Computer networrs (VTU 22-scheme) first module full PPT.

lakshmiuma91 1,115 views 126 slides Oct 02, 2024
Slide 1
Slide 1 of 126
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126

About This Presentation

Computer networks (VTU 22-scheme) first module full PPT.


Slide Content

COMPUTER NETWORKS (BCS502) Swathy J Asst. Professor CSE Cambridge Institute of Technology

Textbook Behrouz A. Forouzan , Data Communications and Networking, 5th Edition , Tata McGraw-Hill,2013 Reference Books: 1. Larry L. Peterson and Bruce S. Davie : Computer Networks – A Systems Approach, 4th Edition , Elsevier, 2019. 2. Nader F. Mir: Computer and Communication Networks, 2nd Edition , Pearson Education, 2015. 3. William Stallings, Data and Computer Communication 10th Edition , Pearson Education, Inc., 2014

Module 1

Data Communications Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable Four fundamental characteristics of Data Communication are: 1. Delivery: The system must deliver data to the correct destination. 2. Accuracy: The system must deliver the data accurately. 3. Timeliness: The system must deliver data in a timely manner. Data delivered late are useless. In the case of video and audio, timely delivery means delivering data as they are produced, in the same order that they are produced, and without significant delay. This kind of delivery is called real-time transmission. 4. Jitter: Jitter refers to the variation in the packet arrival time. For example, let us assume that video packets are sent every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an uneven quality in the video is the result .

Data Communications- Components

Data Communications- Components(Contd...) Message: The message is the information (data) to be communicated. Popular forms of information include text, numbers, audio, and video. Sender: The sender is the device that sends the data message. It can be a computer, workstation etc Receiver: The receiver is the device that receives the message. It can be a computer, workstation etc. Transmission medium: The transmission medium is the physical path by which a message travels from sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves . Protocol: A protocol is a set of rules that govern data communications. Without a protocol, two devices may be connected but not communicating

Data Communications- Data Representation Text: Text is represented as a bit pattern , a sequence of bits (0s or 1s) Different sets of bit patterns have been designed to represent text symbols. Each set is called a code, and the process of representing symbols is called coding. 2. Numbers: Numbers are also represented by bit patterns and the number is directly converted to a binary number .

Data Communications- Data Representation 3. Images: Images are also represented by bit patterns In its simplest form, an image is composed of a matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel depends on the resolution After an image is divided into pixels, each pixel is assigned a bit pattern. If the image made only on black and-white dots (0 or 1) In the case of Gray scale black pixel - 00 dark gray pixel- 01 light gray pixel- 10 white pixel -11

Data Communications- Data Representation RGB : Each color is made of a combination of three primary colors: red, green, and blue YCM : color is made of a combination of three other primary colors: yellow, cyan, and magenta 4. Video: Video refers to the recording or broadcasting of a picture or movie It may be a continuous entity or combination of images, arranged to convey the idea of motion 5 . Audio : Audio refers to the recording or broadcasting of sound or music. It is continuous, not discrete

Data Communications-Data Flow Simplex : Half-duplex

Data Communications-Data Flow Full duplex

NETWORKS A network is the interconnection of a set of devices capable of communication Device can be a host or node : large computer, desktop, laptop, workstation, cellular phone, or security system etc

NETWORKS Connecting device : Router- which connects the network to other networks Switch- which connects devices together Modem (modulator-demodulator)- which changes the form of data Devices in a network are connected using wired or wireless transmission media such as cable or air

NETWORKS - Network Criteria A Network must be able to meet a certain number of criteria Performance It measures based on transit time and response time Performance is often evaluated by two networking metrics: throughput and delay Throughput: Number of bits transmitted in per second Delay: time taken to transmit data Reliability Reliable networking ensures that data is transmitted accurately, in order, and without errors between devices or systems. Security Protecting data from unauthorized access, protecting data from damage, development.

