference model,
the communications between a computing system are split into seven different
abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation,
and Application.
The 7 Layers of the OSI Model
1. Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically
transmitting raw unstructured data bits across the network from the physical layer of
the sending device to the physical layer of the receiving device. It can include
specifications such as voltages, pin layout, cabling, and radio frequencies. At the
physical layer, one might find “physical” resources such as network hubs, cabling,
repeaters, network adapters or modems.
2. Data Link Layer
At the data link layer, directly connected nodes are used to perform node-to-node
data transfer where data is packaged into frames. The data link layer also corrects
errors that may have occurred at the physical layer.
The data link layer encompasses two sub-layers of its own. The first, media access
control (MAC), provides flow control and multiplexing for device transmissions over
a network. The second, the logical link control (LLC), provides flow and error control
over the physical medium as well as identifies line protocols.
3. Network Layer
The network layer is responsible for receiving frames from the data link layer, and
delivering them to their intended destinations among based on the addresses
contained inside the frame. The network layer finds the destination by using logical
addresses, such as IP (internet protocol). At this layer, routers are a crucial component
used to quite literally route information where it needs to go between networks.
4. Transport Layer
The transport layer manages the delivery and error checking of data packets. It
regulates the size, sequencing, and ultimately the transfer of data between systems and
hosts. One of the most common examples of the transport layer is TCP or the
Transmission Control Protocol.
5. Session Layer
The session layer controls the conversations between different computers. A session
or connection between machines is set up, managed, and termined at layer 5. Session
layer services also include authentication and reconnections.
6. Presentation Layer
The presentation layer formats or translates data for the application layer based on the
syntax or semantics that the application accepts. Because of this, it at times also called
the syntax layer. This layer can also handle the encryption and decryption required by
the application layer.
7. Application Layer
At this layer, both the end user and the application layer interact directly with the
software application. This layer sees network services provided to end-user
applications such as a web browser or Office 365. The application layer identifies
communication partners, resource availability, and synchronizes communication.
Transmission Control Protocol / Internet Protocol:
Transmission Control Protocol:
⮚ Transmission Control Protocol (TCP) is a communications standard that
enables application programs and computing devices to exchange messages
over a network. It is designed to send packets across the internet and ensure
the successful delivery of data and messages over networks.
⮚ TCP is one of the basic standards that define the rules of the internet and is
included within the standards defined by the Internet Engineering Task Force
(IETF). It is one of the most commonly used protocols within digital network
communications and ensures end-to-end data delivery.
⮚ TCP organizes data so that it can be transmitted between a server and a client.
It guarantees the integrity of the data being communicated over a network.
Before it transmits data, TCP establishes a connection between a source and its
destination, which it ensures remains live until communication begins. It then
breaks large amounts of data into smaller packets, while ensuring data integrity
is in place throughout the process.
As a result, high-level protocols that need to transmit data all use TCP Protocol.
Examples include peer-to-peer sharing methods like File Transfer Protocol (FTP),
Secure Shell (SSH), and Telnet. It is also used to send and receive email through
Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and Simple
Mail Transfer Protocol (SMTP), and for web access through the Hypertext Transfer
Protocol (HTTP):
An alternative to TCP in networking is the User Datagram Protocol (UDP), which is
used to establish low-latency connections between applications and decrease
transmissions time. TCP can be an expensive network tool as it includes absent or
corrupted packets and protects data delivery with controls like acknowledgments,
connection startup, and flow control.
UDP does not provide error connection or packet sequencing nor does it signal a
destination before it delivers data, which makes it less reliable but less expensive. As
such, it is a good option for time-sensitive situations, such as Domain Name System
(DNS) lookup, Voice over Internet Protocol (VoIP), and streaming media.
Internet Protocol (IP):
The Internet Protocol (IP) is the method for sending data from one device to another
across the internet. Every device has an IP address that uniquely identifies it and
enables it to communicate with and exchange data with other devices connected to
the internet. Today, it’s considered the standard for fast and secure communication
directly between mobile devices.
