CNN Complete Notes
CNN Complete Notes
UNIT 1:
Introduction: Computer Networks and its applications, Network structure. Network architecture,
Topologies, LAN, WAN, MAN, The OSI reference model, The TCP/IP reference model.
UNIT 2:
The Physical Layer: Transmission Media Twisted pair, coaxial cable optical fiber, radio transmission,
microwaves and infrared transmission. Switching-message switching. Multiplexing.
UNIT 3:
The Data Link Layer: Data Link Layer design issues. Error detection Single parity checking. Checksum,
polynomial codes CRC. Error correction- Hamming code, Elementary data link protocols, sliding window
protocols
UNIT 4:
The Network Layer: Network layer design issues, Routing algorithms Flooding, Distance vector routing.
Hierarchical routing. Link state routing, Congestion, control algorithms Leaky bucket, token bucket
algorithm admission control. Hop by Hop choke packets.
UNIT 5:
The Transport Layer and Application Layer: Elements of Transport 5 service, Elements of Transport,
protocols, Internet transport protocols (TCP & UDP, DNS, Electronic Mailing, and World Wide Web.
UNIT 1
INTRODUCTION
Introduction:
A computer network is a digital telecommunications network which allows nodes to share resources.
Computer networks, computing devices exchange data with each other using connections (data links)
between nodes.
Computer networking as we know it today may be said to have gotten its start with the
Arpanet development in the late 1960s and early 1970s
A set of devices often mentioned as nodes connected by media link is called a Network.
A node can be a device which is capable of sending or receiving data generated by other nodes on the
network like a computer, printer etc.
These links connecting the devices are called Communication channels.
What is network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications.
A network is set of interconnected devices (sometime referred as nodes) which are used to transmit
data between them with agreed protocols.
What is Communication?
A Communication model is used to exchange data between two parties.
For example: communication between a computer, server and telephone (through modem).
Source The source is a device which generates and sends the data to the destination.
Destination It is a device that receives the data.
Medium It acts as carrier to carry the data from the source to the destination.
The carrier provides the path through wire or wireless.
Protocol It is set of rules that govern the data communication in a correct manner.
Information Sharing: large and medium-sized company and many small companies are vitally dependent on
computerized information.
Connecting People: another use of setting up a computer network has to do with people rather than
information or even computers.
E-commerce: many companies is doing business electronically with other companies, especially suppliers
and customers, and doing business with consumers over the Internet.
Home Applications.
The computer network provides better connectivity for home applications via desktop computers, laptops,
iPads, iPhones.
Some of the more popular uses of the internet for home users
Access to remote information.
peer-to-peer
Interactive entertainment
Electronic commerce.
Mobile Users:
Wireless networks are of great value to fleets of trucks, taxis, delivery vehicles, and repairpersons
for keeping in contact with home. Wireless networks are also important to the military.
Social issues.
A popular feature of many networks are newsgroups or bulletin boards whereby people can exchange
messages with like-minded individuals.
The following are the issues in society due to the misbehave or misconduct of computer networks.
Network neutrality
Digital Millennium Copyright Act
Profiling users
Phishing
Network structure
An organization can be structured in various ways that determine how it operates and performs.
The network structure is a newer type of organizational structure often viewed as less hierarchical (i.e.,
more flat), more decentralized, and more flexible than other structures.
In this structure, managers coordinate and control relations that are both internal and external to the firm.
What is topology?
Topology refer to geometrical arrangement of components/ devices.
Explain types of network topology with advantages and disadvantages of each with
comparison?
Network Topology is the schematic description of a network arrangement, connecting various nodes
(sender and receiver) through lines of connection.
1. BUS Topology
2. RING Topology
3. STAR Topology
4. MESH Topology
5. TREE Topology
6. HYBRID Topology
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable.
When it has exactly two endpoints, then it is called Linear Bus topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first.
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
Routing
Flooding
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology.
It should at least have three levels to the hierarchy.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).
