Computer Network
Computer Network
Components:
How It Works
Advantages:
Disadvantages:
1. Single Point of Failure: If the server fails, clients cannot access
services.
2. Cost: Servers and network infrastructure can be expensive to set up
and maintain.
3. Network Load: High demand on the server can lead to network
congestion and slower performance.
Practical Examples
Components:
How It Works
Advantages:
Disadvantages:
Practical Examples
Summary
This involves creating plans for networks, testing them out, and
cyber threats.
looking after the physical parts of networks, like routers, cables, and
adapters.
into seven distinct layers. This model was developed by the International
Purpose
manageable layers.
each layer.
(bit rate).
Examples of Technologies and Protocols
signal types.
short distances.
Practical Examples
(LAN).
● Fiber Optic Cables: Use light to transmit data at high speeds over long
distances.
in a network.
transmission.
congestion.
flow control.
● Ethernet: Operates at both the physical and data link layers, defining
how data is formatted for transmission and how access to the network
is controlled.
Practical Examples
device on a LAN.
● Wi-Fi Access Points: Manage the data link layer to provide wireless
connectivity.
LAN.
interconnected networks.
operational information.
based on IP addresses.
Practical Examples
reliable communication.
Practical Examples
between applications.
(half-duplex or full-duplex).
connections.
Practical Examples
computers.
communication.
● VPN Connections: Secure sessions between remote users and
corporate networks.
versa).
efficient streaming.
Practical Examples
● HTTPS: Uses SSL/TLS to secure web traffic and protect data from
eavesdropping.
different systems.
browsing.
messages.
Practical Examples
● File Transfers: Use FTP to upload and download files from servers.
networks.
Encapsulation
request).
encryption).
6. Data Link Layer: Packets are encapsulated into frames with data link
Decapsulation
2. Data Link Layer: Frames are processed, and data link layer
3. Network Layer: Packets are processed, and network layer headers are
removed.
are removed.
removed.
is displayed).
an HTTP request.
secure transmission.
6. Data Link Layer: The packets are framed for transmission over the
7. Physical Layer: The frames are converted into electrical signals and
The OSI model's structured approach ensures that web browsing and other
network activities occur efficiently and reliably, with each layer performing its
receiver i.e. it is the channel through which data is sent from one place to
1. Guided Media
Features:
● High Speed
● Secure
between pairs.
systems.
○ Advantages:
■ Cost-effective
○ Disadvantages:
crosstalk
to reduce interference.
industrial settings.
○ Advantages:
○ Disadvantages:
install
Coaxial Cable
insulating layer, a metallic shield, and an outer insulating layer. The structure
Coaxial Cable
Applications: Used in cable TV networks, early Ethernet networks
Advantages:
Disadvantages:
Optical Fibre Cable uses the concept of refraction of light through a core
plastic covering called the cladding. It is used for the transmission of large
● Lightweight
● High cost
● Fragile
cables.
2. Unguided Media
It is also referred to as Wireless or Unbounded transmission media. No
● Less Secure
Radio Waves
Radio waves are easy to generate and can penetrate through buildings. The
– 1GHz. AM and FM radios and cordless phones use Radio waves for
transmission.
Further Categorized as Terrestrial and Satellite.
Microwaves
It is a line of sight transmission i.e. the sending and receiving antennas need
to be properly aligned with each other. The distance covered by the signal is
300GHz. Microwaves are majorly used for mobile phone communication and
television distribution.
Microwave Transmission
Infrared
Infrared waves are used for very short distance communication. They cannot
Infrared Waves
Infrared
Basis Radiowave Microwave
wave
These are These are These are
At low At low
Some Some
these. these.
Setup and Setup and
Usage Cost is
Usage Cost usage Cost is usage Cost is
very less.
moderate. high.
Media
● Bandwidth: Assuming all other conditions remain constant, the
transmission rate.
the received signal differs from the transmitted signal. Signal quality
of an undesired signal.
Causes of Transmission Impairment
Transmission Impairment
signal which gives the original signal back and compensate for this
loss.
different phases at the receiver end from what they had at the
sender's end.
