This document discusses the Internet Protocol (IP) version 4 and 6. It describes the key tasks of IP including addressing computers and fragmenting packets. IP version 4 uses 32-bit addresses while IP version 6 uses 128-bit addresses and has improvements like larger address space and better security. The document also covers IP address classes, private addressing, subnetting, Classless Inter-Domain Routing (CIDR), and address blocks.
Hub, switch, router, bridge & and repeaterMaksudujjaman
This document provides descriptions of various networking devices including hubs, switches, routers, bridges, and repeaters. It explains that hubs connect multiple devices but do not filter data or determine the best path for data packets. Switches maintain a list of network addresses and transmit data packets to the correct port, allowing for faster transmission speeds than hubs. Routers route data packets based on IP addresses and connect local and wide area networks. Bridges divide large networks into smaller segments and connect different network types/architectures. Repeaters regenerate weak signals to extend transmission distances but do not amplify signals.
There are two main types of routing protocols: distance vector protocols like RIP and IGRP that determine the best path based on hop count and send the full routing table, and link state protocols like OSPF and IS-IS that advertise link information to build a shared topology database and converge faster. EIGRP is a hybrid protocol that behaves like a distance vector protocol. Interior routing protocols like these are used within an autonomous system, while exterior protocols like BGP route between autonomous systems.
The document discusses network layer concepts including packet switching, IP addressing, and fragmentation. It provides details on:
- Packet switching breaks data into packets that are routed independently and reassembled at the destination. This allows for more efficient use of bandwidth compared to circuit switching.
- IP addresses in IPv4 are 32-bit numbers that identify devices on the network. Addresses are expressed in decimal notation like 192.168.1.1. Fragmentation breaks packets larger than the MTU into smaller fragments for transmission.
This document discusses subnetting and provides examples. It describes subnetting as breaking up a large network into smaller subnets. Subnetting allows creating multiple networks from a single address block and maximizes addressing efficiency. The document then provides examples of subnetting a network using CIDR notation and calculating the number of subnets, hosts per subnet, valid IP ranges, and broadcast addresses. It also discusses an example of optimally subnetting the IP addresses needed across different departments within a university based on their host requirements.
Packet switching and circuit switching are two different technologies for sending messages over networks. Packet switching breaks messages into packets that can take different routes to the destination, while circuit switching establishes a dedicated connection for the duration of the call. Each approach has advantages - packet switching uses bandwidth efficiently but can experience delays, while circuit switching guarantees quality but is inefficient. Modern networks are shifting more towards packet switching as it allows for easier scaling.
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
Network Layer addresses data at the logical and physical levels. Logical addresses are generated by CPUs and allow virtual addressing, while physical addresses map to specific memory locations. The network layer provides routing across multiple physical links from one device to another. IP addresses uniquely identify devices on the Internet, though they can change over time as connections change. IPv6 was developed to address the impending exhaustion of IPv4 addresses by expanding the address space to 128 bits.
The document discusses Ethernet networking technologies. It describes how Ethernet was developed in the 1970s and standardized. It outlines the evolution of Ethernet speeds from 2Mbps to 1Gbps. It discusses the physical layer standards for 10BaseT, 100BaseT, 1000BaseT, and 10GBase networking. It also provides an overview of Token Ring and FDDI technologies, including their operation, standards, and key features.
This document provides an introduction and overview of IPv6, including:
- IPv6 is the next generation internet protocol that will replace IPv4, providing a vastly larger address space and additional features.
- The key reasons for adopting IPv6 are that IPv4 addresses are running out due to the exponential growth of internet-connected devices, while IPv6 supports 128-bit addresses providing trillions of times more addresses.
- IPv6 addresses are 128-bit compared to 32-bit IPv4 addresses, written in hexadecimal format divided into eight groups, and features include improved security, mobility, and traffic routing capabilities.
Easy IP Addressing and Subnetting Manual for StartersS Khawaja
This document provides an introduction to IP addressing concepts such as binary to decimal conversion, public and private IP addresses, and classes of IP addresses. It explains that an IP address identifies a node on a network and allows communication between nodes. It also describes the classes of IP addresses (A, B, C, D, E), noting that classes A, B, and C are most commonly used and define ranges for the number of allowed hosts and networks. The document then provides details on class A, B, and C IP addresses and how they divide the available addresses.
Ethernet is a wired network technology that transmits data between local and wide area networks using protocols. It provides high-speed, secure data transmission. There are different types including Fast Ethernet for personal connections up to 100 Mbps and Gigabit Ethernet from 1000 Mbps to 1 Gbps. Ethernet operates in the physical and data link layers using MAC addresses and frames to transmit packets between sender and receiver systems while checking for errors. It has advantages like low cost and high security but disadvantages as unsuitable for long distances or real-time applications. Ethernet uses wired connections for shorter distance networks versus Internet's wireless global connections.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
The document summarizes key concepts in mobile ad hoc networks (MANETs) and vehicular ad hoc networks (VANETs). It discusses routing protocols for MANETs such as DSDV, CGSR, AODV and DSR. It then covers challenges and security requirements for VANETs, including message authentication, non-repudiation, and privacy. The system model involves vehicles, roadside infrastructure, and authorities communicating through frequent broadcast messages with time sensitivity.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
The document discusses various medium access control protocols for local area networks:
1. Static channel allocation protocols like Frequency-Division Multiplexing (FDM) can waste bandwidth if the number of users is not exactly equal to the number of allocated channels.
2. Dynamic channel allocation protocols do not pre-allocate channels. The ALOHA and CSMA protocols allow nodes to transmit whenever the channel is sensed to be idle, which can still result in collisions.
3. Slotted ALOHA improves on pure ALOHA by only allowing transmissions to start at discrete time slots, doubling its maximum throughput. Carrier sensing in CSMA helps reduce but does not eliminate the possibility of collisions.
TCP/IP is a set of protocols that defines how data is transmitted and formatted so that networked systems can communicate. It originated from ARPAnet, which was developed by the Department of Defense to create a decentralized network resilient to attacks. TCP/IP provides logical addressing, routing between networks, name resolution from names to addresses, error checking and flow control for reliable data transmission, and support for multiple applications simultaneously through the use of ports. It is overseen by various standards organizations to ensure interoperability.
The document compares peer-to-peer and client-server networks. In peer-to-peer networks, all computers share equal responsibility for processing data, while in client-server networks certain devices serve data and others act as clients. Peer-to-peer networks are commonly used for home networks and allow easy sharing of files and printers between devices. However, peer-to-peer networks can slow performance and lack centralized backup and security. Client-server networks have more advanced security, centralized data storage, and mature technologies, but if the server crashes all connected devices cannot access resources.
