Computer Communication Networks
Computer Communication Networks
Computer Communication Networks
COURSE FILE
1.VISION AND MISSION OF THE INSTITUTE
PREPARATION
PEO1
To offer students with strong foundation in Electronics and Communication
Engineering required framing, analyzing, and understanding the fundamental concepts
essential to observe, resolve and evaluate the multidimensional engineering problems
and prepare them to meet industry, higher education and Research
CORE COMPETENCE
PEO2
To apply circuit analysis, design, hardware & assembly language programming skills,
to find, solve, and analyze electronics and communication engineering problems,
experimental evaluation, decision making along with cognitive knowledge and be able
to adapt this knowledge in industry, higher education and research.
PROFESSIONALISM
PEO3
To develop an attitude for life-long learning and adapt new ideas as the electronics
and communication engineering evolves. To offer broaden knowledge and establish
themselves as creative professionals.
SKILL
PEO4
To provide a learning environment to become innovators / scientists with good
technical, cognitive skills to become an efficient technical team-member and team
leader with innovative ideas required for industrial development and research.
ETHICS
PEO5
To possess leadership qualities with ethical value to work efficiently in diverse teams,
societal needs, promote and practice ethical standards.
PREPARATION
PEO1
To offer students with strong foundation in Electronics and Communication
Engineering required framing, analyzing, and understanding the fundamental concepts
essential to observe, resolve and evaluate the multidimensional engineering problems
and prepare them to meet industry, higher education and Research
CORE COMPETENCE
PEO2
To apply circuit analysis, design, hardware & assembly language programming skills,
to find, solve, and analyze electronics and communication engineering problems,
experimental evaluation, decision making along with cognitive knowledge and be able
to adapt this knowledge in industry, higher education and research.
PROFESSIONALISM
PEO3
To develop an attitude for life-long learning and adapt new ideas as the electronics
and communication engineering evolves. To offer broaden knowledge and establish
themselves as creative professionals.
SKILL
PEO4
To provide a learning environment to become innovators / scientists with good
technical, cognitive skills to become an efficient technical team-member and team
leader with innovative ideas required for industrial development and research.
ETHICS
PEO5
To possess leadership qualities with ethical value to work efficiently in diverse teams,
societal needs, promote and practice ethical standards.
Programme Outcomes
Engineering Knowledge: Apply the knowledge of mathematics, science, and
PO1
engineering fundamentals for understanding the domain of Electronics and
Communication Engineering
Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and
PO5
modern engineering and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations
The Engineer and Society: Apply reasoning informed by the contextual knowledge to
PO6
assess societal, health, safety, legal and cultural issues and the consequent
responsibilities relevant to the professional engineering practice.
Ethics: Apply ethical principles and commit to professional ethics and responsibilities
PO8
and norms of the engineering practice.
Life-long Learning: Recognize the need for, and have the preparation and ability to
PO12
engage in independent and lifelong learning in the broadest context of technological
change.
List of PSOs:
PSO 1 : Design, specify, test and evaluate modern electronic systems that perform analog and digitaloperations
using integrated circuits.
PSO2:Design, analyse the concepts in the field of wireless communication, networking with relatedapplications
and to develop solutions for problems of social relevance
PSO3:Design, specify, test, evaluate and analyse the concepts of digital signal processor andapplications in the
field of image processing ,VLSI and Embedded Systems
TOTAL HOURS: 30
UNIT 1 INTRODUCTION TO DATA COMMUNICATIONS 6
Components-Data Representation-Data Flow, NETWORKS: Distributed Processing- Network
Criteria-Physical Structures-Network Models-Categories of Networks, Inter connection of
Networks- Internetwork, Internet: Protocols-Standards-Standards Organizations.
Assignment Topics
Proposed
S.No Topic CO’s Completed Date BT level
Date
Develop the Routing Information Protocol
1 CO4 3
Explain the TCP services.
2 CO5 2
Reference
Description
Code
Computer Networks, James J Kurose, Keith W Ross, Pearson Education, 2013, ISBN:
R1
0-273-76896-4
Introduction to Data Communication and Networking, Wayarles Tomasi, Pearson
R2
Education, 2007, ISBN:0130138282
Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth
R3
Edition, Morgan Kaufmann Publishers Inc., 2012.
William Stallings, Data and Computer Communications, Tenth Edition, Pearson
R4
Education, 2013.
R5 Computer Communication Networks Manual
Assessment Pattern:
There are 4 Continuous Learning Assessment (CLA) for the subject and for CLA 1 for 30 marks,
CLA 2 for 30 Marks and CLA3 for 30 Marks and CLA 4 for 10 Marks.
CO WEIGHTAGE
Total
TOTAL
EXAMS Marks WEIGHTAGE
MARKS
split up
Continuous Internal Assessment
Theory 100
(CLA 1,CLA 2,CLA 3, CLA 4) 50% of Average
Continuous internal Assessment Lab 100 Marks
100
(CLA 1,CLA 2,CLA 3, CLA 4)
End Semester Exam theory 100
End Semester Lab Exam 100 50% of Average
Part D – Learning Resources
TEXT BOOK:
1. Data Communications and Networking, Forouzan, 5th Edition, McGraw Hill, 2016 ISBN:
1-25-906475-3
2. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall,
2014.
REFERENCES:
1. Computer Networks, James J Kurose, Keith W Ross, Pearson Education, 2013, ISBN: 0-
273-76896-4
2. Introduction to Data Communication and Networking, Wayarles Tomasi, Pearson
Education, 2007, ISBN:0130138282
3. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth
Edition, Morgan Kaufmann Publishers Inc., 2012.
4. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education,
2013.
ONLINE RESOURCES:
1. https://onlinecourses.nptel.ac.in/noc22_cs19/preview
2. https://www.udemy.com/course/learning-computer-communication-and-networking-
fundamentals/
3. https://www.tutorialspoint.com/data_communication_computer_network/index.htm
1
U20ECCJ09
COURSE MATERIAL
2
UNIT 1
INTRODUCTION TO DATA COMMUUNICATION
Components-Data Representation-Data Flow, NETWORKS: Distributed Processing-
Network Criteria-Physical Structures-Network Models-Categories of Networks, Inter connection of
Networks- Internetwork, Internet: Protocols-Standards-Standards Organizations
1.0 INTRODUCTION
Data refers to the raw facts that are collected while information
refers to processed data that enables us to take decisions.
Ex. When result of a particular test is declared it contains dataof all
students, when you find the marks you have scored you have the
information that lets you know whether you have passed or failed.
The word data refers to any information which is presented in a form
that is agreed and accepted upon by is creators and users.
1. Message
Message is the information to be communicated by the sender tothe
receiver.
2. Sender
The sender is any device that is capable of sending the data(message).
3. Receiver
The receiver is a device that the sender wants to communicate thedata
(message).
4. Transmission Medium
It is the path by which the message travels from sender to receiver.It can
be wired or wireless and many subtypes in both.
5
5. Protocol
It is an agreed upon set or rules used by the sender and receiver to
communicate data.
A protocol is a set of rules that governs data communication. A
Protocol is a necessity in data communications without which the
communicating entities are like two persons trying to talk to each
other in a different language without know the other language.
1. Text
Text includes combination of alphabets in small case as wellas
upper case.
It is stored as a pattern of bits. Prevalent encoding system :
ASCII, Unicode
2. Numbers
Numbers include combination of digits from 0 to 9.
It is stored as a pattern of bits. Prevalent encoding system :
ASCII, Unicode
3. Images
―An image is worth a thousand words‖ is a very famous saying.
In computers images are digitally stored.
A Pixel is the smallest element of an image. To put it in simple terms,
a picture or image is a matrix of pixel elements.
The pixels are represented in the form of bits. Depending upon the type
of image (black n white or color) each pixel would require different
number of bits to represent the value of a pixel.
The size of an image depends upon the number of pixels (also called
resolution) and the bit pattern used to indicate the value of each pixel.
Example: if an image is purely black and white (two color) each pixel
can be represented by a value either 0 or 1, so an image made up of 10
x 10 pixel elements would require only 100 bits in memory to be stored.
On the other hand an image that includes gray may require 2 bits to
represent every pixel value (00 - black, 01 – dark gray, 10
6
4. Audio
Data can also be in the form of sound which can be recordedand
broadcasted. Example: What we hear on the radio is a source of data
or information.
Audio data is continuous, not discrete.
5. Video
Video refers to broadcasting of data in form of picture or movie
1.4.1 Simplex
In half duplex both the stations can transmit as well as receivebut not
at the same time.
When one device is sending other can only receive and vice-versa
(as shown in figure above.)
Example: A walkie-talkie.
In Full duplex mode, both stations can transmit and receiveat the
same time.
Example: mobile phones
Definition:
A computer network can be defined as a collection of nodes. A node
can be any device capable of transmitting or receiving data.
The communicating nodes have to be connected by communication
links.
1.6 PROTOCOL
A. Syntax
It means the structure or format of the data.
It is the arrangement of data in a particular order.
B. Semantics
It tells the meaning of each section of bits andindicates
the interpretation of each section.
It also tells what action/decision is to be taken basedon
the interpretation.
C. Timing
It tells the sender about the readiness of the receiver to
receive the data
It tells the sender at what rate the data should be sentto the
receiver to avoid overwhelming the receiver.
1. De facto Standard
o These are the standards that have been traditionallyused
and mean by fact or by convention
o These standards are not approved by any organizedbody
but are adopted by widespread use.
2. De jure standard
o It means by law or by regulation.
o These standards are legislated and approved by an
body that is officially recognized.
10
1.7.2 Standard Organizations in field of Networking
oStandards are created by standards creation committees, forums,
and government regulatory agencies.
o Examples of Forums
1. ATM Forum
2. MPLS Forum
3. Frame Relay Forum
1.9 REFERENCES
2.1 INTRODUCTION
ii. Each subtask will have its own process or processes to do and will
take specific inputs and give specific outputs to the subtask before
or after it. In more technical terms we can callthese sub tasks as
layers.
iii. In general, every task or job can be done by dividing it into sub task
or layers. Consider the example of sending a letter where the sender
is in City A and receiver is in city B.
vi. At the sender site, the activities take place in the following
descending order:
a. Higher Layer: The sender writes the letter along with the sender
and receivers address and put it in an envelope and drop it in the
mailbox.
b. Middle Layer: The letter is picked up by the post man and
delivered to the post office
c. Lower Layer: The letters at the post office are sorted and are
ready to be transported through a carrier.
vii. During transition the letter may be carried by truck, plane or ship or
a combination of transport modes before it reaches the destination
post office.
viii. At the Receiver site, the activities take place in the following
ascending order:
a. Lower Layer: The carrier delivers the letter to the
destination post office
b. Middle Layer: After sorting, the letter is delivered to the
receivers mail box
c. Higher Layer: The receiver picks up the letter, opens the
envelope and reads it.
ix. Hierarchy of layers: The activities in the entire task are organized
into three layers. Each activity at the sender or receiver side occurs
in a particular order at the hierarchy.
x. The important and complex activities are organized into the Higher
Layer and the simpler ones into middle and lower layer.
The OSI model has 7 layers each with its own dedicated task.
The Data Link layer determines the next node where the message is
supposed to be forwarded and the network layer determines the final
recipient.
On every sending device, each layer calls upon the service offered
by the layer below it.
On every receiving device, each layer calls upon the service offered
by the layer above it.
Fig: Encapsulation
16
As shown in the figure above the data at layer 7 i.e the Application
layer along with the header added at layer 7 is given to layer 6, the
Presentation layer. This layer adds Its header and passed the whole
package to the layer below.
II. On the sender side, the physical layer receives the data fromData
Link Layer and encodes it into signals to be transmitted onto the
medium. On the receiver side, the physical layer receives the signals
from the transmission medium decodesit back into data and sends
it to the Data Link Layer as shown in the figure below:
III. Interface
The Physical Layer defines the characteristics of interfaces
between the devices & transmission medium.
17
V. Data rate
The physical layer defines the data transmission rate i.e.number of
bits sent per second. It is the responsibility of the physical layer to
maintain the defined data rate.
2.3.5.2.2 On the sender side, the Data Link layer receives the data from
Network Layer and divides the stream of bits into fixed size
manageable units called as Frames and sends it to the physical
layer. On the receiver side, the data link layer receives the stream
of bits from the physical layer and regroups them into frames
and sends them to the Network layer. This process is called
Framing. It is shown in the figure below:
18
II. The network layer at the sending side accepts data from the transport
layer, divides it into packets, adds addressing information in the
header and passes it to the data link layer. At the receiving end the
network layer receives the frames sent by data link layer, converts
them back into packets, verifies the physical address (verifies if the
receiver address matches with its own address) and the send the
packets to the transport layer.
V. Routing
VI. The network layer divides data into units called packets of
equal size and bears a sequence number for rearranging on the
receiving end.
VI. The Network layer does not perform any flow control or error
control
II. The presentation layer at sending side receives the datafrom the
application layer adds header which contains information related to
encryption and compression and sends it to the session layer. At
the receiving side, the presentation layer receives data from the
session layer decompresses and decrypts the data as required and
translates it back as per the encoding scheme used at the receiver.
III. Translation
The sending and receiving devices may run on different platforms
(hardware, software and operating system). Henceit is important that
they understand the messages that are used for communicating.
Hence a translation service may be required which is provided by
the Presentation layers
IV. Compression
Compression ensures faster data transfer. The data compressed at
sender has to be decompressed at the receiving end, both performed
by the Presentation layer.
V. Encryption
It is the process of transforming the original message tochange its
meaning before sending it. The reverse process called decryption
has to be performed at the receiving end to recover the original
message from the encrypted message.
2.3.5.7.3 X400 is services that provides basis for mail storage and
forwarding
2.4 SUMMARY
UNIT II
RANDOM ACCESS: ALOHA- Carrier Sense Multiple Access(CSMA)-Carrier Sense Multiple Access
with Collision Detection(CSMAlCD)- Carrier Sense Multiple Access with Collision Avoidance
(CSMAlCA), CONTROLLED ACCESS: Reservation- Token Passing. CHANNELIZATION:
Frequency-Division Multiple Access (FDMA)- Time-Division Multiple Access (TDMA)- Code-Division
Multiple Access (CDMA).
Multiple access protocol- ALOHA, CSMA, CSMA/CA and CSMA/CD
Data Link Layer
The data link layer is used in a computer network to transmit the data between two devices or nodes. It
divides the layer into parts such as data link control and the multiple access resolution/protocol. The
upper layer has the responsibility to flow control and the error control in the data link layer, and hence it is
termed as logical of data link control. Whereas the lower sub-layer is used to handle and reduce the
collision or multiple access on a channel. Hence it is termed as media access control or the multiple access
resolutions.
A data link control is a reliable channel for transmitting data over a dedicated link using various techniques
such as framing, error control and flow control of data packets in the computer network.
When a sender and receiver have a dedicated link to transmit data packets, the data link control is enough
to handle the channel. Suppose there is no dedicated path to communicate or transfer the data between two
devices. In that case, multiple stations access the channel and simultaneously transmits the data over the
channel. It may create collision and cross talk. Hence, the multiple access protocol is required to reduce
the collision and avoid crosstalk between the channels.
For example, suppose that there is a classroom full of students. When a teacher asks a question, all the
students (small channels) in the class start answering the question at the same time (transferring the data
simultaneously). All the students respond at the same time due to which data is overlap or data lost.
Therefore it is the responsibility of a teacher (multiple access protocol) to manage the students and make
them one answer.
Following are the types of multiple access protocol that is subdivided into the different process as:
27
In this protocol, all the station has the equal priority to send the data over a channel. In random access
protocol, one or more stations cannot depend on another station nor any station control another station.
Depending on the channel's state (idle or busy), each station transmits the data frame. However, if more
than one station sends the data over a channel, there may be a collision or data conflict. Due to the collision,
the data frame packets may be lost or changed. And hence, it does not receive by the receiver end.
Following are the different methods of random-access protocols for broadcasting frames on the channel.
o Aloha
o CSMA
o CSMA/CD
o CSMA/CA
It is designed for wireless LAN (Local Area Network) but can also be used in a shared medium to
transmit data. Using this method, any station can transmit data across a network simultaneously when a
data frameset is available for transmission.
Aloha Rules
Pure Aloha
Whenever data is available for sending over a channel at stations, we use Pure Aloha. In pure Aloha,
when each station transmits data to a channel without checking whether the channel is idle or not, the
chances of collision may occur, and the data frame can be lost. When any station transmits the data frame
to a channel, the pure Aloha waits for the receiver's acknowledgment. If it does not acknowledge the
receiver end within the specified time, the station waits for a random amount of time, called the backoff
time (Tb). And the station may assume the frame has been lost or destroyed. Therefore, it retransmits the
frame until all the data are successfully transmitted to the receiver.
As we can see in the figure above, there are four stations for accessing a shared channel and transmitting
data frames. Some frames collide because most stations send their frames at the same time. Only two
29
frames, frame 1.1 and frame 2.2, are successfully transmitted to the receiver end. At the same time, other
frames are lost or destroyed. Whenever two frames fall on a shared channel simultaneously, collisions
can occur, and both will suffer damage. If the new frame's first bit enters the channel before finishing the
last bit of the second frame. Both frames are completely finished, and both stations must retransmit the
data frame.
Slotted Aloha
The slotted Aloha is designed to overcome the pure Aloha's efficiency because pure Aloha has a very
high possibility of frame hitting. In slotted Aloha, the shared channel is divided into a fixed time interval
called slots. So that, if a station wants to send a frame to a shared channel, the frame can only be sent at
the beginning of the slot, and only one frame is allowed to be sent to each slot. And if the stations are
unable to send data to the beginning of the slot, the station will have to wait until the beginning of the slot
for the next time. However, the possibility of a collision remains when trying to send a frame at the
beginning of two or more station time slot.
It is a carrier sense multiple access based on media access protocol to sense the traffic on a channel
(idle or busy) before transmitting the data. It means that if the channel is idle, the station can send data to
the channel. Otherwise, it must wait until the channel becomes idle. Hence, it reduces the chances of a
collision on a transmission medium.
Non-Persistent: It is the access mode of CSMA that defines before transmitting the data, each node must
sense the channel, and if the channel is inactive, it immediately sends the data. Otherwise, the station
must wait for a random time (not continuously), and when the channel is found to be idle, it transmits the
frames.
P-Persistent: It is the combination of 1-Persistent and Non-persistent modes. The P-Persistent mode
defines that each node senses the channel, and if the channel is inactive, it sends a frame with
a P probability. If the data is not transmitted, it waits for a (q = 1-p probability) random time and
resumes the frame with the next time slot.
O- Persistent: It is an O-persistent method that defines the superiority of the station before the
transmission of the frame on the shared channel. If it is found that the channel is inactive, each station
waits for its turn to retransmit the data.
CSMA/ CD
It is a carrier sense multiple access/ collision detection network protocol to transmit data frames. The
CSMA/CD protocol works with a medium access control layer. Therefore, it first senses the shared
31
channel before broadcasting the frames, and if the channel is idle, it transmits a frame to check whether
the transmission was successful. If the frame is successfully received, the station sends another frame. If
any collision is detected in the CSMA/CD, the station sends a jam/ stop signal to the shared channel to
terminate data transmission. After that, it waits for a random time before sending a frame to a channel.
