DCN Notes
DCN Notes
UNIT 1
1. OSI Model
o OSI stands for Open System Interconnection is a reference model that describes
how information from a software application in one computer moves through a
physical medium to the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO)
in 1984, and it is now considered as an architectural model for the inter-computer
communications.
7 Layers of OSI Model: There are the seven OSI layers. Each layer has
different functions. A list of seven layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer:
o The main functionality of the physical layer is to transmit the individual
bits from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
2) Data-Link Layer
1.Flow Control
2.Error Control
3. Framing
4.Access Control
5.Physical Address
3) Network Layer:
4)Transport Layer:
5) Session Layer:
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the
interaction between communicating devices.
6) Presentation Layer:
7) Application Layer:
o An application layer serves as a window for users and application processes to access
network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer
functions.
o This layer provides the network services to the end-users.
Function :
Topology defines the structure of the network of how all the components are interconnected
to each other. There are two types of topology: physical and logical topology.
Physical topology is the geometric representation of all the nodes in a network. There are six
types of network topology which are Bus Topology, Ring Topology, Tree Topology, Star
Topology, Mesh Topology, and Hybrid Topology.
1) Bus Topology:
o The bus topology is designed in such a way that all the stations are connected through
a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o Extensive cabling.
o Difficult troubleshooting
o Signal interference
o Reconfiguration difficult
o Attenuation
2) Ring Topology
o Ring topology is like a bus topology, but with connected ends.
o The node that receives the message from the previous computer will retransmit to the
next node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
3) Star Topology
o Star topology is an arrangement of the network in which every node is connected to
the central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are
the descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
o Difficult troubleshooting
o High cost:
o Failure.
o Reconfiguration difficult
5) Mesh topology:
o Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central
point of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
1. Reliable: .
2. Fast Communication:
3. Easier Reconfiguration:
6) Hybrid Topology
o The combination of various different topologies is known as Hybrid topology.
o A Hybrid topology is a connection between different links and nodes to transfer the
data.
o When two or more different topologies are combined together is termed as Hybrid
topology and if similar topologies are connected with each other will not result in
Hybrid topology. For example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank, connecting these two
topologies will result in Hybrid topology.
A computer network is a group of computers linked to each other that enables the computer
to communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four
types:
o Geographical area:
o Centralized data.
o Get updated files
o Exchange messages:
o Sharing of software and resources:
o Global business:
o High bandwidth
o Security issue:
o Needs Firewall & antivirus software:
o High Setup cost:
o Troubleshooting problems:
Types of WLANs
As per IEEE standard WLAN is categorized into two basic modes, which are as follows:
1. Infrastructure: In Infrastructure mode, all the endpoints are connected to a base
station and communicate through that; and this can also enable internet access. A
WLAN infrastructure can be set up with: a wireless router (base station) and an
endpoint (computer, mobile phone, etc). An office or home WiFi connection is
an example of Infrastructure mode.
2. Ad Hoc: In Ad Hoc mode WLAN connects devices without a base station, like a
computer workstation. An Ad Hoc WLAN is easy to set up it provides peer-to-
peer communication. It requires two or more endpoints with built-in radio
transmission.
Working of WLAN
WLAN transmits data over radio signals and the data is sent in the form of a packet. Each
packet consists of layers, labels, and instructions with unique MAC addresses assigned to
endpoints. This enables routing data packets to correct locations.
Advantages of WLAN
1. Installation speed and simplicity.
2. Installation flexibility.
3. Reduced cost of ownership.
4. Reliability.
5. Mobility.
6. Robustness.
Disadvantages of WLAN
1. Slower bandwidth.
2. Security for wireless LANs is the prime concern.
3. Less capacity.
4. Wireless networks cost four times more than wired network cards.
5. Wireless devices emit low levels of RF which can be harmful to our health.
What is Bluetooth?
\
Bluetooth is used for short-range wireless voice and data communication. It is a Wireless
Personal Area Network (WPAN) technology and is used for data communications over
smaller distances. This generation changed into being invented via Ericson in 1994. It
operates within the unlicensed, business, scientific, and clinical (ISM) bands from 2.4 GHz to
2.485 GHz. Bluetooth stages up to 10 meters. Depending upon the version, it presents
information up to at least 1 Mbps or 3 Mbps. The spreading method that it uses is FHSS
(Frequency-hopping unfold spectrum). A Bluetooth network is called a piconet and a group
of interconnected piconets is called a scatternet.
What is Bluetooth?
Bluetooth simply follows the principle of transmitting and receiving data using radio waves.
It can be paired with the other device which has also Bluetooth but it should be within the
estimated communication range to connect. When two devices start to share data, they form a
network called piconet which can further accommodate more than five devices.
Key Features of Bluetooth
The transmission capacity of Bluetooth is 720 kbps.
