Computer Networks and Communication
Computer Networks and Communication
GUIDE
CIT 423
COMPUTER NETWORKS AND COMMUNICATION
Course Team
1
© 2022 by NOUN Press
National Open University of Nigeria
Headquarters
University Village
Plot 91, Cadastral Zone
Nnamdi Azikiwe Expressway
Jabi, Abuja
Lagos Office
14/16 Ahmadu Bello Way
Victoria Island, Lagos
e-mail: [email protected]
URL: www.nou.edu.ng
Printed 2022
ISBN:
2
CONTENT PAGE
Introduction……………………………………………….………… iv
What you will Learn in this Course................................................ iv
Working through the Course........................................................... iv
Assessment ..................................................................................... iv
How to Get the Most from this Course ............................................ iv
Summary ......................................................................................... v
3
Introduction
Each module, each unit, in the course contains notes as well as set exercises.
The set exercises are listed in form of a table. The table has two volumes.
The last column contains the heading “what you do” while the right column
is headed “comments/prompts”. The left column contains the steps that you
must follow. The right column serves as additional information.
Computers will be provided at study centres and will be equipped with the
required programs. If you have the means, buy your PC and the stipulated
software.
Each unit contains self-assessment exercises and at certain points in the course you will be
required to submit assignments for assessment purposes. At the end of the course there is final
examination. Below you will find listed all the components of the course, what you have to do
and how you should allocate your time to each unit in order to complete the course on time
and successfully.
4
This course demands that you spend a lot of time to study. My advice is that you optimise the
opportunity provided by the tutorial sessions where you have the opportunity of comparing
your knowledge with that of your colleagues.
Study Unit
Note: each unit consists of one or two weeks work and includes introduction, objectives,
reading materials, exercises, conclusion and summary, Tutor-Marked Assignment (TMAs),
references and other resources. The unit directs you to work on these exercises related
to required reading. In general, these exercises test you on the materials thereby assisting you
5
to evaluate your progress and to reinforce your comprehension of the material. Together with
the TMAs these exercises will help you in achieving the stated learning objectives of the
individual units and of the course as a whole.
6
Presentation Schedule
Your course materials have important dates for early and timely completion and submission
of your TMAs and attending tutorials. You should remember that you are required to
submit all your assignments by the stipulated time and date. You should guide against
falling behind in your work.
Assessment
There are three aspects to the assessment of the course. First is made up of self-assessment
exercises, second consists of the TMA and third is the written examination/end of course
examination.
You are advised to do the exercises. In tackling the assignments, you are expected to apply
information, knowledge and techniques you gathered during the course. The assignments
must be submitted to your facilitator for formal assessment in accordance with the
deadlines stated in the presentation schedule and the assignment file. The work you submit
to your tutor for assessment accounts for 30% of your total course work. At the end of the
course you will need to sit for a final examination or end of course examination of about
three hour duration. This examination will count for 70% of the total course mark.
Tutor-Marked Assignment
This is the continuous assessment component of your course. It accounts for 30% of the total
score. You will be given four TMAs (4) to answer. Three of these must be answered before
you are allowed to sit for the end of the course examination. The assignment questions for
the units in the course are contained in the assignment file. You will be able to complete
them through your reading the information contained in the reading materials,
references and the study units. You are advised to research deeper into topics so as
have a broader view of the discussions.
Endeavour to get the assignments to the facilitator on or before the deadline. If for any
reason you cannot complete the work on time, contact your facilitator before the
assignment is due to discuss the possibility of an extension. Extension will not be granted
after the due date has passed unless on exceptional circumstances.
The end of course examination for Network Administration will be for about 3 hours and it
has a value of 70% of the total course work. The examination will reflect the type of self-
testing, practice exercise and tutor-marked assignment problems you have previously
encountered. All these areas of the course will be assessed.
7
Use the time between finishing the last unit and sitting for the examination to revise the
whole course. It might be useful to review your self tests, TMAs and the comments on
them before the course examination. The end of course examination covers information
from all parts of the course.
Facilitators/Tutors and
Tutorial
There are 21 hours of tutorials provided in support of this course. You will be notified
of the dates, times and venues of these tutorials as well as the name and phone
numbers of the facilitator, as soon as you are allocated to a tutorial group.