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact [email protected]
mob. no-7023419969
The document compares Layer 2 and Layer 3 switching. Layer 2 switching uses MAC addresses to forward frames within a broadcast domain, while Layer 3 switching uses IP addresses to forward packets, allowing for greater scalability and security. Some benefits of Layer 2 switching include hardware-based bridging and high speeds, while benefits of Layer 3 switching include scalability, security, QoS, and lower latency.
Wireless local area networks (WLANs) use radio waves to connect devices in a building or campus wirelessly. They integrate with wired networks through access points that bridge wireless and wired traffic. WLANs operate similarly to wired LANs but have some differences like lower security, limited bandwidth, and variable performance depending on location within the network coverage area. Common devices that use WLANs include tablets, smartphones and laptops.
It is the underlying technology that makes it possible for us to connect our devices to the web. Whenever a device access the Internet (whether it's a PC, Mac, smartphone or other device), it is assigned a unique, numerical IP address.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Network architecture defines the design of a communications network, including its physical components and their organization, operational principles, and data formats. There are two main network architectures: the OSI reference model and the TCP/IP model. The OSI model has seven layers - physical, data link, network, transport, session, presentation, and application - with each layer performing a distinct function in sending data across a network in a standardized way.
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
This document provides an overview of computer networks and communication. It discusses key topics such as data communication components and models, data representation, transmission modes, network types and topologies, protocols and standards. The key points are:
- Data communication involves exchanging data between devices via transmission medium using agreed upon protocols. Its effectiveness depends on delivery, accuracy, timeliness and jitter.
- Networks connect devices through various physical topologies like star, bus, ring and hybrid configurations. They can be LAN, MAN or WAN depending on size and distance covered.
- Protocols and standards govern data communication and ensure interoperability. They are developed by organizations like ISO, ITU, IEEE and adopted as industry
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
Network Layer addresses data at the logical and physical levels. Logical addresses are generated by CPUs and allow virtual addressing, while physical addresses map to specific memory locations. The network layer provides routing across multiple physical links from one device to another. IP addresses uniquely identify devices on the Internet, though they can change over time as connections change. IPv6 was developed to address the impending exhaustion of IPv4 addresses by expanding the address space to 128 bits.
The document discusses Ethernet networking technologies. It describes how Ethernet was developed in the 1970s and standardized. It outlines the evolution of Ethernet speeds from 2Mbps to 1Gbps. It discusses the physical layer standards for 10BaseT, 100BaseT, 1000BaseT, and 10GBase networking. It also provides an overview of Token Ring and FDDI technologies, including their operation, standards, and key features.
This document provides an introduction and overview of IPv6, including:
- IPv6 is the next generation internet protocol that will replace IPv4, providing a vastly larger address space and additional features.
- The key reasons for adopting IPv6 are that IPv4 addresses are running out due to the exponential growth of internet-connected devices, while IPv6 supports 128-bit addresses providing trillions of times more addresses.
- IPv6 addresses are 128-bit compared to 32-bit IPv4 addresses, written in hexadecimal format divided into eight groups, and features include improved security, mobility, and traffic routing capabilities.
Easy IP Addressing and Subnetting Manual for StartersS Khawaja
This document provides an introduction to IP addressing concepts such as binary to decimal conversion, public and private IP addresses, and classes of IP addresses. It explains that an IP address identifies a node on a network and allows communication between nodes. It also describes the classes of IP addresses (A, B, C, D, E), noting that classes A, B, and C are most commonly used and define ranges for the number of allowed hosts and networks. The document then provides details on class A, B, and C IP addresses and how they divide the available addresses.
Ethernet is a wired network technology that transmits data between local and wide area networks using protocols. It provides high-speed, secure data transmission. There are different types including Fast Ethernet for personal connections up to 100 Mbps and Gigabit Ethernet from 1000 Mbps to 1 Gbps. Ethernet operates in the physical and data link layers using MAC addresses and frames to transmit packets between sender and receiver systems while checking for errors. It has advantages like low cost and high security but disadvantages as unsuitable for long distances or real-time applications. Ethernet uses wired connections for shorter distance networks versus Internet's wireless global connections.
The document describes the Internet Protocol version 4 (IPv4). It discusses the IPv4 datagram format including the header fields, fragmentation, and options. It also covers how IPv4 provides an unreliable datagram delivery service and must be paired with TCP for reliability. The document discusses security issues with IPv4 like packet sniffing, modification, and spoofing, and how IPSec can provide protection against these attacks.
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
The document summarizes key concepts in mobile ad hoc networks (MANETs) and vehicular ad hoc networks (VANETs). It discusses routing protocols for MANETs such as DSDV, CGSR, AODV and DSR. It then covers challenges and security requirements for VANETs, including message authentication, non-repudiation, and privacy. The system model involves vehicles, roadside infrastructure, and authorities communicating through frequent broadcast messages with time sensitivity.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
The document discusses various medium access control protocols for local area networks:
1. Static channel allocation protocols like Frequency-Division Multiplexing (FDM) can waste bandwidth if the number of users is not exactly equal to the number of allocated channels.
2. Dynamic channel allocation protocols do not pre-allocate channels. The ALOHA and CSMA protocols allow nodes to transmit whenever the channel is sensed to be idle, which can still result in collisions.
3. Slotted ALOHA improves on pure ALOHA by only allowing transmissions to start at discrete time slots, doubling its maximum throughput. Carrier sensing in CSMA helps reduce but does not eliminate the possibility of collisions.
TCP/IP is a set of protocols that defines how data is transmitted and formatted so that networked systems can communicate. It originated from ARPAnet, which was developed by the Department of Defense to create a decentralized network resilient to attacks. TCP/IP provides logical addressing, routing between networks, name resolution from names to addresses, error checking and flow control for reliable data transmission, and support for multiple applications simultaneously through the use of ports. It is overseen by various standards organizations to ensure interoperability.
The document compares peer-to-peer and client-server networks. In peer-to-peer networks, all computers share equal responsibility for processing data, while in client-server networks certain devices serve data and others act as clients. Peer-to-peer networks are commonly used for home networks and allow easy sharing of files and printers between devices. However, peer-to-peer networks can slow performance and lack centralized backup and security. Client-server networks have more advanced security, centralized data storage, and mature technologies, but if the server crashes all connected devices cannot access resources.
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact [email protected]
mob. no-7023419969
The document compares Layer 2 and Layer 3 switching. Layer 2 switching uses MAC addresses to forward frames within a broadcast domain, while Layer 3 switching uses IP addresses to forward packets, allowing for greater scalability and security. Some benefits of Layer 2 switching include hardware-based bridging and high speeds, while benefits of Layer 3 switching include scalability, security, QoS, and lower latency.