IP is responsible for defining how applications and devices exchange packets of data
with each other. It is the principal communications protocol responsible for the
formats and rules for exchanging data and messages between computers on a single
network or several internet-connected networks. It does this through the Internet
Protocol Suite (TCP/IP), a group of communications protocols that are split into four
abstraction layers.
IP is the main protocol within the internet layer of the TCP/IP. Its main purpose is to
deliver data packets between the source application or device and the destination
using methods and structures that place tags, such as address information, within data
packets.
UNIT – IV:
Packet Transmission – Concept of Packet:
In networking, a packet is a small segment of a larger message. Data sent over
computer networks*, such as the Internet, is divided into packets. These packets are
then recombined by the computer or device that receives them.
Packet switching is the transfer of small pieces of data across various networks. These
data chunks or “packets” allow for faster, more efficient data transfer. Often, when a
user sends a file across a network, it gets transferred in smaller data packets, not in
one piece.
For example, a 3MB file will be divided into packets, each with a packet header that
includes the origin IP address, the destination IP address, the number of packets in
the entire data file, and the sequence number.
Types of Packet Switching:
There are two major types of packet switching:
(i)Connectionless Packet Switching: This classic type of packet switching includes
multiple packets, each individually routed. This means each packet contains complete
routing information—but it also means different paths of transmission and out-of-
order delivery are possible, depending on the fluctuating loads on the network’s nodes
(adapters, switches and routers) at the moment. This kind of packet switching is
sometimes called datagram switching.
Each packet in connectionless packet switching includes the following information in
its header section:
● Source address
● Destination address
Once the packets reach their destination via various routes, the receiving devices
rearrange them to form the original message.
(ii) Connection-Oriented Packet Switching: In connection-oriented packet switching,
also called virtual circuit switching or circuit switching, data packets are first
assembled and then numbered. They then travel across a predefined route,
sequentially. Address information is not needed in circuit switching, because all
packets are sent in sequence.
Packet Loss:
Occasionally, packets might bounce from router to router many times before reaching
their destination IP address. Enough of these kinds of “lost” data packets in the
network can congest it, leading to poor performance. Data packets that bounce
around in the network too many times may get lost.
The hop count addresses this problem, setting a maximum number of bounce times
per packet. “Bouncing” simply refers to the inability to locate the final destination IP
address, and the resulting transfer from one router to another instead. If a certain
packet reaches its maximum hop count, or maximum number of hops it is permitted
before reaching its destination, the router it is bouncing from deletes it. This causes
packet loss.
Circuit Switching vs Packet Switching:
Packet switching and circuit switching are the primary models for facilitating
enterprise network connections. Each mode has its place, depending on the facts and
user needs.
Circuit switching is most often used for voice and video calling systems—
communications systems that require that users establish a dedicated circuit or
channel before they can connect. A circuit switching channel is always reserved, and is
in use only when the users are communicating.
Circuit switching connections might allocate one or two channels for
communications. Those with one channel are called half duplex. Those with two
channels are full duplex.
Circuit switching is different from packet switching because it creates a physical path
between the destination and source. There is no physical path in packet switching,
which instead sends packets over a variety of routes.
Advantages of Packet Switching over Circuit Switching:
Advantages of Packet Switching over Circuit Switching:
a) Efficiency. Improved efficiency means less network bandwidth wastage. No need
to reserve the circuit even when it’s not in use means the system is more efficient. A
constantly reserved circuit results in wasted network bandwidth, so network efficiency
tends to increase with the use of packet switching.
b) Speed. Optimal transmission speed, minimal latency.
c) Improved fault tolerance. During partial outages or other network problem
times, packets can be rerouted and follow different paths. Using a circuit switching
network, a single outage can down the designated pathway for the communications.
d) Budget. Comparatively cost-effective and simple to implement. Packet switching
typically also bills based only on duration of connectivity, whereas circuit switching
bills on both duration of connection and distance.
e) Digital. Packet switching works well for data communication, transmitting digital
data directly to its destination. Data transmissions are generally high quality in a
packet switched network because such a network employs error detection and checks
data distribution with the goal of error free transmissions.
