Professional Documents
Culture Documents
Course CO504.1: To describe the terminology and concepts of the OSI reference model and
Outcom TCP/IP reference model alongwith hardware and software components and their
e interrelations.
CO504.2: Describe, analyze and compare datalink, network and transport layer
protocol, algorithms and techniques.
CO504.6: Communicate technical, ethical, social information related to computer
networking .
Program PO1: Apply the knowledge of mathematics, science, engineering, fundamentals, and an
Outcom engineering specialization to the solution of complex engineering problem.
e
P10: Communicate effectively on complex engineering activities with the engineering
community and with society as large, such as, being able to comprehend and write
effective reports and design documentations, make effective presentation, and give and
receive clear instructions.
Bloom's Remember
Taxono
my Level Apply
Advantage of p-persistent
• It reduces the chance of collision and improves the efficiency of the
network.
2. Start Frame Delimiter (SFD): It is one byte field with unique pattern:
10 10 1011. It marks the beginning of frame.
3. Destination Address (DA): It is six byte field that contains physical
address of packet's destination.
4. Source Address (SA): It is also a six byte field and contains the
physical address of source or last device to forward the packet (most
recent router to receiver).
5. Length: This two byte field specifies the length or number of bytes in
data field.
6. Data: It can be of 46 to 1500 bytes, depending upon the type of
frame and the length of the information field.
7. Frame Check Sequence (FCS): This for byte field contains CRC for
error detection.
CSMA/CD Procedure:
Fig. Shows a flow chart for the CSMA/CD protocol.
Explanation:
The station that has a ready frame sets the back off parameter to zero.
• Then it senses the line using one of the persistent strategies.
• If then sends the frame. If there is no collision for a period
corresponding to one complete frame, then the transmission is
successful.
• Otherwise the station sends the jam signal to inform the other
stations about the collision.
• The station then increments the back off time and waits for a random
back off time and sends the frame again.
• If the back off has reached its limit then the station aborts the
transmission.
• CSMA/CD is used for the traditional Ethernet.
• CSMA/CD is an important protocol. IEEE 802.3 (Ethernet) is an
example of CSMNCD. It is an international standard.
• The MAC sublayer protocol does not guarantee reliable delivery.
Even in absence of collision the receiver may not have copied the
frame correctly.
The format of an ICMP message is shown above. The 8-bit type code
identifies the types of message. This is followed by at least the first 28
bytes of the packet that resulted in generation of the error message
(i.e. the network-layer header and first 8 bytes of transport header).
This payload is, for instance used by a sender that receives the ICMP
message to perform Path MTU Discovery so that it may determine IP
destination address of the packet that resulted in the error. Longer
payloads are also encouraged (which can help better identify the
reason why the ICMP message was generated and which program
generated the original packet).
An example:
>traceroute bbc.co.uk traceroute to bbc.co.uk
(212.58.224.131), 64 hops max, 40 byte packets
1 10.10.10.1 (10.10.10.1) 51.940 ms 18.491 ms 1.260 ms
2 lo0-plusnet.ptn-ag2.plus.net (195.166.128.53) 49.263 ms
55.061 ms 53.525 ms
3 ge1-0-0-204.ptn-gw2.plus.net (84.92.3.106) 139.647 ms 52.525
ms 127.196 ms
4 gi1-1-22.ptn-gw5.plus.net (212.159.4.6) 76.505 ms 57.524 ms
52.404 ms
5 rt0.thdo.bbc.co.uk (212.58.239.25) 89.200 ms 49.666 ms
144.629 ms
6 212.58.238.133 (212.58.238.133) 48.786 ms 68.650 ms 51.599
ms
If a policy dictates that the packet rate cannot exceed a specified rate
even though the network node's access rates might be higher, a
mechanism is needed to smooth out the rate of traffic flow. If different
traffic rates are applied to a network node, the traffic flow needs to be
regulated. (Monitoring the traffic flow is called traffic policing.) Traffic
shaping also prevents packet loss by preventing the sudden increased
usage of system bandwidth. The stochastic model of a traffic shaper
consists of a system that converts any form of traffic to a deterministic
one. Two of the most popular traffic-shaping algorithms are leaky
bucket and token bucket.
When too many packets are present in (a part of) the subnet,
performance degrades. This situation is called congestion.
Leaky Bucket
Figure : Leaky Bucket Algorithm
1. Flag field: Flag field marks the beginning and end of the PPP frame.
Flag byte is 01111110. (1 byte).
2. Address field: This field is of 1 byte and is always 11111111. This
address is the broadcast address i.e. all the stations accept this
frame.
3. Control field: This field is also of 1 byte. This field uses the format of
the U-frame (unnumbered) in HDLC. The value is always 00000011 to
show that the frame does not contain any sequence numbers and
there is no flow control or error control.
4. Protocol field: This field specifies the kind of packet in the data
field i.e. what is being carried in data field.
5. Data field: Its length is variable. If the length is not negotiated using
LCP during line set up, a default length of 1500 bytes is used. It carries
user data or other information.
6. FCS field: The frame checks sequence. It is either of 2 bytes or 4
bytes. It contains the checksum.
Ø Session layer
Ø Presentation layer
Ø Application layer
Parity bits are a simple approach for the detection of errors. A parity
bit is an extra bit sent with the data that is simply the 1-bit sum of the
data. The receiver adds up the data bits compares the sum bit with the
parity bit. If they don’t match, the data (or the parity bit itself) was
corrupted somewhere along the way.
Error Correction
Referen 1. B.A. Forouzan, “Data Communications and Networking”, TMH, Fourth Edition.
2. Write the name of websites referred.
ces:
http://ecomputernotes.com/computernetworkingnotes/services-and-
applications/what-is-telnet
https://www.quora.com/What-is-the-difference-between-error-correction-
and-detection
http://www.studytonight.com/computer-networks/osi-model-datalink-layer
http://engineeringinterviewquestions.com/layers-user-support-layers/