0% found this document useful (0 votes)
20 views

CN Differences

Computer Network

Uploaded by

Harshitha P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
20 views

CN Differences

Computer Network

Uploaded by

Harshitha P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 20
© K. S. INSTITUTE OF TECHNOLOGY xa #14, Raghuvanahalli, Kanakapura Main Road, Bengaluru-5600109 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ACADEMIC YEAR : 2022-2023 Semester : 5 Section: A& B Course: COMPUTER NETWORKS Course Code:21CS52 ‘Type: INTEGRATED PROFESSIONAL CORE COURSE(IPCC) Course Incharge : Dr.Rekha B Venkatapur Module -1 Introduction to Networks 1. Half Duplex v/s Full Duplex Sr.No Half Duplex Full Duplex | | In half-duplex mode, both node/system [A full-duplex system is used that allows | communicate over the same medium, but | information to flow simultaneously in both only one unit can send at a time. directions on the transmission path. | 2 | Tt requires two wires. Ttrequires four wires. 3 | Ex. It is like two polite people talking to | Ex. The telephone network. When two people are each other-one talks, the other listens, but | communicating by a telephone line, both can talk neither one talks at the same time. and listen at the same time. Communication — One at a Time Simultaneous Communication 2. CAT3 vis CATS CABLE Sr.No Category 3 cable Category 5 cable 1 | In cat 3 two insulated wired twisted In cat 5 two insulated wired twisted together but together but less twisted per centimeter. more twisted per centimeter. 2 | Cat 3 has no better quality signal over long | Cat 5 has better quality signal over long. distance. distance. 3 | Cat 3 has more crosstalk. Cat 5 has less crosstalk. @ scanned with OKEN Scanner KS. Institute of Technology 3. LAN vis MAN MAN Sr.No LAN — . (MAN) is a large- T | A Local Area Network(LAN) size is limited ‘A-metropolitan area oo * ya to a few kilometers to link devices in a) Computer network that usually single office building, a school, a campus or | large campus. ahome. 2 | LAN can support only data transfer. AMAN can support both data and voice. 3 A LAN is useful for sharing resources like | MAN is designed for customers who need a high- files, printers, games or other applications. | speed connectivity. 4 | LAN Used Guided Media MAN Used may be Guided or may be Unguided media. 4, MAN v/s WAN Sr.No MAN WAN 1) Acmetropolitan area network-(MAN) is a| A-Wide Area Network(WAN)-spans a large large-Computer network that usually spans geographic area, such as a state, province or acity ora large campus. country. Z| A MAN usually interconnects a number of | WANs often connect multiple smaller networks, Local area . such as local area networks (LANs) or metropolitan area networks (MANs). 3 | Ex. Telephone Company Network. Ex. User using a telephone line to connect to an ISP (Internet Service Provider) is using a WAN. @ scanned with OKEN Scanner 5. BUS w/s STAR TOPOLOGY Sr.No Bus topology Star topology 1 | A bus topology is a networking A star topology is an architecture that includes a architecture that is linear, usually central device or hub to connect all stations by using one or more dropline of cable to | together. form a single line, or bus. 2| The signals sent by one station extend the _| Signals sent by a station must pass through (and Iength of this cable to be heard by other __| are usually regenerated)by these central hubs. stations. 3| Requires less cable length than a star | Requires more cable length than a Bus topology. | topology. 4 | Ttis easy to extend a bus. Itis difficult to extend. 5 |More Cheaper because only cable is |More expensive than linear bus topologies required. because of the cost of the hubs, ete. 6 | Maintenance is easy. Maintenance is difficult 6. MESH vis STAR TOPOLOGY Sr.No Mesh topology. Star topology | 1] In a Mesh topology, every device has a| A star topology every device has a dedicated dedicated point-to-point link to every other | point-to-point link to every other device.only to a device. central controller called Hub. 2| A Mesh topology is expensive. A star topology is less expensive. 3 | Requires more cable than a Star topology. | Requires far less cable than a Mesh topology. 4] A mesh topology is robust. If one link | A star topology is robustness, One link is affected damage all links be unusable, all other links remain active. 