UNIT-1 Concepts of Lan & DLL Protocols: Categores of Computer Networks
UNIT-1 Concepts of Lan & DLL Protocols: Categores of Computer Networks
UNIT-1 Concepts of Lan & DLL Protocols: Categores of Computer Networks
Therefore a repeater extends the range of a network, beyond its physical boundaries. In any way it does
not change the data that is being transmitted or characteristics of the network. Its only responsibility is to
accept a stream of bits, regenerate it, so that they are accurate.
The use of repeater is shown in above fig. Host A wants to send data to Host D. As the data travels it
becomes weak, so a repeater is used to regenerate the signal, so that can be transmitted up to host D.A
repeater simply prevents errors from occurring by taking the input signal corresponding to bits 0110010
send by host A, simply regenerating it to create a signal with the same bit format and the original signal
strength and sending it forward.
A repeater is entirely different from an amplifier. An amplifier is used for analog signals, where it is
impossible to separate original signal and noise. A repeater doesn’t amplify the incoming signal, it
regenerates the original bit pattern corrupted by noise.
Bridges
A bridge is a computer that has its own processor, memory and two NIC cards to connect two portions of
a network. It operates at physical as well as data link layers of OSI model. A bridge is used to divide a big
network into small sub-networks called segments as shown in below fig. In this the bridge splits the entire
network in to two segments.
A bridge is a more intelligent device than a repeater. The main advantage of bridge is, it sends data frames
only to required segment, thus preventing excess traffic. For example, in a network containing four segments
1,2,3,4, a host in segment 1 sends a frame to host in segment 3, and then bridge forwards the frame from
segment 1 to segment 3 only, thus preventing excess traffic in segments 2 and 4.
Therefore a bridge can be used for the following purposes.
Unwanted traffic is minimized, network congestion can also be minimized.
Busy links or errors links can be identified and isolated, so that the traffic does not go through these
links.
Security features can be implemented.
Bridges are classified into three categories
(a)Simple bridge (b) Learning bridge (c) Multipoint bridge
Simple bridge: A simple bridge connects two segments. For this it maintains a table of host address and
segment numbers of host. All these host address and segment numbers have to be entered by an operator
manually. Whenever a host is added or an existing host is deleted, the tables have to be manually updated.
Hence there is a lot of scope for error in simple bridges but these are cheapest.
Learning bridge: A learning bridge is also called as adaptive bridge which can be programmed
automatically. It performs its own bridging function and builds it host address to segment numbers table on
its own.
For this, whenever a learning bridge receives a frame for the first time, it examines the address of sender and
receiver, if they are available in the table, the frame is transferred as usual. However if sender/receiver is not
present in the table, it adds that specific system to the table. Over a period of time, complete table is
constructed. The learning bridges also continuous checking and updating its table all the time.
Multiport bridge: A multiport bridge is a special case of simple or learning bridges. Whenever a simple or
learning bridge connects more than two networks segments then it is called a multiport bridge.
Switches:
A network switch performs the same functionality in a network as a hub except a difference that switch does
not broadcast the data packets to all the computers in a network like a hub. A network switch has multiple
Fig. SWITCH
ports like 4, 8, 16 and 24 etc., All the computers in the wired network are directly connected to the switch
have maximum available bandwidth. Switch doesn’t provide the built-in firewall abilities like the routers. In
the telecommunication and packet switched infrastructure switches play an important role. They transmit the
data towards its destination based on the IP address.
Fig. Hosts Connected to a cable on Ethernet Fig. Transceiver connects a host to the cable
The following steps are the carried out while transmitting a file/message to another host on the bus.
1. The source node software breaks up the data to be sent (message) into different frames and sends it
to the NIC.
2. The NIC of the source node adds the field such as source address and destination address etc.
3. The NIC of source node computer CRC of the message and prepare a frame for transmitting to the
destination and it is stored in the memory of NIC.
4. The NIC instructs the transceiver to listen to the bus and look for the idle state of the bus.
5. When the bus transceiver finds that the bus is idle, the NIC starts sending a frame bit by bit.
6. While it sends the full frame it continuous to listen the bus to see if there is any collision. If it
detects it generates a jamming signal to all the nodes to know about collision. After this a binary
exponential back off algorithm takes over. Finally at some stage there is no collision.
7. The frame travels from node to node. The NIC of each node receives the entire frame in its memory
matches the destination address in the frame it its own address to see whether it is meant for that
host. If it is not, it ignores it. If it is, it checks the CRC and if correct, stores it in its memory.
8. The error free frames are passed from NIC to destination host which reconstructs the original
message and uses it.
ETHERNET FRAME FORMAT (IEEE 802.3)
Preamble Destination address Source address Frame type Frame data CRC
8Bytes 6Bytes 6Bytes 2Bytes 64-1500Bytes 4Bytes
Ethernet is a data link layer connection between hosts. Therefore the unit of data exchanged by the host
over Ethernet is called a frame rather than a packet.