Bluetooth is a wireless device.
Bluetooth is a Low-cost and short-distance radio communications standard.
Bluetooth is robust and flexible.
The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
The architecture of Bluetooth defines two types of networks:
Piconet: Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes. Thus, we can say that there
is a total of 8 active nodes which are present at a distance of 10 meters. The communication
between the primary and secondary nodes can be one-to-one or one-to-many. Possible
communication is only between the master and slave; Slave-slave communication is not
possible. It also has 255 parked nodes, these are secondary nodes and cannot take
participation in communication unless it gets converted to the active state.
Bluetooth Architecture
Scatternet: It is formed by using various piconets. A slave that is present in one piconet can
act as master or we can say primary in another piconet. This kind of node can receive a
message from a master in one piconet and deliver the message to its slave in the other piconet
where it is acting as a master. This type of node is referred to as a bridge node. A station
cannot be mastered in two piconets.
Bluetooth Protocol Stack
1. Radio (RF) layer: It specifies the details of the air interface, including frequency,
the use of frequency hopping and transmit power. It performs
modulation/demodulation of the data into RF signals. It defines the physical
characteristics of Bluetooth transceivers. It defines two types of physical links:
connection-less and connection-oriented.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth system
and is equivalent to the MAC sublayer in LANs. It performs the connection
establishment within a piconet, addressing, packet format, timing and power
control.
3. Link Manager protocol layer: It performs the management of the already
established links which includes authentication and encryption processes. It is
responsible for creating the links, monitoring their health, and terminating them
gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It is also known
as the heart of the Bluetooth protocol stack. It allows the communication between
upper and lower layers of the Bluetooth protocol stack. It packages the data
packets received from upper layers into the form expected by lower layers. It also
performs segmentation and multiplexing.
5. Service Discovery Protocol (SDP) layer: It is short for Service Discovery
Protocol. It allows discovering the services available on another Bluetooth-
enabled device.
6. RF comm layer: It is a cabal replacement protocol. It is short for Radio Frontend
Component. It provides a serial interface with WAP and OBEX. It also provides
emulation of serial ports over the logical link control and adaption
protocol(L2CAP). The protocol is based on the ETSI standard TS 07.10.
7. OBEX: It is short for Object Exchange. It is a communication protocol to
exchange objects between 2 devices.
8. WAP: It is short for Wireless Access Protocol. It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony
service. The basic function of this layer is call control (setup & release) and group
management for the gateway serving multiple devices.
10. Application layer: It enables the user to interact with the application.
Bluetooth Protocol Stack
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look at them.
In-Car Headset: One can make calls from the car speaker system without the use
of mobile phones.
Stereo Headset: To listen to music in car or in music players at home.
Webcam: One can link the camera with the help of Bluetooth with their laptop or
phone.
Bluetooth-equipped Printer: The printer can be used when connected via
Bluetooth with mobile phone or laptop.
Bluetooth Global Positioning System (GPS): To use Global Positioning System
(GPS) in cars, one can connect their phone with car system via Bluetooth to fetch
the directions of the address.
Advantages of Bluetooth
It is a low-cost and easy-to-use device.
It can also penetrate through walls.
It creates an Ad-hoc connection immediately without any wires.
It is used for voice and data transfer.
Disadvantages of Bluetooth
It can be hacked and hence, less secure.
It has a slow data transfer rate of 3 Mbps.
Bluetooth communication does not support routing.
Applications of Bluetooth
It can be used in wireless headsets, wireless PANs, and LANs.
It can connect a digital camera wireless to a mobile phone.
It can transfer data in terms of videos, songs, photographs, or files from one cell
phone to another cell phone or computer.
It is used in the sectors of Medical healthcare, sports and fitness, Military.
What is Bridge in Computer Network – Types, Uses, Functions & Differences
The bridge is a networking device in a computer network that is used to connect multiple
LANs to a larger LAN. In computer networks, we have multiple networking devices such as
bridges, hubs, routers, switches, etc, each device has its own specification and is used for a
particular purpose. The bridge is a networking device that connects the larger LAN networks
with the group of smaller LAN networks.
In this article, we are going to discuss everything about the bridge including what exactly a
bridge is, and the type of bridges we have in computer networks including transparent
bridges, source routing bridges, and translational bridges, which will be followed by
advantages and disadvantages of the bridge in networking. then how the bridge is different
from the gateway and last we will look into the applications and functions of the bridge in the
network.
Bridge in Computer Network
A bridge in a computer network is a device used to connect multiple LANs together with a
larger Local Area Network (LAN). The mechanism of network aggregation is known as
bridging. The bridge is a physical or hardware device but operates at the OSI model’s data
link layer and is also known as a layer of two switches.