NETWORKS -Types of Connection Types of connection describe the way devices communicate with each other over a network Point-to-Point Multipoint or Multidrop

NETWORKS -Types of Connection Point-to-Point Multipoint or Multidrop Dedicated link between two devices The entire capacity of the channel is reserved Eg., Microwave link, TV remote control More than two devices share a single link Capacity of the channel is either Spatially shared: Devices can use the link simultaneously Timeshare: Users must take turns

NETWORKS -Physical Topology Physical Topology : Physical arrangement of devices (nodes) in a network and how they are interconnected. Four basic topologies: Mesh Topology Find the number of physical links in a fully connected mesh network with n node is n (n – 1)

Advantages: Eliminating the traffic problem Robust- A network to maintain its performance and functionality despite failures, errors, or unpredictable conditions Privacy or security Fault identification and fault isolation Disadvantages: Amount of cabling and the number of I/O ports Installation and reconnection Hardware required to connect each link is expensive NETWORKS -Physical Topology

NETWORKS -Physical Topology Star Topology A hub is a basic networking device used to connect multiple computers or devices

Advantages: less expensive than a mesh topology, easy to install and reconfigure and less cabling needed If one link fails, only that link is affected Disadvantage The dependency of the whole topology on one single point, the hub. If the hub goes down, the whole system is dead. NETWORKS -Physical Topology

Bus Topology Long cable acts as a backbone to link all the devices in a network network Traditional Ethernet LANs NETWORKS -Physical Topology

Advantages: Ease of installation , bus uses less cabling than mesh or star topologies Disadvantage Reconnection and fault isolation Fault or break in the bus cable stops all transmission The damaged area reflects signals back in the direction of origin, creating noise in both directions - cable damage leads to signal reflection because the signals are no longer properly terminated at the broken point. This reflected signal causes noise and collisions, disrupting the entire network's communication.

Ring Topology

Advantages: A ring is relatively easy to install and reconfigure To add or delete a device requires changing only two connections. Disadvantage Unidirectional traffic A break in the ring (such as a disabled station) can disable the entire network This weakness can be solved by using a dual ring or a switch capable of closing off the break

Network Types- LAN ( Local Area Network) In the past, all hosts in a network were connected through a common cable, which meant that a packet sent from one host to another was received by all hosts The intended recipient kept the packet; the others dropped the packet Most LANs use a smart connecting switch, which is able to recognize the destination address of the packet and guide the packet to its destination without sending it to all other hosts

Network Types- WAN ( Wide Area Network) WAN has a wide geographical span, spanning a town, a state, a country, or even the world WAN interconnects connecting devices such as switches, routers, or modems. WANs today: Point-to-point WANs- Establishes a dedicated and direct connection between two devices like router,switched etc Switched WANs - Uses a shared infrastructure, where multiple devices or sites are connected through switching nodes. point-to-point WAN Switched WAN

1. ‹#› Network Types- Switching Video: https://youtu.be/G7n8thqwO2c?si=iCY9Kk0ECXcPnLAc Switching refers to the process of selecting the path that data will take across a network to reach its destination A switch needs to forward data from a network to another network when required Two types of switched networks are, Circuit-Switched Network Packet-Switched Network

In a circuit-switched network, a dedicated connection, called a circuit , is always available between the two end systems; the switch can only make it active or inactive. Circuit-Switched Network Circuit switching was very common in telephone networks in the past, today we are using packet switching for telephone network

Circuit-Switched Network

In a computer network, the communication between the two ends is done in blocks of data called packets . or Packets are small units of data that are transmitted over a network A router in a packet-switched network has a queue that can store and forward the packet. Packet-Switched Network

Packet-Switched Network

1. ‹#› The Internet “Network of networks” This phrase highlights how the Internet is not a single network but a vast, interconnected system of smaller networks (like local area networks or LANs, wide area networks or WANs, and others) that work together to form a global communication infrastructure.

