265 - DCCN Lecture Notes
265 - DCCN Lecture Notes
ON
PREPARED BY
Data Communication:
The information is shared when we communicate. This sharing can be local or over long distance. Data
refers to information presented in whatever form is agreed upon by the parties creating and using it.
Data communications are the exchange of data between two devices via some form of transmission
medium such as a wire cable. A communication service enables the exchange of information between
users at different locations. The communicating devices must be a part of a communication system
made up of a combination of hardware (physical equipment) and software (programs).
Communication services & applications are everywhere. Some examples are given below:
Components:
The essential components of a data communication system are:
Message
Sender
Receiver
Medium
Protocol
Message: The information to be communicated. It can consist of text, pictures, numbers, sound, video
or audio.
Sender: The sender is the device that sends the data message. It can be a computer or workstation
telephone handset, video camera and so on.
Receiver: The receiver is the device that receives the message. It can be a computer or workstation
telephone handset, video camera and so on.
Medium: The transmission medium is the physical path connecting both the sender as well as the
receiver by which a message travels from sender to receiver. It could be a twisted pair wire, coaxial
cable, fiber optic cable, or radio waves.
Protocol: A protocol is a set of rules that governs data communications. It represents an agreement
between the communicating devices.
Data representation:
Information can be in any form such as text, numbers, images, audio and video.
Text
Text is represented as a bit pattern
The number of bits in a pattern depends on the number of symbols in that language.
Code is the set of bit patterns designed to represent text symbols.
ASCII
The American National Standards Institute developed a code called the American Standard code for
Information Interchange (ASCII) .This code uses 7 bits for each symbol.
Extended ASCII
To make the size of each pattern 1 byte (8 bits), an extra 0 is augmented at the left the ASCII bit patterns
which doesn’t change the value of the pattern.
Unicode
To represent a symbol or code in any language Unicode is used. It uses 32 bits to represent.
ISO
The international organization for standardization known as ISO has designed a code using a 32 – bit
pattern. This code can represent up to 4,294,967,296 symbols.
Numbers
Numbers are also represented by using bit patterns. Instead of using ASCII to represent numbers, the
number is directly converted to a binary number.
Images
Images are also represented by bit patterns. An image is divided into a matrix of pixels (The smallest
element of an image) where each pixel is a small dot having dimension. Each pixel is assigned a bit
pattern. The size and value of the pattern depends on the image.
Audio
Audio is the recording or broadcasting of sound or music. Audio is by nature different from text, numbers
or images. It is continuous not discrete.
Video
Video is the recording or broadcasting of picture or movie. Video can be produced either a continuous
entity or it can be a combination of images.
Simplex:
In simplex mode, the communication is unidirectional. Only one of the devices on a link can transmit;
the other can only receive.
Ex. Keyboard and monitor
Half-duplex
In half-duplex mode, each station can both transmit and receive but not at the same time. When one
device is sending, the other can only receive.
Ex. Walkie-talkies and CB (citizen band radios)
Full-duplex
In full-duplex mode, both stations can transmit and receive simultaneously.
Ex. Telephone network
When two people are communicating by a telephone line, both can listen and talk at the same time.
Network:
Definition:
A network is set of devices (nodes) connected by communication links (media)
A node can be a computer, printer or other device capable of sending and/or receiving data
Link connecting the devices are often called communication channels
Most network use distributed processing.
Distributed Processing
Networks use distributed processing in which a task divided among multiple computers. Separate
computers handle a subset instead of a single machine responsible for all aspects of a process.
Performance
Performance can be measured in terms of transit time, response time, number of users, type of
transmission medium, and capabilities of the connected hardware and the efficiency of the software.
Transit time
The time required for a message to travel from one device to another.
Response time
The time spent between an inquiry and a response
Reliability
It is measured by the frequency of failure and time required to recover from a failure.
Security
Network security is protecting data from unauthorized access.
Type of connection
Two types of connections
a. Point-to-point
b. Multipoint
In point-to-point connection the two devices are connected by a dedicated link. The entire capacity of
the link is reserved for transmission between those two devices.
A multipoint (also known as multidrop) connection is one in which more than two specific devices share
a single link. The capacity of the channel is shared either spatially or temporally.
Physical Topology
Physical Topology refers to the way in which network is laid out physically. The topology of a network
is the geometric representation of the relationship of all the links and the linking devices. The physical
or logical arrangement of a network is also topology.
The basic topologies are
Mesh
Star
Bus
Ring
Mesh
Advantages:
Dedicated link guarantees that each connection can carry its own data load and thus eliminates the
traffic problems that occur when links shared by multiple devices.
If one link becomes unusable, it does not incapacitate the entire system.
As every message travels along a dedicated line only the intended recipient, so it is secure.
Disadvantages
Star
Dedicated point-to-point links to central controller (hub)
Controller acts as exchange
Advantages
Less expensive than a mesh topology. Each device needs only one link and I/O port to connect
with Hub
Installation and reconfigure is easier.
If one link fails only that link is affected.
Requires less cable than a mesh.
Disadvantages
Yet requires more cable compared to bus and ring topologies.
Bus
Multipoint configuration
One long cable acts as a backbone to link all devices.
Stations are connected through tap and drop lines.
Advantages
Ease of installation.
Uses less cabling than mesh or star topologies.
Disadvantages
Ring
Disadvantages
A break in the ring breaks the entire network.
Categories of Network
LAN
Usually privately owned and links the devices in a single office, building, or campus
LAN size is limited to a few kilometers.
LANs are designed to allow resources to be shared (hardware , software and data )
Today LANs to have data rates of 100 Mbps to 10Gbps
Backbone Networks (BN), have a scale of a few hundred meters to a few kilometers. Include a
high speed backbone linking the LANs at various locations.
MAN
A MAN is designed to cover an entire city.
May be a single network such as cable TV network
May be a means of connecting a number of LANs into a larger network
MANs have data rates of 1 Mbps to 100 Mbps
Resources may be shared LAN to LAN as well as device to device
A company can use a MAN to connect the LANs in all its offices throughout a city.
A MAN can be owned by a private company or it may be a service provided by a public company
,such as local telephone company
Telephone companies provide a popular MAN service called (SMDS) Switched Multi-megabit Data
Services.
WAN
WAN provides long distance transmission of data, voice, image, and video information over large
geographical areas
Comprise a country, a continent, or even the whole world (Interlink age of many LANs and MANs)
Low data transmission rate (below 1 Mbps)
Unlimited number of miles example: Internet Network
Internetwork
Connection of two or more networks by the use of internetworking devices which include routers
and gateways
Internet is a generic term used to mean an interconnection of networks
The Internet is the name of a specific worldwide network.
Protocols
A protocol is a set of rules that governs data communication; the key elements of a
protocol are
Syntax – data formats and Signal levels
Semantics – control information and error handling
Timing – speed matching and sequencing
Standards are necessary to ensure that products from different manufacturers can work
together as expected.
Standards
Why do we need standards?
To create and maintain an open and competitive market for equipment manufacturers
To guarantee national and international interoperability of data, telecommunication technology and
process
To give a fixed quality and product to the customer
To allow the same product to be re used again elsewhere
To aid the design and implementation of ideas
To provide guidelines to manufacturers, vendors, government agencies and other service providers
to ensure kind of interconnectivity.
Physical Layer
It coordinates the functions required to transmit a bit stream over a physical medium.
It deals with the mechanical and electrical specifications of the interface and transmission media.
Mechanical: cable, plugs, pins...
Electrical/optical: modulation, signal strength, voltage levels,
bit times,
It also defines the procedures and functions that physical devices and interfaces have to perform for
transmission to occur
Major responsibilities of Physical layer are
Physical characteristics of interfaces and media:
It defines the characteristics of the interface between the devices and the transmission media.
Also defines the type of transmission medium.
Representation of bits:
To transmit the bits, it must be encoded into electrical or optical signals. It defines the type
of representation how 0s and 1s are changed to signals.
Data rate:
The number of bits sent each second is also defined by the physical layer.
Synchronization of bits:
Sender and the receiver must be synchronized at the bit level .i.e the sender and the
receiver clocks must be synchronized.
Network Layer
The network layer is responsible for source-to-destination delivery of a packet across multiple
networks. It ensures that each packet gets from its point of origin to its final destination .It does not
recognize any relationship between those packets. It treats each one independently as though each
belong to separate message.
The functions of the network layer are
Logical Addressing If a packet has to cross the network boundary then the header contains
information of the logical addresses of the sender and the receiver.
Networking When independent networks or links are connected to create an internetwork or a large
network the connective devices route the packet to the final destination.
Transport Layer
The network layer is responsible for process-to-process delivery that is source to destination delivery
of the entire message.
The responsibilities of Transport layer are
Service-point (port) addressing: Computers run several programs at the same time. Source-to-
destination delivery means delivery from a specific process on one computer to a specific process on
the other. The transport layer header therefore includes a type of address called a service – point
address.
Segmentation and reassembly A message is divided into segments and each segment contains a
sequence number. These numbers enable the Transport layer to reassemble the message correctly
upon arriving at the destination. The packets lost in the transmission is identified and replaced.
Connection control: The transport layer can be either connectionless or connection-oriented. A
connectionless transport layer treats segment as an independent packet and delivers it to the
transport layer. A connection-oriented transport layer makes a connection with the transport layer at
the destination machine and delivers the packets. After all the data are transferred the connection is
terminated.
Flow control: Flow control at this layer is performed end to end.
Error Control: Error control is performed end to end. At the sending side, the transport layer makes
sure that the entire message arrives at the receiving transport layer with out error. Error correction is
achieved through retransmission.
Session Layer: Session layer is the network dialog controller. It establishes, maintains, and
synchronizes the interaction between communicating systems. Specific responsibilities of the layer
are
Dialog Control: Session layer allows two systems to enter in to a dialog. Communication between two
processes takes place either in half-duplex or full-duplex. Example: the dialog between a terminal
connected to a mainframe. Can be half-duplex.
Synchronization. The session layer allows a process to add checkpoints into a stream of data.
Example If a system is sending a file of 2000 pages, check points may be inserted after every 100
pages to ensure that each 100 page unit is advised and acknowledged independently. So if a crash
happens during the transmission of page 523, retransmission begins at page 501, pages 1 to 500
need not be retransmitted.
Presentation layer: It is concerned with the syntax and semantics of the information exchanged
between two systems. Responsibilities of the presentation layer are
Translation .The processes in two systems are usually exchanging information in the form of character
strings, numbers, and so on. The Since different computers use different encoding systems, the
presentation layer is responsible for interoperability between these different encoding methods. At the
sender, the presentation layer changes the information from its sender-dependent format into a
common format. The presentation layer at the receiving machine changes the common format into its
receiver dependent format.
Encryption. The sender transforms the original information from to another form and sends the
resulting message over the entire network. Decryption reverses the original process to transform the
message back to its original form.
Compression. It reduces the number of bits to be transmitted. It is important in the transmission of
text, audio and video.
Application Layer: It enables the user (human/software) to access the network. It provides user
interfaces and support for services such as electronic mail, remote file access and transfer, shared
database management and other types of distributed information services. Services provided by the
application layer are
Network Virtual terminal. A network virtual terminal is a software version of a physical terminal and
allows a user to log on to a remote host.
File transfer, access and management. This application allows a user to access files in a remote
computer, to retrieve files from a remote computer and to manage or control files in a remote
computer.
Mail services. This application provides the basis for e-mail forwarding and storage.
Directory services. It provides distributed database sources and access for global information about
various objects and services.
PHYSICAL LAYER
To be transmitted, data must be transformed to electromagnetic signals.
Like data signals can be analog or digital. Analog signals can have an infinite number of values
in a range; digital signals can have only a limited number of values.
In data communications, we commonly use periodic analog signals and nonperiodic digital
signals.
