Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): frame format and specifications, Wireless LAN’s – 802.11x, 802.3 Bluetooth etc.
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol
Mature Packet Switching Protocols:ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and
Drawbacks
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol, Mature Packet Switching Protocols: ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and Drawbacks
The document provides an overview of wide area network (WAN) technologies and routing concepts. It defines static and dynamic routing, and covers common dynamic routing protocols like RIP and OSPF. The document also describes WAN technologies such as X.25, Frame Relay, ATM, SONET/SDH, FDDI, DSL, broadband cable, and POTS/PSTN. It provides details on T-carrier systems and their international counterparts. The summary concludes with resources for additional learning on networking fundamentals and the MTA 98-366 exam.
This document provides an overview of wide area network (WAN) technologies and routing. It defines routing as managing data flow between network segments and hosts. Routers use routing tables and IP addresses to determine the path for sending data. Dynamic routing protocols like RIP and OSPF dynamically determine routes and update them when network changes occur. Common WAN technologies discussed include Frame Relay, X.25, ATM, SONET, FDDI, and various types of DSL. The document also covers topics like interior gateway protocols, exterior gateway protocols, virtual circuits, and leased lines.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
X.25 is a protocol standard developed in the 1970s for wide area network communications. It defines how connections are established and maintained between user devices and network devices. X.25 operates at the physical, data link, and network layers of the OSI model. It uses LAPB at the data link layer and PLP at the network layer to transfer data and establish virtual circuits between DTE devices across a packet switched network. Frame Relay was developed later to provide higher speeds and efficiency compared to X.25.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
The document discusses communications and network security basics including telecommunications, protocols, network architectures, and the OSI model. It provides an overview of each layer of the OSI model and how data is encapsulated as it moves through the layers. Key concepts covered include TCP/IP, IPv4 and IPv6 addressing, tunneling methods, wired transmission types, cable types, and plenum cable requirements.
A WAN is a network that covers a broad geographic area using multiple interconnected networks. The largest WAN is the Internet, which many organizations use to connect distributed sites. WANs transmit data over various technologies including telephone networks, wireless networks, fiber optic networks and protocols like Frame Relay and ATM. Error correction is important in WANs to ensure reliable data transmission over long distances between sites.
Network protocols are sets of rules that allow devices to communicate over a network by standardizing how data is transmitted and received. They provide a common language that defines formatting, transmission, and reception of data so that devices can interact regardless of differences in infrastructure, design, or standards. For communication to occur, both sending and receiving devices must support and follow the same protocol conventions. Standard network protocols enable connectivity for virtually all network users.
The transport layer provides end-to-end communication over a network by providing services such as connection-oriented communication, reliability, flow control, and multiplexing. It links the application layer to the network layer and performs functions like segmenting messages and establishing connections between endpoints. Common transport protocols are TCP, which provides connection-oriented and reliable data transfer, and UDP, which provides connectionless datagram delivery.
Presentation of computer network on data link layersumit gyawali
The document presents information on the data link layer and services provided by the link layer. It discusses how the data link layer transfers data between network layers on different machines, divides data into frames, and adds headers for physical addressing. It describes three main services provided - unacknowledged connectionless, acknowledged connection-oriented, and acknowledged connectionless. Finally, it outlines how the data link layer is implemented using network interface cards that handle framing, linking, flow control, and error detection.
This document discusses network protocols and structure. It defines what a network protocol is and describes some common protocols like Ethernet, Token Ring, FDDI, and ATM. It also discusses different types of network models and structures including local area networks (LANs), personal area networks (PANs), home area networks (HANs), wide area networks (WANs), campus networks, metropolitan area networks, virtual private networks (VPNs), backbone networks, and global area networks (GANs). Finally, it covers different network topologies like bus, star, mesh, and ring topologies.
This document discusses network protocols, structure, and scope. It defines what a network protocol is and describes some common protocols like Ethernet, Token Ring, FDDI, and ATM. It also discusses different types of network structures including peer-to-peer and client-server models, and various network topologies like bus, star, ring, and mesh. Finally, it covers the scope of different network types including local area networks (LANs), personal area networks (PANs), home area networks (HANs), wide area networks (WANs), campus networks, metropolitan area networks (MANs), virtual private networks (VPNs), backbone networks, and global area networks (GANs).
The document discusses network models and protocol layering. It describes the OSI model which divides network communication tasks into 7 layers - physical, data link, network, transport, session, presentation, and application layer. It also describes the TCP/IP protocol suite which has 5 layers - physical, data link, internet, transport, and application layer. The layers define standardized services and protocols to enable communication between systems and applications.
