Data Communication and Networking Notes 2 - TutorialsDuniya
Data Communication and Networking Notes 2 - TutorialsDuniya
COM
Data Communication
& Networking Notes
m
NETWORKING FUNDAMENTALS
co
Unit Structure
a.
1.0 Objectives
1.1 Introduction
iy
1.2 Data & Information
1.3 Data Communication
un
1.3.1 Characteristics of Data Communication
1.3.2 Components of Data Communication
1.4 Data Representation
1.5 Data Flow
sD
1.5.1. Simplex
1.52. Half Duplex
1.5.3. Full Duplex
al
1.0 OBJECTIVES:
1.1 INTRODUCTION
m
This exchange of data takes place over a computer network.
co
1.2 DATA & INFORMATION
Data refers to the raw facts that are collected while information
a.
refers to processed data that enables us to take decisions.
Ex. When result of a particular test is declared it contains data
iy
of all students, when you find the marks you have scored you
have the information that lets you know whether you have
passed or failed.
un
The word data refers to any information which is presented in a
form that is agreed and accepted upon by is creators and users.
sD
information
In case of computer networks this exchange is done between
two devices over a transmission medium.
ri
m
real time transmission of data.
4. Jitter: It is the variation in the packet arrival time. Uneven Jitter
may affect the timeliness of data being transmitted.
co
1.3.2 Components of Data Communication
a.
A Data Communication system has five components as
shown in the diagram below:
iy
un
sD
al
1. Message
ri
2. Sender
The sender is any device that is capable of sending the data
(message).
Tu
3. Receiver
The receiver is a device that the sender wants to communicate the
data (message).
4. Transmission Medium
It is the path by which the message travels from sender to receiver.
It can be wired or wireless and many subtypes in both.
5. Protocol
It is an agreed upon set or rules used by the sender and
receiver to communicate data.
A protocol is a set of rules that governs data communication.
A Protocol is a necessity in data communications without
which the communicating entities are like two persons trying
to talk to each other in a different language without know the
other language.
m
1.4 DATA REPRESENTATION
co
Data is collection of raw facts which is processed to deduce
information.
a.
There may be different forms in which data may be represented.
Some of the forms of data used in communications are as follows:
iy
1. Text
Text includes combination of alphabets in small case as well
as upper case.
un
It is stored as a pattern of bits. Prevalent encoding system :
ASCII, Unicode
2. Numbers
sD
4. Audio
Data can also be in the form of sound which can be recorded
and broadcasted. Example: What we hear on the radio is a
source of data or information.
m
Audio data is continuous, not discrete.
5. Video
co
Video refers to broadcasting of data in form of picture or movie
a.
wo devices communicate with each other by sending and
receiving data. The data can flow between the two devices in the
iy
following ways.
1. Simplex
2. Half Duplex
un
3. Full Duplex
1.5.1 Simplex
sD
al
ri
to
Tu
m
Figure: Half Duplex Mode of Communication
co
but not at the same time.
When one device is sending other can only receive and vice-
versa (as shown in figure above.)
a.
Example: A walkie-talkie.
iy
un
sD
Definition:
A computer network can be defined as a collection of nodes.
A node can be any device capable of transmitting or
receiving data.
The communicating nodes have to be connected by
communication links.
m
a network inside an office on one of the floor of a building
or a LAN could be a network consisting of the computers in
a entire building.
co
B. Wide Area Network (WAN) is made of all the networks in a
(geographically) large area. The network in the entire state
of Maharashtra could be a WAN
a.
C. Metropolitan Area Network (MAN) is of size between
iy
LAN & WAN. It is larger than LAN but smaller than WAN. It
may comprise the entire network in a city like Mumbai.
un
1.7 PROTOCOL
cannot occur. The sending device cannot just send the data
and expect the receiving device to receive and further
interpret it correctly.
al
A. Syntax
It means the structure or format of the data.
It is the arrangement of data in a particular order.
B. Semantics
It tells the meaning of each section of bits and
indicates the interpretation of each section.
It also tells what action/decision is to be taken based
on the interpretation.
m
C. Timing
It tells the sender about the readiness of the receiver to
co
receive the data
It tells the sender at what rate the data should be sent
to the receiver to avoid overwhelming the receiver.
a.
1.7 STANDARDS IN NETWORKING
iy
Standards are necessary in networking to ensure
interconnectivity and interoperability between various
un
networking hardware and software components.
interconnectivity.
categories:
1. De facto Standard
to
2. De jure standard
o It means by law or by regulation.
o These standards are legislated and approved by
an body that is officially recognized.
m
(IEEE)
5. Electronic Industries Associates (EIA)
co
o Examples of Forums
1. ATM Forum
2. MPLS Forum
3. Frame Relay Forum
a.
o Examples of Regulatory Agencies:
iy
1. Federal Communications Committee (FCC)
1.9 REFERENCES
ri
Tu
m
Signals
co
Unit Structure
2.0 Objectives
a.
2.1 Introduction
2.2 Data & Signals
2.2.1 Data –types
iy
2.2.2 Signal – types
2.2.3 Periodic & Non Periodic Signals
un
2.3 Analog Signal
2.3.1 Characteristics of Analog Signal
2.3.1.1 Peak Amplitude
sD
2.3.1.2 Frequency
2.3.1.3 Phase
2.3.2 Relation between Frequency & Period
2.3.3 Wavelength
al
2.4.2 Level
2.4.3 Bit lenght or Bit Interval
2.4.4 Bit Rate
Tu
2.0 OBJECTIVES
m
2.1 INTRODUCTION
co
point to another. During transit data is in the form of
electromagnetic signals. Hence it is important to study data and
signals before we move to further concepts in data communication.
a.
2.2 DATA & SIGNALS
iy
To be transmitted, data must be transformed to
electromagnetic signals.
un
2.2.1. Data can be Analog or Digital.
form of Os and 1s
ri
values
Tu
Signals which repeat itself after a fixed time period are called
Periodic Signals.
Signals which do not repeat itself after a fixed time period
are called Non-Periodic Signals.
In data communications, we commonly use periodic
analog signals and non-periodic digital signals.
m
An analog signal has infinitely many levels of intensity over a
period of time.
co
As the wave moves from value A to value B, it passes
through and includes an infinite number of values along its
path as it can be seen in the figure below.
a.
A simple analog signal is a sine wave that cannot be further
decomposed into simpler signals.
iy
un
sD
al
ri
3. Phase
m
co
a.
iy
un
Fig. Amplitude of a sine wave
2.3.1.2. Frequency
sD
2.3.1.3. Phase
Phase describes the position of the waveform with respect to time
(specifically relative to time O).
m
co
a.
iy
un
sD
al
ri
m
T = 1/ F = 1/ 100 = 0.01 sec
co
frequency is given by
F = 1 / T = 1 / 0.25 = 4 Hz
2.3.3 Wavelength
a.
The wavelength of a signal refers to the relationship between
frequency (or period) and propagation speed of the wave
through a medium.
iy
The wavelength is the distance a signal travels in one
period.
It is given by
un
Wavelength = Propagation Speed X Period
OR
Wavelength =Propagation Speed X 1 a
sD
Frequency
It is represented by the symbol : λ (pronounced as lamda)
It is measured in micrometers
It varies from one medium to another.
al
frequency domain.
The time-domain plot shows changes in signal amplitude
with respect to time. It indicates time and amplitude relation
Tu
of a signal.
The frequency-domain plot shows signal frequency and
peak amplitude.
The figure below show time and frequency domain plots of
three sine waves.
m
co
Fig: Time domain and frequency domain plots of three sine
waves*
a.
A complete sine wave in the time domain can be
represented by one single spike in the frequency domain
iy
2.3.5. Composite Signal
un
A composite signal is a combination of two or more simple
sine waves with different frequency, phase and amplitude.
If the composite signal is periodic, the decomposition gives a
series of signals with discrete frequencies; if the composite
sD
signal is non-periodic, the decomposition gives a
combination of sine waves with continuous frequencies.
al
ri
to
Tu
m
A periodic composite signal can be decomposed into a
series of signals with discrete frequencies.
co
A non-periodic signal when decomposed gives a
combination of sine waves with continuous frequencies.
a.
iy
un
sD
signal.
A digital signal can be explained with the help of following
points:
to
2.4.1 Definition:-
A digital is a signal that has discrete values.
Tu
2.4.2 LEVEL
Information in a digital signal can be represented in the
form of voltage levels.
Ex. In the signal shown below, a ‗1‘ is represented by a
positive voltage and a ‗0‘ is represented by a Zero voltage.
m
Fig: A digital signal with Two levels. „1‟ represented by a
co
positive voltage and „0‟ represented by a negative voltage
A Signal can have more than two levels
a.
iy
11 10 01 00 00 01 10 10
LEVEL
4
LEVEL
un
3
LEVEL
2
sD
LEVEL
1
al
= Log24
=2
Hence, 2 bits are required per level for a signal with four
levels.
2.4.3 BIT LENGTH or Bit Interval (Tb)
It is the time required to send one bit.
It is measured in seconds.
m
changes.
A digital signal with two levels ‗0‘ & ‗1‘ will have the same
baud rate and bit rate & bit rate.
co
The diagram below shows three signal of period (T) 1
second
a) Signal with a bit rate of 8 bits/ sec and baud rate of 8
a.
baud/sec
b) Signal with a bit rate of 16 bits/ sec and baud rate of 8
baud/sec
iy
c) Signal with a bit rate of 16 bits/ sec and baud rate of 4
baud/sec
un
sD
al
ri
to
Tu
Fig: Three signals with different bit rates and baud rates
m
This channel has the lowest frequency as ‗0‘ and highest
frequency as some non-zero frequency ‗f1‘.
co
This channel can pass all the frequencies in the range 0 to f1.
a.
frequency ‗f1‘ and highest frequency as some non-zero
frequency ‗f2‘.
This channel can pass all the frequencies in the range f1 to f2.
iy
un
sD
al
ri
to
Tu
m
We can easily transmit a signal with frequency below
100Hz, such a channel whose bandwidth is more than
the bandwidth of the signal is called Wideband channel
co
Logically a signal with frequency say 120Hz will be
blocked resulting in loss of information, such a channel
a.
whose bandwidth is less than the bandwidth of the signal
is called Narrowband channel
iy
2.6.2 Broad band Transmission
Given a bandpass channel, a digital signal cannot be
transmitted directly through it
un
In broadband transmission we use modulation, i.e we
change the signal to analog signal before transmitting it.
sD
m
co
a.
Fig: Broadband Transmission Involving Modulation &
Demodulation
iy
2.7 REVIEW QUESTIONS
un
1. Define analog and digital signals
2. Explain Composite analog signals.
3. Explain Time and Frequency Domain Representation of
sD
signals
4. Explain the characteristics of an Analog signal
5. Explain the characteristics of an Digital signal
6. Explain the difference between
al
3
BANDWIDTH
m
Unit Structure
3.0 Objectives
co
3.1 Introduction
3.2 Fourier Analysis
3.3 Bandwidth of a signal
a.
