Networking Fundamentals: A Comprehensive Guide to Network Technologies and Protocols
Hamming Code
Hamming code is an error-correcting code used in digital communications. It detects and corrects errors that may occur during data transmission. The fundamental concept behind Hamming code is adding redundant bits to the original data bits. This can further be used to detect and correct errors during transmission.
1. Detection and Correction of Errors
One of the main advantages of Hamming code is its ability to detect and correct errors in transmitted data.
2. Redundancy
Redundancy in Hamming code involves adding extra bits to data, enabling error detection and correction by comparing received and expected data patterns.
3. Efficiency
Hamming code can correct a single-bit error in a message of any size.
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM) is an International Telecommunication Union- Telecommunications Standards Section (ITU-T) that is very efficient for the relay of calling. Also, it is used to transfer all the services like voice, data, or video. These services can be conveyed in a small fixed-sized packet called the cell. These cells are connected in a network that transmits the data asynchronously.
Working of ATM
Two types of connection use the Asynchronous transfer mode (ATM). A virtual path can be created end-to-end across an ATM network, as it does not route the cells to a particular virtual circuit. In case of major failure, all cells belonging to a particular virtual path are routed the same way through the ATM network, thus helping faster recovery.
Fiber Distributed Data Interface (FDDI)
FDDI stands for Fiber Distributed Data Interface. It is a set of ANSI and ISO guidelines for information transmission on fiber-optic lines in Local Area Network (LAN) that can expand in run upto 200 km (124 miles). The FDDI convention is based on the token ring protocol.
Advantages of FDDI
- FDDI employments different tokens to make strides organize speed.
- It offers tall security because it is troublesome to spy on the fiber-optic link.
Disadvantages of FDDI
- FDDI is complex. Thus establishment and support require an incredible bargain of expertise.
Wireless Communication
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors. Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices. Wireless communication involves transfer of information without any physical connection between two or more points.
DQDB
DQDB(Distributed Queue Dual Bus) is a MAN(Metropolitan Area Network) protocol. It can be defined as a high speed shared medium access control protocol that is used over a bus network. It has two unidirectional buses, for controlling purposes, where the bus can carry data, video, and voice over a network with bandwidth being allocated as per time slots. The advantage of using the paired bus is that it is used to tackles failure configuration. It can be extended up to 30 miles at 34-55 Mbps.
Multiplexing
Multiplexing is used in cases where the signals of lower bandwidth and the transmitting media is having higher bandwidth. In this case, the possibility of sending a number of signals is more.
Frequency Division Multiplexing (FDM)
a number of signals are transmitted at the same time, and each source transfers its signals in the allotted frequency range. There is a suitable frequency gap between the 2 adjacent signals to avoid over-lapping. Since the signals are transmitted in the allotted frequencies so this decreases the probability of collision.
Time Division Multiplexing (TDM)
This happens when the data transmission rate of media is greater than that of the source, and each signal is allotted a definite amount of time. These slots are so small that all transmissions appear to be parallel. In frequency division multiplexing all the signals operate at the same time with different frequencies, but in time-division multiplexing, all the signals operate with the same frequency at different times.
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN) is simply considered as general-purpose digital network that is being capable of highly and fully supporting wide range of services like voice, data, text, and image with the help of very small set of standard multipurpose user-network interfaces….ISDN standard have the following three types of channels:
- B Channel: It stands for Bearer channel. It has a 64 kbps standard data rate. It is a basic user channel and can carry any digital information in full-duplex mode.
- D Channel: It stands for Data Channel. This channel carry control signal for bearer services.
- H Channel: It stands for Hybrid Channel. It provides user information at higher bit rates.
TCP/IP model robust OSI model
The statement is partially true. OSI offers a blueprint for network communication, adaptable to various technologies. However, it’s theoretical. TCP/IP, used on the internet, is a practical set of protocols with built-in error correction and retransmission, making it more resilient to data loss and network issues. For real-world use, TCP/IP’s focus on functionality gives it an edge in robustness. Still, OSI’s role in understanding network communication shouldn’t be dismissed.
Basic Flow Control
- It is a set of procedures that tells the sender how much data it can transmit before the data overwhelms the receiver.
- The receiving device has limited speed and limited memory to store the data. Therefore, the receiving device must be able to inform the sending device to stop the transmission temporarily before the limits are reached.