This document provides information on various intranet, extranet, and wide area network (WAN) technologies. It discusses unified threat management (UTM), content distribution networks (CDN), software-defined networking (SDN), metropolitan area networks (MAN), and common WAN concepts and technologies including CSU/DSU, switching, frame relay, X.25, and asynchronous transfer mode (ATM).
Frame Relay is a packet-switching protocol used to transmit data over wide area networks in an efficient manner. It segments data into variable length frames and leaves error correction to end points, allowing for faster transmission. Frame Relay provides permanent virtual circuits to make connections appear dedicated while allowing dynamic routing of frames.
Client Server Network and Peer to Peer.pptxDevChaudhari17
The document discusses different network models and their key differences. A client-server network uses centralized servers to store data and respond to client requests. In a peer-to-peer network, each node acts as both a client and server by sharing its own resources and consuming resources from other nodes. The document also covers congestion in networks and different techniques for congestion control, including open loop methods like adjusting transmission policies and closed loop methods that react to congestion like backpressure.
A computer network allows computers to share resources and exchange information. There are several types of networks including local area networks (LANs) within a building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) that span large geographical areas. Networks provide benefits like resource sharing, reliability, reduced costs, and improved communication. They connect using various wired and wireless technologies and different network topologies.
This document provides an overview of networking fundamentals. It defines a computer network and describes how networks allow users to communicate by transmitting data over connecting cables. The document then discusses key network concepts like file and print sharing, email services, directory services, and the internet. It also covers network administration, transmission types, common network types (LANs and WANs), network interface cards, IP addressing, topologies and physical components like cabling. Finally, it provides details on Ethernet and Token Ring network architectures.
A presentation is a means of communication that can be adapted to various speaking situations, such as talking to a group, addressing a meeting or briefing a team.
Presentations are typically demonstrations, introduction, lecture, or speech meant to inform, persuade, inspire, motivate, build goodwill, or present a new idea/product. Presentations usually require preparation, organization, event planning, writing, use of visual aids, dealing with stress, and answering questions.A job description section on your resume shows the prospective employers your past work experience, as well as your skills and accomplishments. When writing a work experience section, focus on your skills and achievements, rather than your duties and responsibilities. This section typically includes a quick overview of the job seeker's most relevant qualifications
The OSI model is a conceptual framework that characterizes networking functions into 7 layers - physical, data link, network, transport, session, presentation and application. Each layer has a specific role, with the physical layer defining physical connections and signals and the application layer supporting file transfer, email and directories. Data moves down from the application layer through each layer, with each adding information like headers for routing. This allows interoperability between different network products and software.
This document provides an overview of networking fundamentals including defining computer networks, types of networks like peer-to-peer and client/server, local and wide area networks, network interface cards, physical components like cabling and devices, and network architectures like Ethernet and Token Ring. Key points covered include how networks allow file sharing, printing, and communication between devices, examples of networking media and common devices, and standards for networking protocols and architectures.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
Similar to Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): frame format and specifications, Wireless LAN’s – 802.11x, 802.3 Bluetooth etc. (20)
The document discusses communications and network security basics including telecommunications, protocols, network architectures, and the OSI model. It provides an overview of each layer of the OSI model and how data is encapsulated as it moves through the layers. Key concepts covered include TCP/IP, IPv4 and IPv6 addressing, tunneling methods, wired transmission types, cable types, and plenum cable requirements.
A WAN is a network that covers a broad geographic area using multiple interconnected networks. The largest WAN is the Internet, which many organizations use to connect distributed sites. WANs transmit data over various technologies including telephone networks, wireless networks, fiber optic networks and protocols like Frame Relay and ATM. Error correction is important in WANs to ensure reliable data transmission over long distances between sites.
Network protocols are sets of rules that allow devices to communicate over a network by standardizing how data is transmitted and received. They provide a common language that defines formatting, transmission, and reception of data so that devices can interact regardless of differences in infrastructure, design, or standards. For communication to occur, both sending and receiving devices must support and follow the same protocol conventions. Standard network protocols enable connectivity for virtually all network users.
The transport layer provides end-to-end communication over a network by providing services such as connection-oriented communication, reliability, flow control, and multiplexing. It links the application layer to the network layer and performs functions like segmenting messages and establishing connections between endpoints. Common transport protocols are TCP, which provides connection-oriented and reliable data transfer, and UDP, which provides connectionless datagram delivery.