3.3.1 Bandwidth of an analog signal
3.3.2 Bandwidth of a digital signal
iy
3.4 Bandwidth of a channel
3.5 The Maximum Data Rate of a Channel
un
3.5.1 Nyquist Bit Rate
3.5.2 Shanno Capacity
3.6 Review Questions
3.7 References & Further Reading
sD
3.0 OBJECTIVES
al
To understand
Concept of bandwidth
Bandwidth of Analog signal
ri
3.1 INTRODUCTION
Tu
m
3.3 BANDWIDTH OF A SIGNAL
co
Bandwidth can be defined as the portion of the
electromagnetic spectrum occupied by the signal
a.
signal is transmitted.
iy
Different types of signals have different bandwidth. Ex. Voice
signal, music signal, etc
un
Bandwidth of analog and digital signals are calculated in
separate ways; analog signal bandwidth is measured in
terms of its frequency (hz) but digital signal bandwidth is
measured in terms of bit rate (bits per second, bps)
sD
m
co
a.
iy
un
sD
al
ri
domain
m
In terms of digital signal, bandwidth of the channel is the
maximum bit rate supported by the channel. i.e. the
maximum amount of data that the channel can carry per
co
second.
a.
transmitted signal will be either attenuated or distorted or
both leading in loss of information.
iy
The channel bandwidth determines the type of signal to be
transmitted i.e. analog or digital.
un
3.5 THE MAXIMUM DATA RATE OF A CHANNEL
b) A Noisy Channel
A realistic channel that has some noise.
Tu
Where,
Bitrate is the bitrate of the channel in bits per second
Bandwidth is the bandwidth of the channel
L is the number of signal levels.
Example
What is the maximum bit rate of a noiseless channel with a
bandwidth of 5000 Hz transmitting a signal with two signal
levels.
m
Solution:
The bit rate for a noiseless channel according to Nyquist Bit
co
rate can be calculated as follows:
BitRate = 2 x Bandwidth x Log2 L
= 2 x 5000 x log2 2 =10000 bps
a.
3.5.2 Shannon Capacity
iy
The Shannon Capacity defines the theoretical maximum bit
rate for a noisy channel
un
Capacity=bandwidth X log2 (1 +SNR)
sD
Where,
Capacity is the capacity of the channel in bits per
second
Bandwidth is the bandwidth of the channel
al
Calculate the bit rate for a noisy channel with SNR 300 and
bandwidth of 3000Hz
Solution:
Tu
m
Data Communication & Networking – Behrouz Forouzan
co
a.
iy
un
sD
al
ri
to
Tu
Download FREE Computer Science Notes at TutorialsDuniya.com
Download FREE Computer Science Notes at TutorialsDuniya.com
29
4
NETWORK MODELS
m
Unit Structure
4.0 Objectives
co
4.1 Introduction
4.2 Concept of Layered task
4.3 OSIRM
a.
4.3.1 Introduction to OSI Model & its layers
4.3.2 Layered Architecture of OSI Model
iy
4.3.3 Communication & Interfaces
4.3.4 Encapsulation of Data
4.3.5 Description of Layers in the OSI Model
un
4.4 Summary
4.5 Review Questions
4.6 References & Further Reading
sD
4.0 OBJECTIVES
4.1 INTRODUCTION
to
m
iv. The process of sending letter is shown below:
co
a.
iy
un
sD
al
b. Hierarchy of layers
vi. At the sender site, the activities take place in the following
Tu
descending order:
a. Higher Layer: The sender writes the letter along with the
sender and receivers address and put it in an envelope
and drop it in the mailbox.
b. Middle Layer: The letter is picked up by the post man and
delivered to the post office
c. Lower Layer: The letters at the post office are sorted and
are ready to be transported through a carrier.
viii. At the Receiver site, the activities take place in the following
ascending order:
a. Lower Layer: The carrier delivers the letter to the
destination post office
b. Middle Layer: After sorting, the letter is delivered to the
m
receivers mail box
c. Higher Layer: The receiver picks up the letter, opens the
envelope and reads it.
co
ix. Hierarchy of layers: The activities in the entire task are
organized into three layers. Each activity at the sender or
receiver side occurs in a particular order at the hierarchy.
a.
x. The important and complex activities are organized into the
iy
Higher Layer and the simpler ones into middle and lower
layer. un
4.3 OPEN SYSTEMS INTER CONNECTION
REFERENCE MODEL (OSIRM )
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer
Each layer has specific duties to perform and has to co-
operate with the layers above and below it.
The OSI model has 7 layers each with its own dedicated
task.
m
At Device A, the message is sent from the top layer i.e
Application Layer A then all the layers till it reaches its
physical layer and then it is transmitted through the
co
transmission medium.
a.
passes through all its other layers and moves upwards till it
reaches its Application Layer.
iy
un
sD
al
ri
to
Tu
m
co
Fig: Data Transfer through Intermediate nodes
a.
The Data Link layer determines the next node where the
message is supposed to be forwarded and the network layer
determines the final recipient.
iy
4.3.3 Communication & Interfaces
un
For communication to occur, each layer in the sending
device adds its own information to the message it receives
from the layer just above it and passes the whole package to
the layer just below it. Each layer in the receiving device
sD
m
co
a.
iy
un
sD
Fig: Encapsulation
m
The above process is called encapsulation
co
4.3.5.1 Physical Layer
I. The Physical Layer provides a standardized interface to
physical transmission media, including :
a.
a. Mechanical specification of electrical connectors
and cables, for example maximum cable length
b. Electrical specification of transmission line
iy
c. Bit-by-bit or symbol-by-symbol delivery
II. On the sender side, the physical layer receives the data from
un
Data Link Layer and encodes it into signals to be transmitted
onto the medium. On the receiver side, the physical layer
receives the signals from the transmission medium decodes
it back into data and sends it to the Data Link Layer as
sD
III. Interface
The Physical Layer defines the characteristics of interfaces
between the devices & transmission medium.
V. Data rate
The physical layer defines the data transmission rate i.e.
number of bits sent per second. It is the responsibility of the
m
physical layer to maintain the defined data rate.
co
To interpret correct and accurate data the sender and
receiver have to maintain the same bit rate and also have
synchronized clocks.
a.
VII. Line configuration
The physical layer defines the nature of the connection .i.e. a
iy
point to point link, or a multi point link.
II. On the sender side, the Data Link layer receives the data
from Network Layer and divides the stream of bits into
fixed size manageable units called as Frames and sends
it to the physical layer. On the receiver side, the data link
layer receives the stream of bits from the physical layer
and regroups them into frames and sends them to the
Network layer. This process is called Framing. It is
shown in the figure below:
m
co
Fig: Data Link Layer: The process of Framing
a.
III. Physical Addressing (inside / outside senders
network)
a. The Data link layer appends the physical address in
iy
the header of the frame before sending it to physical
layer.
un
b. The physical address contains the address of the
sender and receiver.
V. Error control
a. The data link layer imposes error control mechanism
to identify lost or damaged frames, duplicate frames
and then retransmit them.
b. Error control information is present in the trailer of a
frame.
m
4.3.5.3 Network Layer
I. The network layer makes sure that the data is delivered to
the receiver despite multiple intermediate devices.
co
II. The network layer at the sending side accepts data from the
transport layer, divides it into packets, adds addressing
information in the header and passes it to the data link layer.
a.
At the receiving end the network layer receives the frames
sent by data link layer, converts them back into packets,
iy
verifies the physical address (verifies if the receiver address
matches with its own address) and the send the packets to
the transport layer.
un
sD
al
ri
m
in the header, the intermediate node concludes that it is
not the final node but an intermediate node and passes
the packet to the data link layer where the data is
co
forwarded to the next node.
V. Routing
a.
VI. The network layer divides data into units called
packets of equal size and bears a sequence number for
rearranging on the receiving end.
iy
Each packet is independent of the other and may travel
using different routes to reach the receiver hence may
un
arrive out of turn at the receiver.
VI. The Network layer does not perform any flow control or error
ri
control
m
co
a.
iy
un
Fig: Transport Layer
VI. Flow Control & Error control: the transport layer also
carries out flow control and error control functions; but
unlike data link layer these are end to end rather than
node to node.
m
II. The session layer at the sending side accepts data
from the presentation layer adds checkpoints to it
co
called syn bits and passes the data to the transport
layer. At the receiving end the session layer receives
data from the transport layer removes the checkpoints
inserted previously and passes the data to the
a.
presentation layer.
iy
III. The checkpoints or synchronization points is a way of
informing the status of the data transfer. Ex. A
checkpoint after first 500 bits of data will ensure that
un
those 500 bits are not sent again in case of
retransmission at 650th bit.
sD
al
ri
to
Tu
m
co
a.
iy
un
Fig : Presentation Layer
III. Translation
The sending and receiving devices may run on different
sD
IV. Compression
Compression ensures faster data transfer. The data
ri
V. Encryption
It is the process of transforming the original message to
Tu
4.3.5.7Application Layer
I. The application layer enables the user to
communicate its data to the receiver by providing
m
co
a.
iy
un
Fig : Application Layer
V. Main Responsibility
Main Responsibility of Application layer is to provide
to
4.4 SUMMARY
Tu
m
4.5 REVIEW QUESTIONS
co
1. Explain the concept of layered task.
2. What is the OSI model? List its layers and explain their
responsibility in exactly one line.
3. Explain how the communication takes place between layers
a.
of OSI model.
4. Write a short note on encapsulation of data in OSI model.
iy
5. Differentiate between the working of Data link layer, Network
layer and Transport layer.
un
4.6 REFERENCE & FURTHER READING
al
ri
to
Tu
5
TCP/IP MODEL, ADDRESSING IN
TCP/IP – IPV4
m
Unit Structure
co
5.0 Objectives
5.1 Introduction
5.2 TCP/IP Model,
a.
5.3 Addressing In TCP/IP
5.4 IPv4
iy
5.4.1 IP addresses
5.4.2 Address Space
5.4.3 Notations used to express IP address
un
5.4.4 Classfull Addressing
5.4.5 Subnetting
5.4.6 CIDR
5.4.7 NAT
sD
5.0 OBJECTIVES
ri
TCP/IP
Understand IPv4 and importantly IP address and IP
header format
5.1 INTRODUCTION
m
Originally had four layers (bottom to top):
1. Host to Network Layer
2. Internet Layer
3. Transport Layer
co
4. Application Layer
The figure for TCP/IP model is as follows:
a.
iy
Application
un
Transport
Network or IP
sD
Host to Network
al
m
co
a.
iy
un
sD
al
ri
B. Network Layer or IP
Also called as the Internetwork Layer (IP). It holds the IP
protocol which is a network layer protocol and is
responsible for source to destination transmission of
data.
m
In other words, since there is no connection set up
between the sender and the receiver the packets find the
co
best possible path and reach the destination. Hence, the
word connection-less.
a.
The packets may get dropped during transmission along
various routes. Since IP does not make any guarantee
about the delivery of the data its call an unreliable
iy
protocol.
