Unit - 2
Unit - 2
Computer Networks.
Prepared by :
Ms Rachna Narula
Assitant professor
Bharatividyapeeth college of engineering ,
New Delhi
Error Control
When data-frame is transmitted, there is a probability that data-frame
may be lost in the transit or it is received corrupted. In both cases, the
receiver does not receive the correct data-frame and sender does not
know anything about any loss.In such case, both sender and receiver
are equipped with some protocols which helps them to detect transit
errors such as loss of data-frame. Hence, either the sender retransmits
the data-frame or the receiver may request to resend the previous
data-frame.
Error detection - The sender and receiver, either both or any, must ascertain
that there is some error in the transit.
HDLC supports two types of transfer modes, normal response mode and
asynchronous balanced mode.
Normal Response Mode (NRM) − Here, two types of stations are there,
a primary station that send commands and secondary station that can
respond to received commands. It is used for both point - to - point and
multipoint communications.
It is a data link layer protocol that resides in the layer 2 of the OSI model. It is used
to encapsulate the layer 3 protocols and all the information available in the payload
in order to be transmitted across the serial links. The PPP protocol can be used on
synchronous link like ISDN as well as asynchronous link like dial-up. It is mainly
used for the communication between the two devices.
It can be used over many types of physical networks such as serial cable, phone
line, trunk line, cellular telephone, fiber optic links such as SONET. As the data
link layer protocol is used to identify from where the transmission starts and ends,
so ISP (Internet Service Provider) use the PPP protocol to provide the dial-up
access to the internet
It is responsible for encapsulating frames so that they are suitable for transmission
via the physical medium.
It performs multiple access resolutions when more than one data frame is to be
transmitted. It determines the channel access methods for transmission.
It generates the frame check sequences and thus contributes to protection against
transmission errors.
The controlled access protocols mainly grant permission to send only one node at a time;
thus in order to avoid the collisions among the shared mediums.
No station can send the data unless it has been authorized by the other stations.
The protocols lies under the category of Controlled access are as follows:
Reservation
Polling
Token Passing
Also, in each interval, a reservation frame precedes the data frame that is sent in
that interval.
Suppose if there are 'N' stations in the system in that case there are exactly 'N'
reservation minislots in the reservation frame; where each minislot belongs to a
station.
Whenever a station needs to send the data frame, then the station makes a
reservation in its own minislot.
Then the stations that have made reservations can send their data after the
reservation frame.
The Primary device mainly controls the link while the secondary device follows
the instructions of the primary device.
In case if primary devices want to receive the data, then it usually asks the
secondary devices if they have anything to send. This is commonly known
as Poll Function.
When the primary device is ready to receive the data then it must
ask(poll) each secondary device in turn if it has anything to send.
If the secondary device has data to transmit then it sends the data frame,
otherwise, it sends a negative acknowledgment (NAK) After that in case of
the negative response, the primary then polls the next secondary, in the
same manner until it finds the one with the data to send. When the primary
device received a positive response that means (a data frame), then the
primary devices reads the frame and then returns an acknowledgment
(ACK )frame,.
CSC 329 Chapter 1 Fundamental concepts of computer networks.
1.35
CSC 329 Chapter 1 Fundamental concepts of computer networks.
1.36
Token Passing
In the token passing methods, all the stations are organized in the form of a logical
ring. We can also say that for each station there is a predecessor and a successor.
The predecessor is the station that is logically before the station in the ring; while
the successor is the station that is after the station in the ring. The station that is
accessing the channel now is the current station.
Basically, a special bit pattern or a small message that circulates from one station
to the next station in some predefined order is commonly known as a token.
Possessing the token mainly gives the station the right to access the channel and
to send its data.
When any station has some data to send, then it waits until it receives a token
from its predecessor. After receiving the token, it holds it and then sends its data.
When any station has no more data in order to send then it releases the token and
then passes the token to the next logical station in the ring.
The performance of a token ring is governed by 2 parameters, which are delay and
throughput.
Delay is a measure of the time; it is the time difference between a packet ready for
transmission and when it is transmitted. Hence, the average time required to send a
token to the next station is a/N.
When a sender and receiver have a dedicated link to transmit data packets,
the data link control is enough to handle the channel. Suppose there is no
dedicated path to communicate or transfer the data between two devices. In
that case, multiple stations access the channel and simultaneously transmits
the data over the channel. It may create collision and cross talk. Hence, the
multiple access protocol is required to reduce the collision and avoid
crosstalk between the channels.
Aloha
CSMA
CSMA/CD
CSMA/CA
CSC 329 Chapter 1 Fundamental concepts of computer networks.