1. ‹#› The Internet today

Customer Networks : These are individual networks belonging to users or organizations (e.g., home users, businesses, educational institutions) . These networks rely on Internet service providers (ISPs) for access to the wider Internet 2. Provider Networks: Provider networks manage traffic between customer networks and core infrastructure like Internet backbones. 3. Backbones: The backbone represents the core infrastructure of the Internet. These are high-capacity networks that carry large amounts of traffic across long distances , such as between cities or countries. 4. Peering points are locations where different networks (such as provider networks and backbone networks) connect and exchange traffic. These points help ensure that data can flow efficiently between different networks without bottlenecks . 1. ‹#› The Internet today

Accessing the Internet The Internet today is an internetwork that allows any user to become part of it . The user, however, needs to be physically connected to an ISP. The physical connection is normally done through a point-to-point WAN. Using Telephone Networks Dial-up service: The first solution is to add to the telephone line a modem that converts data to voice. The software installed on the computer dials the ISP and imitates making a telephone connection. DSL Service (Digital Subscriber Line): Since the advent of the Internet, some telephone companies have upgraded their telephone lines to provide higher speed Internet services to residences or small businesses. 1-42

1- ‹#› Using Cable Networks More and more residents over the last two decades have begun using cable TV services instead of antennas to receive TV broadcasting The cable companies have been upgrading their cable networks and connecting to the Internet. A residence or a small business can be connected to the Internet by using this service It provides a higher speed connection, but the speed varies depending on the number of neighbors that use the same cable Using Wireless Networks With the growing wireless WAN access, a household or a small business can be connected to the Internet through a wireless WAN Accessing the Internet(Cont…)

1- ‹#› Direct Connection to the Internet A large organization or a large corporation can itself become a local ISP and be connected to the Internet This can be done if the organization or the corporation leases a high-speed WAN from a carrier provider and connects itself to a regional ISP For example, a large university with several campuses can create an internetwork and then connect the internetwork to the Internet Accessing the Internet(Cont…)

PROTOCOL LAYERING When communication is simple, we may need only one simple protocol; when the communication is complex, we may need to divide the task between different layers, in which case we need a protocol at each layer Scenarios: First Scenario:

PROTOCOL LAYERING Second Scenario :

Principles of Protocol Layering First Principle : The first principle dictates that if we want bidirectional communication, we need to make each layer so that it is able to perform two opposite tasks, one in each direction. Example: The third layer task is to listen (in one direction) and talk (in the other direction). The second layer needs to be able to encrypt and decrypt. The first layer needs to send and receive mail Second Principle : The second principle that we need to follow in protocol layering is that the two objects under each layer at both sites should be identical Example : Under layer 3 at both sites should be a plaintext letter. The object under layer 2 at both sites should be a ciphertext letter. The object under layer 1 at both sites should be a piece of mail

Logical Connections

TCP/IP PROTOCOL SUITE (Transmission Control Protocol/Internet Protocol ) It is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality Layered Architecture:

Description of Each Layer Application Layer: Communication at the application layer is between two processes (two programs running at this layer). To communicate, a process sends a request to the other process and receives a response. Process-to-process communication is the duty of the application layer. Web browser (client) communicating with a web server (server) is an example of process-to-process communication. Protocols: Hypertext Transfer Protocol (HTTP) - Accessing the World Wide Web (WWW) Simple Mail Transfer Protocol (SMTP) - Electronic mail (e-mail) service File Transfer Protocol (FTP) - Used for transferring files from one host to another Terminal Network (TELNET) and Secure Shell (SSH) - Accessing a site remotely Simple Network Man_x0002_agement Protocol (SNMP) - Used by an administrator to manage the Internet at global and local levels Domain Name System (DNS) : Used by other protocols to find the network-layer address of a computer Internet Group Management Protocol (IGMP) : Used to collect membership in a group

Description of Each Layer Transport Layer: Data-segment or a user datagram The transport layer at the source host gets the message from the application layer, encapsulates it in a transport layer packet and send

Description of Each Layer Protocol: Transmission Control Protocol (TCP) - Connection-oriented protocol that first establishes a logical connection between transport layers at two hosts before transferring data. It is a Reliable communication TCP provides : Flow control Error Control congestion control

Description of Each Layer Protocol: User Datagram Protocol (UDP) : Connectionless protocol that transmits user datagrams without first creating a logical connection UDP does not provide flow, error, or congestion control Stream Control Transmission Protocol (SCTP) Designed to respond to new applications that are emerging in the multimedia