CSMA/ CA
It is a carrier sense multiple access/collision avoidance network protocol for carrier transmission of
data frames. It is a protocol that works with a medium access control layer. When a data frame is sent to a
channel, it receives an acknowledgment to check whether the channel is clear. If the station receives only
a single (own) acknowledgments, that means the data frame has been successfully transmitted to the
receiver. But if it gets two signals (its own and one more in which the collision of frames), a collision of
the frame occurs in the shared channel. Detects the collision of the frame when a sender receives an
acknowledgment signal.
Following are the methods used in the CSMA/ CA to avoid the collision:
Interframe space: In this method, the station waits for the channel to become idle, and if it gets the
channel is idle, it does not immediately send the data. Instead of this, it waits for some time, and this time
period is called the Interframe space or IFS. However, the IFS time is often used to define the priority of
the station.
Contention window: In the Contention window, the total time is divided into different slots. When the
station/ sender is ready to transmit the data frame, it chooses a random slot number of slots as wait time.
If the channel is still busy, it does not restart the entire process, except that it restarts the timer only to
send data packets when the channel is inactive.
Acknowledgment: In the acknowledgment method, the sender station sends the data frame to the shared
channel if the acknowledgment is not received ahead of time.
This method was developed to decrease the chances of collisions when two or more stations start
sending their signals over the data link layer. Carrier Sense multiple access requires that each station first
check the state of the medium before sending.
Vulnerable Time:
Vulnerable time = Propagation time (Tp)
32
The persistence methods can be applied to help the station take action when the channel is busy/idle.
In this method, a station monitors the medium after it sends a frame to see if the transmission was
successful. If successful, the transmission is finished, if not, the frame is sent again.
33
In the diagram, starts sending the first bit of its frame at t1 and since C sees the channel idle at t2, starts
sending its frame at t2. C detects A’s frame at t3 and aborts transmission. A detects C’s frame at t4 and
aborts its transmission. Transmission time for C’s frame is, therefore, t3-t2 and for A’s frame is
t4-t1
So, the frame transmission time (Tfr) should be at least twice the maximum propagation time
(Tp). This can be deduced when the two stations involved in a collision are a maximum distance apart.
Process: The entire process of collision detection can be explained as follows:
Throughput and Efficiency: The throughput of CSMA/CD is much greater than pure or slotted
ALOHA.
For the 1-persistent method, throughput is 50% when G=1.
The basic idea behind CSMA/CA is that the station should be able to receive while transmitting to detect
a collision from different stations. In wired networks, if a collision has occurred then the energy of the
received signal almost doubles, and the station can sense the possibility of collision. In the case of
wireless networks, most of the energy is used for transmission, and the energy of the received signal
increases by only 5-10% if a collision occurs. It can’t be used by the station to sense collision.
Therefore CSMA/CA has been specially designed for wireless networks.
These are three types of strategies:
1. InterFrame Space (IFS): When a station finds the channel busy it senses the channel again, when
the station finds a channel to be idle it waits for a period of time called IFS time. IFS can also be
used to define the priority of a station or a frame. Higher the IFS lower is the priority.
2. Contention Window: It is the amount of time divided into slots. A station that is ready to send frames
chooses a random number of slots as wait time.
3. Acknowledgments: The positive acknowledgments and time-out timer can help guarantee a
successful transmission of the frame.
Characteristics of CSMA/CA :
1. Carrier Sense: The device listens to the channel before transmitting, to ensure that it is not currently
in use by another device.
2. Multiple Access: Multiple devices share the same channel and can transmit simultaneously.
3. Collision Avoidance: If two or more devices attempt to transmit at the same time, a collision occurs.
CSMA/CA uses random backoff time intervals to avoid collisions.
4. Acknowledgment (ACK): After successful transmission, the receiving device sends an ACK to
confirm receipt.
5. Fairness: The protocol ensures that all devices have equal access to the channel and no single device
monopolizes it.
6. Binary Exponential Backoff: If a collision occurs, the device waits for a random period of time
before attempting to retransmit. The backoff time increases exponentially with each retransmission
attempt.
7. Interframe Spacing: The protocol requires a minimum amount of time between transmissions to
allow the channel to be clear and reduce the likelihood of collisions.
8. RTS/CTS Handshake: In some implementations, a Request-To-Send (RTS) and Clear-To-Send
(CTS) handshake is used to reserve the channel before transmission. This reduces the chance of
collisions and increases efficiency.
9. Wireless Network Quality: The performance of CSMA/CA is greatly influenced by the quality of
the wireless network, such as the strength of the signal, interference, and network congestion.
10. Adaptive Behavior: CSMA/CA can dynamically adjust its behavior in response to changes in
network conditions, ensuring the efficient use of the channel and avoiding congestion.
Overall, CSMA/CA balances the need for efficient use of the shared channel with the need to avoid
collisions, leading to reliable and fair communication in a wireless network.
35
Advantages of CSMA:
1. Increased efficiency: CSMA ensures that only one device communicates on the network at a time,
reducing collisions and improving network efficiency.
2. Simplicity: CSMA is a simple protocol that is easy to implement and does not require complex
hardware or software.
3. Flexibility: CSMA is a flexible protocol that can be used in a wide range of network environments,
including wired and wireless networks.
4. Low cost: CSMA does not require expensive hardware or software, making it a cost-effective
solution for network communication.
Disadvantages of CSMA:
1. Limited scalability: CSMA is not a scalable protocol and can become inefficient as the number of
devices on the network increases.
2. Delay: In busy networks, the requirement to sense the medium and wait for an available channel
can result in delays and increased latency.
3. Limited reliability: CSMA can be affected by interference, noise, and other factors, resulting in
unreliable communication.
4. Vulnerability to attacks: CSMA can be vulnerable to certain types of attacks, such as jamming
and denial-of-service attacks, which can disrupt network communication.
37
Comparison of various protocols:
Low-traffic
Pure Sends frames No collision
Low networks
ALOHA immediately detection
Wireless
Monitors medium Collision avoidance
networks with
while transmitting, through random
CSMA/CA High moderate to high
adjusts behavior to backoff time
traffic and high
avoid collisions intervals
error rates
In controlled access, the stations seek information from one another to find which station has the right
to send. It allows only one node to send at a time, to avoid the collision of messages on a shared
medium. The three controlled-access methods are:
1. Reservation
2. Polling
3. Token Passing
Reservation
In the reservation method, a station needs to make a reservation before sending data.
The timeline has two kinds of periods:
1. Reservation interval of fixed time length
2. Data transmission period of variable frames.
If there are M stations, the reservation interval is divided into M slots, and each station has o ne slot.
Suppose if station 1 has a frame to send, it transmits 1 bit during the slot 1. No other station is
allowed to transmit during this slot.
In general, i th station may announce that it has a frame to send by inserting a 1 bit into i th slot.
After all N slots have been checked, each station knows which stations wish to transmit.
The stations which have reserved their slots transfer their frames in that order.
After data transmission period, next reservation interval begins.
Since everyone agrees on who goes next, there will never be any collisions.
38
The following figure shows a situation with five stations and a five-slot reservation frame. In the first
interval, only stations 1, 3, and 4 have made reservations. In the second interval, only station 1 has
made a reservation.
Advantages of Reservation:
The main advantage of reservation is high rates and low rates of data accessing time of the
respective channel can be predicated easily. Here time and rates are fixed.
Priorities can be set to provide speedier access from secondary.
Predictable network performance: Reservation-based access methods can provide predictable
network performance, which is important in applications where latency and jitter must be
minimized, such as in real-time video or audio streaming.
Reduced contention: Reservation-based access methods can reduce contention for network
resources, as access to the network is pre-allocated based on reservation requests. This can improve
network efficiency and reduce packet loss.
Quality of Service (QoS) support: Reservation-based access methods can support QoS
requirements, by providing different reservation types for different types of traffic, such as voice,
video, or data. This can ensure that high-priority traffic is given preferential treatment over lower-
priority traffic.
Efficient use of bandwidth: Reservation-based access methods can enable more efficient use of
available bandwidth, as they allow for time and frequency multiplexing of different reservation
requests on the same channel.
Support for multimedia applications: Reservation-based access methods are well-suited to
support multimedia applications that require guaranteed network resources, such as bandwidth and
latency, to ensure high-quality performance.
Disadvantages of Reservation:
Highly trust on controlled dependability.
Decrease in capacity and channel data rate under light loads; increase in turn-around time.
Polling
Polling process is similar to the roll-call performed in class. Just like the teacher, a controller sends
a message to each node in turn.
In this, one acts as a primary station(controller) and the others are secondary stations. All data
exchanges must be made through the controller.
The message sent by the controller contains the address of the node being selected for granting
access.
Although all nodes receive the message the addressed one responds to it and sends data if any. If
there is no data, usually a “poll reject”(NAK) message is sent back.
Problems include high overhead of the polling messages and high dependence on the reliability of
the controller.
39
Advantages of Polling:
The maximum and minimum access time and data rates on the channel are fixed predictable.
It has maximum efficiency.
It has maximum bandwidth.
No slot is wasted in polling.
There is assignment of priority to ensure faster access from some secondary.
Disadvantages of Polling:
It consume more time.
Since every station has an equal chance of winning in every round, link sharing is biased.
Only some station might run out of data to send.
An increase in the turnaround time leads to a drop in the data rates of the channel under low loads.
Efficiency Let T poll be the time for polling and T t be the time required for transmission of data. Then,
Efficiency = Tt/(Tt + Tpoll)
Token Passing
In token passing scheme, the stations are connected logically to each other in form of ring and
access to stations is governed by tokens.
A token is a special bit pattern or a small message, which circulate from one station to the next in
some predefined order.
In Token ring, token is passed from one station to another adjacent station in the ring whereas
incase of Token bus, each station uses the bus to send the token to the next station in some
predefined order.
In both cases, token represents permission to send. If a station has a frame queued for transmission
when it receives the token, it can send that frame before it passes the token to the next station. If it
has no queued frame, it passes the token simply.
After sending a frame, each station must wait for all N stations (including itself) to send the token
to their neighbours and the other N – 1 stations to send a frame, if they have one.
There exists problems like duplication of token or token is lost or insertion of new station, removal
of a station, which need be tackled for correct and reliable operation of this scheme.
40
C. Channelization Protocols
It is a channelization protocol that allows the total usable bandwidth in a shared channel to be shared
across multiple stations based on their time, distance and codes. It can access all the stations at the same
time to send the data frames to the channel.
41
Following are the various methods to access the channel based on their time, distance and codes:
1. Frequency Division Multiple Access (FDMA) : FDMA is a type of channelization protocol. In this
bandwidth is divided into various frequency bands. Each station is allocated with band to send data and
that band is reserved for particular station for all the time which is as follows :
Figure – FDMA
The frequency bands of different stations are separated by small band of unused frequency and that
unused frequency bands are called as guard bands that prevents the interference of stations. It is like
access method in data link layer in which data link layer at each station tells its physical layer to make
a band pass signal from the data passed to it. The signal is created in the allocated band and there is no
physical multiplexer at the physical layer.
2. Time Division Multiple Access (TDMA) : TDMA is the channelization protocol in which
bandwidth of channel is divided into various stations on the time basis. There is a time slot given to
each station, the station can transmit data during that time slot only which is as follows :
42
Figure – TDMA
Each station must aware of its beginning of time slot and the location of the time slot. TDMA requires
synchronization between different stations. It is type of access method in the data link layer. At each
station data link layer tells the station to use the allocated time slot.
3. Code Division Multiple Access (CDMA) : In CDMA, all the stations can transmit data
simultaneously. It allows each station to transmit data over the entire frequency all the time. Multiple
simultaneous transmissions are separated by unique code sequence. Each user is assigned with a unique
code sequence.
Figure – CDMA
43
In the above figure, there are 4 stations marked as 1, 2, 3 and 4. Data assigned with respective stations
as d1, d2, d3 and d4 and the code assigned with respective stations as c1, c2, c3 and c4.
Spatial Division Multiple Access (SDMA) – SDMA uses multiple antennas at the transmitter and
receiver to separate the signals of multiple users that are located in different spatial directions. This
technique is commonly used in MIMO (Multiple-Input, Multiple-Output) wireless communication
systems.
Advantages :
Frequency band uses effectively
The overall signal quality will be improved
The overall data rate will be increased
Disadvantages :
It is complex to implement
It require the accurate information about the channel
FDMA stands for Frequency TDMA stands for Time CDMA stands for Code
Division Multiple Access. Division Multiple Access. Division Multiple Access.
In this, sharing of bandwidth In this, only the sharing of In this, there is sharing of both
among different stations takes time of satellite i.e. bandwidth and time among
place. transponder takes place. different stations takes place.
Mode of data transfer is Mode of data transfer is Mode of data transfer is digital
continuous signal. signal in bursts. signal.
UNIT III
WIRED LANS: Ethernet, Ethernet Protocol: IEEE802- Data Link Layer- Physical Layer, STANDARD
ETHERNET: MAC Sub layer- Physical Layer, CHANGES IN THE STANDARD: Bridged Ethernet
Switched Ethernet-Full-Duplex Ethernet. WIRELESS LANS: IEEE 802.11- Architecture- MAC Sub
layer- Addressing Mechanism- Physical Layer. BLUETOOTH: Architecture.
ETHERNET:
What is Ethernet?
Ethernet is the most widely used LAN technology and is defined under IEEE standards 802.3. The reason
behind its wide usability is that Ethernet is easy to understand, implement, and maintain, and allows low-
cost network implementation. Also, Ethernet offers flexibility in terms of the topologies that are allowed.
Ethernet generally uses a bus topology. Ethernet operates in two layers of the OSI model, the physical
layer and the data link layer. For Ethernet, the protocol data unit is a frame since we mainly deal with
DLLs. In order to handle collisions, the Access control mechanism used in Ethernet is CSMA/CD.
Although Ethernet has been largely replaced by wireless networks, wired networking still uses Ethernet
more frequently. Wi-Fi eliminates the need for cables by enabling users to connect their smartphones or
laptops to a network wirelessly. The 802.11ac Wi-Fi standard offers faster maximum data transfer rates
when compared to Gigabit Ethernet. However, wired connections are more secure and less susceptible
to interference than wireless networks. This is the main justification for why so many companies and
organizations continue to use Ethernet.
There are different types of Ethernet networks that are used to connect devices and transfer data.
Let’s discuss them in simple terms:
1. Fast Ethernet: This type of Ethernet network uses cables called twisted pair or CAT5. It can transfer
data at a speed of around 100 Mbps (megabits per second). Fast Ethernet uses both fiber optic and twisted
pair cables to enable communication. There are three categories of Fast Ethernet: 100BASE-TX,
100BASE-FX, and 100BASE-T4.
2. Gigabit Ethernet: This is an upgrade from Fast Ethernet and is more common nowadays. It can
transfer data at a speed of 1000 Mbps or 1 Gbps (gigabit per second). Gigabit Ethernet also uses fiber
optic and twisted pair cables for communication. It often uses advanced cables like CAT5e, which can
transfer data at a speed of 10 Gbps.
3.10-Gigabit Ethernet: This is an advanced and high-speed network that can transmit data at a speed of
10 gigabits per second. It uses special cables like CAT6a or CAT7 twisted-pair cables and fiber optic
cables. With the help of fiber optic cables, this network can cover longer distances, up to around 10,000
meters.
4. Switch Ethernet: This type of network involves using switches or hubs to improve network
performance. Each workstation in this network has its own dedicated connection, which improves the
speed and efficiency of data transfer. Switch Ethernet supports a wide range of speeds, from 10 Mbps to
10 Gbps, depending on the version of Ethernet being used.
Key Features of Ethernet
1. Speed: Ethernet is capable of transmitting data at high speeds, with current Ethernet standards
supporting speeds of up to 100 Gbps.
2. Flexibility: Ethernet is a flexible technology that can be used with a wide range of devices and
operating systems. It can also be easily scaled to accommodate a growing number of users and
devices.
46
3. Reliability: Ethernet is a reliable technology that uses error-correction techniques to ensure that
data is transmitted accurately and efficiently.
4. Cost-effectiveness: Ethernet is a cost-effective technology that is widely available and easy to
implement. It is also relatively low-maintenance, requiring minimal ongoing support.
5. Interoperability: Ethernet is an interoperable technology that allows devices from different
manufacturers to communicate with each other seamlessly.
6. Security: Ethernet includes built-in security features, including encryption and authentication, to
protect data from unauthorized access.
7. Manageability: Ethernet networks are easily managed, with various tools available to help network
administrators monitor and control network traffic.
8. Compatibility: Ethernet is compatible with a wide range of other networking technologies, making
it easy to integrate with other systems and devices.
9. Availability: Ethernet is a widely available technology that can be used in almost any setting, from
homes and small offices to large data centers and enterprise-level networks.
10. Simplicity: Ethernet is a simple technology that is easy to understand and use. It does not require
specialized knowledge or expertise to set up and configure, making it accessible to a wide range of
users.
11. Standardization: Ethernet is a standardized technology, which means that all Ethernet devices and
systems are designed to work together seamlessly. This makes it easier for network administrators
to manage and troubleshoot Ethernet networks.
12. Scalability: Ethernet is highly scalable, which means it can easily accommodate the addition of
new devices, users, and applications without sacrificing performance or reliability.
13. Broad compatibility: Ethernet is compatible with a wide range of protocols and technologies,
including TCP/IP, HTTP, FTP, and others. This makes it a versatile technology that can be used in
a variety of settings and applications.
14. Ease of integration: Ethernet can be easily integrated with other networking technologies, such as
Wi-Fi and Bluetooth, to create a seamless and integrated network environment.
15. Ease of troubleshooting: Ethernet networks are easy to troubleshoot and diagnose, thanks to a
range of built-in diagnostic and monitoring tools. This makes it easier for network administrators to
identify and resolve issues quickly and efficiently.
16. Support for multimedia: Ethernet supports multimedia applications, such as video and audio
streaming, making it ideal for use in settings where multimedia content is a key part of the user
experience.Ethernet is a reliable, cost-effective, and widely used LAN technology that offers high-
speed connectivity and easy manageability for local networks.
Advantages of Ethernet
Speed: When compared to a wireless connection, Ethernet provides significantly more speed. Because
Ethernet is a one-to-one connection, this is the case. As a result, speeds of up to 10 Gigabits per second
(Gbps) or even 100 Gigabits per second (Gbps) are possible.
Efficiency: An Ethernet cable, such as Cat6, consumes less electricity, even less than a wifi
connection. As a result, these ethernet cables are thought to be the most energy-efficient.
Good data transfer quality: Because it is resistant to noise, the information transferred is of high
quality.
Baud rate = 2* Bit rate
Ethernet LANs consist of network nodes and interconnecting media, or links.