Comparison of analog and digital signals
Figure Two signals with the same phase and frequency, but different amplitudes
Frequency
Examples:
The power we use at home has a frequency of 60 Hz. What is the period of this sine wave?
Phase
Figure Three sine waves with the same amplitude and frequency, but different phases
Example
A sine wave is offset 1/6 cycle with respect to time 0. What is its phase in degrees and radians?
Solution
We know that 1 complete cycle is 360°. Therefore, 1/6 cycle is
A complete sine wave in the time domain can be represented by one single spike in the frequency
domain.
Frequency Domain
The frequency domain is more compact and useful when we are dealing with more than one
sine wave.
A single-frequency sine wave is not useful in data communication
We need to send a composite signal, a signal made of many simple sine waves.
A single-frequency sine wave is not useful in data communications; we need to send a composite
signal, a signal made of many simple sine waves.
Fourier analysis
According to Fourier analysis, any composite signal is a combination of simple sine waves with
different frequencies, amplitudes, and phases.
If the composite signal is periodic, the decomposition gives a series of signals with discrete
frequencies;
If the composite signal is nonperiodic, the decomposition gives a combination of sine waves
with continuous frequencies.
A composite periodic signal
Example:
If a periodic signal is decomposed into five sine waves with frequencies of 100, 300, 500, 700,
and 900 Hz, what is its bandwidth? Draw the spectrum, assuming all components have a
maximum amplitude of 10 V.
Solution
Let fh be the highest frequency, fl the lowest frequency, and B the bandwidth. Then
The spectrum has only five spikes, at 100, 300, 500, 700, and 900 Hz (see Figure)
Example:
A nonperiodic composite signal has a bandwidth of 200 kHz, with a middle frequency of 140 kHz
and peak amplitude of 20 V. The two extreme frequencies have an amplitude of 0. Draw the
frequency domain of the signal.
Solution
The lowest frequency must be at 40 kHz and the highest at 240 kHz. Figure 3.15 shows the
frequency domain and the bandwidth.
DIGITAL SIGNALS
In addition to being represented by an analog signal, information can also be represented
by a digital signal.
For example, a 1 can be encoded as a positive voltage and a 0 as zero voltage.
A digital signal can have more than two levels.
In this case, we can send more than 1 bit for each level.
Bit rate is the no of bits transmitted per sec.
Bit interval is the time required to send one bit.
Signal level is the no of bits required to represent a particular signal.
Data level is the no of bits used to represent the data.
Figure Two digital signals: one with two signal levels and the other with four signal levels
Examples
1. A digital signal has 8 levels. How many bits are needed per level?
We calculate the number of bits from the formula
Each signal level is represented by 3 bits.
2. A digital signal has 9 levels. How many bits are needed per level?
Each signal level is represented by 3.17 bits.
The number of bits sent per level needs to be an integer as well as a power of 2.
Hence, 4 bits can represent one level.
3. Assume we need to download files at a rate of 100 pages per minute. A page is an average
of 24 lines with 80 characters in each line where one character requires 8 bits. What is the
required bit rate of the channel?
4. A digitized voice channel is made by digitizing a 4-kHz bandwidth analog voice signal. We
need to sample the signal at twice the highest frequency (two samples per hertz). Assume
that each sample requires 8 bits. What is the required bit rate?
The time and frequency domains of periodic and nonperiodic digital signals
Examples:
Consider a noiseless channel with a bandwidth of 3000 Hz transmitting a signal with two signal
levels. What is the maximum bit rate?
Consider the same noiseless channel transmitting a signal with four signal levels (for each level,
we send 2 bits). What is the maximum bit rate?
Shannon Capacity
In reality, we can not have a noiseless channel. For noisy channel,
Capacity = Bandwidth x log2(1+SNR)
The Shannon capacity gives us the upper limit; the Nyquist formula tells us how many signal
levels we need.
Example:
We have a channel with a 1-MHz bandwidth. The SNR for this channel is 63.
What are the appropriate bit rate and signal level?
Solution
First, we use the Shannon formula to find the upper limit.
The Shannon formula gives us 6 Mbps, the upper limit. For better performance we choose
something lower, 4 Mbps, for example.
Then we use the Nyquist formula to find the number of signal levels.
TRANSMISSION IMPAIRMENT
Signals travel through transmission media, which are not perfect.
The imperfection causes signal impairment.
This means that the signal at the beginning of the medium is not the same as the signal at
the end of the medium.
What is sent is not what is received.
Three causes of impairment are attenuation, distortion, and noise.
Attenuation: Loss of energy i.e. Loss in signal strength. It is measured in decibel (dB)
Suppose a signal travels through a transmission medium and its power is reduced to one-half.
This means that P2 is (1/2)P1. In this case, the attenuation (loss of power) can be calculated as
Distortion: The change in shape or form of a signal. This occurs mainly in composite signals.
Noise: Unwanted signal mixed with the original signal. The noise can be of different types like
Thermal Noise, Induced Noise, Cross Talk and Impulse Noise.
Thermal Noise: Produced due to random movement of free electrons in a wire creating extra
unwanted signal.
Induced Noise: Produced if the source is an electrical motor or appliance.
Cross talk: Effect of one wire over another.
Impulse Noise: Is a spike produced during earth quake, thunder and lightning etc.
Example:
The power of a signal is 10 mW and the power of the noise is 1 μW; what are the values of SNR
and SNRdB ?
Solution
The values of SNR and SNRdB can be calculated as follows:
DIGITAL TRANSMISSION
DIGITAL-TO-DIGITAL CONVERSION:
We can represent digital data by using digital signals.
The conversion involves three techniques: line coding, block coding, and scrambling.
Line coding is always needed.
Block coding and scrambling may or may not be needed.
Line Coding & Decoding:
Line Coding is the process of converting Binary data into digital signals.
In NRZ-L the level of the voltage determines the value of the bit. In NRZ-I the inversion
or the lack of inversion determines the value of the bit.
Polar RZ scheme:
RZ
It uses three values
Positive
Negative
Zero
In RZ the signal changes during each bit. A 1 bit is actually represented by positive-to-zero and
A 0 bit is actually represented by negative-to-zero.
Demerits
It requires two signal changes to encode one bit.
It occupies more bandwidth.
Polar biphase: Manchester and differential Manchester schemes:
Biphase
The signal changes at the middle of the bit interval and does not return to zero.
There are two types of biphase encoding
Manchester
Differential Manchester
Manchester
It uses the inversion at the middle of each bit interval for both synchronization and bit
representation.
The bit 1 is represented by negative -to-positive transition.
The bit 0 is represented by positive-to-negative transition
Transition at the middle is used for synchronization
The minimum bandwidth is 2 times that of NRZ
Differential Manchester
Inversion at the middle of the bit interval is used for synchronization.
Presence or absence of additional transition at the beginning of the interval is used to identify the
bit.
A bit 0 is represented by a transition. A bit 1 means no transition.
It requires two signal changes to represent binary 0,but only one to represent binary 1.
The minimum bandwidth of Manchester and differential Manchester is 2 times that of NRZ.
Bipolar schemes: AMI and pseudo ternary:
In bipolar encoding, we use three levels: positive, zero, and negative.
The bit 0 is represented by zero level
The 1s are represented by alternate positive and negative voltages. If the first 1 bit is
represented by positive amplitude, the second will be represented by the negative amplitude,
and so on.
Bipolar Alternate Mark Inversion
A binary 0 is represented by zero voltage.
A binary 1s are represented by alternate positive and negative voltages.
Merits
By inverting on each occurrence of 1, The dc component is zero
A long sequence of 1s stays synchronized.
Pseudoternary
A binary 0 alternate between positive and negative voltages.
HDB3 substitutes four consecutive zeros with 000V or B00V depending on the number of nonzero
pulses after the last substitution.
ANALOG-TO-DIGITAL CONVERSION
A digital signal is superior to an analog signal.
The tendency today is to change an analog signal to digital data.
In this section we describe two techniques, pulse code modulation and delta
modulation.
PCM:
The most common technique to change an analog signal to digital data (digitization) is called
pulse code modulation (PCM). A PCM encoder has three processes.
1. The analog signal is sampled.
2. The sampled signal is quantized.
3. The quantized values are encoded as streams of bits.
Components of PCM encoder
TRANSMISSION MODES
The transmission of binary data across a link can be accomplished in either parallel or serial
mode.
In parallel mode, multiple bits are sent with each clock tick.
In serial mode, 1 bit is sent with each clock tick.
While there is only one way to send parallel data, there are three subclasses of serial
transmission: asynchronous, synchronous, and isochronous.
Data transmission and modes
Parallel transmission
The advantage of parallel transmission is speed. All else being equal, parallel transmission can
increase the transfer speed by a factor of n over serial transmission. But there is a significant
disadvantage: cost. Parallel transmission requires n communication lines (wires in the example) just
to transmit the data stream. Because this is expensive, parallel transmission is usually limited to
short distances.
Serial transmission
In serial transmission all the data bits are transmitted across a single wire in sequence. The
advantage of serial over parallel transmission is that with only one communication channel, serial
transmission reduces the cost of transmission over parallel by roughly a factor of n.
Asynchronous transmission
Asynchronous transmission is so named because the timing of a signal is unimportant. We send 1
start bit (0) at the beginning and 1 or more stop bits (1s) at the end of each byte.
There may be a gap between each byte.
It is “asynchronous at the byte level,” bits are still synchronized; their durations are the same. The
addition of stop and start bits and the insertion of gaps into the bit stream make asynchronous
transmission slower than forms of transmission that can operate without the addition of control
information. But it is cheap and effective, two advantages that make it an attractive choice for
situations such as low-speed communication.
Synchronous transmission
In synchronous transmission, we send bits one after another without start or stop bits or gaps. It is
the responsibility of the receiver to group the bits. Timing becomes very important, therefore,
because the accuracy of the received information is completely dependent on the ability of the
receiving device to keep an accurate count of the bits as they come in. The advantage of
synchronous transmission is speed. With no extra bits or gaps, synchronous transmission is faster
than asynchronous transmission.
Isochronous
In real-time audio and video, in which uneven delays between frames are not acceptable,
synchronous transmission fails. For example, TV images are broadcast at the rate of 30 images
per second; they must be viewed at the same rate. If each image is sent by using one or more
frames, there should be no delays between frames. For this type of application, synchronization
between characters is not enough; the entire stream of bits must be synchronized. The
isochronous transmission guarantees that the data arrive at a fixed rate.
Analog Transmission
DIGITAL-TO-ANALOG CONVERSION
Digital-to-Analog conversion is the process of changing one of the characteristics of an analog signal
based on the information in digital data.
Digital data needs to be carried on an analog signal.
A carrier signal (frequency fc) performs the function of transporting the digital data in an analog
waveform.
The analog carrier signal is manipulated to uniquely identify the digital data being carried
Q. An analog signal has a bit rate of 8000 bps and a baud rate of 1000 baud.
How many data elements are carried by each signal element?
How many signal elements do we need?
Solution
S = 1000, N = 8000, and r and L are unknown.
We find first the value of r and then the value of L.
The digital data stream changes the frequency of the carrier signal, fc.
For example, a “1” could be represented by f1=fc +f, and a “0” could be represented by
f2=fc-f.
Bandwidth of FSK
If the difference between the two frequencies (f1 and f2) is 2f, then the required BW B will
be: B = (1+d)xS +2f
Binary frequency shift keying
Quadrature PSK
To increase the bit rate, we can code 2 or more bits onto one signal element.
In QPSK, we parallelize the bit stream so that every two incoming bits are split up and PSK a
carrier frequency. One carrier frequency is phase shifted 90o from the other - in Quadrature.
The two PSKed signals are then added to produce one of 4 signal elements. L = 4 here.
Quadrature amplitude modulation is a combination of ASK and PSK.
Constellation Diagrams
A constellation diagram helps us to define the amplitude and phase of a signal when we
are using two carriers, one in quadrature of the other.