Disadvantages of Packet Switching over Circuit Switching:
f) Reliability. The packet switching process is reliable in that the destination can
identify any missing packets. However, circuit switched networks deliver packets in
order along the same route and are therefore less likely to experience missing packets
in the first place.
g) Complexity. Packet switching protocols are complex, so switching nodes demand
more processing power and a large amount of RAM.
h) File size. Packet switching is more useful for small messages, while circuit
switching is best for larger transmissions. This is due to multiple rerouting delays, the
risk of multiple lost packets, and other issues.
Cell Switching vs Packet Switching
Cell switching, or cell relay, uses a circuit switching network and has features of circuit
switching. The primary difference is that in packet switching technology, the packets
are of variable lengths, but in cell switching, packets are a fixed length of 53 bytes with
a 5 byte header.
Advantages of cell switching include dynamic bandwidth, high performance,
scalability, and the ability to use common LAN/WAN architecture multimedia
support. Cell switching achieves high performance using hardware switches. There is
no need to reserve resources in computer networks for a connection since the
technology uses virtual rather than physical circuits. And after establishing a virtual
circuit, you can achieve higher network throughputs thanks to minimized switching
time.
Conclusion:
A packet switched network follows networking protocols that divide messages into
packets before sending them. Packet-switching technologies are part of the basis for
most modern Wide Area Network (WAN) protocols, including Frame Relay, X.25,
and TCP/IP.
Compare this to standard telephone network landline service, which is based on
circuit switching technology. Circuit switching networks are ideal for most real-time
data, transmission, while packet switching networks are both effective and more
efficient for data that can tolerate some transmission delays, such as site data and e-
mail messages.
Packet & Hardware frames:
The following are some of the benefits of using packets:
● Different paths can be used to route packets to their destination. This process is
known as packet switching.
● If an error occurs, the packets can be stored and retransmitted later.
● Packets use the best route available for delivery. This enables them to be routed
across congested parts of the network without slowing them down in a specific
spot.
● To ensure secure delivery, packets can be encrypted.
Network packets are similar in function to a postal package. A network packet or unit
of data goes through the process of encapsulation, which adds information to it as it
travels toward its destination and marks where it begins and ends.
A network packet is made up of the following three parts:
1. Packet header. The header is the beginning or front part of a packet. Any
processing or receiving device, such as a router or a switch, sees the header first.
The following 13 fields are included in an IPv4 protocol header:
o Version. This field indicates the format of the internet header.
o Internet header length (IHL). IHL is the length of the internet header in 32-
bit words that points to the beginning of the data.
o Type of service. This indicates the abstract parameters of the quality of
service desired.
o Total length. This is the length of the datagram measured in octets that
includes the internet header and data. This field allows the length of a datagram
to be up to 65,535 octets.
o Identification. The sender assigns an identifying value to aid in assembling the
fragments of a datagram.
o Flags. These are various control flags.
o Fragment offset. This field indicates where in the datagram this fragment
belongs. The fragment offset is measured in units of eight octets, or 64 bits.
The first fragment has offset zero.
o Time to live (TTL). The TTL field indicates the maximum time the datagram
is allowed to remain in the internet system. If this field contains the value of
zero, then the datagram must be destroyed.
o Protocol. This field indicates the next-level protocol used in the data portion
of the internet datagram.
o Header checksum. A checksum detects corruption in the header of the IPv4
packets.
o Source address. This is the 32-bit source IP address.
o Destination address. This is the 32-bit destination IP address.
o Options. This field is optional, and its length can be variable. A source route
option is one example, where the sender requests a certain routing path. If an
option is not 32 bits in length, it uses padding options in the remaining bits to
make the header an integral number of 4-byte blocks.
2. Payload. This is the actual data information the packet carries to its destination.
The IPv4 payload is padded with zero bits to ensure that the packet ends on a 32-
bit boundary.
3. Trailer. Sometimes, certain network protocols also attach an end part or trailer to
the packet. An IP packet doesn't contain trailers, but Ethernet frames do.