5| Addition, moving and deletions of node become difficult, Addition, moving and deletions of node become easy because involve only one connection. @ scanned with OKEN Scanner K.S. Institute of Technology 7, BASEBAND v/s B Sr.No Baseband Transmission Baseband transmissions use the entire media bandwidth for a single channel. ROADBAND TRAN: SMISSION Broadband Transmission oandd transmissions provide the ability to dia bandwidth into multiple Broa r divide the entire me channels v 50-ohm - used for digital transmissions, (Baseband coaxial cable) 75-ohms - used for analog, transmissions. (Broadband coaxial cable) we Most Local Area Networks use baseband signaling. multiple single support over networks conversations broadband simultaneous transmission medium. a 8. INTRANET vis I INTERNET Sr.No INTRANET INTERNET Intranet is the generic term for a collection of private computer networks within an. organization. The Internet (note uppercase I) means a specific worldwide internet that is widely used to connect universities, government offices, companies, and of late, private individuals. v Intranet server may respond much more quickly than Internet server. Internet server may respond much more slow than Intranet server. The intranet is used for everyday work inside the company. Internet site is mainly used for find out information about products. Intranets run between a hundred or a thousand times faster than Internet. Internet run slower than Intranet. The Intranet design should be more task oriented. The Internet design should be less task oriented. The Intranet is designed to be a private space. The Internet is designed to be an open, public space. Intranet user are own employees who know lot about structure etc. company, its organization Internet site is used by customers who will not aware of your company so careless about it. @ scanned with OKEN Scanner KS. Institute of Technology Department of CSE 9. TCP/IP Model vs. OSI Model Sr.No TCP/IP Model OSI Model 1| Defined after the advent of Internet. Defined before advent of internet. 2| TCP/IP supports Internet working. __| Internet working not supported. 3/5 Layered architecture; Application|7 layered architecture; Separate layer has to include the functionality of | functionality for Application layer, Session Session and presentation layer layer and presentation layer 4 | No clear separation of functionality of | Clear distinction between functionality of Service, interface and Protocol Service, interface and Protocol 5 | Protocol ddependent standard. Protocol independent standard. 6| TCP reliably delivers packets, IP does | All packets are reliably delivered. not reliably deliver packets. 7 | More Credible. Less Credible. | Supports connection less service in| Supports both Connection oriented & Network layer But connection less and connection oriented service at transport layer Connection less service at N/W layer But only connection oriented service at Transport Layer @ scanned with OKEN Scanner 10. GUIDED w/s UNGUIDED MEDIA Unguided media Sr.No Guided media : T | Guided transmission media are the eables | Unguided transmission media are the ways of that are tangible or have physical existence. | transmitting data without using any cables. 2] Guided transmission media are limited by | Unguided transmission media are not bounded | the physical geography. by physical geography. | 3 | Guided Media are Unguided Media are i. Twisted - Pair cable i. Terrestrial microwave | ii, Coaxial Cable | ii, Satellite Communication(Radio waves) | Fiber-optic cable iii Infra red waves. | iv. Magnetic media v. Fiber Cable 11. FIBER OPTIC CABLE v/s COPPER WIRE CABLE ‘Sr.No Fiber Optic Cable Copper Wire Cable T | Source of Energy - Carries Light rays | Source of Energy - Carries electrical signals 2] Transmission Media - Uses flexible | Transmission Media - - Uses metal strands thin glass threads 3 | It can handle higher bandwidth. So, it | It can handle lower bandwidth. So, it serves lower serves high data rate. data rate. 4 | It is more expensive Ttis less expensive 5 | It requires repeaters after each 30 km. | It requires repeaters after each 5 km. | They are not affected by electrical | They are affected by electrical interference — interference electromagnetic interferences @ scanned with OKEN Scanner K.S. Institute of Technology Department of CSE 7 | They are light in weight. Weight is higher than fiber 8 | More secured Less secured 9 | it is a new technology. So very less | Large man-power is available to repair and persons are available who can repair | maintain the system- and maintain the system- Maintenance is difficult 10 | High Bandwidth Limited bandwidth | 11 | Less durable More durable | 12|Less compatible with different | More compatible with different networks networks 12.RADIO WAVES v/s MICROWAVE ‘Sr.No Radio waves Microwave 1 | Radio waves has Frequency 3 KHz to | Microwaves has Frequency 1 to 300GHz 1GHz. 2 | Radio waves are Omni directional. Microwaves are Unidirectional. 