The primary responsibility of a switch is to examine the incoming traffic and determine
whether to filter or forward it. Basically, a bridge in computer networks is used to divide
network connections into sections, now each section has a separate bandwidth and a separate
collision domain. Here bridge is used to improve network performance.
Types of Bridges
There are three types of bridges in computer networks, which are as follows:
Transparent Bridge: Transparent bridges are invisible to other devices on the
network. This bridge doesn’t reconfigure the network on the addition or deletion
of any station. The prime function of the transparent bridge is to block or forward
the data according to the MAC address.
Source Routing Bridge: Source routing bridges were developed and designed by
IBM specifically for token ring networks. The frame’s entire route is embedded
with the data frames by the source station to perform the routing operation so that
once the frame is forwarded it must follow a specific defined path/route.
Translational Bridge: Translational bridges convert the received data from one
networking system to another. Or it is used to communicate or transmit data
between two different types of networking systems. Like if we are sending data
from a token ring to an Ethernet cable, the translational cable will be used to
connect both the networking system and transmit data.
Working of Bridges
Let’s see the step-by-step working of the bridge in computer networks:
Receiving Data: The bridge gets data packets (or frames) from both network
segments A and B.
Building a Table: It creates a table of MAC addresses by looking at where the
data is coming from to know which device is on which segment.
Filtering Data: If the data from network A is meant for a device also on network
A, the bridge stops it from going further.
Forwarding Data: If the data from network A is meant for a device on network
B, the bridge sends it to the correct place on network B.
Repeating for Both Sides: The bridge does the same thing for data coming from
network B.
Working of Bridge
What is Ethernet?
Ethernet is the most widely used LAN technology and is defined under IEEE standards
802.3. The reason behind its wide usability is that Ethernet is easy to understand,
implement, and maintain, and allows low-cost network implementation. Also, Ethernet
offers flexibility in terms of the topologies that are allowed. Ethernet generally uses a bus
topology. Ethernet operates in two layers of the OSI model, the physical layer and the data
link layer. For Ethernet, the protocol data unit is a frame since we mainly deal with DLLs.
In order to handle collisions, the Access control mechanism used in Ethernet is CSMA/CD.
There are different types of Ethernet networks that are used to connect devices and transfer
data.
Let’s discuss them in simple terms:
1. Fast Ethernet: This type of Ethernet network uses cables called twisted pair or CAT5. It
can transfer data at a speed of around 100 Mbps (megabits per second). Fast Ethernet uses
both fiber optic and twisted pair cables to enable communication. There are three categories
of Fast Ethernet: 100BASE-TX, 100BASE-FX, and 100BASE-T4.
2. Gigabit Ethernet: This is an upgrade from Fast Ethernet and is more common
nowadays. It can transfer data at a speed of 1000 Mbps or 1 Gbps (gigabit per second).
Gigabit Ethernet also uses fiber optic and twisted pair cables for communication. It often
uses advanced cables like CAT5e, which can transfer data at a speed of 10 Gbps.
3.10-Gigabit Ethernet: This is an advanced and high-speed network that can transmit data
at a speed of 10 gigabits per second. It uses special cables like CAT6a or CAT7 twisted-
pair cables and fiber optic cables. With the help of fiber optic cables, this network can
cover longer distances, up to around 10,000 meters.
4. Switch Ethernet: This type of network involves using switches or hubs to improve
network performance. Each workstation in this network has its own dedicated connection,
which improves the speed and efficiency of data transfer. Switch Ethernet supports a wide
range of speeds, from 10 Mbps to 10 Gbps, depending on the version of Ethernet being
used.
Key Features of Ethernet
1. Speed: Ethernet is capable of transmitting data at high speeds, with current
Ethernet standards supporting speeds of up to 100 Gbps.
2. Flexibility: Ethernet is a flexible technology that can be used with a wide range
of devices and operating systems. It can also be easily scaled to accommodate a
growing number of users and devices.
3. Reliability: Ethernet is a reliable technology that uses error-correction
techniques to ensure that data is transmitted accurately and efficiently.
4. Cost-effectiveness: Ethernet is a cost-effective technology that is widely
available and easy to implement. It is also relatively low-maintenance, requiring
minimal ongoing support.
5. Interoperability: Ethernet is an interoperable technology that allows devices
from different manufacturers to communicate with each other seamlessly.
6. Security: Ethernet includes built-in security features, including encryption and
authentication, to protect data from unauthorized access.
7. Manageability: Ethernet networks are easily managed, with various tools
available to help network administrators monitor and control network traffic.
8. Compatibility: Ethernet is compatible with a wide range of other networking
technologies, making it easy to integrate with other systems and devices.
9. Availability: Ethernet is a widely available technology that can be used in
almost any setting, from homes and small offices to large data centers and
enterprise-level networks.