2. RARP
3. ICMP
4. IGMP
ri
m
C. Transport Layer
Transport layer protocols are responsible for
co
transmission of data running on a process of one
machine to the correct process running on another
machine.
a.
The transport layer contains three protocols:
1. TCP
2. UDP
iy
3. SCTP
II. It divides the data it receives from the upper layer into
segments and tags a sequence number to each
segment which is used at the receiving end for
al
reordering of data.
D. Application Layer
I. The Application Layer is a combination of Session,
Presentation & Application Layers of OSI models and
define high level protocols like File Transfer (FTP),
Electronic Mail (SMTP), Virtual Terminal (TELNET),
Domain Name Service (DNS), etc.
m
The TCP/IP protocol suited involves 4 different types of
addressing:
Physical Address
co
1.
2. Logical Address
3. Port Address
4. Specific Address
a.
iy
APPLICATION SPECIFIC
Processes
LAYER ADDRESS
un
sD
TRANSPORT PORT
TCP UDP SCTP
LAYER ADDRESS
al
ri
protocols
Tu
HOST TO
Protocols of underlying network used PHYSICAL
NETWORK
at physical & data link layer ADDRESS
LAYER
1. Physical Address
i. Physical Address is the lowest level of addressing, also
known as link address.
m
iii. The physical address is usually included in the frame and is
used at the data link layer.
co
iv. MAC is a type of physical address that is 6 byte (48 bit) in
size and is imprinted on the Network Interface Card (NIC) of
the device.
a.
v. The size of physical address may change depending on the
type of network. Ex. An Ethernet network uses a 6 byte MAC
iy
address.
2. Logical Address
i.
un
Logical Addresses are used for universal communication.
ii. Most of the times the data has to pass through different
networks; since physical addresses are local to the network
sD
iv. At the network layer, device i.e. computers and routers are
identified universally by their IP Address.
Tu
m
there is a need of addressing that helps identify the
source and destination processes. In other words, data
needs to be delivered not only on the correct device
co
but also on the correct process on the correct device.
X. A Port Address is the name or label given to a
process. It is a 16 bit address.
a.
XI. Ex. TELNET uses port address 23, HTTP uses port
address 80
iy
4. Specific Address
i. Port addresses address facilitates the transmission of data
un
from process to process but still there may be a problem with
data delivery.
using Google Talk. Every user has two windows open, user
A has two chat windows for B & C, user B has two chat
windows for A & C and so on for user C
al
ii. Again the responsibility of the port address is over here and
to
iii. Such address are user friendly addresses and are called
specific addresses.
m
2. Address Space
3. Notations used to express IP address
4. Classfull Addressing
co
5. Subnetting
6. CIDR
7. NAT
a.
8. IPv4 Header Format
5.4.1 IP addresses
iy
Every host and router on the Internet has an IP address,
which encodes its network number and host number.
un
The combination is unique: in principle, no two machines on
the Internet have the same IP address.
m
5.4.4 Classful addressing
In classful addressing, the address space is divided into five
co
classes: A, B, C, D, and E.
a.
iy
un
sD
al
ri
m
co
a.
The IP address 0.0.0.0 is used by hosts when they are being
booted.
iy
All addresses of the form 127.xx.yy.zz are reserved for
un
loopback testing, they are processed locally and treated as
incoming packets.
5.4.5 Subnetting
It allows a network to be split into several parts for internal
sD
use but still act like a single network to the outside world.
To implement subnetting, the router needs a subnet mask
that indicates the split between network + subnet number
al
number.
Tu
If 6 bits from the host Id are taken for subnet then available
bits are :
14 bits for network + 6 bits for subnet + 10 bits for host
With 6 bits for subnet the number of possible subnets is 2 6
which is 64.
With 10 bits for host the number of possible host are 2 10
which is 1022 (0 & 1 are not available)
5.4.6 CIDR
m
A class B address is far too large for most organizations and
a class C network, with 256 addresses is too small. This leads to
granting Class B address to organizations who do not require all
co
the address in the address space wasting most of it.
a.
A solution is CIDR (Classless InterDomain Routing) The
basic idea behind CIDR, is to allocate the remaining IP addresses
in variable-sized blocks, without regard to the classes.
iy
5.4.7 NAT (Network Address Translation)
The scarcity of network addresses in IPv4 led to the
un
development of IPv6.
provided by IPv4.
Transition from IPv4 to IPv6 is slowly occurring, but will take
years to complete, because of legacy hardware and its
incompatibility to process IPv6 address.
al
are:
10.0.0.0 – 10.255.255.255/8 (16,777,216 hosts)
172.16.0.0 – 172.31.255.255/12 (1,048,576 hosts)
Tu
Operation:
Within the Organization, every computer has a unique
address of the form 10.x.y.z. However, when a packet
leaves the organization, it passes through a NAT box that
converts the internal IP source address, 10.x.y.z, to the
organizations true IP address, 198.60.42.12 for example.
5.4.8 IP Header
m
co
a.
iy
un
Figure: The IPv4 (Internet Protocol) header
follows:
m
except the last one have this bit set. It is
needed to know when all fragments of a
datagram have arrived.
co
8 Fragment offset Used to determine the position of the
fragment in the current datagram.
a.
9 Time to live It is a counter used to limit packet lifetimes. It
must be decremented on each hop. When it
hits zero, the packet is discarded and a
iy
warning packet is sent back to the source
host.
un
10 Header It verifies Header for errors.
checksum
datagram is
2. Strict source routing : Gives complete
to
path to be followed
3. Loose source routing : Gives a list of
routers not to be missed
Tu
5.5 SUMMARY
m
12. Explain the header of and IPv4 Packet.
co
5.7 REFERENCE & FURTHER READING
a.
iy
un
sD
al
ri
to
Tu
INFORMATION ENCODING
m
Unit Structure
co
6.0 Objective
6.1 Introduction
6.2 Representing different symbols
a.
6.3 Minimizing Errors
6.4 Multimedia
iy
6.5 Multimedia and Data Compression
6.6 review questions
6.7 References
un
1. Data Communication & Networking – BehrouzForouzan
6.0 OBJECTIVES
sD
Multimedia
Sampling
Quantization
ri
6.1 INTRODUCTION
to
m
in computer understandable format.
co
language we have 26 capital letters from ―A to Z‖ and same way we
have small letters from ―a to z‖, we have numeric symbols like
(0,1,…9) and special symbols like (!,@,#,$,%,^,&,*, etc.)
a.
6.3 MINIMIZING ERRORS
iy
One way to represent the information is to use sound beep.
The different sound intensities can be utilized to represent the
un
around 162 different symbols.
ON. With sound beep we get some sound or none at all. When it is
no sound then the value must be 0. When we hear some sound
then value must be 1.
ri
m
No-beep Beep B 01
Beep No-beep C 10
Beep Beep D 11
co
Thus with the pair of sound devices, we get four ON/OFF
combinations and hence we can represent four symbols.
a.
If we extend the same technique with three sound devices
then we can get eight different codes to represent our symbols like
iy
(000,001,010,011,100,101,110 and 111)
6.4 Multimedia:
Now a day the computers that we use have additional
facilities such as:
al
6.4.1 Pictures/Images:
We can represent the data in the form of Images / Pictures.
Images are represented by the pixels i.e. the smallest element in
the picture.
m
co
(a) (b)
a.
iy
Figure (a) shows the computer screen made up of number of
dots (pixels). Figure (b) shows the letter W by illuminating specific
dots.
un
We can use a large number of pixels for better resolution.
Higher resolution gives better quality to the picture.
sD
If Image is black and white then we can use only one bit per
pattern. Bit 1 is used to represent white and bit 0 is used to
represent black.
ri
m
Computer screen Computer memory
01010111101010
co
10111010110110
01101010111101
10000111010101
01110101101011
a.
11010101011101
01101100110101
iy
un 0111101100
6.4.2 Video:
Animation is used as a basic technique for creating videos.
We get the animation if we show set of pictures rapidly, the
human eye gets an illusion that the picture is in motion.
sD
al
The above pictures show the idea behind the video. It shows
ri
the movements of the horse and his rider. If you were shown these
four pictures one after the other very fast, you would believe that
the horse is actually running.
to
6.4.3 Sound:
A sound wave in its most basic form continuous in nature. It
is continuous in two aspects:
Amplitude
Time
m
co
The sound needs to be converted into the digital form in order to
store it in the computer system. Thus if we have to show the zeros
and ones inside a computer‘s memory graphically, then we get the
a.
following figure:
iy
Amplitude
1
un
0 time
sD
3. Encoding
6.4.3.1 Sampling:
When we transfer the signal using pulse code modulation
and digital modulation the signal must be in the discrete time form.
But in real life the signal can be of analog type (e.g. voice).
In such a case it has to be first converted into discrete time signal.
m
discrete time signal (digital).
co
requirements:
a.
sampled form.
iy
The following figure explains the sampling process:
amplitude
un
time
sD
al
6.4.3.2 Quantization:
ri
amplitude
quantized signal
input signal
m
co
a.
iy
un time
5
Tu
4
14231341 3
2
0
Stored on the disk as a numbers
Quantization
m
duplication of the data or redundant information.
co
allow storage of multimedia files in more efficient manner by getting
rid of duplication/ redundancy by means of the process called as
Data Compression.
a.
6.6 REVIEW QUESTIONS
iy
8. Define multimedia
9. What is quantization
un
10. What is sampling and explain it‘s importance
6.7 REFERENCES
sD
al
ri
to
Tu
7
ERRORS, DETECTION & CORRECTION
m
Unit Structure
7.0 Objective
7.1 Introduction
co
7.2 Error Classification
7.3 Types of errors
7.4 Redundancy
a.
7.5 Detection versus correction
7.6 Hamming distance
iy
7.7 Cyclic Redundancy Check
7.8 Review questions
7.9 References
un
7.0 OBJECTIVE
sD
CRC concept
Checksum technic
ri
7.1 INTRODUCTION:
to
1. Attenuation:
As signal travels through the medium, its strength decreases
as distance increases, as shown in the figure 7.1, the example is
voice, it becomes weak over the distance and loses its contents
beyond a certain distance. As the distance increases attenuation
m
also increases.
Strength
co
a.
iy
Distance
un
Figure 7.1
2. Noise:
sD
3. Distortion:
When there is an interference of the different frequencies
ri
who travel across the medium with the different speed, Distortion
occurs. So it is important to have a space (guard space) between
to
m
Figure 7.2
1. Single-bit errors:
co
In single-bit error, a bit value of 0 changes to bit value 1 or
vice versa. Single bit errors are more likely to occur in parallel
transmission. Figure 7.3 (a)
a.
2. Burst errors:
In Burst error, multiple bits of the binary value changes.
iy
Burst error can change any two or more bits in a transmission.