3] Radio waves are used in AM and FM| Microwaves are used in Cellular phones, Radio, maritime radio, cordless phone, | Satellite networks and Wireless LANs paging. 4| Radio waves of low and medium| Very high frequencies Micro Wave cannot frequencies propagate walls. propagate walls. 5 | There are many types of antenna used for | There are two unidirectional antenna used omni directional signal generally uses} 1) Parabolic dish antenna omni directional antenna. 2) Horn antenna 6| Radio waves propagate in the sky | Micro wave propagation is line-of-sight. mode(Sky propagation). @ scanned with OKEN Scanner KS. Institute of Technology 13. MICROWAVE v/s INFRARED WAVE Department of CSE \ Sr.No Microwave Infrared wave \ Microwaves has Frequency 1 to 300GHz.. Infrared waves has Frequency 300GHz to 400 | THz. | i Nv For long range communication. For short range communication we Microwaves are used in Cellular phones, Satelliate networks and Wireless LANs Tnirared waves are used in TV Remote Control, | VCRs and Stereos. a It pass through Solid object. Do not pass through Solid object. a Microwaves are Unidirectional. Infrared waves are Relatively directional. 14, HUB v/s BRIDGE Sr.No Hub Bridge 1 | Hubs operate in the physical Layer devices | Bridge operate both in the physical and data link in the OSI model. layers devices in the OSI model. 2|A hub joins multiple computers (or other |'A bridge divide a larger network in to smaller network devices) together to form a single | segments. Connect two segments of a LAN or network segment. two LANs belonging to the same organization. 3 | A Hub has not maintain any table. A bridge has a table used in filtering decisions. 4 | A hub has 8 to 20 ports A bridge has two ports. a @ scanned with OKEN Scanner K.S. Institute of Technology Department of CSE 15. HUB v/s REPEATER Sr.No Hub Repeater 1 | Hub place at a center of a network. Repeater place at the end of network. 2) A hub joins multiple computers (or other | Repeater is used to extend the physical length of network devices) together to form a single | a network. network segment. 3 | A hub has 8 to 20 ports Repeater has 2 ports. 4| A hub do not amplify the incoming signal. | A Repeater amplify the incoming signal. 16. HUB v/s SWITCH Sr.No Hub ‘Switeh 1| Hub place at a center of a network but | Hub place at a center of a network but operate operate slowly than switch. much faster than Hub. 2 | There are three types of Hub There are four types of Switches 1. Active Hub 1. Store and forward Switches 2. Passive Hub 2. Cut through switches 3. Intelligent Hub 3. Symmetric switches 4. Asymmetric switches 3 | A hub has 8 to 20 ports A Switch is a multi port bridge. 17. BRIDGE v/s SWITCH Sr.No Bridge Switch 1 | Bridge operate both in the physical and | Switch operate at data link layer in the OST data link layers devices in the OSI model. | model. 2 | A Bridge has two ports. ‘A Switch is a multi port bridge. 3|A Bridge is not directly connected to| A Switch is directly connected to individual individual computers. computers. @ scanned with OKEN Scanner KS. Institute of Technology —& Department of CSE # ‘A bridge operate slower than switch. ‘A switch operate much faster than bridge. | 18. BRIDGE v/s GATEWAY Sr.No Bridge Gateway Bridge operate both in the physical and data link layers devices in the OSI model. Gateway operate in all seven layers of the OSI model. xR ‘A Bridge easily extend network distance. Z Gateway is a door way into and out of LAN. » A Bridge is not directly connected to individual computers. K Gateway is directly connected to Network LAN. 19. GATEWAY v/s ROUTER Sr.No Gateway Router They relay packets among networks that have different protocols. They relay packets among multiple interconnected networks. v They operate in all seven layers of the OST model. They operate in the physical, data link and