Data Communication Compiled
Data Communication Compiled
The capacity to transfer high volume of data for a long distance almost immediately are
the features of network-based services. For example Internet provides e-mail,
information search and retrieval, various forms of electronic service.
In the year 1987 Samuel B. Morse demonstrated a practical telegraph that provided the
basis for telegram service, the transmission of text message over long distance. Here the
text was encoded into sequence of dots and dashes. Each dot and dash which is used to be
represented by short and long pulses of electrical current over a copper wire. By relying
on two signals, telegraphy made use of digital transmission system. In Morse code the
pause between letter was 3 dots and for word is 5 dots.
In the beginning communication channel used to carry information sent by one person.
Naturally transmission rate (in bits/second) was less. To increase the transmission rate
multiplexing was developed. Multiplexing is a technique used to place multiple signals
on a single communication channel. Multiplexing partitions a channel into many separate
channels, each capable of transmitting its own independent signal, thereby enabling many
different transmission over a single medium.
The telegraph service involves the transmission of text messages between geographically
far places. To provide the service , the architecture of the telegraph network contains the
following key elements or functions.
In 1876 Alexander Graham Bell developed a device that can transmit voice signals. The
device that is known as Telephone. The telephone network provides a two-way, real-time
transmission of voice signals across a network.
Telephone service became popular due to its voice service and expert operator with
knowledge of Morse code is not required like in the case of telegraph. Here voice signals
are converted into equivalent electrical signal and passed through cable.
COMMUNICATION FUNDAMENTALS
Communication concepts
Communication is the process of transmitting information. It’s a big, vague, fuzzy word
and broadly applied. The “Communications Department “ at a university may include
speech teachers, public relations specialists, writers and broadcasters, who have nothing
to do with hardware. By that definition , a writer is in the communication business.
Evolution of communications
We the human beings are communicating from early days that is by drawing the pictures
on cave walls. It can be how to attack the animal or how to the save the life from the
threats or it may be a route to go to another cave.
The earlier long-distance communications was by signal fires that relayed simple
information. The signal used to represent “yes” or “no” – the question being asked had to
be known beforehand. It’s only a single bit information, not a detailed message.
A written letter or a human messenger could carry more information. The first systems
we might call telecommunications were series of hilltop towers, built by French engineer
Claude Chappe in the 1790s. The towers had to be in sight of each other, with an
operator in each one. The operator relayed a message by moving arms on top of the
tower. The operator of the next tower looked through a telescope to watch the arms
move, reading the message, recording it, then moving the arms of his tower to relay it to
the next tower. Chappe invented a code that used arm position to indicate letters or
certain common words. His system was called an optical telegraph.
Samuel Morse’s electrical telegraph eventually replaced Chappe’s optical one. It also
required operators, but they used keys that completed an electrical circuit, sending bursts
of currents through a wire. The Morse code was a series of dots an dashes ( short and
long pulses) that represented letters.
The electrical telegraph spread across the continents and in 1866 across the Atlantic. Its
wires formed a network running between major cities. Telegraphers received signals and
either sent them for local delivery or relayed them to more distant stations. We can think
of each dot and dash of the telegraph as a bit of information.
Later Alexander Graham Bell developed telephone. He borrowed some principles from
the telegraph , but instead of transmitting dots and dashes, it sent a continuously changing
electrical current that represented a speaker’s voice. The telephone network was bigger
and more complex than the telegraph network.
After that radio waves are used to carry signals through air. Radio first carried telegraph
signals. Wires worked fine on land, but only radio could send telegrams to ships at sea
and relay urgent messages such as request for help. It was radio rescue calls that sent
ships to help the survivors of the sinking of the Titanic. Radio communications started
for ships and airplanes in the world war II.
Radio communication started at low frequencies, but gradually moved to higher ad higher
frequencies as electronics improved. The higher the frequency the more information the
signal can carry. Pictures need more transmission capacity than sound alone, so television
are broadcast at higher frequencies than audio radio.
By the 1970s , satellites were beaming radio signals around the globe. The telephone
system had become global and known popularly “telecommunication network” . We
could make phone calls to anywhere in the world.
After that fiber optics arrived. Fiber provides high bandwidth. It carries high capacity
information at faster rate. Now it is a integral part of telecommunication network.
Information is the one transmitted via communication. It may be very simple message
like “yes” or “no”. It can be huge and complex message, such as he files containing the
book or a television broadcast of a movie. It doesn’t matter if the “information” doesn’t
contain anything a critic might agree was “information”.
A signal transmits that information. Signals may take many forms, such as optical,
acoustic, electronic or radio-frequency. Signals may be converted from one form into
another and still contain the same information. When we make a long-distance telephone
call, the sound waves from our mouth are converted to an electrical signal at the
telephone, that electrical signal is converted to optical form at the telephone switching
office, back to electrical form at the local switching office on the other end and back to
sound waves at the other person’s telephone.
A system is the equipment that performs a task, like transmitting signals. We often speak
of telephone system as if it is the whole network of telephone equipment from our phone
to the high-capacity fiber-optics cables that carry long-distance calls. However, parts of
the telephone system also may be called systems, such as a switching systems that directs
phone calls. We can assume a system which is a collection of stuffs designed to work
together.
Syntax : Syntax refers to the structure or format of the data, meaning the order in which
they are presented. For example , a simple protocol might expect the first eight bits of
data to be the address of the sender , the second eight bits to be the address of receiver
and rest of the stream to be the message itself.
Semantics : Semantics refers to the meaning of each section of bits. How is a particular
pattern to be interpreted and what action is to be taken based on that information.
Timing : Timing refers to two characteristics. When data should be sent and how fast it
can be sent. For example , if a sender produces data at 100 Mbps but the receiver can
process data at only 1 Mbps, the transmission will overload and receiver and data will be
largely lost.
Standards
Standards are essential in creating and maintaining an open and competitive market fro
equipment manufacturers and in guaranteeing national and international operational
ability of data and telecommunication technology and processes. They provide
guidelines to manufacturers, vendors, government agencies and other service providers to
ensure the king of interconnectivity necessary in today’s marketplace and in international
communications.
1. de facto ( by fact)
2. de jure ( by law)
De jure standards are those that have been legislated by an officially recognized body.
Standards organization
Standards are developed by cooperation among standard creation committees forums and
government regulatory agencies.
Point-to-point
A point-to-point configuration provides a dedicated link between two devices. The entire
capacity of the channel is reserved for transmission between those two devices. Most
point-to-point line configuration use an actual length of wire or cable to connect the two
ends.
Broadcasting
A broadcast system send the same signal to everyone who receives it. In its usual form ,
transmission is one way, from the signal source to the individual. Local radio and
television transmission are good examples of pure one-way broadcast systems.
Switched systems
Networking
A network connects many terminals that can communicate with each other. For example
Local Area Network is belongs to this category.
Services
Radio and television broadcasting are probably the most common communication
services. Various stations transmit an ensemble of signals simultaneously over radio or
cable distribution networks.
Telephone service is the most common real-time service provided by a network. Two
people are able to communicate by transmitting their voices across the network. The
service is considered as connection-oriented in the sense that users must first interact with
the network to set up a connection
Telephone networks provide a broad class of call management services that use the
originating number or the destination number to determine the handling of a call. For
example , in call return the last originating number is retained to allow it to be
automatically called by the destination user at a later point in time. Caller ID allows the
originating number and sometimes name, of the originating call to be displayed to the
destination user when the receiving device is display capable. Voice mail allows a
destination user to have calls forwarded to a message receiving device when the
destination user is not available.
Cellular telephone service extends the normal telephone service to mobile users who are
free to move within a regional area covered by an interconnected array of smaller
geographical areas called cells. Each cell has a radio transmission system that allows it to
communicate with users in its area. Cellular system should handle “handoff” when user
moves from one area to another area.
Electronic mail (e-mail) is another popular network service. The user provides a text
message and a name and/or address to a mail application. The application interacts with a
local mail server, which in turn transmits the message to a destination server across a
computer network. The destination user retrieves the message by using a mail
application. E-mail is not a real-time service , where large delays can be tolerated. Here
security and privacy is matter of concern.
Streamed audiovisual services over the internet provide an example of a service with
some of the feature of video on demand. An application like “real player “ can be used to
access a channel that provides an audio visual stream to the client machine.
Another class of service is audio-visual conferencing. Here both audio and video are
transmitted over a distance. This service requires real-time response requirement. This
service is being used by many companies for training, client interaction from a site, group
discussion etc.
Broadcast television
Satellites TV Disk
Broadcast
Radio
P.C.
Step 1
Step 2
CHANNEL
Computing environments
5.0 Introduction
Depending the nature of the distances, protocols ( the set of rules used for
communication) the network can be classified into LAN (Local Area Network ), MAN
(Metropolitan Area Network ) and WAN ( Wide Area Network).
Local Area Network (LAN)
A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building. By definition, the connections must be high-
speed and relatively inexpensive (e.g., token ring or Ethernet). They function to link
computers together and provide shared access to printers, file servers, and other services.
A MAN ( Metropolitan Area Network) is used to connect computers to cover the city or
town. The range may be approximately 50 Kilometers. Normally cables and fiber optic
cables are used to connect computers. The routing of the messages are fast. Normally
central library in a city may be connected by a MAN, so users can access the information.