Presentation of computer network on data link layersumit gyawali
The document presents information on the data link layer and services provided by the link layer. It discusses how the data link layer transfers data between network layers on different machines, divides data into frames, and adds headers for physical addressing. It describes three main services provided - unacknowledged connectionless, acknowledged connection-oriented, and acknowledged connectionless. Finally, it outlines how the data link layer is implemented using network interface cards that handle framing, linking, flow control, and error detection.
This document discusses network protocols and structure. It defines what a network protocol is and describes some common protocols like Ethernet, Token Ring, FDDI, and ATM. It also discusses different types of network models and structures including local area networks (LANs), personal area networks (PANs), home area networks (HANs), wide area networks (WANs), campus networks, metropolitan area networks, virtual private networks (VPNs), backbone networks, and global area networks (GANs). Finally, it covers different network topologies like bus, star, mesh, and ring topologies.
This document discusses network protocols, structure, and scope. It defines what a network protocol is and describes some common protocols like Ethernet, Token Ring, FDDI, and ATM. It also discusses different types of network structures including peer-to-peer and client-server models, and various network topologies like bus, star, ring, and mesh. Finally, it covers the scope of different network types including local area networks (LANs), personal area networks (PANs), home area networks (HANs), wide area networks (WANs), campus networks, metropolitan area networks (MANs), virtual private networks (VPNs), backbone networks, and global area networks (GANs).
The document discusses network models and protocol layering. It describes the OSI model which divides network communication tasks into 7 layers - physical, data link, network, transport, session, presentation, and application layer. It also describes the TCP/IP protocol suite which has 5 layers - physical, data link, internet, transport, and application layer. The layers define standardized services and protocols to enable communication between systems and applications.
This document provides information on various intranet, extranet, and wide area network (WAN) technologies. It discusses unified threat management (UTM), content distribution networks (CDN), software-defined networking (SDN), metropolitan area networks (MAN), and common WAN concepts and technologies including CSU/DSU, switching, frame relay, X.25, and asynchronous transfer mode (ATM).
Frame Relay is a packet-switching protocol used to transmit data over wide area networks in an efficient manner. It segments data into variable length frames and leaves error correction to end points, allowing for faster transmission. Frame Relay provides permanent virtual circuits to make connections appear dedicated while allowing dynamic routing of frames.
Client Server Network and Peer to Peer.pptxDevChaudhari17
The document discusses different network models and their key differences. A client-server network uses centralized servers to store data and respond to client requests. In a peer-to-peer network, each node acts as both a client and server by sharing its own resources and consuming resources from other nodes. The document also covers congestion in networks and different techniques for congestion control, including open loop methods like adjusting transmission policies and closed loop methods that react to congestion like backpressure.
A computer network allows computers to share resources and exchange information. There are several types of networks including local area networks (LANs) within a building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) that span large geographical areas. Networks provide benefits like resource sharing, reliability, reduced costs, and improved communication. They connect using various wired and wireless technologies and different network topologies.
This document provides an overview of networking fundamentals. It defines a computer network and describes how networks allow users to communicate by transmitting data over connecting cables. The document then discusses key network concepts like file and print sharing, email services, directory services, and the internet. It also covers network administration, transmission types, common network types (LANs and WANs), network interface cards, IP addressing, topologies and physical components like cabling. Finally, it provides details on Ethernet and Token Ring network architectures.
A presentation is a means of communication that can be adapted to various speaking situations, such as talking to a group, addressing a meeting or briefing a team.
Presentations are typically demonstrations, introduction, lecture, or speech meant to inform, persuade, inspire, motivate, build goodwill, or present a new idea/product. Presentations usually require preparation, organization, event planning, writing, use of visual aids, dealing with stress, and answering questions.A job description section on your resume shows the prospective employers your past work experience, as well as your skills and accomplishments. When writing a work experience section, focus on your skills and achievements, rather than your duties and responsibilities. This section typically includes a quick overview of the job seeker's most relevant qualifications
The OSI model is a conceptual framework that characterizes networking functions into 7 layers - physical, data link, network, transport, session, presentation and application. Each layer has a specific role, with the physical layer defining physical connections and signals and the application layer supporting file transfer, email and directories. Data moves down from the application layer through each layer, with each adding information like headers for routing. This allows interoperability between different network products and software.