10. Simplicity: Ethernet is a simple technology that is easy to understand and use. It
does not require specialized knowledge or expertise to set up and configure,
making it accessible to a wide range of users.
Advantages of Ethernet
1. Speed:
2. Efficiency:
3. Good data transfer quality:
Disadvantages of Ethernet:
1. Distance limitations:
2. Bandwidth sharing: .
3. Security vulnerabilities
4. Complexity:
5. Compatibility issues:
6. Cable installation:
7. Physical limitations
What is a Token Ring?
A token ring is a computer network topology and access method to connect devices in a
physical ring or loop. In a token ring network, data can travel in a unidirectional or
bidirectional manner around the ring, and devices are connected to the network in a
sequential fashion. This topology contrasts other network topologies, such as Ethernet, which
use a bus or star configuration.
What is a Token Ring Network?
A Token Ring network is a type of local area network (LAN) technology that uses a ring
topology to connect devices. In a Token Ring network, devices are connected in a physical or
logical ring, and data travels around the ring in a unidirectional or bidirectional manner. The
term "token" refers to a particular control packet to manage network access.
A Token Ring star topology is a type of traditional Token Ring network topology in which
the physical layout of the network combines the star configuration, even though the logical
structure of the network remains a ring. This design combines elements of both star and ring
topologies to provide certain advantages. The token ring star topology works in the following
manner.
ADVERTISEMENT
1. Physical Star Layout: In a Token Ring star topology, all the devices are connected to
a central hub or Multistation Access Unit (MAU). This central hub is also known as
the focal point of the star. Each device, such as computers or network printers, has a
dedicated connection to the hub, and these connections radiate out from the hub like
the spokes of a wheel.
2. Logical Ring Structure: The layout of the logical ring topology; the entire network
maintains a logical ring structure created internally within the central hub. This means
that data packets and the token will continue circling within a ring within the hub, just
as they would in a traditional Token Ring network with a physical ring topology.
3. Token Passing: The controller of the token passing still controls access to the
network. When a device is connected to the hub then, the hub needs to transmit data.
It waits for the token to arrive at the hub. Once it has the token, it can transmit data
onto the logical ring within the hub. The token continues to circulate until another
device needs to transmit.
In Token Ring networks, Type 1 and Type 3 are two different standards or categories of
Token Ring networks. These standards are part of the IEEE 802.5 series for Token Ring
LANs. Each type specifies other physical characteristics and requirements for Token Ring
networks:
o Speed: The Type 1 Token Ring operates at a data rate of 4 Mbps (megabits per
second).
o Cabling: Type 1 Token Ring networks use shielded twisted-pair cables. It is also
referred to as STP (Shielded Twisted Pair) cabling. These cables are designed to
reduce electromagnetic interference, and these also enhance the reliability of the
network.
o Topology: Type 1 Token Ring networks typically use a physical ring topology, where
devices are connected sequentially in a closed-loop configuration. The token-passing
protocol maintains the logical ring structure.
o Connectors: Type 1 Token Ring networks often use IBM Data Connectors (IDCs) as
the standard connectors for connecting devices to the network.
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The switching
technique will decide the best route for data transmission.
Switching technique is used to connect the systems for making one-to-one communication.
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated path between
sender and receiver.
o In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
o Circuit switching in a network operates in a similar way as the telephone works.
o A complete end-to-end path must exist before the communication takes place.
o In case of circuit switching technique, when any user wants to send the data, voice,
video, a request signal is sent to the receiver then the receiver sends back the
acknowledgment to ensure the availability of the dedicated path. After receiving the
acknowledgment, dedicated path transfers the data.
o Circuit switching is used in public telephone network. It is used for voice
transmission.
o Fixed data can be transferred at a time in circuit switching technology.
o Circuit establishment
o Data transfer
o Circuit Disconnect
o Once the dedicated path is established, the only delay occurs in the speed of data
transmission.
o It takes a long time to establish a connection approx 10 seconds during which no data
can be transmitted.
o It is more expensive than other switching techniques as a dedicated path is required
for each connection.
o It is inefficient to use because once the path is established and no data is transferred,
then the capacity of the path is wasted.
o In this case, the connection is dedicated therefore no other data can be transferred
even if the channel is free.
Message Switching
o Message Switching is a switching technique in which a message is transferred as a
complete unit and routed through intermediate nodes at which it is stored and
forwarded.
o In Message Switching technique, there is no establishment of a dedicated path
between the sender and receiver.
o The destination address is appended to the message. Message Switching provides a
dynamic routing as the message is routed through the intermediate nodes based on the
information available in the message.
o Message switches are programmed in such a way so that they can provide the most
efficient routes.
o Each and every node stores the entire message and then forward it to the next node.