● Noise – The random or unwanted signal that mixes up with the
original signal is called noise. There are several types of noise such
Introduction:
This type of service is used to transfer information such as voice, data, and
video between the users without manipulating the content of the network
Tele Services:
In these types of services, the network may change the contents of the
data. It belongs to the last 4 layers of the OSI reference model. It includes
Supplementary Services:
Principles of ISDN:
ADVERTISEMENT
connections at 64 kbps.
○ In ISDN layered protocol architecture is used for specification.
implementation.
ISDN SERVICES:
ISDN CHANNELS:
ISDN structures have a central ISDN office in which all the users are linked
to this through a digital pipe. This digital pipe has different capacities and
has different data transfer rates and these are organized into multiple
ADVERTISEMENT
basic user channel and can carry any digital information in full-duplex
mode. This transmission rate does not exceed 64 kbps. It can carry digital
voice, digital data, and any other low data rate information.
D Channel:
It stands for Data Channel. This channel carries control signals for bearer
etc.
H Channel:
rates.
1. Cryptography
authenticity.
How It Works
decryption key.
Key Types
● Symmetric Key Cryptography: Uses the same key for both encryption
(Rivest–Shamir–Adleman).
Key Features
● Confidentiality: Ensures that only authorized parties can read the data.
● Integrity: Ensures that the data has not been altered during
transmission.
message.
Advantages
Disadvantages
introduce latency.
Practical Examples
1. HTTPS: Uses SSL/TLS protocols to encrypt data between a web
3. Email Encryption: Tools like PGP (Pretty Good Privacy) encrypt email
2. Firewalls
Firewalls are network security devices or software that monitor and control incoming
and outgoing network traffic based on predetermined security rules. Their purpose is to
create a barrier between a trusted internal network and untrusted external networks.
How It Works
Firewalls work by examining packets of data and deciding whether to allow or block
them based on configured rules. The rules are based on factors like IP addresses, port
● Stateful Inspection Firewalls: Track the state of active connections and make
with advanced features like intrusion prevention, deep packet inspection, and
application awareness.
Key Features
policies.
potential threats.
● Threat Prevention: Can include features like malware detection and prevention.
Advantages
cyber-attacks.
to organizational needs.
Disadvantages
large networks.
Practical Examples
internet-based attacks.
monitoring HTTP traffic to prevent attacks like SQL injection and cross-site
scripting (XSS).
3. Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) are security tools designed to detect and
to administrators.
How It Works
IDS systems monitor network traffic or system activities and analyze them for
Key Features
detected.
investigation.
Advantages
● Threat Detection: Helps identify and respond to potential security
best practices.
Disadvantages
fatigue.
protection.
Practical Examples
breaches.
2. HIDS on Servers: Used to monitor critical servers for signs of
Summary
and VPNs.
next-generation firewalls.
Purpose
numerical IP addresses.
How It Works
1. Domain Name Resolution: When you type a domain name into your
DNS resolver to find the IP address associated with that domain name.
Service Provider (ISP). It first checks its cache to see if it has recently
looked up the IP address for the domain name. If not, it sends a query
3. Recursive Queries: If the resolver does not have the IP address cached,
domain name.
4. Caching: Once the resolver obtains the IP address, it caches the result
Key Components
(e.g., www.example.com).
domain.
servers.
Practical Example
address.
b. Types:
individuals.
Subdomains:
f. Subdivisions of SLDs.
shop.bbc.co.uk
domain.
Example
In mail.google.com:
Functions
How It Operates
1. Components:
2. Communication:
Protocol) on port 161 for general SNMP messages and port 162
○ Operations:
series of data.
NMS.
3. MIB (Management Information Base): A hierarchical database used by
Advantages
Disadvantages
Practical Example
network switches. The NMS queries the SNMP agents on the switches to
retrieve data on port utilization, error rates, and other metrics. If a port goes
down, the switch sends an SNMP trap to the NMS, which alerts the
administrator.
6. Email Protocols
SMTP is the protocol used to send and relay email messages between email
clients and servers or between email servers. It operates over TCP port 25 (or
How It Works
1. Client to Server: An email client (e.g., Outlook, Gmail) uses SMTP to send
2. Server to Server: The sending server uses SMTP to relay the email to
Advantages
systems.
Disadvantages
● No Built-In Security: SMTP does not include encryption or authentication
Practical Example
When you send an email from your Gmail account to a colleague’s Outlook
account, SMTP is used to transfer the email from Gmail’s server to Outlook’s
server.
local email client. It operates over TCP port 110 (or port 995 for secure
connections).