This document provides an overview of networking fundamentals including defining computer networks, types of networks like peer-to-peer and client/server, local and wide area networks, network interface cards, physical components like cabling and devices, and network architectures like Ethernet and Token Ring. Key points covered include how networks allow file sharing, printing, and communication between devices, examples of networking media and common devices, and standards for networking protocols and architectures.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...Infopitaara
A feed water heater is a device used in power plants to preheat water before it enters the boiler. It plays a critical role in improving the overall efficiency of the power generation process, especially in thermal power plants.
🔧 Function of a Feed Water Heater:
It uses steam extracted from the turbine to preheat the feed water.
This reduces the fuel required to convert water into steam in the boiler.
It supports Regenerative Rankine Cycle, increasing plant efficiency.
🔍 Types of Feed Water Heaters:
Open Feed Water Heater (Direct Contact)
Steam and water come into direct contact.
Mixing occurs, and heat is transferred directly.
Common in low-pressure stages.
Closed Feed Water Heater (Surface Type)
Steam and water are separated by tubes.
Heat is transferred through tube walls.
Common in high-pressure systems.
⚙️ Advantages:
Improves thermal efficiency.
Reduces fuel consumption.
Lowers thermal stress on boiler components.
Minimizes corrosion by removing dissolved gases.
The role of the lexical analyzer
Specification of tokens
Finite state machines
From a regular expressions to an NFA
Convert NFA to DFA
Transforming grammars and regular expressions
Transforming automata to grammars
Language for specifying lexical analyzers
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxRishavKumar530754
LiDAR-Based System for Autonomous Cars
Autonomous Driving with LiDAR Tech
LiDAR Integration in Self-Driving Cars
Self-Driving Vehicles Using LiDAR
LiDAR Mapping for Driverless Cars
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
Common Network Architecture: X.25 Networks, Ethernet (Standard and Fast): frame format and specifications, Wireless LAN’s – 802.11x, 802.3 Bluetooth etc.
2. Connection oriented Vs Connection less network
Connection-Oriented means that when devices
communicate, they perform handshaking to set up
an end-to-end connection.
In connectionless design every packet is addressed
and routed independently.
3. Connection oriented Protocols
Characteristics:
1. Handshaking (Setting up connection) between
communicating devices. Connections sometimes
are called as sessions, virtual circuits or logical
connections.
2. Acknowledgement procedure. This provides a
high level of network reliability.
3. It provides means of error control. Whenever
receiving station found that received data packet
consist of errors it request sender to retransmit that
packet.
4. It is a uni-cast (point-to-point) operation.
4. •Connection-oriented
• Setup data transfer ahead of time (through
handshaking)
• Internet’s connection-oriented service is TCP
(Transmission Control Protocol). It provides :
• reliable, in-order byte delivery
• flow control
• congestion control.
• Applications using TCP: Email (SMTP), web browsing
(HTTP), and file transfer (FTP)
5. Connectionless (Stateless) Protocols
Characteristics:
• It sends data with a source and destination
address without a handshake.
• Do not use any acknowledgment procedure.
• Usually do not support error control.
• Connectionless protocols are more efficient
than that of connection oriented protocols.
• It allows multicast and broadcast operations.
6. •Connectionless
Internet’s connectionless service is UDP (User
Datagram Protocol) . It provides
unreliable data transfer
no flow control
no congestion control
Applications using UDP: streaming media, video
conferencing, and IP telephony
7. A comparison of Connection-Oriented and Connectionless Network
8. Peer-to-Peer Network
• A peer-to-peer network is a distributed network
architecture composed of participants that make a
portion of their resources, such as processing power,
disk storage or network bandwidth directly to network
participants without the need for central coordination
instances.
• Used largely for sharing of content files such as audio,
video, data or anything in a digital format.
• Can be very large
9. • End-systems (or peers), are capable of behaving
as clients and servers of data, hence system is
scalable and reliable
• Peers participation is voluntary, membership is
dynamic, hence topology keeps changing
• Most popularly used for file sharing, hence peer-
to-peer systems have become synonymous with
peer-to-peer file sharing networks
Peer-to-Peer Network
10. A Peer
• Peers are both suppliers and consumers
while in the traditional client-server model,
the server supplies while the client only
consumes.
12. Advantages
• The more nodes that are part of the system,
demand increases and total capacity of the
system also increases. Where in client-server
network architectures as more clients are
added to the system, the system resources
decreases.
• There is no single point of failure, due to
robustness of the system.
