Subject Name: Data Communication and Networking
Subject code   : SAZ6B/ SAE6A/ SEU6D

Syllabus Unit-5 : Repeaters - Bridges - Routers - Gateway - Routing algorithms - TCP/IP Network, Transport and Application Layers of TCP/IP - World Wide Web.

PART-A
1.      What are bridges?
2.      Define firewalls and gateways.
3.      What are functions of applications layer?
4.      List any two internetworking devices.
5.      What is a Repeater?
6.      What is a RARP?
7.      What is a repeater?
8.      Define Bridge.
9.      What do you meant by routers?
10.  What is a repeater?
11.  Define Bridge.
12.  What is a Gateway?

PART-B
1.      Write a short note on Transparent Bridges.
2.      Explain about Electronic mail.
3.      Explain briefly the structure of a web page.
4.      Give a short note on WWW.
5.      Give a short note on Bridges.
6.      Give a short note on World Wide Web.

PART-C
1.      Define adaptive and non-adaptive algorithm.
2.      Explain in detail any two routing algorithm
3.      Describe the working of link state routing algorithm with an example.
4.      Discuss any TWO Routing algorithms.
5.      Discuss any two routing algorithm.
6.   Discuss TCP/IP in detail.









Networking and Internetworking Devices: Introduction
ü  Two or more devices connected for the purpose of sharing data or resources can form a network.
ü  An internet is an interconnection of individual networks.
ü  To create an internet, we need internetworking devices called routers and gateways.
ü  Networking and internetworking devices are divided into four categories: repeaters, bridges, routers and gateways.










Write a short note on Repeater?
Ø  A repeater (or regenerator) is an electronic device that operates on only the physical later of the OSI model.
Ø  If the signal becomes too weak or corrupted, regenerates the original bit pattern, the puts the refreshed copy back onto the link.
Ø  A repeater allows us to extend only the physical length of a network.
Ø  The repeater does not change the functionality of the network in any way.
Ø  Example:  If station A sends a frame to station B, all stations (including C and D) will receive the frame, just as they would without the repeater.
Ø  The repeater does not have the intelligence to keep the frame from passing to the right side when it is meant for a station on the left.
Ø  A repeater is a regenerator, not an amplifier.





Bridges:
Ø  Bridges operate in both the physical and data link layers of the OSI model.
Ø  Bridges can divide a large network into smaller segments.
Ø  Bridges contain logic that allows them to keep the traffic for each segment separate.
Ø  Bridges operate at the data link layer, giving it access to the physical address of all stations connected to it.
Ø  When a frame enters a bridge, the bridge not only regenerates the signal but checks the address of the destination and forwards the new copy only to the segment to which the address belongs.
Ø  As a bridge encounters a packet, it reads the address contained in the frame and compares that address with a table of all the stations on both segments.

Ø  Example: In the below figure a, shows two segments joined by a bridge.
Ø  A packet from station A, addressed to station D arrives at the bridge.
Ø  Station A is on the same segment as station D; therefore, the packet is blocked from crossing into the lower segment.
Ø  In the below figure b, a packet generated by station A is intended for station G.
Ø  The bridge allows the packet to cross and relays it to the entire lower segment, where it is received by station G.
Types of bridges:
Ø  Simple Bridge
Ø  Multiport Bridge
Ø  Transparent Bridge

Simple Bridge
Ø  Simple bridges are the most primitive and least expensive type of bridge.
Ø  A simple bridge links two segments and contains a table that lists the addresses of all the stations included in each of them.
Ø  Addresses must be entered manually.
Ø  Before a simple bridge can be used, an operator must sit down and enter the addresses of every station.
Ø  Whenever a new station is added, the table must be modified.
Ø  Installation of simple bridge are time-consuming and potentially more trouble than the cost saving are worth.

Multiport bridge
Ø  A multiport bridge is used to connect more than two LANs.
Ø  In the below figure, the bridge has three tables, each one holding the physical address of stations reachable through the corresponding port.


Transparent bridge:
Ø  A transparent or learning, bridge builds its table of station address on its own as it performs its bridge functions.
Ø  When the transparent bridge is first installed, its table is empty.
Ø  It encounters each packet; it looks at both the destination and the source addresses.
Ø  It checks the destination to decide where to send the packet.
Ø  If it does not yet recognize the destination address, it relays the packet to all of the station on both segments.
Ø  It uses the source address to build its table.