11. Explain the types of networks with advantages and disadvantages of each with
comparison?
A computer network is a set of computers sharing resources located on or provided by network nodes.
The computers use common communication protocols over digital interconnections to communicate with each other.
Characteristics of LAN
LAN's are private networks, not subject to tariffs or other regulatory controls.
LAN's operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the prominent ones are
Ethernet, Token ring.
It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.
Applications of LAN
One of the computer in a network can become a server serving all the remaining computers called
clients.
Connecting Locally all the workstations in a building to let them communicate with each other
locally without any internet access.
Sharing common resources like printers etc are some common applications of LAN.
Characteristics of MAN
It generally covers towns and cities (50 km)
Communication medium used for MAN are optical fibers, cables etc.
Data rates adequate for distributed computing applications.
Characteristics of WAN
It generally covers large distances (states, countries, continents).
Communication medium used are satellite, public telephone networks which are connected by routers.
OSI model acts as a reference model and is not implemented on the Internet because of its late invention.
OSI model use two separate layers physical and TCP/IP uses only one layer (link). link to define the
data functionality of the bottom layers.
OSI model, the transport layer is only A layer of the TCP/IP model is both connection-
connectionoriented. oriented and connectionless.
In the OSI model, the data link layer and physical In TCP, physical and data link are both
are separate layers. combined as a single host-to-
network layer.
Most Common TCP/IP Protocols Some widely used most common TCP/IP protocol are:
TCP:
Transmission Control Protocol is an internet protocol suite which breaks up the message into TCP
Segments and reassembling them at the receiving side.
IP:
An Internet Protocol address that is also known as an IP address is a numerical label. It is assigned
to each device that is connected to a computer network which uses the IP for communication. Its
routing function allows internetworking and essentially establishes the Internet. Combination of IP
with a TCP allows developing a virtual connection between a destination and a source.
HTTP:
The Hypertext Transfer Protocol is a foundation of the World Wide Web. It is used for transferring
webpages and other such resources from the HTTP server or web server to the web client or the
HTTP client. Whenever you use a web browser like Google Chrome or Firefox, you are using a web
client. It helps HTTP to transfer web pages that you request from the remote servers.
SMTP:
SMTP stands for Simple mail transfer protocol. This protocol supports the e-mail is known as a
simple mail transfer protocol. This protocol helps you to send the data to another e-mail address.
SNMP:
SNMP stands for Simple Network Management Protocol. It is a framework which is used for
managing the devices on the internet by using the TCP/IP protocol.
DNS:
DNS stands for Domain Name System. An IP address that is used to identify the connection of a
host to the internet uniquely. However, users prefer to use names instead of addresses for that DNS.
TELNET:
TELNET stands for Terminal Network. It establishes the connection between the local and remote
computer. It established connection in such a manner that you can simulate your local system at the
remote system.
FTP:
FTP stands for File Transfer Protocol. It is a mostly used standard protocol for transmitting the files
from one machine to another.
UNIT 2
PHYSICAL LAYER
Guided Media:
It is also referred to as Wired or Bounded transmission media. Signals being transmitted are
directed and confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
This type of cable has the ability to block This type of cable consists of a special jacket to
interference and does not depend on a block external interference.
physical shield for this purpose It is used in fast-data-rate Ethernet and in voice and
It is used for telephonic applications. data channels of telephone lines.
Advantages: Advantages:
⇢ Least expensive ⇢ Better performance at a higher data rate in
⇢ Easy to install comparison to UTP ⇢ Eliminates crosstalk
⇢ High-speed capacity ⇢ Comparatively faster
Disadvantages: Disadvantages:
⇢ Susceptible to external interference ⇢ Comparatively difficult to install and
⇢ Lower capacity and performance in manufacture ⇢ More expensive
comparison to STP ⇢ Bulky
⇢ Short distance transmission due to
attenuation
Applications: Applications:
Used in telephone connections and LAN Shielding the interior components.
networks
2. Coaxial Cable
It has an outer plastic covering containing an insulation layer made of PVC.