Figure 5.2 shows a typical view of Metropolitan Area Network.
Figure 5.2 Metropolitan Area Network
5.3 Internet
The internet is a massive wide area network ,connecting thousands of computer
networks around the world. The internet is a world wide “network of networks”. It is a
collection of thousands of smaller networks in different countries around the world. It
links thousands of academic government, military and public computers, enabling
millions of people to share information and other resources.
Internet pathways are used to exchange digitized computer data. The basic
services that form the foundation of the internet are e-mail , telnet and FTP. With internet
we can easily exchange electronic mail with friends and family anywhere in the world.
Telnet allows you to connect to a remote computer. We can access any of the
public services or tools and library databases at the remote site. FTP(File Transfer
Protocol) provides for transferring files from one computer to another across the internet.
Internet has many uses. For individuals, the most important uses of internet are e-
mail and surfing the Web. One can read the topics of interest like sports, a hobby, a
country or any place of interest.
E-mail:
The e-mail stands for electronic mail. One of the major features of computer
networking is that messages can be sent electronically to various terminals on the
network. The messages are sent very quickly and accurately. E-mail uses the concept of
Storing and forwarding messages. It saves a lot of money for the users. Here user
registers his/her account with one of the providers. The e-mail account normally contains
username and the provider name. For example abc @ yahoo.com , represents abc is the
name of the user , who is registered in yahoo provider.
5.4 Summary:
• Computer network is defined as a interconnection of autonomous computers.
• Computer networking enables us to connect computers to share data, application
software and hardware devices.
• Networks allow sharing of information among various computers and permit
users to share files.
• A LAN or local area network connects computers and peripherals in a limited
area.
• A MAN covers the city or town.
• A Wide Area Network covers a large area.
• The internet is a massive wide area network, connecting thousands of computer
networks around the world.
• E-mail is a cost effective communication
Answers
1. Autonomous
2. share
3. Local area
4. Internet
5. E-commerce
6. packets
5.6 Exercise
To reduce their design complexity, most networks are organized as a series of layers
or levels, each one built upon its predecessor. The number of layers, the name of the
each layer, the contents of each layer and the function of each layer differ from
network to network.
Interaction between the layers must be defined precisely. Interaction is done with
definition of the service provided by each layer and to the layer above. Interface
between layers through which a service is requested and through which results are
conveyed. New services that build on existing services can be introduced even at the
later stage. The layered approach accommodates incremental changes readily.
We know , in all networks, the purpose of each layer is to offer certain services to the
higher layers. The entities comprising the corresponding layers on different machines
are called peer processes. Between each pair of adjacent layers there is an interface.
The interface defines which primitive operations and services the lower layer offers to
the upper one. The set of layers and protocols is called the network architecture.
A protocol is a set of rules that governs how two or more communicating devices are
to interact. HTTP protocol enables retrieval of web pages and TCP protocol enables
the reliable transfer of streams of information between computers.
HTTP
First of all, client needs to perform a DNS query to obtain the IP address
corresponding to the domain name. This step is done by sending a message to a DNS
server. The Domain Name System (DNS) is a distributed database that resides in
multiple machines on the Internet and is used to convert between names and
addresses and to provide e-mail routing information. Each DNS machine maintains its
own database and acts as a DNS server that other query machine can query. Initially
requesting machine accesses a local name server. In case if it not possible to resolve
names then it will be sent to the root server. When the root server is unable to resolve
, it will be sent to authoritative name server. Every machine on the Internet is required
to register with at least two authoritative name servers.
DNS query and response messages are transmitted by using the communication
service provided by the User Datagram Protocol (UDP). Port 53 is used for
communication. The UDP service is connectionless, no connection setup is required
and the datagram is sent immediately.
SMTP
Simple Mail Transfer Protocol is used for sending mails. The user prepares an e-mail
message that includes the recipient’s e-mail address, a subject line and a body. User
clicks send button to send the information. Let us consider the steps are used in
sending the e-mail.
• The mail application establishes a TCP connection (port 25) to its local SMTP
server.
• SMTP daemon issues the message to the client, indicating that it is ready to
receive mail
• Client send s a HELO message and identifies itself.
• SMTP daemon issues a 250 message, indicating the client may proceed.
• Client sends sender’s address
• If successful, SMTP daemon replies with a 250 message
• Client sends recipient’s address.
• A 250 message is returned
• Client sends a DATA message requesting permission to send the mail message
• The daemon sends a message giving the client permission to send
• Client sends the actual text
• Daemon indicates that the message is accepted for delivery. A message ID is
returned.
• Client indicates that mail session is over.
• Daemon confirms the end of the session.
SMTP works best when the destination machine is always available, for this reason,
users in a PC environment usually retrieve their e-mail from a a mail server using the
Post Office Protocol version 3 (POP 3).
TCP provides for reliable transfer of a byte stream between processes in hosts
attached to the Internet. TCP involves the establishment of a connection between the
two processes. To provide their service, the TCP entities implements error detection
and retransmission as well as flow control algorithms. TCP implements congestion
control, which regulates the flow of segments into the network.
File sharing applications such as Napster and Gnutella are popular for sharing the
MP3 audio and other files. Here clients can also acts as transient server while the
application is activated. When a peer is interested in finding a certain file, it sends a
query. The response provides a list of peer s that have the file and additional
information such as the speed of each peer’s connection to the Internet. The
requesting peer can then set up a TCP connection to one of the peers in the list and
proceeded to retrieve the file.
The model proposed by ISO OSI ( Open System Interconnection) reference model
because it deals with connecting open systems that is systems that are open for
communication with other systems. The OSI model has seven layers.
The concepts related to layers are
i) A layer should be created where a different level of abstraction is needed.
ii) Each layer should perform a well defined function
Iii) The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
Iv) The layer boundaries should be chosen to minimise the information flow across
the interface.
v) The number of layers should be larger enough that distinct functions need not be
thrown together in the same layers out of necessity and small enough that the
architecture does not become unwieldy.
Please Do Not Touch Sita’s Pet Animal , Where the beginning letter of each word
represent the layer name. Like P in Please word stands for Physical layer, D letter in
Do word stands for Data link layer and so on. Let us see the functions of the layers.
Physical layer
The physical layer deals with the transfer of bits over a communication channel.
Physical layer concerned with the representation of signals. How to represents 1 and
how represent 0. Which type of encoding mechanism should be used for representing
the bits.This layer is concerned with the procedures to set up and release the physical
connections.
High level data link control (HDLC) and Point-to-point protocol (PPP) are the two
standard data link protocol that are wide in use. A flat addressing space is used to
enable machines to listen and recognize frames that are destined to them.
Network layer
The network layer provides for the transfer of data in the form of packets across a
communication network. It uses the hierarchical way of addressing scheme. Routing
protocol is the procedure that is used to select paths across a network. The nodes in
the network must work together to perform the routing effectively. Network layer is
responsible for dealing with congestion that occurs from time to time in the network.
When the two machines are connected to the same packet-switching network, single
address space and routing procedure are used.
If two machines are connected to the different networks, the transfer of data must
traverse two or more networks and hence internetworking protocols are necessary to
route the data between gateways/routers that connects the intermediate networks.
Transport layer
The transport layer is responsible for the end-to-end transfer of messages from a
process in the source machine to a process in the destination machine. The transport
layer protocol accepts messages from its higher layers and prepares blocks of
information called segments or datagram's for transfer between end machines.
Presentation layer
The presentation layer provide the application layer with independence from
difference in the representation of data. Presentation layer should convert the
machine-dependent information provided by application A into a machine-dependent
form suitable for application B, because different computers use different codes for
representing characters and integers.
Application layer
The application layer is to provide services that are frequently required by
applications that involve communications. For example browser application use
HTTP application layer protocol to access a WWW document. Application layers
protocols have been developed for file transfer, virtual terminal, electronic mail, name
service, network management and other applications.
In general each layer adds a header and possibly a trailer to the block of information it
accepts from the layer above.
The following table shows the different functions carried out by different layers OSI
model.
Layer Description Examples
FT
Application Protocols that are designed to meet the communication requirements of HTTP, , SMTP,
specific applications, often defining the interface to a service. P
CORBA IIOP
Presentation Protocols at this level transmit data in a network representation that is Secure Sockets
independent of the representations used in individual computers, which may (SSL),CORBA Data
differ. Encryption is also performed in this layer, if required. Rep.
Session At this level reliability and adaptation are performed, such as detection of
failures and automatic recovery.
Transport This is the lowest level at which messages (rather than packets) are handled. TCP, UDP
Messages are addressed to communication ports attached to processes,
Protocols in this layer may be connection-oriented or connectionless.
Network Transfers data packets between computers in a specific network. In a WAN IP, ATM virtual
or an internetwork this involves the generation of a route passing through circuits
routers. In a single LAN no routing is required.
Data link Responsible for transmission of packets between nodes that are directly Ethernet MAC,
connected by a physical link. In a WAN transmission is between pairs of ATM cell transfer,
routers or between routers and hosts. In a LAN it is between any pair of hosts. PPP
Physical The circuits and hardware that drive the network. It transmits sequences of Ethernet base- band
binary data by analogue signalling, using amplitude or frequency modulation signalling, ISDN
of electrical signals (on cable circuits), light signals (on fibre optic circuits)
or other electromagnetic signals (on radio and microwave circuits).