This type of network is known as store and forward network.
o Message switching treats each message as an independent entity.
o Data channels are shared among the communicating devices that improve the
efficiency of using available bandwidth.
o Traffic congestion can be reduced because the message is temporarily stored in the
nodes.
o Message priority can be used to manage the network.
o The size of the message which is sent over the network can be varied. Therefore, it
supports the data of unlimited size.
o The message switches must be equipped with sufficient storage to enable them to
store the messages until the message is forwarded.
o The Long delay can occur due to the storing and forwarding facility provided by the
message switching technique.
Packet Switching
o The packet switching is a switching technique in which the message is sent in one go,
but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given a
unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend the
message.
o If the correct order of the packets is reached, then the acknowledgment message will
be sent.
o Cost-effective:
o Reliable:
o Efficient.
Disadvantages Of Packet Switching:
In distance-vector routing (DVR), each router is required to inform the topology changes to
its neighboring routers periodically. Historically it is known as the old ARPNET routing
algorithm or Bellman-Ford algorithm.
Address Resolution Protocol (ARP) is a communication protocol used to find the MAC
(Media Access Control) address of a device from its IP address. This protocol is used when a
device wants to communicate with another device on a Local Area Network or Ethernet.
Types of ARP
o Proxy ARP
o Gratuitous ARP
o Reverse ARP (RARP)
o Inverse ARP
Proxy ARP - Proxy ARP is a method through which a Layer 3 devices may respond to ARP
requests for a target that is in a different network from the sender. The Proxy ARP configured
router responds to the ARP and map the MAC address of the router with the target IP address
and fool the sender that it is reached at its destination.
Gratuitous ARP - Gratuitous ARP is an ARP request of the host that helps to identify the
duplicate IP address. It is a broadcast request for the IP address of the router. If an ARP
request is sent by a switch or router to get its IP address and no ARP responses are received,
so all other nodes cannot use the IP address allocated to that switch or router.
Reverse ARP (RARP) - It is a networking protocol used by the client system in a local area
network (LAN) to request its IPv4 address from the ARP gateway router table. A table is
created by the network administrator in the gateway-router that is used to find out the MAC
address to the corresponding IP address.
Inverse ARP (InARP) - Inverse ARP is inverse of the ARP, and it is used to find the IP
addresses of the nodes from the data link layer addresses. These are mainly used for the frame
relays, and ATM networks, where Layer 2 virtual circuit addressing are often acquired from
Layer 2 signaling. When using these virtual circuits, the relevant Layer 3 addresses are
available.
What is RARP ?
Introduction :
The Reverse Address Resolution Protocol (RARP) is a networking protocol that is used to
map a physical (MAC) address to an Internet Protocol (IP) address. It is the reverse of the
more commonly used Address Resolution Protocol (ARP), which maps an IP address to a
MAC address.
RARP was developed in the early days of computer networking as a way to provide IP
addresses to diskless workstations or other devices that could not store their own IP
addresses. With RARP, the device would broadcast its MAC address and request an IP
address, and a RARP server on the network would respond with the corresponding IP
address.
While RARP was widely used in the past, it has largely been replaced by newer protocols
such as DHCP (Dynamic Host Configuration Protocol), which provides more flexibility and
functionality in assigning IP addresses dynamically. However, RARP is still used in some
specialized applications, such as booting embedded systems and configuring network devices
with pre-assigned IP addresses.
RARP is specified in RFC 903 and operates at the data link layer of the OSI model. It has
largely been superseded by ARP and DHCP in modern networks, but it played an important
role in the development of computer networking protocols and continues to be used in
certain contexts.
RARP is abbreviation of Reverse Address Resolution Protocol which is a protocol based on
computer networking which is employed by a client computer to request its IP address from
a gateway server’s Address Resolution Protocol table or cache. The network administrator
creates a table in gateway-router, which is used to map the MAC address to
corresponding IP address.
Working of RARP :
The RARP is on the Network Access Layer and is employed to send data between two
points in a very network.
Each network participant has two unique addresses:- IP address (a logical address) and
MAC address (the physical address).
The IP address gets assigned by software and after that the MAC address is constructed into
the hardware.
The RARP server that responds to RARP requests, can even be any normal computer
within the network. However, it must hold the data of all the MAC addresses with their
assigned IP addresses. If a RARP request is received by the network, only these RARP
servers can reply to it. The info packet needs to be sent on very cheap layers of the network.
This implies that the packet is transferred to all the participants at the identical time.
The client broadcasts a RARP request with an Ethernet broadcast address and with its own
physical address. The server responds by informing the client its IP address.
What is TCP (Transmission Control Protocol)?
TCP (Transmission Control Protocol) is one of the main protocols of the TCP/IP
suite. It lies between the Application and Network Layers which are used in providing
reliable delivery services. Transmission Control Protocol (TCP) ensures reliable and
efficient data transmission over the internet. What is Transmission Control Protocol
(TCP)?