Description of Each Layer Network Layer: (Finding Optimal Path)- Data:Fragments if the size of the packet is very large Creating a connection between the source computer and the destination computer Communication at the network layer is host-to-host Several routers from the source to the destination, the routers in the path are responsible for choosing the best route for each packet Protocols : Internet Protocol (IP) : IP is used to “address” each device in that network IP is also responsible for routing a packet from its source to its destination Internet Control Message Protocol (ICMP) : Helps IP to report some problems when routing a packet Internet Group Management Protocol (IGMP) : Helps IP in multitasking

Description of Each Layer Protocols : Dynamic Host Configuration Protocol (DHCP) : Helps IP to get the network-layer address for a host Address Resolution Protocol (ARP): Helps IP to find the MAC Address(Media Access Control ) of a host or a router Data-link Layer: The data-link layer takes a datagram and encapsulates it in a packet called a frame A header (which includes the source and destination MAC addresses) The payload (the fragment of the datagram) A trailer (which often includes error-checking data like CRC). TCP/IP does not define any specific protocol for the data-link layer.

Description of Each Layer Physical Layer: Physical layer is responsible for carrying individual bits in a frame across the link Bits received in a frame from the data-link layer are trans_x0002_formed and sent through the transmission media

Description of Each Layer

Description of Each Layer

Description of Each Layer

Description of Each Layer

Encapsulation and Decapsulation

Encapsulation and Decapsulation Encapsulation at the Source Host: At the application layer , the data to be exchanged is referred to as a message. A message normally does not contain any header or trailer, but if it does, we refer to the whole as the message. The message is passed to the transport layer The transport layer takes the message as the payload, the load that the transportlayer should take care of. It adds the transport layer header to the payload , which contains the identifiers of the source and destination application programs that want to communicate plus some more information that is needed for the end-to-end delivery of the message, such as information needed for flow, error control, or congestion control . The result is the transport-layer packet, which is called the segment (in TCP) and the user datagram (in UDP) . The transport layer then passes the packet to the network layer.

Encapsulation and Decapsulation Encapsulation at the Source Host: The network layer takes the transport-layer packet as data or payload and adds its own header to the payload. The header contains the addresses of the source and destination hosts and some more information used for error checking of the header, fragmentation information, and so on . The result is the network-layer packet, called a datagram. The network layer then passes the packet to the data-link layer. The data-link layer takes the network-layer packet as data or payload and adds its own header, which contains the link-layer addresses of the host or the next hop (the router). The result is the link-layer packet, which is called a frame . The frame is passed to the physical layer for transmission.

Encapsulation and Decapsulation Decapsulation and Encapsulation at the Router After the set of bits are delivered to the data-link layer, this layer decapsulates the datagram from the frame and passes it to the network layer The network layer only inspects the source and destination addresses in the datagram header and consults its forwarding table to find the next hop to which the datagram is to be delivered. The contents of the datagram should not be changed by the network layer in the router unless there is a need to fragment the datagram if it is too big to be passed through the next link. The datagram is then passed to the data-link layer of the next link The data-link layer of the next link encapsulates the datagram in a frame and passes it to the physical layer for transmission.

Encapsulation and Decapsulation Decapsulation at the Destination Host: Each layer only decapsulates the packet received, removes the payload, and delivers the payload to the next-higher layer protocol until the message reaches the application layer

Addressing

Multiplexing and Demultiplexing

THE OSI MODEL (Open Systems Interconnection) International Organization for Standardization (ISO)

THE OSI MODEL (Open Systems Interconnection)

THE OSI MODEL (Open Systems Interconnection) Presentation: Translation,Compression and E ncryption Session layer: Authentication and security and session management Lack of OSI Model’s Success OSI was completed when TCP/IP was fully in place and a lot of time and money had been spent on the suite; changing it would cost a lot. Some layers in the OSI model were never fully defined. For example, although the services provided by the presentation and the session layers were listed in the document, actual protocols for these two layers were not fully defined, nor were they fully described, and the corresponding software was not fully developed. 3. when OSI was implemented by an organization in a different application, it did not show a high enough level of performance to entice the Internet authority to switch from the TCP/IP protocol suite to the OSI model.

TRANSMISSION MEDIA A transmission medium can be broadly defined as anything that can carry information from a source to a destination.