The development of OSI reference model leads the world to the development of unified
view of layers, protocols and services. In each layer a process on one machine carries out
a conversation with a peer process on the other machine across a peer interface. This is
shown below.
Courtesy : Data communication networks by Alberto Leon - Garcia
For communication to take place, the layer n+1 entities make use of the services
provided by layer n. The transmission of the layer n+1 PDU is done by passing a
block of information from layer n+1 to layer n through a software port called the
layer n service access point (SAP) across a service interface. SAP is identified by a
unique identifier. The block of information passed between layer n and layer n+1
entities consists of control information and a layer n service data unit (SDU), which
is the layer n+1 PDU itself. The layer n SDU, which is the layer n+1 PDU, is
encapsulated in the layer n PDU. The service provided by layer n typically accepting
a block of information from layer n+1, transferring the information to its peer
process.
Courtesy : Data communication networks by Alberto Leon - Garcia
In connectionless service which does not require a connection setup and each SDU is
transmitted directly through the SAP. Suppose a layer n SDU is too large to be
handled by the layer n-1 and so segmentation and reassembly are applied. The layer n
SDU is segmented into multiple layer n PDUs that are then transmitted using the
services of layer n-1. The layer n entity at the other side must reassemble the original
layer n SDU from the sequence of layer n PDUs it receives. It is also possible that the
layer n SDUs are so small as to result in inefficient use of the layer n-1 services and
so blocking and unblocking applied. The layer n entity may block several layer n
SDUs into a single layer n PDU . The layer n entity on the other side must then
unblock the received PDU into the individual SDUs.
Multiplexing involves the sharing of a layer n services by multiple layer n+1 users.
The N+1 layer users passes its SDUs for transfer using the services of a single layer
n entity. Demultiplexing is carried out by the layer n entity at the other end.
The tcp/ip network architecture is a set of protocols that allows communication across
multiple diverse networks. Tcp/ip provides robustness with regard to failures in the
network and on flexibility in operating over heterogeneous networks. We know
Internet consists of different types computer systems and networks. Tcp/ip which
consists of 4 layers and OSI model consists of 7 layers. The following figure shows
the TCP/Ip architecture.
Application layer
The application layer provides services that are used by the applications. Examples
are remote login, e-mail, ftp, network management.The TCP/IP application layer
incorporates the functions of the top three OSI layers. HTTP is a TCP/IP application
layer protocol.
Transport Layer
The TCP/IP application layer programs are directly run through transport layer.
Two basic types of services are provided by transport layer.
The first one is connection-oriented , which is provided by Transmission Control
Protocol (TCP).
The second service is best-effort connectionless transfer of individual messages,
which is provided by the user datagram protocols (UDP). Here in connection-less
service no mechanism for error recovery or flow control.
UDP is used for applications that require quick but not necessarily reliable delivery.
TCP/IP model does not require strict layering. It means the application layer has the
option of bypassing intermediate layers.
Internet layer
The Internet layer handles the transfer of information across multiple networks
through the use of gateways/routers . The internet layer corresponds to the network
layer of OSI , it mainly concerns with the transfer of packets between machines that
are connected to different networks. Internet layer deals with deal with the routing of
packets from router to router across the networks. Internet layer uses a concept of
globally unique addresses for machines that are attached to the Internet. The internet
layer provides a single service that is best-effort connectionless packet transfer. IP
packets are exchanged between routers without a connection setup, the packets are
routed independently. So packets may travel in different paths. Hence IP packets are
also called datagrams. The connectionless approach makes the system robust, if
failure occurs in the network, the packets are routed around the points of failure, there
is no need to set up the connections again .
Hence, a clear separation of the internet layer from the technology –dependent network
interface layer. This allows the internet layer to provide a data transfer service that is
transparent in the sense of not depending on the details of the underlying the network.
The following figure shows protocols of the TCP/IP protocol suite.
Courtesy : Data communication networks by Alberto Leon - Garcia
• OSI
Three concepts are central to OSI model services, interfaces, protocols.
Protocols in the OSI model are better hidden than in the TCP/IP model and can be
replaced relatively easily as the technology changes.
Model first and then next protocol.
OSI has seven layers.
OSI supports both connectionless and connection oriented communication in the
network layer.
• TCP/IP
Services, interface and protocols are not distinguished properly.
Protocols comes first and model next.
TCP/IP has four layers.
TCP/IP model has connectionless in the Internet layer and both modes in the transport
layer.
tcp/ip - How layers work
Let us consider a network , which consists of server, workstation, router and personal
computer. The router which is used to connect two networks. The ordered pair (1,1)
which represent network 1 and the host id 1. Router which contain two interfaces one
is connected to network 1 and other is connected to pc via ppp link. It constitutes the
other network.
From the point of view of IP , the Ethernet LAN and the point-to-point link constitute
two different networks, shown in the following figure.
Courtesy : Data communication networks by Alberto Leon - Garcia
Let us consider a case, in which the workstation wants to send an IP datagram to the
server. The IP datagram has the workstation’s IP address and the server’s IP
addresses in the IP packet header. Let us assume, IP address of the server is known.
The IP entity in the workstation looks at its routing table to see whether it has an
entry for the complete IP address. Workstation finds the server is directly connected
to the same network and the server has physical address s. The IP datagram is passed
to the Ethernet device driver, which prepares an Ethernet frame as shown in the next
figure.
Courtesy : Data communication net
The header in the frame contains the source physical address, w, and the destination
physical address s. The Ethernet frame is then broadcast over the LAN. The server’s
NIC recognizes that the frame is intended for its host, so the card captures the frame
and examines it. The NIC finds that the protocol type field is set to IP and therefore
passes the IP datagram up to the IP entity. Now let us see how the server sends IP
datagram to the personal computer. Suppose the server knows the IP address of the
PC and that the IP addresses on either side of the link were negotiated when the link
was set up. Otherwise, IP entity then checks to see whether it has a routing table entry
that matches the network id portion of the IP portion of the IP address of the PC.
Suppose that the IP entity does not find such an entry. The IP entity then the checks to
see whether it has an entry that specifies a default router that is to be used when no
other entries are found. Suppose that entry exists and that it specifies the router with
address (1,3). The IP datagram is passed to the Ethernet device driver, which prepares
an Ethernet frame. The header in the frame contains the source physical address, s,
and the destination physical address, r. IP datagram in the frame contains the
destination IP address of the PC (2,2), not the destination IP address of the router. The
Ethernet frame is then broadcast over the LAN. The router’s NIC captures the frame
and examines it. The routing tables at the router show that the machine with address
(2,2) is connected directly on the other side of the point-to-point link. The router
encapsulates the IP datagram in a PPP frame that is similar to the Ethernet frame. The
PPP receiver at the PC receives the frame, checks the protocol type filed and passes
the IP datagram to its IP entity.
Application layer protocols and TCP/IP utilities
Application layer protocols are high level that provide services to user applications.
Application protocols are user written. The popular protocols are Telnet, File transfer
protocol (FTP), HTTP and SMTP.
Telnet
FTP
File transfer Protocol (FTP) is another commonly used application protocol. FTP
provides for the transfer of a file from one machine to another. FTP requires two TCP
connections to transfer a file. One is the control connection that is established on port
21 at the server. The second TCP connection is a data connection used to perform a
file transfer. A data connection must be established for each file transferred. Data
connections are used for transferring a file in either direction or for obtaining lists of
files in either direction or for obtaining lists of files or directories from the server to
the client. FTP works across different systems because it can accommodate several
different file types and structures. FTP commands are used to specify information
about the file and how it will be transmitted. Three types of information must be
specified. File type – FTP supports ASCII, EBCDIC, image (binary) or local.
The world wide web provides a framework for accessing documents and resources
that are located in computer connected to the Internet. The HTML is used to prepare
the documents. Each link provides the browser with a uniform resource locator
(URL) that specifies the name of the machine where the document is located as well
as the name of the file that contains the requested document HTTP is a stateless
protocol in that it does not maintain any information ( state) about the clients. The
HTTP server handles each request independently of all other requests.
The following are the few commands are used
GET
Retrieve information (object) identified by the URL
POST – Send information to a URL and retrieve result, used when a user fills out a
from in a browser.
PUT – Store information in location named by URL
TRACE – Trace HTTP forwarding through proxies, tunnels
It was indicated that the HTTP protocol is stateless and does not maintain information
about the prior requests from a given client. The use of cookies makes it possible to
have web sessions where a user interacts with a web site in a manner that takes into
account the user’s preferences. Cookies are data that are exchanged and stored by
clients and servers and transferred as headers lines in HTTP messages. The header
lines provide context for each HTTP interaction. When a client first accesses a web
server that uses cookies, the server replies with response message that includes a Set-
cookie header line. This header line includes a unique ID number for the given client.
If the client software accepts cookies, the cookies is added to the browser’s cookie
file. Each time the client software accepts cookies, the cookie is added to the
browser’s cookie file. Each time the client makes a request to the given site, it
includes a Cookie header line with the unique ID number in its requests. The server
maintains a separate cookie database where it can store which pages were accessed at
what date and time by each client.