- It requires a buffer, a block of memory for storing the information until they are processed…
Approaches to Flow Control
- Feedback based Flow Control In these protocols, the sender sends frames after it has received acknowledgments from the user. This is used in the data link layer.
- Rate based Flow Control These protocols have built in mechanisms to restrict the rate of transmission of data without requiring acknowledgment from the receiver. This is used in the network layer and the transport layer.
Stop-and-Wait Flow Control
This method is the easiest and simplest form of flow control. In this method, basically message or data is broken down into various multiple frames, and then receiver indicates its readiness to receive frame of data. When acknowledgement is received, then only sender will send or transfer the next frame. This process is continued until sender transmits EOT (End of Transmission) frame. In this method, only one of frames can be in transmission at a time.
Sliding Window
This protocol improves the efficiency of stop and wait protocol by allowing multiple frames to be transmitted before receiving an acknowledgment.
Ethernet Standards:-Ethernet standards define the rules for how devices communicate over an Ethernet network.These standards specify things like:.1.Speed:-How fast data can be transmitted (e.g., 10 Mbps, 1 Gbps).2.Cable Type:-The type of cable required (e.g., twisted-pair, fiber optic).3.Maximum Cable Length:-The maximum distance a cable can carry a signal reliably
Internetworking Connection Devices:- internetworking connection devices, also known as networking devices or hardware, are the workhorses that enable communication between different networks.
1.Routers:-A router is a device like a switch that routes data packets based on their IP addresses. The router is mainly a Network Layer device. Routers normally connect LANs and WANs and have a dynamically updating routing table based on which they make decisions on routing the data packets. The router divides the broadcast domains of hosts connected through it.2.Repeater:-A repeater operates at the physical layer. Its job is to amplifies (i.e., regenerates) the signal over the same network before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same network. When the signal becomes weak, they copy it bit by bit and regenerate it at its star topology connectors connecting following the original strength. It is a 2-port device.3.Hub:-A hub is a basically multi-port repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices. In other words, the collision domain of all hosts connected through Hub remains one.4.Bridge:-A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of filtering content by reading the MAC addresses of the source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port device.5.Switch:-A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform error checking before forwarding data, which makes it very efficient as it does not forward packets that have errors and forward good packets selectively to the correct port only. In other words, the switch divides the collision domain of hosts, but the broadcast domain remains the same.Modem:-Modem stands for Modulator/Demodulator. The modem is defined as a networking device that is used to connect devices connected in the network to the internet. The main function of a modem is to convert the analog signals that come from telephone wire into a digital form. In digital form, these converted signals are stored in the form of 0s and 1s. The modem can perform both the task of modulation and demodulation simultaneously…. Types of Modems..1.Optical Modem:-Optical Modem uses optical cables instead of other metallic media. It converts the digital data signals into the pulse of light transmitted on the optical fiber used by it.2.Digital Modem:-A digital modem converts digital data into digital signals. It modulates the digital data on the digital carrier signals for transmission on digital transmission lines.
Finite State Machine(FSM):-A finite state machine (FSM),also called a finite state automaton (FSA), is a model used in computer networks to represent the behavior of protocols and devices. It works like a simplified decision-making process with a limited set of conditions and actions.1.Simplicity:-FSMs provide a clear and easy-to-understand way to model network behavior.2.Scalability:-Complex protocols can be broken down into smaller, manageable state transitions.3.Error Handling:-FSMs can react to unexpected events and errors by transitioning to appropriate states.Token Ring Token Box:-A token ring is defined as a communication protocol in a local area network in which all the stations present in the network are connected through a ring topology. The token is a small size frame of 3 bytes. It circulates among the stations in a ring. The station can only send frames if it has a token. After the successful transmission of the frame, it releases the token for further transmission by other stations.A ring topology is an architecture of the network in which devices are connected in the form of a ring structure and transmit data to their neighboring node.IEEE various:-IEEE stands for Institute of Electrical and Electronics Engineers. It is a professional association with a nonprofit organization with its headquarter in New York in the United States of America. It is composed of engineers, scientists, allied professionals, advancing innovation and technological excellence for the benefit of humanity.1.IEEE 802:-IEEE 802 is a family of standards for LAN (local area networks), PAN (personal area network), and MAN (metropolitan area networks). These networking standards were established somewhere in the 1980s with one main goal: to ensure inter-operating networking technology..2.IEEE 802.1: -The IEEE 802.1 deals with the standards of LAN and MAN. Along with that, it also deals with the MAC (Media Access Control) bridging.3.IEEE 802.2:-The IEEE 802.2 deals with the LLC (Logical Link Control).Multiple Access Control:-When a sender and receiver have a dedicated link to transmit data packets, the data link control is enough to handle the channel. Suppose there is no dedicated path to communicate or transfer the data between two devices. In that case, multiple stations access the channel and simultaneously transmits the data over the channel. It may create collision and cross talk. Hence, the multiple access protocol is required to reduce the collision and avoid crosstalk between the channels.Persistent CSMA:-Persistent CSMA (Carrier Sense Multiple Access with Collision Avoidance) is a category of media access control methods used in computer networks.1.1-Persistent CSMA:-This method is very aggressive. A station with data to transmit continuously senses the channel.2.p-Persistent CSMA:-1.This method offers a balance between efficiency and fairness.2.A station with data to transmit first senses the channel.