The network nodes can be of two types:
Data Terminal Equipment (DTE): Media, Generally, DTEs are the end devices that convert the user
information into signals or reconvert the received signals. DTE devices are: personal computers,
workstations, file servers or print servers also referred to as end stations. These devices are either the
source or the destination of data frames. The data terminal equipment may be a single piece of
equipment or multiple pieces of equipment that are interconnected and perform all the required
functions to allow the user to communicate. A user can interact with DTE or DTE may be a user.
47
Data Communication Equipment (DCE):- DCEs are the intermediate network devices that receive
and forward frames across the network. They may be either standalone devices such as repeaters,
network switches, or routers, or maybe communications interface units such as interface cards and
modems. The DCE performs functions such as signal conversion, coding, and maybe a part of the DTE
or intermediate equipment.
Disadvantages of Ethernet
Distance limitations: Ethernet has distance limitations, with the maximum cable length for a standard
Ethernet network being 100 meters. This means that it may not be suitable for larger networks that require
longer distances.
Bandwidth sharing: Ethernet networks share bandwidth among all connected devices, which can result
in reduced network speeds as the number of devices increases.
Security vulnerabilities: Although Ethernet includes built-in security features, it is still vulnerable to
security breaches, including unauthorized access and data interception.
Complexity: Ethernet networks can be complex to set up and maintain, requiring specialized knowledge
and expertise.
Compatibility issues: While Ethernet is generally interoperable with other networking technologies,
compatibility issues can arise when integrating with older or legacy systems.
Cable installation: Ethernet networks require the installation of physical cables, which can be time-
consuming and expensive to install.
Physical limitations: Ethernet networks require physical connections between devices, which can limit
mobility and flexibility in network design.
Basic frame format which is required for all MAC implementation is defined in IEEE 802.3 standard.
Though several optional formats are being used to extend the protocol’s basic capability. Ethernet frame
starts with Preamble and SFD, both work at the physical layer. Ethernet header contains both the Source
and Destination MAC address, after which the payload of the frame is present. The last field is CRC
which is used to detect the error. Now, let’s study each field of basic frame format.
1. PREAMBLE – Ethernet frame starts with a 7-Bytes Preamble. This is a pattern of alternative 0’s
and 1’s which indicates starting of the frame and allow sender and receiver to establish bit
synchronization. Initially, PRE (Preamble) was introduced to allow for the loss of a few bits due to
signal delays. But today’s high-speed Ethernet doesn’t need Preamble to protect the frame bits.
PRE (Preamble) indicates the receiver that frame is coming and allow the receiver to lock onto the
data stream before the actual frame begins.
2. Start of frame delimiter (SFD) – This is a 1-Byte field that is always set to 10101011. SFD
indicates that upcoming bits are starting the frame, which is the destination address. Sometimes
SFD is considered part of PRE, this is the reason Preamble is described as 8 Bytes in many places.
The SFD warns station or stations that this is the last chance for synchronization.
48
3. Destination Address – This is a 6-Byte field that contains the MAC address of the machine for
which data is destined.
4. Source Address – This is a 6-Byte field that contains the MAC address of the source machine. As
Source Address is always an individual address (Unicast), the least significant bit of the first byte is
always 0.
5. Length – Length is a 2-Byte field, which indicates the length of the entire Ethernet frame. This 16-
bit field can hold a length value between 0 to 65534, but length cannot be larger than 1500 Bytes
because of some own limitations of Ethernet.
6. Data – This is the place where actual data is inserted, also known as Payload. Both IP header and
data will be inserted here if Internet Protocol is used over Ethernet. The maximum data present may
be as long as 1500 Bytes. In case data length is less than minimum length i.e. 46 bytes, then
padding 0’s is added to meet the minimum possible length.
7. Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field contains a 32-bits hash code
of data, which is generated over the Destination Address, Source Address, Length, and Data field.
If the checksum computed by destination is not the same as sent checksum value, data received is
corrupted.
8. VLAN Tagging – The Ethernet frame can also include a VLAN (Virtual Local Area Network) tag,
which is a 4-byte field inserted after the source address and before the EtherType field. This tag
allows network administrators to logically separate a physical network into multiple virtual
networks, each with its own VLAN ID.
9. Jumbo Frames – In addition to the standard Ethernet frame size of 1518 bytes, some network
devices support Jumbo Frames, which are frames with a payload larger than 1500 bytes. Jumbo
Frames can increase network throughput by reducing the overhead associated with transmitting a
large number of small frames.
10. Ether Type Field – The EtherType field in the Ethernet frame header identifies the protocol carried
in the payload of the frame. For example, a value of 0x0800 indicates that the payload is an IP
packet, while a value of 0x0806 indicates that the payload is an ARP (Address Resolution Protocol)
packet.
11. Multicast and Broadcast Frames – In addition to Unicast frames (which are sent to a specific
destination MAC address), Ethernet also supports Multicast and Broadcast frames. Multicast frames
are sent to a specific group of devices that have joined a multicast group, while Broadcast frames
are sent to all devices on the network.
12. Collision Detection – In half-duplex Ethernet networks, collisions can occur when two devices
attempt to transmit data at the same time. To detect collisions, Ethernet uses a Carrier Sense
Multiple Access with Collision Detection (CSMA/CD) protocol, which listens for activity on the
network before transmitting data and backs off if a collision is detected.
2. Switched Ethernet
The idea of a bridged LAN can be extended to a switched LAN. Instead of having two to four networks.
The bandwidth is shared only between the station and the switch (5 Mbps each). In addition, the collision
domain is divided into N domains. A layer 2 switch is an N-port bridge with additional sophistication that
allows faster handling of the packets. Evolution from a bridged Ethernet to a switched Ethernet was a big
step that opened the way to an even faster Ethernet.
51
3. Full-Duplex Ethernet
One of the limitations of 10Base5 and l0Base2 is that communication is half-duplex, a station can either
send or receive, but may not do both at the same time. The next step in the evolution was to move from
switched Ethernet to full-duplex switched Ethernet. The full-duplex mode increases the capacity of each
domain from 10 to 20 Mbps.
Station: Stations (STA) comprise all devices and equipment that are connected to the wireless LAN. It
can be of two types:
52
Wireless Access Point (WAP): WAPs or simply access points (AP) are wireless routers that bridge
connections for base stations.
Client: Examples include computers, laptops, printers, and smartphones.
Access Point: It is a device that can be classified as a station because of its functionalities and acts as a
connection between wireless medium and distributed systems.
Distribution System: A system used to interconnect a set of BSSs and integrated LANs to create an
ESS.
Frame: It is a MAC protocol data unit.
SSID (Service Set Identifier): It’s the network name for a particular WLAN. All-access points and
devices on a specific WLAN must use the same SSID to communicate.
SDU: It is a data unit that acts as an input to each layer. These can be fragmented or aggregated to form
a PDU.
PDU: It is a data unit projected as an output to communicate with the corresponding layer at the other
end. They contain a header specific to the layer.
Network Interface Controller: It is also known as network interface card. It is a hardware component
that connects devices to the network.
Portal: Serves as a gateway to other networks
Infrastructure BSS
Independent BSS – Supports mutual communication between wireless clients. An ad-hoc network
is spontaneously created and does not support access to wired networks.
Independent BSS
Roaming: In an environment with multiple access points (like a large office building or campus), a
device can move from the range of one AP to another and still maintain its connection. This is
possible due to the underlying architecture of the IEEE 802.11 standard which allows for roaming
between APs.
Authentication and Association: Before a station can send or receive data frames on a WLAN, it
needs to establish its identity with an AP. This process is called authentication. After
authentication, the station then establishes a data link-layer connection with the AP through a
process called association.
MAC layer provides functionality for several tasks like control medium access, can also offer support
for roaming, authentication, and power conservation. The basic services provided by MAC are the
mandatory asynchronous data service and optional time-bounded service. IEEE 802.11 defines two
MAC sub-layers:-
1. Distributed Coordination Function (DCF) – DCF uses CSMA/CA as access method as wireless
LAN can’t implement CSMA/CD. It only offers asynchronous service.
2. Point Coordination Function (PCF) – PCP is implemented on top of DCF and mostly used for
time-service transmission. It uses a centralized, contention-free polling access method. It offers
both asynchronous and time-bounded service.
55
MAC Frame: The MAC layer frame consists of 9 fields. The following figure shows the basic
structure of an IEEE 802.11 MAC data frame along with the content of the frame control field.
Frame Control(FC) – It is 2 bytes long field which defines type of frame and some control
information. Various fields present in FC are:
1. Version: It is a 2 bit long field which indicates the current protocol version which is fixed to be
0 for now.
2. Type: It is a 2 bit long field which determines the function of frame i.e management(00),
control(01) or data(10). The value 11 is reserved.
3. Subtype: It is a 4 bit long field which indicates sub-type of the frame like 0000 for association
request, 1000 for beacon.
4. To DS: It is a 1 bit long field which when set indicates that destination frame is for
DS(distribution system).
5. From DS: It is a 1 bit long field which when set indicates frame coming from DS.
6. More frag (More fragments): It is 1 bit long field which when set to 1 means frame is
followed by other fragments.
7. Retry: It is 1-bit long field, if the current frame is a retransmission of an earlier frame, this bit
is set to 1.
8. Power Mgmt (Power management): It is 1-bit long field that indicates the mode of a station
after successful transmission of a frame. Set to 1 the field indicates that the station goes into
power-save mode. If the field is set to 0, the station stays active.
9. More data: It is 1-bit long field that is used to indicate receiver that a sender has more data to
send than the current frame. This can be used by an access point to indicate to a station in
power-save mode that more packets are buffered or it can be used by a station to indicate to an
access point after being polled that more polling is necessary as the station has more data ready
to transmit.
10. WEP: It is 1 bit long field which indicates that the standard security mechanism of 802.11 is
applied.
11. Order: It is 1 bit long field, if this bit is set to 1 the received frames must be processed in strict
order.
Duration/ID – It is 4 bytes long field which contains the value indicating the period of time in
which the medium is occupied( in µs).
Address 1 to 4 – These are 6 bytes long fields which contain standard IEEE 802 MAC addresses
(48 bit each). The meaning of each address depends on the DS bits in the frame control field.
56
SC (Sequence control) – It is 16 bits long field which consists of 2 sub-fields, i.e., Sequence
number (12 bits) and Fragment number (4 bits). Since acknowledgement mechanism frames may be
duplicated hence, a sequence number is used to filter duplicate frames.
Data – It is a variable length field which contain information specific to individual frames which is
transferred transparently from a sender to the receiver(s).
CRC (Cyclic redundancy check) – It is 4 bytes long field which contains a 32 bit CRC error
detection sequence to ensure error free frame.
Frame Control Field: The frame control field contains information about the type of frame, the data
rate, and the power management status.
Duration Field: The duration field specifies the length of time that the channel will be occupied by the
transmission.
Address Fields: The address fields specify the source and destination MAC addresses of the Wi-Fi
devices involved in the communication.
Sequence Control Field: The sequence control field is used to identify and manage the transmission
sequence of the frames.
Frame Body: The frame body contains the actual data being transmitted between Wi-Fi devices, such
as IP packets, TCP segments, or UDP datagrams.
Frame Check Sequence: The frame check sequence (FCS) is used to check the integrity of the data
transmitted in the frame and to detect any transmission errors.
Management, Control, and Data Frames: The IEEE 802.11 MAC frame defines three types of
frames: management frames, control frames, and data frames. Management frames are used for
network management, control frames are used for coordination between Wi-Fi devices, and data frames
are used for the transmission of actual data.
Fragmentation: The IEEE 802.11 MAC frame supports fragmentation, which allows large data
packets to be divided into smaller fragments for transmission.
Acknowledgments: The IEEE 802.11 MAC frame uses acknowledgments to confirm the successful
transmission of frames and to request the retransmission of any frames that were not successfully
received.
Fault Tolerance: The centralized architecture minimizes the bottlenecks and introduces resilience
in the WLAN equipment.
Flexible Architecture: Supports both temporary smaller networks and larger, more permanent
ones.
Prolonged Battery Life: Efficient power-saving protocols extend mobile device battery life
without compromising network connections.
Noisy Channels: Due to reliance on radio waves, signals may experience interference from nearby
devices.
Greater Bandwidth and Complexity: Due to necessary data encryption and susceptibility to
errors, WLANs need more bandwidth than their wired counterparts.
Speed: Generally, WLANs offer slower speeds compared to wired LANs.
57
Applications of IEEE 802.11 Architecture
Home Networking: Connecting devices, laptops, smart TVs, speakers, gaming consoles etc.
Wi-Fi Hotspots: Free or paid internet access to visitors in coffee shops, hotels, airports, malls and
restaurants.
Connectivity in Campus: Provide internet access in university, colleges, schools or corporate
campuses.
system (From DS =0). The frame is going from one station in a BSS to another without passing through
the distribution system. The ACK frame should be sent to the original sender. The addresses are shown in
Figure
58
Case 2: 01 In this case, To DS = 0 and From DS = 1. This means that the frame is coming from a
distribution system (From DS = 1). The frame is coming from an AP and going to a station. The
ACK should be sent to the AP. The addresses are as shown in Figure 14.9. Note that address 3
contains the original sender of the frame (in another BSS)
Case 3: 10 In this case, To DS =1 and From DS = O. This means that the frame is going to a
distribution system (To DS = 1). The frame is going from a station to an AP. The ACK is sent to
the original station. The addresses are as shown in Figure 14.9. Note that address 3 contains the
final destination of the frame (in another BSS).
Case 4:11 In this case, To DS =1 and From DS =1. TIus is the case in which the distribution
system is also wireless. The frame is going from one AP to anotherAP in a wireless distribution
system. We do not need to define addresses if the distribution system is a wired LAN because the
frame in these cases has the format of a wired LAN frame (Ethernet, for example). Here, we need
four addresses to define the original sender, the final destination, and two intermediate APs.
BLUETOOTH
Bluetooth is universal for short-range wireless voice and data communication. It is a Wireless Personal
Area Network (WPAN) technology and is used for exchanging data over smaller distances. This
technology was invented by Ericson in 1994. It operates in the unlicensed, industrial, scientific, and
medical (ISM) band from 2.4 GHz to 2.485 GHz. Maximum devices that can be connected at the same
time are 7. Bluetooth ranges up to 10 meters. It provides data rates up to 1 Mbps or 3 Mbps depending
upon the version. The spreading technique that it uses is FHSS (Frequency-hopping spread spectrum). A
Bluetooth network is called a piconet and a collection of interconnected piconets is called scatternet.
What is Bluetooth?
Bluetooth simply follows the principle of transmitting and receiving data using radio waves. It can be
paired with the other device which has also Bluetooth but it should be within the estimated
59
communication range to connect. When two devices start to share data, they form a network called
piconet which can further accommodate more than five devices.
Points to remember for Bluetooth:
Bluetooth Transmission capacity 720 kbps.
Bluetooth is Wireless.
Bluetooth is a Low-cost short-distance radio communications standard.
Bluetooth is robust and flexible.
Bluetooth is cable replacement technology that can be used to connect almost any device to any other
device.
The basic architecture unit of Bluetooth is a piconet.
Bluetooth Architecture:
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the master node
and seven active secondary nodes called slave nodes. Thus, we can say that there is a total of 8 active
nodes which are present at a distance of 10 meters. The communication between the primary and
secondary nodes can be one-to-one or one-to-many. Possible communication is only between the
master and slave; Slave-slave communication is not possible. It also has 255 parked nodes, these are
secondary nodes and cannot take participation in communication unless it gets converted to the active
state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act as master or we
can say primary in another piconet. This kind of node can receive a message from a master in one
piconet and deliver the message to its slave in the other piconet where it is acting as a master. This type
of node is referred to as a bridge node. A station cannot be mastered in two piconets.
60
Bluetooth protocol stack:
1. Radio (RF) layer: It specifies the details of the air interface, including frequency, the use of
frequency hopping and transmit power. It performs modulation/demodulation of the data into RF
signals. It defines the physical characteristics of Bluetooth transceivers. It defines two types of
physical links: connection-less and connection-oriented.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth system and is equivalent
to the MAC sublayer in LANs. It performs the connection establishment within a piconet,
addressing, packet format, timing and power control.
3. Link Manager protocol layer: It performs the management of the already established links which
includes authentication and encryption processes. It is responsible for creating the links, monitoring
their health, and terminating them gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It is also known as the heart of the
Bluetooth protocol stack. It allows the communication between upper and lower layers of the
Bluetooth protocol stack. It packages the data packets received from upper layers into the form
expected by lower layers. It also performs segmentation and multiplexing.
5. Service Discovery Protocol (SDP) layer: It is short for Service Discovery Protocol. It allows
discovering the services available on another Bluetooth-enabled device.
6. RF comm layer: It is a cabal replacement protocol. It is short for Radio Frontend Component. It
provides a serial interface with WAP and OBEX. It also provides emulation of serial ports over the
logical link control and adaption protocol(L2CAP). The protocol is based on the ETSI standard TS
07.10.
61
7. OBEX: It is short for Object Exchange. It is a communication protocol to exchange objects
between 2 devices.
8. WAP: It is short for Wireless Access Protocol. It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony service. The basic function
of this layer is call control (setup & release) and group management for the gateway serving
multiple devices.
10. Application layer: It enables the user to interact with the application.
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look at them.
In-Car Headset: One can make calls from the car speaker system without the use of mobile phones.
Stereo Headset: To listen to music in car or in music players at home.
Webcam: One can link the camera with the help of Bluetooth with their laptop or phone.
Bluetooth-equipped Printer: The printer can be used when connected via Bluetooth with mobile
phone or laptop.
Bluetooth Global Positioning System (GPS): To use GPS in cars, one can connect their phone with
car system via Bluetooth to fetch the directions of the address.
Advantage:
Disadvantages:
Applications:
Since there are 16 bits for total length in IP header so, the maximum size of IP datagram = 216 – 1 =
65, 535 bytes.
It is done by the network layer at the destination side and is usually done at routers.
Source side does not require fragmentation due to wise (good) segmentation by transport layer i.e.
instead of doing segmentation at the transport layer and fragmentation at the network layer, the
transport layer looks at datagram data limit and frame data limit and does segmentation in such a
way that resulting data can easily fit in a frame without the need of fragmentation.
Receiver identifies the frame with the identification (16 bits) field in the IP header. Each fragment
of a frame has the same identification number.
Receiver identifies the sequence of frames using the fragment offset(13 bits) field in the IP header
Overhead at the network layer is present due to the extra header introduced due to fragmentation.
Fragmentation at the Network Layer is a process of dividing a large data packet into smaller pieces,
known as fragments, to improve the efficiency of data transmission over a network. The need for
fragmentation at the network layer arises from several factors:
1.Maximum Transmission Unit (MTU): Different networks have different Maximum Transmission
Unit (MTU) sizes, which determine the maximum size of a data packet that can be transmitted over that
network. If the size of a data packet exceeds the MTU, it needs to be fragmented into smaller fragments
that can be transmitted over the network.
2.Network Performance: Large data packets can consume a significant amount of network resources
and can cause congestion in the network. Fragmentation helps to reduce the impact of large data
packets on network performance by breaking them down into smaller fragments that can be transmitted
more efficiently.