The coaxial cable transmits information in two modes:
Baseband mode(dedicated cable bandwidth) and
Broadband mode(cable bandwidth is split into separate ranges)
Cable TVs and analog television networks widely use Coaxial cables.
Advantages: Disadvantages:
High Bandwidth Single cable failure can disrupt the entire
Better noise Immunity network
Easy to install and expand
Inexpensive
Applications:
Radio frequency signals are sent over coaxial wire.
It can be used for cable television signal distribution etc
Advantages: Disadvantages:
Increased capacity and bandwidth Difficult to install and maintain
Lightweight High cost
Less signal attenuation Fragile
Immunity to electromagnetic interference
Resistance to corrosive materials
Unguided Media:
It is also referred to as Wireless or Unbounded transmission media.
No physical medium is required for the transmission of electromagnetic signals.
Features:
The signal is broadcasted through air
Less Secure
Used for larger distances
Radio waves
These are easy to generate and can penetrate through buildings.
The sending and receiving antennas need not be aligned.
Frequency Range:3KHz – 1GHz. AM and FM radios and cordless phones use Radio waves for
transmission.
Microwaves
It is a line of sight transmission
The sending and receiving antennas need to be properly aligned with each other. The distance
covered by the signal is directly proportional to the height of the antenna.
Frequency Range: 1GHz – 300GHz.
These are majorly used for mobile phone communication and television distribution.
Infrared Wave
Infrared waves are used for very short distance communication.
They cannot penetrate through obstacles.
This prevents interference between systems.
Frequency Range:300GHz – 400THz.
It is used in TV remotes, wireless mouse, keyboard, printer, etc.
What is switching?
Switching is process to forward packets coming in from one port to a port leading towards
the destination.
When data comes on a port it is called ingress, and when data leaves a port or goes out it is called
egress.
A communication system may include number of switches and nodes.
Message Switching
The whole message is treated as a data unit and is switching / transferred in its entirety.
A switch working on message switching, first receives the whole message and buffers it until there
are resources available to transfer it to the next hop.
If the next hop is not having enough resource to accommodate large size message, the message is
stored and switch waits.
Packet Switching
The entire message is broken down into smaller chunks called packets.
The switching information is added in the header of each packet and transmitted
independently.
Packet switching enhances line efficiency as packets from multiple applications can be
multiplexed over the carrier.
The internet uses packet switching technique. Packet switching enables the user to
differentiate data streams based on priorities.
Packets are stored and forwarded according to their priority to provide quality of service.
What is Multiplexing?
Multiplexing is a technique by which different analog and digital streams of transmission can
be simultaneously processed over a shared link.
Multiplexing divides the high capacity medium into low capacity logical medium which is then
shared by different streams.
Communication is possible over the air (radio frequency), using a physical media (cable), and light
(optical fiber).
All mediums are capable of multiplexing.
When multiple senders try to send over a single medium, a device called Multiplexer divides the
physical channel and allocates one to each.
FDM divides the TDM the shared Multiple optical FDM divides the
spectrum or carrier channel is divided among carrier signals are frequency in smaller
bandwidth in logical its user by means of time multiplexed into an channels but CDM
channels and allocates slot. Each user can optical fiber by using allows its users to full
one user to each channel transmit data within the different wavelengths. bandwidth and transmit
provided time slot only. signals all the time using a
unique code.
UNIT 3
DATA LINK LAYER
Multi-Access
When host on the shared link tries to transfer the data, it has a high probability of collision.
Data-link layer provides mechanism such as CSMA/CD to equip capability of accessing a
shared media among multiple Systems.
Types of Errors
There may be three types of errors:
Single bit error
Burst error
Checksum
In checksum error detection scheme, the data is divided into k segments each of m bits.
In the sender’s end the segments are added using 1’s complement arithmetic to get the sum.