Dijkstra’s algorithm:-The Dijkstra’s algorithm finds the shortest path from a particular node, called the source node to every other node in a connected graph. It produces a shortest path tree with the source node as the root. It is profoundly used in computer networks to generate optimal routes with the aim of minimizing routing costs….Dijkstra’s Algorithm:-1.Input:-A graph representing the network; and a source node, s.2.Output:-A shortest path tree, spt[], with s as the root node….need for Dijkstra’s algorithm:-The need for Dijkstra’s algorithm arises in many applications where finding the shortest path between two points is crucial.Bellman Ford Algorithm:-Bellman ford algorithm is a single-source shortest path algorithm. This algorithm is used to find the shortest distance from the single vertex to all the other vertices of a weighted graph. There are various other algorithms used to find the shortest path like Dijkstra algorithm, etc. If the weighted graph contains the negative weight values, then the Dijkstra algorithm does not confirm whether it produces the correct answer or not. In contrast to Dijkstra algorithm, bellman ford algorithm guarantees the correct answer even if the weighted graph contains the negative weight values.Four Way Handshake Terminate TCP:-These 4 steps are known as a TCP 4-way handshake, which is necessary to terminate a TCP connection.1.Firstly, from one side of the connection, either from the client or the server the FIN flag will be sent as the request for the termination of the connection.2.In the second step, whoever receives the FIN flag will then be sending an ACK flag as the acknowledgment for the closing request to the other side.3.And, at the Later step, the server will also send a FIN flag as the closing signal to the other side.4.In the final step, the TCP, who received the final FIN flag, will be sending an ACK flag as the final Acknowledgement for the suggested connection closing.
TCP:-TCP (Transmission Control Protocol) is one of the main protocols of the Internet protocol suite. It lies between the Application and Network Layers which are used in providing reliable delivery services. It is a connection-oriented protocol for communications that helps in the exchange of messages between different devices over a network. The Internet Protocol (IP), which establishes the technique for sending data packets between computers, works with TCP. UDP:-User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol suite, referred to as the UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. So, there is no need to establish a connection before data transfer. The UDP helps to establish low-latency and loss-tolerating connections establish over the network. The UDP enables process-to-process communication.TCP Header:-A TCP header size can be a minimum of 20-byte and a maximum of 60-byte segments of data that come before the data in a TCP segment. It consists of 10 fields and an optional field that specifies parameters and flags for the TCP connection. The TCP header helps keep track of the communication state between two TCP endpoints, which are identified by their IP addresses and port numbers. TCP header plays a vital role in flow control, error control, congestion control, and security. Flow control ensures that the receiver is not overcrowded with data at once that it can handle from the sender. When we talk about error control, it rectifies any errors or losses during transmission.Checksum:-Checksum is the error detection method used by upper layer protocols and is considered to be more reliable than LRC, VRC and CRC. This method makes the use of Checksum Generator on Sender side and Checksum Checker on Receiver side. At the Sender side, the data is divided into equal subunits of n bit length by the checksum generator. This bit is generally of 16-bit length. These subunits are then added together using one’s complement method. This sum is of n bits. The resultant bit is then complemented. This complemented sum which is called checksum is appended to the end of original data unit and is then transmitted to Receiver.