Some Issues: Bridges Connection Different LANs:
Ø  A bridge should be able to connect LANs using different protocol at the data link layer, such as an Ethernet LAN to Token Ring LAN.
Ø  Some of the issues to be considered,

Frame format:
Ø  Frames sent by different LAN have different formats (Example: Ethernet frame with a Token Ring frame)

Payload size:
Ø  The size of the data that can be encapsulated in a frame varies from protocol to protocol. (Example: maximum payload size of an Ethernet frame with a Token Ring frame)

Data rate:
Ø  Different protocols use different data rates (Example: compare the 10-Mbps data rate of an Ethernet with the 16-Mbps data rate of a Token Ring)


Address bit order:
Ø  The bit order of addresses in different LAN protocols is not the same. (Example: a bridge should reverse an address if it is connecting an Ethernet LAN to a Token Ring LAN).

Other issues:
Ø  There are other issues includes such as acknowledgement, collision, and priority.

Write a short note on Routers. (Or) Discuss briefly about Routers.

ROUTERS
Ø  Routers operate in the physical, data link and network layers of the OSI model.
Ø  Routers have access to network layer.
Ø  Routers relay packets among multiple interconnected networks.
Ø  They route packet from one network to any of a number destination networks.


Ø  The router forwards the incoming packets to the next router on the path, and so on, until the destination is reached.
Ø  Routers have addresses on, and links to, two or more networks at the same time.
Ø  A router is capable of determining which of its connected networks is best.
Ø  Once the router has identified the best route for a packet to travel, it passes the packet along the appropriate network to another router.
Routing concepts:
Ø  The job of router is to forward packets through a set of networks.
Ø  Example: if we want to move a packet from network A to network C via router (network) B.
Ø  The packet could reach network through router D instead of router B, or possibly even going directly from A to C. when even there are multiple options, the router chooses the pathway.

Routing is classified as Nonadaptive or Adaptive.
Nonadaptive Routing:
Ø  Once a pathway to a destination has been selected, the router sends all packets for that destination along that one route.

Adaptive routing:
Ø  Other routing protocols employ a technique called adaptive routing, by which a router may select a new route for each packet (even packet belonging to the same transmission).
Example:
Ø  A transmission from network A to network D, a router may send the first packet by way of network B, the second packet by way of network C, and the third packet by way of network Q, depending on which route is most efficient at the moment.
Packet lifetime:
Ø  Each and every packet is marked with a lifetime; usually the number of hops that are allowed before a packet is considered lost and, accordingly, destroyed.
Ø  Each router to encounter the packet subtracts 1 from the total before passing it on.
Ø  When the lifetime total reaches 0, the packet is destroyed.

Routing Algorithms:
Two common methods are used to calculate the shortest path between two routers:
ü  Distance Vector Routing and
ü  Link State Routing

Distance Vector Routing
            In Distance vector routing, each router periodically shares its knowledge about the entire network with its neighbors.

There keys to understanding how this algorithm works are as follows:
1.      Knowledge about the whole network
Ø  Each router shares its knowledge about the entire network.
Ø  It sends all of its collected knowledge about the network to its neighbors.

2.      Routing only to neighbors
Ø  Each router periodically sends the knowledge about the network only to those routers to which it has direct links.
Ø  Router sends whatever knowledge it has about the whole network through all of its ports.
3.      Information sharing at regular intervals
Ø  For every 30 seconds, each router sends its information about the whole network has changed since the last time information was exchanged.
Sharing Information:
Ø  To understand how distance vector routing works, see the below figure.
Ø  The clouds represent local area networks (LANs).
Ø  The number inside each cloud is that LANs network ID.
Ø  These LANs can be of any type (Ethernet LAN, Token Ring LAN, FDDI, etc.)
Ø  The LANs are connected by routers or gateways, represented by the boxes labeled A, B, D, E, and F.
Distance Vector routing algorithm
Ø  The below figure shows the first step in the algorithm.
Ø  The text boxes indicate the relationships of the routers.
Ø  Each router sends its information about the internetwork only to its immediate neighbors.
Ø  The neighbors add this knowledge and send the whole table to their own neighbors.
Ø  In this way the first router gets its own information back plus new information about its neighbor’s other neighbors.