Wireless local area networks (WLANs) use radio waves to connect devices in a building or campus wirelessly. They integrate with wired networks through access points that bridge wireless and wired traffic. WLANs operate similarly to wired LANs but have some differences like lower security, limited bandwidth, and variable performance depending on location within the network coverage area. Common devices that use WLANs include tablets, smartphones and laptops.
It is the underlying technology that makes it possible for us to connect our devices to the web. Whenever a device access the Internet (whether it's a PC, Mac, smartphone or other device), it is assigned a unique, numerical IP address.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Network architecture defines the design of a communications network, including its physical components and their organization, operational principles, and data formats. There are two main network architectures: the OSI reference model and the TCP/IP model. The OSI model has seven layers - physical, data link, network, transport, session, presentation, and application - with each layer performing a distinct function in sending data across a network in a standardized way.
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
This document provides an overview of computer networks and communication. It discusses key topics such as data communication components and models, data representation, transmission modes, network types and topologies, protocols and standards. The key points are:
- Data communication involves exchanging data between devices via transmission medium using agreed upon protocols. Its effectiveness depends on delivery, accuracy, timeliness and jitter.
- Networks connect devices through various physical topologies like star, bus, ring and hybrid configurations. They can be LAN, MAN or WAN depending on size and distance covered.
- Protocols and standards govern data communication and ensure interoperability. They are developed by organizations like ISO, ITU, IEEE and adopted as industry
1) The document outlines a course on data communication and networks across 5 units. It covers topics such as network fundamentals, data link layer, network layer, transport layer, and applications.
2) The objectives are to understand basic network concepts, components for data communication, analyze functions of various layers, and acquire knowledge of application protocols and internet technologies.
3) The outcomes are to understand how information flows through a network, identify components for different network types, understand the layered approach to data communication, and choose appropriate functionality for applications.
This document provides an overview of computer communications and networks. It defines data communication as the exchange of data between two devices via transmission medium. It describes the components of a basic data communication system including the message, sender, receiver, medium, and protocol. It also discusses different types of data representation, data flow, network characteristics, distributed processing, and standard organizations.
This document provides an introduction to data communication and computer networks. It discusses the basics of networking including:
1. The key components of a data communication system including the message, sender, receiver, transmission medium, and protocols.
2. Different types of networks including LANs, WANs, MANs, WLANs, and VPNs.
3. Network topologies such as mesh, star, bus, and ring.
4. Common network cabling including twisted pair, coaxial, and fiber optic cables.
Data Representation in Data Communication (1).pptxmoviebro1
Data can be represented in different forms such as text, numbers, images, audio, and video. Text is represented using character encoding systems like Unicode and ASCII. Numbers are stored as binary patterns without encoding. Images are represented as a matrix of pixels, each assigned a binary pattern depending on the image type (black/white or color). Audio is continuous data while video combines pictures and audio. Data communication involves transmitting data between devices via transmission mediums. Effective communication depends on delivery, accuracy, timeliness, and jitter. Components include messages, senders, receivers, transmission mediums, and protocols. Modes of transmission are simplex, half-duplex, and full-duplex. Computer networks connect devices using transmission media
The document provides an overview of data communications and computer networks. It discusses key topics such as data and information, components of data communication including messages, senders and receivers, transmission medium and protocols. It also covers network models including point-to-point, multipoint, LAN, MAN, WAN and internetworks. Network topologies such as mesh, star, bus, ring and hybrid are described. The roles of standards organizations and important standards are summarized. Layered network models including the OSI reference model are introduced.
This document provides an introduction and overview of computer networks. It defines what a network is as two or more connected computers that can share resources. The main reasons for computer networks are resource sharing, high reliability, and cost savings. It then discusses data communications, the components of a data communication system including the message, sender, receiver, transmission medium and protocol. It also defines different types of network topologies including mesh, star, bus, and ring as well as categories of networks based on size such as LANs, WANs, and MANs. Finally, it discusses network bandwidth and how it is measured in bits per second.
This document provides an overview of data communication systems and computer networks. It discusses the basic components of a communication system including the message, sender, receiver, transmission medium, and protocols. It then describes different types of network topologies including bus, star, ring, and mesh. The document also defines local, metropolitan, and wide area networks and how they differ in size and scope. Finally, it discusses some important network concepts like protocols, standards, and the organizations that develop standards to ensure interoperability.
The document discusses different types of computer networks. It describes local area networks (LANs) as connecting hosts in a single office or building over short distances. Wide area networks (WANs) connect devices over longer distances, spanning towns, states or countries, and are typically run by telecommunications companies. Metropolitan area networks (MANs) provide connectivity over areas like a city or campus. LANs use switches to direct traffic to specific hosts, while WANs can be point-to-point connections between two devices or switched networks combining multiple point-to-point links.
Human computer interaction-web interface design and mobile eco systemN.Jagadish Kumar
This document discusses various contextual tools and patterns that support virtual pages for designing rich web user interfaces.
It begins by explaining different types of contextual tools like always-visible tools, hover-reveal tools, toggle-reveal tools, and multi-level tools. It then discusses overlays and inlays, describing dialog, detail, and input overlays as well as dialog, list, and detail inlays.
Finally, it covers patterns that support virtual pages like virtual scrolling, inline paging, scrolled paging, panning, and zoomable user interfaces. Virtual scrolling creates the illusion of a larger page by dynamically loading more content as the user scrolls. Inline paging updates only part of
Human computer interaction -Design and software processN.Jagadish Kumar
The document discusses the process of interactive design for human-computer interaction (HCI). It begins by defining design as achieving goals within constraints. It notes that goals for a wireless personal movie player may include young users wanting to watch and share movies on the go, while constraints could be withstanding rain or using existing video standards. The core of HCI design involves understanding users and technology through requirements analysis, prototyping and evaluating designs through iterations to achieve the best possible design within time and budget constraints. The process aims to incorporate user research and usability from the beginning of design through implementation.
Human computer interaction -Input output channel with ScenarioN.Jagadish Kumar
This document discusses input and output channels in human-computer interaction. It describes the five human senses - sight, hearing, touch, taste and smell - and how they provide input. It then discusses the major effectors like limbs, fingers and vocal systems that provide human output. The document focuses on how vision, hearing and touch are used as input channels in interacting with computers, primarily through the eyes, fingers and voice. It provides details on the physiological mechanisms and processing involved in each sense.
