Physical Layer
Physical Layer
Outline
Introduction of LAN; MAN; WAN; PAN, Ad-hoc Network
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
PAN
CAN
MAN
DISTINGUISH BETWEEN LAN,WAN,MAN
PARAMETERS LAN WAN MAN
Geographical area
Small Very large Moderate
covered
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
BUS
RING
STAR
MESH
TREE
HYBRID
BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called
Linear Bus topology.
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
Advantages: Disadvantages:
Very secure requires professional
administration
Better performance
More hardware-intensive
Centralized backup
More software intensive
very reliable
Expensive dedicated software
TYPES OF SERVERS
TYPES OF SERVERS
File server: These servers provide the services for storing,
retrieving and moving the data. A user can read, write, exchange
and manage the files with the help of file servers.
Printer server: The printer server is used for controlling and
managing printing on the network. It also offers the fax service to
the network users.
Application server: The expensive software and additional
computing power can be shared by the computers in a network
with he help of application servers.
Message server: It is used to co-ordinate the interaction
between users, documents and applications. The data can be used
in the for of audio, video, binary, text or graphics.
Database server: It is a type of application server. It allows the
uses to access the centralised strong database.
Distributed Networks
Arrangement of networked computers in which several processors
(the CPUs) are located on scattered machines, but are capable of
working both independently and jointly as required.
The key elements of Distributed Network Architecture are, as the
name implies, the distribution of decision-making and control out
to each site, while simultaneously, networking and synchronizing
the various sites together via a central hub.
Distributed networking is a distributed computing network
system, said to be distributed when the computer programming
and the data to be worked on are spread out across more than one
computer. Usually, this is implemented over a computer network.
Benefits of Distributed Network Architecture
Scalability: Enterprise solutions that rely on a single
Enterprise server inevitably suffer from performance issues
as the Enterprise grows and the server is overwhelmed.
Moreover, single server solutions are highly susceptible to
network failures.
Cost: Servers and software at each local site can be
appropriately sized to meet the specific needs of each site,
without requiring installing an expensive server at even the
smallest sites.
Reliability: Distributed Network Architecture is much
more tolerant of network and hardware failures than a single
server approach.
SDN- Software Defined Network
SDN Architecture
Need /Goal of SDN
The goal of SDN is to allow network engineers and
administrators to respond quickly to changing business
requirements. In a software-defined network, a network
administrator can shape traffic from a centralized control
console without having to touch individual switches, and can
deliver services to wherever they are needed in the network,
without regard to what specific devices a server or other
hardware components are connected to. The key technologies
for SDN implementation are functional separation, network
virtualization and automation through programmability.
SDN Concept
Software-defined networking (SDN) is an approach to computer
networking that allows network administrators to manage
network services through abstraction of higher-level functionality.
Directly programmable
Agile: administrators dynamically adjust network-wide traffic flow to meet changing needs.
Centrally managed
Programmatically configured: SDN lets network managers configure, manage, secure, and
optimize network resources very quickly via dynamic, automated SDN programs
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
It operated independently.
It is scalable.
Client/server architecture.
Supports a number of routing protocols.
Can be used to establish a connection between two
computers.
Demerits of TCP/IP
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
Unshielded
twisted pair
Fiber optic
UTP characteristics
Unshielded
Twisted (why?) pairs of insulated conductors
Covered by
insulating sheath
UTP categories
Category 1 Voice only (Telephone)
Fiber Media
Optical fibers use light to send information through the
optical medium.
It uses the principal of total internal reflection.
Modulated light transmissions are used to transmit the signal.
Total Internal Reflection
Fiber Media
Light travels through the optical media by the way of total
internal reflection.
Modulation scheme used is intensity modulation.
Two types of Fiber media :
1. Multimode
2. Singlemode
Multimode Fiber can support less bandwidth than Singlemode
Fiber.
Singlemode Fiber has a very small core and carry only one beam
of light. It can support Gbps data rates over > 100 Km without
using repeaters.
Physical Media
Fiber-Optic Cable
Contains one or several glass fibers at its core
Surrounding the fibers is a layer called cladding
Physical Media
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
Function of a repeater
Switches
A network switch is a computer networking device that
connects devices together on a computer network by using
packet switching to receive, process, and forward data to the
destination device.