How It Works
1. Download: The email client connects to the email server using POP3 and
2. Local Storage: Emails are typically removed from the server after being
the client and server, so actions like deleting or moving emails are not
● Offline Access: Allows users to access emails offline after they have been
downloaded.
Disadvantages
Practical Example
If you use a desktop email client like Thunderbird, POP3 will download your
emails from your email server so that you can read them offline.
operates over TCP port 143 (or port 993 for secure connections).
How It Works
1. Server-Based Storage: Emails remain on the server, and the client retrieves
the server.
Advantages
Disadvantages
● Storage Limits: Users are subject to storage limits on the email server.
Practical Example
If you use multiple devices (e.g., a smartphone, tablet, and laptop) to check
your email, IMAP ensures that any changes you make (like moving an email
documents and multimedia content accessed via the internet. It allows users
to view and interact with web pages and applications using web browsers.
How It Operates
other resources.
Key Components
creating web pages and web applications. It defines the structure and
● CSS (Cascading Style Sheets): Used for styling and layout of web
● Web Servers: Servers that host and serve web content. Examples
● Web Browsers: Clients that request, display, and interact with web
Practical Examples
that site. The server responds with the HTML content of the page,
inventory.
In summary:
devices.
managing emails.
Standards Section (ITU-T) efficient for call relay and it transmits all
Cells
● Fixed-Size Cells: ATM uses small, fixed-size packets called cells. Each
cell is 53 bytes long, with 48 bytes for data and 5 bytes for the header.
● Fixed Size Advantage: The fixed size simplifies the switching and
Virtual Circuits
single path.
provides a path for cells to travel between two endpoints. There are
two types:
remains constant.
○ Switched Virtual Circuit (SVC): A dynamically established path
circuits. Each cell follows the same path to ensure order and timing.
data.
Advantages
● Low Latency: Suitable for real-time applications like voice and video
technologies.
Practical Applications
Example Scenario
handle a mix of voice calls, video conferencing, and data traffic. By leveraging
ATM's ability to provide different QoS levels, the provider ensures that voice
and video traffic, which are sensitive to delay, are prioritized over less
Summary
ATM is a versatile and efficient networking technology designed for
fixed-size cells, virtual circuits, and support for different QoS levels makes it
Despite its complexity and cost, ATM remains a critical technology in certain
9. Flow Control
Flow control is a technique used to control the rate at which data is sent from
a sender to a receiver, ensuring that the receiver can process the data at a
manageable rate. It prevents the sender from overwhelming the receiver with
too much data at once, which can lead to data loss and inefficiency.
Stop-and-Wait Protocol
How It Works
sender transmits one frame (or packet) of data and waits for an
acknowledgment (ACK) from the receiver before sending the next frame.
4. Send Next Frame: Upon receiving the ACK, the sender sends the next
frame.
Advantages
before sending the next one, reducing the chance of data loss.
Disadvantages
● Inefficiency: The sender spends a lot of time waiting for ACKs, leading to
networks.
Practical Example
Consider a scenario where the sender wants to transmit 5 frames of data (F1,
F2, F3, F4, F5) to the receiver. The process would look like this:
5. Repeat: The process continues until all frames are sent and
acknowledged.
Numeric Example
Assume the round-trip time (RTT) between the sender and receiver is 10
milliseconds (ms), and it takes 2 ms to send a frame. The sender can only
For 5 frames:
How It Works
1. Window Size: The window size determines the number of frames the
3. Receive ACKs: The receiver sends ACKs for the frames it receives.
4. Slide Window: As ACKs are received, the sender slides the window
Advantages
Disadvantages
protocol.
● Buffering: Requires more memory for buffering at both the sender and
receiver ends.
Practical Example
sender wants to transmit 5 frames (F1, F2, F3, F4, F5) to the receiver.
1. Send F1, F2, F3: Sender sends frames F1, F2, and F3.
F4.
Numeric Example
size of 3 frames.
2. Wait for ACK: After sending 3 frames, wait for ACKs = 10 ms.
3. Receive ACK1, ACK2, ACK3: Window slides forward, and the sender
For 5 frames:
Comparison
Stop-and-Wait Protocol
● Implementation: Simple.
● Throughput: Low.
● Throughput: High.