The X-axis represents the in-phase carrier and the Y-axis represents quadrature carrier.
Constellation diagrams for some QAMs
ANALOG-TO-ANALOG CONVERSION
Analog-to-analog conversion is the representation of analog information by an analog
signal.
One may ask why we need to modulate an analog signal; it is already analog.
Modulation is needed if the medium is band-pass in nature or if only a band-pass channel
is available to us.
Amplitude Modulation
The total bandwidth required for AM can be determined from the bandwidth of the audio signal:
BAM = 2B.
Frequency Modulation
The total bandwidth required for FM can be determined from the bandwidth of the audio signal:
BFM = 2(1 + β)B.
Phase Modulation
The total bandwidth required for PM can be determined from the bandwidth and maximum
amplitude of the modulating signal: BPM = 2(1 + β)B.
TELEPHONE MODEM
MODEMS
The term modem is a composite word that refers to the two functional entities that make up the device;
a signal modulator and a signal demodulator. A modulator creates a band-pass analog signal from
binary data. A demodulator recovers the binary data from the modulated signal.
Modem stands for modulator and demodulator.
TELEPHONE MODEMS
Traditional telephone lines can carry frequencies between 300 and 3300 HZ, giving them BW of 3000
Hz; All this range is used for transmitting voice, where a great deal of interference and distortion can be
accepted without loss of intelligibility.
The effective BW of a telephone line being used for data Transmission is 2400 Hz, covering the range
from 600 to 3000 Hz.
Modem standards:
V-series standards published by the ITU-T.
V.32
V.32bis
V.34bis
V.90
V.92
V.32
This modem uses a combined modulation and demodulation encoding technique called trellis-
coded modulation. Trellis is essentially QAM plus a redundant bit. The Data stream is divided into 4-bit
sections. Instead of a quad bit, however, a pentabit is transmitted. The value of the extra bit is calculated
from the values of the data bits.
In any QAM system, the receiver compares each received signal point to all valid points in the
constellation and selects the closest point as the intended value.. A signal distorted by transmission
noise can arrive closer in value to an adjacent point than to the intended point, resulting in a
misidentification of the point and an error in the received data.
By adding a redundant bit to each quad bit, trellis-coded modulation increases the amount of
information used to identify each bit pattern thereby reduces the number of possible matches.
The V.32 calls for 32-QAM with a baud rate of 2400. Because only 4 bits of each pentabit represents
data, the resulting speed is 4*2400=9600.
Bandwidth diagram
V.32 bis
The V.32 bis modem support 14,400-bps transmission. The V.32 uses 128-QAM
transmission.
V.34 bis
The V.34 bis modem support 28,800-bps transmission with a 960-point constellation to a
bit rate of 33,600 with a 1664-point constellation.
V.90
Traditional modems have a limitations on the data rate.V.90 modems with a bit rate of
56,000 bps, called 56Kmodems, are available. Downloading rate is 56K, while the uploading rate is a
maximum of 33.6 kbps.
Traditional modems
In traditional modems data exchange is between two computers, A and B, Through digital
telephone network.
PCM Inverse
Telephon
PCM
e network
Modem A to B Modem
Quantization
noise happens in
the Telco office
A near A B
After modulation by the modem, an analog signal reaches the telephone company Switching station.
Where it is sampled and digitized to be passed through the digital network. The quantization noise
introduced in the signal at the sampling point limits the data rate according to the capacity. This limit is
33.6 Kbps.
56K Modems
Communication today is via the Internet. In Uploading, The analog signal must still be sampled at the
switching station, which means the data rate in the uploading is limited to 33.6 Kbps. There is no
sampling in downloading. Data rate in downloading is 56Kbps.
V.92
The standard above V.92 is called V.92. These modems can adjust their speed, and if the noise
allows, they can upload data at the rate of 48 Kbps. The modem has additional features. For example,
the modem can interrupt the internet connection when there is an incoming call if the lines has call-
waiting service.
MULTIPLEXING
Whenever the bandwidth of a medium linking two devices is greater than the bandwidth needs of the
devices, the link can be shared. Multiplexing is the set of techniques that allows the (simultaneous)
transmission of multiple signals across a single data link. As data and telecommunications use
increases, so does traffic.
In a multiplexed system, n lines share the bandwidth of one link. The lines on the left direct their
transmission streams to a multiplexer (MUX), which combines them into a single stream (many-to-
one).
At the receiving end, that stream is fed into a demultiplexer (DEMUX), which separates the stream back
into its component transmissions (one-to-many) and directs them to their corresponding lines.
In the figure, the word link refers to the physical path. The word channel refers to the portion of a link
that carries a transmission between a given pair of lines. One link can have many (n) channels.
The de-multiplexer uses a series of filters to decompose the multiplexed signal into its constituent
component signals. The individual signals are then passed to a demodulator that separates them
from their carriers and passes them to the output lines.
Using this technique, a multiplexer can be made to combine several input beams of light, each
containing a narrow band of frequencies, into one output beam of a wider band of frequencies. A de-
multiplexer can also be made to reverse the process.
Time-Division Multiplexing: Time-division multiplexing (TDM) is a digital process that allows several
connections to share the high bandwidth of a link. Instead of sharing a portion of the bandwidth as in
FDM, time is shared. Each connection occupies a portion of time in the link. Note that the same link is
used as in FDM; here, however, the link is shown sectioned by time rather than by frequency. In the
figure, portions of signals 1, 2, 3, and 4 occupy the link sequentially. TDM is a digital multiplexing
technique for combining several low-rate channels into one high-rate one.
We can divide TDM into two different schemes: synchronous and statistical.
In synchronous TDM, each input connection has an allotment in the output even if it is not sending
data. In synchronous TDM, the data rate of the link is n times faster, and the unit duration is n times
shorter.
Interleaving
The process of taking a group of bits from each input line for multiplexing is called interleaving.
We interleave bits (1 - n) from each input onto one output.
TDM can be visualized as two fast-rotating switches, one on the multiplexing side and the other on the
demultiplexing side. The switches are synchronized and rotate at the same speed, but in opposite
directions. On the multiplexing side, as the switch opens in front of a connection, that connection has
the opportunity to send a unit onto the path. This process is called interleaving.
Empty Slots
Synchronous TDM is not as efficient as it could be. If a source does not have data to send, the
corresponding slot in the output frame is empty.
Data Rate Management:
There are three strategies that can be used to overcome the data rate mismatch: multilevel, multislot
and pulse stuffing
Multilevel: used when the data rate of the input links are multiples of each other.
Multislot: used when there is a GCD between the data rates. The higher bit rate channels are
allocated more slots per frame, and the output frame rate is a multiple of each input link.
Pulse Stuffing Sometimes the bit rates of sources are not multiple integers of each other.
Therefore, neither of the above two techniques can be applied. One solution is to make the
highest input data rate the dominant data rate and then add dummy bits to the input lines with
lower rates. This will increase their rates. This technique is called pulse stuffing, bit padding, or
bit stuffing.
Statistical Time-Division Multiplexing: As we saw in the previous section, in synchronous TDM, each
input has a reserved slot in the output frame. This can be inefficient if some input lines have no data to
send. In statistical time-division multiplexing, slots are dynamically allocated to improve bandwidth
efficiency. Only when an input line has a slot's worth of data to send is it given a slot in the output frame.
In statistical multiplexing, the number of slots in each frame is less than the number of input lines. The
multiplexer checks each input line in round- robin fashion; it allocates a slot for an input line if the line
has data to send; otherwise, it skips the line and checks the next line.
Addressing: in statistical TDM, a slot needs to carry data as well as the address of the destination. In
statistical multiplexing, there is no fixed relationship between the inputs and outputs because there are
no preassigned or reserved slots.
Slot Size
Since a slot carries both data and an address in statistical TDM, the ratio of the data size to address
size must be reasonable to make transmission efficient.
No Synchronization Bit
The frames in statistical TDM need not be synchronized, so we do not need synchronization bits.
Bandwidth
In statistical TDM, the capacity of the link is normally less than the sum of the capacities of each
channel. The designers of statistical TDM define the capacity of the link based on the statistics of the
load for each channel. If on average only x percent of the input slots are filled, the capacity of the link
reflects this.
Transmission Media
A transmission media define as anything that can carry information from a source to a destination.
Transmission media are actually located below the physical layer and directly controlled by the
physical layer.
Transmission media can be divided into two broad categories
Guided
Unguided
Guided media
Guided media, which are those that provide a conduit from one device to another, include twisted-
pair cable, coaxial cable, and fiber-optic cable.
1. Twisted-Pair Cable
A twisted pair consists of two conductors (normally copper), each with its own plastic insulation,
twisted together.
One of the wires is used to carry signals to the receiver, and the other is used only as a ground
reference. The receiver uses the difference between the two. In addition to the signal sent by the
sender on one of the wires, interference (noise) and crosstalk may affect both wires and create
unwanted signals.
The most common twisted-pair cable used in communications is referred to as unshielded twisted-
pair (UTP). IBM has also produced a version of twisted-pair cable for its use called shielded twisted-
pair (STP). STP cable has a metal foil or braided- mesh covering that encases each pair of insulated
conductors. Although metal casing improves the quality of cable by preventing the penetration of
noise or crosstalk, it is bulkier and more expensive.
Connector: Registered Jack (RJ 45)
Applications
Twisted-pair cables are used in telephone lines to provide voice and data channels.
2. Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted- pair cable,
in part because the two media are constructed quite differently. Instead of having two wires, coax
has a central core conductor of solid or stranded wire (usually copper) enclosed in an insulating
sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a combination of the
two. The outer metallic wrapping serves both as a shield against noise and as the second conductor
completing the circuit. This outer conductor is also enclosed in an insulating sheath, and the whole
cable is protected by a plastic cover
Coaxial cable Standards
Coaxial cables are categorized by their radio government (RG) ratings .Each RG number denotes a
set of physical specifications such as,
wire gauge of the inner conductor
thickness and type of the inner insulator
the construction of the shield
the size and type of outer casing
Categories of coaxial cables
A glass or plastic core is surrounded by a cladding of less dense glass or plastic. The difference in the
density of the two materials must be such that a beam of light moving through the core is reflected off
the cladding.
Propagation Modes
There are two modes for propagating light along optical channels; each requires fiber with different
physical characteristics
Multimode
Single mode
Multimode
Multiple beams from a light source move through the core in different paths.
Multimode can be implemented in two forms
Step-index
Graded index
Single-Mode
It uses step-index fiber and a highly focused source of light that limits beams to a small range of
angles, all close to the horizontal
The Single-Mode fiber itself is manufactured with a smaller diameter than that of multimode fiber
and with lower density.
This results in a critical angle that is close enough to 90. to make it horizontal.
All the beams arrive at the destination together and can be recombined with little distortion to the
signal.
Fiber Sizes
Optical fibers are defined by the ratio of the diameter of their core to the diameter of their cladding
expressed in micrometers.
Performance:
Attenuation is flatter than in the case of twisted pair cable and coaxial cable.
Few repeaters are needed when we use fiber optic cable.
Application
It is used in cable TV and LAN (Fast Ethernet and 100Base –X.
Advantages
Higher bandwidth: It can support higher bandwidth than twisted pair or coaxial cable.
Less signal attenuation: Transmission distance is greater than that of other guided media. Signals
can be transmitted for 50 km without requiring regeneration.
Immunity to electromagnetic Interference: Electromagnetic noise can not affect fiber-optic cables
Resistance to corrosive materials: glass is more resistant to corrosive materials.
Light-weight: It is of less weight than the copper cables.
More Immune to taping: Fiber-optic cables are more immune to taping than copper cables.
Disadvantages:
Installation/Maintenance. Installation/Maintenance need expertise since it is a new technology.
Unidirectional: Propagation of light is unidirectional. Bidirectional communication is achieved by
means of two optical fibers.