These bits need not be adjacent bits. Burst errors are more likely to
occur in serial transmission. Figure 7.3 (b)
un
Original data Received data
0 1 0 0 1 1 0 1 1 1 0 0 0 0 1 1 0 1 1 1
sD
0 1 0 0 1 1 0 1 1 1 0 0 0 1 1 1 0 0 1 1
ri
7.4 REDUNDANCY
Tu
Receiver Sender
Data
0 1 1 0 1 1 0 Data 0 1 1 0 1 1 0
Yes
Rejected
Data
OK ?
No
m
co
0 1 1 0 1 1 0 0 1 1 0
0 1 1 0 1 1 0 0 1 1 0
a.
Data and Redundancy
iy
un
Medium
sD
Figure 7.4
al
and correction.
to
Tu
Figure 7.5
2. Parity Check:
In this technique, a redundant bit called a parity bit is
addedto every data unit so that the total number of 1‘s in the
unit(including the parity bit) becomes even (or odd). Following
Receiver Sender
Drop parity bit and accept the data Data 100101
Yes
Rejected
Data Even
m
?
No
co
Calculate
Calculate
Parity bit
Parity bit
a.
iy
Bits
100101 1
un
Medium
sD
columns). First we calculate the parity bit for each data unit. Then
we organize them into a table. We then calculate the parity bit for
eachcolumn and create a new row of 8 bits.
Tu
Original Data
0 1 1 0 1 1 0 0 Row
parities
1 1 0 1 0 0 1 0
m
1 1 1 0 0 1 1 1
co
0 0 0 1 1 1 0 1
Data and Parity bits
a.
0 1 0 0 0 1 0 0 Column
parities
iy
un
01101100 11010010 11100111 00011101 01000100
sD
new row of 8 bits; they are the parity bits for the whole block. Note
that the first parity bit in thefifth row is calculated based on all first
bits: the secondparity bit is calculated based on all second bits: and
ri
so on.We then attach the 8 parity bits to the original data andsend
them to the receiver.
to
m
divisor.
co
Receiver Sender
a.
Data CRC Data 00…0
n bits
iy
Data CRC
Divisor Divisor n+1 bits
un
remainder
sD
Figure :
Quotient
___1 1 1 1 0 1________
Divisor 1101 1 0 0 1 0 0 0 0 0 Extra bits
1 1 0 1
m
_________
1 000
co
1 1 0 1
_______
1 0 10
a.
1 1 01
______
111 0
iy
110 1
________
un 01 1 0
0 0 0 0
_______
1 1 0 0
sD
1 1 0 1
________
0 0 1 Remainder
al
Figure:
Quotient
___1 1 1 1 0 1________
Divisor 1 1 0 1 1 0 0 1 0 0 0 0 1 CRC
m
1 1 0 1
_________
1 000
co
1 1 0 1
_______
1 0 10
a.
1 1 01
______
iy
111 0
110 1
________
un
01 1 0
0 0 0 0
_______
sD
1 1 0 1
1 1 0 1
________
0 0 0 Result
al
ri
Performance:
CRC is a very effective error detection method. If the divisoris
chosen according to the previously mentioned rules,
to
1.CRC can detect all burst errors that affect an odd numberof bits.
Tu
2.CRC can detect all burst errors of length less than or equalto the
degree of the polynomial
3.CRC can detect, with a very high probability, burst errorsof length
greater than the degree of the polynomial.
3. Checksum
A checksum is fixed length data that is the result of
performing certain operations on the data to be sent from sender to
the receiver. The sender runs the appropriate checksum algorithm
to compute the checksum of the data, appends it as a field in the
When the receiver receives the data, the receiver runs the
same checksum algorithm to compute a fresh checksum. The
receiver compares this freshly computed checksum with the
checksum that was computed by the sender. If the two checksum
matches, the receiver of the data is assured that the data has not
changed during the transit.
m
Hamming Code:
co
The Hamming code can be applied to data units of any
length and uses the relationship between data and redundancy bits
discussed above. For example, a 7-bit ASCII code requires 4
redundancy bits that can be added 10 the end of the data unit or
a.
interspersed with the original data bits. In following Figure,these
bits are placed in positions 1, 2,4, and 8 (the positions in an 11-bit
iy
sequence that are powers of 2). For clarity in the examples below,
we refer to these bits as r1, r2, r4, and r8.
un
11 10 9 8 7 6 5 4 3 2 1
d d d r8 d d d r4 d r2 r1
sD
r1 : bits 1,3,5,7,9,11
r2 : bits 2,3,6,7,10,11
r3 : bits 4,5,6,7
ri
r4 : bits 8,9,10,11
to
Tu
d d d r8 d d d r4 d r2 r1
1
m
11 10 7 6 3 2
d d d r8 d d d r4 d r2 r1
co
r4will be assigned to these bits position:
7 6 5 4
a.
d d d r8 d d d r4 d r2 r1
iy
un
11 10 9 8
d d d r8 d d d r4 d r2 r1
sD
Data is: 1 0 0 1 1 0 1
ri
11 10 9 8 7 6 5 4 3 2 1
to
1 0 0 1 1 0 1
Tu
Adding r1:
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 0 1 1
Adding r2:
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 0 1 0 1
Adding r4:
m
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 0 0 1 0 1
co
a.
Adding r8:
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 1 1
iy 0 0 1 0 1
un
sD
Code: 10011100101
new parity values into a binary number inorder of r position (r8 r4,
r2, r1). In our example, this stepgives us the binary number 0111 (7
in decimal), which is theprecise location of the bit in error.
to
Tu
Corrupted bit
1 0 0 1 0 1 0 0 1 0 1
1 0 0 1 0 1 0 0 1 0 1
m
co
1 0 0 1 0 1 0 0 1 0 1
a.
1 0 0 1 0 1 0 0 1 0 1
iy
un
Error bit position 7 : 01 1 1
sD
7.9 REFERENCES
SIGNAL ENCODING
m
Unit Structure
co
8.0 Objectives
8.1 Introduction to Signal Encoding
8.2 Synchronization
a.
8.3 Digital Data to Digital Signal
8.3.1 Line EnCoding
iy
8.3.2 Classification of Line Coding Schemes
8.3.2.A Unipolar - NRZ
8.3.2.B Polar-NRZ, NRZ-L, NRZ-I, RZ, Biphase
un
8.3.2.C Bipolar - AMI, Pseudoternary
8.3.2.D Multilevel - mBnL, 4D-PAMS
8.3.2.E MultiTransision- MLT-3
sD
8.4.2.1.2 FM
8.4.2.1.3 PM
to
8.4.2.2.2 FSK
8.4.2.2.3 PSK
8.4.2.2.4 QAM
8.4.2.3 Analog to Digtal conversion using modulation)
8.4.2.3.1 PAM
8.4.2.3.2 PCM
8.4.2.3.3 PWM
8.5 Review Questions
8.6 References & Further Reading
8.0 OBJECTIVES
m
8.1 INTRODUCTION TO SIGNAL ENCODING
co
represents it.
Signal encoding is the conversion from analog/digital data
to analog / digital signal.
a.
iy
un
sD
al
ri
to
Tu
8.2 SYNCHRONIZATION
m
In order to receive the signals correctly, the receivers bit
intervals must correspond exactly to the senders bit
intervals.
co
The clock frequency of the transmitter and receiver should
be the same.
a.
If the clock frequency at the receiver is slower or faster than
the bit intervals are not matched and the received signal is
different than the transmitted one.
iy
un
sD
al
ri
to
Tu
Figure : Synchronization
m
8.3 Digital Data to Digital Signal
co
Coding methods Coding methods are used to convert digital
data into digital signals.
a.
1 Line Coding
2 Block Coding
iy
Scrambling is also one of the ways to convert digital data to digital
signals but is not used.
un
8.3.1 Line Encoding
It is the process of converting Digital data into digital
signal.
sD
m
co
a.
iy
un
Figure : Classification of line coding schemes
sD
8.3.2.A Unipolar
All signal levels are either above or below the time axis.
NRZ - Non Return to Zero scheme is an example of this
al
8.3.2.B Polar
NRZ-voltages are on both sides of the time axis.
Polar NRZ scheme can be implemented with two voltages.
to
Polar – RZ
The Return to Zero (RZ) scheme uses three voltage
values. +, 0, -.
m
co
a.
iy
un
sD
m
co
a.
Figure : Polar biphase: Manchester and differential Manchester
coding schemes
iy
8.3.2.C Bipolar - AMI and Pseudoternary
This coding scheme uses 3 voltage levels: - +, 0, -, to
un
represent the symbols
8.3.2.D Multilevel
Here the number of data bits is increased per symbol to
increase the bit rate.
2 types of data element a 1 or a 0 are available, it can be
combined into a pattern of n elements to create 2m symbols.
Using L signal levels we can have n signal elements to
create Ln signal elements. The following possibilities can
occur:
m
With 2m symbols and Ln signals:
If 2m > Ln then we cannot represent the data elements,
we don‘t have enough signals.
co
If 2m = Ln then we have an exact mapping of one symbol
on one signal.
If 2m < Ln then we have more signals than symbols and
a.
we can choose the signals that are more distinct to
represent the symbols and therefore have better noise
iy
immunity and error detection as some signals are not
valid
These types of codings are classified as mBnL schemes. In
un
mBnL schemes, a pattern of m data elements is encoded as
a pattern of n signal elements in which 2m≤ Ln.
2B1Q (two binary, one quaternary)
sD
m
co
a.
Figure : Multilevel coding scheme : 8B6T
iy
4D-PAM5 (Four Dimensional Five-Level Pulse Amplitude
Modulation)
4D -means that data is sent over four channels at the
un
same time.
It uses five voltage levels, such as -2, -1, 0, 1, and 2.
8.3.2.E Multitransition
sD
MLT-3
o Signal rate is same as NRZ-I
o Uses three levels (+v, 0, and - V) and three transition
rules to move between the levels.
If the next bit is 0, there is no transition.
If the next bit is 1 and the current level is not 0,
the next level is 0.
If the next bit is 1 and the current level is 0, the
next level is the opposite of the last nonzero
level.
m
The additional bits added to the original ―m bits‖ are called
parity bits or check bits
co
a.
iy
un
m : message bits
Figure : Block Coding
m
If analog audio data is modulated onto a carrier sine
wave, then this is referred to as analog modulation.
co
Digital modulation is used to convert digital data to
analog signal. Ex ASK, FSK, PSK.
a.
1. Amplitude modulation (AM)
2. Frequency modulation (FM)
3. Phase modulation (PM).
iy
8.4.2.1.1 Amplitude modulation (AM)
Amplitude modulation is a type of modulation where the
un
amplitude of the carrier signal is varied in accordance
with modulating signal.
The envelope, or boundary, of the amplitude modulated
signal embeds modulating signal.
sD
m
low-noise process and provides a high quality modulation
technique which is used for music and speech in hi-
fidelity broadcasts.
co
Frequency Modulation is abbreviated FM.
a.
iy
un
sD
al
ri
to
Tu
m
co
a.
iy
un
sD
m
8.4.2.2.1 Amplitude Shift Keying (ASK)
In amplitude shift keying, the amplitude of the carrier signal is
co
varied to create signal elements.
Both frequency and phase remain constant while the
amplitude changes.
a.