This document discusses human-computer interaction (HCI). It defines HCI as the study of how humans interact with computer systems. The history and evolution of HCI is covered, from its origins in the 1970s-1990s to investigate desktop usability, to the modern fields of user experience (UX) design, human-robot interaction, and human data interaction. Key differences between HCI as a field of study and UX as an application of HCI theory are outlined. Finally, potential career paths for HCI graduates such as user researcher, product designer, and interface engineer are presented.
The document compares existing local file systems to HDFS. Local file systems like EXT4 store files in fixed size blocks but have no awareness of or ability to distribute blocks across multiple nodes. This exposes data to loss if a node fails. HDFS addresses this by spreading blocks across multiple nodes and replicating each block for redundancy. It divides files into blocks which are distributed and tracked across the cluster, allowing easy management of large volumes of data in a fault-tolerant manner. HDFS provides a distributed file system view across all nodes while local file systems remain for each node's operating system.
1. The document discusses big data problems faced by various domains like science, government, and private organizations.
2. It defines big data based on the 3Vs - volume, velocity, and variety. Volume alone is not sufficient, and these factors must be considered together.
3. Traditional databases are not suitable for big data problems due to issues with scalability, structure of data, and hardware limitations. Distributed file systems like Hadoop are better solutions as they can handle large and varied datasets across multiple nodes.
This slide covers all the basics of cloud computing with AWS -popular IAAS provider.Each AWS components are explained with a real time example like how NETFLIX using AWS components.
This document discusses computer forensic tools and how to evaluate them. It covers the major tasks performed by forensic tools, including acquisition, validation, extraction, reconstruction, and reporting. Acquisition involves making a copy of the original drive, while validation ensures the integrity of copied data. Extraction recovers data through viewing, searching, decompressing, and other methods. Reconstruction recreates a suspect drive. Reporting generates logs and reports on the examination process and findings. The document examines both software and hardware tools, as well as command-line and graphical user interface options. Maintaining and selecting appropriate tools is important for effective computer investigations.
This document discusses data warehousing and data mining. It defines a data warehouse as a subject-oriented, integrated, time-variant collection of data used to support management decision making. Data is extracted from operational systems, transformed, and loaded into the warehouse. Dimensional modeling approaches like Kimball and Inmon are described. The document outlines data mining techniques like clustering, classification, and regression that can be used to analyze warehouse data and predict trends. Overall, the document presents an overview of data warehousing and mining concepts to provide the right data for improved decision making.
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
The document provides an overview of SQL and reasons for learning SQL. It discusses what SQL is, why learn SQL, and provides an overview of SQL functions including retrieving data using SELECT statements, arithmetic expressions, null values, column aliases, concatenation operators, literal character strings, and alternative quote operators. It also covers restricting and sorting data using WHERE clauses, comparison operators, logical operators, pattern matching, and null conditions.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
Parenting Teens: Supporting Trust, resilience and independencePooky Knightsmith
For more information about my speaking and training work, visit: https://www.pookyknightsmith.com/speaking/
SESSION OVERVIEW:
Parenting Teens: Supporting Trust, Resilience & Independence
The teenage years bring new challenges—for teens and for you. In this practical session, we’ll explore how to support your teen through emotional ups and downs, growing independence, and the pressures of school and social life.
You’ll gain insights into the teenage brain and why boundary-pushing is part of healthy development, along with tools to keep communication open, build trust, and support emotional resilience. Expect honest ideas, relatable examples, and space to connect with other parents.
By the end of this session, you will:
• Understand how teenage brain development affects behaviour and emotions
• Learn ways to keep communication open and supportive
• Explore tools to help your teen manage stress and bounce back from setbacks
• Reflect on how to encourage independence while staying connected
• Discover simple strategies to support emotional wellbeing
• Share experiences and ideas with other parents
THERAPEUTIC COMMUNICATION included definition, characteristics, nurse patient...parmarjuli1412
The document provides an overview of therapeutic communication, emphasizing its importance in nursing to address patient needs and establish effective relationships. THERAPEUTIC COMMUNICATION included some topics like introduction of COMMUNICATION, definition, types, process of communication, definition therapeutic communication, goal, techniques of therapeutic communication, non-therapeutic communication, few ways to improved therapeutic communication, characteristics of therapeutic communication, barrier of THERAPEUTIC RELATIONSHIP, introduction of interpersonal relationship, types of IPR, elements/ dynamics of IPR, introduction of therapeutic nurse patient relationship, definition, purpose, elements/characteristics , and phases of therapeutic communication, definition of Johari window, uses, what actually model represent and its areas, THERAPEUTIC IMPASSES and its management in 5th semester Bsc. nursing and 2nd GNM students
RE-LIVE THE EUPHORIA!!!!
The Quiz club of PSGCAS brings to you a fun-filled breezy general quiz set from numismatics to sports to pop culture.
Re-live the Euphoria!!!
QM: Eiraiezhil R K,
BA Economics (2022-25),
The Quiz club of PSGCAS
Analysis of Quantitative Data Parametric and non-parametric tests.pptxShrutidhara2
This presentation covers the following points--
Parametric Tests
• Testing the Significance of the Difference between Means
• Analysis of Variance (ANOVA) - One way and Two way
• Analysis of Co-variance (One-way)
Non-Parametric Tests:
• Chi-Square test
• Sign test
• Median test
• Sum of Rank test
• Mann-Whitney U-test
Moreover, it includes a comparison of parametric and non-parametric tests, a comparison of one-way ANOVA, two-way ANOVA, and one-way ANCOVA.
This presentation was provided by Jennifer Gibson of Dryad, during the first session of our 2025 NISO training series "Secrets to Changing Behavior in Scholarly Communications." Session One was held June 5, 2025.
HOW YOU DOIN'?
Cool, cool, cool...
Because that's what she said after THE QUIZ CLUB OF PSGCAS' TV SHOW quiz.
Grab your popcorn and be seated.
QM: THARUN S A
BCom Accounting and Finance (2023-26)
THE QUIZ CLUB OF PSGCAS.
Slides from a Capitol Technology University presentation covering doctoral programs offered by the university. All programs are online, and regionally accredited. The presentation covers degree program details, tuition, financial aid and the application process.
Different pricelists for different shops in odoo Point of Sale in Odoo 17Celine George
Price lists are a useful tool for managing the costs of your goods and services. This can assist you in working with other businesses effectively and maximizing your revenues. Additionally, you can provide your customers discounts by using price lists.
How to Create Quotation Templates Sequence in Odoo 18 SalesCeline George
In this slide, we’ll discuss on how to create quotation templates sequence in Odoo 18 Sales. Odoo 18 Sales offers a variety of quotation templates that can be used to create different types of sales documents.