Cost: It is more expensive and the use of optical fiber cannot be justified if the need for bandwidth is
not high.
UNGUIDED MEDIA: WIRELESS
Unguided media transport electromagnetic waves without using a physical conductor. This type of
communication is often referred to as wireless communication.
Unguided signal can travel from the source to destination in several ways:
1. Ground Propagation:
Radio waves travel through the lowest portion of the atmosphere, hugging the earth.
The low frequency signal follows the curvature of the planet.
Distance depends on the amount of the power.
2. Sky Propagation:
Higher frequency radio radiate upward into the ionosphere where they arereflected back
to the earth.
Sky propagation allow for greater distance with lower power output.
3. line-of-sight Propagation: Very high frequency signals are transmitted in straight lines directly from
antenna to antenna.
Radio Waves:
Radio Waves: Between 3 KHz – 1 GHz.
Radio waves use omnidirectional antenna.
Radio waves used for multicast communication, such as radio and television.
Sky Propagation. This makes radio waves a good candidate for long-distance
broadcasting such as AM radio.
Micro Waves:
1. Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to be in
direct sight of each other, towers that are far apart need to be very tall.
2. Very high-frequency microwaves cannot penetrate walls. This characteristic can be a disadvantage
if receivers are inside buildings.
3. The microwave band is relatively wide, almost 299 GHz. Therefore wider subbandscan be
assigned, and a high data rate is possible Use of certain portions of the band requires permission
from authorities.
Infrared waves:
Between 300 GHz-400 THz
Used for short-range communication.
Very common with remote control devices, but can also be used for device-to-device
transfers, such as PDA to computer.
Line-of-sight propagation.
CIRCUIT SWITCHING AND TELEPHONE NETWORK
Introduction:
None of the previous works in larger networks with large physical separation or consisting
of a large number of computers
The solution is a switching network.
Consists of a series of interlinked nodes called switches.
Switches are capable to create temporary connections between two or more devices
Circuit Switching:
A circuit-switched network consists of a set of switches connected by physical links.
A connection between two stations is a dedicated path made of one or more links
each connection uses only one dedicated channel on each link
Each link is normally divided into n channels by using FDM or TDM.
The link can be permanent (leased line) or temporary (telephone)
A circuit switch is a device with n inputs and m outputs that creates a temporary connection
between an input link and an output link.
The number of inputs does not have to match the number of outputs.
Advantages:
simple to implement
simple control
strict sense non-blocking
Multicast
Single source multiple destination ports
Drawbacks
number of crosspoints, N2
large VLSI space
vulnerable to single faults
Multistage switch:
Multistage switch combines crossbar switches in several stages.
Design of a multistage switch depends on the number of stages and the number of
switches required (or desired) in each stage.
Normally, the middle stages have fewer switches than do the first and last stages.
Multiple paths are available in multistage switches.
Blocking refers to times when two inputs are looking for the same output. The output port
is blocked.
Time-Division Switch
Time-division switching uses time-division multiplexing to achieve switching. Two
methods used are:
Time-slot interchange (TSI) changes the order of the slots based on the desired
connection.
TDM bus
Input and output lines are connected to a high-speed bus through input and output gates
(microswitches)
Each input gate is closed during one of the four slots.
During the same time slot, only one output gate is also closed. This pair of gates allows a
burst of data to be transferred from one specific input line to one specific output line using
the bus.
The control unit opens and closes the gates according to switching need.
TELEPHONE NETWORK:
Telephone networks use circuit switching.
In 1800s, Plain old telephone system (POTS) was an analog system using analog signals to
transmit voice.
In 1980s, POTS started carrying data along with voice and also has become digital instead of
analog.
Major components of Telephone network: Local loops, trunk, and switching office.
Different levels of switching offices: End offices, tandem offices, and regional offices.
Local loop: Twisted pair cable that connects the subscriber telephone to the nearest end office
or local central office. It has a bandwidth of 4000 Hz for voice. The first three digits of local
telephone number define the office, and the next four digits define the local loop number.
Trunks: Transmission media that handle communication between offices. It handles hundreds or
thousands of connections through multiplexing. Transmission is usually through optical fibers or
satellite links.
Switching office: To avoid having a permanent physical link between any two subscribers,
switches are located here. Switch connects several local loops or trunks and allows different
subscribers to connect.
Fig: POPs
Making a Connection:
Accessing the switching station at the end offices is accomplished through dialing.
In the past, telephones featured rotary or pulse dialing, in which a digital signal was sent to the
end office for each number dialed. This type of dialing was prone to errors due to the
inconsistency of humans during the dialing process.
Today, dialing is accomplished through the touch-tone technique. In this method, instead of
sending a digital signal, the user sends two small bursts of analog signals, called dual tone. The
frequency of the signals sent depends on the row and column of the pressed pad.
Pressing number 8 will generate two bursts of analog signals with frequencies 852 and 1336
Hz to the end office.
Analog Services [Analog Switches Service]
Local loop is analog; bandwidth is usually between 0 and 4000 Hz.
With switched lines, when the caller dials a number, the call is conveyed to a switch, or series
of switches, at the exchange. The appropriate switches are then activated to link the caller’s line
to that of the person being called. The switch connects the two lines for the duration of the call.
Local Call services: Flat monthly rate OR rate for each call or a set of calls.
Toll Call services:
Toll call can be intra-LATA or inter-LATA.
Inter-LATA calls are long distance calls [that pass via a tandem office (toll office)] and
are charged for.
800 Services:
If a subscriber (normally an organization) needs to provide free connections for other
subscribers (normally customers), it can request an 800 service [also 888, 877, 866]. Call
is free for caller but it is paid by the callee. Rate is less expensive than a normal long
distance call.
WATS: Wide-Area Telephone Service
It is the opposite of 800/888 service. Charged for outbound calls.
Service is a less expensive alternative to regular toll calls; charges are based on number
of calls.
Service can be specified as outbound calls to the same state, to several states, or to the
whole country, with rates charged accordingly.
900 Services:
Call is paid by the caller and is normally much more expensive than a normal long-
distance call. The reason is that the carrier charges two fees; the first is the long-distance
toll, and the second is the fee paid to the callee for each call.
This service is used by organization that needs to charge customers for its services.
Analog Leased Services
Offers customers the opportunity to lease a line, sometimes called a dedicated line, that
is permanently connected to another customer.
Although the connection still passes through the switches in the telephone network,
subscribers experience it as a single line because the switch is always closed, no dialing
is needed.
Digital Services
Digital Services are less sensitive than analog services to noise and other forms of
interference.
Common digital services are switched/56 and digital data service (DDS).
Switched/56 Service
Digital version of an analog switched line. It is a switched digital service that allows
data rates of up to 56 Kbps. To communicate through this service, both parties must
subscribe. A caller with normal telephone service cannot connect to a telephone or
computer with switched/56 even if using a modem.
On the whole, digital and analog services represent two completely different domains
for the telephone companies.
Switched/56 service is digital and so subscribers do not need modems to transmit
digital data. However, the do need another device called a digital service unit (DSU).
This device provides 56 Kbps and encodes the digital data in the format used by
service provider.
Supports bandwidth on demand, video conferencing, fast facsimile, multimedia, fast
data transfer, etc. Also allows subscribers to obtain higher speeds by using more than
one line (inverse multiplexing).
ERROR:
Data can be corrupted during transmission. For reliable communication, errors must be detected
and corrected.
TYPES OF ERRORS:
Single bit Error:
The term single bit error means that only one bit of a given data unit is changed from 1 to 0 or 0 to 1.
010101 is changed to 110101 here only one bit is changed by single bit error.
Burst Error:
A burst error means that 2 or more bits in the data unit have changed.
Example:
Here two bits are corrupted.
Redundancy
Error detection use the concept of redundancy, which means adding extra bits for detecting errors at
the destination .i.e., instead of repeating the entire data stream, a shorter group of bits may be
appended to the end of each unit.
Detection methods
Parity check
Cyclic redundancy check
checksum
Parity check
A redundant bit called parity bit is added to every data unit so that the total number of 1’s in the unit
becomes even (or odd).
SIMPLE PARITY CHECK
In a simple parity check a redundant bit is added to a string of data so that total number
of 1’s in the data become even or odd.
The total data bit is then passed through parity checking function. For even parity, it checks
for even number of 1’s and for odd parity it checks even number of 1’s. If an error is detected the data
is rejected.
Form data into a 2-dimensional array; add single parity check bits to each row and each column;
transmit row-by-row
Example: data = 1110001 1000111 0011001
Form 3×7 array and add row and column parity bits:
Data bits
1110001 0
1000111 0 row
0011001 1 parity bits
0101111 1
Column parity
bits
•Example (cont.): suppose bit in position (1,3) is received in error (in other words, 1 bit error)
Therefore the receiver can detect that bit errors Occurred, but it cannot Correct them (here, if the Bit errors
were in positions (1,3) and (2,1) instead, the receiver parity checks would be the same)
CYCLIC REDUNDANCY CHECK
CRC is based on binary division. In CRC, instead of adding bits to achieve the desired parity, a
sequence of redundant bits, called the CRC or the CRC remainder, is appended to the end of the data
unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number.
At its destination, the incoming data unit is assumed to be intact and is therefore accepted. A remainder
indicates that the data unit has been damaged in transit and therefore must be rejected.
CRC GENERATOR:
CRC CHECKER:
POLYNOMIALS
The divisor in the CRC most often represented not as a string of 1s and 0s, but as an algebraic
polynomial. The polynomial format is useful to solve the concept mathematically.
Standard Polynomials:
Checksum:
~ used by the higher layer protocols
~ is based on the concept of redundancy (VRC, LRC, CRC ….)
To create the checksum the sender does the following:
The unit is divided into K sections, each of n bits.
Section 1 and 2 are added together using one’s complement.
Section 3 is added to the result of the previous step.
Section 4 is added to the result of the previous step.
The process repeats until section k is added to the result of the previous step.
The final result is complemented to make the checksum.
At Sender:
Original data: 10101001 00111001
10101001
00111001
--------------
11100010 Sum
00011101 Checksum
10101001 00111001 00011101
At Receiver:
Received data: 10101001 00111001 00011101
10101001
00111001
00011101
---------------
11111111 Sum
00000000 Complement
each r bit is the VRC bit for one combination of data bits
r1 = bits 1, 3, 5, 7, 9, 11
r2 = bits 2, 3, 6, 7, 10, 11
r4 = bits 4, 5, 6, 7
r8 = bits 8, 9, 10, 11
Error Detection and Correction:
.FLOW CONTROL
Flow control coordinates that amount of data that can be sent before receiving ACK It is one of the
most important duties of the data link layer.
ERROR CONTROL
Error control in the data link layer is based on ARQ (automatic repeat request), which is the
retransmission of data.
The term error control refers to methods of error detection and retransmission.
Anytime an error is detected in an exchange, specified frames are retransmitted. This process is called
ARQ.
OPERATION:
S=0 Frame 0
R=0
ACK 1
S=1 Frame 1
R=1
ACK 0
S=0
Time Time
Sender Receive
r
S=0 Frame 0
R=0
ACK 1
S=1 Frame 1
R=1
Lost
S=1 Frame 1 R=1
Time-out
ACK0 R=0
S=0
Lost acknowledgement
o A lost or damaged ACK is handled in the same by the sender; if the sender receives a damaged ACK, it
discards it.
o The following figure shows a lost ACK 0.the waiting sender does not know if frame 1 has been received.
When the timer for frame 1 expires the sender retransmits frame 1.
o Note that the receiver has already received frame 1 and is expecting to receive frame 0. Therefore, its
silently discards the second copy of frame 1.
o The following figure shows a lost ACK 0.the waiting sender does not know if frame 1 has been received.
When the timer for frame 1 expires the sender retransmits frame 1.
o Note that the receiver has already received frame 1 and is expecting to receive frame 0. Therefore, its
silently discards the second copy of frame 1.