3.Bandwidth Utilization: Large data packets may consume a significant amount of network
bandwidth, causing other network traffic to be slowed down. Fragmentation helps to reduce the impact
of large data packets on network bandwidth utilization by breaking them down into smaller fragments
that can be transmitted more efficiently.
Fragmentation at the network layer is necessary in order to ensure efficient and reliable
transmission of data over communication networks.
1.Large Packet Size: In some cases, the size of the packet to be transmitted may be too large for the
underlying communication network to handle. Fragmentation at the network layer allows the large
packet to be divided into smaller fragments that can be transmitted over the network.
2.Path MTU: The Maximum Transmission Unit (MTU) of a network defines the largest packet size
that can be transmitted over the network. Fragmentation at the network layer allows the packet to be
divided into smaller fragments that can be transmitted over networks with different MTU values.
3.Reliable Transmission: Fragmentation at the network layer increases the reliability of data
transmission, as smaller fragments are less likely to be lost or corrupted during transmission.
internet Control Message Protocol (ICMP) is a network layer protocol used to diagnose communication
errors by performing an error control mechanism. Since IP does not have an inbuilt mechanism for
sending error and control messages. It depends on Internet Control Message Protocol(ICMP) to
provide error control.
ICMP is used for reporting errors and management queries. It is a supporting protocol and is used by
network devices like routers for sending error messages and operations information. For example, the
requested service is not available or a host or router could not be reached.
Uses of ICMP
ICMP is used for error reporting if two devices connect over the internet and some error occurs, So, the
router sends an ICMP error message to the source informing about the error. For Example, whenever a
device sends any message which is large enough for the receiver, in that case, the receiver will drop the
message and reply back ICMP message to the source.
Another important use of ICMP protocol is used to perform network diagnosis by making use of
traceroute and ping utility. We will discuss them one by one.
Traceroute: Traceroute utility is used to know the route between two devices connected over the
internet. It routes the journey from one router to another, and a traceroute is performed to check network
issues before data transfer.
Ping: Ping is a simple kind of traceroute known as the echo-request message, it is used to measure the
time taken by data to reach the destination and return to the source, these replies are known as echo-
replies messages.
ICMP is the primary and important protocol of the IP suite, but ICMP isn’t associated with any transport
layer protocol (TCP or UDP) as it doesn’t need to establish a connection with the destination device
before sending any message as it is a connectionless protocol.
The working of ICMP is just contrasting with TCP, as TCP is a connection-oriented protocol whereas
ICMP is a connectionless protocol. Whenever a connection is established before the message sending,
both devices must be ready through a TCP Handshake.
ICMP packets are transmitted in the form of datagrams that contain an IP header with ICMP data. ICMP
datagram is similar to a packet, which is an independent data entity.
65
ICMP Packet Format
In the ICMP packet format, the first 32 bits of the packet contain three fields:
Type (8-bit): The initial 8-bit of the packet is for message type, it provides a brief description of the
message so that receiving network would know what kind of message it is receiving and how to respond
to it. Some common message types are as follows:
Type 0 – Echo reply
Type 3 – Destination unreachable
Type 5 – Redirect Message
Type 8 – Echo Request
Type 11 – Time Exceeded
Type 12 – Parameter problem
Code (8-bit): Code is the next 8 bits of the ICMP packet format, this field carries some additional
information about the error message and type.
Checksum (16-bit): Last 16 bits are for the checksum field in the ICMP packet header. The checksum is
used to check the number of bits of the complete message and enable the ICMP tool to ensure that
complete data is delivered.
The next 32 bits of the ICMP Header are Extended Header which has the work of pointing out the
problem in IP Message. Byte locations are identified by the pointer which causes the problem message
and receiving device looks here for pointing to the problem.
The last part of the ICMP packet is Data or Payload of variable length. The bytes included in IPv4 are
576 bytes and in IPv6, 1280 bytes.
ICMP in DDoS Attacks
In Distributed DOS (DDoS) attacks, attackers provide so much extra traffic to the target, so that it cannot
provide service to users. There are so many ways through which an attacker executes these attacks, which
are described below.
Whenever an attacker sends a ping, whose size is greater than the maximum allowable size, oversized
packets are broken into smaller parts. When the sender re-assembles it, the size exceeds the limit which
causes a buffer overflow and makes the machine freeze. This is simply called a Ping of Death Attack.
Newer devices have protection from this attack, but older devices did not have protection from this attack.
Smurf Attack
Smurf Attack is a type of attack in which the attacker sends an ICMP packet with a spoofed source IP
address. These type of attacks generally works on older devices like the ping of death attack.
Types of ICMP Messages
Type Code Description
5 – Redirect Message
Redirect the datagram for the Type of Service and
2
Network
9 – Router Advertisement 0
Use to discover the addresses of operational routers
10 – Router Solicitation 0
2 Bad length
When the congestion router is far away from the source the ICMP will send a hop-by-hop source quench
message so that every router will reduce the speed of transmission.
Parameter Problem
Whenever packets come to the router then the calculated header checksum should be equal to the received
header checksum then only the packet is accepted by the router.
Parameter Problem
When some fragments are lost in a network then the holding fragment by the router will be dropped then
ICMP will take the source IP from the discarded packet and informs the source, of discarded datagram
due to the time to live field reaching zero, by sending the time exceeded message.
Destination Un-reachable
The destination is unreachable and is generated by the host or its inbound gateway to inform the client
that the destination is unreachable for some reason.
Destination Un-reachable
There is no necessary condition that only the router gives the ICMP error message time the destination
host sends an ICMP error message when any type of failure (link failure, hardware failure, port failure,
etc) happens in the network.
Redirection Message
70
Redirect requests data packets are sent on an alternate route. The message informs a host to update its
routing information (to send packets on an alternate route).
Example: If the host tries to send data through a router R1 and R1 sends data on a router R2 and there
is a direct way from the host to R2. Then R1 will send a redirect message to inform the host that there
is the best way to the destination directly through R2 available. The host then sends data packets for the
destination directly to R2.
The router R2 will send the original datagram to the intended destination.
But if the datagram contains routing information then this message will not be sent even if a better
route is available as redirects should only be sent by gateways and should not be sent by Internet hosts.
Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that allows the
users to move from one network to another with the same IP address. It ensures that the communication
will continue without the user’s sessions or connections being dropped.
Terminologies:
1. Mobile Node (MN) is the hand-held communication device that the user carries e.g. Cell phone.
2. Home Network is a network to which the mobile node originally belongs as per its assigned IP
address (home address).
3. Home Agent (HA) is a router in-home network to which the mobile node was originally connected
4. Home Address is the permanent IP address assigned to the mobile node (within its home network).
5. Foreign Network is the current network to which the mobile node is visiting (away from its home
network).
6. Foreign Agent (FA) is a router in a foreign network to which the mobile node is currently
connected. The packets from the home agent are sent to the foreign agent which delivers them to
the mobile node.
7. Correspondent Node (CN) is a device on the internet communicating to the mobile node.
8. Care-of Address (COA) is the temporary address used by a mobile node while it is moving away
from its home network.
9. Foreign agent COA, the COA could be located at the FA, i.e., the COA is an IP address of the FA.
The FA is the tunnel end-point and forwards packets to the MN. Many MN using the FA can share
this COA as a common COA.
71
10. Co-located COA, the COA is co-located if the MN temporarily acquired an additional IP address
which acts as COA. This address is now topologically correct, and the tunnel endpoint is at the MN.
Co-located addresses can be acquired using services such as DHCP.
Mobile IP
Working:
The correspondent node sends the data to the mobile node. Data packets contain the correspondent
node’s address (Source) and home address (Destination). Packets reach the home agent. But now
mobile node is not in the home network, it has moved into the foreign network. The foreign agent sends
the care-of-address to the home agent to which all the packets should be sent. Now, a tunnel will be
established between the home agent and the foreign agent by the process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a tunnel entry and an endpoint. It
is the process of sending a packet via a tunnel and it is achieved by a mechanism called encapsulation.
Now, the home agent encapsulates the data packets into new packets in which the source address is the
home address and destination is the care-of-address and sends it through the tunnel to the foreign agent.
Foreign agent, on another side of the tunnel, receives the data packets, decapsulates them, and sends
them to the mobile node. The mobile node in response to the data packets received sends a reply in
response to the foreign agent. The foreign agent directly sends the reply to the correspondent node.
Key Mechanisms in Mobile IP:
1. Agent Discovery: Agents advertise their presence by periodically broadcasting their agent
advertisement messages. The mobile node receiving the agent advertisement messages observes
whether the message is from its own home agent and determines whether it is in the home network
or foreign network.
2. Agent Registration: Mobile node after discovering the foreign agent sends a registration request
(RREQ) to the foreign agent. The foreign agent, in turn, sends the registration request to the home
agent with the care-of-address. The home agent sends a registration reply (RREP) to the foreign
agent. Then it forwards the registration reply to the mobile node and completes the process of
registration.
72
3. Tunneling: It establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism called
encapsulation. It takes place to forward an IP datagram from the home agent to the care-of-address.
Whenever the home agent receives a packet from the correspondent node, it encapsulates the packet
with source address as home address and destination as care-of-address.
Route Optimization in Mobile IP:
The route optimization adds a conceptual data structure, the binding cache, to the correspondent node.
The binding cache contains bindings for the mobile node’s home address and its current care-of-
address. Every time the home agent receives an IP datagram that is destined to a mobile node currently
away from the home network, it sends a binding update to the correspondent node to update the
information in the correspondent node’s binding cache. After this, the correspondent node can directly
tunnel packets to the mobile node. Mobile IP is provided by the network providers.
Unicast Routing – Link State Routing
Unicast means the transmission from a single sender to a single receiver. It is a point-to-point
communication between the sender and receiver. There are various unicast protocols such as TCP, HTTP,
etc.
TCP is the most commonly used unicast protocol. It is a connection-oriented protocol that relies on
acknowledgment from the receiver side.
HTTP stands for HyperText Transfer Protocol. It is an object-oriented protocol for communication.
Unicast Routing
1. Distance Vector Routing: Distance-Vector routers use a distributed algorithm to compute their
routing tables.
2. Link-State Routing: Link-State routing uses link-state routers to exchange messages that allow
each router to learn the entire network topology.
3. Path-Vector Routing: It is a routing protocol that maintains the path that is updated dynamically.
1. Reliable Flooding: Initial state– Each node knows the cost of its neighbors. Final state- Each node
knows the entire graph.
2. Route Calculation: Each node uses Dijkstra’ s algorithm on the graph to calculate the optimal
routes to all nodes. The link state routing algorithm is also known as Dijkstra’s algorithm which is
used to find the shortest path from one node to every other node in the network.
3.
Features of Link State Routing Protocols
To find the shortest path, each node needs to run the famous Dijkstra algorithm. Let us understand how
can we find the shortest path using an example.
Illustration
To understand the Dijkstra Algorithm, let’s take a graph and find the shortest path from the source to all
nodes.
Note: We use a boolean array sptSet[] to represent the set of vertices included in SPT. If a
value sptSet[v] is true, then vertex v is included in SPT, otherwise not. Array dist[] is used to store the
shortest distance values of all vertices.
Consider the below graph and src = 0.
74
STEP 1: The set sptSet is initially empty and distances assigned to vertices are {0, INF, INF, INF, INF,
INF, INF, INF} where INF indicates infinite. Now pick the vertex with a minimum distance value. The
vertex 0 is picked and included in sptSet. So sptSet becomes {0}. After including 0 to sptSet, update the
distance values of its adjacent vertices. Adjacent vertices of 0 are 1 and 7. The distance values of 1 and
7 are updated as 4 and 8.
The following subgraph shows vertices and their distance values. Vertices included in SPT are included
in GREEN color.
STEP 2: Pick the vertex with minimum distance value and not already included in SPT (not in sptSET).
The vertex 1 is picked and added to sptSet. So sptSet now becomes {0, 1}. Update the distance values of
adjacent vertices of 1. The distance value of vertex 2 becomes 12.
75
Shortest Path Calculation – Step 3
STEP 3: Pick the vertex with minimum distance value and not already included in SPT (not in sptSET).
Vertex 7 is picked. So sptSet now becomes {0, 1, 7}. Update the distance values of adjacent vertices of
7. The distance value of vertex 6 and 8 becomes finite (15 and 9 respectively).
STEP 4: Pick the vertex with minimum distance value and not already included in SPT (not in sptSET).
Vertex 6 is picked. So sptSet now becomes {0, 1, 7, 6}. Update the distance values of adjacent vertices
of 6. The distance value of vertex 5 and 8 are updated.
We repeat the above steps until sptSet includes all vertices of the given graph. Finally, we get the
following Shortest Path Tree (SPT).
76
A distance-vector routing (DVR) protocol requires that a router inform its neighbors of topology
changes periodically. Historically known as the old ARPANET routing algorithm (or known as
Bellman-Ford algorithm).
Bellman Ford Basics – Each router maintains a Distance Vector table containing the distance between
itself and ALL possible destination nodes. Distances,based on a chosen metric, are computed using
information from the neighbors’ distance vectors.
Distance Vector Algorithm –
77
1. A router transmits its distance vector to each of its neighbors in a routing packet.
2. Each router receives and saves the most recently received distance vector from each of its
neighbors.
3. A router recalculates its distance vector when:
It receives a distance vector from a neighbor containing different information than before.
It discovers that a link to a neighbor has gone down.
The DV calculation is based on minimizing the cost to each destination
Dx(y) = Estimate of least cost from x to y
C(x,v) = Node x knows cost to each neighbor v
Dx = [Dx(y): y ? N ] = Node x maintains distance vector
Node x also maintains its neighbors' distance vectors
– For each neighbor v, x maintains Dv = [Dv(y): y ? N ]
Note –
From time-to-time, each node sends its own distance vector estimate to neighbors.
When a node x receives new DV estimate from any neighbor v, it saves v’s distance vector and it
updates its own DV using B-F equation:
Dx(y) = min { C(x,v) + Dv(y), Dx(y) } for each node y ? N
Example – Consider 3-routers X, Y and Z as shown in figure. Each router have their routing table.
Every routing table will contain distance to the destination nodes.
Consider router X , X will share it routing table to neighbors and neighbors will share it routing table to
it to X and distance from node X to destination will be calculated using bellmen- ford equation.
Dx(y) = min { C(x,v) + Dv(y)} for each node y ? N
As we can see that distance will be less going from X to Z when Y is intermediate node(hop) so it will
be update in routing table X.
78
A path vector protocol is essentially a distance vector protocol that does not rely on the distance to
destination to guarantee a loop-free path but instead relies on the analysis of the path itself.
It is typically deployed in environments where it is difficult to guarantee a consistent metric
(distance) across the routing domain. The path is accumulated at each router, and carried in each
advertisement, so that any router receiving it can validate the loop-free path before propagating
the information. BGP4 is the best example of an RP using this technology.
The main drawback is the size of the advertisements, which grow with the number of hops. As far
as IPv6 is concerned, BGP4, enhanced with multiprotocol extensions, remains the path vector RP
of choice for exchanging IPv6 routes between autonomous systems.
80
It is the initial table for each speaker node in a system made four ASs. Here Node A1 is
the speaker node for AS1, B1 for AS2, C1 for AS3 and D1 for AS4, Node A1 creates an initial
table that shows A1 to A5 and these are located in AS1, it can be reached through it
A speaker in an autonomous system shares its table with immediate neighbours ,here Node
A1 share its table with nodes B1 and C1 , Node C1 share its table with nodes A1,B1 and D1 ,
Node B1 share its table with nodes A1 and C1 , Node D1 share its table with node C1
If router A1 receives a packet for nodes A3 , it knows that the path is in AS1,but if it
receives a packet for D1,it knows that the packet should go from AS1,to AS2 and then to AS3
,then the routing table shows that path completely on the other hand if the node D1 in AS4
receives a packet for node A2,it knows it should go through AS4,AS3,and AS1,
FUNCTIONS
PREVENTION OF LOOP T
he creation of loop can be avoided in path vector routing .A router receives a message it
checks to see if its autonomous system is in the path list to the destination if it is looping is
involved and the message is ignored
POLICY ROUTING
When a router receives a messages it can check the path, if one of the autonomous system
listed in the path against its policy, it can ignore its path and destination it does not update its
routing table with this path or it does not send the messages to its neighbours.
OPTIMUM PATH
A path to a destination that is the best for the organization that runs the autonomous
system
81
BORDER GATEWAY PROTCOL (BGP)
It first introduced in 1989, Is an interdomain routing protocol using path vector routing. It
has three versions
1. STUB AS
2. . MULTHIHOMED AS
3. 3. TRANSIT AS
Routing Information Protocol (RIP) is a dynamic routing protocol that uses hop count as a routing
metric to find the best path between the source and the destination network. It is a distance-vector routing
protocol that has an AD value of 120 and works on the Network layer of the OSI model. RIP uses port
number 520.
Hop Count
Hop count is the number of routers occurring in between the source and destination network. The path
with the lowest hop count is considered as the best route to reach a network and therefore placed in the
routing table. RIP prevents routing loops by limiting the number of hops allowed in a path from source
and destination. The maximum hop count allowed for RIP is 15 and a hop count of 16 is considered as
network unreachable.
Features of RIP
1. Updates of the network are exchanged periodically.
2. Updates (routing information) are always broadcast.
3. Full routing tables are sent in updates.
4. Routers always trust routing information received from neighbor routers. This is also known
as Routing on rumors.
RIP versions:
There are three versions of routing information protocol – RIP Version1, RIP Version2, and RIPng.
RIP v1 RIP v2 RIPng
RIP v2 is known as Classless Routing Protocol because it sends information of subnet mask in its
routing update.
Consider the above-given topology which has 3-routers R1, R2, R3. R1 has IP address 172.16.10.6/30
on s0/0/1, 192.168.20.1/24 on fa0/0. R2 has IP address 172.16.10.2/30 on s0/0/0, 192.168.10.1/24 on
fa0/0. R3 has IP address 172.16.10.5/30 on s0/1, 172.16.10.1/30 on s0/0, 10.10.10.1/24 on fa0/0.
Configure RIP for R1 :
R1(config)# router rip
R1(config-router)# network 192.168.20.0
R1(config-router)# network 172.16.10.4
R1(config-router)# version 2
R1(config-router)# no auto-summary
Note: no auto-summary command disables the auto-summarisation. If we don’t select any auto-
summary, then the subnet mask will be considered as classful in Version 1.
Configuring RIP for R2:
R2(config)# router rip
R2(config-router)# network 192.168.10.0
R2(config-router)# network 172.16.10.0
R2(config-router)# version 2
R2(config-router)# no auto-summary
Similarly, Configure RIP for R3 :
R3(config)# router rip
R3(config-router)# network 10.10.10.0
R3(config-router)# network 172.16.10.4
R3(config-router)# network 172.16.10.0
R3(config-router)# version 2
83
R3(config-router)# no auto-summary
RIP timers:
Update timer: The default timing for routing information being exchanged by the routers operating
RIP is 30 seconds. Using an Update timer, the routers exchange their routing table periodically.