IP utilities
A number of utilities are available to help in finding out about IP hosts and domains
and to measure Internet performance. We discuss utilities like ping, traceroute,
ipconfig, netstat, tcpdump.
Ping
Ping is a utility which is used to determine whether a host is reachable or not. Ping
makes use of Internet control message Protocol (ICMP) messages. The purpose of
ICMP is to inform sending hosts about errors encountered in Ip datagram processing
or other control information by destination hosts or by routers. Ping sends one or
more ICMP echo messages to a specified host requesting a reply. Ping is often to
measure the round-trip delay between the hosts.
The syntax is ping <hostname>
The round-trip delay is indicated and time-to-live value. The TTL is the maximum
number of hops an IP packet is allowed to remain in the network. Each time an IP
packet passes through a router, the TTL is decreased by 1. When the TTL reaches 0,
the packet is discarded.
Traceroute
Traceroute utility allows users to determine the route that a packet takes from the
local host to a remote host, as well as latency and reachability from the source to each
hop. Traceroute is used as a debugging tool by network administrator. Traceroute
makes use of both ICMP and UDP.
Ipconfig
The ipconfig utility available on windows operating system. This utility displays the
TCP/IP information about a host. It displays host IP address, subnet mask, default
gateway for the host. The utility can also be used to obtain information for each IP
network interface fro the host, DNS hostname, Ip address of DNS servers, physical
address of the network card, IP address for the network interface and whether DHCP
is enabled for automatic configuration of card’s Ip address.
netstat
The netstat queries a host about its TCP/IP network status. netstat can be used to find
the status of the network drivers and their interface cards, such as the number of
packets, out packets, error packets and so on. It is also be used to find out the state of
the routing table in a host, which TCP/IP server processes are active in the host as
well as the which TCP connection are active.
Tcpdump
The tcpdump program can capture and observe IP packet exchanges on a network
interface. The program usually involves setting an Ethernet network interface card
into a active mode so that the card listens and captures every frame that traverses the
Ethernet broadcast network. A packet filter is used to select the IP packets that are of
interest in a given situation. These IP packets and their higher-layer contents can then
be observed and analyzed. Tcpdump utility can be used as a protocol analyzer.
Protocol analyzer are extremely useful in teaching the operation of protocols by
providing a means of examining traffic from a live network. Network protocol
analyzer give the ability to capture all packets in a LAN and in doing so provide an
opportunity to gain unauthorized access to network information. These tools should
be used in a responsible manner.
DATA COMMUNICATIONS
COMMUNICATION FUNDAMENTALS
Communication concepts
Communication is the process of transmitting information. It’s a big, vague, fuzzy word
and broadly applied. The “Communications Department “ at a university may include
speech teachers, public relations specialists, writers and broadcasters, who have nothing
to do with hardware. By that definition , a writer is in the communication business.
Evolution of communications
We the human beings are communicating from early days that is by drawing the pictures
on cave walls. It can be how to attack the animal or how to the save the life from the
threats or it may be a route to go to another cave.
The earlier long-distance communications was by signal fires that relayed simple
information. The signal used to represent “yes” or “no” – the question being asked had to
be known beforehand. It’s only a single bit information, not a detailed message.
A written letter or a human messenger could carry more information. The first systems
we might call telecommunications were series of hilltop towers, built by French engineer
Claude Chappe in the 1790s. The towers had to be in sight of each other, with an
operator in each one. The operator relayed a message by moving arms on top of the
tower. The operator of the next tower looked through a telescope to watch the arms
move, reading the message, recording it, then moving the arms of his tower to relay it to
the next tower. Chappe invented a code that used arm position to indicate letters or
certain common words. His system was called an optical telegraph.
Samuel Morse’s electrical telegraph eventually replaced Chappe’s optical one. It also
required operators, but they used keys that completed an electrical circuit, sending bursts
of currents through a wire. The Morse code was a series of dots an dashes ( short and
long pulses) that represented letters.
The electrical telegraph spread across the continents and in 1866 across the Atlantic. Its
wires formed a network running between major cities. Telegraphers received signals and
either sent them for local delivery or relayed them to more distant stations. We can think
of each dot and dash of the telegraph as a bit of information.
Later Alexander Graham Bell developed telephone. He borrowed some principles from
the telegraph , but instead of transmitting dots and dashes, it sent a continuously changing
electrical current that represented a speaker’s voice. The telephone network was bigger
and more complex than the telegraph network.
After that radio waves are used to carry signals through air. Radio first carried telegraph
signals. Wires worked fine on land, but only radio could send telegrams to ships at sea
and relay urgent messages such as request for help. It was radio rescue calls that sent
ships to help the survivors of the sinking of the Titanic. Radio communications started
for ships and airplanes in the world war II.
Radio communication started at low frequencies, but gradually moved to higher ad higher
frequencies as electronics improved. The higher the frequency the more information the
signal can carry. Pictures need more transmission capacity than sound alone, so television
are broadcast at higher frequencies than audio radio.
By the 1970s , satellites were beaming radio signals around the globe. The telephone
system had become global and known popularly “telecommunication network” . We
could make phone calls to anywhere in the world.
After that fiber optics arrived. Fiber provides high bandwidth. It carries high capacity
information at faster rate. Now it is a integral part of telecommunication network.
Broadcast television
Satellites TV Disk
Broadcast
Radio
P.C.
A signal transmits that information. Signals may take many forms, such as optical,
acoustic, electronic or radio-frequency. Signals may be converted from one form into
another and still contain the same information. When we make a long-distance telephone
call, the sound waves from our mouth are converted to an electrical signal at the
telephone, that electrical signal is converted to optical form at the telephone switching
office, back to electrical form at the local switching office on the other end and back to
sound waves at the other person’s telephone.
A system is the equipment that performs a task, like transmitting signals. We often speak
of telephone system as if it is the whole network of telephone equipment from our phone
to the high-capacity fiber-optics cables that carry long-distance calls. However, parts of
the telephone system also may be called systems, such as a switching systems that directs
phone calls. We can assume a system which is a collection of stuffs designed to work
together.
PROTOCOL
Step 1
Step 2
CHANNEL
vi) Message
vii) Sender
viii) Receiver
ix) Medium
x) Protocol
Syntax : Syntax refers to the structure or format of the data, meaning the order in which
they are presented. For example , a simple protocol might expect the first eight bits of
data to be the address of the sender , the second eight bits to be the address of receiver
and rest of the stream to be the message itself.
Semantics : Semantics refers to the meaning of each section of bits. How is a particular
pattern to be interpreted and what action is to be taken based on that information.
Timing : Timing refers to two characteristics. When data should be sent and how fast it
can be sent. For example , if a sender produces data at 100 Mbps but the receiver can
process data at only 1 Mbps, the transmission will overload and receiver and data will be
largely lost.
Standards
Standards are essential in creating and maintaining an open and competitive market fro
equipment manufacturers and in guaranteeing national and international operational
ability of data and telecommunication technology and processes. They provide
guidelines to manufacturers, vendors, government agencies and other service providers to
ensure the king of interconnectivity necessary in today’s marketplace and in international
communications.
3. de facto ( by fact)
4. de jure ( by law)
De jure standards are those that have been legislated by an officially recognized body.
Standards organization
Standards are developed by cooperation among standard creation committees forums and
government regulatory agencies.
Point-to-point
A point-to-point configuration provides a dedicated link between two devices. The entire
capacity of the channel is reserved for transmission between those two devices. Most
point-to-point line configuration use an actual length of wire or cable to connect the two
ends.
Broadcasting
A broadcast system send the same signal to everyone who receives it. In its usual form ,
transmission is one way, from the signal source to the individual. Local radio and
television transmission are good examples of pure one-way broadcast systems.
Switched systems
Networking
A network connects many terminals that can communicate with each other. For example
Local Area Network is belongs to this category.
Services
Telephone service is the most common real-time service provided by a network. Two
people are able to communicate by transmitting their voices across the network. The
service is considered as connection-oriented in the sense that users must first interact with
the network to set up a connection
Telephone networks provide a broad class of call management services that use the
originating number or the destination number to determine the handling of a call. For
example , in call return the last originating number is retained to allow it to be
automatically called by the destination user at a later point in time. Caller ID allows the
originating number and sometimes name, of the originating call to be displayed to the
destination user when the receiving device is display capable. Voice mail allows a
destination user to have calls forwarded to a message receiving device when the
destination user is not available.
Cellular telephone service extends the normal telephone service to mobile users who are
free to move within a regional area covered by an interconnected array of smaller
geographical areas called cells. Each cell has a radio transmission system that allows it to
communicate with users in its area. Cellular system should handle “handoff” when user
moves from one area to another area.
Electronic mail (e-mail) is another popular network service. The user provides a text
message and a name and/or address to a mail application. The application interacts with a
local mail server, which in turn transmits the message to a destination server across a
computer network. The destination user retrieves the message by using a mail
application. E-mail is not a real-time service , where large delays can be tolerated. Here
security and privacy is matter of concern.
Another class of service is audio-visual conferencing. Here both audio and video are
transmitted over a distance. This service requires real-time response requirement. This
service is being used by many companies for training, client interaction from a site, group
discussion etc.