Binary ASK (BASK)
ASK is normally implemented using only two levels and is
iy
hence called binary amplitude shift keying.
Bit 1 is transmitted by a carrier of one particular amplitude.
To transmit Bit 0 we change the amplitude keeping the
un
frequency is kept constant
sD
al
ri
to
Tu
m
co
a.
iy
Figure : Frequency Shift Keying (FSK)
un
8.4.2.2.3. Phase Shift Keying (PSK)
Phase shift keying (PSK) is a method of transmitting and
receiving digital signals in which the phase of a transmitted
signal is varied to convey information.
sD
If the phase of the wave does not change, then the signal
state stays the same (low or high).
ri
m
co
a.
iy
Figure: Phase Shift Keying (PSK)
8.4.2.2.4 QAM
un
The concept of Quadrature Amplitude Modulation (QAM)
involves use of two carriers, one for phase and the other for
quadrature, with different amplitude levels for each carrier.
It is a combination of ASK & PSK.
sD
1. PAM
2. PCM
ri
3. PWM
m
respectively.
co
demodulator converts the binary numbers back into
pulses having the same quantum levels as those in
the modulator. These pulses are further processed to
a.
restore the original analog waveform.
iy
Pulse Width Modulation refers to a method of carrying
information on a train of pulses, the information being
encoded in the width of the pulses. In applications to
un
motion control, it is not exactly information we are
encoding, but a method of controlling power in motors
without (significant) loss.
sD
m
4. What is modulation? What are its two types?
co
1. Data Communication & Networking – Behrouz Forouzan.
2. Computer Networks – Andrew Tannenbaum
a.
iy
un
sD
al
ri
to
Tu
m
Unit Structure
9.0 Objectives
co
9.1 Introduction
9.2 Transmission Modes & Types
9.2.1 Parallel Transmission
a.
9.2.2 Serial Transmission
9.2.2.1 Synchronous Transmission
9.2.2.2 Asynchronous Transmission
iy
9.2.2.3 Comparison of serial and parallel
Transmission
un
9.3 Transmission Impairments & Types
9.3.1 Attenuation
9.3.2 Distortion
9.3.3 Noise
sD
9.0 OBJECTIVES
9.1 INTRODUCTION
m
time.
co
mode used is Serial Transmission and when multiple bits are
sent in unit time the transmission mode used is called
Parallel transmission.
a.
Types of Transmission Modes:
There are two basic types of transmission modes Serial
and Parallel as shown in the figure below.
iy
Serial transmission is further categorized into
un
Synchronous and Asynchronous Serial transmission.
sD
al
ri
to
m
co
a.
Fig. Parallel Transmission of Data over N = 8 channels
iy
between CPU and the Projector.
m
group of 8 bits as shown below
co
0 1 BYTE 1
a.
Fig: Start and Bit before and after every data byte
iy
The start bit is indicated by ―0‖ and stop bit is indicated by
―1‖.
The sender and receiver may not be synchronized as seen
un
above but at the bit level they have to be synchronized i.e.
the duration of one bit needs to be same for both sender and
receiver for accurate data transmission.
There may be gaps in between the data transmission
sD
Advantages
1. Cheap and Effective implementation
2. Can be used for low speed communication
Disadvantages
Insertion of start bits, stop bits and gaps make asynchronous
transmission slow.
Application
m
Keyboard
co
In Synchronous Serial Transmission, the sender and
receiver are highly synchronized.
a.
No start, stop bits are used.
Instead a common master clock is used for reference.
The sender simply send stream of data bits in group of 8 bits
iy
to the receiver without any start or stop bit.
It is the responsibility of the receiver to regroup the bits into
units of 8 bits once they are received.
un
When no data is being transmitted a sequence of 0‘s and 1‘s
indicating IDLE is put on the transmission medium by the
sender.
sD
al
ri
to
Tu
Advantage
1. There are no start bits, stop bits or gaps between data
units
2. Since the above are absent data transmission is
faster.
3. Due to synchronization there are no timing errors.
m
transmitted
simultaneously
co
3 Speed of data False Slow
transfer
4 Cost Higher due to Low, since only one
a.
more number of wire is used
conductor
iy
5 Application Short distance Long distance
communication computer to
such as computer computer
unto printer communication.
communication
9.3.1 Attenuation
m
co
a.
iy
un
Fig. Attenuation
sD
9.3.2 Distortion
Distortion changes the shape of the signal as shown
below
al
ri
to
Tu
Fig. Distortion
9.3.3 Noise
Noise is any unwanted signal that is mixed or combined
with the original signal during transmission.
Due to noise the original signal is altered and signal
received is not same as the one sent.
m
7. Differentiate between serial and parallel Transmission
co
9.5 REFERENCES & FURTHER READING
a.
iy
un
sD
al
ri
to
Tu
10
TRANSMISSION MEDIUM
m
Unit Structure
10.0 Objectives
co
10.1 Introduction
10.2 Transmission Medium
10.2.1 Categories of Transmission Medium
a.
10.3 Guided Transmission Media
10.3.1 Twisted Pair Cable
iy
10.3.1.1 Unshielded & Shielded Twisted Pair Cable
10.3.2 Co-axial Cable
10.3.3 Fiber Optic Cable
un
10.4 Unguided (wireless) Transmission Medium
10.4.1 Propagation Method of wireless signals
10.4.2. Types of wireless transmission
sD
10.0 OBJECTIVES
Tu
10.1 INTRODUCTION
m
carry information from a source to a destination.
• The transmission medium is usually free space, metallic
cable or fiber – optic cable.
co
a.
iy
un
sD
m
signals in the form of electric signals and fiber-optic cable
transport signals in the form of light.
• Types:
co
1. Twisted-Pair Cable
2. Coaxial Cable
3. Fiber-OpticCable
a.
10.3.1 Twisted-pair cable
iy
un
Figure: Twisted Pair Cable
sD
and a wire used for the —ve data signal. Any noise that
appears on +ve/—ve wire of the pair would occur on
the other wire.
ri
m
Fig. Unshielded Twisted Pair Cable
co
a.
Fig. Shielded Twisted Pair Cable
iy
un
• Cables with the shield are called shielded twisted pair and
commonly abbreviated STP.
• Cables without a shield are called unshielded twisted pair or
sD
UTP.
• Twisting the wires together results in characteristics
impedance for the cable.
• UTP or unshielded twisted pair cable is used on Ethernet
al
• UTP cables are used for Ethernet cabling where 4 twisted pair
cables (a total of 8 wires are used)
ri
m
10.3.3 Fibre Optic Cable
co
a.
iy
un
Figure Fiber Optic Cable
sD
Advantages:
1. Small size and light weight: The size of the optical fibers is
very small.Therefore a large number of optical fibers can fit into
a cable of small diameter.
2. Easy availability and low cost: The material used for the
manufacturing of optical fibers is ―Silica glass‖. this material is
easily available. So the optical fibers cost lower than the cables
with metallic conductors.
m
5. Other advantages: - No cross talk inside the optical fiber cable.
Signal can be sent up to 100 times faster.
co
10.4 UNGUIDED (WIRELESS) TRANSMISSION
MEDIUM
a.
• Unguided media transport data without using a physical
conductor. This type of communication is often referred to as
wireless communication.
iy
• It uses wireless electromagnetic signals to send data.
un
• There are three types of Unguided Media
(i) Radio waves
(ii) Micro waves
(iii) Infrared.
sD
3. Line-of-sight propagation
1. Ground-wave propagation
to
Tu
2. Sky-wave propagation
m
co
a.
iy
un
Figure :of waves
to earth
ii. Signal can travel a number of hops, back and forth between
ionosphere and earth‘s surface
iii. Reflection effect caused by refraction
al
iv. Examples
a. Amateur radio
b. CB radio
ri
3. Line-of-sight propagation
to
Tu
1. Radio waves:
• Electromagnetic wave ranging in frequencies between 3 KHz
m
and 1GHz are normally called radio waves.
co
radio waves they are propagated in all directions. This means
that sending and receiving antenna do not have to he aligned. A
sending antenna can send waves that can be received by any
receiving antenna.
a.
• Radio waves particularly those waves that propagate in sky
iy
mode, can travel long distances. This makes radio waves a
good candidate for long-distance broadcasting such as AM
radio.
un
• Radio waves particularly those of low and medium frequencies
can penetrate walls. It is an advantage because; an AM radio
can receive signals inside a building. It is the disadvantage
sD
2. Microwaves:
• Electromagnetic waves having frequencies between 1 and 300
al
• Parabolic dish antenna and horn antenna are used for this
means of transmission
3. Infrared
• Infrared signals with frequencies ranges from 300 GHz to 400
GHz can be used for short range communication.
m
• Infrared band, has an excellent potential for data transmission.
Transfer digital data is possible with a high speed with a very
high frequency. There are number of computer devices which
co
are used to send the data through infrared medium e.g.
keyboard mice, PCs and printers. There are some
manufacturers provide a special part called the IrDA port that
allows a wireless keyboard to communicate with a PC.
a.
10.5 COMPARISON BETWEEN WIRED AND
iy
WIRELESS MEDIA un
Wired media Wireless media
wire
m
over the metallic of the cable glass fiber.
conducting wires.
co
Noise immunity is Higher noise Higher noise
low. Therefore more immunity than the immunity as the light
distortion twisted pair cable rays are unaffected
a.
due to the presence by the electrical
of shielding noise.
conductor
iy
Affected due to Less affected due to Not affected by the
external magnetic external magnetic external magnetic
un
field field field.
conductor is conductor is
possible possible
expensive
bandwidth
easy
m
co
a.
iy
un
sD
al
ri
to
Tu
11
m
NETWORK TOPOLOGIES
co
a.
Unit Structure
iy
11.0 Objectives
11.1 Introduction
un
11.2 An Overview of network
11.3 Types of network
sD
11.0 OBJECTIVES
m
11.1 INTRODUCTION
co
This chapter presents an outline on Network topology is the
layout pattern of interconnections of the various elements
a.
(links, nodes, etc.) of a computer or biological network. Network
topologies may be physical or logical.
iy
Physical topology refers to the physical design of a network
including the devices, location and cable installation. Logical
topology refers to how data is actually transferred in a network as
un
opposed to its physical design. In general physical topology relates
to a core network whereas logical topology relates to basic network.
This chapter also presents an insight into the various networking
strategies and the platform needed for networking.
sD
m
Computers connected to a network are broadly categorized
co
as servers or workstations. Servers are generally not used by
humans directly, but rather run continuously to provide "services" to
the other computers (and their human users) on the network.
a.
Services provided can include printing and faxing, software hosting,
file storage and sharing, messaging, data storage and retrieval,
complete access control (security) for the network's resources, and
iy
many others.
un
Workstations are called such because they typically do have
a human user which interacts with the network through them.
Workstations were traditionally considered a desktop, consisting of
a computer, keyboard, display, and mouse, or a laptop, with with
sD
m
workstations equipped with microphones and a webcams might
teleconference in real time. A WAN is complicated. It uses
multiplexers, bridges, and routers to connect local and metropolitan
co
networks to global communications networks like the Internet. To
users, however, a WAN will not appear to be much different than a
LAN.
a.