The sum is complemented to get the checksum.
The checksum segment is sent along with the data segments.
At the receiver’s end, all received segments are added using 1’s complement arithmetic to
get the sum. The sum is complemented.
If the result is zero, the received data is accepted; otherwise discarded.
Example :
Error Correction
Error Detection, the receiver only needs to know that the received code word is invalid;
Error Correction the receiver needs to guess the Original code word that is sent.
Error Correction is much more difficult than Error Detection.
The need for redundant bits is more during error correction rather than for error detection.
What is Parity?
A parity bit is a bit appended to a data of binary bits to ensure that the total number of 1’s in
the data is even or odd.
Parity bits are used for error detection.
There are two types of parity bits:
Even parity bit:
For a given set of bits, the number of 1’s are counted.
If that count is odd, the parity bit value is set to 1, making the total count of occurrences of
1’s an even number.
If the total number of 1’s in a given set of bits is already even, the parity bit’s value is 0.
Odd Parity bit :
For a given set of bits, the number of 1’s are counted.
If that count is even, the parity bit value is set to 1, making the total count of occurrences of
1’s an odd number.
If the total number of 1’s in a given set of bits is already odd, the parity bit’s value is 0.
Hamming Code
It is a technique developed by R.W. hamming.
This can be applied to data units of any length.
This code mainly uses the relationship between data and redundancy bits.
The hamming code technique, which is an error-detection and error-correction
technique, was proposed by R.W. Hamming.
Whenever a data packet is transmitted over a network, there are possibilities that the data bits
may get lost or damaged during transmission.
6. Parity bit 1 covers all the bits positions whose binary representation includes a 1 in the least
significant position (1, 3, 5, 7, 9, 11, etc).
7. Parity bit 2 covers all the bits positions whose binary representation includes a 1 in the second
position from the least significant bit (2, 3, 6, 7, 10, 11, etc).
8. Parity bit 4 covers all the bits positions whose binary representation includes a 1 in the third
position from the least significant bit (4–7, 12–15, 20–23, etc).
9. Parity bit 8 covers all the bits positions whose binary representation includes a 1 in the fourth
position from the least significant bit bits (8–15, 24–31, 40–47, etc).
10. In general, each parity bit covers all bits where the bitwise AND of the parity position and
the bit position is non-zero.
11. Since we check for even parity set a parity bit to 1 if the total number of ones in the positions
it checks is odd.
12. Set a parity bit to 0 if the total number of ones in the positions it checks is even.
First, we need to detect whether there are any errors in this received hamming code.
Step 1: For checking parity bit P1, use check one and skip one method, which means, starting from
P1 and then skip P2, take D3 then skip P4 then take D5, and then skip D6 and take D7, this way we
will have the following bits,
As we can observe the total number of bits is odd so we will write the value of parity bit as P1 = 1.
This means the error is there.
Step 2: Check for P2 but while checking for P2, we will use the check two and skip two methods,
which will give us the following data bits. But remember since we are checking for P2, so we have
to start our count from P2 (P1 should not be considered).
As we can observe that the number of 1's are even, then we will write the value of P2 =
0. This means there is no error.
Step 3: Check for P4 but while checking for P4, we will use the check four and skip four methods,
which will give us the following data bits. But remember since we are checking for P4, so we have
started our count from P4(P1 & P2 should not be considered).
As we can observe that the number of 1's is odd, then we will write the value of P4 = 1. This means
the error is there.
So, from the above parity analysis, P1 & P4 are not equal to 0, so we can clearly say that the received
hamming code has errors.
Now we have to determine the decimal value of this error word 101 which is 5 (22 *1 + 21 * 0 + 20
*1 = 5).
We get E = 5, which states that the error is in the fifth data bit. To correct it, just invert the fifth data
bit.
So the correct data will be:
Simplest Protocol
It is very simple.
The sender sends a sequence of frames without even thinking about the receiver.
Data are transmitted in one direction only.