Practical Considerations
networks.
2. Error Handling: Both protocols can handle errors, but Sliding Window
Summary
If a frame is corrupted or lost in it,all subsequent In this, only the frame is sent again, which is
If it has a high error rate,it wastes a lot of There is a loss of low bandwidth.
bandwidth.
storage.
It does not require sorting. In this, sorting is done to get the frames in the
correct order.
Access Method
Token Ring is a network protocol where nodes are connected in a logical ring.
Each node must wait for a token (a special data packet) before it can send
data. This mechanism ensures that only one node can transmit at a time,
preventing collisions.
Only one token exists in the network, which is passed from one node to
creating a data frame. This frame circulates around the ring until it
4. Acknowledgment: The recipient node copies the data, marks the frame
as received, and sends it back to the sender, which then removes the
data from the ring and releases the token for other nodes to use.
Purpose
The token passing mechanism ensures fair access to the network and
traffic patterns.
Frame Format
The structure of frames in Token Ring networks includes several key fields:
2. Access Control (AC): Indicates the priority of the frame and whether it
3. Frame Control (FC): Specifies the type of frame (e.g., data, control).
9. Frame Status (FS): Indicates whether the frame was copied and
received correctly.
Real Example
Token Ring networks were widely used in IBM networks in the 1980s and
Access Method
Token Bus is a network protocol where nodes are connected in a bus topology,
1. Logical Ring: Nodes are logically arranged in a ring, even though they
logical ring.
3. Data Transmission: When a node receives the token, it can transmit
data. After transmitting, the node passes the token to the next node in
Purpose
transmission is critical.
Frame Format
The frame structure in Token Bus networks includes the following fields:
2. Frame Control (FC): Specifies the type of frame (e.g., data, token).
8. Frame Status (FS): Indicates whether the frame was copied and
received correctly.
Real Example
Summary
Token Ring
control access.
● Frame Format: Includes start and end delimiters, addresses, data, and
error-checking fields.
Token Bus
● Access Method: Uses token passing in a logical ring within a physical
bus topology.
● Frame Format: Similar to Token Ring, with start and end delimiters,
standard.
various applications.
FDDI uses a dual ring topology to provide high-speed data transmission and
1. Primary Ring: The primary ring is used for regular data transmission.
All nodes are connected in a circular fashion, and data travels in one
closed loop but in the opposite direction. It carries a copy of the data
forwards the data to the next node in the ring until it reaches its
destination.
continue circulating. The secondary ring takes over as the primary path
in case of a failure.
3. Redundancy: The dual ring structure ensures that the network remains
Benefits
● Fault Tolerance: Provides redundancy and high availability by switching
disruption.
Disadvantages
Frame Format
1. Header:
node.
2. Data Payload:
○ Information: Contains the actual data being transmitted.
3. Trailer:
data integrity.
Real Example
FDDI was widely used in backbone networks for large organizations and in
environments requiring high data transfer rates and high reliability, such as
Access Method
access to the network. Each node has a priority queue that handles
3. Token Passing: Data packets are placed in the queue and transmitted
when a node receives the token or when it’s the node’s turn based on
● No Collision: Collisions are avoided by using the dual bus system and
the network in a fair manner based on their queue status and priorities.
Frame Format
The DQDB frame structure includes several key fields:
1. Header:
information.
node.
2. Data Payload:
3. Trailer:
data integrity.
Real Example
Summary
● Frame Format: Includes header, data payload, and trailer with specific
telecommunications.
● Frame Format: Includes header, data payload, and trailer with control
management.
networking needs.
14. Ethernet Standards
IEEE 802.3
Explanation
Electronics Engineers (IEEE) that defines the physical layer and data link
Fast Ethernet
Gigabit Ethernet
● Specification: IEEE 802.3ab (over copper) and IEEE 802.3z (over fiber)
10 Gigabit Ethernet
● Speed: 10 Gbps
Ethernet Topologies
Bus Topology
Explanation
In a bus topology, all devices are connected to a single central cable (the
bus). Data sent from any device travels along the bus and can be received by
How It Works
devices on the network. Each device checks if the data is intended for
them.
● Termination: The bus must be terminated at both ends to prevent
signal reflection.
Advantages
Disadvantages
● Collision Domain: All devices share the same collision domain, leading
● Fault Tolerance: A failure in the central bus can bring down the entire
network.