Transmission Control Protocol (TCP) is a connection-oriented protocol for
communications that helps in the exchange of messages between different devices over a
network. The Internet Protocol (IP), which establishes the technique for sending data
packets between computers, works with TCP.
The position of TCP is at the transport layer of the OSI model. TCP also helps in ensuring
that information is transmitted accurately by establishing a virtual connection between the
sender and receiver.
Working of Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) model breaks down the data into small bundles and
afterward reassembles the bundles into the original message on the opposite end to make
sure that each message reaches its target location intact. Sending the information in little
bundles of information makes it simpler to maintain efficiency as opposed to sending
everything in one go.
Features of TCP/IP
Some of the most prominent features of Transmission control protocol are mentioned
below.
Segment Numbering System: TCP keeps track of the segments being
transmitted or received by assigning numbers to each and every single one
of them..
Connection Oriented: It means sender and receiver are connected to each
other till the completion of the process.
Full Duplex: In TCP data can be transmitted from receiver to the sender or
vice – versa at the same time
Flow Control
Error Control
Congestion Control
Advantages of TCP
It is a reliable protocol.
It provides an error-checking mechanism as well as one for recovery.
It gives flow control.
It makes sure that the data reaches the proper destination in the exact order that
it was sent.
Open Protocol, not owned by any organization or individual.
It assigns an IP address to each computer on the network and a domain name to
each site thus making each device site to be distinguishable over the network.
Disadvantages of TCP
TCP is made for Wide Area Networks, thus its size can become an issue for
small networks with low resources.
TCP runs several layers so it can slow down the speed of the network.
It is not generic in nature. Meaning, it cannot represent any protocol stack other
than the TCP/IP suite. E.g., it cannot work with a Bluetooth connection.
No modifications since their development around 30 years ago.
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet
Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and
connectionless protocol. So, there is no need to establish a connection before data
transfer. The UDP helps to establish low-latency and loss-tolerating connections over the
network. The UDP enables process-to-process communication.
What is User Datagram Protocol?
User Datagram Protocol (UDP) is one of the core protocols of the Internet Protocol (IP) suite.
It is a communication protocol used across the internet for time-sensitive transmissions such
as video playback or DNS lookups. Unlike Transmission Control Protocol (TCP), UDP is
connectionless and does not guarantee delivery, order, or error checking, making it a
lightweight and efficient option for certain types of data transmission.
UDP Header
UDP header is an 8-byte fixed and simple header, while for TCP it may vary from 20 bytes
to 60 bytes. The first 8 Bytes contain all necessary header information and the remaining
part consists of data. UDP port number fields are each 16 bits long, therefore the range for
port numbers is defined from 0 to 65535; port number 0 is reserved. Port numbers help to
distinguish different user requests or processes.
Source Port: Source Port is a 2 Byte long field used to identify the port
number of the source.
Destination Port: It is a 2 Byte long field, used to identify the port of the
destined packet.
Length: Length is the length of UDP including the header and the data. It is a
16-bits field.
Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement of
the one’s complement sum of the UDP header, the pseudo-header of information
from the IP header, and the data, padded with zero octets at the end (if
necessary) to make a multiple of two octets.
Applications of UDP
Used for simple request-response communication when the size of data is less
and hence there is lesser concern about flow and error control.
It is a suitable protocol for multicasting as UDP supports packet switching.
Effects of Congestion
As delay increases, performance decreases.
If delay increases, retransmission occurs, making situation worse.
Imagine a bucket with a small hole in the bottom.No matter at what rate water enters the
bucket, the outflow is at constant rate.When the bucket is full with water additional water
entering spills over the sides and is lost.
Similarly, each network interface contains a leaky bucket and the following steps are
involved in leaky bucket algorithm:
1. When host wants to send packet, packet is thrown into the bucket.
2. The bucket leaks at a constant rate, meaning the network interface transmits
packets at a constant rate.
3. Bursty traffic is converted to a uniform traffic by the leaky bucket.
4. In practice the bucket is a finite queue that outputs at a finite rate.
Token bucket Algorithm
The leaky bucket algorithm has a rigid output design at an average rate
independent of the bursty traffic.
In some applications, when large bursts arrive, the output is allowed to speed up.
This calls for a more flexible algorithm, preferably one that never loses
information. Therefore, a token bucket algorithm finds its uses in network traffic
shaping or rate-limiting.
It is a control algorithm that indicates when traffic should be sent. This order
comes based on the display of tokens in the bucket.
The bucket contains tokens. Each of the tokens defines a packet of predetermined
size. Tokens in the bucket are deleted for the ability to share a packet.
When tokens are shown, a flow to transmit traffic appears in the display of tokens.
No token means no flow sends its packets. Hence, a flow transfers traffic up to its
peak burst rate in good tokens in the bucket.