11.4Comparing types of network coverage
iy
The table below compares the three types of networks:
un
LAN MAN WAN
Can incorporate multiple Uses data
Relatively small.
LANs. transmission
Contained within a networks to
Contained within a single city
single building or incorporate LANs
sD
or metropolitan area.
campus. and MANs.
Generally inexpensive Essentially
Expensive to implement and
to implement and unlimited
maintain.
maintain. geographic area.
Typically owned Cost varies widely,
al
m
Connections.
Administrators, instructors, and even students and guests
co
can be connected using the campus network.
a.
Services.
The institution can provide services, such as registration,
college directories, course schedules, access to research,
iy
and email accounts, and many others. (Remember, network
services are generally provided by servers).
un
Internet.
The institution can provide network users with access to the
sD
Computing resources.
al
Flexible Access.
Tu
Workgroup Computing.
m
Expensive to Install.
Large campus networks can carry hefty price tags. Cabling,
co
network cards, routers, bridges, firewalls, wireless access
points, and software can get expensive, and the installation
would certainly require the services of technicians. But, with
the ease of setup of home networks, a simple network with
a.
internet access can be setup for a small campus in an
afternoon.
iy
un
Proper maintenance of a network requires considerable time
and expertise. Many schools have installed a network, only
to find that they did not budget for the necessary
administrative support.
sD
Servers Fail.
al
m
11.6 WHAT IS A TOPOLOGY?
co
A topology is a description of the layout of a specific region
or area. A network topology is a description of the layout of the
region or area covered by that network.
a.
There are two types of connections that describe how many
devices connect to a single cable or segment of transmission
iy
media. They are: point-to-point and multi-point.
m
4. Star topology,
5. Hybrid topology,
6. Mesh topology and
co
7. Tree topology.
a.
physical are the foundation of this classification.
iy
Logical topology is the way a computer in a given network
transmits information, not the way it looks or connected, along with
un
the varying speeds of cables used from one network to another.
On the other hand the physical topology is affected by a number
of factors:
sD
Troubleshooting technique,
Installation cost,
Office layout and
Cables‘ types.
al
m
Bus Network Topology
LANs that make use of bus topology connects each node to
a single cable. Some connector connects each computer or server
co
to the bus cable. For avoiding the bouncing of signal a terminator is
used at each end of the bus cable. The source transmits a signal
that travels in both directions and passes all machines unless it
a.
finds the system with IP address, the intended recipient. The data is
ignored in case the address is unmatched. The installation of one
cable makes bus topology an inexpensive solution as compared to
iy
other topologies; however the maintenance cost is high. If the cable
is broken all systems would collapse.
un
o Linear Bus: If all network nodes are connected to a combine
transmission medium that has two endpoints the Bus is Linear. The
sD
data transmitted between these nodes is transmitted over the
combine medium and received by all nodes simultaneously.
m
co
a.
iy
un
sD
m
propagated at the hub to all spokes or individually spokes with
those who are addressed.
co
o Extended Star: A network that keeps one or more than one
repeaters between the central node or hub and the peripheral or
a.
the spoke node, supported by the transmitter power of the hub and
beyond that supported by the standard of the physical layer of the
network.
iy
Distributed Star: The topology is based on the linear
un
connectivity that is Daisy Chained with no top or centre level
connection points.
sD
al
ri
to
Tu
m
Ring Network Topology
Ring topology is one of the old ways of building computer
network design and it is pretty much obsolete. FDDI, SONET or
co
Token Ring technologies are used to build ring technology. It is not
widely popular in terms of usability but incase if you find it
anywhere it will mostly be in schools or office buildings.
a.
Such physical setting sets up nodes in a circular manner
iy
where the data could travel in one direction where each device on
the right serves as a repeater to strengthen the signal as it moves
ahead.
un
sD
al
ri
to
Tu
m
co
a.
Hybrid Topology
iy
un
Hybrid topologies are a combination of two or more different
topologies. WANs sometimes have hybrid topologies because they
connect a variety of LAN topologies. The big advantage of hybrid
topologies is that they connect disparate topologies. However, the
sD
point-to-point link. The central root would be the only node having
no higher node in the hierarchy. The tree hierarchy is symmetrical.
to
m
co
a.
iy
un
Advantages of a Tree Topology
11.7 SUMMARY
m
computer networking design. Computer networks can only
be developed using the knowledge about these topologies
and decide to which topology design is best suited according
co
to the requirement.
a.
hosts which conform to thenetwork protocols.
iy
A network may be classified as a LAN, MAN, or WAN,
depending on itsgeographic spread, and as private or
public, depending on its accessrestrictions.
un
It may employ a point-to-point or a broadcast
communication model. A point-to-point model may be based
on circuit switching or packetswitching.
sD
Exercises:
al
1. What is a Network?
2. Explain Lan, Man, Wan?
3. Write a short note on Network coverage?
11.9 REFERENCES
m
http://www.garymgordon.com/misc/tutorials/networking/Lesson2.pdf
co
http://networkworld.com/ns/books/ciscopress/samples/0735700745.
pdf
a.
http://pages.cs.wisc.edu/~tvrdik/7/html/Section7.html
http://fcit.usf.edu/network/chap2/chap2.htm
iy
www.pragsoft.com Chapter 4: The Network Layer 57
un
sD
al
ri
to
Tu
12
INTRODUCTION TO ROUTING
m
Unit Structure
co
12.0 Objective
12.1 What Is Routing?
a.
12.1.1 Components
12.1.2 Path Determination
iy
12.2Switching
un
12.3 Introduction to algorithm
12.3.1 Design Goals
12.0 OBJECTIVE
Tu
m
between the two is that bridging occurs at Layer 2 (the link layer) of
the OSI reference model, whereas routing occurs at Layer 3 (the
network layer). This distinction provides routing and bridging with
co
different information to use in the process of moving information
from source to destination, so the two functions accomplish their
tasks in different ways.
a.
12.1.1 Routing Components
Routing involves two basic activities: determining optimal
iy
routing paths and transporting information groups (typically called
packets) through an internetwork. In the context of the routing
process, the latter of these is referred to as packet switching.
un
Although packet switching is relatively straightforward, path
determination can be very complex.
12.1.2 Path Determination
sD
m
Fig. Destination/Next Hop Associations Determine the Data’s
co
Optimal Path
Routing tables also can contain other information, such as
data about the desirability of a path. Routers compare metrics to
a.
determine optimal routes, and these metrics differ depending on the
design of the routing algorithm used.
iy
Routers communicate with one another and maintain their
routing tables through the transmission of a variety of messages.
un
The routing update message is one such message that generally
consists of all or a portion of a routing table. By analyzing routing
updates from all other routers, a router can build a detailed picture
of network topology. A link-state advertisement, another example of
a message sent between routers, informs other routers of the state
sD
12.2 SWITCHING
Switching algorithms is relatively simple; it is the same for
ri
m
(ESs), whereas network devices with these capabilities are called
intermediate systems (ISs). ISs are further divided into those that
can communicate within routing domains (intradomain ISs) and
co
those that communicate both within and between routing domains
(interdomain ISs). A routing domain generally is considered a
portion of an internetwork under common administrative authority
that is regulated by a particular set of administrative guidelines.
a.
Routing domains are also called autonomous systems.With certain
protocols, routing domains can be divided into routing areas, but
intradomain routing protocols are still used for switching both within
iy
and between areas. un
sD
al
ri
to
Tu
Fig.of switching
m
Finally, routing algorithms use a variety of metrics that affect
calculation of optimal routes. The following sections analyze these
co
routing algorithm attributes.
12.3.1Design Goals
a.
Routing algorithms often have one or more of the following
design goals:
• Optimality
iy
• Simplicity and low overhead
un
• Robustness and stability
• Rapid convergence
• Flexibility
sD
m
routing update messages that permeate networks,
stimulating recalculation of optimal routes and eventually
causing all routers to agree on these routes. Routing
co
algorithms that converge slowly can cause routing loops or
network outages.
a.
they should quickly and accurately adapt to a variety of
network circumstances. Assume, for example, that a network
segment has gone down. As many routing algorithms
iy
become aware of the problem, they will quickly select the
next-best path for all routes normally using that segment.
Routing algorithms can be programmed to adapt to changes
un
in network bandwidth, router queue size, and network delay,
among other variables.
m
new routing update messages. These messages permeate the
network, stimulating routers to rerun their algorithms and change
their routing tables accordingly.
co
Dynamic routing algorithms can be supplemented with static
routes where appropriate. A router of last resort (a router to which
all unroutable packets are sent), for example, can be designated to
a.
act as a repository for all unroutable packets, ensuring that all
messages are at least handled in some way.
iy
2. Single-Path Versus Multipath
Some sophisticated routing protocols support multiple paths
to the same destination. Unlike single-path algorithms, these
un
multipath algorithms permit traffic multiplexing over multiple lines.
The advantages of multipath algorithms are obvious: They can
provide substantially better throughput and reliability. This is
generally called load sharing.
sD
systems, or areas.
In hierarchical systems, some routers in a domain can
communicate with routers in other domains, while others can
communicate only with routers within their domain. In very large
networks, additional hierarchical levels may exist, with routers at
the highest hierarchical level forming the routing backbone.
m
4. Host-Intelligent Versus Router-Intelligent
Some routing algorithms assume that the source end node
will determine the entire route. This is usually referred to as source
co
routing. In source-routing systems, routers merely act as store-and-
forward devices, mindlessly sending the packet to the next stop.
Other algorithms assume that hosts know nothing about routes. In
a.
these algorithms, routers determine the path through the
internetwork based on their own calculations. In the first system,
the hosts have the routing intelligence. In the latter system, routers
iy
have the routing intelligence.
5. Intradomain Versus Interdomain
un
Some routing algorithms work only within domains; others
work within and between domains. The nature of these two
algorithm types is different. It stands to reason, therefore, that an
optimal intradomain-routing algorithm would not necessarily be an
sD
m
• Path length
• Reliability
co
• Delay
• Bandwidth Load
a.
• Communication cost
iy
Path length is the most common routing metric. Some routing
protocols allow network administrators to assign arbitrary costs
un
to each network link. In this case, path length is the sum of the
costs associated with each link traversed. Other routing
protocols define hop count, a metric that specifies the number of
passes through internetworking products, such as routers, that a
sD
m
Load refers to the degree to which a network resource, such as
a router, is busy. Load can be calculated in a variety of ways,
including CPU utilization and packets processed per second.
co
Monitoring these parameters on a continual basis can be
resource-intensive itself.
a.
Communication cost is another important metric, especially
because some companies may not care about performance as
much as they care about operating expenditures. Although line
iy
delay may be longer, they will send packets over their own lines
rather than through the public lines that cost money for usage
time.
un
12.5 SUMMARY
sD
m
3. Discuss design goal?
4. Explain routing algorithms?
co
5. Explain Routing metrics?
a.
iy
Stamper, D. (1993) Local Area Networks, Addison-Wesley,
Reading, MA.
un
Stamper, D. (1991) Business Data Communications, Third
Edition, Addison-Wesley, Reading, MA.