Invalid timer: If no update comes until 180 seconds, then the destination router considers it invalid.
In this scenario, the destination router mark hop counts as 16 for that router.
Hold down timer: This is the time for which the router waits for a neighbor router to respond. If the
router isn’t able to respond within a given time then it is declared dead. It is 180 seconds by default.
Flush time: It is the time after which the entry of the route will be flushed if it doesn’t respond within
the flush time. It is 60 seconds by default. This timer starts after the route has been declared invalid
and after 60 seconds i.e time will be 180 + 60 = 240 seconds.
Note that all these times are adjustable. Use this command to change the timers :
R1(config-router)# timers basic
R1(config-router)# timers basic 20 80 80 90
1. Small to medium-sized networks: RIP is normally utilized in little to medium-sized networks that
have moderately basic directing prerequisites. It is not difficult to design and requires little support,
which goes with it a famous decision for little organizations.
2. Legacy organizations: RIP is as yet utilized in some heritage networks that were set up before
further developed steering conventions were created. These organizations may not merit the
expense and exertion of overhauling, so they keep on involving RIP as their directing convention.
3. Lab conditions: RIP is much of the time utilized in lab conditions for testing and learning
purposes. A basic convention is not difficult to set up, which pursues it a decent decision for
instructive purposes.
4. Backup or repetitive steering: In certain organizations, RIP might be utilized as a reinforcement
or excess directing convention, on the off chance that the essential steering convention falls flat or
encounters issues. RIP isn’t generally so productive as other directing conventions, however, it very
well may be helpful as a reinforcement if there should be an occurrence of crisis.
Advantages of RIP :
Simplicity: RIP is a relatively simple protocol to configure and manage, making it an ideal choice
for small to medium-sized networks with limited resources.
Easy implementation: RIP is easy to implement, as it does not require much technical expertise to
set up and maintain.
Convergence: RIP is known for its fast convergence time, meaning that it can quickly adapt to
changes in network topology and route packets efficiently.
Automatic updates: RIP automatically updates routing tables at regular intervals, ensuring that the
most up-to-date information is being used to route packets.
Low bandwidth overhead: RIP uses a relatively low amount of bandwidth to exchange routing
information, making it an ideal choice for networks with limited bandwidth.
Compatibility: RIP is compatible with many different types of routers and network devices,
making it easy to integrate into existing networks
.
Disadvantages of RIP :
84
Limited scalability: RIP has limited scalability, and it may not be the best choice for larger
networks with complex topologies. RIP can only support up to 15 hops, which may not be sufficient
for larger networks.
Slow convergence: While RIP is known for its fast convergence time, it can be slower to converge
than other routing protocols. This can lead to delays and inefficiencies in network performance.
Routing loops: RIP can sometimes create routing loops, which can cause network congestion and
reduce overall network performance.
Limited support for load balancing: RIP does not support sophisticated load balancing, which
can result in suboptimal routing paths and uneven network traffic distribution.
Security vulnerabilities: RIP does not provide any native security features, making it vulnerable to
attacks such as spoofing and tampering.
Inefficient use of bandwidth: RIP uses a lot of bandwidth for periodic updates, which can be
inefficient in networks with limited bandwidth.
85
UNIT 5
TRANSPORT LAYER
Introduction: Transport Layer Services- Connectionless and Connection Oriented Protocols, Transport
Layer Protocols: Simple protocol- Stop and wait protocol- Go-Back-N ProtocolSelective repeat protocol,
User Datagram Protocol: User Datagram- UDP Services- UDP Applications, Transmission Control
Protocol: TCP Services- TCP Features- Segment- Connection
Both Connection-oriented service and Connection-less service are used for the connection
establishment between two or more two devices. These types of services are offered by the network
layer.
Connection-oriented service is related to the telephone system. It includes connection establishment
and connection termination. In a connection-oriented service, the Handshake method is used to
establish the connection between sender and receiver.
Connection-less service is related to the postal system. It does not include any connection
establishment and connection termination. Connection-less Service does not give a guarantee of
reliability. In this, Packets do not follow the same path to reach their destination.
86
Difference between Connection-oriented and Connection-less Services:
S.NO Connection-oriented Service Connection-less Service
Propagation Delay: Amount of time taken by a packet to make a physical journey from one router
to another router.
Propagation Delay = (Distance between routers) / (Velocity of propagation)
RoundTripTime (RTT) = Amount of time taken by a packet to reach the receiver + Time taken by
the Acknowledgement to reach the sender
TimeOut (TO) = 2* RTT
Time To Live (TTL) = 2* TimeOut. (Maximum TTL is 255 seconds)
Simple Stop and Wait
Sender:
Rule 1) Send one data packet at a time.
Rule 2) Send the next packet only after receiving acknowledgement for the previous.
Receiver:
Rule 1) Send acknowledgement after receiving and consuming a data packet.
Rule 2) After consuming packet acknowledgement need to be sent (Flow Control)
Problems :
88
1. Lost Data
2. Lost Acknowledgement:
The above 3 problems are resolved by Stop and Wait for ARQ (Automatic Repeat Request) that does
both error control and flow control.
1. Time Out:
90
2. Sequence Number (Data)
3. Delayed Acknowledgement:
This is resolved by introducing sequence numbers for acknowledgement also.
Go-Back-N
What is Go-Back-N ARQ?
In Go-Back-N ARQ, N is the sender's window size. Suppose we say that Go-Back-3, which means that the
three frames can be sent at a time before expecting the acknowledgment from the receiver.
It uses the principle of protocol pipelining in which the multiple frames can be sent before receiving the
acknowledgment of the first frame. If we have five frames and the concept is Go-Back-3, which means that
the three frames can be sent, i.e., frame no 1, frame no 2, frame no 3 can be sent before expecting the
acknowledgment of frame no 1.
93
In Go-Back-N ARQ, the frames are numbered sequentially as Go-Back-N ARQ sends the multiple frames
at a time that requires the numbering approach to distinguish the frame from another frame, and these
numbers are known as the sequential numbers.
The number of frames that can be sent at a time totally depends on the size of the sender's window. So, we
can say that 'N' is the number of frames that can be sent at a time before receiving the acknowledgment
from the receiver.
If the acknowledgment of a frame is not received within an agreed-upon time period, then all the frames
available in the current window will be retransmitted. Suppose we have sent the frame no 5, but we didn't
receive the acknowledgment of frame no 5, and the current window is holding three frames, then these
three frames will be retransmitted.
The sequence number of the outbound frames depends upon the size of the sender's window. Suppose the
sender's window size is 2, and we have ten frames to send, then the sequence numbers will not be
1,2,3,4,5,6,7,8,9,10. Let's understand through an example.
The number of bits in the sequence number is 2 to generate the binary sequence 00,01,10,11.
Suppose there are a sender and a receiver, and let's assume that there are 11 frames to be sent. These frames
are represented as 0,1,2,3,4,5,6,7,8,9,10, and these are the sequence numbers of the frames. Mainly, the
sequence number is decided by the sender's window size. But, for the better understanding, we took the
running sequence numbers, i.e., 0,1,2,3,4,5,6,7,8,9,10. Let's consider the window size as 4, which means
that the four frames can be sent at a time before expecting the acknowledgment of the first frame.
Step 1: Firstly, the sender will send the first four frames to the receiver, i.e., 0,1,2,3, and now the sender is
expected to receive the acknowledgment of the 0th frame.
94
Let's assume that the receiver has sent the acknowledgment for the 0 frame, and the receiver has
successfully received it.
The sender will then send the next frame, i.e., 4, and the window slides containing four frames (1,2,3,4).
The receiver will then send the acknowledgment for the frame no 1. After receiving the acknowledgment,
the sender will send the next frame, i.e., frame no 5, and the window will slide having four frames (2,3,4,5).
95
Now, let's assume that the receiver is not acknowledging the frame no 2, either the frame is lost, or the
acknowledgment is lost. Instead of sending the frame no 6, the sender Go-Back to 2, which is the first
frame of the current window, retransmits all the frames in the current window, i.e., 2,3,4,5.
96
Example 1: In GB4, if every 6th packet being transmitted is lost and if we have to spend 10 packets then
how many transmissions are required?
Solution: Here, GB4 means that N is equal to 4. The size of the sender's window is 4.
Step 1: As the window size is 4, so four packets are transferred at a time, i.e., packet no 1, packet no 2,
packet no 3, and packet no 4.
97
Step 2: Once the transfer of window size is completed, the sender receives the acknowledgment of the first
frame, i.e., packet no1. As the acknowledgment receives, the sender sends the next packet, i.e., packet no
5. In this case, the window slides having four packets, i.e., 2,3,4,5 and excluded the packet 1 as the
acknowledgment of the packet 1 has been received successfully.
Step 3: Now, the sender receives the acknowledgment of packet 2. After receiving the acknowledgment
for packet 2, the sender sends the next packet, i.e., packet no 6. As mentioned in the question that every
6th is being lost, so this 6th packet is lost, but the sender does not know that the 6th packet has been lost.
98
Step 4: The sender receives the acknowledgment for the packet no 3. After receiving the acknowledgment
of 3rd packet, the sender sends the next packet, i.e., 7th packet. The window will slide having four packets,
i.e., 4, 5, 6, 7.
Step 5: When the packet 7 has been sent, then the sender receives the acknowledgment for the packet no
4. When the sender has received the acknowledgment, then the sender sends the next packet, i.e., the
8th packet. The window will slide having four packets, i.e., 5, 6, 7, 8.
99
Step 6: When the packet 8 is sent, then the sender receives the acknowledgment of packet 5. On receiving
the acknowledgment of packet 5, the sender sends the next packet, i.e., 9 th packet. The window will slide
having four packets, i.e., 6, 7, 8, 9.
Step 7: The current window is holding four packets, i.e., 6, 7, 8, 9, where the 6 th packet is the first packet
in the window. As we know, the 6th packet has been lost, so the sender receives the negative
acknowledgment NAK(6). As we know that every 6th packet is being lost, so the counter will be restarted
from 1. So, the counter values 1, 2, 3 are given to the 7th packet, 8th packet, 9th packet respectively.
100
Step 8: As it is Go-BACK, so it retransmits all the packets of the current window. It will resend 6, 7, 8, 9.
The counter values of 6, 7, 8, 9 are 4, 5, 6, 1, respectively. In this case, the 8 th packet is lost as it has a 6-
counter value, so the counter variable will again be restarted from 1.
101
Step 9: After the retransmission, the sender receives the acknowledgment of packet 6. On receiving the
acknowledgment of packet 6, the sender sends the 10th packet. Now, the current window is holding four
packets, i.e., 7, 8, 9, 10.
Step 10: When the 10th packet is sent, the sender receives the acknowledgment of packet 7. Now the current
window is holding three packets, 8, 9 and 10. The counter values of 8, 9, 10 are 6, 1, 2.
102
Step 11: As the 8th packet has 6 counter value which means that 8th packet has been lost, and the sender
receives NAK (8).
Step 12: Since the sender has received the negative acknowledgment for the 8 th packet, it resends all the
packets of the current window, i.e., 8, 9, 10.
103
Step 13: The counter values of 8, 9, 10 are 3, 4, 5, respectively, so their acknowledgments have been
received successfully.
It is also known as Sliding Window Protocol and used for error detection and control in the data link layer.
In the selective repeat, the sender sends several frames specified by a window size even without the need
to wait for individual acknowledgement from the receiver as in Go-Back-N ARQ. In selective repeat
protocol, the retransmitted frame is received out of sequence.
In Selective Repeat ARQ only the lost or error frames are retransmitted, whereas correct frames are
received and buffered.
The receiver while keeping track of sequence numbers buffers the frames in memory and sends NACK for
only frames which are missing or damaged. The sender will send/retransmit a packet for which NACK is
received.
Example
Explanation
Step 2 − Without waiting for acknowledgement from the receiver another frame, Frame1 is sent by sender
by setting the timer for it.
Step 3 − In the same way frame2 is also sent to the receiver by setting the timer without waiting for previous
acknowledgement.
Step 4 − Whenever sender receives the ACK0 from receiver, within the frame 0 timer then it is closed and
sent to the next frame, frame 3.
Step 5 − whenever the sender receives the ACK1 from the receiver, within the frame 1 timer then it is
closed and sent to the next frame, frame 4.
Step 6 − If the sender doesn’t receive the ACK2 from the receiver within the time slot, it declares timeout
for frame 2 and resends the frame 2 again, because it thought the frame2 may be lost or damaged.
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol
suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. So,
there is no need to establish a connection prior to data transfer. The UDP helps to establish low-latency
and loss-tolerating connections establish over the network.The UDP enables process to process
communication.
Though Transmission Control Protocol (TCP) is the dominant transport layer protocol used with most
of the Internet services; provides assured delivery, reliability, and much more but all these services cost
us additional overhead and latency. Here, UDP comes into the picture. For real-time services like
computer gaming, voice or video communication, live conferences; we need UDP. Since high
performance is needed, UDP permits packets to be dropped instead of processing delayed packets.
There is no error checking in UDP, so it also saves bandwidth.
User Datagram Protocol (UDP) is more efficient in terms of both latency and bandwidth.
UDP Header –
UDP header is an 8-bytes fixed and simple header, while for TCP it may vary from 20 bytes to 60
bytes. The first 8 Bytes contains all necessary header information and the remaining part consist of
data. UDP port number fields are each 16 bits long, therefore the range for port numbers is defined
from 0 to 65535; port number 0 is reserved. Port numbers help to distinguish different user requests or
processes.
105
1. Source Port: Source Port is a 2 Byte long field used to identify the port number of the source.
2. Destination Port: It is a 2 Byte long field, used to identify the port of the destined packet.
3. Length: Length is the length of UDP including the header and the data. It is a 16-bits field.
4. Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement of the one’s
complement sum of the UDP header, the pseudo-header of information from the IP header, and the
data, padded with zero octets at the end (if necessary) to make a multiple of two octets.
Notes – Unlike TCP, the Checksum calculation is not mandatory in UDP. No Error control or flow
control is provided by UDP. Hence UDP depends on IP and ICMP for error reporting. Also UDP
provides port numbers so that is can differentiate between users requests.
Applications of UDP:
Used for simple request-response communication when the size of data is less and hence there is
lesser concern about flow and error control.
It is a suitable protocol for multicasting as UDP supports packet switching.
UDP is used for some routing update protocols like RIP(Routing Information Protocol).
Normally used for real-time applications which can not tolerate uneven delays between sections of
a received message.
UDP is widely used in online gaming, where low latency and high-speed communication is
essential for a good gaming experience. Game servers often send small, frequent packets of data to
clients, and UDP is well suited for this type of communication as it is fast and lightweight.
Streaming media applications, such as IPTV, online radio, and video conferencing, use UDP to
transmit real-time audio and video data. The loss of some packets can be tolerated in these
applications, as the data is continuously flowing and does not require retransmission.
VoIP (Voice over Internet Protocol) services, such as Skype and WhatsApp, use UDP for real-time
voice communication. The delay in voice communication can be noticeable if packets are delayed
due to congestion control, so UDP is used to ensure fast and efficient data transmission.
DNS (Domain Name System) also uses UDP for its query/response messages. DNS queries are
typically small and require a quick response time, making UDP a suitable protocol for this
application.
DHCP (Dynamic Host Configuration Protocol) uses UDP to dynamically assign IP addresses to
devices on a network. DHCP messages are typically small, and the delay caused by packet loss or
retransmission is generally not critical for this application.
Following implementations uses UDP as a transport layer protocol:
NTP (Network Time Protocol)
DNS (Domain Name Service)
BOOTP, DHCP.
NNP (Network News Protocol)
Quote of the day protocol
TFTP, RTSP, RIP.
106
The application layer can do some of the tasks through UDP-
Trace Route
Record Route
Timestamp
UDP takes a datagram from Network Layer, attaches its header, and sends it to the user. So, it
works fast.
Actually, UDP is a null protocol if you remove the checksum field.
1. Reduce the requirement of computer resources.
2. When using the Multicast or Broadcast to transfer.
3. The transmission of Real-time packets, mainly in multimedia applications.
Advantages of UDP:
1. Speed: UDP is faster than TCP because it does not have the overhead of establishing a connection
and ensuring reliable data delivery.
2. Lower latency: Since there is no connection establishment, there is lower latency and faster response
time.
3. Simplicity: UDP has a simpler protocol design than TCP, making it easier to implement and manage.
4. Broadcast support: UDP supports broadcasting to multiple recipients, making it useful for
applications such as video streaming and online gaming.
5. Smaller packet size: UDP uses smaller packet sizes than TCP, which can reduce network congestion
and improve overall network performance.
Disadvantages of UDP:
1. No reliability: UDP does not guarantee delivery of packets or order of delivery, which can lead to
missing or duplicate data.
2. No congestion control: UDP does not have congestion control, which means that it can send packets
at a rate that can cause network congestion.
3. No flow control: UDP does not have flow control, which means that it can overwhelm the receiver
with packets that it cannot handle.
4. Vulnerable to attacks: UDP is vulnerable to denial-of-service attacks, where an attacker can flood a
network with UDP packets, overwhelming the network and causing it to crash.
5. Limited use cases: UDP is not suitable for applications that require reliable data delivery, such as
email or file transfers, and is better suited for applications that can tolerate some data loss, such as
video streaming or online gaming.
UDP PSEUDO HEADER:
the purpose of using a pseudo-header is to verify that the UDP packet has reached its correct
destination
the correct destination consist of a specific machine and a specific protocol port number within that
machine
107
User Interface:
A user interface should allow the creation of new receive ports, receive operations on the receive ports
that returns the data octets and an indication of source port and source address, and an operation that
allows a datagram to be sent, specifying the data, source and destination ports and address to be sent.
IP Interface:
the UDP module must be able to determine the source and destination internet address and the
protocol field from internet header
one possible UDP/IP interface would return the whole internet datagram including the entire
internet header in response to a receive operation
such an interface would also allow the UDP to pass a full internet datagram complete with header to
the IP to send. the IP would verify certain fields for consistency and compute the internet header
checksum.
The IP interface allows the UDP module to interact with the network layer of the protocol stack,
which is responsible for routing and delivering data across the network.
The IP interface provides a mechanism for the UDP module to communicate with other hosts on the
network by providing access to the underlying IP protocol.
The IP interface can be used by the UDP module to send and receive data packets over the network,
with the help of IP routing and addressing mechanisms.
The IP interface provides a level of abstraction that allows the UDP module to interact with the
network layer without having to deal with the complexities of IP routing and addressing directly.
The IP interface also handles fragmentation and reassembly of IP packets, which is important for
large data transmissions that may exceed the maximum packet size allowed by the network.
The IP interface may also provide additional services, such as support for Quality of Service (QoS)
parameters and security mechanisms such as IPsec.
The IP interface is a critical component of the Internet Protocol Suite, as it enables communication
between hosts on the internet and allows for the seamless transmission of data packets across the
network.