1.41
ALOHA Random Access Protocol
It is designed for wireless LAN (Local Area Network) but can also be used
in a shared medium to transmit data. Using this method, any station can
transmit data across a network simultaneously when a data frameset is
available for transmission.
Aloha Rules
When any station transmits the data frame to a channel, the pure Aloha
waits for the receiver's acknowledgment. If it does not acknowledge the
receiver end within the specified time, the station waits for a random
amount of time, called the backoff time (Tb).
And the station may assume the frame has been lost or destroyed.
Therefore, it retransmits the frame until all the data are successfully
transmitted to the receiver
Whenever two frames fall on a shared channel simultaneously, collisions can occur,
and both will suffer damage. If the new frame's first bit enters the channel before
finishing the last bit of the second frame. Both frames are completely finished, and
both stations must retransmit the data frame.
And if the stations are unable to send data to the beginning of the slot, the
station will have to wait until the beginning of the slot for the next time.
However, the possibility of a collision remains when trying to send a frame
at the beginning of two or more station time slot.
Ethernet is classified into two categories: classic Ethernet and switched Ethernet.
Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps.
The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10
Mbps, BASE denoted use of baseband transmission, and X is the type of medium used.
Most varieties of classic Ethernet have become obsolete in present communication scenario.
A switched Ethernet uses switches to connect to the stations in the LAN. It replaces the repeaters
used in classic Ethernet and allows full bandwidth utilization.
IEEE 802.3a: This gave the standard for thin coax (10BASE-2), which is a thinner variety
where the segments of coaxial cables are connected by BNC connectors. The 2 refers to the
maximum segment length of about 200m (185m to be precise).
IEEE 802.3i: This gave the standard for twisted pair (10BASE-T) that uses unshielded twisted
pair (UTP) copper wires as physical layer medium. The further variations were given by IEEE
802.3u for 100BASE-TX, 100BASE-T4 and 100BASE-FX.
IEEE 802.3i: This gave the standard for Ethernet over Fiber (10BASE-F) that uses fiber optic
cables as medium of transmission.
Start of Frame Delimiter: It is a 1 byte field in a IEEE 802.3 frame that contains an alternating
pattern of ones and zeros ending with two ones.
Source Address: It is a 6 byte field containing the physical address of the sending station.
Length: It a 7 bytes field that stores the number of bytes in the data field.
Data: This is a variable sized field carries the data from the upper layers. The maximum size
of data field is 1500 bytes.
Padding: This is added to the data to bring its length to the minimum requirement of 46 bytes.
CRC: CRC stands for cyclic redundancy check. It contains the error detection information.
IEEE 802.11 was the original version released in 1997. It provided 1 Mbps or 2 Mbps data
rate in the 2.4 GHz band and used either frequency-hopping spread spectrum (FHSS) or
direct-sequence spread spectrum (DSSS). It is obsolete now.
IEEE 802.11a
Further amendments to 802.11b are 802.11ba, 802.11bb, 802.11bc, 802.11bd and 802.11be.
IEEE 802.11g
802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and provides a
average throughput of 22 Mbps. It uses OFDM technique (as in 802.11a). It is fully backward
compatible with 802.11b. 802.11g devices also faces interference from other devices operating
in 2.4 GHz band.
The frame or packet reaches the next station according to the sequence of the ring.
Whether the frame contains a message addressed to them is determined by the current node.
If yes, then the message is removed by the node from the frame. If not, then there is an empty
frame(an empty frame is called the token frame).
A Station that has the token frame, only has the access to transfer the data. If it has data then
insert that data into the token frame otherwise release that token for the next station. The next
station picks up that token frame for further transmission.
For the avoidance of network congestion, token rings allow only one device to be active at a
time. The above steps are repeated by all the stations present in the token ring network. The
size of the token is 3 bytes and it has a start and end delimiter that defines the beginning and
the ending of the frame. It also has an access control byte within it. 4,500 bytes can be the
maximum possible size of the data portion.
Advantages of FDDI
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are
completely unaware of the bridge’s existence i.e. whether or not a bridge is
added or deleted from the network, reconfiguration of the stations is
unnecessary. These bridges make use of two processes i.e. bridge
forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is
performed by the source station and the frame specifies which route to
follow. The host can discover the frame by sending a special frame called
the discovery frame, which spreads through the entire network using all
possible paths to the destination.
8. NIC – NIC or network interface card is a network adapter that is used to connect
the computer to the network. It is installed in the computer to establish a LAN. It
has a unique id that is written on the chip, and it has a connector to connect the
cable to it. The cable acts as an interface between the computer and the router or
modem. NIC card is a layer 2 device.