Sender Receive
r
S=0 Frame 0
R=0
ACK 1
S=1 Frame 1
R=1
ACK 0
Time-out S=1 Lost
Frame 1
R=0
ACK0
S=0 Expecting frame 0
Frame 1 is discarded
Time Time
Delayed acknowledgement
o An ACK can be delayed at the receiver or by some problem with the link. The following figure shows
the delay of ACK 1; it ids received after the timer for frame 0 as already expired.
o The sender has already retransmitted a copy of frame 0. The receiver expects frame 1 so its simply
discards the duplicate frame 0.
o The sender has now received two ACK’s, one that was delayed and one that was sent after the duplicate
frame 0 arrived. The second ACK 1 is discarded.
Sender Receive
r
S=0 Frame 0
R=0
Time-out ACK1
S=0 Frame0 R=1
S=1 Frame1
Time-out R=1
ACK0
Time Time
BIDIRECTIONAL TRANSMISSION
The stop – and – wait mechanism is unidirectional. We can have bi-directional transmission if the
two parties have two separate channels for full duplex communication or share the same channel for off
duplex transmission. In this case, each party needs both S and R variables to track frames sent and
expected.
PIGGYBACKING
It’s a method to combine a data frame with an ACK. In following figure both the sender and the
receiver have data to send. Instead of sending separate data and ACK frames. It can save bandwidth
because the overhead from a data frame and an ACK frame can be combined into just one frame.
Sender Receive
r
R=0
S=0 Frame 0,ACK0 R=0
S=0
R=0 Frame0,ACK 1
S=1
Frame 1,ACK1 R=1
S=1
R=1 Frame1,ACK 0
S=0
Time Time
GO-BACK-N ARQ
As in Stop-and-wait protocol senders has to wait for every ACK then next frame is transmitted. But in
GO-BACK-N ARQ number of frames can be transmitted without waiting for ACK. A copy of each
transmitted frame is maintained until the respective ACK is received.
Window is a set of frames in a buffer waiting for ACK. This window keeps on sliding in forward
direction, the window size is fixed. As the ACK is received, the respective frame goes out of window
and new frame to sent come into window. Figure illustrates the sliding window.
If Sender receives. ACK 4, then it knows Frames upto
and including Frame 3 were correctly received
Window size=7
6 7 0 1 2 3 4 5 6 7
4. Control variables:
Sender variables and Receiver variables:
Sender deals with three different variables
S -> sequence number of recently sent frame
SF -> sequence number of first frame in the window.
SL -> sequence number of last frame in the window.
The receiver deals with only one variable
R -> sequence number of frame expected.
5. Timers
The sender has a timer for each transmitted frame. The receivers don’t have any timer.
6. Acknowledgement:
The receiver responds for frame arriving safely by positive ACK. For damaged or lost frames
receiver doesn’t reply, the sender has to retransmit it when timer of that frame elapsed. The receiver may
ACK once for several frames.
7. resending frames:
If the timer for any frame expires, the sender has to resend that frame and the subsequent frame
also, hence the protocol is called GO-BACK-N ARQ.
Operation
Normal operation: Following diagram shows this mechanism. The sender keeps track of the
outstanding frames and updates the variables and windows as acknowledgements arrive.
Sender Receive
SF SL r
0 1 2 3 0 1 Frame 0
0 1 2 3 0
111 1 111
S Frame 1
0 1 2 3 0
0 1 2 3 0 1 ACK 2 1 111
111
S Frame 2
0 1 2 3 0
0 1 2 3 0 1 1111 111
ACK3
111
S Frame 3 0 1 2 3 0
1 111
0 1 2 3 0
111 1 111
S
Time Time
the receiver is expecting frame 2, not frame3. after the timer for frame 2 expires at the sender site, the
0 1 2 3 0 1 Frame 0
0 1 2 3 0
111 1 111
S Frame 1
0 1 2 3 0
0 1 2 3 0 1 ACK 2 1 111
111
S Frame 2 lost
0 1 2 3 0
0 1 2 3 0 1 1111 111
111
Frame 3
0 1 2 3 0 1 Frame 3 is discarded, not
111 in the window
Timeout
resent Frame 2
0 1 2 3 0 1
111 0 1 2 3 0
Frame 3 1 111
resent
0 1 2 3 0 0 1 2 3 0
111 1 111 1 111
S R
Time Time
Damaged or lost acknowledgement:
If an ACK is lost, we can have two situations. If the next ACK arrives before the expiration of
timer, there is no need for retransmission of frames because ACK are cumulative in this protocol.. if the
next ACK arrives after the timeout, the frame and all the frames after that are resent. The receiver never
resends an ACK.
For diagrams refer your class work notes.
Delayed Acknowledgement:
A delayed ACK also triggers the resending of frames.
HDLC standardized ISO in 1979 and accepted by most other standards bodies (ITU-T, ANSI)
3 types of end-stations:
Primary–sends commands
Secondary–can only responds to Primary’s commands
Combined–can both command and respond
3 types of configuration
(Note: no balanced multipoint)
TRANSFER MODE
FRAMES:
3 types of Frames are
I-Frame – transports user data and control info about user data.
S-Frame – supervisory Frame, only used for transporting control information
U-Frame – unnumbered Frame, reserved for system management(managing the link itself)
FRAME FORMAT
Flag Fields:
Control Field:
different for different frame type
Information - data transmitted to user (next layer up)
• Flow and error control piggybacked on information frames
Supervisory - ARQ when piggyback not used
Unnumbered - supplementary link control
first 1-2 bits of control field identify frame type
0 N(S) P/ N(R)
F
U-Frames:
• Used for flow and error control
1 2 3 4 5 6 7 8
1 0 S P/ N(R)
F
P/F:
• RR --- receive ready
• RNR --- receive not ready
• REJ --- reject on frame N(R)
• SREJ --- selective reject on N(R)
S-Frames:
S-frames are similar to unnumbered frames, the main difference being that they do carry sequence
information.
Some supervisory frames function as positive and negative acknowledgements, they therefore play
a very important role in error and flow control.
Two bits indicate the frame type, so that there are four possibilities.
Receiver Ready -RR(Positive Acknowledgement)
Receiver Not Ready -RNR
Reject -REJ(NAK go-back-N)
Selective Reject -SREJ(NAK selective retransmit)
HDLC Operation
Initialization: S-frames specify mode and sequence numbers, U-frames acknowledge
Data Transfer: I-frames exchange user data, S-frames acknowledge and provide flow/error control
Disconnect: U-frames initiate and acknowledge
Point-to –Point Protocol
PPP
In a network, two devices can be connected by a dedicated link or a shared link. In the first
case, the link can be used by the two devices at any time. We refer to this type of access as
point-to-point access. In the second case, the link is shared between pairs of devices that need
to use the link. We refer to this type of access as multiple access.
One of the most common protocols for point-to-point access is the Point-to-Point Protocol
(PPP).
PPP services
It defines the format of the frame to be exchanged between devices.
It defines how two devices can negotiate the establishment of the link and the exchanged of
data.
It defines how network layer data are encapsulated in the data link frame.
It defines how two devices can authenticate each other.
Flag field. The flag fields identify the boundaries of a PPP frame. Its value is 01111110.
Address field. Because PPP is used for a point-to-point connection, it uses the broadcast
address of HDCL, 11111111, to avoid a data link address in the protocol.
Control field. The control field uses the format of the U-frame in HDCL. See pages 285-286.
Protocol field. The protocol field defines what is being carried in the data field: user data or
other information.
Data field. This field carries either the user data or other information.
Frame check sequence (FCS) field. This field is used for error detection.
Transition states
A PPP connection goes through different phases called transition sates.
Idle state. The idle state means that the link is not being used. There is no active carrier, and
the line is quiet.
Establishing link. When one of the end point starts the communication, the connection goes
into the establishing state. In this state, options are negotiated between the two parties. If the
negotiation is successful, the system goes to the authenticating state (if authentication is
required) or directly to the networking state.
Authenticating state. The authenticating state is optional. If the result is successful, the
connection goes to the networking state; otherwise, it goes to the terminating state.
Networking State. When a connection reaches this state, the exchange of user control and
data packets can be started. The connection remains in this state until one of the endpoints
wants to terminate the connection.
Terminating state. When the connection is in the terminating state, several packets are
exchanged between the two ends for house cleaning and closing the link.
PPP Stack
Three sets of protocols are used by PPP: Link control protocol, authentication protocols,
and network control protocol.
PAP Packets:
CHAP
The CHAP protocol is a three-way handshaking authentication protocol that provides
greater security than PAP.
In this method, the password is kept secret; it is never sent on-line.
Steps
The system sends to the user a challenge packet containing a challenge value, usually
a few bytes.
The user applies a predefined function that takes the challenge value and the user’s own
password and creates a result. The user sends the result in the response packet to the
system.
The system does the same. It applies the same function to the password of the user and
the challenge value to create a result. If the result created is the same as the result sent
in the response packet, access is granted; otherwise, it is denied.
CHAP Packets:
Multiple Access
RANDOM ACCESS:
Random Access (or contention) Protocols:
No station is superior to another station and none is assigned the control over another.
A station with a frame to be transmitted can use the link directly based on a procedure
defined by the protocol to make a decision on whether or not to send.
ALOHA Protocols
Was designed for wireless LAN and can be used for any shared medium
Pure ALOHA Protocol Description
All frames from any station are of fixed length (L bits)
Stations transmit at equal transmission time (all stations produce frames with equal
frame lengths).
A station that has data can transmit at any time
After transmitting a frame, the sender waits for an acknowledgment for an amount
of time (time out) equal to the maximum round-trip propagation delay = 2* tprop(see
next slide)
If no ACK was received, sender assumes that the frame or ACK has been destroyed
and resends that frame after it waits for a random amount of time
If station fails to receive an ACK after repeated transmissions, it gives up
Channel utilization or efficiency or Throughput is the percentage of the transmitted
frames that arrive successfully (without collisions) or the percentage of the channel
bandwidth that will be used for transmitting frames without collisions
ALOHA Maximum channel utilization is 18% (i.e, if the system produces F frames/s,
then 0.18 * F frames will arrive successfully on average without the need of
retransmission).
Procedure for ALOHA protocol
.
Advantage of ALOHA protocols
A node that has frames to be transmitted can transmit continuously at the full
rate of channel (R bps) if it is the only node with frames
Simple to be implemented
No master station is needed to control the medium
Disadvantage
If (M) nodes want to transmit, many collisions can occur and the rate allocated for
each node will not be on average R/M bps
This causes low channel utilization
2- Polling
Stations take turns accessing the medium
Two models: Centralized and distributed polling
Centralized polling
One device is assigned as primary station and the others as secondary stations
All data exchanges are done through the primary
When the primary has a frame to send it sends a select frame that includes the
address of the intended secondary
When the primary is ready to receive data it send a Poll frame for each device to
ask if it has data to send or not. If yes, data will be transmitted otherwise NAK is
sent.
Polling can be done in order (Round-Robin) or based on predetermined order
Distributed polling
No primary and secondary
Stations have a known polling order list which is made based on some protocol
station with the highest priority will have the access right first, then it passes the access right to the next
station (it will send a pulling message to the next station in the pulling list), which will passes the access
right to the following next station,…
3- Token-Passing network
FCS
FCS
Frame formats. (a) DIX Ethernet , (b) IEEE 802.3.
In IEEE 802.3 Ethernet Data link layer is split into two sublayers:
Bottom part: MAC
The frame is called IEEE 802.3
Handles framing, MAC addressing, Medium Access control
Specific implementation for each LAN protocol
Defines CSMA/CD as the access method for Ethernet LANs and
Token passing method for Token Ring.
Implemented in hardware
The least significant bit of the first byte defines the type of address. If the bit is 0, the address is
unicast; otherwise, it is multicast. The broadcast destination address is a special case of the
multicast address in which all bits are 1s.
