Showing posts with label Network Concept. Show all posts
Showing posts with label Network Concept. Show all posts

Networking | Inter Networking Concept

📌Highlights: Hi friends ! In this post we will discuss about the concept of inter-networking. This post include the concept of following things such as about Repeater, about Bridges, about Routers, about Gateways, about Protocol converter.


To connect two or more network together is called inter networking. If two network are inter connected than they must use same protocol.


For inter networking following devices are used:

1. Repeater.

2. Bridge.

3. Router.

4. Gateway.

5. Protocol Converter.

Computer Network | Routing and Routing Algorithms | Part-I

📌Highlights: Hi friends ! In this post I will discuss about the concept of adaptive routing in computer network including how many type of routing and concept of algorithm in routing.We are going to explain about following algorithm such as Isolated routing algorithm, Centralised routing algorithm, Distributed routing algorithm (such as: Bellman-ford algorithm / Distance vector routing algorithm / Ford-Fulkerson algorithm,Flloyd warshall Algorithm / All pair shortest path algorithm,Hierarchical Routing Algorithm, Link State Routing Algorithm,Broad Casting Routing Algorithm,Multi Casting Algorithm.


Routing is a process of selecting appropriate route for transferring data. The mechanism inside the router by which routing process is done is called routing algorithm.


Routing is classified into two parts:

1. Adaptive Routing.

2. Non Adaptive Routing.

COMPUTER NETWORK | CONGESTION CONTROL ALGORITHMS



📌Highlights: Hi friends ! In this post we will discuss about Congestion Control Algorithms such as, Pre-allocation of buffer, Scheme of packet discarding, Flow control, Congestion control by token bucket / Isarithm control, Congestion control by choke packet, Congestion control by leaky bucket, Token bucket.

Let we discuss about Congestion Control Algorithms which is used to control the congestion.

1. Pre-Allocation of buffer :

It is a prevention scheme. It is for virtual circuit subnet.

COMPUTER NETWORK | CONGESTION CONTROL


📌Highlights: Hi friends, In this post we will discuss about congestion control, What is congestion control,capacity of subnet,how to handle congestion. 

If each node send message with maximum rate than subnet are not able to carry message and generate congestion (traffic problem).

For Example, If subnet has capacity to carry only 100 messages. But the incoming message will we more than 100 than congestion control is needed.

Subnet is not design in the term of maximum number of delivery.

Capacity of subnet depend on following parameters:

1. Bandwidth of communication channel.

2. Number of buffer in various IMP's .

3. Speed of processor in IMP's.(The processing capacity of the processor used in different IMP's in packet/sec)


Now the graph will be:



Let we understand the above figure suppose here 100 packet/sec will be the subnet capacity that means subnet can hold 100 packet/sec.If subnet will receive 100 packet/sec and it also deliver 100 packet/sec than we get ideal curve as show in the above figure. But if we increase delivery rate more than 100 packet/sec to subnet than congestion / traffic will increase and the curve will go towards down.

Suppose if subnet received 150 packet / sec , than it is possible that subnet will deliver only 60 packet / sec due to congestion / traffic.In this way we can say that if we increase packet rate more than subnet capacity than delivery rate will decrease and not proper channel utilisation done. In this case received curve is called real curve.


For handling the congestion:

1. Congestion Prevention.

2. Congestion Avoidance

3. Congestion Recovery

Congestion Prevention:

In this scheme once we remove congestion than it will never occur.

(It is just like vaccination taken by any child once in a life and it will protect whole life.)

Congestion Avoidance:

In this scheme we continuously sense the channel whether congestion occur or not through any parameter like (monitor) and remove it.

Congestion Recovery:

In this scheme recovery will done after congestion occur. 

This is all about the introduction of congestion control i hope it is useful for you this part-I. In part-II we will discuss about Congestion Control Algorithms.

Data Link Layer Protocols - Networking - Part II


📌Highlights: In this post we cover data link layer protocols such as One bit sliding window protocol, Go back 'n' protocol, Selective repeat protocol and also cover problems arise with these protocols, We also discuss about there solution. We explain with the help of diagrams so that it is easily understandable.