Pests of Rice: Damage, Identification, Life history, and Management.pptxArshad Shaikh
Rice pests can significantly impact crop yield and quality. Major pests include the brown plant hopper (Nilaparvata lugens), which transmits viruses like rice ragged stunt and grassy stunt; the yellow stem borer (Scirpophaga incertulas), whose larvae bore into stems causing deadhearts and whiteheads; and leaf folders (Cnaphalocrocis medinalis), which feed on leaves reducing photosynthetic area. Other pests include rice weevils (Sitophilus oryzae) and gall midges (Orseolia oryzae). Effective management strategies are crucial to minimize losses.
Unit- 4 Biostatistics & Research Methodology.pdfKRUTIKA CHANNE
Blocking and confounding (when a third variable, or confounder, influences both the exposure and the outcome) system for Two-level factorials (a type of experimental design where each factor (independent variable) is investigated at only two levels, typically denoted as "high" and "low" or "+1" and "-1")
Regression modeling (statistical model that estimates the relationship between one dependent variable and one or more independent variables using a line): Hypothesis testing in Simple and Multiple regression models
Introduction to Practical components of Industrial and Clinical Trials Problems: Statistical Analysis Using Excel, SPSS, MINITAB®️, DESIGN OF EXPERIMENTS, R - Online Statistical Software to Industrial and Clinical trial approach
Adam Grant: Transforming Work Culture Through Organizational PsychologyPrachi Shah
This presentation explores the groundbreaking work of Adam Grant, renowned organizational psychologist and bestselling author. It highlights his key theories on giving, motivation, leadership, and workplace dynamics that have revolutionized how organizations think about productivity, collaboration, and employee well-being. Ideal for students, HR professionals, and leadership enthusiasts, this deck includes insights from his major works like Give and Take, Originals, and Think Again, along with interactive elements for enhanced engagement.
3. 3
Building a network
A network is a set of devices connected by a media link
Devices are often called as nodes
They are the serial lines connected by dumb terminals to
mainframe computer
Difference=>Carry many different types of data and
support a wide range of applications
4. Data Communications
4
• Data – facts, concepts, and instructions
• Data – Information presented in whatever form is agreed
upon by the parties creating and using the data
• Represented by binary information units (in the form of 0s
and 1s)
• Data Communications – Exchange of data between two
devices via some form of transmission medium such as a
wire cable
5. Effectiveness of Data Communications
5
Effectiveness of a data communications system
depends on three fundamental characteristics
Delivery : The system must deliver data to the correct
destination. Data must be received by the intended device or
user and only by that device or user
Accuracy: The system must deliver the data accurately. Data
that have been altered in transmission and left uncorrected are
unusable
Timeliness: The system must deliver data in a timely manner.
Data delivered late are useless. Delivering the data in the same
order that they are produced and without significant delay
(real time transmission)
6. 6
Five components of datacommunication
Message:
Information to be
communicated.
Consist of text, numbers,
pictures, sound or video -
combination
7. 7
Five components of datacommunication
Sender:
Device that sends the data
message-
May be computer, workstation.
telephone handset, video
camera and etc.
8. 8
Five components of data communication
Receiver:
The device that receives the
message.
Can be computer, work station,
telephone handset, television
and so on.
9. 9
Five components of data communication
Medium:
Physical path by which a
message travels from sender to
receiver. Eg :Twisted pair wire,
coaxial cable, fibre optic cable or
radio waves
10. 10
Five components of data communication
Protocol:
Set of rules that governs data
communication. It represents an
agreement between the
communicating devices.
Without a protocol, two devices
may be connected but not
communicating
11. Data Representation
11
Information Today comes in different forms
such as text, numbers, images, audio and
video
Text:
Represented as a bit pattern, a sequence of bits 0s
or 1s. Different codes are used
ASCII (7 bits per symbol)
Extended ASCII (8 bits per symbol)
Unicode (16 bits – supports different languages)
ISO (32 bits)
12. Data Representation
12
Numbers:
Converted to a binary number – to simplify the
mathematical operations
Images:
Represented by bit patterns
Each pixel is assigned a bit pattern
Black and White Image – 1 bit per pixel
Gray scale images – depends on number of levels in gray
scale
Colour images: Each pixel has 3 bit patterns (RGB)
• Audio / Video:
– Converted in to Analog/Digital
13. Direction of data flow
13
Simplex
Simplex – unidirectional; one transmits, other receives
17. 17
Requirements
The requirements to build a network are,
Perspectives
Scalable Connectivity
Cost effective resource sharing
Support for common services
Interoperability
Managebility
Performance
Connectivity=> Connections among a set of computers
Links and nodes
Types of links=> point to point link, multipoint link
18. Applications
• Peer-Peer model:
– No fixed clients or servers
– Each host can act as both client & server
• Examples: Napster, Gnutella, KaZaA
18
19. Applications
19
WWW
• Instant Messaging (Internet chat, text messaging on
cellular phones)
• Peer-to-Peer
• Internet Phone
• Video-on-demand
• Distributed Games
• Remote Login (Telnet)
• File Transfer
20. Network Criteria
20
Performance
Can be measured by transit time and response time. Affected
by number of users, type of medium, connected HW/SW
Reliability
Measured by frequency of failure, recovery time, robustness in
a catastrophe
Security – protection from unauthorized access, viruses /
worms
21. Line Configuration
21
The way two or more communication devices attach to a
link
Link – Physical communication pathway that transfer data
from one device to another
Two possible line configurations
Point-to-point
Multipoint
24. Topology
24
Physical or logical arrangement
Topology of a network is the geometric representation
of the relationship of all the links and linking devices
to one another
Basic types: Mesh, star, bus, ring,hybrid
26. Mesh Topology
Dedicated point-to-point links to
every other device
n(n-1)/2 links an each device will
have n-1 I/O ports
Advantages:
Dedicated links – no traffic
problems
Robust
Privacy/Security
Easy fault identification and
isolation
Disadvantages:
More amount of cabling and I/O
ports requirement
Installation and reconnection is
difficult
Expensive
26
27. Star Topology
Dedicated point-to-point links to
central controller (hub)
Controller acts as exchange
Advantages
less expensive
robustness
Disadvantages
More cabling requirement than ring
and bus topologies
27
28. Bus Topology
Multipoint configuration
One cable acts as a backbone to link all devices
Advantages : Ease of installation, less cabling
Disadvantages : Difficult reconnection and fault
isolation, a fault/break in the bus cable stops all
transmission
28
29. Ring Topology
Dedicated point-to-point configuration to neighbours
Signal is passed from device to device until it reaches destination