Hardware Frames:
A frame is a digital data transmission unit in computer
networking and telecommunication. In packet switched systems, a frame is a simple
container for a single network packet. In other telecommunications systems, a frame
is a repeating structure supporting time-division multiplexing.
A frame typically includes frame synchronization features consisting of a sequence of
bits or symbols that indicate to the receiver the beginning and end of the payload
data within the stream of symbols or bits it receives. If a receiver is connected to the
system during frame transmission, it ignores the data until it detects a new frame
synchronization sequence.
A frame is the data unit for the data link layer, whereas a packet is the transmission
unit of the network layer. Hence, we associate frames to physical addresses while we
link packets to logical addresses. In short, a frame and a packet differ in how they
encapsulate the data payload.
Transmission Errors:
Transmission errors include consistency problems within communication
components that can occur during Process execution. The errors can occur within
communication components such as VTAM, IBM® Network Control Program
(NCP), or links.
Types of errors in computer network:
Single-bit error, multiple-bit error, and burst error are the types of error. Simple Parity
check, Two-dimensional Parity check, Checksum, and Cyclic redundancy check are
error detection methods. When the data is sent from the sender side to the receiver's
side it needs to be detected and corrected.
Computer networks are the backbone of communication systems by which data and
information can be exchanged between multiple communicating devices and users. In
modern days, computer networks are essential for daily work life real-time video
streaming, online gaming, various communicative applications, etc. However, there
are many types of errors present in computer networks which can lead to restricted
communication, and delay in packet transmission that produces glitches in videos and
distorts the audio in real-time applications. In this article, we will discuss various types
of errors in computer networks with their cause and countermeasures.
Common Network Problems
There are basically 5 ways through which errors occurred during transmission that are
mentioned below.
1. Transmission Error
During the data transmission phase, data may be transmitted inaccurately due to many
reasons like external electromagnetic interference, interrupted/degraded signal faulty
hardware, etc. This leads to loss of data or corrupted data packets and inconsistency
in data packet arrivals which triggers non-reliable data communication. This type of
mis-transmission of data is called Transmission error. Transmission errors can easily
resolved by using error detection and correction mechanisms(CRC, checksums etc.),
and high-quality networking equipment and data cables can reduce this error.
2. Data Packet Loss
Data packets can be lost during data transmission due to the presence of errors in
routing protocols, highly congested networks, or may be for faulty networking
devices. Data packet losses can lead to back-to-back packet retransmission which
results in delay in next packet arrival and reduced network performance. During real-
time communication, data-packet loss may badly affect the live streaming with
distorted audio and videos with glitches. Countermeasures involve implementing
forward error correction and congestion control technique reduces packet loss. Also,
it is required to ensure that all networking devices are up-to-date and these devices are
using optimized network configurations as per requirements.
3. Network Latency
If one of the two communicating devices uses high latency but another one is running
at low latency then the delay may occur during data transmission which is called
a network latency problem. It can be a consequence of high network congestion and
different processing power of two communicating devices which leads to processing
delays. The latency problem can directly effect real-time applications like online
gaming and video conferencing. In modern technology, this problem can be easily
solved by only implementing Quality of Service(QoS) techniques. Also, increasing the
network bandwidth, optimizing network routing protocols, and utilizing a caching
system can reduce this problem.
4. Configuration Errors
Misconfigured or pirated software faces configuration errors which results in
inaccurate network operations. Configuration errors may lead to security
vulnerabilities(mainly unauthorized access), instability in network connectivity, and
incorrect packet routing which results in communication failures.
5. Hardware Failures
Using very old and unmaintained network devices(switches, routers etc.), no backups
for power-cuts or manufacturing defect lead to hardware failure. This results network
outages, high downtime, restricted productivity for business farms or users and loss of
data if no backup taken. This problem can be handled by performing regular
maintenance of networking devices, preparing alternative device if possible, taking
data backups and disaster management tools to minimize the data loss and downtime
and it is also required to replace the aged hardware in time.
Types of Errors in Computer Network
1. Single-Bit Error
It is nothing but a special type of transmission error. During transmission of data
packets from one networking device to another, if only one bit from this whole data
packet is being changed/corrupted/altered then Single-bit transmission error occurs.