Refer Data link Protocol #1,#2,#3

Protocol #4 : One bit sliding window protocol :

Features:

1. Data traffic is duplex hence concept of piggybacking is used.

2. Channel is noisy.

3. Both sender and receiver has one buffer each.

4. Receiver has finite and limited processing speed.

Note: Why this protocols is known as sliding window?

Data Link Layer Protocols - Networking - Part-I

📌Highlights: In this post we cover data link layer protocols such as Unrestricted Simplex Protocol  OR Unrestricted Utopia protocol, Stop and wait protocol, Stop and wait protocol for noisy channel and also cover problems arise with these protocols, We also discuss about there solution. We explain with the help of diagrams so that it is easily understandable.

Protocol #1 : Unrestricted Simplex Protocol  OR Unrestricted Utopia protocol.

Features:

1. Data traffic is simplex.

2. Channel is Noise free.

3. Both sander and receiver have infinite amount of buffer.

4. Both sander and receiver have infinite processing speed.

CYCLIC REDUNDANCY CHECK (CRC) -NETWORKING


 Today we will discuss about the technique to find  sequence of redundant bit in any  message. Cyclic Redundancy Checker technique  is used to detecting redundant bit. Let we  know more about CRC (Cyclic Redundancy Checker technique).

HOW TO DETECT ERROR ! USING OSI MODEL - NETWORKING


⧭ In this post , I will discuss about how to detect error while sending message. Network layer send the data in the form of packet between sender and receiver.



➧ Suppose network layer send data in the form of packet such as:

1110  11110 111110 1111110 : packet


This packet is than received by DLL. It is responsibility of DLL that controlling the error and send the message to network layer of receiver end.

Carrier Sense Multiple Access (CSMA) / Collision Detection (CD) - NETWORKING


📌Highlights: Hello Friends ! in this post we discuss about Carrier Sense Multiple Access (CSMA) / Collision Detection (CD), CSMA/CD protocol.In this post we covered about Non persistent CSMA protocol, about One Persistent CSMA protocol, about P - Persistence CSMA protocol, how channel  can detect collision.

FIND MEAN NUMBER OF FRAME REQUIRED TO ATTEMPT A FRAME IN ALOHA - NETWORKING

 


Let Pk is the probability that exactly K attempts are required to transmit a frame.

Pk = ( 1- e-G )k-1 . ( e-G )1

( 1- e-G )k-1 is Probability of failure

( e-G )1  is Probability of failure    

Excepted number of attempt

E = eG

 Where: G is load, E    is exponential load


NOTE: Number of attempt will reduce if load is less.

 

FINITE POPULATION ALOHA  / SLOTTED ALOHA

There are N number of station are compiling for a single channel SLOTTED ALOHA channel.

Gi : It is a load shared by the station I, that means number of frame including new entry transmission transmitted by station is per frame time) / It is probability that station ( I ) will transmit in a particular slot.

Si : Throughput shared by a station ( I ), that means probability that particular station I will transmit successful.

OR

Mean / average number of successful transmission per frame time by station (i).

Si = Gi   (1 – G1) (1 –G2) ---------- (1 – GN)        



 Let the channel load is G

G = G1 + G2 + G3 + ----------- + GN

ASSUME :

G = G1 + G2 + G3 + ----------- + GN

Load shared by all station are equal than.

G = N . Gi

Gi = G / N

Let the throughput of the channel is S

S = S1 + S2 + S3 + ----------- + SN

ASSUME :

S1 = S2+ S2 + S3 + ----------- + SN

Si = S /N

than


Put  Si =  S/N   ,   Gi =  G/N

S/N  =  G/N ( 1 - G/N )N-1

S =  G ( 1 - G/N )N-1

For infinite population ALOHA / Infinite slotted ALOHA

If N = infinite

S = G . e-G 

For what value of G , S will be  maximum.

If   G = 1 than

S will be maximum.


QUESTION: Consider the delay of PURE ALOHA  and SLOTTED ALOHA.


ANSWER: We can measure ALOHA by two parameters.

1. Delay

2. Throughput / Efficiency / Utilisation             

Delay can be compared in the case of extreme load due to some rules. Such as only one 

can be transmitted.