Practical Example
and 10BASE5.
Star Topology
Explanation
In a star topology, all devices are connected to a central hub or switch. Data
sent from any device passes through the hub or switch before reaching its
destination.
How It Works
● Central Control: The hub or switch manages and directs the data
traffic.
Advantages
chances of collisions.
● Fault Isolation: A failure in one cable or device does not affect the
entire network.
network.
Disadvantages
failure.
costs.
Practical Example
Explanation
How It Works
Handling Collisions
medium efficiently.
integrity.
Limitations
Practical Example
Ethernet environments.
Summary
Standards
Topologies
difficult to scale.
CSMA/CD
These concepts form the foundation of Ethernet, the most widely used
Repeaters
Advantages:
Limitations:
congestion.
Numerical Example
data rate of 100 Mbps. A repeater is placed at the end of this segment to
extend the network by another 100 meters, making the total length 200
meters. The repeater amplifies and regenerates the signal, allowing devices
beyond the initial 100 meters to communicate at the same data rate of 100
Mbps.
Hubs
Hubs are basic networking devices that connect multiple Ethernet devices,
making them act as a single network segment. They operate at the physical
● Hubs vs. Switches: Switches operate at Layer 2 (Data Link Layer) and
Advantages:
Limitations:
light.
● Temporary Networks: Used in temporary setups where ease of use is a
priority.
Numerical Example
signal to all devices, causing them to wait and retransmit later. This results in
Bridges
Bridges are devices that connect and filter traffic between different network
segments at the Data Link Layer (Layer 2) of the OSI model. They help
reduce traffic and collisions by dividing the network into smaller segments.
Advantages:
traffic.
reducing collisions.
Limitations:
● Latency: Adds some delay due to the processing required for filtering
and forwarding.
(LANs).
Segment B, the bridge examines the destination MAC address and forwards
the frame to Segment B. If the frame is destined for a device within Segment
Switches
Switches are network devices that connect multiple devices within a LAN
and operate at the Data Link Layer (Layer 2) of the OSI model. They use MAC
traffic.
collision domain.
Advantages:
performance.
Limitations:
Numerical Example
Consider a switch with four ports and the following MAC address table:
00:0A:95:9D:68:16 1
00:0A:95:9D:68:17 2
00:0A:95:9D:68:18 3
00:0A:95:9D:68:19 4
Routers
Routers are network devices that operate at the Network Layer (Layer 3) of
the OSI model and route data between different networks. They use IP
Types of Routers
networks.
routing requirements.
Advantages:
traffic.
Limitations:
internet.
Numerical Example
Network
When a packet destined for 192.168.2.5 arrives, the router examines the
routing table and forwards the packet to the next hop IP address 10.0.0.2.
Gateways
format conversion.
Types of Gateways
protocols.
Advantages:
Limitations:
● Complexity: More complex to configure and manage.
and VoIP.
systems.
Numerical Example
secure server. The server's HTTPS response is then converted back to HTTP
Model Layer (Layer (Layer 1) Layer (Layer Layer (Layer 2) Layer (Layer Layers
1) 2) 3)
translation
Function Regenerates Broadcasts data Filters and Forwards data Forwards data Translates
addresses protocols
Management
Collision Single Single collision Multiple Multiple Separate Separate
network
network
MAC network
addresses protocols
Advantages Extends Simple and Reduces Reduces Efficient routing, Enables
protocols
Limitations Does not High collision Limited More More expensive, Can
configuratio
connectivity gateways
Numerical Extends a Handles Filters traffic Maintains Uses routing Translates
Example 100 Mbps collisions when between MAC address table to HTTP to
Layer Operate at Layer 1 (Physical Layer) Operate at Layer 2 (Data Link Layer)
Traffic Broadcasts data to all connected Forwards data to specific devices based on
Data Does not process data; merely Processes and filters data based on MAC
Network Less efficient due to broadcast traffic More efficient with reduced collisions and
switches handle data more efficiently compared to hubs and how each
Layer Operate at Layer 3 (Network Layer) Operate at Layer 2 (Data Link Layer)
Function Routes data between different Connects devices within the same
networks network
Routing Uses IP addresses to determine paths Uses MAC addresses for forwarding
decisions
Network Creates and manages separate Segments collision domains but not
devices on the internet. It ensures the reliable and secure exchange of data
protocols. The suite was adopted as the standard for ARPANET in 1983,
1. Application Layer:
2. Transport Layer:
3. Internet Layer:
Comparison with OSI Model: The TCP/IP model simplifies the seven-layer
model.