Stop-and-wait Protocol
The sender sends one frame and waits for feedback from the receiver.
When the ACK arrives, the sender sends the next frame
It is Stop-and-Wait Protocol because the sender sends one frame, stops until it receives confirmation
from the receiver (okay to go ahead), and then sends the next frame.
We still have unidirectional communication for data frames, but auxiliary ACK frames (simple
tokens of acknowledgment) travel from the other direction.
We add flow control to our previous protocol.
NOISY CHANNELS
Although the Stop-and-Wait Protocol gives us an idea of how to add flow control to its predecessor,
noiseless channels are nonexistent. We can ignore the error (as we sometimes do), or we need to add
error control to our protocols. We discuss three protocols in this section that use error control.
UNIT 4
NETWORK LAYER
Introduction
Network layer is majorly focused on getting packets from the source to the destination,
routing error handling and congestion control.
Various functions
Addressing: Maintains the address at the frame header of both source and destination
and performs addressing to detect various devices in network.
Packeting: This is performed by Internet Protocol. The network layer converts the
packets from its upper layer.
Routing: It is the most important functionality. The network layer chooses the most
relevant and best path for the data transmission from source to destination.
Inter-networking: It works to deliver a logical connection across multiple devices.
Routing Algorithms
The main function of NL (Network Layer) is routing packets from the source machine to the
destination machine.
Nonadaptive algorithm do not base their routing decisions on measurements or estimates of the
current traffic and topology. Instead, the choice of the route to use to get from I to J is computed in
advance, off line, and downloaded to the routers when the network is booted.
This procedure is sometimes called static routing.
Adaptive algorithm, in contrast, change their routing decisions to reflect changes in the topology,
and usually the traffic as well.
Flooding
Another static algorithm is flooding, in which every incoming packet is sent out on every
outgoing line except the one it arrived on.
Flooding obviously generates vast numbers of duplicate packets, in fact, an infinite number
unless some measures are taken to damp the process.
One such measure is to have a hop counter contained in the header of each packet, which is
decremented at each hop, with the packet being discarded when the counter reaches zero.
Ideally, the hop counter should be initialized to the length of the path from source to
destination.
A variation of flooding that is slightly more practical is selective flooding. In this algorithm
the routers do not send every incoming packet out on every line, only on those lines that are
going approximately in the right direction.
Flooding is not practical in most applications.
Initialization
Sharing
Updating
Final Diagram
2. Flooding of LSPs:
After a node has prepared an LSP, it must be disseminated to all other nodes, not only to its
neighbors.
The process is called flooding and based on the following
1. The creating node sends a copy of the LSP out of each interface
2. A node that receives an LSP compares it with the copy it may already have. If the newly
arrived LSP is older than the one it has (found by checking the sequence number), it
discards the LSP. If it is newer, the node does the following:
a. It discards the old LSP and keeps the new one.
b. It sends a copy of it out of each interface except the one from which the packet arrived.
This guarantees that flooding stops somewhere in the domain (where a node has only one
interface).
3. Formation of Shortest Path Tree: Dijkstra Algorithm
A shortest path tree is a tree in which the path between the root and every other node is the
shortest.
The Dijkstra algorithm creates a shortest path tree from a graph.
The algorithm divides the nodes into two sets: tentative and permanent.
It finds the neighbors of a current node, makes them tentative, examines them, and if they
pass the criteria, makes them permanent.
Hierarchical Routing
As networks grow in size, the router routing tables grow proportionally.
Not only is router memory consumed by ever-increasing tables, but more CPU time is needed to scan
them and more bandwidth is needed to send status reports about them.
At a certain point, the network may grow to the point where it is no longer feasible for every router
to have an entry for every other router, so the routing will have to be done hierarchically, as it is in
the telephone network.
The routers are divided into what we will call regions.
Each router knows all the details about how to route packets to destinations within its own region but
knows nothing about the internal structure of other regions.