This single bit corruption can be occurred due to induced noise in data transmission
cable or presence of electromagnetic interference.
The word single-bit error can lead to be sound a very simple and harmless but in
reality single-bit errors can corrupt the whole data and the receiver may get fully
incorrect data when they decode it. Also a very worthy error detection mechanism is
required to detect it as the error is truly very small but results high data damage. For
example say one sender sent a data packet to a receiver and the data packet is 0111.
And during transmission single-bit error occurred and receiver receives 0011 instead
0111 i.e. only one bit is flipped. Now let receiver will decode it to decimal and so
receiver will get 3(0011) instead of the correct data 7(0111). So, when this data is used
for complex logic a huge data corruption will occur. Countermeasures involve
implementing error detection and correction methods like CRC, parity bits etc.
2. Burst Error
Similarly it is one kind of Transmission error and very likely to single bit error. But in
Burst error, multiple data bits of a data packets are being changed/corrupted/ altered
during transmission. And these multibit corruption occurs in a very short period so it
is called ‘Burst’. Communication line interference, impulsive noise are the main
factors which lead to burst error. As multiple bit are being corrupted so it can fully
corrupt a data packet and making it fully valueless. Burst errors can be rectified by
retransmission but it consumes additional network resources and burst error can
occur in that also. So, we need to implement robust error detection and correction
techniques like Reed-Solomon codes or convolutional codes. These algorithms adds
redundancy bits of data so that the receiver can reconstruct the original data from that
if burst error occurred. For example the sender sends a data block of 110001 and
receiver receives 101101. Here, we can see that in a single instance total 3bits of data
corrupted i.e. burst error occurred.
Difference Between Single Bit Error and Burst Error in Computer Network
Only one bit of a data packet is Multiple bits of a data packet is being corrupted in
altered or corrupted. a very short period of time(bursting).
Minor data corruption and easy High data corruption(Clustered errors) and hard
to restore the original. This to detect and restore to original. Robust coding
error can be handled using required like Reed-Solomon codes or
CRC, parity bit etc. convolutional codes.
As only one bit is altered so it is In a short sequence multiple bits are altered so it is
easy to correct the wrong hard to correct and may lead to entire corruption
sequence. of data packet.
Detecting Errors:
To detect errors, a common technique is to introduce redundancy bits that provide
additional information. Various techniques for error detection include::
1. Simple Parity Check
2. Two-dimensional Parity Check
3. Checksum
4. Cyclic Redundancy Check (CRC)
Error Detection Methods:
(i) Simple Parity Check
Simple-bit parity is a simple error detection method that involves adding an
extra bit to a data transmission. It works as:
● 1 is added to the block if it contains an odd number of 1’s, and
This scheme makes the total number of 1’s even, that is why it is called even parity
checking.
Disadvantages
● Single Parity check is not able to detect even no. of bit error.
(iii) Checksum
Checksum error detection is a method used to identify errors in transmitted data. The
process involves dividing the data into equally sized segments and using a 1’s
complement to calculate the sum of these segments. The calculated sum is then sent
along with the data to the receiver. At the receiver’s end, the same process is repeated
and if all zeroes are obtained in the sum, it means that the data is correct.
Checksum – Operation at Sender’s Side
● Firstly, the data is divided into k segments each of m bits.
● On the sender’s end, the segments are added using 1’s complement arithmetic to
get the sum. The sum is complemented to get the checksum.
● The checksum segment is sent along with the data segments.
● Availability implies that networks, end systems like databases, and applications
must be survivable and fault tolerant.
● Modification of messages
● Repudiation
● Replay
● Denial of Service
Masquerade –
Masquerade is a type of cybersecurity attack in which an attacker pretends to be
someone else in order to gain access to systems or data. This can involve
impersonating a legitimate user or system to trick other users or systems into
providing sensitive information or granting access to restricted areas.
There are several types of masquerade attacks, including:
Username and password masquerade: In a username and password masquerade
attack, an attacker uses stolen or forged credentials to log into a system or
application as a legitimate user.