ROUTING TABLE:
ü  Creating the Table:
ü  Each router gets its initial knowledge about the internetwork and how it uses shared information to update that knowledge.

Creating the Table:
ü  A router is a station on each of those LANs, it also knows the ID of each station.
ü  A routing table has columns for at least three types of information (some protocols require more): the network ID, the cost, and the ID of the next router (next hop).
ü  The network ID is the final destination of the packet.
ü  For example, A sends its routing table to routers B,F and E; B sends its routing table to router C and A; and so on.
Updating the Table:
Ø  When A receives a routing table from B, it uses the information to update its own table.
Ø  It says to itself: “B has sent me a table that shows how its packets can get to networks 55 and 14.
Ø  I know that B is my neighbor, so my packets can reach B in one hop.
Ø  So, if I add one hop to all of the costs shown in B’s table, the sum will be my cost for reaching those other networks.
Ø  A adjusts the information shown in B’s table by adding one to each listed cost.
Ø  This process continues for all routers.
Ø  Every router receives information from neighbors and updates its routing table.

Updating Algorithm:
            The updating algorithm requires that router first add one hop to the hop count field for each advertised route.
1.      If the advertised destination is not in the routing table, the router should add the advertised information to the table.
2.      If the advertised destination is in the routing table,
a)      If the next-hop field is the same, the router should replace the entry in the table with the advertised one.  Note that even if the advertised hop count is larger, the advertised entry should replace the entry in the table because the new information invalidates the old.
b)      If the next-hop field is not the same,
i.                    If the advertised hop count is smaller than the one in the table, the router should replace the entry in the table with the new one.
ii.                  If the advertised hop count is not smaller (same or larger), the router should do nothing.

Link State Routing:
      In Link State Routing, each router shares its knowledge of its neighborhood with every other router in the internetwork.
1.      Knowledge about the neighborhood.
ü  Instead of sending its entire routing table, a router sends information about its neighborhood only.
2.      To all routers.
ü  Each router sends this information to every other router on the internetwork, not just to its neighbors.
ü  It does so by as process called flooding.
ü  Flooding means that a router sends its information to all of its neighbors
ü  Every router that receives the packet sends copies to all of its neighbors. Finally, every router receives a copy of the same information.
3.      Information sharing when there is a change.
ü  Each router sends out information about the neighbors when there is a change.
ü  The first step in link state routing is information sharing.
Packet Cost:
ü  Both distance vector and link state routing are lowest-cost algorithms.
ü  In distance vector routing, cost refers to hop count.
ü  A weighted value based on a variety of factors such as security levels, traffic, or the state of the link.
ü  The cost from router A to network 14, therefore, might be different from the cost from A to 23.
The two factors govern how cost is applied to packets in determining a route:
ü  Cost is applied only by routers and not by any other stations on a network.
ü  Cost is applied as packet leaves the router rather than as it enters. Most networks are broadcast networks.
ü  When a packet is in the network, every station, including the router, can pick it up.

Link state packet
            When a router floods the network with information about its neighborhood, it is said to be advertising.
The basis of this advertising is a short packet called a Link State Packet (LSP).

Link state database:
ü  Every router receives every LSP and puts the information into a link state database.

ü  Because every router receives the same LSPs, every router builds the same database.
ü  It stores this database on its disk and uses it to calculate its routing table.
ü  If the router is added to or deleted from the system, the whole database must be shared for fast updating.

The Dijkstra Algorithm
ü  To calculate its routing table, each router applies an algorithm called the Dijkstra algorithm to its link state database.
ü  The Dijkstra algorithm calculates the shortest path between two points on a network using a graph made up of nodes and ares.
ü  The nodes are of two types: networks and routers.
ü  Arcs are the connection between a router and a network.
ü  The cost or the arc from network to router is always zero.


Shortest path tree:
      The Dijkstra algorithm follows four steps to discover what is called the shortest path tree for each router.
     
ü  . The algorithm begins to build the tree by identifying its root.
ü  The root of each router’s tree is the router itself
ü  The algorithm compares the tree’s temporary arcs and identifies the arc with the lowest cumulative cost.
ü  The algorithm examines the database and identifies every node that can be reached from its chosen node.
ü  The last two steps are repeated until every node in the network has become a permanent part of the tree.
ü  The only permanent arcs are those that represent the shortest route to every node.