Each device functions as a repeater
Advantages : easy to install and reconfigure
Disadvantages :limited ring length and no: of devices; break
in a ring can disable entire network
29
30. Categories of Networks
30
Based on size, ownership, distance covered, and physical
architecture
Local Area Network (LAN) – smaller geographical area
Metropolitan Area Network (MAN) – network extended over
an entire city
Wide Area Network (WAN) – large geographical area
34. 34
MAN
Designed to extend over an entire city – May be a single
network such as cable television network – may be a means
of connecting a number of LANS into a larger network
35. Metropolitan Area Network (MAN)
35
home
cable headend
cable distribution
network (simplified)
Typically 500 to 5,000 homes
A Cable TV Network is an example of a MAN
36. 36
WAN
Provides long distance transmission of data, voice, image
and video information over large geographic areas – a
country/continent/world
37. Protocols and Standards
37
Protocols:
Set of rules that governs data communications
Defines what is communicated, how it is communicated,
and when it is communicated
Key elements
Syntax : Structure/ format of data –order in which it is presented
Semantics : meaning of each section of bits- how pattern to be
interpreted – What action to be taken
Timing: When data to be sent and how fast they can be sent
38. Protocols and Standards
38
Standards:
Essential in creating and maintaining an open and
competitive market for equipment manufacturers and in
guaranteeing national and international interoperability
of data and telecommunications technology and
processes
– De facto: Standards that have not been approved by an
organized body but have been adopted as standards
through widespread use
– De jure: legislated by an officially recognized body
39. Protocols and Standards
39
Standards Organizations
• International organization for Standardization (ISO)
• International Telecommunication Union –
Telecommunication Standards Sector (ITU-T)
• American National Standards Institute (ANSI)
Institute of Electrical and Electronics Engineers (IEEE)
• Electronic Industries Assoctiation (EIA)
Regulatory Agencies
Federal Communication Commission (FCC)
Internet Standards
Internet Draft
Request for Comment (RFC)
40. ISO/OSI MODEL
ISO/OSI MODEL
The Open Systems Interconnection (OSI) architecture
has been developed by the International Organization for
Standardization (ISO) to describe the operation and design
of layered protocol architectures.
This forms a valuable reference model and defines much
of the language used in data communications.
42. 42
FUNCTIONS OF LAYERS
Describes a seven-layer abstract reference model for a
network Architecture.
Purpose of the reference model was to provide a framework
for the development of protocols
43. 43
PHYSICAL LAYER
43
FUNCTIONS OF LAYERS
Physical characteristics of interfaces and media
Representation of bits
Data rate
Synchronization of bits:
DATALINK LAYER
Framing
Physical Addressing
Flow Control
Error control& Access control
44. 44
FUNCTIONS OF LAYERS
NETWORK LAYER
Logical Addressing
Routing
TRANSPORT LAYER
Service-point (port) addressing
Segmentation and reassembly
Connection control
Flow control
Error Control
46. 46
Switched Network
Long distance transmission
Don’t bother about the content of data
Transfers the data until it reaches the destination
Types=> packet switched and circuit switched
47. 47
Packet switching
Used when the users are need of intermittent channel usage
Messages are broken into individual small packets
Switch to switch packet transmission
Handles traffic well
Approaches=> datagram and virtual circuit
48. 48
Datagram=>connection-less
Disadvantages=>
Suffers from lot of overhead
The packets are not reassembled at the receiver
Virtual circuit=> connection oriented
Consist of 3 phases=>
Establishment phase=> set up connection and ensures QoS
Data transfer phase=> performs error control, flow control services
Connection release phase=>Connection termination
51. 51
Comparison
S.no Virtual Circuit Datagram
1 Circuit setup is required Circuit setup is not
required
2 Each packet contains a short
VC number as address
Each packet contains full
source and destination
address
3 Route chosen when VC is
setup and all packets follow
this route
Each packet is routed
independently
4 All packets are lost incase of
router failure
Only crashed packets are
lost
5 Congestion control is easy
using buffers
Difficult congestion
control
52. 52
Circuit Switching=>
End to end path setup beginning of a session
Dedicated to an application
And then released at the end of the session
Example=> Telephone system
Message Switching=>
Data stored at the switching office and then
forwarded later
Uses store and forward network
Example=> Telegraph system
53. 53
Addressing
It uses four levels of addresses,
Physical(link) addresses=> defined by its LAN
or WAN
Logical(IP)addresses=>universal
communications
Port addresses=>label assigned to the
communication process through telnet and FTP
Specific addresses=>designed by users for some
application
54. 54
TCP/IP layers and its addresses
Specific Addresses
Port Address
Logical Address
Physical Address
55. 55
Network software
Socket Application Programming Interface
Socket=>interface between the application layer
and transport layer
Also referred as API between application and
network
Associated with host address and a port address
Host address=>IP address of a host where client
and server program is loaded
Port address=>communication port used by the
client or server program
56. 56
Syntaxes for Socket Connection
Socket creation=> int socket(int family, int type, int
protocol);
Binding=>int bind(int sd,struct sockaddr *name, int
namelen);
Listening=> int listen(int sd, int backlog);
Accepting=> int accept(int sd, struct *addr, int
*addrlen);
Closing=>int close(int sd);
57. 57
Protocol Implementation
OS uses process or thread=>communication
Implementation=>
Process per protocol model
Process per message model
Message Buffers=>
58. 58
Performance
Measured in various parameters
Bandwidth=> measured in hertz and bps
Throughput=>Measures the speed of data
transmission
Latency=>Time required for sending a message
to reach destination
Bandwidth delay product=>number of bits that
can fill the channel
Jitter=>Data packets reaching at receiver at
different times
59. Transmission Media
Transmission media can be divided into two broad categories
Guided
Unguided
Guided media
It includes twisted-pair cable, coaxial cable, and fiber-optic
cable.
Guided media, which are those that provide a conduit from one
device to another.
Unguided media
It is usually air.
60. Transmission Media
Coaxial cable
Coaxial cable carries signals of higher frequency ranges than
twisted pair cable.
It has a central core conductor of solid or stranded wire enclosed
in an insulating sheath.
This in turn encased in an outer conductor of metal foil ,braid or a
combination of the two.
61. 61
Transmission Media
Fiber Optic Cable.
A fiber optic cable is made of glass or plastic and transmit signals
in the form of light.
There are two modes for propagating light along optical
channels.
Multimode
Single mode.
63. Unipolar encoding uses only one voltage level.
LINE CODING&SCHEMES
Polar encoding uses two voltage levels (positive and negative).Polar encoding uses two voltage levels (positive and negative).
