Posts

Showing posts from October, 2025

IPv4 ADDRESSES

Image
  IPv4 ADDRESSES-  An IPv4addressis a 32-bitaddress that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.  IPv4 addresses are unique. They are unique in the sense that each address defines one, and only one, connection to the Internet. Two devices on the Internet can never have the same address at the same time. We will see later that, by using some strategies, an address may be assigned to a device for a time period and then taken away and assigned to another device. Address Space  - A protocol such as IPv4 that defines addresses has an address space. An address space is the total number of addresses used by the protocol. Ifa protocol uses N bits to define an address, the address space is 2N because each bit can have two different values (0 or 1) and N bits can have 2N values. IPv4 uses 32-bit addresses, which means that the address space is 232 or 4,294,967,296 (more than 4 billion). This m...

Switching

Image
Switching- A network is a set of connected devices. Whenever we have multiple devices, we have the problem of how to connect them to make one-to-one communication possible. One solution is to make a point-to-point connection between each pair of devices (a mesh topology) or between a central device and every other device (a star topology). These methods, however, are impractical and wasteful when applied to very large networks. A better solution is switching. A switched network consists of a series of interlinked nodes, called switches. Switches are devices capable of creating temporary connections between two or more devices linked to the switch. In a switched network, some of these nodes are connected to the end systems (computers or telephones, for example). Others are used only for routing. The end systems (communicating devices) are labeled A, B, C, D, and so on, and the switches are labeled I, II, III, IV, and V. Each switch is connected to multiple links. Traditionally...

CONTROLLED ACCESS

Image
  CONTROLLED ACCESS-  In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. We discuss three popular controlled-access methods.   Reservation  In the reservation method, a station needs to make a reservation before sending data. Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval.     CHANNELIZATION-  Channelization is a multiple-access method in which the available bandwidth ofa link is shared in time, frequency, or through code, between different stations. In this section, we discuss three channelization protocols: FDMA, TDMA, and CDMA. Frequency-Division Multiple Access (FDMA) -  In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. In other words, ea...

Channel Allocation Protocols:

Image
Channel Allocation Protocols:  When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. ALOHA - ALOHA, the earliest random-access method, was developed at the University of Hawaii in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any shared medium. It is obvious that there are potential collisions in this arrangement. The medium is shared between the stations. When a station sends data, another station may attempt to do so at the same time. The data from the two stations collide and become garbled.   Pure ALOHA - The original ALOHA protocol is called pure ALOHA. This is a simple, but elegant protocol. The idea is that each station sends a frame whenever it has a frame to send. However, since there is only one channel to share, there is the possibility of collision between frames from different stations.  It is obvious ...

Go-Back-N Automatic Repeat Request

Image
Go-Back-N Automatic Repeat Request  To improve the efficiency of transmission (filling the pipe), multiple frames must be in transition while waiting for acknowledgement.In Go-Back-N Automatic Repeat Request send several frames before receiving acknowledgement; we keep a copy of these frames until the acknowledgement arrive. Sequence Numbers Frames from a sending station are numbered sequentially. However, because we need to include the sequence number of each frame in the header, we need to set a limit. If the header of the frame allows m bits for the sequence number, the sequence numbers range from 0 to 2 power m - 1. For example, if m is 4, the only sequence numbers are 0 through 15 inclusive. However, we can repeat the sequence. So the sequence numbers are 0, 1,2,3,4,5,6, 7,8,9, 10, 11, 12, 13, 14, 15,0, 1,2,3,4,5,6,7,8,9,10, 11, ... Sliding Window- In this protocol, the sliding window is an abstract concept that defines the range of sequence numbers that is the concern of the ...