Frame length:
Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes (12,144 bits)
Standard Ethernet:
10Base5 implementation
10Base2 implementation
10BaseT
Uses twisted pair Cat3 cable
Star-wire topology
• A hub functions as a repeater with additional functions
• Fewer cable problems, easier to troubleshoot than coax
• Cable length at most 100 meters
Summary of Standard Ethernet implementations
Switched Ethernet:
• Switches forward and filter frames based on LAN addresses
– It’s not a bus or a router (although simple forwarding tables are maintained)
• Very scalable
– Options for many interfaces
– Full duplex operation (send/receive frames simultaneously)
• Connect two or more “segments” by copying data frames between them
– Switches only copy data when needed
• key difference from repeaters
• Higher link bandwidth
– Collisions are completely avoided
• Much greater aggregate bandwidth
– Separate segments can send at once
Fast Ethernet
100 Mbps transmission rate
same frame format, media access, and collision detection rules as 10 Mbps Ethernet
can combine 10 Mbps Ethernet and Fast Ethernet on same network using a switch
media: twisted pair (CAT 5) or fiber optic cable (no coax)
Star-wire topology
Similar to 10BASE-T
CAT 3
CAT 5
Gigabit Ethernet
Speed 1Gpbs
Minimum frame length is 512 bytes
Operates in full/half duplex modes mostly full duplex
In the full-duplex mode of Gigabit Ethernet, there is no collision; the maximum length of the cable is
determined by the signal attenuation in the cable.
10Gbps Ethernet
Maximum link distances cover 300 m to 40 km
Full-duplex mode only
No CSMA/CD
Uses optical fiber only
WIRELESS LAN
Blue Tooth:
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers
the physical and data link layers.
Bluetooth wireless technology is an open specification for a low-cost, low-power, short-
range radio technology for ad-hoc wireless communication of voice and data anywhere in
the world.
Bluetooth is a wireless LAN technology designed to connect devices of different functions
such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on. A
Bluetooth LAN is an ad hoc network, which means that the network is formed
spontaneously.
Piconet:
• All devices in a piconet hop together
– Master gives slaves its clock and device ID
• Non-piconet devices are in standby
Scatternet:
• Devices can be slave in one Piconet and master of another
Physical links:
• Synchronous Connection Oriented (SCO)
– Support symmetrical, circuit-switched, point-to-point connections
– Typically used for voice traffic.
– Data rate is 64 kbit/s.
• Asynchronous Connection-Less (ACL)
– Support symmetrical and asymmetrical, packet-switched, point-to-multipoint
connections.
– Typically used for data transmission .
– Up to 433.9 kbit/s in symmetric or 723.2/57.6 kbit/s in asymmetric
Bluetooth Layers:
Bluetooth Radio: specifics details of the air interface, including frequency, frequency hopping,
modulation scheme, and transmission power.
• the lowest defined layer of the Bluetooth specification
• operating in the 2,4 GHz ISM Band
• accomplishes spectrum spreading by frequency hopping (FHSS) from 2.402 GHz to 2.480
GHz
• 3 different power classes
• Power Class1: long range (100m,100mW)
• Power Class2: mid range (10m,1-2,5mW)
• Power Class3: short range (0.1-10m,1mW)
• signal strength adjustment
Baseband: concerned with connection establishment within a piconet, addressing, packet format,
timing and power control.
the physical layer of the Bluetooth that provides
Error correction
Flow control
Hopping sequence
Security
hopping through 79 channels
data is divided in packets
access code: e.g. timing synchronization
header: e.g. packet numbering, flow control, slave address
payload: voice, data or both
Connection Modes
describes the set of rules by which all bluetooth devices must abide in order to establish
a link a communicate with one another
STANDBY : not connected in a piconet
ACTIVE : active participation on the channel
Power Saving Modes
SNIFF : slave listens to the channel at a reduced rate (decreasing of duty cycle ) least
power efficient
HOLD : data transfer is held for a specific time period, medium power efficient
PARK : synchronized to the piconet but does not participate in traffic
Audio:
two codecs: PCM and CVSD
both at 64kbit/s
synchronous connection oriented(SCO) links
time-critical
no retransmission
errors appear as background noise
Link manager protocol (LMP): establishes the link setup between Bluetooth devices and
manages ongoing links, including security aspects (e.g. authentication and encryption), and
control and negotiation of baseband packet size.
provides authentication, link setup and link configuration including power surveillance
takes place as a service provider
communication with LM PDUs (protocol data units)
Logical link control and adaptation protocol (L2CAP): adapts upper layer protocols to the
baseband layer. Provides both connectionless and connection-oriented services.
provides a connection-oriented and connectionless service to upper layer
protocols with quality-of-service functions using multiplexing, segmentation and
reassembly
two link types defined in Baseband layer:
1. SCO (synchronous connection-oriented)
2. ACL (asynchronous connection-less)
BUT ONLY ACL is supported by L2CAP (SCO not planned)
Service discovery protocol (SDP): handles device information, services, and queries for service
characteristics between two or more Bluetooth devices.
discovers which services are available
identifies the characteristics of the services
uses a request/response model where each transaction consists of one request protocol
data unit (PDU) and one response PDU
SDP is used with L2CAP
is optimized for the dynamic nature of bluetooth
SDP does not define methods for accessing services
Host Controller Interface (HCI): provides an interface method for accessing the Bluetooth
hardware capabilities. It contains a command interface, which acts between the Baseband
controller and link manager.
provides a command interface to baseband controller and link manager
also to hardware status, control and event register
Bluetooth defined Host Controller Transport Layers:
UART (HCI over serial interface)
RS232(HCI over serial interface)
USB(HCI over USB interface e.g. USB dongle)
RFCOMM (Radio Frequency Communication):
Provides emulation of serial ports
Supports up to 60 simultaneous connections
Differentiates between two device types:
Type 1: communication end points (e.g. printer or headsets)
Type 2: devices which are part of communication (e.g. modems)
Datagram Networks:
In datagram approach each packet is treated independently with no reference to packets that
have gone before. No connection is set up.
The packets may take different paths to the destination
The packets might arrive in a different sequence from the order in which they were sent
The packets may have to be reordered at the destination
Packets may go missing
Up to receiver to re-order packets and recover from missing packets
More processing time per packet per node
Size of the packet depends on the protocol and network
Packets switched networks are connectionless, hence no resource allocation
Connectionless means the switch does not keep information about the connection state.
Datagram switching is done at network layer
Virtual-Circuit Networks:
In the Virtual Circuit approach a pre-planned route is established before any packets are sent.
There is a call set up before the exchange of data (handshake).
A logical connection is established before any packets are sent
All packets follow the same path through the network
This does not mean that there is a dedicated path, as in circuit switching
All packets follow the same route and therefore arrive in sequence.
Each packet contains a virtual circuit identifier instead of destination address
More set up time
No routing decisions required for each packet - Less routing or processing time.
Susceptible to data loss in the face of link or node failure
Clear request to drop circuit
Not a dedicated path
Source-to-Destination data transfer
Virtual circuits can be either permanent, called Permanent virtual Circuits (PVC), or temporary,
called Switched Virtual Circuits (SVCs).
Permanent Virtual Circuit (PVC)
A Permanent Virtual Circuit (PVC) is a virtual circuit that is permanently available to the user.
PVC is defined in advance by a network manager. The actual identifier used for data transfer is
virtual circuit identifier (VCI). If permanent, an outgoing VCI is given to the source, and an
incoming VCI is given to the destination.
The source always uses this out going VCI to send frames to this particular destination.
The destination knows that the frame is coming from that particular source if the frame carries the
corresponding incoming VCI.
Once a communication session is complete, the virtual circuit is disabled.
Switched Virtual Circuit (SVC)
A switched virtual circuit is an automatically and temporarily created logical path with aid of some
switch control for a communication session switch control for a communication session
Once a communication session is complete, the virtual circuit is disabled.
FRAME RELAY:
X.25
Interface between attached station and link to node
Data terminal equipment DTE (user equipment)
Data circuit terminating equipment DCE (node)
Uses physical layer specification X.21
Interface between host and packet switched network
Almost universal on packet switched networks and packet switching in ISDN
Defines three layers
Physical
Link
Packet
Frame Relay:
Frame Relay (FR) is a high-performance WAN protocol that operates at the physical and
data link layers of the OSI reference model.
FR originally was designed for use across Integrated Service Digital Network (ISDN)
interfaces.
Today, it is used over a variety of other network interfaces as well.
FR is an example of a packet-switched technology.
Packet-switched networks enable end stations to dynamically share the network medium
and the available bandwidth.
Packet switching system with low overhead
Assumes very reliable high-quality physical network
Developed for use in ISDN networks
Used widely in a variety of private and public networks which are not ISDN
No error checking and acknowledgment at the data link layer
All error checking is left to the protocols at the network and transport layers
operates at only the physical and data link layers
Physical Layers: no specific protocol is defined for the physical layer. It is left to the
implementers.
Data Link Layer:
employ a simplified version of HDLC - HDLC fields for extensive error checking and flow
control not needed.
Addressing and control fields combined into one field.
Frame fields
Addressing(DLCI) fields: two parts (6bits, 4bits). A part of the 16-bit data link connection
identifier.
Command/Response(C/R): allows upper layers to identify a frame as either a command or
a response.
Extended address (EA):EA=0 another address byte follows, EA=1 the current byte is the
final one.
Forward explicit congestion notification (FECN): initiated when a DTE device sends Frame
Relay frames into the network. When the frames reach the destination DTE device, the
frame experienced congestion in the path from source to destination. flow-control may be
initiated, or the indication may be ignored.
Backward explicit congestion notification (BECN): DCE devices set the value of the BECN
bit to 1 in frames traveling in the opposite direction, informs the receiving DTE device that
a particular path through the network is congested. flow-control may be initiated, or the
indication may be ignored.
Discard eligibility (DE) : (DE) bit is used to indicate that a frame has lower importance than
other frames. When the network becomes congested, DCE devices will discard frames
with the DE bit
Congestion Control
does not solve the problem, but does provide ways to lessen the probability of its
occurrence
A switch in a PVC warns its downstream switches and destination by turning on the FECN
bit
The receiver, in turn, set BECN to warn upstream switches and the sender that the link is
congested and to send frames more slowly.
This option can not be used unless the channel is either full- or half-duplex and the
receiver is sending its own data or acknowledgments to the sender
ATM OVERVIEW
Used in both WAN and LAN settings
Signaling (connection setup) Protocol:
Packets are called cells (53 bytes)
5-byte header + 48-byte payload
Commonly transmitted over SONET
other physical layers possible
Connections can be switched (SVC), or permanent (PVC).
ATM operates on a best effort basis.
ATM guarantees that cells will not be disordered.
Two types of connections:
Point-to-point
Multipoint (Multicast)
Four Types of Services:
CBR (Constant Bit Rate)
VBR (Variable Bit Rate)
ABR (Available Bit Rate) Flow Control, Rate-based, Credit- based
UBR (Unspecific Bit Rate) No Flow control.
ATM Characteristics
No error protection or flow control on a link-by-link basis.
ATM operates in a connection-oriented mode.
The header functionality is reduced.
The information field length is relatively small and fixed.
All data types are the same
ATM NETWORKS
Public ATM Network:
Provided by public telecommunications carriers (e.g., AT&T, MCI WorldCom, and
Sprint)
Interconnects private ATM networks
Interconnects remote non-ATM LANs
Interconnects individual users
Private ATM Network:
Owned by private organizations
Interconnects low speed/shared medium LANs (e.g., Ethernet, Token Ring, FDDI)
as a backbone network
Interconnects individual users as the front-end LAN for high performance or
multimedia applications
How ATM Works?