Domain Name System (DNS) in Application Layer
Last Updated : 07 May, 2024
Domain Name System (DNS) is a hostname for IP address translation service. DNS is
a distributed database implemented in a hierarchy of name servers. It is an application layer
protocol for message exchange between clients and servers. It is required for the functioning
of the Internet.
What is the Need of DNS?
Every host is identified by the IP address but remembering numbers is very difficult for
people also the IP addresses are not static therefore a mapping is required to change the
domain name to the IP address. So DNS is used to convert the domain name of the websites
to their numerical IP address.
Types of Domain
There are various kinds of domain:
1. Generic
domains: .com(commercial), .edu(educational), .mil(military), .org(nonprofit
organization), .net(similar to commercial) all these are generic domains.
2. Country domain: .in (India) .us .uk
3. Inverse domain: if we want to know what is the domain name of the website. Ip
to domain name mapping. So DNS can provide both the mapping for example to
find the IP addresses of geeksforgeeks.org then we have to type
Types of DNS
Organization of Domain
It is very difficult to find out the IP address associated with a website because there are
millions of websites and with all those websites we should be able to generate the IP address
immediately, there should not be a lot of delays for that to happen organization of the
database is very important.
DNS record: Domain name, IP address what is the validity? what is the time to
live? and all the information related to that domain name. These records are stored
in a tree-like structure.
Namespace: Set of possible names, flat or hierarchical. The naming system
maintains a collection of bindings of names to values – given a name, a resolution
mechanism returns the corresponding value.
Name server: It is an implementation of the resolution mechanism.
DNS = Name service in Internet – A zone is an administrative unit, and a domain is a
subtree.
Domain Name Server
The client machine sends a request to the local name server, which, if the root does not find
the address in its database, sends a request to the root name server, which in turn, will route
the query to a top-level domain (TLD) or authoritative name server. The root name server
can also contain some hostName to IP address mappings.
DNS Servers Involved in Loading a Webpage
Upon loading the webpage, several DNS Servers are responsible for translating the domain
name into the corresponding IP Address of the web server hosting the website. Here is the
list of main DNS servers involved in loading a Webpage.
Local DNS Resolver
Root DNS Servers
Top-Level Domain (TLD) DNS Servers
Authoritative DNS Servers
Web Server
Types of DNS Queries
There are basically three types of DNS Queries that occur in DNS Lookup. These are stated
below.
Recursive Query: In this query, if the resolver is unable to find the record, in
that case, DNS client wants the DNS Server will respond to the client in any way
like with the requested source record or an error message.
Iterative Query: Iterative Query is the query in which DNS Client wants the
best answer possible from the DNS Server.
Non-Recursive Query: Non-Recursive Query is the query that occurs when a
DNS Resolver queries a DNS Server for some record that has access to it
because of the record that exists in its cache
Simple Mail Transfer Protocol (SMTP)
Email is emerging as one of the most valuable services on the internet today. Most internet
systems use SMTP as a method to transfer mail from one user to another. SMTP is a push
protocol and is used to send the mail whereas POP (post office protocol) or IMAP (internet
message access protocol) is used to retrieve those emails at the receiver’s side.
What is Simple Mail Transfer Protocol?
SMTP is an application layer protocol. The client who wants to send the mail opens
a TCP connection to the SMTP server and then sends the mail across the connection. The
SMTP server is an always-on listening mode. As soon as it listens for a TCP connection from
any client, the SMTP process initiates a connection through port 25. After successfully
establishing a TCP connection the client process sends the mail instantly.
SMTP Protocol
The SMTP model is of two types:
End-to-End Method
Store-and-Forward Method
Components of SMTP
Mail User Agent (MUA): It is a computer application that helps you in sending
and retrieving mail. It is responsible for creating email messages for transfer to
the mail transfer agent(MTA).
Mail Submission Agent (MSA): It is a computer program that receives mail
from a Mail User Agent(MUA) and interacts with the Mail Transfer
Agent(MTA) for the transfer of the mail.
Mail Transfer Agent (MTA): It is software that has the work to transfer mail
from one system to another with the help of SMTP.
Mail Delivery Agent (MDA): A mail Delivery agent or Local Delivery Agent is
basically a system that helps in the delivery of mail to the local system.
Working of SMTP
2. SNMP agent –
It is a software management software module installed on a managed
device. The manager accesses the values stored in the database, whereas the
agent maintains the information in the database. To ascertain if the router is
congested or not, for instance, a manager can examine the relevant variables that
a router stores, such as the quantity of packets received and transmitted.
3. Management Information Base –
MIB consists of information on resources that are to be managed. This
information is organized hierarchically. It consists of objects instances which are
essentially variables. A MIB, or collection of all the objects under management
by the manager, is unique to each agent. System, interface, address translation,
IP, udp, and egp , icmp, tcp are the eight categories that make up MIB. The mib
object is home to these groups.