In PURE ALOHA delay = 0 , because when any sander make their message immediately 

they can able to send the message without waiting at time slot.

In SLOTTED ALOHA   we have to wait for one time slot.  This delay is due to rules

 ( such as only one can be transmit / we cannot transmit until previous are not completed)

RELATION BETWEEN PURE AND SLOTTED ALOHA IN NETWORKING - PART 2


PREVIOUS POST : WHAT IS ALOHA ? IN NETWORKING PART 1

Now in this post we understand about PURE ALOHA and SLOTTED ALOHA NUMERICALLY.

Some terminology is very important when we want to calculate following things regarding ALOHA.

1. PERCENTAGE OF SUCCESSFUL TRANSMISSION.

2. PERCENTAGE OF COLLISION IN CHANNEL.

3. CHANNEL UTILISATION.

4. EFFICIENCY OF ALOHA.


Before knowing about all above things we must know about following terms :


1. FRAME TIME:

Time required to transmit standard time frame.


2. CHANNEL LOAD (G) OR OFFERED LOAD :

Mean / average number of frames including new frame and re-transmitted frame per frame time.


3. THROUGHPUT (S) : (including only newly generated frame)

    Define 1: Mean number of newly generated frames per frame time.

    Define 2: mean number of successful transmission per unit time.

    S < = 1 [ This is because at a time only one frame is generated ]


There are basically three type of frame time.

A. SUCCESSFUL FRAME TIME :

    When one frame is transferred at a time.

B. COLLISION FRAME TIME :

    When at a time more than one frame is transmitted.

C. EMPTY FRAME :

    hen no any frame is transmitted.


RELATION BETWEEN S AND G:

    G : (NEW + TRANSMITTED FRAME)

    G >  1

    When S < = 1

    Therefore    S < = G

NOTE : Only after successful transmission new frame is generated.

YOU MUST REMEMBER ALL ABOVE TERMS


NOW WE WILL FIND THE EFFICIENCY OF ALOHA BY CALCULATING  PROBABILITY OF SUCCESSFUL TRANSMISSION (P) AND THROUGHPUT (S).


PURE ALOHA:

In pure ALOHA any time we can transmit the message.

Let the probability of success is P0

    S = G . P0

    Where ;    G = Channel load

                     S = Throughput



No one can transmit between two frame otherwise collision will occur.

therefore Vulnerable period= 2 frames.

Now as we know ; According to Poisson's formula (Markov chain model)

    Pn(t) =e-λt (λt)n / !n

Pn(t) : It is the probability that in time duration.

t       : There will be exactly (n) activity

λ      : Mean /Average no of activity per unit of time.


By this formula we can find out how many activity will perform in the next T time , If we know the average number of activity per unit of time.

IN THE CASE OF  PURE ALOHA :

    P0(2 frame time) = e-2G (2G)0 / !0

Probability of success is :

    P0 = e-2G 

Then the throughput is :    

    S = G . P0

     S = G .  e-2G

Then differentiation S with respect to G and equating to zero like:    

      ds/dg=0

      dS/dG=0

     dS/dG ⇒ G ( -2 ) e-2Ge-2G = 0
             ⇒ -2 G e-2G e-2G = 0
             ⇒ ( -2 G + 1 ) = 0
           ⇒ G = 1/2   → The value of G is on an average
For  G = 1/2  , S = maximum
Then the value S will be :

    Smax = (1/2) e-2x 1/2
               = 1/ 2e 
               = 0.184
    Smax = 0.184

So here only 18.4 %  is successful transmission and the other time is waste due to collision or ideal.

So here we can say that it is a poor utilisation of channel.


GRAPHICAL REPRESENTATION :



When sufficient Input is not given to channel then under loaded condition will occur.

        U = S / ( S + C + E )
        where : S is Success
                    C is Collision
                    E is Empty
In the case of overload collision will increase.
Here in 0.5 G the efficiency of ALOHA is 0.184.


SLOTTED ALOHA:
In slotted ALOHA we can transmit in time slot.

Let probability of success is P0.

    S = G . P0

Where :
               G = Channel load
               S = Throughput



Here if transmission start in 3.15 sec of frame time than it will complete in 3.20 sec of frame time and if any transmission want to start at 3.16 or 3.17 or 3.18 sec of frame time than it will only start after completion of previous transmission. i.e after 3.20 sec of frame time.