● Internet Layer (TCP/IP): Maps to the Network layer of the OSI model.
● Network Access Layer (TCP/IP): Combines the Data Link and Physical
IPv4
Definition and Purpose: IPv4 (Internet Protocol version 4) is the fourth
networks.
Address Structure:
Subnetting:
(e.g., 255.255.255.0).
Numerical Example:
● Host Portion: 10
IPv6
Definition and Purpose: IPv6 (Internet Protocol version 6) was developed to
Address Structure:
digits.
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
Key Features:
● Larger Address Space: 128-bit addresses provide a vastly larger pool
of IP addresses.
Numerical Example:
Anycast (one-to-nearest).
Subnetting
management.
Subnet Masks:
CIDR Notation:
● Format: Specifies the number of bits in the network prefix (e.g., /24).
Numerical Example:
● IP Address: 192.168.1.0/24
192.168.1.64/26, etc.
Transport Protocols
● Key Features:
SYN-ACK, ACK).
Numerical Example:
● Three-Way Handshake:
● Key Features:
a connection.
Numerical Example:
Checksum, Data.
examples.
● Purpose:
communication.
Key Technologies
global compatibility.
○ Features: Uses Wideband Code Division Multiple Access
● CDMA2000:
Multiple Access.
Architecture
GSM networks.
● Core Network:
and connectivity.
○ Function: Handles routing, switching, and connectivity to other
● Enhanced Data Rates: Speeds up to 384 kbps for mobile users and
browsing.
Evolution
network performance.
● Purpose:
Components
● Optical Fibres: Thin strands of glass or plastic that carry light signals.
transmission.
prevent loss.
● Advantages:
data.
interference.
● Disadvantages:
Numerical Example
● Distance: 100 km
With optical amplifiers placed every 80 km, the signal remains strong
HFC (Hybrid Fiber-Coaxial) technology combines fibre optic and coaxial cables to
● Purpose:
● Headends: Central locations where signals are processed and sent out to
the network.
● Coaxial Distribution Networks: Carry the signal from the optical nodes
to end-user devices.
● Advantages:
● Disadvantages:
Numerical Example
cables.
19. Satellites
GEO (Geostationary Earth Orbit) satellites orbit the Earth at a fixed position
● Purpose:
Orbital Characteristics
● Fixed Position: Remains above the same point on the Earth’s surface,
● Disadvantages:
constellations.
MEO (Medium Earth Orbit) satellites orbit at intermediate altitudes and are often
● Purpose:
communication.
Orbital Characteristics
● Disadvantages:
GEO.
satellites.
LEO (Low Earth Orbit) satellites orbit close to the Earth’s surface, providing
● Purpose:
minimal delay.
Orbital Characteristics
● Advantages:
● Disadvantages:
to GEO satellites.
networks, fibre optic and HFC technologies, and satellite orbits, including
numerical examples
Key Technologies:
and 5 GHz for Wi-Fi, and ranges from 700 MHz to 3.5 GHz for WiMAX.
used to encode data onto carrier waves, enabling efficient and reliable
transmission.
same frequency band by dividing the signal into time slots, frequencies,
or codes.
Components:
1. Base Stations: Central nodes that transmit and receive data to and
from user devices. They are equipped with powerful antennas and are
network.
● Advantages:
base stations.
● Disadvantages:
Wireless Standards
IEEE 802.11 (Wi-Fi)
The IEEE 802.11 standard defines the protocols for wireless local area
with MIMO.
● 802.11ac: Operates at 5 GHz, offering up to several Gbps with
● 802.11ax (Wi-Fi 6): Operates at 2.4 GHz and 5 GHz, offering higher
● 2.4 GHz Band: Offers longer range but is more prone to interference.
● 5 GHz Band: Offers higher data rates and less interference but has a
shorter range.
Security Protocols:
protections.
than Wi-Fi.
performance.
● Operates in the 2-66 GHz range, with data rates from several Mbps to
traffic, ensuring reliable performance for voice, video, and data services.
and reliability.