network layers. Understands the protocols used by each connected network and is able to translate from one to another. Connect LANs, MANs, and WANs. They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. Routes a packet based on the logical address (network layer) of the packet. Module -2 Data Link Layer 1. Connection oriented v/s connection less Service SLNo ‘Connection Oriented Service Connection Less Service ‘Used in Circuit switched network Used in datagram Network Ex. Telephone service Ex. Postal Service sia @ scanned with OKEN Scanner KS. Institute of Technology Department of CSE 2 Connection establishment is needed | Connection establishment not needed, each and based on negotiations - Max. __| message carries full destination address, size of message, QoS ete routed independently in any route. Itis store Connection acts as tube and Bits are | and forward service. pushed from one end received in another end 3 Guaranteed delivery Best effort delivery but not guaranteed service 4 Reliable Unreliable 5 All the bits delivery is more Time taken for delivery is more important important 6 Tt provides services of sequencing | It provides no sequencing mechanism and message and detecting transmission | flow control or error recovery. errors. 7 Ex: Application File Transfer Ex: Application — Video Conference 2. Pure ALOHA v/s Slotted ALOHA Pure ALOHA Slotted ALOHA 1 In this Aloha, any station can transmit In this, any station can transmit the data at the the data at any time. beginning of any time slot. 2 In this, The time is continuous and not | In this, The time is discrete and globally globally synchronized. synchronized. 3 Vulnerable time for Pie aoe? Vulnerable time for Slotted Aloha = Tt 4 he aro In Slotted Aloha, the Probability of successful aia inainue! transmission of the data packet. packet =Gxe® =Gxe% Gre 5 In Pure Aloha, Maximum efficiency In Slotted Aloha, Maximum efficiency aac @ scanned with OKEN Scanner Department of CSE \ K.S. Ins ite of Technology » Slotted ALOHA Pure ALOHA = 36.8% = 18.4% 3,Comparison of Types of CSMA Protocol Parameter 1-persistent COMA p-persistent CSMA Non-persistent COMA Carrier Sense It sends with the probability of 1 when channel is idle. It sends with the probability of p when channel is idle, It send when channel is idle. Waiting It continuously senses the channel or carrier. Itwaits for the next time slot. It will wait for the random amount of time to check the carrier. Chances of Collision There is highest chances of collision in this. Less chances as compared to |- persistence and non- persistence. Less chances as compared to 1-persistence but more than the p-persistence. Utilization It’s utilization is above ALOHA as frames are sent only when the channel is idle. It’s utilization is depend upon the probabi It's utilization is above 1- persistent as not all the stations constantly check the channel at the same time. It is low as frames are Itis large when p i small as station will not It is small as station will send whenever channel is found Delay Low i Load sent when the channel always send when idle but longer than I- become idle. channel is idle. persistent since it checks for : the random time when busy. It is large when the Delay High Itis high due to probability p ofsending | It is longer than I-persistent a ee is small when channel is as channel is checked : idle and channel is randomly when busy. rarely idle. hs ced @ scanned with OKEN Scanner KS. Institute of Technology Department of CSE 4, CSMA/CD vis CSMA/CA. s.NO csmacp CSMA/CA 1. | CSMA/CD is effective after a coltision, | Whereas CSMA/CA is effective before a 7 | collision. 2. | CSMA/CD is used in wired networks. Whereas CSMA / CA is commonly used in Wireless networks. 3. It only reduces the recovery time, Whereas CSMA/ cA minimizes the possi 7 of collision. x CSMA / CD resends the data frame Whereas CSMA / CA will first transmit the * whenever a conflict occurs. intent to send for data transmission a CSMA / CD is used in 802.3 standard. While CSMA / CA is used in 802.11 standard. 6 It is more efficient than simple While it is similar to simple CSMA(Carrier ~ CSMA(Carrier Sense Multiple Access). Sense Multiple Access). It is the type of CSMA to detect the It is the type of CSMA to av collision on a 7 collision on a shared channel. shared channel. 8. It is work in MAC layer. It is also work in MAC layer. 