64. POLAR ENCODING&SCHEMES
NRZ-LNRZ-L :The level of the signal is dependent upon the:The level of the signal is dependent upon the state of thestate of the
bitbit
NRZ-I:NRZ-I: The signal isThe signal is inverted if a 1 is encounteredinverted if a 1 is encountered..
65. RZ encoding:
POLAR ENCODING&SCHEMES
Manchester encodingManchester encoding: the: the transition at the middle of the bittransition at the middle of the bit
is used for both synchronization and bit representation.is used for both synchronization and bit representation.
66. 66
Differential Manchester encoding:Differential Manchester encoding:
TheThe transition at the middletransition at the middle of the bit is used only forof the bit is used only for
synchronization.synchronization.
The bit representation is defined by theThe bit representation is defined by the inversion or non-inversion or non-
inversioninversion at theat the beginning of the bitbeginning of the bit..
POLAR ENCODING&SCHEMES
67. BIPOLAR ENCODING
Bipolar AMI encoding:Bipolar AMI encoding: Use three levels: positive, zero, andUse three levels: positive, zero, and
negative.negative.
68. 68
Modem Standards
The term modem is a composite word that refers to the two
functional entities that make up the device; a signal modulator
and a signal demodulator.
A modulator creates a bandpass analog signal from binary
data.
A demodulator recovers the binary data from the
modulated signal.
69. TELEPHONE MODEMS
Traditional telephone lines can carry frequencies between 300
and 3300 HZ, giving them BW of 3000 Hz.
The effective BW of a telephone line being used for data
transmission is 2400 Hz,covering the range from 600 to 3000
Hz.
70. Modem standards
V-series standards published by the ITU-T.
V.32:
The V.32 calls for 32-QAM with a baud rate of 2400.
Because only 4 bits of each pentabit represents data, the
resulting speed is 4*2400=9600
V.32 bits:
The V.32 bits modem support 14,400-bps transmission. The
V.32 bits uses 128-QAM transmission.
V.34 bits:
The V.34 bits modem support 28,800-bps transmission
with a 960-point constellation to a bit rate of 33,600
with a 1664-point constellation.
71. Traditional modems
In traditional modems data exchange is between two
computers, A and B,through digital telephone network.
After modulation by the modem, an analog signal
reaches the telephone company Switching station.
It is sampled and digitized to be passed through the
digital network.
The quantization noise introduced in the signal at the
sampling point limits the data rate according to the
capacity. This limit is 33.6 Kbps.
73. 56K Modems
Communication is via the Internet.
In Uploading, the analog signal must still be
sampled at the switching station, which means the
data rate in the uploading is limited to33.6 Kbps.
There is no sampling in downloading. Data rate in
downloading is 56Kbps
75. RS 232 INTERFACE
RS 232 is a standard interface by EIA and RS232C is the
latest version of this interface.
RS232 standard follows –ve logic.
Logic1 is represented by negative voltage.
Logic0 is represented by +ve voltage.
Level 1 varies from -3 to -15v and level 0 varies from 3 to15v
76. 76
Data Link Layer design issues
Services provided to the network layer=>
Transfers the data from the network layer on the
source to network layer on the destination
The important services are,
unacknowledged connectionless services
Acknowledged connection service
Acknowledged connection-oriented service
77. 77
Framing=> separates a message from one source to a
destination or from other messages to other destinations
Fixed size framing
Variable size framing
o Character oriented protocol=> byte stuffing
o Bit oriented protocol=>data as sequence of bits and
interpreted by the upper layer as text, graphics, audio,
etc.
78. 78
Error Control
Ensures proper sequencing and safe delivery of
frames at destination
An acknowledgement is send by destination node
Positive acknowledgement=>frame is successfully
delivered
Negative acknowledgement=>frame not sent and the
frame is to be retransmitted
79. 79
Flow control =>the data flow is regulated
Includes a feedback mechanism requesting transmitter
to retransmit the data
Damaged frames
Lost frame
Lost acknowledgement frames
Most common retransmission technique=>
ARQ(Automatic repeat request)
80. 80
Error Detection & Correction
Introduction
Data can be corrupted during transmission
For reliable communication, errors must be detected and
corrected
Error
Bits flow from one point to another
They subject to unpredictable changes because of
interference is rightly called as an error
83. 83
Error Detection
Error Detection
Sender transmits every data unit twice
Receiver performs bit-by-bit comparison between that two
versions of data
Any mismatch would indicate an error, which needs error
correction.
Redundancy
Shorter group of bits may be appended to the end of each unit
85. 85
Parity check
Parity
A redundant bit called Parity Bit is added to every data unit
Even Parity: total number of 1‘s in the data unit becomes even
Odd Parity: total number of 1‘s in the data unit becomes odd
86. 86
LONGTITUDINAL REDUNDANCY CHECK
LRC - Performance
Detects all burst errors up to length n (number of
columns)
If two bits in one data unit are damaged and two bits in
exactly same positions in another data unit are also
damaged.
Now the checker will not detect an error
88. 88
Cyclic redundancy check
Powerful error detection scheme
Rather than addition, binary division is used
A sequence of redundant bits, called CRC or CRCremainder
is appended to the data unit
At the receiver side, the incoming data unit is divided by the
same predetermined number.
If there is no remainder, the data unit is accepted
If there is a remainder, the receiver indicates that the data unit
has been damaged during transmission
90. 90
Error Correction
Error Correction-Hamming Code
Hamming Code uses the relationship between data and
redundancy bits.
For example: a 7-bit ASCII code requires 4 redundancy
bits, which are placed in positions 1, 2, 4 and 8 i.e.
x0,x1,x2,x3 and so on.
91. 91
Error Correction –Hamming Code
In the Hamming Code, each bit for one combination of
data bits as below:
r1: bits 1, 3, 5, 7, 9, 11
r2: bits 2, 3, 6, 7, 10, 11
r3: bits 4, 5, 6, 7
r4: bits 8, 9, 10, 11
93. 93
Data Link Control
Flow Control
Error Control
Flow Control:
How much data sender can transmit before receiving the
acknowledgement
Error Control:
Error Detection + Error Correction
ARQ
o Any time, an error is discovered in an exchange, specified frames
are retransmitted
94. 94
Flow and Error Control Mechanisms
Flow and Error Control Mechanisms
Stop and Wait ARQ
Go-Back ARQ
Selective Repeat ARQ
Stop and Wait ARQ
Simplest flow and error control mechanism
The sending device keeps a copy of the last frame
transmitted until it receives an acknowledgement
Frames - alternately numbered as 0 and 1
95. 95
Stop-and-Wait
Sender keeps a copy of the last frame until it
receives an acknowledgement.