TRANSMISSION MEDIA

TRANSMISSION MEDIA-GUIDED MEDIA Types of Guided Media: Twisted-pair cable Coaxial cable Fiber-optic cable Twisted-Pair Cable: A twisted pair consists of two conductors (normally copper), each with its own plastic insulation, twisted together

Unshielded Versus Shielded Twisted-Pair Cable

Unshielded Versus Shielded Twisted-Pair Cable

Unshielded Twisted-Pair Cable -Categories

Unshielded Twisted-Pair Cable- Connectors RJ - Registered Jack

Unshielded Twisted-Pair Cable- Connectors

Twisted-Pair Cable- Performance Attenuation -loss of signal power during transmission over a distance.

Twisted-Pair Cable -Applications Twisted-pair cables are used in telephone lines to provide voice and data channels

Guided Media - Coaxial Cable

Guided Media - Coaxial Cable

Guided Media - Coaxial Cable - Standards

Guided Media - Coaxial Cable - Connectors To connect coaxial cable to devices, we need coaxial connectors Most common type of connector is Bayonet Neill-Concelman (BNC)

Guided Media - Coaxial Cable - Connectors BNC T BNC Connector BNC Terminator

Guided Media - Coaxial Cable - Performance Coaxial cable has a much higher bandwidth the signal weakens rapidly and requires the frequent use of repeaters

Guided Media - Coaxial Cable - Applications Coaxial cable was widely used in analog telephone networks where a single coaxial network could carry 10,000 voice signals Digital telephone networks where a single coaxial cable could carry digital data up to 600 Mbps Cable TV networks also use coaxial cables. Traditional Ethernet LANs Coaxial cable in telephone networks has largely been replaced today with fiberoptic cable.

Guided Media - Fiber- Optic Cable Fiber-optic cable is made of glass or plastic and transmits signals in the form of light Light travels in a straight line as long as it is moving through a single uniform substance If a ray of light traveling through one substance suddenly enters another substance(of a different density), the ray changes direction

Guided Media - Fiber- Optic Cable I - Angle of incidence

Fiber- Optic Cable - Propagation Modes

Fiber- Optic Cable - Fiber Size

Fiber-Optic Cable Connectors Subscriber channel (SC) connector - Used for cable TV uses a push/pull locking system Straight-tip (ST) connector used for connecting cable to networking devices uses a bayonet locking system and is more reliable than SC MT-RJ is a connector that is the same size as RJ45

Fiber-Optic Cable - Applications Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-effective C able TV companies use a combination of optical fiber and coaxial cable Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-X Gigabit Ethernet also use fiber-optic cable

Fiber-Optic Cable - Advantages Higher bandwidth: Fiber-optic cable can support higher bandwidths (and hence data rates) than either twisted-pair or coaxial cable. Currently, data rates and bandwidth utilization over fiber-optic cable are limited not by the medium but by the signal generation and reception technology available Less signal attenuation: Fiber-optic transmission distance is significantly greater than that of other guided media. A signal can run for 50 km without requiring regeneration. We need repeaters every 5 km for coaxial or twisted-pair cable Immunity to electromagnetic interference: Electromagnetic noise cannot affect fiber-optic cables. Resistance to corrosive materials : Glass is more resistant to corrosive materials than copper. Light weight. Fiber-optic cables are much lighter than copper cables. Greater immunity to tapping: Fiber-optic cables are more immune to tapping than copper cables. Copper cables create antenna effects that can easily be tapped.

Fiber-Optic Cable - Disadvantages Installation and maintenance: Fiber-optic cable is a relatively new technology. Its installation and maintenance require expertise that is not yet available everywhere Unidirectional light propagation: Propagation of light is unidirectional. If we need bidirectional communication, two fibers are needed. Cost : The cable and the interfaces are relatively more expensive than those of other guided media. If the demand for bandwidth is not high, often the use of optical fiber cannot be justified.

