0% found this document useful (0 votes)
21 views30 pages

CN Unit5

The document discusses various types of network topologies, including bus, ring, star, tree, and mesh topologies, detailing their structures, advantages, and disadvantages. It also covers the IEEE 802 standards that facilitate networking by ensuring compatibility among different hardware. Additionally, it explains the Logical Link Control (LLC) sublayer's role in data transmission within the OSI model.

Uploaded by

krithikazest2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views30 pages

CN Unit5

The document discusses various types of network topologies, including bus, ring, star, tree, and mesh topologies, detailing their structures, advantages, and disadvantages. It also covers the IEEE 802 standards that facilitate networking by ensuring compatibility among different hardware. Additionally, it explains the Logical Link Control (LLC) sublayer's role in data transmission within the OSI model.

Uploaded by

krithikazest2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

UNIT-5

Network Topology

Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.

Types of Network Topology

Physical topology is the geometric representation of all the nodes in a network. There are
six types of network topology which are Bus Topology, Ring Topology, Tree Topology,
Star Topology, Mesh Topology, and Hybrid Topology.

1) Bus Topology

o The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.

o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.

o When a node wants to send a message over the network, it puts a message over
the network. All the stations available in the network will receive the message
whether it has been addressed or not.

o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.

o The configuration of a bus topology is quite simpler as compared to other


topologies.

o The backbone cable is considered as a "single lane" through which the message
is broadcast to all the stations.

o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).

CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling
the problems that occur when two nodes send the messages simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the data.
Therefore, it works on "recovery after the collision".

o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the
collision by checking whether the transmission media is busy or not. If busy, then
the sender waits until the media becomes idle. This technique effectively reduces
the possibility of the collision. It does not work on "recovery after the collision".

Advantages of Bus topology:

o Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is low.

o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-
based networks that support upto 10 Mbps.

o Familiar technology: Bus topology is a familiar technology as the installation and


troubleshooting techniques are well known, and hardware components are easily
available.

o Limited failure: A failure in one node will not have any effect on other nodes.

Disadvantages of Bus topology:

o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of
cabling.

o Difficult troubleshooting: It requires specialized test equipment to determine


the cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.

o Reconfiguration difficult: Adding new devices to the network would slow down
the network.

o Attenuation: Attenuation is a loss of signal leads to communication issues.


Repeaters are used to regenerate the signal.

2) Ring Topology

o Ring topology is like a bus topology, but with connected ends.

o The node that receives the message from the previous computer will retransmit
to the next node.

o The data flows in one direction, i.e., it is unidirectional.

o The data flows in a single loop continuously known as an endless loop.

o It has no terminated ends, i.e., each node is connected to other node and having no
termination point.

o The data in a ring topology flow in a clockwise direction.

o The most common access method of the ring topology is token passing.

o Token passing: It is a network access method in which token is passed


from one node to another node.

o Token: It is a frame that circulates around the network.


Working of Token passing

o A token moves around the network, and it is passed from computer to computer
until it reaches the destination.

o The sender modifies the token by putting the address along with the data.

o The data is passed from one device to another device until the destination address
matches. Once the token received by the destination device, then it sends the
acknowledgment to the sender.

o In a ring topology, a token is used as a carrier.

Advantages of Ring topology:

o Network Management: Faulty devices can be removed from the network without
bringing the network down.

o Product availability: Many hardware and software tools for network operation
and monitoring are available.

o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the
installation cost is very low.

o Reliable: It is a more reliable network because the communication system is not


dependent on the single host computer.

Disadvantages of Ring topology:

o Difficult troubleshooting: It requires specialized test equipment to determine


the cable faults. If any fault occurs in the cable, then it would disrupt the
communication for all the nodes.

o Failure: The breakdown in one station leads to the failure of the overall network.

o Reconfiguration difficult: Adding new devices to the network would slow down
the network.

o Delay: Communication delay is directly proportional to the number of nodes.


Adding new devices increases the communication delay.
3) Star Topology

o Star topology is an arrangement of the network in which every node is connected


to the central hub, switch or a central computer.

o The central computer is known as a server, and the peripheral devices attached
to the server are known as clients.

o Coaxial cable or RJ-45 cables are used to connect the computers.

o Hubs or Switches are mainly used as connection devices in a physical star


topology.

o Star topology is the most popular topology in network implementation.

Advantages of Star topology

o Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as


compared to bus topology. In a bus topology, the manager has to inspect the
kilometers of cable. In a star topology, all the stations are connected to the
centralized network. Therefore, the network administrator has to go to the single
station to troubleshoot the problem.

o Network control: Complex network control features can be easily implemented


in the star topology. Any changes made in the star topology are automatically
accommodated.

o Limited failure: As each station is connected to the central hub with its own cable,
therefore failure in one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are cost-
effective.

o Easily expandable: It is easily expandable as new stations can be added to the


open ports on the hub.

o Cost effective: Star topology networks are cost-effective as it uses inexpensive


coaxial cable.

o High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet


100BaseT is one of the most popular Star topology networks.

Disadvantages of Star topology

o A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.

o Cable: Sometimes cable routing becomes difficult when a significant amount of


routing is required.

4) Tree topology

o Tree topology combines the characteristics of bus topology and star topology.

o A tree topology is a type of structure in which all the computers are connected
with each other in hierarchical fashion.

o The top-most node in tree topology is known as a root node, and all other nodes
are the descendants of the root node.

o There is only one path exists between two nodes for the data transmission. Thus,
it forms a parent-child hierarchy.
Advantages of Tree topology

o Support for broadband transmission: Tree topology is mainly used to provide


broadband transmission, i.e., signals are sent over long distances without being
attenuated.

o Easily expandable: We can add the new device to the existing network.
Therefore, we can say that tree topology is easily expandable.

o Easily manageable: In tree topology, the whole network is divided into segments
known as star networks which can be easily managed and maintained.

o Error detection: Error detection and error correction are very easy in a tree
topology.

o Limited failure: The breakdown in one station does not affect the entire network.

o Point-to-point wiring: It has point-to-point wiring for individual segments.

Disadvantages of Tree topology

o Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult
to troubleshoot the problem.

o High cost: Devices required for broadband transmission are very costly.

o Failure: A tree topology mainly relies on main bus cable and failure in main bus
cable will damage the overall network.

o Reconfiguration difficult: If new devices are added, then it becomes difficult to


reconfigure.

5) Mesh topology

o Mesh technology is an arrangement of the network in which computers are


interconnected with each other through various redundant connections.

o There are multiple paths from one computer to another computer.

o It does not contain the switch, hub or any central computer which acts as a central
point of communication.

o The Internet is an example of the mesh topology.

o Mesh topology is mainly used for WAN implementations where communication


failures are a critical concern.
o Mesh topology is mainly used for wireless networks.

o Mesh topology can be formed by using the formula:


Number of cables = (n*(n-1))/2;

Where n is the number of nodes that represents the network.

Mesh topology is divided into two categories:

o Fully connected mesh topology

o Partially connected mesh topology

o Full Mesh Topology: In a full mesh topology, each computer is connected to all
the computers available in the network.

o Partial Mesh Topology: In a partial mesh topology, not all but certain computers
are connected to those computers with which they communicate frequently.
Advantages of Mesh topology:

Reliable: The mesh topology networks are very reliable as if any link breakdown will not
affect the communication between connected computers.

Fast Communication: Communication is very fast between the nodes.

Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.

Disadvantages of Mesh topology

o Cost: A mesh topology contains a large number of connected devices such as a


router and more transmission media than other topologies.

o Management: Mesh topology networks are very large and very difficult to
maintain and manage. If the network is not monitored carefully, then the
communication link failure goes undetected.

o Efficiency: In this topology, redundant connections are high that reduces the
efficiency of the network.

IEEE 802 Reference model:

( Institute of Electrical and Electronics Engineers) IEEE 802 is a collection of


networking standards that cover the physical and data link layer specifications for
technologies such as Ethernet and wireless. These specifications apply to local area
networks (LANs) and metropolitan area networks (MANs).

Importance of IEEE 802 Standards

There are numerous computer equipment manufacturers in the world, and they
manufacture network hardware that would connect to certain computers only. Now, this
is a major problem since it would be very difficult to connect various systems having
different hardware.

So, the IEEE standards for computer networks developed IEEE 802 standards which
ensure that various devices having different network hardware can easily connect over
the network and exchange data. The IEEE 802 standards also make sure that the network
connectivity and management are easier.
 IEEE 802.3 MAC sublayer

 IEEE 802.4 token bus

 IEEE 802.5 token ring

IEEE 802.4 Token Bus

This is a LAN topology whose physical topology resembles that of bus topology, but its
logical topology is ring topology.

In token bus, a token is held by any one station. That station alone can transmit frames
and the rest of the stations need to receive to the station with the token.

The station can transmit any number of frames it wants, but, only till the time it has the
token. This time is called token holding time, or THT and is generally 10 msec.

Once THT is over, the station needs to stop its transmission and pass on the token to the
next station. This station is decided by the address of the station.

The station with the next address is passed the token, thus forming a logical ring.

IEEE 802.5 Token Ring

IEEE 802.5 token ring follows ring topology, both logically and physically.

In this, each station has attached to it a ring interface unit or RIU. This RIU is responsible
for transmitting the message to the ring. That is, it simply receives the message from the
station and retransmits it to the ring.

Its working is similar to that of the token bus, but the difference lies in the way of passing
the token.

The token is passed to the station that is placed next to the station holding the
token physically. It thus forms the physical ring and the addressing is also done in order,
therefore forming a logical ring too.

List of IEEE Standards in Computer Networks


Let us look at the various IEEE standards in computer networks and their usage (or
function):

IEEE standards in
Description
computer networks

IEEE 802 It is used for the overview and architecture of LAN/MAN.

IEEE 802.1 It is used for bridging and management of LAN/MAN.

IEEE 802.1s It is used in multiple spanning trees.

IEEE 802.1 w It is used for rapid reconfiguration of spanning trees.

IEEE 802.1x It is used for network access control of ports.

IEEE 802.2 It is used in Logical Link Control (LLC).

IEEE 802.3 It is used in Ethernet (CSMA/CD access method).

IEEE 802.3ae It is used for 10 Gigabit Ethernet.

It is used for token passing bus access methods and the physical
IEEE 802.4
layer specifications.

It is used for token ring access methods and the physical layer
IEEE 802.5
specifications.

It is used in distributed Queue Dual Bus (DQDB) access method and


IEEE 802.6
for the physical layer specifications (MAN).

IEEE 802.7 It is used in broadband LAN.

IEEE 802.8 It is used in fiber optics.

IEEE 802.9 It is used in isochronous LANs.

IEEE 802.10 It is used in interoperable LAN/MAN security.

IEEE 802.11 It is used in wireless LAN, MAC, and Physical layer specifications.

It is used in the demand-priority access method, in the physical


IEEE 802.12
layer, and in repeater specifications.

IEEE 802.13 It is not used.

IEEE 802.14 It is used in cable modems (not used now).

IEEE 802.15 It is used in WPAN (Wireless Personal Area Network).

IEEE 802.16 It is used in Wireless MAN (Wireless Metropolitan Area Network).

IEEE 802.17 It is used in RPR access (Resilient Packet Ring).


Use Cases of IEEE 802 Standards

 Can be used by the organization to ensure that any new product meets the
requirements of standards or not.
 It can also be used to define the connectivity infrastructure of the network. For
example, individual networks, large-scale networks, etc.

Logical Link Control (LLC)

The logical link control (LLC) is the upper sublayer of the data link layer of the open
system interconnections (OSI) reference model for data transmission. It acts act an
interface between the network layer and the medium access control (MAC) sublayer of
the data link layer.

The LLC sublayer is mainly used for its multiplexing property. It allows several network
protocols to operate simultaneously within a multipoint network over the same network
medium.

LLC Layer in the OSI Model

The Open System Interconnections (OSI) model is a 7 – layered networking framework


that conceptualizes how communications should be done between heterogeneous
systems. The data link layer is the second lowest layer. It is divided into two sublayers −

 The Logical Link Control (LLC) sublayer


 The Medium Access Control (MAC) sublayer

The following diagram depicts the position of the LLC sublayer −


Functions of LLC Sublayer

 The primary function of LLC is to multiplex protocols over the MAC layer while
transmitting and likewise to de-multiplex the protocols while receiving.
 LLC provides hop-to-hop flow and error control.
 It allows multipoint communication over computer network.
 Frame Sequence Numbers are assigned by LLC.
 In case of acknowledged services, it tracks acknowledgements
Bridge in Computer Network
The bridge is a networking device in a computer network that is used to connect
multiple LANs to a larger LAN. The bridge is a networking device that connects the
larger LAN networks with the group of smaller LAN networks.

Bridge in Computer Network:


A bridge in a computer network is a device used to connect multiple LANs together with
a larger Local Area Network (LAN). The mechanism of network aggregation is known as
bridging. The bridge is a physical or hardware device but operates at the OSI model’s data
link layer and is also known as a layer of two switches.

The primary responsibility of a switch is to examine the incoming traffic and


determine whether to filter or forward it. Basically, a bridge in computer networks is
used to divide network connections into sections, now each section has separate
bandwidth and a separate collision domain. Here bridge is used to improve network
performance.
Types of Bridges:
There are three types of bridges in computer networks, which are as follows:

1. Transparent bridge
2. Source routing bridge
3. Translational bridge

Transparent Bridge: Transparent bridges are invisible to other devices on the


network. This bridge doesn’t reconfigure the network on the addition or deletion of any
station. The prime function of the transparent bridge is to block or forward the data
according to the MAC address.

Source Routing Bridge: Source routing bridges were developed and designed by IBM
specifically for token ring networks. The frame’s entire route is embedded with the data
frames by the source station to perform the routing operation so that once the frame is
forwarded it must follow a specific defined path/route.

Translational Bridge: Translational bridges used to communicate or transmit data


between two different types of networking systems. Like if we are sending data from
a token ring to an Ethernet cable, the translational cable will be used to connect both the
networking system and transmit data.

Advantages:
 Bridges can be used as a network extension like they can connect two network
topologies together.
 It has a separate collision domain, which results in increased bandwidth.
 It can create a buffer when different MAC protocols are there for different segments.
 Highly reliable and maintainable. The network can be divided into multiple LAN
segments.
 Simple installation, no requirement of any extra hardware or software except the
bridge itself.
 Protocol transparency is higher as compared to other protocols.
Disadvantages:
 Expensive as compared to hubs and repeaters.
 Slow in speed.
 Poor performance as additional processing is required to view the MAC address of the
device on the network.
 As the traffic received is in bulk or is broadcasted traffic, individual filtering of data is
not possible.
 During the broadcasting of data, the network has high broadcast traffic and broadcast
storms can be formed.
Uses of Bridge in Computer Network:
 Bridges are used to increase the network capacity as they can integrate multiple
LANs together.
 On receiving a data frame, databases use the bridge to decide whether to accept or
reject the data.
 In the OSI model, it can be used to transmit the data to multiple nodes of the network.
 Used to broadcast the data even if the MAC address or destination address is
unavailable.
 It forwards data packets despite faulty nodes.
 The data packet can be forwarded or discarded by the bridge when the MAC address
is available.
Functions of Bridges in the Network
 The bridge is used to divide LANs into multiple segments.
 To control the traffic in the network.
 It can interconnect two LANs with a similar protocols.
 It can filter the data based on destination/MAC address.

Routing:

Routing is the process of moving the data across a network from a source to a destination.
Routing algorithms are used to decide the route or the output line a packet should be
transmitted on. Routing algorithms determine the optimal path to reach a destination.

Desirable Properties of Routing Algorithms:-


 Correctness and Simplicity
 Robustness: Ability of the network to deliver packets via some route even in the face
of failures.
 Stability: The algorithm should converge to equilibrium fast in the face of changing
conditions in the network.
 Fairness and Optimality
 Efficiency: Minimum overhead.
Design Parameters of Routing Algorithms :
 Performance Criteria: Number of hops, Cost(Send packet with high bandwidth path
as the cost is less), Delay(Size of Queue), Throughput time(Number of packets
delivered/time).
 Decision Time: When to decide to route a packet? Per-Packet(Datagram) or Per-
session(Virtual-Circuit).
 Decision Place: Who will decide about routing? Each Node(distributed), Central
Node (centralized),Originated Node (source) .
 Network Information Source: None, Local, Adjacent node, Nodes along the route, All
nodes.
 Network Information Update Time: Continuous, Periodic, Major Load Change,
Topology Change.

FIXED ROUTING

Fixed routing is used to find a single permanent route for each source-to-destination pair.
It determines the routes using a least-cost algorithm and the routes are fixed at least until
a change occurs in the network topology.

Fixed Routing: Example (1)

Figure – A simple packet switching network with six nodes (routers)


Figure – Central routing table based on least-cost path algorithm
 A Central routing matrix is created based on the least-cost path which is stored in
the network control center
 The matrix shows for each source-destination of the route, the identity of the next
node on the route.
 Drawback: If the network control center fails, then everything will collapse. Hence
it is not reliable.
Fixed Routing: Example (2)

Figure – Routing table stored in different nodes of the network


FRAME FORWARDING METHODS ON SWITCHES
There are 2 methods that all switch use for forwarding the frames (switching data)
between the network ports:
1. Store and forward switching
2. Cut-through switching
These are explained as following below.

1. Store and forward switching :


In this switching technique, when the switch receives the frame, it stores the frame
data in buffers until the full frame has been received. During the this process, the
switch analyses the current frame for information about its destination. This process
also involves the another process of an error check using the Cyclic Redundancy Check
(CRC) which is operated by the switch.
This switching technique is required for Quality of Service (QoS) analysis on converged
networks where the classification of the frame for traffic prioritization is necessary.

For example, VoIP data streams need to have high priority over other kind of traffic.

CRC checks the number of bits (1s) in the frame to determine whether the received
frame has an error or not. After confirming that is there no error in the frame, the frame
is forwarded out the appropriate port, toward its destination.

When an error is found in a frame, the switch discards the frame. Bandwidth consumed
by the corrupt data is reduced by discarding the error containing frame.

Figure – Store and forward switching


2. Cut-through switching :
In this switching technique, the switch acts upon the data as soon as it is received, even
if the full frame is not received (transmission is not complete). The switch buffers is
enough of the frame to read the destination MAC address so that it can find the port
where it supposed to send the data. The switch takes the destination MAC address from
switching table, determines the outgoing interface port, and forwards the frame onto
its destination through the designated switch port. This switching technique does not
involve any error check process by the switch.

Figure – Cut-through switching

There are 2 types of Cut-through switching:


1. Fast-forward switching –
This switching technique provides the lowest level of latency (it is measured from
the first bit received to the first bit transmitted) because it immediately forwards a
packet after reading the destination address.
Fast-forward switching starts forwarding as soon as it received the first byte of the
packet, there may be a chance when packets are relayed with errors. This occurs
rarely, and during this situation destination network adapter discards the faulty
packet upon receipt. This switching is the typical cut-through method of switching.

2. Fragment-free switching –
In this switching technique there is a trade-off between the high latency – high
integrity of store and forward switching and the low latency – reduced integrity of
fast-forward switching. The switch stores and perform a small error check on the
first 64 bytes of the frame before forwarding.
This switching technique includes the concept of store and forward switching and
fast-forward switching. This switching technique only stores the first 64 bytes of the
frame because the most network errors and collisions occur during the first 64 bytes
and tries to enhance fast-forward switching by doing a small error check to ensure
that a collision has not occurred before forwarding the frame.

Spanning Tree Protocol

The spanning tree protocol is also known as STP. It is a protocol that monitors the overall
performance of the network. The main task of the spanning tree protocol is to remove
the redundant link. This protocol uses the Spanning tree algorithm (STA), which is used
to detect the redundant link. The STA maintains the topology database that is used to find
the redundant links. If the redundant link is found, then the link gets disabled. Once the
redundant links are removed, then only those links will remain active which are chosen
by the STA. If a new link is added or some existing link is removed, then the STA will be
re-executed to adjust the changes.

A complete graph is a graph in which a line connects each pair of vertices. In other words,
we can say that all the points are connected by a maximum number of lines. In computer
networking, the complete graph can also be said as a fully meshed network.

Let's understand the complete graph through an example.

Suppose there are three points, i.e., A, B, and C. Three lines connect these three points. A
line connects every two-point, and we get a complete graph.
The complete graph is formed when a maximum number of lines connects all the points,
whereas the spanning tree is formed when a minimum number of lines connects all the
points.

From the above complete graph, we can get three spanning trees.

1. A is directly connected to B and C, while B and C are indirectly connected through


A. In this spanning tree, A is a central point and all the points are connected
without any formation of loops.

2. B is directly connected to A and C, while A and C are connected through B. B is a


bridge between A and C, or we can say that B is a central point. In this case, also,
all the points are connected without any formation of loops.

3. C is directly connected to both A and B, while A and B are connected through C.


Therefore, C is a bridge between A and B, and C is a central point. In this case, all
the points are connected without any formation of loops.
two basic features of spanning-tree:

o It does not contain any loop.

o It is minimally connected.

spanning tree protocol:

The spanning tree protocol is a layer 2 protocol that tends to solve the problems when
the computers use the shared telecommunications paths on a local area network. When
they share the common path, if all the computers send the data simultaneously, it affects
the overall network performance and brings all the network traffic near a halt.

The spanning tree protocol (STP) overcomes this situation by using the concept of bridge
looping. Bridge looping is used when there are multiple connections between the two
endpoints, and messages are sent continuously, which leads to the flooding of the
network. To remove the looping, STP divides the LAN network into two or more
segments with the help of a device known as bridges. The bridge is used to connect the
two segments so when the message is sent, the message is passed through the bridge to
reach the intended destination. The bridge determines whether the message is for the
same segment or a different segment, and it works accordingly. This network
segmentation greatly reduces the chances of a network coming to a halt.

Working procedure of spanning tree protocol:

The following are the steps that spanning tree protocol uses:

o This protocol selects one switch as a root bridge where the root bridge is a central
point as when the message is sent; then it always passes through the bridge.

o It selects the shortest path from a switch to the root bridge.

o It blocks the links that cause the looping on a network, and all the blocked links
are maintained as backups. It can also activate the blocked links whenever the
active link fails. Therefore, we can say that it also provides fault tolerance on a
network.
Ports in STP

There are five ports used in STP:

o Root port: The root port is a port that has the lowest cost path to the root bridge.

o Designated port: The designated port is a port that forwards the traffic away
from the root bridge.

o Blocking port: The blocking port is a port that receives the frames, but it neither
forwards nor sends the frames. It simply drops the received frames.

o Backup port: The backup port is a port that provides the backup path in a
spanning

tree if a designated port fails. This port gets active immediately when the
designated port fails.

o Alternate port: The alternate port is a port that provides the alternate path to the
root bridge if the root bridge fails.

Let's understand through an example.

Suppose there are four switches A, B, C, and D on a local area network. There are
redundant links that exist among these interconnected devices. In the above figure, there
are two paths that exist, i.e., DBA and DCA. Link redundancy is good for network
availability, but it creates layer 2 loops. The question arises "how network blocks the
unwanted links to avoid the loops without destroying the link redundancy?". The answer
to this question is STP. First, STP chooses one switch as a root bridge. In the above case,
A switch is chosen as a root bridge. Next, other switches select the path to the root bridge,
having the least path cost. Now we look at the switch B. For switch B, there are two paths
that exist to reach switch A (root bridge), i.e., BDCA and BA. The path BDCA costs 7 while
the path BA costs 2. Therefore, path BA is chosen to reach the root bridge. The port at
switch B is selected as a root port, and the other end is a designated port. Now we look at
the switch C. From switch C, there are two paths that exist, i.e., CDBA and CA. The least-
cost path is CA, as it costs 1. Thus, it is selected as a root port, and the other end is selected
as a designated port. Now we look at the switch D. For switch D, there are two paths that
exist to reach switch A, i.e., DBA and DCA. The path DBA costs 4 while the DCA costs 5.
Therefore, path DBA is chosen as it has the least cost path. The port on D is selected as a
root port, and on the other end, switch B is selected as a designated port. In this example,
we have observed that the root bridge can contain many designated ports, but it does not
contain a root port.

Simple Mail Transfer Protocol (SMTP)


Email is emerging as one of the most valuable services on the internet today. Most
internet systems use SMTP as a method to transfer mail from one user to another. SMTP
is a push protocol and is used to send the mail whereas POP (post office
protocol) or IMAP (internet message access protocol) is used to retrieve those
emails at the receiver’s side.
What is Simple Mail Transfer Protocol?
SMTP is an application layer protocol. The client who wants to send the mail opens
a TCP connection to the SMTP server and then sends the mail across the connection.
The SMTP server is an always-on listening mode. As soon as it listens for a TCP
connection from any client, the SMTP process initiates a connection through port 25.
After successfully establishing a TCP connection the client process sends the mail
instantly.
SMTP

SMTP Protocol
The SMTP model is of two types:
 End-to-End Method
 Store-and-Forward Method
The end-to-end model is used to communicate between different organizations
whereas the store and forward method is used within an organization. An SMTP client
who wants to send the mail will contact the destination’s host SMTP directly, to send
the mail to the destination. The SMTP server will keep the mail to itself until it is
successfully copied to the receiver’s SMTP.
The client SMTP is the one that initiates the session so let us call it the client-SMTP and
the server SMTP is the one that responds to the session request so let us call it receiver-
SMTP. The client-SMTP will start the session and the receiver SMTP will respond to the
request.
Model of SMTP System
In the SMTP model user deals with the user agent (UA), for example, Microsoft Outlook,
Netscape, Mozilla, etc. To exchange the mail using TCP, MTA is used. The user sending
the mail doesn’t have to deal with MTA as it is the responsibility of the system admin to
set up a local MTA. The MTA maintains a small queue of mail so that it can schedule
repeat delivery of mail in case the receiver is not available. The MTA delivers the mail
to the mailboxes and the information can later be downloaded by the user agents.
SMTP Model

Components of SMTP
 Mail User Agent (MUA): It is a computer application that helps you in sending and
retrieving mail. It is responsible for creating email messages for transfer to the mail
transfer agent(MTA).
 Mail Submission Agent (MSA): It is a computer program that receives mail from a
Mail User Agent(MUA) and interacts with the Mail Transfer Agent(MTA) for the
transfer of the mail.
 Mail Transfer Agent (MTA): It is software that has the work to transfer mail from
one system to another with the help of SMTP.
 Mail Delivery Agent (MDA): A mail Delivery agent or Local Delivery Agent is
basically a system that helps in the delivery of mail to the local system.
Working of SMTP
Below mentioned are the steps of the working of SMTP [Simple Mail Transfer Protocol].
 Communication between the sender and the receiver: The sender’s user agent
prepares the message and sends it to the MTA. The MTA’s responsibility is to
transfer the mail across the network to the receiver’s MTA. To send mail, a system
must have a client MTA, and to receive mail, a system must have a server MTA.
 Sending Emails: Mail is sent by a series of request and response messages between
the client and the server. The message which is sent across consists of a header and
a body. A null line is used to terminate the mail header and everything after the null
line is considered the body of the message, which is a sequence of ASCII characters.
The message body contains the actual information read by the receipt.
 Receiving Emails: The user agent on the server-side checks the mailboxes at a
particular time of intervals. If any information is received, it informs the user about
the mail. When the user tries to read the mail it displays a list of emails with a short
description of each mail in the mailbox. By selecting any of the mail users can view
its contents on the terminal.

Working of SMTP

Some SMTP Commands


 HELO: Identifies the client to the server, fully qualified domain name, only sent once
per session
 MAIL: Initiate a message transfer, the fully qualified domain of the originator
 RCPT: Follows MAIL, identifies an addressee, typically the fully qualified name of
the addressee, and for multiple addressees use one RCPT for each addressee
 DATA: Send data line by line
Advantages of SMTP
 If necessary, the users can have a dedicated server.
 It allows for bulk mailing.
 Low cost and wide coverage area.
 Offer choices for email tracking.
 Reliable and prompt email delivery.
Disadvantages of SMTP
 SMTP’s common port can be blocked by several firewalls.
 SMTP security is a bigger problem.
 Its simplicity restricts how useful it can be.
 Just 7-bit ASCII characters can be used.
 If a message is longer than a certain length, SMTP servers may reject the entire
message.
 Delivering your message will typically involve additional back-and-forth processing
between servers, which will delay sending and raise the likelihood that it won’t be
sent.

MIME Protocol

MIME stands for Multipurpose Internet Mail Extensions. It is used to extend the
capabilities of Internet e-mail protocols such as SMTP. The MIME protocol allows the
users to exchange various types of digital content such as pictures, audio, video, and
various types of documents and files in the e-mail. MIME was created in 1991 by a
computer scientist named Nathan Borenstein at a company called Bell Communications.

MIME is an e-mail extension protocol, i.e., it does not operate independently, but it helps
to extend the capabilities of e-mail in collaboration with other protocols such as SMTP.
Since MIME was able to transfer only text written file in a limited size English language
with the help of the internet. At present, it is used by almost all e-mail related service
companies such as Gmail, Yahoo-mail, Hotmail.

Need of MIME Protocol

MIME protocol is used to transfer e-mail in the computer network for the following
reasons:

1. The MIME protocol supports multiple languages in e-mail, such as Hindi, French,
Japanese, Chinese, etc.

2. Simple protocols can reject mail that exceeds a certain size, but there is no word
limit in MIME.
3. Images, audio, and video cannot be sent using simple e-mail protocols such as
SMTP. These require MIME protocol.

4. Many times, emails are designed using code such as HTML and CSS, they are
mainly used by companies for marketing their product. This type of code uses
MIME to send email created from HTML and CSS.

MIME Header

MIME adds five additional fields to the header portion of the actual e-mail to extend the
properties of the simple email protocol. These fields are as follows:

1. MIME Version: It defines the version of the MIME protocol. This header usually has a
parameter value 1.0, indicating that the message is formatted using MIME.

2. Content Type: It describes the type and subtype of information to be sent in the
message. These messages can be of many types such as Text, Image, Audio, Video, and
they also have many subtypes such that the subtype of the image can be png or jpeg.
Similarly, the subtype of Video can be WEBM, MP4 etc.

3. Content Type Encoding: In this field, it is told which method has been used to convert
mail information into ASCII or Binary number, such as 7-bit encoding, 8-bit encoding, etc.

4. Content Id: In this field, a unique "Content Id" number is appended to all email
messages so that they can be uniquely identified.

5. Content description: This field contains a brief description of the content within the
email. This means that information about whatever is being sent in the mail is clearly in
the "Content Description". This field also provides the information of name, creation date,
and modification date of the file.

Example of Content description

Content-Description: attachment; filename = javatpoint.jpeg;


modification-date = "Wed, 12 Feb 1997 16:29:51 -0500";
Working diagram of MIME Protocol

Features of MIME Protocol

1. It supports multiple attachments in a single e-mail.

2. It supports the non-ASCII characters.

3. It supports unlimited e-mail length.

4. It supports multiple languages.

Advantage of the MIME

The MIME protocol has the following advantages:

1. It is capable of sending various types of files in a message, such as text, audio, video
files.

2. It also provides the facility to send and receive emails in different languages like
Hindi, French, Japanese, Chinese etc.

3. It also provides the facility of connecting HTML and CSS to email, due to which
people can design email as per their requirement and make it attractive and
beautiful.

4. It is capable of sending the information contained in an email regardless of its


length.

5. It assigns a unique id to all e-mails.

You might also like