Stone, H. (1982), Microcomputer Interfacing, Addison-Wesley,
Reading, MA.
sD
Tanenbaum, A. (1989), Computer Networks, Second Edition,
Prentice Hall, Englewood Cliffs, NJ.
Van Duuren, J., Schoute, F., and Kastelein, P. (1992)
Telecommunications
al
13
m
SWITCHING CONCEPTS
co
Unit Structure
a.
13.0 Objective
iy
13.1 Introduction
13.2 Switching Methods
un
13.2.1 Circuit Switching
13.2.2Switching Node
13.2.3 Time Division Switching
13.2.4 Packet Switching
sD
13.5References
ri
13.0 OBJECTIVE
to
Tu
13.1 INTRODUCTION
m
messages across the network.There are two basic methods of
switching circuit switching and packet switching.
co
a.
13.2.1. Circuit Switching
iy
un
sD
al
Switches may also have more inlets than outlets, or more outlets
than inlets.)
m
co
When the two hosts shown in the figure initiate a connection,
the network determines a path through the intermediate switches
and establishes a circuit which is maintained for the duration of the
connection. When the hosts disconnect, the network releases the
a.
circuit.
iy
un
sD
al
Data transfer:
Transfer data is from the source to the destination.
m
The data may be analog or digital, depending on the nature
of the network.
The connection is generally full-duplex.
co
Circuit disconnect:
a.
Terminate connection at the end of data transfer.
• Signals must be propagated to deallocate the dedicated
resources.
iy
un
sD
al
ri
m
An important characteristic of a circuit-switch node is
whether it is blocking or non-blocking.
co
A blocking network is one, which may be unable to connect
a.
two stations because all possible paths between them are already
in use. A non-blocking network permits all stations to be connected
iy
(in pairs) at once and grants all possible connection requests as
long as the called party is free. For a network that supports only
voice traffic, a blocking configuration may be acceptable, since
un
most phone calls are of short duration. For data applications, where
a connection may remain active for hours, non-blocking
configuration is desirable.
sD
al
ri
to
Tu
for the analog environment, and has been carried over to the digital
domain. Some of the space switches are crossbar switches, Multi-
stage switches (e.g. Omega Switches). A crossbar switch is shown
in Fig. Fig 13.2.6 . Basic building block of the switch is a metallic
crosspoint or semiconductor gate that can be enabled or disabled
by a control unit.
m
co
a.
iy
un
sD
m
co
a.
Fig 13.2.6 A three-stage space division
switch
iy
un
sD
al
ri
to
m
co
a.
iy
un
sD
al
m
network has a much higher capacity for accepting further
connections. Additional connections are usually not blocked but
simply slow down existing connections, because they increase the
co
overall number of packets in the network and hence increase the
delivery time of each packet. Figure 13.2.9 shows a simple packet
switch with six I/O channels (a through f). Each channel has an
a.
associated buffer which it uses to store packets in transit. The
operation of the switch is controlled by a microprocessor. A packet
received on anynof the channels can be passed onto any of the
iy
other channels by the microprocessor moving it to the
corresponding buffer.
un
sD
al
Fig 13.2.10 illustrates the virtual circuit method using the switch.
When the two hosts initiate a connection, the network layer
establishes a virtual circuit (denoted by shaded switches) which is
m
maintained for the duration of the connection. When the hosts
disconnect, the network layer releases the circuit. The packets in
transit are displayed as dark boxes within the buffers. These
co
packets travel only along the designatedvirtual circuit.
a.
iy
un
sD
al
ri
m
co
a.
iy
13.2.11 Packet switching with datagrams.
un
The advantage of the datagram approach is that because
there is no circuit, congestion and faulty nodes can be avoided by
sD
m
Fragment-free
Cut-through Mode
co
Cut-through switching is the fastest switching method
meaning it has the lowest latency. The incoming frame is read up to
a.
the destination MAC address. Once it reaches the destination MAC
address, the switch then checks its CAM table for the correct port to
forward the frame out of and sends it on its way. There is no error
iy
checking, so this method gives you the lowest latency. The price,
however, is that the switch will forward any frames containing
errors.
un
The process of switching modes can best be described by
using a metaphor.
Store-and-forward Mode
sD
Here the switch reads the entire frame and copies it into its
buffers. A cyclic redundancy check (CRC) takes place to check the
frame for any errors. If errors are found, the frame is dropped.
Otherwise the switching table is examined and the frame
al
forwarded.
Fragment-free (modified cut-through/runt-free) Mode
ri
Since cut-through can ensure that all frames are good and
store-and-forward takes too long, we need a method that is both
to
made sure everyone is who they say they are, but you do not have
to take down all the information. In switching we accomplish this by
using the fragment-free method of switching.
13.3 SUMMARY
The generic method for establishing a path for point-to-point
communication in anetwork is called switching. There are two
general switching methods: circuitswitching and packet switching.
In circuit switching two communicating stations are connected by
a dedicatedcommunication path.
m
13.4 REVIEW QUESTIONS
co
2. Explain Switching Node
3. Explain Time Division Switching
a.
13.5 LIST OF REFERENCES
Black, U. (1989), Data Networks: Concepts, Theory, and
iy
Practice, Prentice
Hall, Englewood Cliffs, NJ.
Gitlin, R. D., Hayes, J. F., and Weinstein, S. B. (1992) Data
un
Communication
Principles, Plenum, New York, NY.
Hughes, L. (1992) Data Communications, McGraw-Hill, NY.
Kessler, G. and Train, D. (1992) Metropolitan Area
sD
Networks: Concepts,
Standards, and Service, McGraw-Hill, NY.
Martin, J. and Leben, J. (1988), Principles of Data
Communication, Prentice
al
14
INTRODUCTION TO IP Version 6 ( IPv6)
Unit Structure
14.0 OBJECTIVES
m
14.1 INTRODUCTION
14.2 An Overview
co
14.2.1 IPv6 Introduction
14.2.2IPv6 Packet Format
a.
14.2.3IPv6 Extension Headers
14.2.4Fragmentation in IPv6
iy
14.2.5IPv6 Addressing
14.3 Summary
un
14.4 Review Questions
14.5 References
sD
14.0 OBJECTIVES:
To briefly understand the major functions of addresses in the
Internetworking arena
al
14.0 INTRODUCTION
This chapter provides a brief introduction on the IP
networking Protocol that uses the internet to connect to Learn the
characteristics of IPv6 routing Learn the properties of IPSec
security, It emphasises on the the various standards and optional
headers supported by IPv6 packets.
14.2 AN OVERVIEW
14.2.1 IPv6 Introduction
Definition : What is IPv6?
m
Domain Name System (DNS) and uses security technologies such
as Internet Protocol security (IPSec), because they help facilitate
the successful andsecure transfer of IP packets between
co
computers.IPv6 supplants IPv4, pure IPv6 across the Internet will
become more prevalent and will eventually replace IPv4.
a.
information to route packets for the next generation Internet.We
believe that the expansion of the Internet is important and upgrades
iy
are sometimes warranted. Gathering information concerning every
aspects of IPv6 we would hope to provide knowledge about this
technology so everyone can benefit. It is therefore also called the
un
Next Generation Internet Protocol or IPng .
Why we need IPv6 Addressing
sD
14.2.2IPv6 Packet
m
in IPv6.
co
a.
iy
un
sD
m
IPv6 packet, no extension headers are present. The sending host
adds one or more extension headers only if either an intermediate
router or the destination requires special handling.
co
a.
iy
Within each extension header is another Next Header field
that indicates the next extension header. The last extension header
un
indicates the upper layer protocol (such as TCP, UDP, or ICMPv6)
contained within the upper layer protocol data unit.
m
co
a.
iy
un
14.2.4 Fragmentation in IPv6
sD
If an IPv4 router receives a packet that is too large for
the network segment to which the packet is being forwarded and
fragmentation of the packet is allowed, IPv4 fragments the original
packet into smaller packets that fit on the downstream network
segment. In IPv6, only the sending host performs fragmentation. If
al
m
Internet. The use of 128 bits allows multiple levels of hierarchy and
flexibility in designing hierarchical addressing and routing that is
currently lacking in the IPv4-based Internet.
co
IPv6 Address Syntax
IPv4 addresses are represented in dotted-decimal format.
These 32-bit addresses are divided along 8-bit boundaries. Each
a.
set of 8 bits is converted to its decimal equivalent and separated
from the other sets by periods. For IPv6, the 128-bit address is
iy
divided along 16-bit boundaries. Each 16-bit block is converted to a
4-digit hexadecimal number and separated by colons. The resulting
representation is known as colon-hexadecimal.
un
The following is an IPv6 address in binary form:
00100001110110100000000011010011000000000000000000101
11100111011
sD
00000010101010100000000011111111111111100010100010011
10001011010
al
21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A
IPv6 representation can be further simplified by removing the
leading zeros within each 16-bit block. However, each block must
have at least a single digit. With leading zero suppression, the
address representation becomes:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A
Compressing Zeros
Some types of addresses contain long sequences of zeros. To
further simplify the representation of IPv6 addresses, a contiguous
sequence of 16-bit blocks set to 0 in the colon-hexadecimal format
can be compressed to ―::,‖ known as double-colon.
m
FE80::2AA:FF:FE9A:4CA2. The multicast address
FF02:0:0:0:0:0:0:2 can be compressed to FF02::2.
Zero compression can be used to compress only a single
co
contiguous series of 16-bit blocks expressed in colon-hexadecimal
notation. You cannot use zero compression to include part of a 16-
bit block. For example, you cannot express FF02:30:0:0:0:0:0:5 as
a.
FF02:3::5.
iy
double colon, you can count the number of blocks in the
compressed address, subtract this number from 8, and then
multiply the result by 16. For example, the address FF02::2 has two
un
blocks (the ―FF02‖ block and the ―2‖ block.) The number of 0 bits
expressed by the double colon is 96 (96 = (8 – 2)×16).
Unicast
A unicast address identifies a single interface within the
to
Multicast
A multicast address identifies multiple interfaces. With the
appropriate multicast routing topology, packets addressed to
a multicast address are delivered to all interfaces that are
identified by the address. A multicast address is used for
one-to-many communication, with delivery to multiple
interfaces.
Anycast
An anycast address identifies multiple interfaces. With the
appropriate routing topology, packets addressed to an
anycast address are delivered to a single interface, the
nearest interface that is identified by the address. The
nearest interface is defined as being closest in terms of
routing distance. An anycast address is used for one-to-one-
of-many communication, with delivery to a single interface.
m
ADDRESS DESCRIPTION TOPOLOGY
co
TYPE
UNICAST “One to One‖
An address
a.
destined for a
single interface.
iy
A packet sent to a
unicast address is
delivered to the
un
interface identified
by that address.