For huge networks, a two-level hierarchy may be insufficient; it may be necessary to group the
regions into clusters, the clusters into zones, the zones into groups, and so on, until we run out of
names for aggregations
When a single network becomes very large, an interesting question is ‘‘how many levels should the
hierarchy have?’’
For example, consider a network with 720 routers. If there is no hierarchy, each router needs 720
routing table entries.
If the network is partitioned into 24 regions of 30 routers each, each router needs 30 local entries plus
23 remote entries for a total of 53 entries.
If a three-level hierarchy is chosen, with 8 clusters each containing 9 regions of 10 routers, each router
needs 10 entries for local routers, 8 entries for routing to other regions within its own cluster, and 7
entries for distant clusters, for a total of 25 entries
Kamoun and Kleinrock (1979) discovered that the optimal number of levels for an N router network
is ln N, requiring a total of e ln N entries per router
What is congestion?
A state occurring in network layer when the message traffic is so heavy that it slows down network
response time.
Effects of Congestion
As delay increases, performance decreases.
If delay increases, retransmission occurs, making situation worse.
Similarly, each network interface contains a leaky bucket and the following steps are
involved in leaky bucket algorithm:
When host wants to send packet, packet is thrown into the bucket.
The bucket leaks at a constant rate, meaning the network interface transmits packets at a
constant rate.
Bursty traffic is converted to a uniform traffic by the leaky bucket.
In practice the bucket is a finite queue that outputs at a finite rate.
Formula:
M*s=C+ρ*s
where S – is time taken
M – Maximum output rate
ρ – Token arrival rate
C – Capacity of the token bucket in byte
Choke Packets:
This approach can be used in virtual circuits as well as in the datagram subnets. In this
technique, each router associates a real variable with each of its output lines.
UNIT 5
TRANSPORT LAYER AND APPLICATION LAYER
INTORDUCTION
The transport layer is a conceptual division of methods in the layered architecture of
protocols in the network stack in the Internet protocol suite and the OSI model.
An application layer is an abstraction layer that specifies the shared communications
protocols and interface methods used by hosts in a communications network
Transport Entity:
The hardware and/or software which make use of services provided by the network layer,
(within the transport layer) is called transport entity.
The services provided by the transport layer protocols can be divided into five categories:
1. End-to-end delivery:
The transport layer transmits the entire message to the destination. Therefore, it ensures the end-to-
end delivery of an entire message from a source to the destination.
2. Addressing
The transport layer interacts with the functions of the session layer.
Many protocols combine session, presentation, and application layer protocols into a single
layer known as the application layer.
Delivery to the session layer means the delivery to the application layer.
Data generated by an application on one machine must be transmitted to the correct application
on another machine.
This case, addressing is provided by the transport layer.
The transport layer provides the user address which is specified as a station or port. The port
variable represents a particular TS user of a specified station known as a Transport Service
access point (TSAP). Each station has only one transport entity.
The transport layer protocols need to know which upper-layer protocols are communicating.
3. Reliable delivery:
The transport layer provides reliability services by retransmitting the lost and damaged packets.
The reliable delivery has four aspects:
Error Control
The primary role of reliability is Error Control. In reality, no transmission will be
100 percent error-free delivery. Therefore, transport layer protocols are designed to provide
error-free transmission.
Sequence Control
The second aspect of the reliability is sequence control which is implemented at the
transport layer.
Loss Control
Transport layer ensures that all the fragments of a transmission arrive at the
destination, not some of them. On the sending end, all the fragments of transmission are
given sequence numbers by a transport layer. These sequence numbers allow the receiver’s
transport layer to identify the missing segment.
Duplication Control
Duplication Control is the fourth aspect of reliability. The transport layer guarantees
that no duplicate data arrive at the destination. Sequence numbers are used to identify the lost
packets; similarly, it allows the receiver to identify and discard duplicate segments.
4. Flow Control
Flow control is used to prevent the sender from overwhelming the receiver.