3. FDM vis TDM Sr.No FDM TDM 1 | FDM is an analog technique . TDM isa digital process, 2] FDM can be applied when the bandwidth ['TDM ean be applied when the data rate capacity of @ link is greater than the combined | of the transmission medium is greater than the bandwidths ofthe signals to be transmitted. | data rate required by the sending and receiving devices, 3 | FDM can be used in broadband LANs TDM transmits the multiplexed signal in baseband mode. @ scanned with OKEN Scanner Department of CSE KS. Institute of Technology Module -3 Network Layer 1. Datagram v/s Virtual Circuit ] ; ae t Parameter Datagram Subnet Virtual Circuit Subnet | Circuit Setup Not needed Required | Each pkt contains full Source Addressi ae and destination address Each Pkt carries short VC number VCI Routers do not hold state Routins t . e information about connection Route chosen when VC is set up: all pac! follow it Effect of Router None; except the packet lost AIL VCs passed through the failed router are terminated failure during the crash ee Dia ella penne 2.Link State v/s. Distance vector Sr.No Link State Distance vector 1 | Link State gets common view of entire network topology Distance vector views net topology from neighbor's perspective Link State calculates the shortest path to other routers Distance vector adds distance vectors from route to router Link State event-triggered updates; faster convergence Distance vector frequent, periodic updates; slow convergence | | | Link State passes link-state routing updates to other routers neighbor routers, Distance vector passes copies of routing table to @ scanned with OKEN Scanner — institute of Technology Department of CSE 3. STATIC v/s DYNAMIC ROUTING LN er ° Static Routing Dynamic Routing 1 | In it data t updated manually. Tn it data is updated periodically using one of the dynamic routing protocols such RIP, OSPF, oF BGP. 2 | It is used in small internet. Tris used in Targe internet. 3 | It does not change very often. There is a change in the Internet, It update the table. 4, Network specific method v/s Host specific SI.No Network specific method Host specific Hin Nenvork specific method the routing table | In Host specifi all Host addresses in the routing holds only one entry to define the address of | table. network itself. {For example F 1000 hosts areatachedo | For example if 1000 hosts are attached to the For exam work, only one entry exists in| same network, 1000 entry exists in the routing the routing table instead of 1000. table instead of 1000. 5, DIRECT v/s INDIRECT DELIVERY Si.No Direct Delivery Indirect Delivery TH a Direct delivery athe Final destination [In an Indirect delivery, the packet goes from of the packet is a host connected to the | router to router until it reaches the one connected same physical network as the deliverer. | to the same physical network as its final destination. 7 Troceurs when the source and destination | It occurs when the destination host is not on the of packet are located on the same physical | same physical network as the delivered. network or when the delivery is between the last router and the destination host. @ scanned with OKEN Scanner KS. Institute of Technology Department of CSE \ ae __, &. > 6. ARP v/s RARP Protocol SI. No APR Protocol RARP Protocol ‘ARP stands for address resolution protocol RARP stands for reverse address resolution | protocol ‘ARP is used for find the physical address when it knows only its IP address of the receiver. RARP is used for find IP address when it knows only its physical address of the receiver. Tn ARP request packet contains operation field value 1 and reply packet operation field value 2. Tn RARP request packet contains operation field value 3 and reply packet operation field value 4. 7. CIRCUIT SWITCHING v/s PACKET SWITCHING SI. No Circuit Switching Packet switching In Circuit Switching Dedicated path is established. In Packet switching Dedicated path is not established. In Circuit Switching fixed Bandwidth is available. In Packet switching dynamic Bandwidth is available. In Circuit Switching bandwidth is wasted Potentially. In Packet switching bandwidth is not wasted. +! Tn Circuit Switching Call setup is required. In Packet switching Call setup is not required. @ scanned with OKEN Scanner cs.institute of Technology Department of CSE 5 | In Circuit Switching congestion occur at setup time. Tn Packet switching congestion occur on every packet. 