Fiber-Optic Cable - Performance

UNGUIDED MEDIA: WIRELESS Unguided medium transport electromagnetic waves without using a physical conductor Types are: Radio Waves Microwaves Infrared

UNGUIDED MEDIA: WIRELESS Electromagnetic spectrum for wireless communication

UNGUIDED MEDIA: WIRELESS Unguided signals can travel from the source to the destination in several ways Ground propagation: radio waves travel through the lowest portion of the atmosphere Sky propagation: higher-frequency radio waves radiate upward into the ionosphere where they are reflected back to earth line-of-sight propagation: very high-frequency signals are transmitted in straight lines directly from antenna to antenna Very high-frequency signals are transmitted in straight lines directly from antenna to antenna Antennas must be directional, facing each other, and either tall enough or close enough together not to be affected by the curvature of the earth

UNGUIDED MEDIA: Bands

UNGUIDED MEDIA: Radio Waves Waves ranging in frequencies between 3 kHz and 1 GHz Radio waves, particularly those of low and medium frequencies, can penetrate wall Omnidirectional Antenna:

UNGUIDED MEDIA: Radio Waves Antenna transmits radio waves, they are propagated in all directions Sending and receiving antennas do not have to be aligned Sending antenna sends waves that can be received by any receiving antenna Applications: Radio waves are used for multicast communications, such as radio and television

UNGUIDED MEDIA: Microwaves Frequencies between 1 and 300 GHz Microwaves are unidirectional Sending and receiving antennas need to be aligned Very high-frequency microwaves cannot penetrate walls. This characteristic can be a disadvantage if receivers are inside buildings High data rate is possible

UNGUIDED MEDIA: Microwaves Unidirectional Antenna: Applications: Microwaves are used for unicast communication such as cellular telephones, satellite networks, and wireless LANs

UNGUIDED MEDIA: Infrared Frequencies from 300 GHz to 400 THz can be used for short-range communication Having high frequencies, cannot penetrate walls Advantages: A short-range communication system in one room cannot be affected by another system in the next room We use our infrared remote control, we do not interfere with the use of the remote by our neighbors.

UNGUIDED MEDIA: Infrared Disadvantages: We cannot use infrared waves outside a building because the sun’s rays contain infrared waves that can interfere with the communication. Applications: Infrared signals can be used for short-range communication in a closed area using line-of-sight propagation

Switching: Packet Switching and its types Packet Switching : If the message is going to pass through a packet-switched network, it needs to be divided into packets of fixed or variable size In packet switching, there is no resource allocation for a packet. This means that there is no reserved bandwidth on the links, and there is no scheduled processing time for each packet. Resources are allocated on demand The allocation is done on a first come, first-served basis

Packet Switching and its types When a router receives a packet, no matter what the source or destination is, the packet must wait if there are other packets being processed For example, if we do not have a reservation at a restaurant, we might have to wait.

Packet Switching and its types Two types of Packet Switchings are Datagram Networks Virtual-Circuit Networks Datagram Networks: In a datagram network, each packet is treated independently of all others. Even if a packet is part of a multipacket transmission, the network treats it as though it existed alone. Packets in this approach are referred to as datagrams. Datagram switching is normally done at the network layer.

Packet Switching -Datagram Networks /connectionless network

Datagram Network Packets may also be lost or dropped because of a lack of resources E very packet in a datagram network carries a header that contains, among other information, the destination address of the packet The datagram networks are sometimes referred to as connectionless networks

Routing Table

Routing Table A router in a datagram network uses a routing table that is based on the destination address The routing tables are dynamic and are updated periodically . The destination addresses and the corresponding forwarding output ports are recorded in the tables. When the router receives the packet , this destination address is examined ; the routing table is consulted to find the corresponding port through which the packet should be forwarded .

Datagram Network Efficiency The efficiency of a datagram network is better than that of a circuit-switched network; resources are allocated only when there are packets to be transferred. Delay

The packet travels through two Routers. There are three transmission times (3T), three propagation delays (slopes 3τ of the lines), and two waiting times (w1+ w2). We ignore the processing time in each router. The total delay is Total delay = 3T + 3τ + w1 + w2

2. Virtual-Circuit Networks: A virtual-circuit network is a cross between a circuit-switched network and a datagram network . It has some characteristics of both. As in a datagram network, data are packetized and each packet carries an address in the header. As in a circuit-switched network, all packets follow the same path established during the connection. A virtual-circuit network is normally implemented in the data-link layer , while a circuit-switched network is implemented in the physical layer and a datagram network in the network layer.