If the receiver is overloaded with too much data, then the receiver discards the packets and
asking for the retransmission of packets.
This increases network congestion and thus, reducing the system performance.
The transport layer is responsible for flow control.
It uses the sliding window protocol that makes the data transmission more efficient as well
as it controls the flow of data so that the receiver does not become overwhelmed.
Sliding window protocol is byte oriented rather than frame oriented.
5. Multiplexing
The transport layer uses the multiplexing to improve transmission efficiency.
Multiplexing can occur in two ways:
Upward multiplexing: Upward multiplexing means multiple transport layer
connections use the same network connection. To make more cost-effective,
the transport layer sends several transmissions bound for the same destination
along the same path; this is achieved through upward multiplexing.
Transport Protocol
Addressing
When an application process wishes to set up a connection to a remote application
process, it must specify which one to connect to. In Internet, these end points are (IP
address + Local Port) pairs.
The end point in this context are:
• TSAP (Transport Service Access Point)
• NSAP (Network Service Access Point)
A transport entity support multiple TSAPs.
Multiplexing
Multiplexing is putting multiple things on to one resource i.e., multiplexing several conversations
onto connections, virtual circuits, and physical links plays a role in several layers of the network
architecture.
Need for Multiplexing
• Number of virtual circuits are open by the users or one user opening more than one, which
requires a lot of buffer in the router, this gives a solid reason for packet switched network.
• To bill the users based on the amount of data sent, not the connection time.
Upward Multiplexing: Multiplexing of different transport connections onto the same network
connection attractive.
Downward Multiplexing: The transport layer opens multiple network connections and
distributes the traffic among them on a round-robin basis.
• Source and destination port number – which are 16 bit values to identify the local
port number.
• Sequence number – which identifies the current sequence number of the data
segment. This allows the receiver to keep track of the data segments received. Any
segments that are missing can be easily identified.
• Data offset – which is a 32-bit value and identifies the start of the data.
• Flags the flag field is defined as UAPRSE, where U is the urgent Flag, A the
acknowledgment flag, P the push function, R the reset flag, S the sequence
synchronise flag and F the end – of transmission flag.
• Windows – which is a 16 bit value and gives the number of data blocks that the
receiving host can accept at a time.
• Checksum – which is a 16 bit checksum for the data and header. UrgPtr – which is
the urgent pointer and is used to identify an important area of data.
Electronic Mail
This is the most widely used servic e facilitating users to send and receive messages
electronically in a store and forward manner.
Different E-mail standards, viz., SMTP, UUCP and X400 Message Handling system are
supported on networks (e.g. ERNET).
Electronic Mail is a system whereby a computer user can exchange messages with other
computer users or group of users via a communications network.
The backbone of an electronic mail system is a communication network that connects
remote terminals to a central system or a local area network that interconnects personal
computers.
Users can send mail to a single recipient or they can broadcast it to any number of selected
users on the systems.
The method for receiving mail depends on the sophistication of the system.
When multitasking personal computer and workstation are used mail can be delivered to
users while they are working on something else.
Otherwise, users have to interrogate their mailboxes in a central systems, or file server.
Many users first encounter computer networks when they send or receive electronic mail
to or from a remote site. E-mail is the most widely used application service.
Indeed, many computer users access networks only through electronic mail.
E-mail is popular because it offers a fast, convenient method of transferring information.
E-mail can accommodate small notes or large voluminous memos with a single
mechanism.
It should not surprise you to learn that more users send files with electronic mail than
with file transfer protocols.
Characteristics:
• Store and forward
• Delivery time ranging from few seconds to hours
• Largely textual
• Binary files may be appended or “uuencoded”
• Multimedia (“mime” Standard)
• Distribution lists, with “cc:”, “bcc:”, “fcc:”
• Mail forwarding
• Auto-processing
• Statistics collection
• Secure email
• Several mailers: smtp, uucp (smtp requires IP connectivity; uucp works with dial-up)