1. noAuthNoPriv –
This (no authentication, no privacy) security level uses a community string for
authentication and no encryption for privacy.
3. authPriv – This security level (authentication, privacy) uses HMAC with Md5
or SHA for authentication and encryption uses the DES-56 algorithm.
SNMP messages
GetNextRequest : To get the value of a variable, the manager sends the agent
the GetNextRequest message. The values of the entries in a table are retrieved
using this kind of communication. The manager won’t be able to access the
values if it doesn’t know the entries’ indices. The GetNextRequest message is
used to define an object in certain circumstances.
Response : When sent in response to the Set message, it will contain the newly
set value as confirmation that the value has been set.
Trap : These are the message sent by the agent without being requested by the
manager. It is sent when a fault has occurred.
Versions of SNMP
There are three versions of SNMP including the below ones:
1. SNMPv1 –
It uses community strings for authentication and uses UDP only. SNMPv1 is the
first version of the protocol. It is described in RFCs 1155 and 1157 and is simple
to set up.
2. SNMPv2c –
It uses community strings for authentication. It uses UDP but can be configured
to use TCP.
3.SNMPv3 –
It uses Hash-based MAC with MD5 or SHA for authentication and DES-56 for
privacy. This version uses TCP. Therefore, the conclusion is the higher the version
of SNMP, the more secure it will be.
Advantages of SNMP
1. It is simple to implement.
2. Agents are widely implemented.
3. Agent level overhead is minimal.
4. It is robust and extensible.
5. Polling approach is good for LAN based managed object.
6. It offers the best direct manager agent interface.
7. SNMP meet a critical need.
Limitation of SNMP
1. It is too simple and does not scale well.
2. There is no object orietned data view.
3. It has no standard control definition.
4. It has many implementation specific (private MIB) extensions.
5. It has high communication overhead due to polling
Email Protocols
Email protocols are a collection of protocols that are used to send and receive emails
properly. The email protocols provide the ability for the client to transmit the mail to or from
the intended mail server. Email protocols are a set of commands for sharing mails between
two computers. Email protocols establish communication between the sender and receiver for
the transmission of email. Email forwarding includes components like two computers sending
and receiving emails and the mail server. There are three basic types of email protocols.
Three basic types of email protocols involved for sending and receiving mails are:
SMTP
POP3
IMAP
SMTP (Simple Mail Transfer Protocol):
Simple Mail Transfer Protocol is used to send mails over the internet. SMTP is an application
layer and connection-oriented protocol. SMTP is efficient and reliable for sending emails.
SMTP uses TCP as the transport layer protocol. It handles the sending and receiving of
messages between email servers over a TCP/IP network. This protocol along with sending
emails also provides the feature of notification for incoming mails. When a sender sends an
email then the sender’s mail client sends it to the sender’s mail server and then it is sent to the
receiver mail server through SMTP. SMTP commands are used to identify the sender and
receiver email addresses along with the message to be sent.
Some of the SMTP commands are HELLO, MAIL FROM, RCPT TO, DATA, QUIT,
VERIFY, SIZE, etc. SMTP sends an error message if the mail is not delivered to the receiver
hence, reliable protocol.
For more details please refer to the Simple Mail Transfer Protocol (SMTP) article.
Post Office Protocol is used to retrieve email for a single client. POP3 version is the current
version of POP used. It is an application layer protocol. It allows to access mail offline and
thus, needs less internet time. To access the message it has to be downloaded. POP allows
only a single mailbox to be created on the mail server. POP does not allow search facilities
Some of the POP commands are LOG IN, STAT, LIST, RETR, DELE, RSET, and QUIT.
For more details please refer to the POP Full-Form article.
Internet Message Access Protocol is used to retrieve mails for multiple clients. There are
several IMAP versions: IMAP, IMAP2, IMAP3, IMAP4, etc. IMAP is an application layer
protocol. IMAP allows to access email without downloading them and also supports email
download. The emails are maintained by the remote server. It enables all email operations
such as creating, manipulating, delete the email without reading it. IMAP allows you to
search emails. It allows multiple mailboxes to be created on multiple mail servers and allows
concurrent access. Some of the IMAP commands are: IMAP_LOGIN, CREATE, DELETE,
RENAME, SELECT, EXAMINE, and LOGOUT.
For more details please refer to the Internet Message Access Protocol (IMAP) article.
Multipurpose Internet Mail Extension Protocol is an additional email protocol that allows
non-ASCII data to be sent through SMTP. It allows users to send and receive different types
of data like audio, images, videos and other application programs on the Internet. It allows to
send multiple attachments with single message. It allows to send message of unlimited
length.