    Vulnerable period = One frame time.

Now as we know ; According to Poisson's formula (Markov chain model)

    Pn(t) =e-λt (λt)n / !n 

    Pn(t) : It is the probability that in time duration.

     t       : There will be exactly (n) activity

      Î»     : Mean /Average no of activity per unit of time.

Here : t =1 , Î» = G , n =0

Then put the value of t , Î» , n in above formula we get

        Pe-G  / 1
     Pe-G       i.e:  Probability of success )
      S = G. P0      ( i.e Throughput )

Differentiate with respect to  G and equating to zero.

        dS/dG ⇒ - G . e- G= 0

       dS/dG ⇒ - G . e- G  +  e- G = 0

Now we get  G = 1   on an average

For G = 1  ,   S will be maximum

Than the value of  Smax = G . e- G
                                                   = 1. e- 1
                                                    =1 / e
                                Smax  = 0.368

So here 36.8% is successful transmission which is more then PURE ALOHA

GRAPHICAL REPRESENTATION :


If  G < 1  Under loaded
If  G > 1  Over loaded

Now in this post it is very clear about PURE ALOHA AND SLOTTED ALOHA with derivation. By the help of derivation and formula we can find the efficiency of ALOHA.

We will meet in next post with Some numerical examples of ALOHA.

WHAT IS ALOHA ? IN NETWORKING | PART - I


 ALOHA  means Hello.

It is first professional channel.It gives the rule that how to share the channel.It is based on satellite based communication.

EXAMPLE:

LEO cover 8000 diameter of area.


Both Up link and Down link frequency are different.

By the help of above diagram we can easily understand Up link and Down link Frequency, When station A will send any message to Up means towards satellite than it use Up link frequency.

When any station B receive any message downward means from satellite to station than it uses down link frequency.

In ALOHA message is broad castes over the entire area but the message will receive  only destination station and other station are ignore it.

CONCEPT OF MESSAGE SWITCHING IN NETWORKING

 


Message Switching 

Message Switching is also Store and Forward type of Switching.A note (usually a special computer with a number of disks) receive a message store it until the appropriate route is free than send it.

Store and forward is considered a switching technique because their is no direct link between sender and receiver of a transmission. A message is send to the node along one path than routed along another to its destination. 

CONCEPT OF VIRTUAL CIRCUIT PACKET SWITCHING IN NETWORKING


VIRTUAL CIRCUIT PACKET SWITCHING

In this a single route is choose between sender and receive at the beginning of the session.When the data are sent , all packets of the transmission travel one after another along that route.

Today virtual circuit transmission is implemented in two formats:

✔ Switched Virtual Circuit (SVC)

 Permanent Virtual Circuit (PVC)

CONCEPT OF DATAGRAM & PACKET SWITCHING


DATAGRAM & PACKET SWITCHING

Now we will discuss about Datagram Packet Switching. It is one of the type of packet switching. In Datagram Packet Switching connection less scheme is used . In this scheme different packet can send through different path ,So sequencing is necessary. When the packets are send through different path than it is duty of transport layer to rearrange the packets before reaching at destination.

CONCEPT OF CIRCUIT SWITCHING IN NETWORKING


CIRCUIT SWITCHING

Circuit Switching is a connection oriented technique for establishing the connection. Suppose A first make connection request packet called control packet (CP), which contain following.

Switching Techniques in Computer Network


SWITCHING TECHNIQUE

In this post we will provide detail study about SWITCHING TECHNIQUE IN COMPUTER NETWORK. It is most prominent topic in networking.Most asking things are there,What is switching ? What are their different types ? How and where switching is used ? How it is implemented ? and soon So many question arise in our mind regarding switching. We will try to provide such a information so you can resolve our problems and understand in easy manner. I will provide some summary view about SWITCHING TECHNIQUES.

OSI Model


OSI - Means Open System Interconnection. It play important role in networking. OSI model contain rules which is follow by all system where system are connected in network. These rules are modules in seven layers. Such as Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.Each layer are responsible for different task and they follow some specify rules.