ATM is connection-oriented -- an end-to-end connection must be established and routing
tables setup prior to cell transmission
Once a connection is established, the ATM network will provide end-to-end Quality of
Service (QoS) to the end users
All traffic, whether voice, video, image, or data is divided into 53-byte cells and routed in
sequence across the ATM network
Routing information is carried in the header of each cell
Routing decisions and switching are performed by hardware in ATM switches
Cells are reassembled into voice, video, image, or data at the destination
ATM Protocol Architecture
Reference Model Planes
user plane
provides for user information transfer
control plane
call and connection control
management plane
plane management
• whole system functions
layer management
• Resources and parameters in protocol entities
ATM Logical Connections
virtual channel connections (VCC)
analogous to virtual circuit in X.25
basic unit of switching between two end users
full duplex
fixed size cells
also for
user-network exchange (control)
ATM VIRTUAL CIRCUITS
VC transport: cells carried on VC from source to destination
call setup, teardown for each call before data can flow
each packet carries VC identifier (not destination ID)
every switch on source-dest path maintain “state” for each passing connection
link,switch resources (bandwidth, buffers) may be allocated to VC: to get circuit-like
perf.
Permanent VCs (PVCs)
long lasting connections
typically: “permanent” route between to IP routers
Switched VCs (SVC):
dynamically set up on per-call basis
The virtual channel (VC) is the fundamental unit of transport in a B-ISDN. Each ATM cell
contains an explicit label in its header to identify the virtual channel.
a Virtual Channel Identifier (VCI)
a Virtual Path Identifier (VPI)
A virtual channel (VC) is a communication channel that provides for the transport of
ATM cells between two or more endpoints for information transfer.
A Virtual Channel Identifier (VCI) identifies a particular VC within a particular VP over a
UNI or NNI.
A specific value of VCI has no end-to-end meaning.
•Physical Layer: The lowest layer in the ATM protocol. It describes the physical
transmission media. We can use shielded and unshielded twisted pair, coaxial cable, and
fiber-optic cable.
• ATM Layer: It performs all functions relating to the routing and multiplexing of cells over
VCs. It generates a header to the segment streams generated by the AAL. Similarly, on
receipt of a cell streams, it removes the header from the cell and pass the cell contents to
the AAL protocol. To perform all these functions, the ATM layer maintains a table which
contains a list of VCIs.
• ATM Adaptation Layer: Top layer in the ATM protocol Model. It converts the submitted
information into streams of 48-octet segments and transports these in the payload field of
multiple ATM cells. Similarly, on receipt of the stream of cells relating to the same call, it
converts the 48-octet information field into required form for delivery to the particular
higher protocol layer. Currently five service types have been defined. They are referred to
as AAL1-5. AAL1 and AAL2 are connection oriented. AAL1 provides a constant bit rate
(CBR) service, where as AAL2 provides a variable bit rate (VBR) service. Initially, AAL 3
was defined to provide connection oriented and VBR service. Later, this service type was
dropped and it is now merged with AAL 4. Both AAL ¾ and AAL 5 provide a similar
connectionless VBR service.
• “adapts” upper layers (IP or native ATM applications) to ATM layer below
• AAL exists only in end systems, not in switches
• AAL layer segment (header/trailer fields, data) fragmented across multiple ATM cells
• AAL Services
• Handle transmission errors
• Segmentation/reassembly (SAR)
• Handle lost and misinserted cell conditions
• Flow control and timing control
AAL SUBLAYERS
AAL layer has 2 sublayers:
Convergence Sublayer (CS)
Supports specific applications using AAL
manages the flow of data to and from SAR sublayer
Timing and cell loss recovery
Segmentation and Reassembly Layer (SAR)
Packages data from CS into cells and unpacks at other end
AAL Types:
AAL 1 (Constant Bit Rate) Functions
Constant-bit-rate source
SAR simply packs bits into cells and unpacks them at destination
Emulation of DS1 and DS3 Circuits
Distribution with forward error correction
Handle cell delay for constant bit rate
Transfer timing information between source and destination
Transfer structure information (structure pointer)
Provide indication of unrecoverable lost or error information
SAR PDU
Cell Format
40 2 4 10 352 (44 bytes) 6 10
Type
BOM: beginning of message
COM: continuation of message
EOM end of message
SEQ: sequence of number
MID: message id
Length: number of bytes of PDU in this cell
AAL 5 PDU Structure
is used to transport IP datagrams over ATM networks.
The Simple and Efficient Adaptation Layer (SEAL), attempts to reduce the complexity and
overhead of AAL 3/4.
It eliminates most of the overhead of AAL 3/4.
AAL 5 comprise a convergence sublayer and a SAR sublayer, although the SAR is
essentially null.
Streamlined transport for connection oriented protocols
Reduce protocol processing overhead
Reduce transmission overhead
Ensure adaptability to existing transport protocols
AAL5
CS-PDU Format
< 64 KB 0– 47 bytes 16 16 32
MODULE III
Internetworking:
Each network interface on the Internet as a unique global address, called the IP address. An IP address-
is 32 bits long. It encodes a network number and a host number. The address space of IPv4 is 232 or
4,294,967,296.
IP addresses are written in a dotted decimal notation:
Classful Addressing:
In classful addressing, the address space is divided into five classes: A, B, C, D, and E.
Class A networks
–First octet values range from 1 through 127
–First octet starts with bit 0
–Network mask is 8 bits, written /8 or 255.0.0.0
–1.0.0.0 through 127.0.0.0 are class A networks with 16777214 hosts each.
Class B networks
-First octet values range from 128 through 191
–First octet starts with binary pattern 10
–Network mask is 16 bits , written /16 or 255.255.0.0
–128.0.0.0 through 191.255.0.0 are class B networks, with 65534 hosts each.
Class C networks
First octet values range from 192 through 223
–First octet starts with binary pattern 110
–Network mask is 24 bits , written /24 or 255.255.255.0
–192.0.0.0 through 223.255.255.0 are class C networks, with 254 hosts each.
Class D addresses
– First octet values range from 224 through 239
– First octet starts with binary pattern 1110
– Class D addresses are multicast addresses.
Class E addresses
– Reserved for future use.
The mask
•The network portion of the address is separated from the host portion of the address by a mask.
•The mask simply indicates how many bits are used for the network portion, leaving the remaining
bits for the host portion.
•A 24-bit mask indicates that the first 24 bits of the address are network bits, and the remaining 8
bits are host bits.
•A 16-bit mask indicates that the first 16 bits of the address are network bits, and the remaining
16 bits are host bits.
Subnet Mask:
Subnet masks are used to make classful networks more manageable and efficient, by creating
smaller subnets and reducing the number of host addresses per subnet to what is actually
required.
• Subnet masks were first used on class boundaries.
• Example
– Take class A network 10.0.0.0 with network mask 255.0.0.0.
– Add additional 8 subnet bits to network mask.
– New subnet mask is 255.255.0.0.
– New subnets are 10.0.0.0, 10.1.0.0, 10.2.0.0, and so on with 65534 host addresses per subnet.
Still too many hosts per subnet.
• Example
– Take class A network 10.0.0.0 with network mask 255.0.0.0.
– Add additional 16 subnet bits to network mask.
– New subnet mask is 255.255.255.0
– New subnets are 10.0.0.0, 10.0.1.0, 10.0.2.0, …, 10.1.0.0, 10.1.1.0, 10.1.2.0, …, 10.2.0.0,
10.2.1.0, 10.2.2.0, and so on with 254 host addresses per subnet.
ROUTING:
Static routing:
• Static routes are manually entered into a router or host.
• An administrator must know the internetwork layout and the paths that exist between networks.
• Then the administrator must program each router in the internetwork with the proper routes to
get from any given network to any other network.
• The hosts obtain their routes manually or via DHCP.
Dynamic routing
• Dynamic routes are routes learned via one or more routing protocols.
• Routing protocols are used by routers to inform one another of the IP networks accessible to
them.
• There are classful routing protocols, such as RIPv1, that do not transmit masks in their routing
updates - the classful network mask is implied.
• There are also classless routing protocols, such as OSPF, that do transmit masks in their
routing updates.
• Routing protocols typically do not apply to hosts. Hosts obtain their routes by manual
configuration or by DHCP.
Static vs. dynamic routing
The main difference between static routes and dynamic routes is that first one is entered in
manually and the other is learned and/or calculated dynamically.
• The big differentiator, however, is in how the routers adapt to sporadic changes in network
topology caused by outages.
• A statically routed network has almost no way of adapting to temporary topology changes. But
routing protocols are designed for this purpose.
• A key factor in designing networks and choosing a routing protocol is convergence time, which
is the time it takes for the network as a whole to discover its topology and reach a steady state.
• In general, the shorter the convergences time the better. A network that converges quickly can
better compensate for unexpected outages.
Routing Protocol Category:
• Exterior Routing Protocols – used for use between different organizations such as ISPs
or ISPs and their customers.
– Ex: Border Gateway Protocol (BGP)
• Interior Routing Protocols – used to distribute routing information inside a single
organization.
– Ex: RIP, IGRP, EIGRP, OSPF, IS-IS
Interior vs. Exterior Gateway Protocols
• IGPs are used to exchange routing information with routers in the same autonomous
system (AS).
• An AS is a collection of networks under a common administrative domain, which
basically means that all routers sharing the same routing table information are in the
same AS.
• EGPs are used to communicate between Ass such as in WAN links.
Three Classes of Routing Protocols:
• Distance Vector – finds the best path to a remote network using hop count. (RIP, IGRP)
• Link State – (also called shortest-path-first protocols) – the routers each create three
separate tables. 1) keeps track of directly attached neighbors, 2) topology of network, 3)
the routing table. (OSPF, IS-IS)
• Hybrid – uses aspects of both distance vector and link state. (EIGRP)
Approaches to Routing – Distance-vector
• Each node (router or host) exchange information with neighboring nodes
— Neighbors are both directly connected to same network
• Node maintains vector of link costs for each directly attached network and distance and
next-hop vectors for each destination
• Used by Routing Information Protocol (RIP)
• Requires transmission of lots of information by each router
— Distance vector to all neighbors
— Contains estimated path cost to all networks in configuration
— Changes take long time to propagate
— In practice, Bellman Ford algorithm
Approaches to Routing – Link-state
• Designed to overcome drawbacks of distance-vector
• When router initialized, it determines link cost on each interface
• Advertises set of link costs to all other routers in topology
— Not just neighboring routers
• From then on, monitor link costs
— If significant change, router advertises new set of link costs
• Each router can construct topology of entire configuration
— Can calculate shortest path to each destination network
• Router constructs routing table, listing first hop to each destination
• Router does not use distributed routing algorithm
— Use any routing algorithm to determine shortest paths
— In practice, Dijkstra's algorithm
• Open shortest path first (OSPF) protocol uses link-state routing.
Exterior Router Protocols –Path-vector
• Dispense with routing metrics
• Provide information about which networks can be reached by a given router and ASs
crossed to get there
— Does not include distance or cost estimate
• Each block of information lists all ASs visited on this route
— Enables router to perform policy routing
— E.g. avoid path to avoid transiting particular AS
— E.g. link speed, capacity, tendency to become congested, and overall quality of
operation, security
— E.g. minimizing number of transit Ass
IPV4 Header:
• Version
— Currently 4
— IP v6 - see later
• Internet header length
— In 32 bit words
— Including options
— minimum 5
• DS (Differentiated Services) and ECN (Explicit Congestion Notification)
— previously used for “Type of Service”
— now used by (interpreted as) DS and ECN
— DS is for QoS support (that we will not cover)
— we will see the concept of Explicit Congestion Notification later
• Total length
— of datagram (header + data), in octets
• Identification
— Sequence number
— Used with addresses and user protocol to identify datagram uniquely
• Flags
— More bit
— Don’t fragment
• Fragmentation offset
• Time to live
• Protocol
— Next higher layer to receive data field at destination
• Header checksum
— Verified and recomputed at each router
• Source address
• Destination address
• Options
• Padding
— To fill to multiple of 32 bits long
Advantages of IPV6 over IPV4
• Expanded address space
— 128 bit
— 6*1023 addresses per square meter on earth!