• All clients provide to the system
13. Disadvantages
• Security is a major concern, not all shared files
are from beginning sources. Attackers may add
malware to p2p files as an attempt to take
control of other nodes in the network.
• Heavy bandwidth usage
• ISP speeding/slowing of P2P traffic.
• Potential legal/moral concerns
14. CO Vs. CL
• In connection oriented service authentication is
needed while connectionless service does not need
any authentication.
• Connection oriented protocol makes a connection
and checks whether message is received or not and
sends again if an error occurs connectionless service
protocol does not guarantees a delivery.
• Connection oriented service is more reliable than
connectionless service.
• Connection oriented service interface is stream
based and connectionless is message based.
15. Service Primitives
• A service is specified by a set of primitives. A
primitive means operation. To access the
service a user process can access these
primitives.
• These primitives are different for connection
oriented service and connectionless service.
16. • LISTEN : When a server is ready to accept an incoming
connection it executes the LISTEN primitive. It blocks waiting
for an incoming connection.
• CONNECT : It connects the server by establishing a
connection. Response is awaited.
• RECIEVE: Then the RECIEVE call blocks the server.
• SEND : Then the client executes SEND primitive to transmit its
request followed by the execution of RECIEVE to get the reply.
Send the message.
• DISCONNECT : This primitive is used for terminating the
connection. After this primitive one can’t send any message.
When the client sends DISCONNECT packet then the server
also sends the DISCONNECT packet to acknowledge the client.
When the server package is received by client then the process is
terminated.
Connection Oriented Service Primitives
17. Primitives for Connectionless Oriented Service
• UNIDATA - This primitive sends a packet of data
• FACILITY, REPORT - Primitive for enquiring
about the performance of the network, like
delivery statistics.
18. X.25 Networks
• X.25 is a standard used by many older public
networks specially outside the U.S.
• This was developed by CCITT for providing an
interface between public packet-switched
network and their customers.
• The packet switching networks use X.25 protocol
. The X.25 recommendations were first prepared
in 1976 and then revised in 1978, 1980 and 1984.
• X.25 was developed for computer connections,
used for terminal/timesharing connection.
19. X.25 Networks
• This protocol is based on the protocols used in
early packet switching networks such as
ARPANET, DATAPAC, and TRANSPAC etc.
• A protocol X.21 which is a physical layer
protocol is used to specify the physical electrical
and procedural interface between the host and
network.
• The problem with this standard is that it needs
digital signal rather than analog signals on
telephone lines.
20. • So not many networks support this standard.
Instead RS 232 standard is defined.
• The data link layer standard has a number of
variations. It is designed for error detection and
corrections.
• The network layer protocol performs the
addressing, flow control, delivery confirmation etc.
• It allows the user to establish virtual circuits and
send packets on them. These packets are delivered
to the destination reliably and in order.
• X.25 is a connection oriented service. It supports
switched virtual circuits as well as the permanent
circuits.
21. • Packet Switching is a technique whereby the
network routes individual packets of HDLC data
between different destinations based on addressing
within each packet.
• A switched virtual circuit is established between a
computer and network when the computer sends a
packet to the network requesting to make a call to
other computer.
• Packets can then be sent over this connection from
sender to receiver.
• X.25 provides the flow control, to avoid a fast
sender overriding a slow or busy receiver.
22. • A permanent virtual circuit is analogous to-a leased
line. It is set up in advance with a mutual agreement
between the users.
• Since it is always present, no call set up is required
for its use.
• In order to allow the computers which do not use the
X.25 to communicate with the X.25 network a packet
assembler dis-assembler (PAD) is used.
• PAD is required to be installed along with each
computer which does not use X.25.
• X.25 defines the interface for exchange of packets
between a DTE and switch data sub-network node.
23. • X.25 Most widely used today
• X.25 is an interface between DTE ( Data Terminal
Equipment) and DCE (Data Communication
Equipment) for terminal operation at the packet mode
on public data network.
– A packet switching protocol used in a wide area
network
– use virtual circuit and asynchronous TDM
24. • DTE stands for Data Terminal Equipment,
and DCE stands for Data Communications
Equipment.
• DTE is typically either a dumb terminal or the
serial port on a computer/workstation.
• DCE is typically a modem, or other piece of data
communications equipment, hence the names.
25. Three Layers of X.25
The X.25 interface is defined at three levels:
The three levels are:
(i) Physical layer (level 1)
(ii) Data link layer (level 2)
(iii) Packet layer (level 3).
