In pure ALOHA, the time of transmission is continuous. Whenever a station has an available frame, it sends the frame.If there is collision and the frame is destroyed, the sender waits for a random amount of time before retransmitting it.
Working Principle: After transmitting a frame, a station waits for a finite period of time to receive an acknowledgement.If the acknowledgement is not received within this time,the station assumes that the frame has been destroyed due to collision and resends the frame.A collision occurs if more than one frame tries to occupy the channel at the same time.
Slotted ALOHA was introduced in 1972 by Robert as an improvement over pure ALOHA. Here, time is divided into discrete intervals called slots, corresponding to a frame.
Working Principle: AThe communicating stations agree upon the slot boundaries. Any station can send only one frame at each slot. Also, the stations cannot transmit at any time whenever a frame is available. They should wait for the beginning of the next slot.However, there still can be collisions. If more than one frame transmits at the beginning of a slot, collisions occur. The collision duration is 1 slot.
The TCP/IP model is a concise version of the OSI model.
It contains four layers, unlike seven layers in the OSI model. The layers are:
Process/Application Layer
Host-to-Host/Transport Layer
Internet Layer
Network Access/Link Layer
TCP/IP follows a horizontal approach. Transport layer in TCP/IP does not provide assurance delivery of packets.
1. Network Access Layer –
This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI model. It looks out for hardware addressing and the protocols present in this layer allows for the physical transmission of data.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are responsible for logical transmission of data over the entire network. The main protocols residing at this layer are :
IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the destination host by looking at the IP addresses in the packet headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing as the number of IPv4 addresses are limited in number when compared to the number of users.
ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible for providing hosts with information about network problems.
ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end communication and error-free delivery of data. It shields the upper-layer applications from the complexities of data.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe.
1. Physical Layer (Layer 1):
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical connection between the devices.
2. Data Link Layer (DLL) (Layer 2) :
The data link layer is responsible for the node to node delivery of the message. The main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer. When a packet arrives in a network, it is the responsibility of DLL to transmit it to the Host using its MAC address.
A communications network access method that uses a continuously repeating frame (the token) that is transmitted onto the network by the controlling computer. When a terminal or computer wants to send a message, it waits for an empty token that it fills with the address of the destination station and some or all of its message.
Every node on the network constantly monitors the passing tokens to determine if it is a recipient of a message, in which case it "grabs" the message and resets the token status to empty. Token passing uses bus and ring topologies.
In a computer network, data communication occurs through layers of architecture (OSI or TCP/IP). In these models, Data goes through the layers by layer. Data encapsulation is required when we send the data from a source computer to the destination computer. The reverse process of encapsulation (or decapsulation) occurs when data is received on the destination computer(incoming transmission). Data Encapsulation and Decapsulation at sending and receiving end respectively.
Multiplexing and Demultiplexing services are provided in almost every protocol architecture ever designed. UDP and TCP perform the demultiplexing and multiplexing jobs by including two special fields in the segment headers: the source port number field and the destination port number field.
Multiplexing –
Gathering data from multiple application processes of sender, enveloping that data with header and sending them as a whole to the intended receiver is called as multiplexing.
Demultiplexing –
Delivering received segments at receiver side to the correct app layer processes is called as demultiplexing.
A protocol protocol is a set of rules and formats that govern the is a set of rules and formats that govern the communication between communicating peers communication between communicating peers. ◆ set of valid messages set of valid messages ◆ meaning of each message meaning of each message ■ A protocol is necessary for any function that requires A protocol is necessary for any function that requires cooperation between peers cooperation between peers
What does a protocol tell us? ■ Syntax of a message of a message ■ Semantics of a message ■ Actions to take on receipt of a message ◆ for example, on receiving not-OK message, retransmit the entire file
Protocol layering ■ A network that provides many services needs many protocols. ■ Protocol A may use protocol B as a step in its execution. ■ This form of dependency is called layering
Analog and digital signals are the types of signals carrying information. The major difference between both signals is that the analog signals have continuous electrical signals, while digital signals have non-continuous electrical signals.
Analog Signals
The analog signals were used in many systems to produce signals to carry information. These signals are continuous in both values and time. The use of analog signals has been declined with the arrival of digital signals. In short, to understand the analog signals – all signals that are natural or come naturally are analog signals.
Digital Signals
Unlike analog signals, digital signals are not continuous, but signals are discrete in value and time. These signals are represented by binary numbers and consist of different voltage values.
Types of Topology
There are five types of topology in computer networks:
1. Mesh Topology: In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only.
2. Star Topology: In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device.
3. Bus Topology: In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable can have.
4. Ring Topology: In ring topology each device is connected with the two devices on either side of it. There are two dedicated point to point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as ring topology. If a device wants to send data to another device then it sends the data in one direction, each device in ring topology has a repeater, if the received data is intended for other device then repeater forwards this data until the intended device receives it.
5. Hybrid Topology: A combination of two or more topology is known as hybrid topology. For example a combination of star and mesh topology is known as hybrid topology.