Computer networks
Early computers were expensive, so techniques were developed to allow them to be
shared by many users. In the 1960s tree-topology terminal-oriented networks were
developed to allow user terminals to connect to a single central shared computer. As the
cost of computers were reduced , it became necessary to connect to different computers
for different applications. Here dumb terminals are replaced with intelligent terminals. So
techniques were developed so that networks are more flexible and provide
communication among many computers .
The ARPANET (Advanced Research projects Agency of U.S. Department of Defense)
was the first network to interconnect computers over a wide geographical area. Here, they
used intelligent computer to process and the resources were available to store
information. Later Internet protocol was developed , that enabled communications
between computers were attached to different networks. IP made it possible to transfer
information in the form of packets across many dissimilar networks.
Protocol
A protocol is a set of rules that governs how two or more communicating parties are to
interact. Let us consider an example an example of a protocol
Example
HyperText Transfer Protocol (HTTP) specifies how a web client and server are to
interact.
File Transfer Protocol for the transfer of files
Simple Mail Transfer Protocol (SMTP) for e-mail
Internet Protocol (IP) for the transfer of packets.
Domain Name System (DNS) for IP address lookup.
Terminal-oriented networks
In the figure above figure a, shows the arrangement that allows a number of
terminals to share a host computer. Terminal can be teletype printer or a video
terminal is connected by a set of wires. Later Modems allowed the devices for
transmitting digital information so that terminals could access the host computer via
the telephone network. This is shown in the figure b.
Medium access control methods were developed to allow a number of terminals at
different locations to communicate with a central computer using the shared
communication line. The access to the line, it has to be controlled so that different
devices do not interfere with each other by transmitting at the same time.
This arrangement is also called master/slave. Here central computer sends a poll
message to a specific terminal on the outgoing line. All terminals listen to the
outgoing line, but only the terminal that is polled replies by sending any information
that it has ready for transmission on the incoming line.
Statistical multiplexers/concentrators provided another method for sharing
communication line among terminals. Messages from a terminal are encapsulated
inside a frame that consists of a header in addition to the user message. The header
provides an address that identifies the terminal. The messages from the various
terminals are buffered by the multiplexer ordered into a queue and transmitted one at
a time over the communication line to the central computer. The central computer
sorts out the messages from each terminal, carries out the necessary processing and
returns the result inside a frame.
Early data transmission systems that made use of telephone lines had to deal with
errors in transmission systems that made use of telephone lines had to deal with
errors in transmission arising from a variety of sources. It may be thermal nose or
electromagnetic noise. So Error-control techniques were developed to detect the
errors and correct the errors. Hence some redundant bits called check bits are
appended to the frame. If the data is changed, due to check bit it was possible to
detect and receiver is used to request retransmission.
Finally elements of the terminal-oriented networks are
A digital transmission system to transfer binary information. The transmission system
can consists of a telephone system and specialized data transmission equipment.
A method for the transmission of frames of information between terminals and central
computers. The frames contain address information to identify terminals, check bits
to enable error control. To access the same communication line, the systems need a
medium access control to coordinate the transmissions of information from terminals
into the shared communication line.
Computer-to-computer networks
The basic service provided by computer networks is the transfer of messages from
any computer connected to the network to any other computer connected to the
network. A switching technique in which messages are partitioned into smaller units
called packets, which contain addressing information as well as sequence numbers.
Packets are then sent to the destination node one at a time, at any time and not
necessarily in a specific order. The channel used to transmit a packet is occupied only
for the duration of the packet’s transmission.
The ARPANET
The packet consisted of a header with a destination address attached to user
information. It is transmitted as a single unit across a network. ARPANET consisted
of packet switches interconnected by communication lines that provided multiple
paths for interconnecting host computers over wide geographical distances. The
packet switches were implemented by dedicated minicomputers and each packet
switch was connected to at least two other packet switches to provide alternative
paths in case of failure.
Packets were encapsulated in frames that used special characters to delineate the
frame, as well as check bits to enable error control. If errors are present, then packets
used to get discarded. The sender used to retransmit the packets once again.
Each packet switching node implemented a distributed routing algorithm to maintain
its routing tables. The algorithm involved the exchange of information between
neighbouring nodes and the calculation of a consistent set of routing tables that
together directed the flow of packets from source to destination.
This enables the update the routing tables, in case if there is a change in traffic or
topology of the network. Due to change in the routes, it was possible for packets to
arrive out of order at the destination.
Each packet switch in ARPANET contained a limited amount of buffering for
holding packets. To prevent packet switches from becoming congested, congestion
control was developed.
Flow-control methods used to regulate the rate at which a source computer sent
messages to a destination computer. This action prevented a sending computer from
overflowing the buffers of a destination computer.
APRANET provided the application like e-mail, remote login and file transfer.
The computers are connected for a small distances , low cost, very high speed and
relatively error-free communication are characteristics of LAN.
To identify computers, NETWORK INTERFACE CARD (NIC) which is used to
contain globally unique address. Broadcasting technique was used in LAN. A
medium access control protocol was used to coordinate access to the transmission
medium in order to prevent collisions between frames.
The Internet
After a routing decision is made, the packets are placed in a buffer to await
transmission over the next network. Packets from different users are statistically
multiplexed in these buffers. The underlying networks are responsible for transferring
the packets between routers.. IP provides best-effort service. It means IP makes every
effort to deliver the packets but takes no additional actions when packets are lost,
corrupted, delivered out of order or even misdelivered. Hence IP sometimes called
unreliable.
IP uses a hierarchical address space that has “grouping “ information embedded in the
structure. IP addresses consists of 4 bytes usually expressed in dotted-decimal
notations. IP addresses consists of two parts
• A network ID
• Host ID
The internet also provides a name space to refer to machines connected to the Internet
for example nie.ac.in . Automatic translation of names to addresses is provided by the
Domain Name System (DNS)
The User Datagram Protocol (UDP) allows applications to transfer individual blocks
of user information using datagrams. UDP takes the user information, appends
appropriate information that identifies the application in the destination host and then
uses IP to transfer the datagram across an internet. UDP may not be suitable for some
application.
The transmission Control Protocol (TCP) was developed to provide reliable transfer
of stream information over the connectionless IP. TCP operates in a pair of end hosts
across an IP internet. TCP provides for error and flow control on an end-to-end basis
that can deal with the problems that can arise due to lost, delayed or misdelivered IP
packets.
Examples that work on TCP are FTP, HTTP and SMTP.
Finally, to provide communication modern network architecture consists of
Digital transmission lines of the transfer of streams of binary information.
Exchange of frames of information between adjacent equipment. Frames contain data
as well as check bits
Medium access control regulate the transmission of frames from multiple users to a
shared broadcast medium.
Addresses to identify points of attachment to a network or internetwork.
Exchange of packets of information between packet switches in network. Routing
tables in packet switches are used to select the path of each packet as it traverses the
network.
Dynamic calculation of routing tables at the packet switches in response to changes in
network traffic and topology.
Congestion control mechanism may be used to prevent congestion inside the network
Internetworking provides connectivity across multiple, possibly dissimilar networks
by using gateways or routers.
Reassembly of messages into packets are carried.
Applications and Layered architecture
Communication network must support wide range of services. Normally people use
networks to communicate, send e-mails, transfer of files and so on. Industry people
use communication network for transfer of funds, update information about the
product and so on. Hence, to provide support for current service and future services, a
complete plan is required. This necessitates developing a complete flexibility in
network architecture.
To reduce their design complexity, most networks are organized as a series of layers
or levels, each one built upon its predecessor. The number of layers, the name of the
each layer, the contents of each layer and the function of each layer differ from
network to network.
Interaction between the layers must be defined precisely. Interaction is done with
definition of the service provided by each layer and to the layer above. Interface
between layers through which a service is requested and through which results are
conveyed. New services that build on existing services can be introduced even at the
later stage. The layered approach accommodates incremental changes readily.
We know , in all networks, the purpose of each layer is to offer certain services to the
higher layers. The entities comprising the corresponding layers on different machines
are called peer processes. Between each pair of adjacent layers there is an interface.
The interface defines which primitive operations and services the lower layer offers to
the upper one. The set of layers and protocols is called the network architecture.
A protocol is a set of rules that governs how two or more communicating devices are
to interact. HTTP protocol enables retrieval of web pages and TCP protocol enables
the reliable transfer of streams of information between computers.
HTTP
First of all, client needs to perform a DNS query to obtain the IP address
corresponding to the domain name. This step is done by sending a message to a DNS
server. The Domain Name System (DNS) is a distributed database that resides in
multiple machines on the Internet and is used to convert between names and
addresses and to provide e-mail routing information. Each DNS machine maintains its
own database and acts as a DNS server that other query machine can query. Initially
requesting machine accesses a local name server. In case if it not possible to resolve
names then it will be sent to the root server. When the root server is unable to resolve
, it will be sent to authoritative name server. Every machine on the Internet is required
to register with at least two authoritative name servers.
DNS query and response messages are transmitted by using the communication
service provided by the User Datagram Protocol (UDP). Port 53 is used for
communication. The UDP service is connectionless, no connection setup is required
and the datagram is sent immediately.
SMTP
Simple Mail Transfer Protocol is used for sending mails. The user prepares an e-mail
message that includes the recipient’s e-mail address, a subject line and a body. User
clicks send button to send the information. Let us consider the steps are used in
sending the e-mail.