Unlike less advanced network hubs, a network switch
forwards data only to the devices that need to receive it,
rather than broadcasting the same data out of each of its
ports.
It uses Ethernet (MAC Address) address.
Store and Forward Switches
Do error checking on each frame after the entire frame has
arrived into the switch
If the error checking algorithm determines there is no error,
the switch looks in its MAC address table for the port to
which to forward the destination device
Highly reliable because doesn’t forward bad frames
Slower than other types of switches because it holds on to
each frame until it is completely received to check for errors
before forwarding
Cut Through Switch
Faster than store and forward because doesn’t perform error
checking on frames
Reads address information for each frame as the frames enter
the switch
After looking up the port of the destination device, frame is
forwarded
Forwards bad frames
Performance penalty because bad frames can’t be used and
replacement frames must be sent which creates additional
traffic
Unmanaged/Intelligent switches
Unmanaged – provides LAN’s with all the benefits of
switching. Fine in small networks
Learning • the process by which the bridge learns how to reach stations on
Algorithm the internetwork.
Types of Bridges
Transparent Bridge
• Also called learning bridges
• Build a table of MAC addresses as frames arrive
• Ethernet networks use transparent bridge
• Duties of transparent bridge are : Filtering frames,
• forwarding and blocking
Source Routing Bridge
• Used in Token Ring networks
• Each station should determine the route to the destination when it
wants to send a frame and therefore include the route information in
the header of frame.
• Addresses of these bridges are included in the frame.
• Frame contains not only the source and destination address but also
the bridge addresses.
Advantages And Disadvantages Of Bridges
• Advantages of using a bridge
– Extend physical network
– Reduce network traffic with minor segmentation
– Creates separate collision domains
– Reduce collisions
– Connect different architecture
• Disadvantages of using bridges
– Slower that repeaters due to filtering
– Do not filter broadcasts
– More expensive than repeaters
Comparison of Switch and Bridge
Switch Bridge
A switch when compared to bridge has Bridge has a single incoming and outgoing
multiple ports. port.
Switches can perform error checking A bridge maintains a MAC address table for
before forwarding data. both LAN segments it is connected to.
Switches are very efficient by not Bridge filters traffic on the LAN by looking at
forwarding packets that error-ed out the MAC address.
or forwarding good packets selectively Bridge looks at the destination of the packet
to correct devices only. before forwarding unlike a hub.
Switches can support both layer 2 It restricts transmission on other LAN
(based on MAC Address) and layer 3 segment if destination is not found.
(Based on IP address) depending on Bridges are used to separate parts of a
the type of switch. network that do not need to communicate
Usually large networks use switches regularly, but need to be connected.
instead of hubs to connect computers
within the same subnet.
Two and Three layer switches
• Two layer switch operate at PHY and data link
layer
• Three layer switch operates at network layer
• Bridge is an example of two-layer switch.
• Bridge with few port can connect a few LANs
• Bridge with many port may be able to allocate a
unique port to each station, with each station on its
own independent entity. This means no competing
traffic (no collision as we saw in Ethernet)
3-layer switches- Router
• Routes packets based on their logical addresses (host-to-host
addressing)
• A router normally connects LANs and WANs in the Internet and
has a routing table that is used for making decision about the
route.
• The routing tables are normally dynamic and are updated
using routing protocols.
Routers connecting
independent LANs and
WANs
Advantages and Disadvantages of Routers
• Advantages
– Routers
-provide sophisticated routing, flow control, and traffic
isolation
-are configurable, which allows network manager to
make policy based on routing decisions
-allow active loops so that redundant paths are available
• Disadvantages
– Routers
– are protocol-dependent devices that must understand
the protocol they are forwarding.
– can require a considerable amount of initial
configuration.
– are relatively complex devices, and generally are more expensive
than bridges.
Routers versus Bridges
• Addressing
– Routers are explicitly addressed.
– Bridges are not addressed.
• Availability
– Routers can handle failures in links, stations, and other routers.
– Bridges use only source and destination MAC address, which
does not guarantee delivery of frames.
Message Size
» Routers can perform fragmentation on packets and thus handle
different packet sizes.
» Bridges cannot do fragmentation and should not forward a
frame which is too big for the next LAN.