6 | In Circuit Switching charging is count per In Packet switching charging is count per minute. packet. 8, Leaky Bucket v/s Token Bucket algorithm Leaky Bucket Algorithm Token Bucket Algorithm ‘The packets are thrown into the bucket. Ttholds packets generated at regular intervals of time. The bucket leaks at a constant rate. Tthas a maximum capacity. ‘The output comes at a finite rate. ‘The packet cannot be sent if there are no tokens in the bucket. Tt converts bursty traffic into uniform traffic. ‘When there is a ready packet, a token is removed and the packet is sent. Module -4 Transport Layer 1. TCP v/sUDP Sr.No TCP UDP 1 | TCP is connection-oriented protocol. UDP is Connectionless protocol. 2 | TCP is a reliable protocol. UDP is a unreliable protocol — Best effort service. 3] TOP support sequencing order. UDP can deliver out of order packets 4 | TCP handles flow control. UDP do not have flow control mechanism. No packet loss Packet loss 6 | All Packets follow same path Packets can select different path x Suitable for Large data transfer Suitable for small sized data 8 | No duplicate delivery Duplicate delivery is possible @ scanned with OKEN Scanner 9] Time consuming at initial stage due to Packets cé connection establishment -Slow ‘an immediately start transmitting -Faster 10 | Congestion minimum Congestion can be more 11. | Example of application: File transfer Example of Application: Domain Name system 2. Comparison of Transport Layer Protocols Protocol/ Mechanism Advantages Disadvantages Approach TCP Creates Connections to | -Reliable “Not possible to use for real one another over In-order from sender | time applications which it can exchange | to receiver ; data or packets “Congestion control | -Mainly for connection- oriented networks UDP Provide only transport | -Simple and Fast “Susceptible to bit errors layer address in the : : fometaUDP por | Suitable forreal time | -No retransmissions : applications and net -Mainly for Connection less checksum networks RTP “Designed on the basis | -Provides end-to-end “No retransmission of TCP Mechanism -A short and immediate ack message for each RTP packet and RTCP is introduced delivery services for data with real time characteristics -RTCP provides periodic monitoring reports of data delivery, minimal control and identification functionality: RTCP indicates the periodic quality of Service -Specific for each media type and compression algorithm @ scanned with OKEN Scanner KS. Institute of Technology Department of CSE Module -5 Application Layer 1. FTP v/s. TFTP Protocol Sl.No FTP Protocol TFTP Protocol 1| The File Transfer Protocol (FIP) is the | The Trivial File Transfer Protocol (TFTP) standard mechanism provided by TCP / IP | allows a local host to obtain files from a remote for copying a file from one host to another. | host. v It uses the services offer by TCP. Tt uses services offered by UDP. wo FTP uses TCP ports 2and 21 to establish | TFTP uses UDP port 6 to establish network network connections. connections. 4 | FTP provides reliable and secure services. | TFTP provides unreliable and unsecured services. | 2. TELNET v/s RLOGIN PROTOCOL Sr.No TELNET Protocol RLOGIN Protocol | 1 | Telnet is more stable than rlogin. Rlogin is not more stable than Telnet. | 2| Telnet is more secure Rlogin is less secure. | Telnet works between hosts with different | Rlogin works between Unix systems only. os. - Telnet establish connection using TCP with | Rlogin establish connection using UDP with | port 23. port 513, 3. Asynchronous Transmission v/s Synchronous Transmission Sr.No Asynchronous Transmission Synchronous Transmission 1 | Asynchronization improves error detection and enables the devices to operate at lower speeds. ~ Synchronization improves error detection and enables the devices to operate at higher speeds. @ scanned with OKEN Scanner Asynchronous transmission generally | synchronous communication is more expensive. requires less expensive hardware. The overhead for asynchronous transmission is high. The overhead bits (synch, CRC, and end) comprise a smaller portion of the overall data frame. Asynchronous transmission does not use a Synchronous transmission eliminates the need clocking mechanism to keep the sending | for start and stop bits by synchronizing the and receiving devices synchronized clocks on the transmitting and receiving devices. ® scanned with OKEN Scanner

You might also like