Virtual-Circuit Networks: It has three phases: Setup Phase: Data transfer phase Teardown phases S etup phase : the source and destination use their global addresses to help switches make table entries for the connection. Data Transfer Phase: Here the actual data transfer take place Teardown phase : The source and destination inform the switches to delete the corresponding entry

Addressing Global Addressing: A source or a destination needs to have a global address— an address that can be unique in the scope of the network or internationally if the network is part of an international network. Global address in virtual-circuit networks is used only to create a virtual-circuit identifier Virtual-Circuit Identifier: The identifier that is actually used for data transfer is called the virtual-circuit identifier (VCI) or the label Small number that has only switch scope; it is used by a frame between two switches

Virtual-Circuit Networks:

Virtual-Circuit Networks:

Virtual-Circuit Networks: Setup Phase For example, suppose source A needs to create a virtual circuit to B. Two steps are required: the setup request and the acknowledgment. Setup Request:

Virtual-Circuit Networks: Setup request

Virtual-Circuit Networks: Setup Phase Source A sends a setup frame to switch 1. Switch 1 receives the setup request frame. It knows that a frame going from A to B goes out through port 3 For the moment, assume that it knows the output port. The switch creates an entry in its table for this virtual circuit, but it is only able to fill three of the four columns. The switch assigns the incoming port (1) and chooses an available incoming VCI (14). It does not yet know the outgoing VCI, which will be found during the acknowledgment step. The switch then forwards the frame through port 3 to switch 2. Switch 3 receives the setup request frame. Again, three columns are completed: incoming port (2), incoming VCI (22), and outgoing port (3).

Virtual-Circuit Networks: Setup Phase 4. Switch 2 receives the setup request frame. The same events happen here as at switch 1; three columns of the table are completed: in this case, incoming port (1), incoming VCI (66), and outgoing port (2). 5. Switch 3 receives the setup request frame. Again, three columns are completed: incoming port (2), incoming VCI (22), and outgoing port (3). 6. Destination B receives the setup frame, and if it is ready to receive frames from A, it assigns a VCI to the incoming frames that come from A, in this case 77. This VCI lets the destination know that the frames come from A, and not other sources.

Virtual-Circuit Networks: Acknowledgment Phase

Virtual-Circuit Networks: Acknowledgment Phase The destination sends an acknowledgment to switch 3. The acknowledgment carries the global source and destination addresses so the switch knows which entry in the table is to be completed. The frame also carries VCI 77, chosen by the destination as the incoming VCI for frames from A. Switch 3 uses this VCI to complete the outgoing VCI column for this entry. Note that 77 is the incoming VCI for destination B, but the outgoing VCI for switch 3. Switch 3 sends an acknowledgment to switch 2 that contains its incoming VCI in the table, chosen in the previous step. Switch 2 uses this as the outgoing VCI in the table. Switch 2 sends an acknowledgment to switch 1 that contains its incoming VCI in the table, chosen in the previous step. Switch 1 uses this as the outgoing VCI in the table

Virtual-Circuit Networks: Acknowledgment Phase 4. Finally switch 1 sends an acknowledgment to source A that contains its incoming VCI in the table, chosen in the previous step. 5. The source uses this as the outgoing VCI for the data frames to be sent to destination B.

Virtual-Circuit Networks:Data Transfer Phase

Virtual-Circuit Networks:Data Transfer Phase

Virtual-Circuit Networks:Tear DownPhase I n this phase, source A, after sending all frames to B, sends a special frame called a teardown request. Destination B responds with a teardown confirmation frame. All switches delete the corresponding entry from their table s Efficiency: In virtual-circuit switching, all packets belonging to the same source and destination travel the same path, but the packets may arrive at the destination with different delays if resource allocation is on demand. Delay in Virtual-Circuit Networks:

Virtual-Circuit Networks:Tear Downphase

Virtual-Circuit Networks:Tear DownPhase Total delay = 3T + 3τ + setup delay + teardown delay

Thank You
Tags