MULTICAST “One to Many”
sD
An address for a
set of interfaces
(typically
belonging to
al
different nodes).
A packet sent to a
multicast address
ri
will be delivered to
all interfaces
identified by that
to
address.
ANYCAST ―One to Nearest‖
Tu
closest interface
as determined by
the IGP.
m
14.3 SUMMARY
co
In this chapter we have examined the future of the Internet
Protocol (IP) as embodied by IPv6, which is the next-generation IP.
The areas in which IPv6 introduces the greatest changes are the
a.
areas of security, addressing, routing, and quality of service. Much
of the detail in IPv6 differs from IPv4, and these changes were
iy
covered in detail in this chapter.
The chapter focused on the following topics:
un
The issues associated with IPv4.
m
1. Explain IP6 protocol?
2. Define IP6 Packet Format ?
co
3. IPv6 Addressing ?
14.5 REFERENCES
a.
Davies, J. Understanding IPv6. Redmond, WA: Microsoft Press,
iy
2002.
Huitema, C. IPv6: The New Internet Protocol. Second edition.
Upper Saddle River, NJ: Prentice Hall, 1998.
un
Miller, M. Implementing IPv6: Supporting the Next Generation of
Protocols. Second edition. Foster City, CA: M&T Books, 2000.
[RFC1884] R. Hinden and S. Deering, 1995, IP version 6
sD
addressing architecture.
[RFC1886] S. Thomson and C. Huitema, 1995, DNS Extensions
to support IP version 6.
al
Tu
15
m
AND TRANSISTIONS
co
Unit Structure
a.
15.0 OBJECTIVES
iy
15.1 INTRODUCTION
15.2 An Overview
un
15.2.1 Address Auto configuration
15.2.6 DHCPv6
15.2.7 Summary of Benefits of IPv6 in a nutshell:
ri
15.4 Summary
15.5 references
Tu
List and describe the different types of IPv4 and IPv6 nodes.
List and describe the types of tunneling configurations.
Define the differences between configured and automatic
tunneling.
m
types of IPv4 and IPv6 nodes, mechanisms for IPv4 to
IPv6 transition, types of tunneling configurations.
co
15.2.1 Address Auto configuration
a.
configure itself without the use of a stateful configuration protocol,
such as Dynamic Host Configuration Protocol for IPv6 (DHCPv6).
By default, an IPv6 host can configure a link-local address for each
iy
interface. By using router discovery, a host can also determine the
addresses of routers, additional addresses, and other configuration
parameters. The Router Advertisement message indicates whether
un
a stateful address configuration protocol should be used.
Tentative
ri
Preferred
An address for which uniqueness has been verified. A node
Tu
Deprecated
An address that is still valid but whose use is discouraged for
new communication. Existing communication sessions can
continue to use a deprecated address. Nodes can send and
receive unicast traffic to and from deprecated addresses.
Valid
An address from which unicast traffic can be sent and
received. The valid state covers both the preferred and
deprecated states. Router Advertisement messages include
the amount of time that an address remains in the valid
state. The valid lifetime must be longer than or equal to the
preferred lifetime.
m
Invalid
An address for which a node can no longer send or receive
unicast traffic. An address enters the invalid state after the
co
valid lifetime expires.
a.
lifetimes.
iy
un
sD
1. Stateless
Configuration is based on Router Advertisement messages.
These messages include stateless address prefixes and require
Tu
2. Stateful
Configuration is based on a stateful address configuration
protocol, such as DHCPv6, to obtain addresses and other
configuration options. Hosts use stateful address configuration
when they receive Router Advertisement messages that do not
include address prefixes and that require the hosts to use a
stateful address configuration protocol. A host will also use a
3. Both
Configuration is based on Router Advertisement messages.
These messages include stateless address prefixes but require
hosts to use a stateful address configuration protocol.
m
For all autoconfiguration types, a link-local address is always
configured.
co
15.2.3 Autoconfiguration Process
Address autoconfiguration for an IPv6 node occurs as follows:
1. A tentative link-local address is derived, based on the link-
a.
local prefix of FE80::/64 and the 64-bit interface identifier.
iy
2. Duplicate address detection is performed to verify the
uniqueness of the tentative link-local address. If the address
is already in use, the node must be configured manually.
un
3. If the address is not already in use, the tentative link-local
address is assumed to be unique and valid. The link-local
sD
m
layer address with the network adapter.
co
9. If specified in the Router Advertisement message, the host
uses a stateful address configuration protocol to obtain
additional addresses or configuration parameters.
a.
15.2.4IPv6 Transition Technologies
1. Node Types
iy
2. Address Compatibility
Protocol transitions are not easy, and the transition from
un
IPv4 to IPv6 is no exception. Protocol transitions are typically
deployed by installing and configuring the new protocol on all nodes
within the network and verifying that all node and router operations
work. Although this might be possible in a small- or medium-sized
organization, the challenge of making a rapid protocol transition in a
sD
2. Hosts that use only IPv6 can be added at any time, without
dependencies on other hosts or routing infrastructure.
1. Node Types
Defines the following node types:
m
IPv4-only Node
co
addresses). This node does not support IPv6. Most hosts and
routers installed today are IPv4-only nodes.
IPv6-only Node
a.
A node that implements only IPv6 (and has only IPv6
addresses). This node is able to communicate only with IPv6 nodes
and applications. This type of node is not common today, but it
iy
might become more prevalent as smaller devices such as cellular
phones and handheld computing devices include the IPv6 protocol.
un
IPv6/IPv4 Node
and IPv6. True migration is achieved when all IPv4 nodes are
converted to IPv6-only nodes. However, for the foreseeable future,
ri
2. Address Compatibility
Tu
The following addresses are defined to help IPv4 and IPv6 nodes
coexist:
IPv4-compatible Addresses
IPv6/IPv4 nodes that are communicating with IPv6 over an IPv4
infrastructure use IPv4-compatible addresses, 0:0:0:0:0:0:w.x.y.z or
::w.x.y.z (where w.x.y.z is the dotted decimal representation of a
public IPv4 address). When an IPv4-compatible address is used as
an IPv6 destination, IPv6 traffic is automatically encapsulated with
IPv4 headers and sent to their destinations using the IPv4
infrastructure.
IPv4-mapped Addresses
The IPv4-mapped address, 0:0:0:0:0:FFFF:w.x.y.z or
::FFFF:w.x.y.z, is used to represent an IPv4-only node to an IPv6
node. It is used only for internal representation. The IPv4-mapped
address is never used as a source or destination address of an
IPv6 packet. The IPv6 protocol for Windows Server 2003 does not
support IPv4-mapped addresses. Some IPv6 implementations use
IPv4-mapped addresses when translating traffic between IPv4-only
m
and IPv6-only nodes.
6over4 Addresses
co
Each 6over4 address comprises a valid 64-bit unicast address
prefix and the interface identifier ::WWXX:YYZZ (where
WWXX:YYZZ is the colon-hexadecimal representation of w.x.y.z, a
a.
unicast IPv4 address assigned to an interface). An example of a
link-local 6over4 address based on the IPv4 address of
131.107.4.92 is FE80::836B:45C. 6over4 addresses represent a
iy
host that use the automatic tunneling mechanism.
6to4 Addresses
un
6to4 addresses are based on the prefix 2002:WWXX:YYZZ::/48
(where WWXX:YYZZ is the colon-hexadecimal representation of
w.x.y.z, a public IPv4 address assigned to an interface). 6to4
addresses represent sites that use the automatic tunneling
sD
mechanism
ISATAP Addresses
Each Intra-site Automatic Tunnel Addressing Protocol (ISATAP)
al
m
configuration in its present form only for IP addressing does not
make sense. The enterprises could as well use the DHCPv6 to
configure the IP addresses too. Apart from the IP addresses, the
co
additional information supplied by DHCPv6 offers the audit, tracking
and management capabilities as required by the business
enterprises. Despite its present shortcomings, IPv6 offers the most
a.
comprehensive long-term solution for the future networking
requirements of the business enterprises. Every network
administration policy maker across different business enterprises
iy
faces the dilemma of using IPv6 auto-configuration versus
DHCPv6.
un
15.2.5IPv6Auto-Configuration
sD
An important feature of IPv6 is that it allows plug and play
option to the network devices by allowing them to configure
themselves independently. It is possible to plug a node into an IPv6
network without requiring any human intervention. This feature was
critical to allow network connectivity to an increasing number of
al
mobile devices.
ri
m
know the availability of each IP address from the range specified by
the network administrator.
co
Stateless auto-configuration: This type of configuration is
suitable for small organizations and individuals. It allows each host
a.
to determine its address from the contents of received user
advertisements
iy
15.2.6 DHCPv6
The Dynamic Host Configuration Protocol (DHCP) facilitates
un
the addition of new machines in a network. Around October 1993,
DHCP began to take shape as a standard network protocol. The
protocol allows the network devices to obtain the different
parameters that are required by the clients to operate in an Internet
sD
Protocol (IP) network. The DHCP protocol significantly reduces the
system administration workload as the network devices can be
added to the network with little or no change in the device
configuration.
al
m
15.2.7 Summary of Benefits of IPv6 in a nutshell:
1) Increased address space
co
2) More efficient routing
3) Reduced management requirement
a.
4) Improved methods to change ISP
5) Better mobility support
iy
6) Multi-homing
7) Security
un
8) Scoped address: link-local, site-local and global-address space
15.4 SUMMARY
al
Stateless autoconfiguration.
The processes used to connect IPv6 devices on:
• Broadcast multiaccess connections
• Point-to-point connections
Tu
• point-to-multipoint connections.
m
Teredo is an address assignment and host-to-host or host-
to-router automatic tunneling technology that provides
unicast IPv6 connectivity across the IPv4 Internet when
co
IPv6/IPv4 hosts are located behind one or multiple IPv4
NATs.
a.
15.5 REFERENCES:
iy
IPv6 Main Page
www.cisco.com/go/ipv6
IPv6 Headers At-a-Glance
un
http://www.cisco.com/en/US/technologies/tk648/tk872/technolog
ies_white_paper0900aecd80260042.pdf
The Cisco IOS Software Releases 12.4 Mainline Command
sD
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/1
2_4/ipv6_12_4_book.html
Tu
m
organizations, signal propagation, analog and digital
signals, bandwidth of signal and a medium, Fourier
analysis and the concept of bandwidth of a signal. The
co
data transmission rate and bandwidth.
a.
Layered Tasks, The OSI reference model, Layers in the
OSI reference model.
iy
TCP/IP protocol suite, Addressing IPv4
Unit - VI IP version 6
Overview, Terminology, IPv6 addresses, Special
addresses, IPv6 header formats, IPv6 extension headers,
IPv6 auto configuration via DHCP v6, IPv6 transition
Books :
Reference
m
W. Stallings, ―Data and Computer Communications‖, Eight Edition,
Pearson Education.
co
Term Work and Tutorial
Should contain minimum 10 assignments and two class tests. (One case
a.
study in lieassignments)
iy
Practical
None
un
sD
al
ri
to
Tu