1. Preamble: It contains 8bytes or 64bytes of alternating 0’s or 1’s for synchronization of hosts.
2. Destination address: It is 6byte or 48bit long and contains the destination address which is nothing but
address of NIC. On receiving a frame the NIC of destination compares it with its own address and if it
matches, accept the frame otherwise reject the frame.
3. Source address: It is 6bytes or 48bit field having the NIC address of sending host or source host.
4. Frame type: This field identifies the type of data carried in the frames i.e. it stores the number of bytes
in the data field.
5. Frame data: It contains the actual data of the frames which can be of variable length i.e. 64-1500
bytes.
6. CRC: This is a 4byte or 32 bit field helps the destination NIC to detect transmission errors. The
hardware of NIC of sending computer computes the CRC of data and updates this field. The NIC
hardware of destination calculates its own CRC using receiving data and compares it with the contents
of CRC field. If they do not match the destination realizes that a transmission error has occurred and
takes an appropriate action. However it can be informed to higher layer software at the destination
which may request the source for retransmission of error frame.
2.9 POINT TO POINT AND POINT TO MULTIPOINT NETWORKS
Point to point link
Point to point link, also known as P2P refers to a connection restricted between two end points,
usually hosts or computers. The point to point line configuration provides a dedicated link between two
devices. The entire capacity of the channel is reserved for the two devices. For ex. Changing the T.V
channels by remote control establishes a point to point connection on TV control system.
APs. The idea is similar to communication in a cellular network. If consider each BSS to be a cell and each
AP to be base station. Note that mobile stations can belong to more than one BSS.
Station types
IEEE 802.11 defines 3 types of stations based on their mobility in a wire less LAN
1. No transition 2. BSS transition 3. ESS transition mobility
No transition: A station with no transition mobility is either stationary or moving only inside a BSS.
BSS transition. A station with BSS transition mobility can move from one BSS to another, but the
movement is confined inside one ESS.
ESS transition. A station with ESS transition mobility can move from one ESS to another.
2.12 BLUE TOOTH TECHNOLOGY
Blue tooth is wireless LAN technology designed to connect different devices such as telephones, notebooks,
computers, cameras, printers etc.
It was originally started as a project by ERRICSON company. Blue tooth technology was standardized by
IEEE 802.15, which defines a Wireless PAN(Personal Area Network)
Blue Tooth defines two types of networks.
1. Pico Net : It is a Blue Tooth network which can have upto 8 stations. One of the stations is called primary
and the rest are secondary. All the secondary stations synchronize their clocks and hopping sequence with
primary. Communication between primary and secondary can be one to one and one to many.
2. Scatter Net :Pico Net can be combined to form a Scatter net. A secondary station in one Pico Net can the
primary in another Pico Net.
Fig. Pico Net Fig. Scatter Net
BLUE TOOTH STANDARDS
Blue tooth technology was standardized by IEEE 802.15.
Blue tooth uses 2.4 GHZ ISM band and provides 1 MBPS speed in its first version.
Blue tooth uses FHSS technique to avoid interference from other devices, hopping the frequency
1600 times / sec.
Blue tooth uses GFSK ( Gaussian Bandwidth filtering ) modulation
Blue tooth uses two types of links.
1.SCO(Synchronous Connection Oriented Channel): It is used when speed of delivery is
more important than error free delivery. This is used for real time audio.
2.ACL(Asynchronous Connectionless Channel):It is used when data integrity is more
important. It is used for data.
Applications of Blue Tooth
A Blue tooth network in an office or organization can avoid the complex task of networking
between computing devices.
Blue tooth enables digital cameras can send still or video images from one location to another.
Blue tooth allows automatic synchronization of desktop, note book and mobile phone.
Blue tooth helps to provide home automation.
These are only a small set of potential applications of Blue tooth. There are a large no of other
application for Blue tooth technology.
2.13 APPLICATION OF WAP
Wireless Application Protocol (WAP) is a technical standard for accessing information over a
mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that
uses the protocol.
A WAP is an open interaction standard for application that used in Wire less communication. Its principle
application is to enable access to the internet from a mobile phone. A WAP browser provides all the basic
services of a computer based web browser but simplified to operate with in the restrictions of mobile phone.
The following are the applications of WAP.
1. E-mail by mobile phone.
2. Tracking of stock market prices.
3. Sports results.
4. News headlines.
5. Music downloads.
6. Information, weather forecasting, stock quotations, horoscopes and news.
7. Messaging services such as e-mail, voice mail and unified messages.
8. Financial services: - Mobile banking and mobile based services.
9. Personal information management: - Services such as call management and personal directories
which enables the modifications of personal information.
10. Location based services: - Services that are dependent on location including mapping and vehicle
location information.