Forwarding
» Routers forward a message to a specific destination.
» Bridges forward a message to an outgoing network.
Priority
» Routers can treat packets according to priorities
» Bridges treat all packets equally.
Error Rate
» Network layers have error-checking algorithms that
examines each received packet.
» The MAC layer provides a very low undetected bit error
rate.
Security
» Both bridges and routers provide the ability to put “security
walls” around specific stations.
» Routers generally provide greater security than bridges because
– they can be addressed directly and
– they use additional data for implementing security.
Brouters: Bridging Routers
Combine features of bridges and routers.
Capable of establishing a bridge between two networks as well as
routing some messages from the bridge networks to other
networks.
Are sometimes called (Layer 2/3) switches and are a
combination of bridge/router hardware and software.
Gateway
• Interchangeably used term router and gateway
• Connect two networks above the network layer of OSI model.
• Are capable of converting data frames and network
protocols into the format needed by another network.
• Provide for translation services between different computer
protocols.
• Transport gateways make a connection between two
networks at the transport layer.
• Application gateways connect two parts of an application in the
application layer, e.g., sending email between two machines using
different mail formats
• Broadband-modem-router is one e.g. of gateway
Access Point
In computer networking, a wireless access point (WAP)
is a networking hardware device that allows a Wi-Fi
device to connect to a wired network. The WAP usually
connects to a router (via a wired network) as a standalone
device, but it can also be an integral component of the
router itself.
Access Point
Access Point(AP) units serve areas of a building, similar to
base units of cordless telephones except each AP can connect
to many computers. APs serve as network bridges between
the wired and wireless portions of the network.
Outline
Introduction of LAN; MAN; WAN; PAN, Ad-hoc Network
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
Coding is the process of embedding clocks into a given data stream and
producing a signal that can be transmitted over a selected medium.
Receiver is responsible for "decoding" i.e. separating clocks and data from the
incoming embedded stream.
There are 4 possible encoding techniques that can be used on the data: Digital-
to-digital, Digital-to-Analog, Analog-to-analog, Analog-to-digital.
Digital-to-Digital Encoding
•The binary signals created by your computer (DTE) are translated into a sequence of voltage
pulses that can be sent through the transmission medium.
•Binary signals have two basic parameters: amplitude and duration.
•As the number of bits sent per unit of time increases, the bit duration decreases.
•The three most common methods of encoding used are: unipolar , polar , and bipolar .
UNIPOLAR ENCODING
Code is self-clocking
Transition for every bit in the middle of the bit cell
Transition at the beginning of the bit cell if the next bit is " 0 "
NO Transition at the beginning of the bit cell if the next bit is " 1 "
Used in Token Ring or IEEE 802.5-compliant LANs.
Differential Manchester encoding
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
The important ones are marked with *. The ones marked with are hibernating. The
158
one marked with † gave up.
IEEE 802.11 Wireless LAN Standard
• Lowest cost
Infrared • Lowest range compared to spread spectrum
• Doesn’t penetrate walls, so no eavesdropping
What is meant by Spread Spectrum
Spread spectrum is a form of wireless communications in
which the frequency of the transmitted signal
is varied. This results in a much greater bandwidth than the
signal (Bss >> B)
6.163
Frequency Hopping Spread Spectrum
(FHSS)
Signal is broadcast over seemingly random series of radio
frequencies
Signal hops from frequency to frequency at fixed intervals
Receiver, hopping between frequencies in synchronization with
transmitter, picks up message
Advantages
Efficient utilization of available bandwidth
Eavesdropper hear only unintelligible blips
Attempts to jam signal on one frequency succeed only at knocking out a
few bits
Frequency hopping spread spectrum (FHSS)
6.165
Frequency hopping spread spectrum (FHSS)
6.166
FHSS cycles
Bandwidth sharing difference between FDM and FHSS
Direct Sequence Spread Spectrum (DSSS)
Topologies
Network Architectures
OSI Model
TCP/IP Model
Transmission Mediums
Network Devices
Text Books:
Andrew S. Tenenbaum, “Computer Networks”,5th Edition, PHI, ISBN 81-203-2175-8.
Fourauzan B., "Data Communications and Networking", 5th Edition, Tata McGraw-
Hill, Publications, 2006