   
   
   

   




 


TCP/IP PROTOCOL SUITE:
ü  The TCP/IP protocol suite was developed prior to the OSI model.
ü  The layers in the TCP/IP protocol suite do not match exactly with those in the OSI model.
ü  The TCP/IP protocol suite is made of five layers:
o   Physical layer
o   Data link layer
o   Network layer
o   Transport layer
o   Application layer



ü  TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality, but the modules are not necessarily interdependent.

ü  The TCP/IP protocol suite contains relatively independent protocols that can be mixed and matched, depending on the needs of the system.
ü  The term hierarchical means that each upper level protocol is supported by one or more lower level protocols.

Physical Layer
ü  TCP/IP does not define any specific protocol for the physical layer.
ü  It supports all of the standard and proprietary protocols.
ü  At this level, the communication is between two hops or nodes, either a computer or router.
ü  The unit of communication is a single bit.
ü  When the connection is established between the two nodes, a stream of bits is flowing between them.
ü  The physical layer, however, treats each bit individually.

Data Link Layer
ü  TCP/IP does not define any specific protocol for the data link layer either.
ü  It supports all of the standard and proprietary protocols.
ü  At this level, the communication is also between two hops or nodes.
ü  The unit of communication however, is a packet called a frame
ü  A frame is a packet that encapsulates the data received from the network layer with an added header and sometimes a trailer.
ü  The head, among other communication information, includes the source and destination of frame.

Network Layer
ü  At the network layer (or, more accurately, the internetwork layer), TCP/IP supports the Internet Protocol (IP).
ü  The Internet Protocol (IP) is the transmission mechanism used by the TCP/IP protocols.
ü  IP transports data in packets called datagram’s, each of which is transported separately.
ü  Datagram’s can travel along different routes and can arrive out of sequence or be duplicated.
ü  IP does not keep track of the routes and has no facility for reordering datagram’s once they arrive at their destination.
Transport Layer
ü  There is a main difference between the transport layer and the network layer.
ü  Although all nodes in a network need to have the network layer, only the two end computers need to have the transport layer.
ü  The network layer is responsible for sending individual datagrams from computer A to computer B; the transport layer is responsible for delivering the whole message, which is called a segment, a user datagram, or a packet, from A to B.
ü  A segment may consist of a few or tens of datagrams.
ü  The segments need to be broken into datagrams and each datagram has to be delivered to the network layer for transmission.
ü  the transport layer was represented in the TCP/IP suite by two protocols:
ü  User Datagram Protocol (UDP) and Transmission Control Protocol (TCP).
Application Layer
ü  The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model.
ü  The application layer allows a user to access the services of our private internet or the global Internet.
ü  Many protocols are defined at this layer to provide services such as electronic mail, file transfer, accessing the World Wide Web, and so on.













File Transfer Protocol (FTP)
ü  Transferring files from one computer to another is one of the most common tasks.
ü  File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another.
ü  Although transferring files from one system to another seems simple and straightforward, some problems must be dealt with first. For example, two systems may use different file name conventions.
ü  Two systems may have different ways to represent text and data.
ü  Two systems may have different directory structures.
ü  All these problems have been solved by FTP in a very simple and elegant approach.
ü  FTP differs from other client/server applications in that it establishes two connections
ü  between the hosts.
ü  One connection is used for data transfer, the other for control information (commands and responses).

ü  FTP uses two well-known TCP ports: Port 21 is used for the control connection, and port 20 is used for the data connection.
ü  The basic model of FTP. The client has three components: user interface, client control process, and the client data transfer process.
ü  The server has two components: the server control process and the server data transfer process.
ü  The control connection is made between the control processes.
ü  The data connection is made between the data transfer processes.

Trivial File Transfer Protocol:

ü  To simply copy a file without the need for all of the functionalities of the FTP protocol.
ü  Example: when a diskless workstation or a router is booted, we need to download the bootstrap and configuration files.
ü  TFTP (Trivial File Transfer Protocol) is designed for these types of file transfer.
ü  TFTP can read or write a file for the client.
ü  Reading means copying a file from the server site to the client site.
ü  Writing means copying a file from the client side to the server site.




Comments

Popular posts from this blog