• The mail application establishes a TCP connection (port 25) to its local SMTP
server.
• SMTP daemon issues the message to the client, indicating that it is ready to
receive mail
• Client send s a HELO message and identifies itself.
• SMTP daemon issues a 250 message, indicating the client may proceed.
• Client sends sender’s address
• If successful, SMTP daemon replies with a 250 message
• Client sends recipient’s address.
• A 250 message is returned
• Client sends a DATA message requesting permission to send the mail message
• The daemon sends a message giving the client permission to send
• Client sends the actual text
• Daemon indicates that the message is accepted for delivery. A message ID is
returned.
• Client indicates that mail session is over.
• Daemon confirms the end of the session.
SMTP works best when the destination machine is always available, for this reason,
users in a PC environment usually retrieve their e-mail from a a mail server using the
Post Office Protocol version 3 (POP 3).
TCP provides for reliable transfer of a byte stream between processes in hosts
attached to the Internet. TCP involves the establishment of a connection between the
two processes. To provide their service, the TCP entities implements error detection
and retransmission as well as flow control algorithms. TCP implements congestion
control, which regulates the flow of segments into the network.
File sharing applications such as Napster and Gnutella are popular for sharing the
MP3 audio and other files. Here clients can also acts as transient server while the
application is activated. When a peer is interested in finding a certain file, it sends a
query. The response provides a list of peer s that have the file and additional
information such as the speed of each peer’s connection to the Internet. The
requesting peer can then set up a TCP connection to one of the peers in the list and
proceeded to retrieve the file.
The model proposed by ISO OSI ( Open System Interconnection) reference model
because it deals with connecting open systems that is systems that are open for
communication with other systems. The OSI model has seven layers.
The concepts related to layers are
i) A layer should be created where a different level of abstraction is needed.
ii) Each layer should perform a well defined function
Iii) The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
Iv) The layer boundaries should be chosen to minimise the information flow across
the interface.
v) The number of layers should be larger enough that distinct functions need not be
thrown together in the same layers out of necessity and small enough that the
architecture does not become unwieldy.
Please Do Not Touch Sita’s Pet Animal , Where the beginning letter of each word
represent the layer name. Like P in Please word stands for Physical layer, D letter in
Do word stands for Data link layer and so on. Let us see the functions of the layers.
Physical layer
The physical layer deals with the transfer of bits over a communication channel.
Physical layer concerned with the representation of signals. How to represents 1 and
how represent 0. Which type of encoding mechanism should be used for representing
the bits.This layer is concerned with the procedures to set up and release the physical
connections.
High level data link control (HDLC) and Point-to-point protocol (PPP) are the two
standard data link protocol that are wide in use. A flat addressing space is used to
enable machines to listen and recognize frames that are destined to them.
Network layer
The network layer provides for the transfer of data in the form of packets across a
communication network. It uses the hierarchical way of addressing scheme. Routing
protocol is the procedure that is used to select paths across a network. The nodes in
the network must work together to perform the routing effectively. Network layer is
responsible for dealing with congestion that occurs from time to time in the network.
When the two machines are connected to the same packet-switching network, single
address space and routing procedure are used.
If two machines are connected to the different networks, the transfer of data must
traverse two or more networks and hence internetworking protocols are necessary to
route the data between gateways/routers that connects the intermediate networks.
Transport layer
The transport layer is responsible for the end-to-end transfer of messages from a
process in the source machine to a process in the destination machine. The transport
layer protocol accepts messages from its higher layers and prepares blocks of
information called segments or datagram's for transfer between end machines.
Presentation layer
The presentation layer provide the application layer with independence from
difference in the representation of data. Presentation layer should convert the
machine-dependent information provided by application A into a machine-dependent
form suitable for application B, because different computers use different codes for
representing characters and integers.
Application layer
The application layer is to provide services that are frequently required by
applications that involve communications. For example browser application use
HTTP application layer protocol to access a WWW document. Application layers
protocols have been developed for file transfer, virtual terminal, electronic mail, name
service, network management and other applications.
In general each layer adds a header and possibly a trailer to the block of information it
accepts from the layer above.
The following table shows the different functions carried out by different layers OSI
model.
Layer Description Examples
FT
Application Protocols that are designed to meet the communication requirements of HTTP, , SMTP,
specific applications, often defining the interface to a service. P
CORBA IIOP
Presentation Protocols at this level transmit data in a network representation that is Secure Sockets
independent of the representations used in individual computers, which may (SSL),CORBA Data
differ. Encryption is also performed in this layer, if required. Rep.
Session At this level reliability and adaptation are performed, such as detection of
failures and automatic recovery.
Transport This is the lowest level at which messages (rather than packets) are handled. TCP, UDP
Messages are addressed to communication ports attached to processes,
Protocols in this layer may be connection-oriented or connectionless.
Network Transfers data packets between computers in a specific network. In a WAN IP, ATM virtual
or an internetwork this involves the generation of a route passing through circuits
routers. In a single LAN no routing is required.
Data link Responsible for transmission of packets between nodes that are directly Ethernet MAC,
connected by a physical link. In a WAN transmission is between pairs of ATM cell transfer,
routers or between routers and hosts. In a LAN it is between any pair of hosts. PPP
Physical The circuits and hardware that drive the network. It transmits sequences of Ethernet base- band
binary data by analogue signalling, using amplitude or frequency modulation signalling, ISDN
of electrical signals (on cable circuits), light signals (on fibre optic circuits)
or other electromagnetic signals (on radio and microwave circuits).
The development of OSI reference model leads the world to the development of unified
view of layers, protocols and services. In each layer a process on one machine carries out
a conversation with a peer process on the other machine across a peer interface. This is
shown below.
Courtesy : Data communication networks by Alberto Leon - Garcia
For communication to take place, the layer n+1 entities make use of the services
provided by layer n. The transmission of the layer n+1 PDU is done by passing a
block of information from layer n+1 to layer n through a software port called the
layer n service access point (SAP) across a service interface. SAP is identified by a
unique identifier. The block of information passed between layer n and layer n+1
entities consists of control information and a layer n service data unit (SDU), which
is the layer n+1 PDU itself. The layer n SDU, which is the layer n+1 PDU, is
encapsulated in the layer n PDU. The service provided by layer n typically accepting
a block of information from layer n+1, transferring the information to its peer
process.
Courtesy : Data communication networks by Alberto Leon - Garcia
In connectionless service which does not require a connection setup and each SDU is
transmitted directly through the SAP. Suppose a layer n SDU is too large to be
handled by the layer n-1 and so segmentation and reassembly are applied. The layer n
SDU is segmented into multiple layer n PDUs that are then transmitted using the
services of layer n-1. The layer n entity at the other side must reassemble the original
layer n SDU from the sequence of layer n PDUs it receives. It is also possible that the
layer n SDUs are so small as to result in inefficient use of the layer n-1 services and
so blocking and unblocking applied. The layer n entity may block several layer n
SDUs into a single layer n PDU . The layer n entity on the other side must then
unblock the received PDU into the individual SDUs.
Multiplexing involves the sharing of a layer n services by multiple layer n+1 users.
The N+1 layer users passes its SDUs for transfer using the services of a single layer
n entity. Demultiplexing is carried out by the layer n entity at the other end.
The tcp/ip network architecture is a set of protocols that allows communication across
multiple diverse networks. Tcp/ip provides robustness with regard to failures in the
network and on flexibility in operating over heterogeneous networks. We know
Internet consists of different types computer systems and networks. Tcp/ip which
consists of 4 layers and OSI model consists of 7 layers. The following figure shows
the TCP/Ip architecture.
Application layer
The application layer provides services that are used by the applications. Examples
are remote login, e-mail, ftp, network management. The TCP/IP application layer
incorporates the functions of the top three OSI layers. HTTP is a TCP/IP application
layer protocol.
Transport Layer
The TCP/IP application layer programs are directly run through transport layer.
Two basic types of services are provided by transport layer.
The first one is connection-oriented , which is provided by Transmission Control
Protocol (TCP).
The second service is best-effort connectionless transfer of individual messages,
which is provided by the user datagram protocols (UDP). Here in connection-less
service no mechanism for error recovery or flow control.
UDP is used for applications that require quick but not necessarily reliable delivery.
TCP/IP model does not require strict layering. It means the application layer has the
option of bypassing intermediate layers.
Internet layer
The Internet layer handles the transfer of information across multiple networks
through the use of gateways/routers . The internet layer corresponds to the network
layer of OSI , it mainly concerns with the transfer of packets between machines that
are connected to different networks. Internet layer deals with deal with the routing of
packets from router to router across the networks. Internet layer uses a concept of
globally unique addresses for machines that are attached to the Internet. The internet
layer provides a single service that is best-effort connectionless packet transfer. IP
packets are exchanged between routers without a connection setup, the packets are
routed independently. So packets may travel in different paths. Hence IP packets are
also called datagrams. The connectionless approach makes the system robust, if
failure occurs in the network, the packets are routed around the points of failure, there
is no need to set up the connections again .
Hence, a clear separation of the internet layer from the technology –dependent network
interface layer. This allows the internet layer to provide a data transfer service that is
transparent in the sense of not depending on the details of the underlying the network.