• Improved option mechanism
— Separate optional headers between IPv6 header and transport layer PDU
— Some are not examined by intermediate routers
• Improved speed and simplified router processing
— Easier to extend with new options
• Flexible protocol
• Support for resource allocation
— Labeling of packets for particular traffic flow
— Allows special handling
• e.g. real time video
IPv6 Packet with Extension Headers
• Hop-by-Hop Options
— special options that require hop-by-hop processing
• Routing
— Similar to source routing
• Fragment
— fragmentation and reassembly information
• Authentication
— Integrity and Authentication
• Encapsulating security payload
— Privacy and Confidentiality (plus optional authentication)
• Destination options
— Optional info to be processed at destination node
RARP
RARP finds the logical address for a machine that only knows its physical address.
The RARP request packets are broadcast; the RARP reply packets are unicast.
Encapsulation of RARP packet:
The transport layer is an end-to-end layer – this means that nodes within the subnet do
not participate in transport layer protocols – only the end hosts.
As with other layers, transport layer protocols send data as a sequence of packets
(segments).
The network layer provides communication between two hosts.
The transport layer provides communication between two processes running on
different hosts.
A process is an instance of a program that is running on a host.
There may be multiple processes communicating between two hosts – for example,
there could be a FTP session and a Telnet session between the same two
hosts.
• Congestion Control
TCP assumes the cause of a lost segment is due to congestion in the network
If the cause of the lost segment is congestion, retransmission of the segment does
not remove the problem, it actually aggravates it
The network needs to tell the sender to slow down (affects the sender window size
in TCP)
Actual window size = Min (receiver window size, congestion window size)
The congestion window is flow control imposed by the sender
The advertised window is flow control imposed by the receiver
• PSH bit indicates PUSHed data. The receiver hereby kindly requested to deliver the
data to the application upon arrival and not buffer it (done for efficiency)
• RST bit is used to reset a connection that has become confused due to a host
crash or some other reason. It is also used to reject an invalid segment or refuse
an attempt to open a connection.
• SYN bit is used to establish connections. SYN=1 and ACK=0 – connection request,
SYN=1 and ACK=1 – connection accepted.
• FIN but is used to release a connection. It specifies that the sender has no more
data to transmit.
Window size field tells how many bytes may be sent starting at the byte acknowledged.
A Checksum is also provided for extreme reliability – it checksums the header and the
data.
Options field was designed to provide a way to add extra facilities not covered by the
regular header. For example, allow each host to specify the maximum TCP payload it is
willing to accept. (using large segments is more efficient than using small ones)
SYN: Synchronize
ACK: Acknowledge
• FIN: Finish
• Step 1 can be sent with data
• Steps 2 and 3 can be combined into 1 segment
UDP
The Internet protocol suite also supports a connectionless transport protocol, UDP (User
Data Protocol)
UDP provides a way for applications to send encapsulated raw IP datagrams and send
them without having to establish a connection.
Many client-server applications that have 1 request and 1 response use UDP rather than
go to the trouble of establishing and later releasing a connection.
A UDP segment consists of an 8-byte header followed by the data.
UDP Header
The two ports serve the same function as they do in TCP: to identify the end points
within the source and destination machines.
The UDP length field includes the 8-byte header and the data.
The UDP checksum is used to verify the size of header and data.
CONGESTION
Congestion in a network may occur if the load on the network-the number of packets sent to the
network-is greater than the capacity of the network-the number of packets a network can handle.
Congestion control refers to the mechanisms and techniques to control the congestion and keep
the load below the capacity.
Congestion in a network or internetwork occurs because routers and switches have queues-
buffers that hold the packets before and after processing.
Network Performance
Congestion control involves two factors that measure the performance of a network: delay
and throughput. Figure shows these two performance measures as function of load.
CONGESTION CONTROL
Congestion control refers to techniques and mechanisms that can either prevent congestion,
before it happens, or remove congestion, after it has happened. we can divide congestion control
mechanisms into two broad categories: open-loop congestion control (prevention) and closed-
loop congestion control (removal) as shown in Figure.
Choke Packet
A choke packet is a packet sent by a node to the source to inform it of congestion. In
backpressure, the warning is from one node to its upstream node, although the warning may
eventually reach the source station. In the choke packet method, the warning is from the router,
which has encountered congestion, to the source station directly. The intermediate nodes through
which the packet has travelled are not warned.
Implicit Signaling
In implicit signaling, there is no communication between the congested node or nodes and the
source. The source guesses that there is a congestion somewhere in the network from other
symptoms.
Explicit Signaling
The node that experiences congestion can explicitly send a signal to the source or destination.
The explicit signaling method, however, is different from the choke packet method. In the choke
packet method, a separate packet is used for this purpose; in the explicit signaling method, the
signal is included in the packets that carry data. Explicit signalling can occur in either the forward
or the backward direction.
Backward Signaling A bit can be set in a packet moving in the direction opposite to the congestion.
This bit can warn the source that there is congestion and that it needs to slow down to avoid the
discarding of packets.
Forward Signaling A bit can be set in a packet moving in the direction of the congestion. This bit
can warn the destination that there is congestion. The receiver in this case can use policies, such
as slowing down the acknowledgments, to alleviate the congestion.
Congestion Avoidance: Additive Increase If we start with the slow-start algorithm, the size of
the congestion window increases exponentially. To avoid congestion before it happens, one must
slow down this exponential growth. TCP defines another algorithm called congestion avoidance,
which undergoes an additive increase instead of an exponential one. When the size of the
congestion window reaches the slow-start threshold, the slow-start phase stops and the additive
phase begins. In this algorithm, each time the whole window of segments is acknowledged (one
round), the size of the congestion window is increased by 1.
In the congestion avoidance algorithm, the size of the congestion window increases additively
until congestion is detected.
Congestion Detection: Multiplicative Decrease If congestion occurs, the congestion window
size must be decreased. The only way the sender can guess that congestion has occurred is by
the need to retransmit a segment. However, retransmission can occur in one of two cases: when
a timer times out or when three ACKs are received. In both cases, the size of the threshold is
dropped to one-half, a multiplicative decrease.
An implementation reacts to congestion detection in one of the following ways:
❏ If detection is by time-out, a new slow start phase starts.
❏ If detection is by three ACKs, a new congestion avoidance phase starts.
FECN The forward explicit congestion notification (FECN) bit is used to warn the receiver of
congestion in the network. It might appear that the receiver cannot do anything to relieve the
congestion. However, the Frame Relay protocol assumes that the sender and receiver are
communicating with each other and are using some type of flow control at a higher level.
When two endpoints are communicating using a Frame Relay network, four situations may
occur with regard to congestion. Figure shows these four situations and the values of FECN and
BECN.
QUALITY OF SERVICE
Quality of service (QoS) is an internetworking issue that has been discussed more than defined. We
can informally define quality of service as something a flow seeks to attain.
Flow Characteristics
Traditionally, four types of characteristics are attributed to a flow: reliability, delay, jitter, and bandwidth.
Reliability
Reliability is a characteristic that a flow needs. Lack of reliability means losing a packet or
acknowledgment, which entails retransmission.
Delay
Source-to-destination delay is another flow characteristic.
Jitter
Jitter is the variation in delay for packets belonging to the same flow.
Bandwidth
Different applications need different bandwidths.
Scheduling
Packets from different flows arrive at a switch or router for processing. A good scheduling
technique treats the different flows in a fair and appropriate manner. Several scheduling
techniques are designed to improve the quality of service. We discuss three of them here:
FIFO queuing, priority queuing, and weighted fair queuing.
FIFO Queuing
In first-in, first-out (FIFO) queuing, packets wait in a buffer (queue) until the node (router or switch)
is ready to process them. If the average arrival rate is higher than the average processing rate,
the queue will fill up and new packets will be discarded.
Priority Queuing
In priority queuing, packets are first assigned to a priority class. Each priority class has its own
queue. The packets in the highest-priority queue are processed first. Packets in the lowest-priority
queue are processed last.
Traffic Shaping
• Traffic shaping controls the rate at which packets are sent (not just how many)
• At connection set-up time, the sender and carrier negotiate a traffic pattern (shape)
• Two traffic shaping algorithms are:
– Leaky Bucket
– Token Bucket
The Leaky Bucket Algorithm
• The Leaky Bucket Algorithm used to control rate in a network. It is implemented as a single-server
queue with constant service time. If the bucket (buffer) overflows then packets are discarded.
• The leaky bucket enforces a constant output rate regardless of the burstiness of the input. Does
nothing when input is idle.
• The host injects one packet per clock tick onto the network. This results in a uniform flow of packets,
smoothing out bursts and reducing congestion.
• When packets are the same size (as in ATM cells), the one packet per tick is okay. For variable length
packets though, it is better to allow a fixed number of bytes per tick.
A simple leaky bucket implementation is shown in Figure below. A FIFO queue holds the packets. If the
traffic consists of fixed-size packets the process removes a fixed number of packets from the queue at
each tick of the clock. If the traffic consists of variable-length packets, the fixed output rate must be
based on the number of bytes or bits.
Name servers
The DNS name space is divided up into nonoverlapping zones, A zone normally has one primary name
server, which gets its information from a file on its disk, and one or more secondary name servers,
which get their information from the primary name server
When a resolver has a query about a domain name, it passes the query to one of the local name
servers.
If the domain being sought falls under the jurisdiction of the name server, it returns the authoritative
records (always correct).
Once these records get back to the local name server, they will be entered into a cache there (timer
controlled).
SNMP - Simple Network Management Protocol
The SNMP model
The SNMP model of a managed network consists of four components
1. Managed nodes.
2. Management stations.
3. Management information
4. A management protocol. Network management is done from management stations: general-purpose
computers with a graphical user interface.
ASN.1 - Abstract Syntax Notation 1
The heart of the SNMP model is the set of objects managed by the agents and read and written by the
management station.
To make multivendor communication possible, it is essential that these objects be defined in a standard
and vendor-neutral way.
Furthermore, a standard way is needed to encode them for transfer over a network.
A standard object definition language, along with encoding rules, is needed. The one used by SNMP is
taken from OSI and called ASN.1 (Abstract Syntax Notation One), defined in International Standard
8824.
The rules for encoding ASN.1 data structures to a bit stream for transmission are given in International
Standard 8825. The format of the bit stream is called the transfer syntax.
The basic idea:
The users first define the data structure types in their applications in ASN.1 notation.
When an application wants to transmit a data structure, it passes the data structure to the presentation
layer (in the OSI model), along with the ASN.1 definition of the data structure.
Using the ASN.1 definition as a guide, the presentation layer then knows what the types and sizes of
the fields in the data structure are, and thus knows how to encode them for transmission according to
the ASN.1 transfer syntax.
Using the ASN.1 transfer syntax as a guide, the receiving presentation layer is able to do any necessary
conversions from the external format used on the wire to the internal format used by the receiving
computer, and pass a semantically equivalent data structure to the application layer.
Electronic mail
E-mail has been around for over two decades.
The first e-mail systems: file transfer protocols plus the convention that the first line of each file
contained the recipient's address.
Complaints:
1. Inconvenient for sending to a group of people.
2. Messages had no internal structure, making computer processing difficult.
3. The originator (sender) never knew if a message arrived or not.
4. Hard to redirect incoming mails to another address.
5. Poor integration of the user interface with the transmission system.
6. Impossible to create and send messages containing a mixture of text, drawing, facsimile, and voice.
REF: www.veltechuniv.edu.in/ppt/CSE/U5CSA18-DCCN.doc
MAINREF: http://www.cs.science.cmu.ac.th/person/ekkarat/datacomm/ch10.ppt