108
TCP/IP Layer
Working of TCP
To make sure that each message reaches its target location intact, the TCP/IP model breaks down the
data into small bundles and afterward reassembles the bundles into the original message on the
opposite end. Sending the information in little bundles of information makes it simpler to maintain
efficiency as opposed to sending everything in one go.
After a particular message is broken down into bundles, these bundles may travel along multiple routes
if one route is jammed but the destination remains the same.
109
We can see that the message is being broken down, then reassembled from a different order at the
destination
For example, When a user requests a web page on the internet, somewhere in the world, the server
processes that request and sends back an HTML Page to that user. The server makes use of a protocol
called the HTTP Protocol. The HTTP then requests the TCP layer to set the required connection and
send the HTML file.
Now, the TCP breaks the data into small packets and forwards it toward the Internet Protocol (IP)
layer. The packets are then sent to the destination through different routes.
The TCP layer in the user’s system waits for the transmission to get finished and acknowledges once
all packets have been received.
Features of TCP/IP
The Transmission Control Protocol is the most common transport layer protocol. It works together
with IP and provides a reliable transport service between processes using the network layer service
provided by the IP protocol.
The various services provided by the TCP to the application layer are as follows:
1. Process-to-Process Communication –
TCP provides a process to process communication, i.e, the transfer of data that takes place between
individual processes executing on end systems. This is done using port numbers or port addresses.
Port numbers are 16 bits long that help identify which process is sending or receiving data on a
host.
2. Stream oriented –
This means that the data is sent and received as a stream of bytes(unlike UDP or IP that divides the
bits into datagrams or packets). However, the network layer, that provides service for the TCP,
sends packets of information not streams of bytes. Hence, TCP groups a number of bytes together
into a segment and adds a header to each of these segments and then delivers these segments to the
network layer. At the network layer, each of these segments is encapsulated in an IP packet for
transmission. The TCP header has information that is required for control purposes which will be
discussed along with the segment structure.
3. Full-duplex service –
This means that the communication can take place in both directions at the same time.
111
4. Connection-oriented service –
Unlike UDP, TCP provides a connection-oriented service. It defines 3 different phases:
Connection establishment
Data transfer
Connection termination
5. Reliability –
TCP is reliable as it uses checksum for error detection, attempts to recover lost or corrupted packets
by re-transmission, acknowledgement policy and timers. It uses features like byte number and
sequence number and acknowledgement number so as to ensure reliability. Also, it uses congestion
control mechanisms.
6. Multiplexing –
TCP does multiplexing and de-multiplexing at the sender and receiver ends respectively as a
number of logical connections can be established between port numbers over a physical
connection.
In this example we see that A sends acknowledgement number1001, which means that it has received
data bytes till byte number 1000 and expects to receive 1001 next, hence B next sends data bytes
starting from 1001. Similarly, since B has received data bytes till byte number 13001 after the first data
112
transfer from A to B, therefore B sends acknowledgement number 13002, the byte number that it
expects to receive from A next.
TCP Segment structure –
A TCP segment consists of data bytes to be sent and a header that is added to the data by TCP as
shown:
The header of a TCP segment can range from 20-60 bytes. 40 bytes are for options. If there are no
options, a header is 20 bytes else it can be of upmost 60 bytes.
Header fields:
Sequence Number –
A 32-bit field that holds the sequence number, i.e, the byte number of the first byte that is sent in
that particular segment. It is used to reassemble the message at the receiving end of the segments
that are received out of order.
Acknowledgement Number –
A 32-bit field that holds the acknowledgement number, i.e, the byte number that the receiver
113
expects to receive next. It is an acknowledgement for the previous bytes being received
successfully.
Control flags –
These are 6 1-bit control bits that control connection establishment, connection termination,
connection abortion, flow control, mode of transfer etc. Their function is:
URG: Urgent pointer is valid
ACK: Acknowledgement number is valid( used in case of cumulative acknowledgement)
PSH: Request for push
RST: Reset the connection
SYN: Synchronize sequence numbers
FIN: Terminate the connection
Window size –
This field tells the window size of the sending TCP in bytes.
Checksum –
This field holds the checksum for error control. It is mandatory in TCP as opposed to UDP.
Urgent pointer –
This field (valid only if the URG control flag is set) is used to point to data that is urgently required
that needs to reach the receiving process at the earliest. The value of this field is added to the
sequence number to get the byte number of the last urgent byte.
TCP Connection –
TCP is connection-oriented. A TCP connection is established by a 3-way handshake.
This could also be seen as a way of how TCP connection is established. Before getting into the details,
let us look at some basics. TCP stands for Transmission Control Protocol which indicates that it does
something to control the transmission of the data in a reliable way.
The process of communication between devices over the internet happens according to the
current TCP/IP suite model(stripped out version of OSI reference model). The Application layer is a
top pile of a stack of TCP/IP models from where network referenced applications like web browsers on
the client-side establish a connection with the server. From the application layer, the information is
transferred to the transport layer where our topic comes into the picture. The two important protocols of
this layer are – TCP, UDP(User Datagram Protocol) out of which TCP is prevalent(since it provides
reliability for the connection established). However, you can find an application of UDP in querying
the DNS server to get the binary equivalent of the Domain Name used for the website.
114
TCP provides reliable communication with something called Positive Acknowledgement with Re-
transmission(PAR). The Protocol Data Unit(PDU) of the transport layer is called a segment. Now a
device using PAR resend the data unit until it receives an acknowledgement. If the data unit received at
the receiver’s end is damaged(It checks the data with checksum functionality of the transport layer that
is used for Error Detection), the receiver discards the segment. So the sender has to resend the data unit
for which positive acknowledgement is not received. You can realize from the above mechanism that
three segments are exchanged between sender(client) and receiver(server) for a reliable TCP
connection to get established. Let us delve into how this mechanism works :
Step 1 (SYN): In the first step, the client wants to establish a connection with a server, so it sends a
segment with SYN(Synchronize Sequence Number) which informs the server that the client is
likely to start communication and with what sequence number it starts segments with
Step 2 (SYN + ACK): Server responds to the client request with SYN-ACK signal bits set.
Acknowledgement(ACK) signifies the response of the segment it received and SYN signifies with
what sequence number it is likely to start the segments with
Step 3 (ACK): In the final part client acknowledges the response of the server and they both
establish a reliable connection with which they will start the actual data transfer
115
TEXT BOOK:
1. Data Communications and Networking, Forouzan, 5th Edition, McGraw Hill, 2016 ISBN: 1-25-
906475-3
2. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
REFERENCES:
1. Computer Networks, James J Kurose, Keith W Ross, Pearson Education, 2013, ISBN: 0-273-
76896-4
2. Introduction to Data Communication and Networking, Wayarles Tomasi, Pearson Education,
2007, ISBN:0130138282
3. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition,
Morgan Kaufmann Publishers Inc., 2012.
4. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education, 2013.
ONLINE RESOURCES:
1. https://www.udemy.com/course/learning-computer-communication-and-networking-fundamentals/ -
Introduction to Computer Networks
2. https://www.tutorialspoint.com/data_communication_computer_network/index.htm - Computer
Networks
3. https://onlinecourses.nptel.ac.in/noc22_cs19/preview- Computer Networks and Internet Protocol
BHARATH INSTITUTE OF SCIENCE AND TECHNOLOGY
Department of Electronics and Communication Engineering
Assessment Summary:
Total
COs Remember Understand Apply Analyse Evaluate Create
(30)
CO1 4 16 20
CO2 4 6 10
PART A
1. What is mean by data communication?
Data communications (DC) is the process of using computing and communication
technologies to transfer data from one place to another, or between participating parties.
2. Why are protocols needed?
In networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a
common language for computers. The computers within a network may use vastly different software and
hardware; however, the use of protocols enables them to communicate with each other regardless.
3. What are the three criteria necessary for an effective and efficient network?
The most important criteria are performance, reliability, and security. Performance of the network
depends on the number of users, type of transmission medium, the capabilities of the connected h/w, and
the efficiency of the s/w
4. What are the features of ALOHA
Devices can transmit data whenever they have a message to send.
If two or more devices transmit simultaneously, their messages will collide and be corrupted.
Devices that detect a collision will wait for a random amount of time before trying to transmit
again.
The simplex mode The Half Duplex mode Full Duplex provides
provides less provides less better performance than
Performance
performance than half performance than full simplex and half duplex
duplex and full duplex. duplex. mode.
The Half-Duplex
Simplex utilizes the involves lesser The Full-Duplex doubles
Bandwidth
maximum of a single utilization of single the utilization of
Utilization
bandwidth. bandwidth at the time of transmission bandwidth.
transmission.
In token passing scheme, the stations are connected logically to each other in form of ring and
access to stations is governed by tokens.
A token is a special bit pattern or a small message, which circulate from one station to the next in
some predefined order.
In Token ring, token is passed from one station to another adjacent station in the ring whereas in
case of Token bus, each station uses the bus to send the token to the next station in some predefined
order.
In both cases, token represents permission to send. If a station has a frame queued for transmission
when it receives the token, it can send that frame before it passes the token to the next station. If it
has no queued frame, it passes the token simply.
After sending a frame, each station must wait for all N stations (including itself) to send the token
to their neighbours and the other N – 1 stations to send a frame, if they have one.
There exist problems like duplication of token or token is lost or insertion of new station, removal
of a station, which need be tackled for correct and reliable operation of this scheme.
Time Division Multiple Access (TDMA) is a complex technology, because it requires an accurate
synchronization between the transmitter and the receiver. TDMA is used in digital mobile radio
systems. The individual mobile stations cyclically assign a frequency for the exclusive use of a
time interval.
In most of the cases, the entire system bandwidth for an interval of time is not assigned to a
station. However, the frequency of the system is divided into sub-bands, and TDMA is used for
the multiple access in each sub-band. Sub-bands are known as carrier frequencies. The mobile
system that uses this technique is referred as the multi-carrier systems.
In the following example, the frequency band has been shared by three users. Each user is
assigned definite timeslots to send and receive data. In this example, user ‘B’ sends after
user ‘A,’ and user ‘C’ sends thereafter. In this way, the peak power becomes a problem and larger
by the burst communication.
PART C
The term physical topology refers to the way in which a network is laid out physically. Two or
more devices connect to a link; two or more links form a topology. The topology of a network is
the geometric representation of the relationship of all the links and linking devices (usually called
nodes) to one another. There are four basic topologies possible: mesh, star, bus, and ring
MESH:
A mesh topology is the one where every node is connected to every other node in the network.
A mesh topology can be a full mesh topology or a partially connected mesh topology. In a full
mesh topology, every computer in the network has a connection to each of the other computers in
that network. The number of connections in this network can be calculated using the following
formula (n is the number of computers in the network): n(n-1)/2 In a partially connected mesh
topology, at least two of the computers in the network have connections to multiple other
computers in that network. It is an inexpensive way to implement redundancy in a network. In the
event that one of the primary computers or connections in the network fails, the rest of the
network continues to operate normally. Advantages of a mesh topology
Can handle high amounts of traffic, because multiple devices can transmit data simultaneously.
A failure of one device does not cause a break in the network or transmission of data
. Adding additional devices does not disrupt data transmission between other devices.
Disadvantages of a mesh topology
The cost to implement is higher than other network topologies, making it a less desirable option.
Building and maintaining the topology is difficult and time consuming.
The chance of redundant connections is high, which adds to the high costs and potential for
reduced efficiency.
STAR:
A star network, star topology is one of the most common network setups. In this configuration,
every node connects to a central network device, like a hub, switch, or computer. The central
network device acts as a server and the peripheral devices act as clients. Depending on the type of
network card used in each computer of the star topology, a coaxial cable or a RJ-45 network cable
is used to connect computers together.
Advantages of star topology
Centralized management of the network, through the use of the central computer, hub, or switch
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to function normally.
The star topology is used in local-area networks (LANs), High-speed LANs often use a star
topology with a central hub.
Disadvantages of star topology
Can have a higher cost to implement, especially when using a switch or router as the central
network device.
The central network device determines the performance and number of nodes the network can
handle
. If the central computer, hub, or switch fails, the entire network goes down and all computers
are disconnected from the network
BUS:
a line topology, a bus topology is a network setup in which each computer and network device are
connected to a single cable or backbone.
Advantages of bus topology
It works well when you have a small network.
It's the easiest network topology for connecting computers or peripherals in a linear fashion.
It requires less cable length than a star topology.
Disadvantages of bus topology
It can be difficult to identify the problems if the whole network goes down.
It can be hard to troubleshoot individual device issues.
Bus topology is not great for large networks.
Terminators are required for both ends of the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network fails or splits into two.
RING:
A ring topology is a network configuration in which device connections create a circular data
path. In a ring network, packets of data travel from one device to the next until they reach their
destination. Most ring topologies allow packets to travel only in one direction, called a
unidirectional ring network. Others permit data to move in either direction, called bidirectional.
The major disadvantage of a ring topology is that if any individual connection in the ring is
broken, the entire network is affected. Ring topologies may be used in either local area networks
(LANs) or wide area networks (WANs).
Advantages of ring topology
All data flows in one direction, reducing the chance of packet collisions.
A network server is not needed to control network connectivity between each workstation.
Data can transfer between workstations at high speeds.
Additional workstations can be added without impacting performance of the network.
Disadvantages of ring topology
All data being transferred over the network must pass through each workstation on the network,
which can make it slower than a star topology.
The entire network will be impacted if one workstation shuts down.
The hardware needed to connect each workstation to the network is more expensive than
Ethernet cards and hubs/switches.
II. On the sender side, the physical layer receives the data fromData
Link Layer and encodes it into signals to be transmitted onto the
medium. On the receiver side, the physical layer receives the signals
from the transmission medium decodesit back into data and sends
it to the Data Link Layer as shown in the figure below:
Fig: Transmission of data to and from Physical Layer
III. Interface
The Physical Layer defines the characteristics of interfaces
between the devices & transmission medium.
IV. Representation of bits
The physical layer is concerned with transmission of signals from
one device to another which involves converting data (1‘s & 0‘s)
into signals and vice versa. It is not concernedwith the meaning
or interpretation of bits.
V. Data rate
The physical layer defines the data transmission rate i.e.number of
bits sent per second. It is the responsibility of the physical layer to
maintain the defined data rate.
II. On the sender side, the Data Link layer receives the data from
Network Layer and divides the stream of bits into fixed size
manageable units called as Frames and sends it to the physical
layer. On the receiver side, the data link layer receives the stream
of bits from the physical layer and regroups them into frames
and sends them to the Network layer. This process is called
Framing. It is shown in the figure below:
V. Error control
a. The data link layer imposes error control mechanism to
identify lost or damaged frames, duplicate frames and then
retransmit them.
b. Error control information is present in the trailer of a
frame.
VI. Access Control
a. The data link layer imposes access control mechanism to
determine which device has right to send data in an
multipoint connection scenario.
3. Network Layer
I. The network layer makes sure that the data is delivered to the
receiver despite multiple intermediate devices.
II. The network layer at the sending side accepts data from the transport
layer, divides it into packets, adds addressing information in the
header and passes it to the data link layer. At the receiving end the
network layer receives the frames sent by data link layer, converts
them back into packets, verifies the physical address (verifies if the
receiver address matches with its own address) and the send the
packets to the transport layer.
V. Routing
VI. The network layer divides data into units called packets of
equal size and bears a sequence number for rearranging on the
receiving end.
VI. The Network layer does not perform any flow control or error
control
4. Transport Layer
I. A logical address at network layer facilitates the transmission
of data from source to destination device. But the source and
the destination both may be having multiple processes
communicating with each other. Hence it is important to
deliver the data not only from the sender to the receiver but
from the correct process on the sender to the correct process
on the receiver. The transport layer takes care of process to
process delivery of data and makes sure that it is intact and in
order.
II. At the sending side, the transport layer receives data from the
session layer, divides it into units called segments and sends
it to the network layer. At the receiving side, the transport
layer receives packets from the network layer, converts and
arranges into proper sequence of segments and sends it to the
session layer.
VI. Flow Control & Error control: the transport layer also
carries out flow control and error control functions; but unlike
data link layer these are end to end rather than node to node.
VII. Main Responsibility
The main responsibility of the transport layer isprocess
to process delivery of the entire message.
5. Session Layer
I. The session layer establishes a session between the
communicating devices called dialog and synchronizes their
interaction. It is the responsibility of the session layer to
establish and synchronize the dialogs. It is also called the
network dialog controller.
II. The session layer at the sending side accepts data from the
presentation layer adds checkpoints to it called syn bits and
passes the data to the transport layer. At the receiving end
the session layer receives data from the transport layer
removes the checkpointsinserted previously and passes the
data to the presentation layer.
6. Presentation Layer
I. The communicating devices may be having different platforms. The
presentation layer performs translation, encryption and compression
of data.
II. The presentation layer at sending side receives the datafrom the
application layer adds header which contains information related to
encryption and compression and sends it to the session layer. At
the receiving side, the presentation layer receives data from the
session layer decompresses and decrypts the data as required and
translates it back as per the encoding scheme used at the receiver.
III. Translation
The sending and receiving devices may run on different platforms
(hardware, software and operating system). Henceit is important that
they understand the messages that are used for communicating.
Hence a translation service may be required which is provided by
the Presentation layers
IV. Compression
Compression ensures faster data transfer. The data compressed at
sender has to be decompressed at the receiving end, both performed
by the Presentation layer.
V. Encryption
It is the process of transforming the original message tochange its
meaning before sending it. The reverse process called decryption
has to be performed at the receiving end to recover the original
message from the encrypted message.
7. Application Layer
I. The application layer enables the user to
communicate its data to the receiver by providing
certain services. For ex. Email is sent using X.400
service.
V. Main Responsibility
Main Responsibility of Application layer is to
provideaccess to network resources.
BHARATH INSTITUTE OF SCIENCE AND TECHNOLOGY
Department of Electronics and Communication Engineering
Assessment Summary:
Total
COs Remember Understand Apply Analyse Evaluate Create
(30)
CO2 6 4 10
CO3 4 16 20
Staff Name
Prepared by Ms.G.JeyalakshmiI, Ms. P.Vanithamani, Signature
Ms. B.Pearly
HoD
Verified by Signature
Dr.H.UMMAHABIBA
Assessment Summary:
Total
COs Remember Understand Apply Analyse Evaluate Create
(30)
CO2 6 4 10
CO3 4 16 20
Staff Name
Prepared by Ms.G.JeyalakshmiI, Ms. P.Vanithamani, Signature
Ms. B.Pearly
HoD
Verified by Signature
Dr.H.UMMAHABIBA
PART A
1. What is meant by CSMA/CD?
Carrier-sense multiple access with collision detection (CSMA/CD) is a medium
access control (MAC) method used most notably in early Ethernet technology for
local area networking. It uses carrier-sensing to defer transmissions until no other
stations are transmitting.
Polling
Polling process is similar to the roll-call performed in class. Just like the teacher, a
controller sends a message to each node in turn.
In this, one acts as a primary station(controller) and the others are secondary stations.
All data exchanges must be made through the controller.
The message sent by the controller contains the address of the node being selected for
granting access.