The following figure shows protocols of the TCP/IP protocol suite.
Courtesy : Data communication networks by Alberto Leon - Garcia
• OSI
Three concepts are central to OSI model services, interfaces, protocols.
Protocols in the OSI model are better hidden than in the TCP/IP model and can be
replaced relatively easily as the technology changes.
Model first and then next protocol.
OSI has seven layers.
OSI supports both connectionless and connection oriented communication in the
network layer.
• TCP/IP
Services, interface and protocols are not distinguished properly.
Protocols comes first and model next.
TCP/IP has four layers.
TCP/IP model has connectionless in the Internet layer and both modes in the transport
layer.
tcp/ip - How layers work
Let us consider a network , which consists of server, workstation, router and personal
computer. The router which is used to connect two networks. The ordered pair (1,1)
which represent network 1 and the host id 1. Router which contain two interfaces one
is connected to network 1 and other is connected to pc via ppp link. It constitutes the
other network.
From the point of view of IP , the Ethernet LAN and the point-to-point link constitute
two different networks, shown in the following figure.
Courtesy : Data communication networks by Alberto Leon - Garcia
Let us consider a case, in which the workstation wants to send an IP datagram to the
server. The IP datagram has the workstation’s IP address and the server’s IP
addresses in the IP packet header. Let us assume, IP address of the server is known.
The IP entity in the workstation looks at its routing table to see whether it has an
entry for the complete IP address. Workstation finds the server is directly connected
to the same network and the server has physical address s. The IP datagram is passed
to the Ethernet device driver, which prepares an Ethernet frame as shown in the next
figure.
Courtesy : Data communication net
The header in the frame contains the source physical address, w, and the destination
physical address s. The Ethernet frame is then broadcast over the LAN. The server’s
NIC recognizes that the frame is intended for its host, so the card captures the frame
and examines it. The NIC finds that the protocol type field is set to IP and therefore
passes the IP datagram up to the IP entity. Now let us see how the server sends IP
datagram to the personal computer. Suppose the server knows the IP address of the
PC and that the IP addresses on either side of the link were negotiated when the link
was set up. Otherwise, IP entity then checks to see whether it has a routing table entry
that matches the network id portion of the IP portion of the IP address of the PC.
Suppose that the IP entity does not find such an entry. The IP entity then the checks to
see whether it has an entry that specifies a default router that is to be used when no
other entries are found. Suppose that entry exists and that it specifies the router with
address (1,3). The IP datagram is passed to the Ethernet device driver, which prepares
an Ethernet frame. The header in the frame contains the source physical address, s,
and the destination physical address, r. IP datagram in the frame contains the
destination IP address of the PC (2,2), not the destination IP address of the router. The
Ethernet frame is then broadcast over the LAN. The router’s NIC captures the frame
and examines it. The routing tables at the router show that the machine with address
(2,2) is connected directly on the other side of the point-to-point link. The router
encapsulates the IP datagram in a PPP frame that is similar to the Ethernet frame. The
PPP receiver at the PC receives the frame, checks the protocol type filed and passes
the IP datagram to its IP entity.
Application layer protocols and TCP/IP utilities
Application layer protocols are high level that provide services to user applications.
Application protocols are user written. The popular protocols are Telnet, File transfer
protocol (FTP), HTTP and SMTP.
Telnet
FTP
File transfer Protocol (FTP) is another commonly used application protocol. FTP
provides for the transfer of a file from one machine to another. FTP requires two TCP
connections to transfer a file. One is the control connection that is established on port
21 at the server. The second TCP connection is a data connection used to perform a
file transfer. A data connection must be established for each file transferred. Data
connections are used for transferring a file in either direction or for obtaining lists of
files in either direction or for obtaining lists of files or directories from the server to
the client. FTP works across different systems because it can accommodate several
different file types and structures. FTP commands are used to specify information
about the file and how it will be transmitted. Three types of information must be
specified. File type – FTP supports ASCII, EBCDIC, image (binary) or local.
The world wide web provides a framework for accessing documents and resources
that are located in computer connected to the Internet. The HTML is used to prepare
the documents. Each link provides the browser with a uniform resource locator
(URL) that specifies the name of the machine where the document is located as well
as the name of the file that contains the requested document HTTP is a stateless
protocol in that it does not maintain any information ( state) about the clients. The
HTTP server handles each request independently of all other requests.
The following are the few commands are used
GET
Retrieve information (object) identified by the URL
POST – Send information to a URL and retrieve result, used when a user fills out a
from in a browser.
PUT – Store information in location named by URL
TRACE – Trace HTTP forwarding through proxies, tunnels
It was indicated that the HTTP protocol is stateless and does not maintain information
about the prior requests from a given client. The use of cookies makes it possible to
have web sessions where a user interacts with a web site in a manner that takes into
account the user’s preferences. Cookies are data that are exchanged and stored by
clients and servers and transferred as headers lines in HTTP messages. The header
lines provide context for each HTTP interaction. When a client first accesses a web
server that uses cookies, the server replies with response message that includes a Set-
cookie header line. This header line includes a unique ID number for the given client.
If the client software accepts cookies, the cookies is added to the browser’s cookie
file. Each time the client software accepts cookies, the cookie is added to the
browser’s cookie file. Each time the client makes a request to the given site, it
includes a Cookie header line with the unique ID number in its requests. The server
maintains a separate cookie database where it can store which pages were accessed at
what date and time by each client.
IP utilities
A number of utilities are available to help in finding out about IP hosts and domains
and to measure Internet performance. We discuss utilities like ping, traceroute,
ipconfig, netstat, tcpdump.
Ping
Ping is a utility which is used to determine whether a host is reachable or not. Ping
makes use of Internet control message Protocol (ICMP) messages. The purpose of
ICMP is to inform sending hosts about errors encountered in Ip datagram processing
or other control information by destination hosts or by routers. Ping sends one or
more ICMP echo messages to a specified host requesting a reply. Ping is often to
measure the round-trip delay between the hosts.
The syntax is ping <hostname>
The round-trip delay is indicated and time-to-live value. The TTL is the maximum
number of hops an IP packet is allowed to remain in the network. Each time an IP
packet passes through a router, the TTL is decreased by 1. When the TTL reaches 0,
the packet is discarded.
Traceroute
Traceroute utility allows users to determine the route that a packet takes from the
local host to a remote host, as well as latency and reachability from the source to each
hop. Traceroute is used as a debugging tool by network administrator. Traceroute
makes use of both ICMP and UDP.
Ipconfig
The ipconfig utility available on windows operating system. This utility displays the
TCP/IP information about a host. It displays host IP address, subnet mask, default
gateway for the host. The utility can also be used to obtain information for each IP
network interface fro the host, DNS hostname, Ip address of DNS servers, physical
address of the network card, IP address for the network interface and whether DHCP
is enabled for automatic configuration of card’s Ip address.
netstat
The netstat queries a host about its TCP/IP network status. netstat can be used to find
the status of the network drivers and their interface cards, such as the number of
packets, out packets, error packets and so on. It is also be used to find out the state of
the routing table in a host, which TCP/IP server processes are active in the host as
well as the which TCP connection are active.
Tcpdump
The tcpdump program can capture and observe IP packet exchanges on a network
interface. The program usually involves setting an Ethernet network interface card
into a active mode so that the card listens and captures every frame that traverses the
Ethernet broadcast network. A packet filter is used to select the IP packets that are of
interest in a given situation. These IP packets and their higher-layer contents can then
be observed and analyzed. Tcpdump utility can be used as a protocol analyzer.
Protocol analyzer are extremely useful in teaching the operation of protocols by
providing a means of examining traffic from a live network. Network protocol
analyzer give the ability to capture all packets in a LAN and in doing so provide an
opportunity to gain unauthorized access to network information. These tools should
be used in a responsible manner.
Circuit switching networks
Circuit switching networks provide dedicated circuits that provide the flow of
information between users. Multiplexing in the physical layer involves the sharing of
transmission systems by several connections or information flows. Multiplexing is
required when the bandwidth of individual connections is smaller than the bandwidth
of the available transmission system. Multiplexing helps to use bandwidth in a
efficient way and also reduces cost incurred in using the separate connections.
Frequency-division multiplexing
The T-1 carrier system was used to carry the traffic between telephone central offices.
Later growth of telephone network traffic and the advances in digital transmission led
to the development of a standard digital multiplexing hierarchy.
In North America and Japan, the digital signal 1 (DS1) , which corresponds to the
output of T-1 multiplexers, became the basic building block. The DS2 signal is
obtained by combining 4 DS1 signals and then adding 136 kilobits of synchronization
information. The DS3 signals is obtained by combining 7 DS2 signals and adding 522
kilobits of synchronization.
Summarized table
DS1 = 1.544 Mbps
DS2 = 4 * DS1 + 136 kilobits = 6.312 Mbps
DS3 = 7 * DS2 + 552 kilobits = 44.736 Mbps
SONET
The SONET simplifies the handling of lower-level digital signals and reduces the
overall cost of multiplexing in the network. In SONET , incorporation of overhead
bytes in the frame structure for use in monitoring the signal quality, detecting faults
and signaling among SONET equipment to identify rapid recovery from faults.