IP address masquerade: In an IP address masquerade attack, an attacker spoofs
or forges their IP address to make it appear as though they are accessing a
system or application from a trusted source.
Website masquerade: In a website masquerade attack, an attacker creates a fake
website that appears to be legitimate in order to trick users into providing
sensitive information or downloading malware.
Email masquerade: In an email masquerade attack, an attacker sends an email that
appears to be from a trusted source, such as a bank or government agency, in
order to trick the recipient into providing sensitive information or downloading
malware.
Email masquerade: In an email masquerade attack, an attacker sends an email that
appears to be from a trusted source, such as a bank or government agency, in
order to trick the recipient into providing sensitive information or downloading
malware.
Masquerade Attack
Modification of messages –
It means that some portion of a message is altered or that message is delayed or
reordered to produce an unauthorized effect. Modification is an attack on the integrity
of the original data. It basically means that unauthorized parties not only gain access
to data but also spoof the data by triggering denial-of-service attacks, such as altering
transmitted data packets or flooding the network with fake data. Manufacturing is an
attack on authentication. For example, a message meaning “Allow JOHN to read
confidential file X” is modified as “Allow Smith to read confidential file X”.
Modification of messages
Repudiation –
Repudiation attacks are a type of cybersecurity attack in which an attacker attempts to
deny or repudiate actions that they have taken, such as making a transaction or
sending a message. These attacks can be a serious problem because they can make it
difficult to track down the source of the attack or determine who is responsible for a
particular action.
There are several types of repudiation attacks, including:
Message repudiation attacks: In a message repudiation attack, an attacker sends a
message and then later denies having sent it. This can be done by using spoofed or
falsified headers or by exploiting vulnerabilities in the messaging system.
Transaction repudiation attacks: In a transaction repudiation attack, an attacker
makes a transaction, such as a financial transaction, and then later denies having
made it. This can be done by exploiting vulnerabilities in the transaction processing
system or by using stolen or falsified credentials.
Data repudiation attacks: In a data repudiation attack, an attacker modifies or
deletes data and then later denies having done so. This can be done by exploiting
vulnerabilities in the data storage system or by using stolen or falsified credentials.
Replay –
It involves the passive capture of a message and its subsequent transmission to
produce an authorized effect. In this attack, the basic aim of the attacker is to save a
copy of the data originally present on that particular network and later on use this data
for personal uses. Once the data is corrupted or leaked it is insecure and unsafe for
the users.
Replay
Denial of Service –
Denial of Service (DoS) is a type of cybersecurity attack that is designed to make a
system or network unavailable to its intended users by overwhelming it with traffic or
requests. In a DoS attack, an attacker floods a target system or network with traffic or
requests in order to consume its resources, such as bandwidth, CPU cycles, or
memory, and prevent legitimate users from accessing it.
There are several types of DoS attacks, including:
Flood attacks: In a flood attack, an attacker sends a large number of packets or
requests to a target system or network in order to overwhelm its resources.
Amplification attacks: In an amplification attack, an attacker uses a third-party
system or network to amplify their attack traffic and direct it towards the target
system or network, making the attack more effective.
To prevent DoS attacks, organizations can implement several measures, such
as:
1.Using firewalls and intrusion detection systems to monitor network traffic and
block suspicious activity.
2.Limiting the number of requests or connections that can be made to a system or
network.
3.Using load balancers and distributed systems to distribute traffic across multiple
servers or networks.
4.Implementing network segmentation and access controls to limit the impact of a
DoS attack.
Denial of Service
Passive attacks:
A Passive attack attempts to learn or make use of information from the system but
does not affect system resources. Passive Attacks are in the nature of eavesdropping
on or monitoring transmission. The goal of the opponent is to obtain information
that is being transmitted. Passive attacks involve an attacker passively monitoring or
collecting data without altering or destroying it.
Examples of passive attacks include eavesdropping, where an attacker listens in on
network traffic to collect sensitive information, and sniffing, where an attacker
captures and analyzes data packets to steal sensitive information.
Types of Passive attacks are as follows:
● The release of message content
● Traffic analysis
Traffic analysis
**************