Although all nodes receive the message the addressed one responds to it and sends data
if any. If there is no data, usually a “poll reject”(NAK) message is sent back.
Problems include high overhead of the polling messages and high dependence on the
reliability of the controller.
Advantages of Polling:
The maximum and minimum access time and data rates on the channel are fixed
predictable.
It has maximum efficiency.
It has maximum bandwidth.
No slot is wasted in polling.
There is assignment of priority to ensure faster access from some secondary.
Disadvantages of Polling:
It consume more time.
Since every station has an equal chance of winning in every round, link sharing
is biased.
Only some station might run out of data to send.
An increase in the turnaround time leads to a drop in the data rates of the channel under
low loads.
Efficiency Let Tpoll be the time for polling and T t be the time required for transmission of
data. Then,
Efficiency = Tt/(Tt + Tpoll)
6(b). Write short notes of CSMA method.
It is a carrier sense multiple access based on media access protocol to sense the traffic on a
channel (idle or busy) before transmitting the data. It means that if the channel is idle, the
station can send data to the channel. Otherwise, it must wait until the channel becomes idle.
Hence, it reduces the chances of a collision on a transmission medium.
1-Persistent: In the 1-Persistent mode of CSMA that defines each node, first sense the shared
channel and if the channel is idle, it immediately sends the data. Else it must wait and keep
track of the status of the channel to be idle and broadcast the frame unconditionally as soon as
the channel is idle.
Non-Persistent: It is the access mode of CSMA that defines before transmitting the data, each
node must sense the channel, and if the channel is inactive, it immediately sends the data.
Otherwise, the station must wait for a random time (not continuously), and when the channel
is found to be idle, it transmits the frames.
O- Persistent: It is an O-persistent method that defines the superiority of the station before the
transmission of the frame on the shared channel. If it is found that the channel is inactive, each
station waits for its turn to retransmit the data.
7(a). Explain the three categories of frames for IEEE 802.11
Three 802.11 frame types, which also have multiple subtype frames
Management frames
Control frames
Data frames
Management frames
Control Frames
802.11 control frames assist with the delivery of the data frames
Control frames are transmitted at one of the basic rates
Control frames are also used to:
clear the channel
acquire the channel
provide unicast frame acknowledgments
They contain only header information
Data Frames
Most 802.11 data frames carry the actual data that is passed down from the higher-layer
protocols.
The layer 3 – 7 MSDU payload is normally encrypted for data privacy reasons.
Some 802.11 data frames carry no MSDU payload at all but do have a specific MAC
control purpose within a BSS.
Any data frames that do not carry an MSDU payload are not encrypted because a layer 3
– 7 data payload does not exist.
The simple data frame has MSDU upper-layer information encapsulated in the frame
body.
The integration service that resides in access points and WLAN controllers takes the
MSDU payload of a simple data frame and transfers the MSDU into 802.3 Ethernet
frames.
Null function frames are sometimes used by client stations to inform the AP of changes
in Power Save status.
A communication
A communication A communication
where a message is
where a message is where a message is
Definition sent from one sender
sent from one sender sent from one sender
to a group of
to one receiver. to all receivers.
receivers
Bandwidth
Moderate High Moderate
usage
8(a).. Explain in detail about IEEE 802.11 Architecture with neat sketch.
Independent BSS
Roaming: In an environment with multiple access points (like a large office building or
campus), a device can move from the range of one AP to another and still maintain its
connection. This is possible due to the underlying architecture of the IEEE 802.11
standard which allows for roaming between APs.
Authentication and Association: Before a station can send or receive data frames on a
WLAN, it needs to establish its identity with an AP. This process is called
authentication. After authentication, the station then establishes a data link-layer
connection with the AP through a process called association.
IEEE 802.15.4
IEEE 802.15.4 technology includes various types of devices that can be used for wireless
communication and networking. These devices are −
Coordinator − This device is responsible for initiating the PAN (Personal Area
Network) and managing the network.
Full Function Device (FFD) − This device has the ability to act as a coordinator or a
router, and can also host other devices.
Reduced Function Device (RFD) − A device that can only communicate with FFDs,
but not capable of hosting other devices or working as a coordinator.
Sensor Node − This device includes sensor modules for monitoring physical
parameters such as temperature, humidity, pressure, etc., and transmit data wirelessly
to the receiver.
Actuator Node − This device receives information sent by the controller node and
performs actions accordingly to control actuators such as motors, pumps, valves, etc.
Gateway Node − A bridge between different networks to exchange data using different
protocols such as Wi-Fi or Ethernet.
Repeater Node − A device that retransmits data packets from one node to another in
order to extend the range of network coverage.
These different types of devices offer versatile options for creating industrial applications using
IEEE 802.15.4 technology, ranging from monitoring physical parameters to controlling
electrical appliances remotely via wireless networks.
Advantages of IEEE 802.15.4:
Date : 15.06.2023
Year / Semester : III / VI
Duration : 1 Hour
Instructions : Read the question carefully and answer.
PART A (05*02= 10 Marks)
Answer all the questions
Blooms
Q No. Question Weightage CO
Level
1 Define IPv4 address 2 CO4 1
2 What is Internet Control Message Protocol 2 CO4 1
Assessment Summary:
Total
COs Remember Understand Apply Analyse Evaluate Create
(30)
CO4 4 12 16
CO5 6 8 14
Staff Name
Mrs. JEYA LAKSHMI,
Prepared by Signature
Mrs. P. VANITHAMAIN
Ms. B. PEARLY
HoD
Verified by Signature
Dr.H.UMMAHABIBA
PART B
6(a) Explain about stop and wait protocol?
top and wait means, whatever the data that sender wants to send, he sends the data to the
receiver. After sending the data, he stops and waits until he receives the acknowledgment from
the receiver. The stop and wait protocol is a flow control protocol where flow control is one of
the services of the data link layer.
It is a data-link layer protocol which is used for transmitting the data over the noiseless
channels. It provides unidirectional data transmission which means that either sending or
receiving of data will take place at a time. It provides flow-control mechanism but does not
provide any error control mechanism.
The idea behind the usage of this frame is that when the sender sends the frame then he waits
for the acknowledgment before sending the next frame.
Sender side
Rule 2: Sender sends the next packet only when it receives the acknowledgment of the previous
packet.
Therefore, the idea of stop and wait protocol in the sender's side is very simple, i.e., send one
packet at a time, and do not send another packet before receiving the acknowledgment.
Receiver side
Rule 2: When the data packet is consumed, receiver sends the acknowledgment to the sender.
Therefore, the idea of stop and wait protocol in the receiver's side is also very simple, i.e.,
consume the packet, and once the packet is consumed, the acknowledgment is sent. This is
known as a flow control mechanism.
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet
Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and
connectionless protocol. So, there is no need to establish a connection prior to data
transfer. The UDP helps to establish low-latency and loss-tolerating connections establish
over the network.The UDP enables process to process communication.
Though Transmission Control Protocol (TCP) is the dominant transport layer protocol used
with most of the Internet services; provides assured delivery, reliability, and much more but
all these services cost us additional overhead and latency. Here, UDP comes into the picture.
For real-time services like computer gaming, voice or video communication, live
conferences; we need UDP. Since high performance is needed, UDP permits packets to be
dropped instead of processing delayed packets. There is no error checking in UDP, so it also
saves bandwidth.
User Datagram Protocol (UDP) is more efficient in terms of both latency and bandwidth.
UDP Header –
UDP header is an 8-bytes fixed and simple header, while for TCP it may vary from 20 bytes
to 60 bytes. The first 8 Bytes contains all necessary header information and the remaining
part consist of data. UDP port number fields are each 16 bits long, therefore the range for port
numbers is defined from 0 to 65535; port number 0 is reserved. Port numbers help to
distinguish different user requests or processes.
1. Source Port: Source Port is a 2 Byte long field used to identify the port number of the
source.
2. Destination Port: It is a 2 Byte long field, used to identify the port of the destined
packet.
3. Length: Length is the length of UDP including the header and the data. It is a 16 -bits
field.
4. Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement of the
one’s complement sum of the UDP header, the pseudo-header of information from the
IP header, and the data, padded with zero octets at the end (if necessary) to make a
multiple of two octets.
Notes – Unlike TCP, the Checksum calculation is not mandatory in UDP. No Error control
or flow control is provided by UDP. Hence UDP depends on IP and ICMP for error
reporting. Also UDP provides port numbers so that is can differentiate between users
requests.
Features of TCP/IP
Piggybacking: A preferable solution would be to use each channel to transmit the frame
(front and back) both ways, with both channels having the same capacity. Assume that A and
B are users. Then the data frames from A to B are interconnected with the acknowledgment
from A to B. and can be identified as a data frame or acknowledgment by checking the sort
field in the header of the received frame.
One more improvement can be made. When a data frame arrives, the receiver waits and does
not send the control frame (acknowledgment) back immediately. The receiver waits until its
network layer moves to the next data packet.
Acknowledgment is associated with this outgoing data frame. Thus the acknowledgment
travels along with the next data frame. Working of PiggybackingWorking of Piggybacking
As we can see in the figure, we can see with piggybacking, a single message (ACK +
DATA) over the wire in place of two separate messages. Piggybacking improves the
efficiency of the bidirectional protocols.
If Host A has both acknowledgment and data, which it wants to send, then the data frame
will be sent with the ack field which contains the sequence number of the frame.
If Host A contains only one acknowledgment, then it will wait for some time, then in the
case, if it finds any data frame, it piggybacks the acknowledgment, otherwise, it will send
the ACK frame.
If Host A left with only a data frame, then it will add the last acknowledgment to it. Host
A can send a data frame with an ack field containing no acknowledgment bit.
PART C
8(b). Explain in detail about distance vector routing with neat diagram.
Example – Consider 3-routers X, Y and Z as shown in figure. Each router have their
routing table. Every routing table will contain distance to the destination nodes.
Consider router X , X will share it routing table to neighbors and neighbors will share it
routing table to it to X and distance from node X to destination will be calculated using
bellmen- ford equation.
Dx(y) = min { C(x,v) + Dv(y)} for each node y ? N
As we can see that distance will be less going from X to Z when Y is intermediate
node(hop) so it will be update in routing table X.
Similarly for Z also –
Finally the routing table for all –
QUESTION BANK
U20ECCJ09– COMPUTER COMMUNICATIONNETWORK
Bloom’s
Q.No Question Weightage CO
Level
UNIT 1 INTRODUCTION TO DATA COMMUNICATIONS
PART – A
1 Define computer Networks. 2 CO1 R
2 Define Simplex, Half-Duplex and Full-Duplex. 2 CO1 R
3 Why are protocols needed? 2 CO1 R
4 List out the advantages of star topology. 2 CO1 R
What are the components of Analog Communication
5 2 CO1 R
system.
6 Compare Analog and Digital Communication. 2 CO1 R
7 Define Data Communication. 2 CO1 R
8 How would you define and calculate Bandwidth? 2 CO1 R
9 Identify the need for MODEM in Data Communication 2 CO1 R
10 Define Bit Rate and Bit Length. 2 CO1 R
PART – B
What are the different types of networks? Explain in
1 4 CO1 U
detail.
Explain the different types of network topologies. Write 4
2 CO1 U
each of its advantages and disadvantages.
Explain the various network performance parameters in 4
3 CO1 U
detail.
4 Explain the types of transmission modes. 4 CO1 U
Explain the major component of a packet switch and their 4
5 CO1 R
functions.
6 Write short notes on Pulse Code Modulation (PCM). 4 CO1 U
7 Explain the different Data transmission modes. 4 CO1 U
Analyze the working techniques of Amplitude 4
8 CO1 R
Modulation.
Discuss the importance of the Non-Return-to-Zero (NRZ) 4
9 CO1 R
technique.
What are the following methods involved in the process 4
10 of Digital-to-analog conversion for Amplitude Shift CO1 U
Keying(ASK)
PART – C
Draw the OSI network architecture and explain the 12
1 CO1 U
functionalities of every layer in detail.
Explain in detail about TCP/IP protocol suite with neat 12
2 CO1 U
diagram?
Explain in detail about network dependent and network 12
3 CO1 U
independent layers of OSI reference model.
4 Classify the different Data Transmission Modes available 12 CO1 U
Bharath Institute Of Higher Education and Research (BIHER) IQAC/ACAD/008
BHARATH INSTITUTE OF SCIENCE AND TECHNOLOGY
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
UNIT 3
WIRED A N D WIRELESS LANS
PART – A
What are the two sub layers of Data link Layer in
1 2 CO3 R
Ethernet?
2 Write the function of SFD. 2 CO3 R
3 What is NIC? 2 CO3 R
Bridge have some effects on Ethernet LAN, what are
4 2 CO3 R
they?
5 What is Full duplex Switched Ethernet? 2 CO3 R
6 What are the 3 types of station in IEEE 802.11? 2 CO3 R
7 Write the function of DCF. 2 CO3 R
8 What is ESS? 2 CO3 R
9 What is a beacon frame? 2 CO3 R
10 List out the types of spread spectrum? 2 CO3 R
PART – B
1 Explain the characteristics of Standard Ethernet. 4 CO3 U
2 Explain about Hidden station problem 4 CO3 U
3 Draw the neat sketch of Ethernet frame format. 4 CO3 U
Distinguish between Unicast, Multicast and Broadcast 4
4 CO3 U
transmission.
5 Explain the categories of frame in IEEE 802.11. 4 CO3 U
6 Write short notes on Exposed station problem. 4 CO3 U
7 Write short notes on Piconet with neat diagram 4 CO3 U
8 Write short notes on IEEE 802.11 FHSS. 4 CO3 U
9 Write about Scatternet in detail with diagram 4 CO3 U
10 List and explain the inter-frame spacing. 4 CO3 U
PART – C
Student attendance percentage (%) ( No. of period attended by the student for the month (A) / No. of period attendance taken for the month (T) ).