The SONET standard uses a 51.84 Mbps electrical signal, known as Synchronous
transport signal level – 1 (STS-1), as a building block to extend the digital
transmission. Hierarchy into the multigigabit/ second stage.
A path refers to the span between the two SONET terminals at the endpoints of the
system and in general encompasses one or more lines. Adjacent multiplexers
exchange information using frames.
The last three bytes of the section overhead are used to provide a data
communications channel between regenerators that can be used to exchange alarms,
control, monitoring and other administrative messages. The line overhead is used for
synchronization and multiplexing, performance monitoring, line maintenance, as well
as protection-switching capability in case of faults. The byte B2 is used to monitor the
bit rate in a line. The K1 and K2 bytes are used to trigger recovery procedure in case
of faults.
The remaining 87 columns of the frame constitute the information payload that
carries the path layer of user information.
The bit rate of the information payload is
8 * 9 * 87 * 8000 = 50.122 Mbps.
The path overhead uses the first columns of this array. This SPE is then inserted into
the STS-1 frame. The first two bytes of the line overhead are used as a pointer that
indicates the byte within the information payload where the SPE begins. The use of
pointer makes it possible to extract a selected signal from the multiplexed signal. This
feature gives SONET multiplexers an add-drop capability, which represent the
selected signal can be dropped and individual signal can be added without to
demultiplex the entire signal.
TRANSPORT NETWORKS
Routers are interconnected for form an ISP backbone network and the telephone
switches are interconnected to form a telephone network. The failure of a single
connection in a transport network can be disastrous because each connection carries
heavy traffic.
SONET Networks
In the beginning, asynchronous multiplexing concept was used. In that bit stuffing
was used to deal with slips and hence the complete multiplexed stream to be
demultiplexed to access a single tributary.
Transit tributaries would then have to be remultiplexed onto the next hop. Back-to-
back multiplexers are an unnecessary expense in situations where most of the traffic
is transit and only a few tributaries need to be dropped. SONET which enables in
reduction in cost by enabling add-drop multiplexers (ADM) that can insert and extract
tributary streams without disturbing tributary streams that are in transit.
ADMs are arranged in linear fashion to interconnect various SONET terminals. These
terminals can be part of other equipment, they could be interfaces to a large router.
From the point of view of the terminals, they are arranged in the fully connected
mesh. The SONET standards also defines automatic protection switching (APS)
schemes that provide linear protection against failures at the line layer.
Here, protection at the line level applies to a multiplexed signal while it traverses the
line between two multiplexers. Two SONET multiplexers connected in a 1+1 (one
plus one ) configuration using two SONET lines, a working line and protection line.
Two lines carries the same information. A selector in the downstream node picks the
better signal based on the information provided by the two monitors and does not
need to coordinate with the upstream node. Recovery from failures are fast because it
is done by the hardware.
A 1:1 ( one for one) APS arrangement is shown (refer ppt), Here, signal is
transmitted in the working line during normal operation. The optical signal that is
received is monitored and in case if the signal is degraded, then a request is sent.
Once again, upstream node switches the signal to the protection line.
The 1:1 takes more time to recover from failure than 1 + 1 APS.
The 1:1 scheme is efficient in terms of the bandwidth.
In the other arrangement 1:1 APS scheme can be generalized to a 1:n APS scheme
where one protection line protects n working lines. The scheme assumes that the
working lines are unlikely to fail at the same time.
The SONET linear APS specification says that fault recovery be completed within 50
milliseconds in all of the schemes discussed previously.
Ring Networks
In the figure above, a, b and c represents the three sites and are connected by three
add-drop multiplexers. At node b, two STS-n tributaries are inserted destined for node
c and for node a, respectively. The first tributary ends at node c and second tributary
flows across node c and terminates at node a.
SONET ring networks provide good service even in case of faults. SONET networks
suffers from the drawback where scalability issue is concerned. As networks carries
more traffic , certain spans in a ring will become congested. To increase the capacity
of a single span in a single ring network, all the ADMs need to be upgraded at the
same time. This upgrade involves very high expense and effort.
The drawback can be eliminated by building multiple parallel ring networks.
This approach is compatible with WDM transmission system, which provides parallel
rings using a single fiber channel. At each node, the signal carried in each wavelength
must be connected to a separate ADM. To exchange traffic between ADMs at a
node, the traffic must first be dropped from a source ADM, connected to a switch and
then added into the destination ADM.
In SONNET cross-connect system can take SONNET OC-n optical signals at its
inputs, decompose these signals into its components STS-1 or other tributaries, switch
these component signals to output ports and combine the component signals into
outgoing SONET OC-n signals. Mesh networks are constructed by interconnecting
cross-connect systems with SONNET optical lines .
Mesh networks
When certain segments become congested, mesh networks have the advantage that
only the capacity of the affected segments have to be upgraded. Mesh networks
require less protection bandwidth than ring networks.
The advantage of all optical networks is that they can carry signals transparently. In
WDM each wavelength is modulated separately, so each wavelength need not carry
information in the same format. Optical mesh networks based on optical cross-
connect and optical fiber switching systems are used as backbone of transport
networks. The use of fiber switch is to transfer entire multiwavelength signals from
input ports to output ports without demultiplexing.
Figure shown above, optical signals that carry WDM signals arrive in individual
fibers to a node. Optical signals that carry signals destined for the node are switched
to the local wavelength cross-connect. The wavelength signals are destined for the
node are then dropped. Locally generated wavelengths signals are added through the
cross-connect. Next the outputs from the cross-connect are fed to WDM multiplexers
that produce composite optical signals that are then inserted into the fiber switch and
transferred out in an outgoing fiber.
Circuit switches
The function of a circuit switch is to transfer the signal that arrives at a given input to
an appropriate output. The interconnection of a sequence of transmission links and
circuit switches enables the flow of information between inputs and outputs in the
network.
Space-division switches
Crossbar switch
The crossbar switch consists of an N x N array of crosspoints that can connect any
input to any available output. When a request comes in from an incoming line for an
outgoing line, the corresponding crosspoint is closed to enable information to flow
from the input to the output. The crossbar switch is nonblocking switch means
requests are never denied because of lack of connectivity resources that is
crosspoints. Connections requests are denied when only outgoing line is already in
use.
Here , we determine when a multistage switch becomes nonblocking. The worst case
for the desired input is when all the other inputs in its group have already connected.
Similarly it is same for the output , where all the other outputs in its group have
already been connected. The set of routes which uses the intermediate switches
already in use shown in the next figure.
Each existing connection uses a different intermediate switch. The maximum number
of intermediate switches not available to connect the desired input to the desired
output is 2 (n-1). Suppose k = 2n -1 , then k paths are available from any input group
to any output group, because 2 (n -1) of these paths are already in use, it follows a
single path remains available to connect the desired input to the desired output.
Hence, the multistage switch k = 2n -1 is nonblocking.
The number of crosspoints required in a three stage switch is the sum of the following
components
• N/n input switches x nk crosspoints/input switch
• K intermediate switches x (N/n)^2 crosspoints/intermediate switch
• N/n output switches x nk crosspoints/output switch.
Total number of crosspoints is 2 Nk + k (N/n)^2. The number of crosspoints required
to make the switch nonblocking is
2 N(2n -1) + (2n-1)(N/n)^2.
We know in TDM a slot within a frame refers to a single connection. The time-slot
interchange (TSI) technique replaces the crosspoints in a space switch with the
reading and writing of a slot into a memory. Assume we have many speakers want to
have conversation. The speech of the speaker are sampled at 8000 bytes/second and
also bytes are placed on T-1 carrier shown in the next figure.
In the figure above , first pair of speakers are assigned slots 1 and 23. For the
speakers to hear each other, we need to route slots 1 and 23 in the incoming frames to
slots 23 and 1 in the outgoing frames. The octets in each incoming frame are stored
into a register. The call setup procedure has a set a permutation table that controls the
order in which the contents of the register are read out. Hence the outgoing the frame
begins by reading the contents of slot 23, followed by slot 24 and so on until slots 1
and 2 are read.
A hybrid switch, TSI switches are used at the input and output stages and a crossbar
space switch is used at the intermediate stage. These switches are called time-space-
time switches. We replace n x k switch in the first stage of a multistage space switch
by an n x k TSI switch , shown in the next figure.
Each input line to the switch corresponds to a slot, so the TSI switch has input frames
of size n slots. The output frame from the TSI switch has k slots. In essence, n slots
from the incoming frame and reading them out in a frame of size k, according to
some preset permutation table. The first slot corresponds to the first output line out of
each of the first stage switches. First line out of the first stage switch is connected to
the first intermediate switch. Hence, first slot in each intermediate frame will be
directed to intermediate switch 1 shown in the next figure.
The second slot in a frame is directed to crossbar switch 2 and all other intermediate
switches are idle. It thus becomes apparent that only one of the crossbar switches is
active during any given timeslot. This makes it possible, to replace the k intermediate
crossbar switches with a single crossbar switch that is time-shared among the k slots
in a frame shown in the next figure.
To replace the k intermediate original crossbar switches, the time-
shared crossbar switch must be reconfigured to the interconnection pattern of the
corresponding original switch at every time slot. This approach to sharing a space
switch is called time-division multiplexing.