28. • These three layers correspond to the three lower
most layers of the ISO-OSI reference model. The
physical layer takes care of the interface between
a computer terminal and the link which attaches it
to the packet switching node.
• The X.25 defines the interface for exchange of
packets between the user's machine (DTE- Data
Terminal Equipment) and the packet switching
node to which this DTE is attached which is
called as DCE(Data Circuit Terminating
Equipment).
29. • The three layers of X.25 interface are as
shown in Fig..
• At the physical level X.21 physical interface is
being used which is defined for circuit
switched data network. At the data link level,
X.25 specifies the link access procedure-B
(LAP-B) protocol.
31. • At the network level (3rd
level), X.25 defines a
protocol for an access to packet data subnetwork.
• This protocol defines the format, content and
procedures for exchange of control and data
transfer packets. The packet layer provides an
external virtual circuit service.
• Next Fig. shows the relationship between the
levels of x.25. User data is passed down to X.25
level 3.
• This data then appends the control information as
a header to form a packet. This control information
is then used in the operation of the protocol.
33. • The entire X.25 packet formed at the packet level
is then passed down to the second layer i.e. the
data link layer.
• The control information is appended at the front
and back of the packet forming a LAP-B frame.
The control information in LAP-B frame is
needed for the operation of the LAP-B protocol.
• This frame is then passed to the physical layer
for transmission.
34. Packet Layer Protocol
• PLP packets : Information packets and Control packets
• Information Packets (I-packets)
– transmit user data
– consists of a header and a user data field
– short and long packets: long packets to support
facilities with long delays
– The last bit in the header = 0 for I-packets
35. Packet Layer Protocol
• I-packet fields
– General format identifier (GFI) field: 4 bits
• Q bit : not defined in the standard. Users define
two types of data.
• D bit: for packet sequencing.
• Mod: the length of the header. (01: the header
short, 10: long)
– Virtual circuit identification fields
• Logical channel group number (LCGN) : 4 bits
• Logical channel number (LCN) : 8 bits
• total 12 bits to identify the virtual circuit for a
transmission
36. Packet Layer Protocol
• I-packet fields
• P(S) and P(R) : packet sequence numbers for
flow and error control
• P(S) for packet send, P(R) for packet receive:
sliding window ARQ
37. Packet Layer Protocol
• Control Packets (C-packets)
~ flow and error control
~ connection, termination and management control
– Category I (for flow and error control)
• RR: Receive Ready - the station is ready to
receive more packets
• RNR: Receive Not Ready
• REJ: Reject - an error in the packet (go-back-n
ARQ)
38. Packet Layer Protocol
• Control Packet (C-packet)
– Category II
• for connection, termination and management control
• control packet types
39. Control Packets
• Category II
– Call Request/Incoming Call
• request the establishment of a connection between
two DTEs
– Call Accepted/Call Connected
• indicate the acceptance of the requested connection
by the called system
40. Control Packets
• Category II (cont’d)
– Clear Request/Clear Indication
• to disconnect the connection at the end of an exchange
– Clear Confirm
• sent in response to the clear indication
– and More...
41. Packet Layer Protocol
• Complete Packet Sequence
– A message size may be too small or too large for
a network and not compatible with a network.
– X.25 mechanism to break up a long message
among multiple packets but still keep those
packets as a single contiguous transmission
– A packets: at least one additional packets needed
to carry the remainder of a message (M=1,D=0)
- B packets: either stand alone or final packet
(M=0, D=1)
– final packet in the sequence need
ACK( M=1,D=1)
43. Packet Layer Protocol
• Virtual Channel ID Numbers
– up to 4096 multiplexed channels to be identified
between each DTE and DCE
– not permanent, allocated dynamically
– the calling and called hosts use different numbers
44. Virtual Circuit Service
• With the X.25 packet layer, data are
transmitted in packets over external virtual
circuits, The virtual circuit service of X.25
provides for two types of virtual circuits.
• The virtual circuit service of X.25 provides for
two types of virtual circuits i.e. "virtual call"
and "permanent virtual circuit".
45. Virtual Circuit Service
• A virtual call is a dynamically established
virtual circuit using a call set up and call
clearing procedure.
• A permanent virtual circuit is a fixed, network
assigned virtual circuit. Data transfer takes
place as with virtual calls, but no call set up or
clearing is required.
46. Characteristics of X.25
• Multiple logical channels can be set on a single
physical line
• Terminals of different communication speeds can
communicate
• The procedure for transmission controls can be
changed.