U20ECCJ09
Overall
Roll No. Student Name (65)
Total no. of periods
(65)
% (A/T) % (A/T)
U20ECCJ09
Overall
Roll No. Student Name (65)
Total no. of periods
(65)
% (A/T) % (A/T)
U20ECCJ09
Overall
Roll No. Student Name (65)
Total no. of periods
(65)
% (A/T) % (A/T)
https://camu.in/index#/stusubjattper 3/3
FEEDBACK ANALYSIS (2022-23 EVEN SEMESTER)
FACULTYWISE SUMMARY
5 4.9
4.8 4.8 4.8 4.8 4.8 4.8 4.8
4.8 4.7
4.6
4.6
4.4
1 2 3 4 5 6 7 8 9 10
SCHOOL OF ELECTRICAL ENGINEERING
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING , SEMESTER V, Batch- 2020
CONTINUOUS LEARNING ASSESSMENT - I MARK ANALYSIS - U20ECCT09 -COMPUTER COMMUNICATION NETWORKS
Q.No 1 2 3 4 5 6 7 8
DESCRIPTIVE
CO 1 1 1 1 2 2 2 1
Blooms Level 2 2 2 2 2 2 2 2
S.No MAX MARKS
2 2 2 2 2 4 4 12
REG. NO
1 U20EC001 1 2 2 2 2 4 4 10
2 U20EC002 0 2 0 0 2 3 3 10
3 U20EC003 0 0 0 0 1 3 2 10
4 U20EC004 0 0 0 0 0 3 2 11
5 U20EC005 0 0 0 0 0 4 4 11
6 U20EC006 0 0 0 0 0 4 4 11
7 U20EC007 0 0 0 0 0 4 4 10
8 U20EC008 0 0 0 0 0 4 4 11
9 U20EC009 0 0 2 0 0 3 3 9
10 U20EC010 0 2 2 0 0 3 3 10
11 U20EC011 0 2 2 0 2 4 3 11
12 U20EC013 0 2 2 0 2 3 3 9
13 U20EC014 0 2 2 0 2 3 3 9
14 U20EC015 0 2 2 0 2 1 3 10
15 U20EC016 0 2 2 0 2 4 4 9
16 U20EC017 0 2 2 0 2 3 2 11
17 U20EC019 0 2 2 0 2 4 4 9
18 U20EC020 0 2 2 0 1 2 2 8
19 U20EC021 0 2 2 0 1 3 3 9
20 U20EC022 0 2 1 0 1 3 3 7
21 U20EC023 0 0 1 0 1 3 3 7
22 U20EC024 0 0 1 0 1 3 3 9
23 U20EC025 0 0 1 0 1 3 4 11
24 U20EC026 2 0 2 0 1 3 3 9
25 U20EC027 2 0 1 0 2 4 4 11
26 U20EC028 2 0 2 0 2 3 4 11
27 U20EC029 2 2 2 0 2 2 2 10
28 U20EC030 2 2 2 0 2 4 4 10
29 U20EC032 1 1 0 0 1 3 3 10
30 U20EC033 1 1 0 0 2 2 3 10
31 U20EC035 1 1 0 0 2 2 2 10
32 U20EC036 2 2 0 0 1 2 2 11
33 U20EC037 2 2 0 0 2 4 4 11
34 U20EC038 2 1 0 1 2 4 4 11
35 U20EC039 1 1 0 1 1 4 4 11
36 U20EC040 2 1 0 2 2 3 3 9
37 U20EC041 1 1 0 2 2 4 4 11
38 U20EC042 1 1 0 1 2 1 1 11
39 U20EC043 2 2 0 2 2 4 4 10
40 U20EC044 1 1 0 1 1 2 3 10
41 U20EC045 2 2 0 2 2 2 2 11
42 U20EC046 2 2 0 2 2 2 3 8
43 U20EC047 2 2 0 2 1 2 2 9
44 U20EC048 1 1 0 2 2 3 2 10
45 U20EC049 1 1 0 1 1 4 3 10
46 U20EC050 2 1 0 1 1 3 3 9
47 U20EC052 1 1 0 1 1 2 2 11
48 U20EC053 2 2 0 1 2 2 2 11
49 U20EC054 2 1 0 1 1 3 4 11
50 U20EC055 2 2 0 2 2 4 2 7
51 U20EC056 2 2 0 2 2 2 4 11
52 U20EC057 2 2 0 2 2 2 1 11
53 U20EC058 2 2 0 2 1 2 2 7
54 U20EC059 2 2 0 1 1 3 3 10
55 U20EC060 1 1 0 2 2 4 4 11
56 U20EC061 2 2 0 2 2 3 3 10
57 U20EC062 1 1 0 1 1 2 1 7
58 U20EC064 1 1 0 2 2 4 4 11
59 U20EC065 2 2 0 2 1 4 3 11
60 U20EC066 2 2 2 2 2 3 2 11
61 U20EC067 2 2 2 2 2 4 4 11
62 U20EC068 1 1 1 1 1 1 3 8
63 U20EC069 0 0 1 1 1 2 2 8
64 U20EC070 1 2 2 2 2 4 4 10
65 U20EC071 1 1 1 2 2 3 3 10
66 U20EC072 2 2 1 1 1 3 2 10
67 U20EC074 2 2 2 2 2 3 2 11
68 U20EC075 2 2 2 2 2 4 4 11
69 U20EC076 1 2 1 1 1 4 4 11
70 U20EC077 2 2 2 1 1 4 4 10
71 U20EC078 2 1 1 1 2 4 4 11
72 U20EC079 2 2 1 1 1 3 3 9
73 U20EC080 2 2 2 1 2 3 3 10
74 U20EC081 2 2 2 2 2 4 3 11
75 U20EC082 2 2 1 2 2 3 3 9
76 U20EC083 1 1 2 2 2 3 3 9
77 U20EC084 2 2 2 2 2 1 3 10
78 U20EC085 2 2 2 2 2 4 4 9
79 U20EC086 2 2 2 2 2 3 2 11
80 U20EC087 2 2 2 2 2 4 4 9
81 U20EC088 2 2 2 2 2 4 4 7
82 U20EC089 2 2 2 2 2 4 4 8
83 U20EC091 2 2 2 2 2 4 4 12
84 U20EC092 2 2 2 2 2 3 3 8
85 U20EC093 2 2 2 2 1 3 3 10
86 U20EC094 1 1 1 1 2 3 3 11
87 U20EC095 2 2 2 2 1 3 3 9
88 U20EC096 2 2 2 1 1 3 4 9
89 U20EC097 2 2 2 2 1 3 3 10
90 U20EC098 2 2 2 2 1 4 3 10
91 U20EC099 2 1 1 1 2 4 4 11
92 U20EC100 1 1 1 2 1 4 4 11
93 U20EC101 2 2 2 1 1 3 3 10
94 U20EC102 2 2 2 2 2 4 4 11
95 U20EC103 2 2 2 2 2 4 4 12
96 U20EC104 2 2 2 1 1 3 3 9
97 U20EC105 1 1 1 2 2 3 3 11
98 U20EC106 2 2 2 2 2 4 4 12
99 U20EC107 2 2 2 2 2 4 4 10
100 U20EC108 2 2 2 2 2 4 4 12
101 U20EC109 2 2 2 2 2 4 4 12
102 U20EC110 2 2 2 2 1 3 3 7
103 U20EC111 2 2 2 2 1 2 1 10
104 U20EC112 2 2 2 2 2 4 4 12
105 U20EC113 2 2 2 2 2 4 4 12
106 U20EC114 2 2 2 2 2 4 4 12
107 U20EC115 2 2 2 2 2 4 4 8
108 U20EC116 2 1 1 1 1 3 3 10
109 U20EC117 2 2 2 2 1 3 3 11
110 U20EC118 1 1 1 1 2 4 4 11
111 U20EC119 2 2 2 2 2 4 3 9
112 U20EC120 2 2 2 2 2 3 3 11
113 U20EC121 1 1 1 1 1 4 4 11
114 U20EC122 2 2 2 1 2 3 3 10
115 U20EC123 2 2 1 1 1 3 2 11
116 U20EC125 2 2 2 2 1 3 3 10
117 U20EC126 2 1 1 1 2 4 4 11
118 U20EC127 1 1 1 1 1 3 3 11
119 U20EC128 2 2 2 2 2 3 3 10
120 U20EC129 2 2 2 2 2 3 3 10
121 U20EC130 2 2 2 2 2 3 3 10
122 U20EC131 2 1 1 1 2 2 4 9
123 U20EC132 2 2 2 2 2 4 4 12
124 U20EC133 2 2 2 1 1 3 3 8
125 U20EC134 2 2 2 2 2 4 4 12
126 U20EC135 2 2 1 1 2 2 2 10
127 U20EC136 2 1 1 1 1 4 3 9
128 U20EC137 2 2 2 2 2 4 4 10
129 U20EC138 2 2 2 2 2 4 4 10
130 U20EC139 2 2 2 2 2 4 3 9
131 U20EC140 2 2 2 2 2 3 3 11
132 U20EC141 2 2 2 2 2 3 3 11
133 U20EC142 2 2 2 2 1 3 3 11
134 U20EC143 2 2 2 2 2 3 3 10
135 U20EC144 2 2 2 2 2 4 4 12
136 U20EC145 2 2 2 2 2 4 4 12
137 U20EC146 2 2 2 2 2 4 4 12
138 U20EC147 2 2 2 2 2 4 4 12
139 U20EC148 2 2 2 2 2 3 3 10
140 U20EC149 2 2 2 2 1 3 3 11
141 U20EC150 2 2 2 2 2 3 3 10
142 U20EC151 2 2 2 2 2 4 4 12
143 U20EC152 2 2 2 2 2 4 4 12
144 U20EC153 2 2 2 2 2 4 3 9
145 U20EC154 2 2 2 2 1 3 3 11
146 U20EC156 2 2 2 2 2 4 4 12
147 U20EC158 2 2 2 2 2 4 4 10
148 U20EC159 2 2 2 2 2 4 4 10
149 U20EC160 2 2 2 2 2 4 4 10
150 U20EC161 2 2 2 2 2 4 4 12
151 U20EC162 2 2 2 2 2 4 4 12
152 U20EC163 2 2 2 2 2 4 4 12
153 U20EC165 2 2 2 2 2 4 4 12
154 U20EC168 2 2 2 2 2 4 4 12
155 U20EC169 2 2 2 2 2 4 4 12
156 U20EC170 2 2 2 2 1 3 3 9
157 U20EC171 2 2 2 2 1 3 3 9
158 U20EC172 2 2 2 2 1 3 3 9
159 U20EC173 2 2 2 2 2 4 4 12
160 U20EC174 2 2 2 2 2 4 4 10
161 U20EC175 1 1 1 1 1 4 4 11
162 U20EC176 1 1 1 1 1 3 3 11
163 U20EC178 2 2 2 2 2 4 4 12
164 U20EC179 2 2 2 2 2 4 4 12
165 U20EC180 2 2 2 2 2 4 4 12
166 U20EC181 2 2 2 2 2 4 4 12
167 U20EC182 2 2 2 2 2 4 4 12
168 U20EC183 2 2 1 1 1 2 2 9
169 U20EC184 2 2 2 2 2 4 4 10
170 U20EC185 2 2 2 2 2 4 4 12
171 U20EC701 2 2 2 2 2 4 4 12
172 U20EC702 2 1 1 1 1 3 3 10
173 U20EC703 1 1 1 1 1 4 4 11
174 U20EC704 2 2 2 2 1 3 3 7
175 U20EC705 2 2 2 2 2 4 4 12
176 U20EC706 2 2 2 2 2 4 4 10
177 U20EC707 2 2 2 2 2 4 4 10
178 U20EC708 2 2 2 2 2 4 4 8
179 U20EC709 2 2 2 2 2 4 4 10
180 U20EC710 2 2 2 2 2 4 4 10
181 U20EC711 2 2 2 2 2 4 4 10
182 U20EC712 1 1 1 1 1 3 4 11
183 U20EC713 2 2 2 2 2 4 4 12
184 U20EC714 2 2 2 2 1 4 4 10
185 U20EC715 2 2 2 2 2 3 2 11
186 U20EC716 2 2 1 1 1 4 4 11
187 U20EC717 2 1 2 2 2 4 4 11
188 U20EC718 2 2 2 2 2 4 4 11
189 U20EC719 2 1 2 2 2 4 4 11
190 U20EC721 2 1 2 2 2 4 4 11
191 U20EC722 2 2 2 2 2 4 4 11
192 U20EC723 2 2 2 2 2 4 4 12
193 U20EC724 2 2 2 2 2 4 4 12
194 U20EC725 2 2 2 2 2 4 4 12
195 U20EC726 2 1 1 1 1 3 3 10
196 U20EC727 1 1 1 1 1 4 4 11
197 U20EC728 2 2 2 2 1 3 3 7
198 U20EC729 2 2 2 2 2 4 4 12
199 U20EC730 2 2 2 2 2 4 4 10
200 U20EC731 2 2 2 2 2 4 4 10
201 U20EC732 2 2 2 2 2 4 4 8
202 U20EC733 2 2 2 2 2 4 4 10
203 U20EC734 2 2 2 2 2 4 4 10
204 U20EC735 2 2 2 2 2 4 4 10
205 U20EC736 1 1 1 1 1 3 4 11
Attempts 205 205 205 205 205 205 205 205 205 205 205 205 205 205 205 205 205 205 205 205
Scores above 50% 202 202 202 202 202 202 202 202 202 202 200 200 201 199 201 202 198 204 199 201
attainment 0.9854 0.9854 0.9854 0.9854 0.9854 0.9854 0.9854 0.9854 0.9854 0.9854 0.9757 0.9757 0.9805 0.9708 0.9805 0.9854 0.9659 0.9952 0.9708 0.9805
SCHOOL OF ELECTRICAL ENGINEERING
Exit survey
Q.No 1 2 3 4 5
CO 1 2 3 4 5
Max. Marks
5 5 5 5 5
REG. NO Course Outcome Bloom's
1 U20EC001 5 5 5 4 4 Level of
2 U20EC002 5 5 5 4 4 Target the CO
3 U20EC003 5 5 5 4 4 CO1 0.85 2
4 U20EC004 5 5 5 4 4 CO2 0.85 3
5 U20EC005 5 5 5 4 4 CO3 0.85 2
6 U20EC006 5 5 5 4 4 CO4 0.85 3
7 U20EC007 5 5 5 4 4 CO5 0.85 2
8 U20EC008 5 5 5 4 4 CO6 0.85 3
9 U20EC009 5 5 5 4 4
10 U20EC010 5 5 5 4 4
11 U20EC011 4 5 5 5 5
12 U20EC013 5 5 5 4 4
13 U20EC014 5 5 5 4 4
14 U20EC015 5 5 5 4 4
15 U20EC016 5 5 5 4 4
16 U20EC017 5 5 5 4 4
17 U20EC019 4 5 5 5 5
18 U20EC020 5 5 5 4 4
19 U20EC021 5 5 4 5 5
20 U20EC022 5 4 5 5 4
21 U20EC023 5 5 5 4 4
22 U20EC024 4 5 5 5 5
23 U20EC025 5 5 5 4 4
24 U20EC026 5 5 5 4 4
25 U20EC027 5 5 5 4 4
26 U20EC028 5 5 5 4 4
27 U20EC029 5 4 5 5 4
28 U20EC030 5 5 5 4 4
29 U20EC032 4 5 5 5 5
30 U20EC033 5 5 5 4 4
31 U20EC035 5 5 5 4 4
32 U20EC036 5 5 5 4 4
33 U20EC037 5 5 5 4 4
34 U20EC038 4 5 5 5 5
35 U20EC039 5 5 5 4 4
36 U20EC040 5 5 5 4 4
37 U20EC041 5 5 5 4 4
38 U20EC042 5 5 5 4 4
39 U20EC043 5 5 5 4 4
40 U20EC044 5 5 5 4 4
41 U20EC045 5 5 5 4 4
42 U20EC046 5 4 5 5 4
43 U20EC047 5 5 5 4 4
44 U20EC048 4 5 5 5 5
45 U20EC049 5 5 5 4 4
46 U20EC050 5 5 5 4 4
47 U20EC052 5 5 5 4 4
48 U20EC053 5 5 5 4 4
49 U20EC054 5 5 5 4 4
50 U20EC055 5 5 5 4 4
51 U20EC056 5 5 5 4 4
52 U20EC057 5 4 5 5 4
53 U20EC058 5 5 5 4 4
54 U20EC059 4 5 5 5 5
55 U20EC060 5 5 5 4 4
56 U20EC061 5 5 5 4 4
57 U20EC062 5 5 5 4 4
58 U20EC064 5 5 5 4 4
59 U20EC065 5 5 5 4 4
60 U20EC066 5 5 5 4 4
61 U20EC067 5 5 5 4 4
62 U20EC068 5 4 5 5 4
63 U20EC069 5 5 5 4 4
64 U20EC070 4 5 5 5 5
65 U20EC071 5 5 5 4 4
66 U20EC072 5 5 5 4 4
67 U20EC074 5 5 5 4 4
68 U20EC075 5 5 5 4 4
69 U20EC076 5 5 5 4 4
70 U20EC077 5 5 5 4 4
71 U20EC078 5 5 5 4 4
72 U20EC079 5 4 5 5 4
73 U20EC080 5 5 5 4 4
74 U20EC081 4 5 5 5 5
75 U20EC082 5 5 5 4 4
76 U20EC083 5 5 5 4 4
77 U20EC084 5 5 5 4 4
78 U20EC085 5 5 5 4 4
79 U20EC086 5 5 5 4 4
80 U20EC087 5 5 5 4 4
81 U20EC088 5 5 5 4 4
82 U20EC089 5 4 5 5 4
83 U20EC091 5 5 5 4 4
84 U20EC092 4 5 5 5 5
85 U20EC093 5 5 5 4 4
86 U20EC094 5 5 5 4 4
87 U20EC095 5 5 5 4 4
88 U20EC096 5 5 5 4 5
89 U20EC097 4 5 5 5 5
90 U20EC098 5 5 5 4 5
91 U20EC099 5 5 5 4 4
92 U20EC100 5 5 5 4 4
93 U20EC101 5 5 5 4 5
94 U20EC102 5 5 5 4 4
95 U20EC103 5 5 5 4 5
96 U20EC104 5 5 5 4 4
97 U20EC105 5 4 5 5 5
98 U20EC106 5 5 5 4 5
99 U20EC107 4 5 5 5 5
100 U20EC108 4 5 5 5 5
101 U20EC109 5 5 5 4 5
102 U20EC110 5 5 5 4 4
103 U20EC111 5 5 5 4 4
104 U20EC112 5 5 5 4 5
105 U20EC113 5 5 5 4 4
106 U20EC114 5 5 5 4 5
107 U20EC115 5 5 5 4 4
108 U20EC116 5 4 5 5 5
109 U20EC117 5 5 5 4 5
110 U20EC118 4 5 5 5 5
111 U20EC119 4 5 5 5 5
112 U20EC120 5 5 5 4 5
113 U20EC121 5 5 5 4 4
114 U20EC122 5 5 5 4 4
115 U20EC123 5 5 5 4 5
116 U20EC125 5 5 5 4 4
117 U20EC126 5 5 5 4 5
118 U20EC127 5 5 5 4 4
119 U20EC128 5 4 5 5 5
120 U20EC129 5 5 5 4 5
121 U20EC130 4 5 5 5 5
122 U20EC131 4 5 5 5 5
123 U20EC132 5 5 5 4 5
124 U20EC133 5 5 5 4 4
125 U20EC134 5 5 5 4 4
126 U20EC135 5 5 5 4 5
127 U20EC136 5 5 5 4 4
128 U20EC137 5 5 5 4 5
129 U20EC138 5 5 5 4 4
130 U20EC139 5 4 5 5 5
131 U20EC140 5 5 5 4 5
132 U20EC141 4 5 5 5 5
133 U20EC142 4 5 5 5 5
134 U20EC143 5 5 5 4 5
135 U20EC144 5 5 5 4 4
136 U20EC145 5 5 5 4 4
137 U20EC146 5 5 5 4 5
138 U20EC147 5 5 5 4 4
139 U20EC148 5 5 5 4 5
140 U20EC149 5 5 5 4 4
141 U20EC150 4 5 5 5 5
142 U20EC151 5 5 5 4 5
143 U20EC152 5 5 5 4 4
144 U20EC153 5 5 5 4 4
145 U20EC154 5 5 5 4 5
146 U20EC156 5 5 5 4 4
147 U20EC158 5 5 5 4 5
148 U20EC159 5 5 5 4 4
149 U20EC160 5 4 5 5 5
150 U20EC161 5 5 5 4 5
151 U20EC162 4 5 5 5 5
152 U20EC163 5 5 5 4 5
153 U20EC165 5 5 5 4 5
154 U20EC168 5 5 5 4 5
155 U20EC169 5 5 5 4 5
156 U20EC170 5 5 5 4 5
157 U20EC171 5 5 5 4 5
158 U20EC172 5 5 5 4 5
159 U20EC173 5 5 5 4 5
160 U20EC174 5 5 5 4 5
161 U20EC175 5 5 5 4 5
162 U20EC176 5 5 5 4 5
163 U20EC178 5 5 5 4 5
164 U20EC179 5 5 5 4 5
165 U20EC180 5 5 5 4 5
166 U20EC181 5 5 5 4 5
167 U20EC182 5 5 5 4 5
168 U20EC183 5 5 5 4 5
169 U20EC184 5 5 5 4 5
170 U20EC185 5 5 5 4 5
171 U20EC701 5 5 5 4 5
172 U20EC702 5 5 5 4 5
173 U20EC703 5 5 5 4 5
174 U20EC704 5 5 5 4 5
175 U20EC705 5 5 5 4 5
176 U20EC706 5 5 5 4 5
177 U20EC707 5 5 5 4 5
178 U20EC708 5 5 5 5 5
179 U20EC709 5 5 5 5 5
180 U20EC710 5 5 5 5 5
181 U20EC711 5 5 5 5 5
182 U20EC712 5 5 5 5 5
183 U20EC713 5 5 5 5 4
184 U20EC714 5 5 5 5 5
185 U20EC715 5 5 5 5 5
186 U20EC716 5 5 5 5 5
187 U20EC717 5 4 5 5 4
188 U20EC718 5 5 5 5 5
189 U20EC719 5 5 5 5 5
190 U20EC721 5 5 5 4 5
191 U20EC722 5 5 5 5 5
192 U20EC723 5 5 5 5 5
193 U20EC724 5 4 5 5 5
194 U20EC725 5 5 5 5 5
195 U20EC726 5 5 5 5 5
196 U20EC727 5 5 5 4 5
197 U20EC728 5 5 5 5 5
198 U20EC729 5 5 5 5 5
199 U20EC730 5 5 5 5 5
200 U20EC731 5 5 4 5 5
201 U20EC732 5 5 5 5 5
202 U20EC733 5 5 5 5 5
203 U20EC734 5 5 5 5 5
204 U20EC735 5 4 5 5 5
205 U20EC736 5 5 5 5 5
100%
90%
80%
70%
% Attainment
60%
50%
40%
30%
20%
10%
0%
1 2 3 4 5 6
Course Outcome
Semester End (50) Final Attainment (100)
Avg. Direct Indirect overall
Final
Average of CIE (100) Bloom Attainmen Attainmen attainmen
Exam
Level t t t
CIE Avg. Avg. Course
Attainmen Attainmen Attainmen overall Attainment
DistributionC Blooms Bloom exit Target%
t t t Distribution% %
O% Level Level survey
17.40% 2 0.7166 20% 2 0.983 18.70% 2 85% 1 0.88 88 85
17.40% 2 0.646 20% 2 0.9781 18.70% 81% 1 0.8504 85.04 85
17.40% 2 0.7119 20% 2 0.9867 18.70% 2 85% 1 0.88 88 85
1 24.79% 3 0.7464 20% 2 0.9781 22.40% 3 86% 1 0.8904 89.04 85
1 23.05% 2 0.6411 20% 2 0.983 21.60% 2 81% 1 0.8504 85.04 85
2 1 0.85 88 85
90
89.04
89
88 88 88
88
%Attainment
87
86
85.04 85.04
85
84
83
82
1 2 3 4 5 6
Course Outcome