For identification, both data frames and
acknowledgements (ACK) frames are numbered
alternatively 0 and 1.
Sender has a control variable (S) that holds the
number of the recently sent frame. (0 or 1)
Receiver has a control variable ® that holds the
number of the next frame expected (0 or 1).
Sender starts a timer when it sends a frame. If an
ACK is not received within a allocated time
period, the sender assumes that the frame was
lost or damaged and resends it
Receiver send only positive ACK if the frame is
intact.
ACK number always defines the number of the
next expected frame
96. 96
Stop-and-Wait ARQ, lost ACK frame
When a receiver receives a
damaged frame, it discards
it and keeps its value of R.
After the timer at the
sender expires, another
copy of frame 1 is sent.
97. 97
Stop-and-Wait, lost ACK
frame
• If the sender receives a
damaged ACK, it
discards it.
• When the timer of the
sender expires, the
sender retransmits
frame 1.
• Receiver has already
received frame 1 and
expecting to receive
frame 0 (R=0).
Therefore it discards
the second copy of
frame 1.
98. 98
Stop-and-Wait, delayed ACK
frame • The ACK can be delayed
at the receiver or due to
some problem
• It is received after the
timer for frame 0 has
expired.
• Sender retransmitted a
copy of frame 0.
However, R =1 means
receiver expects to see
frame 1. Receiver
discards the duplicate
frame 0.
• Sender receives 2 ACKs,
it discards the second
ACK.
99. 99
Piggybacking
• A method to combine a
data frame with ACK.
• Station A and B both
have data to send.
• Instead of sending
separately, station A
sends a data frame that
includes an ACK.
• Station B does the same
thing.
• Piggybacking saves
bandwidth.
100. 100
Disadvantage of Stop-and-Wait
• In stop-and-wait, at any point in time, there is only one frame
that is sent and waiting to be acknowledged.
• This is not a good use of transmission medium.
• To improve efficiency, multiple frames should be in transition
while waiting for ACK.
• Two protocol use the above concept,
– Go-Back-N ARQ
– Selective Repeat ARQ
101. 101
Go-Back-N ARQ
We can send up to W frames before worrying about ACKs.
We keep a copy of these frames until the ACKs arrive.
This procedure requires additional features to be added to Stop-
and-Wait ARQ.
102. 102
Sequence Numbers
• Frames from a sender are numbered sequentially.
• We need to set a limit since we need to include the sequence
number of each frame in the header.
• If the header of the frame allows m bits for sequence number,
the sequence numbers range from 0 to 2 m
– 1. for m = 3,
sequence numbers are: 1, 2, 3, 4, 5, 6, 7.
• We can repeat the sequence number.
• Sequence numbers are:
0, 1, 2, 3, 4, 5, 6, 7, 0, 1, 2, 3, 4, 5, 6, 7, 0, 1, …
103. 103
Sender Sliding Window
• At the sending site, to hold
the outstanding frames until
they are acknowledged, we
use the concept of a
window.
• The size of the window is at
most 2m
-1 where m is the
number of bits for the
sequence number.
• Size of the window can be
variable, e.g. TCP.
• The window slides to
include new unsent frames
when the correct ACKs are
received
104. 104
Receiver Sliding Window
• Size of the window at the
receiving site is always 1 in
this protocol.
• Receiver is always looking
for a specific frame to
arrive in a specific order.
• Any frame arriving out of
order is discarded and
needs to be resent.
• Receiver window slides as
shown in fig. Receiver is
waiting for frame 0 in part
a.
105. 105
Control Variables
• Sender has 3 variables: S, SF, and SL
• S holds the sequence number of recently sent frame
• SF holds the sequence number of the first frame
• SL holds the sequence number of the last frame
• Receiver only has the one variable, R, that holds the sequence number of
the frame it expects to receive. If the seq. no. is the same as the value of
R, the frame is accepted, otherwise rejected.
106. 106
Go-Back-N ARQ, normal operation
• The sender keeps track of the outstanding frames and updates the
variables and windows as the ACKs arrive.
107. 107
Go-Back-N ARQ, lost frame
• Frame 2 is lost
• When the receiver
receives frame 3, it
discards frame 3 as
it is expecting
frame 2 (according
to window).
• After the timer for
frame 2 expires at
the sender site, the
sender sends frame
2 and 3. (go back
to 2)
108. 108
Go-Back-N ARQ, damaged/lost/delayed ACK
• If an ACK is damaged/lost, we can have two situations:
• If the next ACK arrives before the expiration of any timer, there
is no need for retransmission of frames because ACKs are
cumulative in this protocol.
• If ACK1, ACK2, and ACk3 are lost, ACK4 covers them if it
arrives before the timer expires.
• If ACK4 arrives after time-out, the last frame and all the frames
after that are resent.
• Receiver never resends an ACK.
• A delayed ACK also triggers the resending of frames
109. 109
Go-Back-N ARQ, sender window size
• Size of the sender window must be less than 2 m
. Size of the receiver is
always 1. If m = 2, window size = 2 m
– 1 = 3.
• Fig compares a window size of 3 and 4.
Accepts as
the 1st
frame in
the next
cycle-an
error
110. 110
Selective Repeat ARQ, sender and receiver
windows• Go-Back-N ARQ simplifies the process at the receiver site. Receiver only keeps track of
only one variable, and there is no need to buffer out-of-order frames, they are simply
discarded.
• However, Go-Back-N ARQ protocol is inefficient for noisy link. It bandwidth
inefficient and slows down the transmission.
• In Selective Repeat ARQ, only the damaged frame is resent. More bandwidth efficient
but more complex processing at receiver.
• It defines a negative ACK (NAK) to report the sequence number of a damaged frame
before the timer expires.
111. 111
Selective Repeat ARQ, lost frame
• Frames 0 and 1 are accepted
when received because they
are in the range specified by
the receiver window. Same
for frame 3.
• Receiver sends a NAK2 to
show that frame 2 has not
been received and then
sender resends only frame 2
and it is accepted as it is in
the range of the window.
112. 112
Selective Repeat ARQ, sender window size
• Size of the sender and receiver windows must be at most one-half of 2 m
. If m = 2,
window size should be 2 m
/2 = 2. Fig compares a window size of 2 with a window size
of 3. Window size is 3 and all ACKs are lost, sender sends duplicate of frame 0, window
of the receiver expect to receive frame 0 (part of the window), so accepts frame 0, as the
1st
frame of the next cycle – an error.