Wireless Platforms
Wi-Fi
devices to connect to the internet and communicate with each other within a
limited area.
Deployment Scenarios:
spaces.
● Advantages:
streaming.
● Disadvantages:
data.
Examples:
cameras.
WiMAX
Deployment Scenarios:
infrastructure.
● Advantages:
● Disadvantages:
constraints.
Examples:
communities.
applications.
● Purpose:
802.11 (Wi-Fi) with higher data rates and robust QoS (Quality of
Service).
Key Features
● Frequency Band: Operates in the 5 GHz band, which is less crowded
Architecture
Protocol Stack
radio waves.
○ Features: Uses orthogonal frequency-division multiplexing
interference.
Use Cases
environments.
generations.
● Purpose:
interference.
Protocol Layers
(RNC).
Implementation
● Examples: Widely implemented in countries for 3G mobile services,
Asia.
● Impact: Enabled faster data speeds, better voice quality, and the
● Purpose:
operations.
Key Objectives
internationally.
Protocol Layers
● Description:
CDMA networks.
adaptations.
Benefits
This detailed overview of each standard and proposal provides insight into
technologies.
Network routing is the process of determining the best path for data packets
Routing Principles:
● Algorithms: Methods used to calculate the best path for data packets.
Algorithm.
Routing Tables
Definition and Purpose:
Routing tables are data structures in routers that store routes to various
network, the next hop to reach that network, and other information like
Structure:
● Next Hop: The IP address of the next router to which the packet should
be forwarded.
Example:
192.168.1.0 10.0.0.1 1
10.0.0.0 10.0.0.2 2
172.16.0.0 10.0.0.3 3
Types of Routing
Static Routing:
router’s routing table. These routes do not change unless manually updated
by a network administrator.
Configuration:
[next_hop]
Advantages:
Disadvantages:
Dynamic Routing:
Routing Protocols:
Advantages:
Disadvantages:
Definition and Purpose: Dijkstra’s Algorithm is used to find the shortest path
between nodes in a weighted graph. It ensures that the path with the
Operation:
1. Initialization: Set the distance to the source node to 0 and all other
2. Priority Queue: Use a priority queue to select the node with the
smallest distance.
Example: Consider a network with the following nodes and edges (weights):
A --1--> B
A --4--> C
B --2--> C
B --5--> D
C --1--> D
Bellman-Ford Algorithm:
negative-weight cycles.
Operation:
1. Initialization: Set the distance to the source node to 0 and all other
nodes to infinity.
A --1--> B
A --4--> C
B --2--> C
B --5--> D
C -- -3 --> D
Link state routing protocols maintain a complete map of the network and use
this information to calculate the shortest path to each destination. They are
more scalable and provide faster convergence than distance vector protocols.
Operation:
their local links and flood them to all routers in the network.
received LSAs.
links.
overhead.
● SPF Algorithm: OSPF uses the Shortest Path First (SPF) algorithm to
Router 1 Configuration:
router ospf 1
router ospf 1
in the network. The purpose of flooding is to ensure that a packet reaches its
Operation:
● Advantages:
○ Simplicity: Easy to implement, no need for complex routing
algorithms.
● Disadvantages:
Example:
packet to node E.
In this scenario, the packet is received by node E from multiple paths (A -> C
-> E and A -> B -> D -> E), illustrating the redundancy and potential for
congestion.
Broadcasting
Operation:
2. Packet Reception: All nodes in the local network receive and process
● Advantages:
advertisements.
● Disadvantages:
Example:
2. All nodes receive the ARP request, but only node B responds with its
MAC address.
Multicasting
Definition and Purpose:
Operation:
multicast IP address.
● Advantages:
online gaming.
● Disadvantages:
broadcasting.
Example:
2. Interested clients join the multicast group and receive the video
stream.
Congestion
Definition and Purpose:
Network congestion occurs when the demand for network resources exceeds
network.
load.
● Effects:
on network conditions.
Example:
Deadlock
Definition and Purpose:
network efficiency.
● Causes:
resources.
circular chain.
timely manner.
● Effects:
utilized effectively.
Example:
1. Initial State: P1 holds R1 and waits for R2; P2 holds R2 and waits for
R1.
2. Deadlock: Both processes are stuck waiting for each other to release
Resolution: