digital electronics – Programmerbay https://programmerbay.com A Tech Bay for Tech Savvy Sun, 10 Mar 2024 16:46:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://programmerbay.com/wp-content/uploads/2019/09/cropped-without-transparent-32x32.jpg digital electronics – Programmerbay https://programmerbay.com 32 32 Design a 2 bit Synchronous down counter using T Flip flop? https://programmerbay.com/design-a-2-bit-synchronous-down-counter-using-t-flip-flop/ https://programmerbay.com/design-a-2-bit-synchronous-down-counter-using-t-flip-flop/#respond Fri, 01 Mar 2024 15:03:00 +0000 http://programmerbay.com/?p=3112

These are the following steps to design a 2 bit synchronous down counter using T Flip flop:

Step 1: To design synchronous down counter, we just require to change the order of present state and next state, just put 0 where is 1 in synchronous up counter. In other words, start from 11 (3) to 00 (0)

Step 2: After that, we need to construct a state table with excitation table.
Note: To construct excitation table from state table you should know the excitation table of respective flip flop, in this case, it is T flip flop. So check the excitation table forT flip flop Which is:

T Flip Flop Excitation Table

Present stateNext State    T
000
011
101
110

So, the above table is the excitation table for T Flip Flop.


State Table with  excitation  table

   Present State    Next State    Flip Flop
Q2Q1Q'2Q'1T2T1
001111
010001
100111
111001

Above the table is created as per follow :

When Q2 =1 which is present state and Q2‘=1 which is next state then T2 become 0 [As per excitation table, have a look ]
Similarly, if Q2 is 1and Q2‘ is 0 then T2 becomes 1.
In a similar way, it goes on.

Step 3: After making the excitation table the next thing to do is dig out the equation from the boolean algebra or K map for the design of the counter. So For T1 and T2 we got 1 and Q1‘ .

K-Map

 

For T2  Flip flop,

 

2 2BBIT 2BDown

 

 

 

T2= Q1

For TFlip flop,

Q2

 

T1=1

Step 4: Lastly according to the equation got from K map create the design for 2 bit synchronous down counter.

2 2BBIT 2BDown 2Bdesign

In above design T1 is getting high input  and T2 is getting input from the output of the T1 which is complement of the output.  A clock is attached to it which is always high in blue color.

Popular Posts:

Design a 2 bit Synchronous up counter using T Flip flop?

 

]]>
https://programmerbay.com/design-a-2-bit-synchronous-down-counter-using-t-flip-flop/feed/ 0
Design 2 bit Synchronous up counter using T Flip flop? https://programmerbay.com/design-a-2-bit-synchronous-up-counter-using-t-flip-flop/ https://programmerbay.com/design-a-2-bit-synchronous-up-counter-using-t-flip-flop/#respond Thu, 29 Feb 2024 16:35:00 +0000 http://programmerbay.com/?p=3115

These are the following step to design a 2 bit Synchronous up counter using T Flip flop

Step 1: To design a synchronous up counter, first we need to know what number of flip flops are required. we can find out by considering a number of bits mentioned in the question. So, in this, we required to make 2 bit counter so the number of flip flops required is 2 [2n where n is a number of bits].

Step 2: After that, we need to construct a state table with an excitation table.

Note: To construct an excitation table from the state table you should know the excitation table of the respective flip flop, in this case, it is T flip flop. So check the excitation table forT flip flop Which is:

T Flip Flop Excitation Table

Present stateNext State    T
000
011
101
110

So, the above table is the excitation table for T Flip Flop.


State Table with  excitation  table

   Present State    Next State    Flip Flop
Q2Q1Q'2Q'1T2T1
000101
011011
101101
110011

Above the table is created as per follow :

When Q2 =0 which is the present state and Q2‘=0 which is the next state then T2 becomes 0 [As per excitation table, have a look ]
Similarly, if Q2 is 0 and Q2‘ is 1 then T2 becomes 1.
In a similar way, it goes on.

Step 3: After making the excitation table the next thing to do is dig out the equation from the boolean algebra or K map for the design of the counter. So For T1 and T2 we got 1 and Q1 .

K-Map

 

For T2  Flip flop,

k 2Bmap1
T2= Q1

For TFlip flop,

k 2Bmap2

 

T1=1

Step 4: Lastly according to the equation got from K map create the design for 2 bit synchronous up counter.

2 bit Synchronous up counter using T Flip flopIn the above design, T1 is getting high input and T2 is getting input from the output of the T1 flip flop.  A clock is attached to it which is in blue colour.

]]>
https://programmerbay.com/design-a-2-bit-synchronous-up-counter-using-t-flip-flop/feed/ 0
Design 3 bit synchronous up counter using T Flip flop? https://programmerbay.com/design-a-3-bit-synchronous-up-counter-using-t-flip-flop/ https://programmerbay.com/design-a-3-bit-synchronous-up-counter-using-t-flip-flop/#respond Sun, 25 Feb 2024 16:04:00 +0000 http://programmerbay.com/?p=3114

These are the following steps to Design a 3 bit synchronous up counter using T Flip flop:

Step 1: To design a synchronous up counter, first we need to know what number of flip flops are required. we can find out by considering a number of bits mentioned in the question. So, in this, we required to make 3 bit counter so the number of flip flops required is 3 [2n where n is a number of bits].

Step 2: After that, we need to construct state table with excitation table.
Note: To construct excitation table from state table you should know the excitation table of respective flip flop, in this case, it is T flip flop. So check the excitation table for T flip flop Which is:

T Flip Flop Excitation Table

Present stateNext State    T
000
011
101
110

So, the above table is the excitation table for T Flip Flop.

State Table with  excitation  table

   Present State    Next State    Flip Flop
Q3Q2Q1Q'3Q'2Q'1T3T2T1
000001001
001010011
010011001
011100111
100101001
101110011
110111001
111000111

Above  table is created as per follow :

When Q3 =0 which is present state and Q3‘=0 which is next state then T3 become 0 [As per excitation table, have a look ]
Similarly, if Q3 is 0 and Q3‘ is 1 then T3  become 1.
In similar way it goes on .

Step 3: After making the excitation table the next thing  to do is dig out the equation from the boolean algebra or K map for the design of the counter. So, for T1 , Tand T3 we got 1,  Q1 and Q1.Q2

K-Map

 

For TFlip flop,

 

3biit
T3= Q1.Q2

For T2  Flip flop,

3bit1
T2= Q1

For TFlip flop,

3biit2t

 

T1=1

Step 4: Lastly according to the equation got from K map create the design for 3 bit synchronous up counter.

design 2B3bit

In above design, T1 is getting input 1 and T2 is getting input from the output of the T1 flip flop and lastly, T3 is getting input from the output of T1  and T2 . A clock is attached to it which is in blue colour.

Popular Posts:

SQL: INSERT INTO statement 
SELECT DISTINCT statement 

]]>
https://programmerbay.com/design-a-3-bit-synchronous-up-counter-using-t-flip-flop/feed/ 0
Difference Between HDLC And PPP Protocol in Tabular Form https://programmerbay.com/difference-between-hdlc-and-ppp-protocol/ https://programmerbay.com/difference-between-hdlc-and-ppp-protocol/#respond Mon, 19 Sep 2022 09:37:16 +0000 https://www.programmerbay.com/?p=2631 In this article, we’ll be discussing HDLC & PPP data link protocols and the differences between them.

HDLC and PPP  protocols are the communication protocol responsible for transmitting information between nodes or points. It deals data in form of frames.

Both HDLC and PPP are the part of data link layer. The major difference between them is, HDLC refers to bit-oriented protocol, whereas, PPP is byte-oriented protocol.

Difference between High-level Data Link Control Protocol and Point-To-Point protocol

HDLCPPP
It stands for High-level Data Link Control protocolIt stands for Point-To-Point protocol
It is a Bit-oriented protocolIt is a Byte-oriented protocol
The HDLC protocol is only used for the synchronous mediaThe PPP protocol is used for both the asynchronous media as well as synchronous media
It is an older protocol as compared to PPP protocol so it does not provide any kind of authenticationIt is the newer protocol as compared to HDLC protocol which means that it does provide the authentication.
In this, the addressing is not dynamic which means that the addressing is purely static.
In this, the addressing is dynamic which makes it quite reliable than HDLC protocol.
As the HDLC protocol is a quite old school which purely signifies that it does not support non-cisco devices at all.The PPP protocol is relatively newer than the HDLC protocol which signifies that it does support the non-cisco devices.
It is more costlier than PPPIt is less costlier than HDLC

High-Level Data Link Control ( HDLC )

HDLC stands for High-level Data Link Control. HDLC is a type of WAN protocol which necessarily performs the encapsulation of data inside the data link layer. This is the type of encapsulation which changes the format of data and information.

Furthermore,it is used to exchange data between nodes. It transmits data in the form of frames over a network.

It allows the use of point to point and multipoint links. It provides two types of transfer modes that is:

  • Normal Response Mode (NRM): In this, station’s configuration is unbalanced. NRM involves a primary station that is capable of sending commands and multiple secondary station that can only response.
    • It can be used as point to point that includes one primary station and a secondary station that communicate with each other.
    • Other is, point to multi-point, it involves one primary station and multiple secondary stations that communicate with one other.

 

  •  Asynchronous Balanced Mode (ABM): In this, station’s configuration is balanced. It involves only point to point communication which means single primary station and a secondary station are the part of communication. The main difference is, every station can send and receive data.

Types of frames in HDLC

It generally supports three types of frames:

  •  Information frames or I frames
  •  Supervisory frames or S frames
  • Unnumbered frames or U frames

Frame format of HDLC

It consists 6 types of fields:

HDLC frame formate

  • Flag: It used to verify beginning and end of a frame. It serves synchronisation pattern for receiver
  • Address: It consists address of the receiving station
  • Control: It is used for error control and flow control
  • Payload :Contains users data
  • FCS: It stands for frame check sequence that is dedicated to error detection

 

Point to Point Protocol ( PPP )

PPP stands for Point-To-Point protocol. PPP is also a type of WAN protocol, which comes up with loads of advancements over the HDLC protocol. PPP protocol does not need any physical addresses or any tangible wires, only the IP address is sufficient.

It defines format of frames, connection establishment, data exchange process, Authentication process and more. However, it doesn’t support flow control, addressing mechanism and efficient error control

Frame format of PPP:

PPP Protocol format

  • Flag: used to verify beginning and end of a frame. It serves synchronisation pattern for receiver
  • Address: It consists address of the receiving station. A constant value is used to set the address field which is 11111111 that resembles broadcast address
  • Control: A constant value is used to set the field which is 11000000 . Since, flow control is not supported and PPP has very limited error control. Tberefore, it is generally not needed
  • Protocol : It decides the data that is going to transmit
  • Payload field :Contains users data
  • FCS: It stands for frame check sequence that is dedicated to error detection

]]>
https://programmerbay.com/difference-between-hdlc-and-ppp-protocol/feed/ 0
Difference Between RISC And CISC Machine in Tabular Form https://programmerbay.com/difference-between-risc-and-cisc-machine/ https://programmerbay.com/difference-between-risc-and-cisc-machine/#respond Sun, 14 Mar 2021 16:35:15 +0000 https://www.programmerbay.com/?p=2622 A processor, or say more precisely CPU (Central Processing Unit ) can be defined as an integrated circuit that is responsible for processing stored instructions. The primary operations of a CPU are:
– Fetch : Receiving instructions from memory
– Decode – Convert it into binary instructions
– Execute – Operation is performed
– Store – Saving output to memory

CISC Vs RISC

It can have two types of CPU architecture, CISC and RISC. Both provides communication between hardware and software.

These CPU architectures are capable of carrying out primary CPU tasks, though, they follow different approaches. The main difference between them is, CISC supports more instruction sets than RISC.

Difference between RISC AND CISC in Tabular Form

BasisRISCCISC
Stands forReduced Instruction Set ComputerComplex Instruction Set Computer
Size of instructionsSmaller and simpler instructionsLarger and Complex instructions
Execution Time1 cycle per instructionMultiple number of cycles per instruction
Emphasis On SoftwareOn hardware
Instruction FormatsFixed (4 bytes)Variable Length (2-6 bytes)
Control UnitHardwired Control UnitMicroprogrammed Control Unit
Data and Instruction CacheSeparateCombined
Example of processorsARM processor and Qualcomm processor are some examplesAMD, VAX and Intel x86 CPUs are some examples
CPU sizeSmallerLarger as they have larger instruction libraries
Addressing ModesFewerMany
ArrayNot SupportedSupported
PipelineEasyHard
Power consumptionLessMore
Referred asMachine OrientedProgrammer Oriented
Register setsHas multiple register setsHas Single register set
Memory unit Doesn't have memory unit Have memory unit

RISC (Reduced Instruction Set Computer)

It stands for Reduced Instruction Set Computer.

It is basically conceptualized on the fact of making hardware simpler and less complex. And this is done by implementation of the Instruction set which reduces the load on processes like loading, storing and evaluating data.

risc

In other words, it has an assembly language that enables each and every task to be split into simpler instructions which are then executed for each clock cycle. Its instructions are efficient but due to simplicity it processes more lines of code.

It focuses on reducing execution time by optimising and simplifying instruction set. It requires only single clock cycle to process results in uniform execution time. However, it reduces efficiency in case of large program size which leads to need of more RAM for storing instruction.

RISC architecture is often used in portable devices such as mobile phones.

CISC (Complex Instruction Set Computer)

It stands for Complex Instruction Set Computer.

It is basically based on complex hardware and all the importance is given to that always. This is done by implementing complex hardware which serves as a single instruction for all the processes like loading, storing and evaluating data.

In other words, It processes larger and more complex assembly instructions each time. One CISC instruction can do the task of multiple RISC instructions.

CISC

It focuses on reducing the number of instructions per program without considering the number of cycles per instruction. It relatively requires less RAM to store instructions. It is mainly used in desktops or laptops computer.

RISC and CISC example :

Multiplying two variables X*Y:

  • CISC approach can be viewed as
    MULT X, Y
  • RISC approach can be viewed as
    LOAD R1, X
    LOAD R2, Y
    PROD X, Y
    STORE R3, X

Key Differences:

  1. RISC machine focuses more on software and less on hardware, whereas; CISC machine focuses more on hardware and less on software.
  2. RISC machine has greater use of registers so, they use transistors for more registers, whereas; CISC machine uses a greater number of complex instructions, so they use transistors to store all their complex instructions.
  3. In RISC machine, as it follows a software-based approach that is why, the code part is large, whereas; in CISC machine, as it is complex hardware driven, this makes the code part much smaller.
  4. In RISC machine, due to its great and reliable software approach, an instruction can execute in a single clock cycle, whereas; in CISC machine, due to its more hardware driven approach, an instruction lags a little bit and takes more than one clock cycle.
  5. The RISC instructions are quite handy and easy as they can fit in a single word, whereas; the CISC instructions are quite larger than a typical word.

]]>
https://programmerbay.com/difference-between-risc-and-cisc-machine/feed/ 0
Define Sum of Product Form and find SOP expression from Truth Table, Boolean function And non-Canonical Expression https://programmerbay.com/sum-of-products-form/ https://programmerbay.com/sum-of-products-form/#respond Tue, 09 Jun 2020 18:05:00 +0000 http://programmerbay.com/?p=3101

What is Sum of Product form?

‘Sum of Product’ is commonly abbreviated as SOP form. When an expression is expressed in a sum of binary terms ( A term refers to a set of binary variables, where each binary variable is combined with an operation) called Minterms then it is said to be Sum of Products.

In other words, An expression consisting only of minterms is called Sum of the Product. For example, A.B+A’B is an SOP expression.
[other concept Maxterm, (A+B).(A’+B’)]

SOP can be categorized into two forms :

– Canonical or Standard SOP form: In this, each and every binary variable must have in each term. For example- A.B+A’B’

– Minimal SOP form: In this, the standard SOP expression is reduced up to the minimum possible expression.

Sum of Product form

A Sum of Products question can be asked in three ways:-

1) In the form Truth table
2) In the form of non-canonical Expression
3) In the form of Boolean function

Case 1: For the given table, simplify it in SOP expression

ABY
000 (m0)
010 (m1)
101 (m2)
111 (m3)

Points

  • Always consider high output (1)
  • In SOP, every term in the expression is referred to as Minterm
  • A Minterm is represented as m (small m)

How do you find the SOP expression from truth table?

Solution :
Step 1. Since there are 2 variables, so, therefore, there would be 2n combinations which are 22 =4.
We consider a high output as minterm. a minterm is denoted as m.
Y= m2+m3
Y = A.B’ +A.B                            :- It is in Canonical SOP form

In Sum of Product each term is combined with OR operation and within each term, every variable combined with AND operation.

Step 2. Now narrow the founded expression down to minimal SOP form. In this, you should know the rules of Boolean expression or K-map

Y= A.( B’ + B)
Y= A.1
Y= A

OR

Considering, A= 1, A’=0

k map 2B 2B 2Bsop

Y= A

A is your answer.

Case 2: Simplify any expression to SOP or Sum of product form, when Boolean function is given

Simplify the following Boolean function in SOP form
F(X,Y,Z) = Σm(1,4,5,6,7)

Points to Remember

  • First, check the type of m, if m is small then it would Minterm, meaning we have to solve the boolean function in respect to Sum of Product form, whereas if m is capital then it would be Maxterm, means we need to solve it in respect to Product of Sum.
  • On the left side, See how many binary variables are there, in the above case there are 3 binary variables, that’s 23 possible combinations.

How do you find the SOP expression from the boolean function?

Step 1. Make the truth table, if you want to see the actual picture or skip the step.

XYZF
0000 (m0)
0011 (m1)
0100 (m2)
0110 (m3)
1001 (m4)
1011 (m5)
1101 (m6)
1111 (m7)

In the above table, we put output as 1 or high at the mentioned position in the above Boolean function.
For example, in Boolean function  first value is 1, so we put the output high to respective place in the truth table as output 1 at  row 001  ( represents 1)
Similarly, we have 4 , so at row 100 (represents 4)  in the truth table, we put high output.

Step 2. Now make the expression as per the above table,

F= m1 + m4 + m+ m6 + m7
F=  X’Y’Z + XY’Z’ + XY’Z+ XYZ’ + XYZ                :- Canonical SOP form

Step 3. Now Solve the function to minimal SOP form using K map or Boolean rules
K-map is always considered the easiest and fastest way.

 

BOOLEAN 2BFUNCTION 2BSOP

F= X + Y’Z                   :- Minimal SOP form

This your answer

 

Case 3: Simplify any expression in SOP form, when a is given

Simplify the following expression in SOP form
F= x’z’+y’z’+yz’+xy

 OR

Simplify the following non-canonical expression in SOP form

F= x’z’+y’z’+yz’+xy

Point to remember

  • Put 1 in place of missing input and convert that 1 to the appropriate Boolean rule. Suppose in above term x’z’, y is missing ( replace 1 with (y+y’))
  • Make sure the expression is in Canonical form

How do you find the SOP expression from the non-canonical expression?

Step 1.   First, check the given expression is in Canonical form or not, if yes simply make K-map (or jump to 4th step ) and simplify it, otherwise follow the steps.

Step 2. Now, the above expression isn’t in canonical form as there are three binary variables or inputs, x , y and z which can’t be together found in each and every term. So to do this, make it canonical form by doing the following:-

F =  (x’.y’. 1) + (y’z’ .1) + (y z’ .1) + ( x. y.1 )

Since, in each term, a variable is missing, to bring it, in each term we have to put 1 to get the expression.

Step 3.  Put relevant input in place of 1 on the basis of Boolean rules

There is a rule, where

x + x’ =1 in Boolean algebra, we will apply it.

Sum of product non-canonical expression

In the first term, y is missing  (x’y’), similarly in the second one, x is missing (y’z’) and so one.

F =  x’z'( y +y’)  +  y’z'(x+x’) + yz'(x+x’)+ xy(z+z’)
F=  x’z’y+x’z’y’+y’z’x+y’z’x’+yz’x+yz’x’+xyz+xyz’

Now, Arranging in it alphabetical order for ease of understanding

F=x’yz’+x’y’z’+xy’z’+x’y’z’+xyz’+x’yz’+xyz+xyz’

It is now in Canonical SOP or Sum of Product form

Step 3. This is the last step, shrink the expression down to minimal SOP form using K-map
or Boolean algebra

sop 2Bk 2Bmap

Which gives, F = z’ + xy

 

]]>
https://programmerbay.com/sum-of-products-form/feed/ 0
Difference Between Selective Repeat And Go-Back-N Sliding Window Protocol https://programmerbay.com/difference-between-selective-repeat-and-go-back-n-sliding-window-protocol/ https://programmerbay.com/difference-between-selective-repeat-and-go-back-n-sliding-window-protocol/#respond Fri, 22 May 2020 09:26:38 +0000 https://www.programmerbay.com/?p=2629 Go-Back-N protocol and Selective-Repeat protocol are sliding window protocols used to deal with errors that is occurred during data transmission.

sliding window protocols
The main difference between them is, Go-Back-N protocol retransmits all the frames starting from the damaged or corrupted frame, whereas Selective Repeat protocol only retransmits frames that are damaged.

Difference between Selective Repeat and Go-Back- N sliding window protocol:

Go-Back-N Sliding Window Protocol Selective repeat Sliding Window protocol
It acts by retransmitting all the frames in the particular order after a damaged or corrupted frame is encounteredIt acts by retransmitting only those frames which are damaged or corrupted while transmission
It uses cumulative acknowledgements It uses independent acknowledgement
In this protocol, there is a great amount of wastage of the bandwidth, if there is a high error rate in the transmissionIn this protocol, there is less wastage as compared to Go-Back-N sliding window protocol in retransmission of frames
In this, there is absolutely no need for sorting the sender or the receiver sideIn this protocol, there is a need for the sorting of frames that too on the receiver side to maintain the proper sequence of frames
Sliding window size of receiver is 1. For sender, it is NSliding window size of receiver is N. For sender, it is same as receiver which is N
It is fairly less complicated than other protocolsIt is slightly more complicated solely because it uses strategies, logics, etc. which is not present in all protocols
The receiver does not store any frame that is received after encountering the damaged frame, till the damaged frame is retransmittedThe receiver stores the frames that are received after encountering the damaged frame in a buffer, till the damaged frame is resent by the sender
It is more frequently used as compared to Selective repeat Sliding WindowIt is less frequently used as compared to Go-Back-N

 

Selective Repeat sliding window protocol:

Selective repeat is one of the sliding window protocols which is essentially responsible for detecting and correcting the error caused in the data link layer.

The Selective repeat protocol basically only retransmits the damaged or lost frame.

The retransmitted frame in the selective repeat protocol is always received out of sequence.

 

Go-back-N sliding window protocol:

Go-back-N is also one of the sliding window protocols. This protocol mechanism is essentially used to control and detect the errors occurring in the data link layer.

During the data transmission between the sender and the receiver; if the acknowledgement is lost or the frame has been damaged then the sender has to resend all the frames starting from the damaged or corrupted frame.

]]>
https://programmerbay.com/difference-between-selective-repeat-and-go-back-n-sliding-window-protocol/feed/ 0
Difference Between TCP/IP And OSI Model in Tabular form https://programmerbay.com/difference-between-tcp-ip-and-osi-model/ https://programmerbay.com/difference-between-tcp-ip-and-osi-model/#respond Sat, 08 Feb 2020 16:57:54 +0000 https://www.programmerbay.com/?p=2528 Both TCP/IP Model and OSI Reference Model have layered architecture and also their functionality almost look similar.

The main difference between them is, OSI reference model provides clear distinction between services,interface and protocols, whereas, TCP/IP doesn’t able to differentiate between them.

Difference between TCP/IP And OSI Reference Model in Tabular form

BasisTCP/IP ModelOSI Reference Model
Full formStands for Transmission Control Protocol/Internet ProtocolOpen Systems Interconnection Reference Model
DefinitionIt defines standardised rules that enables network communication between computer as the internetIt facilitates open communication systems to communicate using Standard Protocols
Number of LayersTCP/IP model has 4 layers, namely: Application layer Transport layer Internet layer Network access layerOSI model has 7 layers, namely: Application layer Presentation layer m,Session layer, Transport layer, Network layer, Data link layer, Physical layer
Developed byTCP/IP model was developed by DoD (Department of Defence)OSI model was developed by ISO (International Standard Organisation)
Approach followHorizontal approachVertical approach
Transport layerBoth Connection-oriented and Connection-less Connection-oriented
DifferentiationDoesn't differentiate between services,interface and protocolsDifferentiates between services,interface and protocols
Upper Layer definitionApplication Layer is corresponds to Application, Presentation and Session Layer of OSI ModelIt is separately defined
ReliabilityMoreLess
Packet delivery by Transport LayerDoesn't guarantee data packet delivery Guarantees data packet delivery
UsageUse in computer networkNo longer in use
Routing protocols and standards definitionInternet LayerNetwork Layer
Stability and RestrictionsDon't have strict boundaries and is more stableStrict boundaries and is less stable

TCP/IP Model

TCP/IP model is older than OSI model and consists 4 layer initially ,later on one more layer were added.

It defines standardised rules that enables network communication between computer as the internet.

These are the layers :-

tcp ip

  • Application Layer

It corresponds to Application, Presentation and Session Layer of OSI Model. It contains all the high-level protocols. It provides various services to perform user activities ranging from file transfer to internet surfing.

It consists of HTTP, SMTP, FTP protocols and more.

  • Transport Layer

It ensures reliable transmission of data that is sent between hosts in the form of datagrams. It supports flow control and error control to make sure data is received at destination host reliably and correctly.

TCP(Transmission Control Protocol) and UDP(User Datagram Protocol) are protocols used in this layer.

  • Internet Layer

It is responsible for transmitting data packets between hosts on a network. It routes independent data packets to correct host. It uses IP(Internet Protocol), ICMP (Internet Control Message Protocol) and ARP ( Address Resolution) protocol to achieve its function.

  • Link Layer

It is a combination of the Data Link layer and Physical layer of OSI Model. It acts as an interface between transmission links and hosts. It uses a physical address to find hosts and send data.

OSI Reference Model

OSI Model stands for Open System Interconnection reference model which was developed by ISO. It facilitates open communication systems to communicate using Standard Protocols.

It is not a network architecture as it only states what a layer should do, but not describes the exact services and protocol to be used in each layer.

It follows certain principles on the basis of which it came to the decision of having 7 layers. Each and every layer has its own separate functionality.

These are the following 7 layers in OSI model :-

OSI Model

  • Application Layer

It is the only layer that communicates with users for data directly. Network applications such as Skype, Chrome and other applications work in this layer.

They use application layer protocols such as HTTP, SMTP, FTP, POP3 to function. Application layer provides various services to perform user activities ranging from file transfer to internet surfing.

  • Presentation Layer

It accepts data from the application layer in the form of a sequence of numbers or characters and transforms it into a machine-understandable form which is binary data (10101010).

After that, data compression is used to reduce the size of the data before handing it over to the next layer. It accelerates the data transmission speed and therefore, it helps in case of video calls.

Lastly, data encryption is used to encrypt data in order to maximise the integrity and security. It secures the transmitting data from intruders.

SSL protocol is one of the protocols used in this layer

Objective Highlights

    • Data Translation
    • Data Compression
    • Data Encryption
  • Session layers

It establishes, maintains, manages, and terminates connection or sessions between hosts. It uses various APIs (Application Programming Interface) to connect computers.

When a client requests for connection setup, the server uses authentication and authorisation before allowing the client to use its resources. Authentication can be defined as a process of identifying a user.

The authorisation is a process of identifying the access rights of a user, deciding what resources are allowed to access. Session layer also keeps track of which data packets belong to which file.

Objective Highlights

    • Session Establishment
    • Session Management
    • Session Termination
  • Transport Layer

It ensures communication reliability by performing segmentation, error control and flow control.

It accepts data from the session layer and divides it into various segments and each segment consists of the information of the source, destination port number and sequence number. This is known as segmentation.

Port number is used to deliver the data to correct application, whereas the sequence number is used to put the data into the correct sequence.

Further, flow control handles the amount or size of data to be transmitted. Error control comes handy when a data packets are dropped in between transmission & not reached to the destination, then using various techniques, it retransmits data again. It also uses a checksum to identify the received corrupted segment.

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the protocols used in this layer.

Objective Highlights

    • Data Segmentation
    • Error Control
    • Flow Control
  • Network Layer

This layer is responsible for transmitting received data segments from source host to destination host over a network.

It performs functions like logical addressing, routing and path determination. In this, each data unit is referred as data packets.

IP addressing done in this layer is called logical addressing. Each computer has an IP address to get uniquely identified on a network.

It assigns sender’s and receiver’s address to each segment, so, that they can reach at correct destination. Furthermore,
routing is also used to find an efficient and effective path from source to destination.

Lastly, path determination can be defined as a technique to select the best path for data delivery. OSPF, BGP, IS-IS are some protocols used in this layer.

Objective Highlights

    • Logical Addressing
    • Routing
    • Path Determination
  • Data Link Layer

It accepts data from the network layer. It performs physical addressing that is used to assign MAC address of sender and receiver host to received data packets to form a frame.

It also ensures the data transmission from one node to other must be error-free. It also takes care of the problem of controlling access to the shared channel using a sublayer called medium access control.

  • Physical Layer

It converts data received from the data link layer to bitstream and is responsible for actual connectivity between the devices.

It involves physical equipment ranging from cables to switches for data transfer.

]]>
https://programmerbay.com/difference-between-tcp-ip-and-osi-model/feed/ 0
Difference Between Modem and Router in Tabular Form https://programmerbay.com/difference-between-a-modem-and-router-in-tabular-form/ https://programmerbay.com/difference-between-a-modem-and-router-in-tabular-form/#respond Wed, 05 Feb 2020 17:47:46 +0000 https://www.programmerbay.com/?p=2469 A modem and router both are networking devices used for providing access to the internet.

difference between modem and router

The main difference between them is, Modem connects your computer with the internet whereas, router directs and examines data packets to destination devices.

Difference between Modem and Router in tabular form ?

BasisModemRouter
DefinitionIt can be defined as a device which modulates and demodulates the outgoing and incoming dataIt can be defined as a device that is basically used to carry forward the data packets to various computer networks
LayerData Link LayerNetwork Layer
Type of deviceInter-networking deviceNetworking device
Ports2 portsmultiple ports
FunctionalityModulation and demodulation of incoming and outgoing signalsAccepts data packets and directs it to correct destination by choosing efficient path
ConnectivityIt can alone connects a device to the internetIt cannot be used alone to connect a device to the internet
SecurityDoesn't provide securityProvides security
CapacityWithout router, it can provide a dedicated connection to single device onlyIt exposes wireless access points and also provides ports in order to connect multiple devices

Modem

It is used to connect a computer to internet. It establishes and maintains a dedicated internet connection with Internet Service Provider (ISP) that serves access to Internet.

The reason to have modem is because a computer can only deal with digital signals whereas signals present on internet are analog.

A modem demodulates incoming analog signals from internet to digital signal.

Similarly, a modem modulates the outgoing signals, coming from computer to analog signals. Cable and DSL modem are some examples.

A Modem stands for Modulator and DEModulator.

The main objective of the Modem is to convert digital signals to analog signals while transmitting and converting back analog signals to digital signals while receiving data.

Router

A Router can be defined as a networking device that is basically used to carry forward the data packets to various computer networks.

Routers are used while transmitting data so that they can efficiently direct the Internet traffic.

In other words, It routes a dedicated internet connection to various devices such as laptops, computers, mobile phones and others, so that, they can access the internet.

It comes up with multiple ports which can be used to connect devices using Ethernet cables, along with that, it also provides wireless points.

Key Differences:

  1. Layer (in which it resides):

Modem resides in DATA LINK LAYER whereas, Router resides in NETWORK LAYER.

  1. Form of data transmission:

In both the modem as well as routers, the data is transmitted in the form of PACKETS.

  1. Device type:

A modem is an INTER-NETWORKING device whereas, a router is a NETWORKING device.

  1. Ports:

Modem:    2 PORTS-

  • One for ISP connection.
  • Second for connecting to the router.

Router:     Can have MULTIPLE PORTS.

  1. Security:

A Modem does not provide any kind of security whereas; Router provides security by protecting the network.

]]>
https://programmerbay.com/difference-between-a-modem-and-router-in-tabular-form/feed/ 0
Difference Between Connection-oriented And Connection-less Communication https://programmerbay.com/difference-between-connection-oriented-and-connection-less-communication/ https://programmerbay.com/difference-between-connection-oriented-and-connection-less-communication/#respond Sun, 31 Mar 2019 16:12:36 +0000 https://www.programmerbay.com/?p=2637 CONNECTION-ORIENTED COMMUNICATION:

The communication that first requires establishing a proper connection before sending actual data is called as Connection-oriented communication.

This connection-oriented communication is similar to the telephone system.

CONNECTION-LESS COMMUNICATION:

The communication in which the actual packets of data are directly sent/transmitted from source to destination without establishing a connection first is called Connection-less communication.

This connection-less communication is quite similar to the postal system.

DIFFERENCE BETWEEN CONNECTION-ORIENTED AND CONNECTION-LESS COMMUNICATION:

  1. Connection-oriented communication always guarantees a proper and reliable transfer of data. Connection-less communication can never guarantee a proper transfer of the data.
  1. In Connection-oriented communication, there is no chance of any kind of congestion or obstructions what so ever while transferring the data. In Connection-less communication there is a greater chance and more often observed that there is congestion or any obstruction while transferring the data.
  1. The virtual circuit and circuit switching are commonly used to implement Connection-oriented communication. The packet switching is commonly used to implement Connection-less communication.
  1. DATA RE-TRANSMISSION( IN CASE OF DATA LOSS)-

In Connection-oriented communication, if the data is lost then the retransmission can be done and is very easily feasible. In Connection-less communication, if the data is lost then retransmission is not possible and feasible at all.

  1. The Connection-oriented communication is most commonly used for steady and prolonged communication. The Connection-less communication is most commonly used for short distance communication.
  1. In Connection-oriented communication, there is a need for firstly establishing a prior connection before the actual transmission could take place. In Connection-less communication there is no requirement of establishing any kind of prior connection before transmitting the data.

Key differences:

CONNECTION-ORIENTED COMMUNICATIONCONNECTION-LESS COMMUNICATION
Guarantees a proper and reliable transfer of dataNever guarantee a proper transfer of the data
No chance of congestion or obstructions while transferring the dataGreater chances of congestion or obstructions while transferring the data
Virtual circuit and circuit switching are commonly used for its implementationPacket switching is commonly used for its implementation
If there is a data loss then it can be re-transmittedRe-transmission is not possible
Used for steady and prolonged communicationUsed for short distance communication
Connection is established before actual data transmissionNo requirement of establishing connection before transmission

]]>
https://programmerbay.com/difference-between-connection-oriented-and-connection-less-communication/feed/ 0