Your facilitator will mark and comment on your assignments, keep a close watch on
your progress and any difficulties you might face and provide assistance to you during
the course. You are expected to mail TMA to your facilitator at least two working days
before the schedule date. The TMAs will be marked by your tutor returned back to you as
soon as possible.
assistance:
Endeavour to attend tutorials. It affords you the opportunity of face to face contact with
the facilitator and to ask questions which are answered instantly. You also raise problems
encountered in the course of study.
SUMMARY
Computers in Society intend to make you computer literate. At the end of the
course you will achieve the objective if you follow the instructions and do
what you are expected to do.
8
CONTENTS PAGE
9
MODULE 1 INTRODUCTION TO COMPUTER NETWORKS
UNIT 1: NETWORK CLASSIFICATION AND REFERENCE MODELS
UNIT 2: NETWORK STRUCTURE
1.0 INTRODUCTION
2.0 OBJECTIVES
In the simplest form, data transfer can take place between two devices
which are directly connected by some form of communication medium.
But it is not practical for two devices to be directly Point–to–Point
connected. This is due to the following reasons:
10
Solution to this problem is to connect each device to a communication
network. Computer network means interconnected set of autonomous
systems that permit distributed processing of information.
A local area network is a relatively smaller and privately owned network with
maximum span of 10km to provide local connectivity within a building or small
geographical area. The LANs are distinguished from other kinds of networks by three
characteristics:
(i) Size
(ii) Transmission technology, and
(iii) Topology
Accordingly, there are many LAN standards known as IEEE area standards 802
x.
Metropolitan Area Network is defined as less than 50km and provides regional
connectivity typically within a campus or small geographical area. It is designed to
extend over an entire city. It may be a single network, such as cable television
network, or it may be a means of connecting a number of LANs into a large
network, so that resources may be shared LAN–to–LAN as well as device to device.
For example, a company can use a MAN to connect to the LANs in all of its offices
throughout a city.
Wide Area Network provides no limit of distance. In most WAN, the subnet consists
of two distinct components. Transmission lines, also called circuits or channels, and
routers. Transmission lines are used for moving bits between machines, whereas
routers are used to connect two or more transmission lines
11
A WAN provides long distance transmission of data, voice, image and video
information over large geographical areas that may comprise a country, a continent or
even the whole world. In contrast to LANs (which depend on their own hardware for
transmission), WANs may utilize public, leased or private
communication devices usually in combination, and span own unlimited number of
miles.
Generic application
There are basically two types of network based on whether the network
contains switching elements or not. These are Point–to–Point network
and Broadcast network.
Star
In a star topology, each device has a dedicated Point–to–Point link only to a central
controller, usually called a hub. These devices are not linked to each other. If one
device wants to send data to another, it sends to the hub which then relays the data
to the other connected devices. In a star, each device needs only one link and one
I/O Port to connect it to any number of other devices. This factor makes it
easy to install and configure. Far less cabling need to be housed and additions,
moves and deletions involve only one connection between that device and the hub.
Tree
The advantages and disadvantages of a tree topology are generally the same as
those of stars. The addition of secondary hubs, however, brings two further
advantages. First, it allows more devices to be attached to a single central hub and
can, therefore, increase the distance a signal can travel between devices. Second, it
isolates the network and prioritizes communication from different computers.
13
Ring
Bus
14
3.5 Reference Model
The OSI model has seven layers shown in figure 2. The principles that were applied
to arrive at the seven layers are as follows:
Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) Session Layer
(f) Presentation Layer
(g) Application Layer.
15
Layer
Application Protocol
Application Application
7
Interface
Presentation Protocol
6 Presentation Presentation
Session Protocol
5 Session Session
4 Transport Transport
Communication Subnet Boundary
Transmission medium
16
3.5.1.2 The Data Link Layer
The main task of the Data Link Layer is to provide error free transmission. It
accomplishes this task by having the sender break the input data up into data frames,
transmit the frames sequentially, and process the acknowledgement frames sent back
to the receiver.
The Data Link Layer creates and recognises frame boundaries. This can be
accomplished by attaching special bit patterns to the beginning and end of the frame.
If these bit patterns can accidentally occur in the data, special care must be taken to
make sure these patterns are not incorrectly interpreted as frame delimiters
Whereas the Data Link Layer is responsible for end to end delivery, the network
layer ensures that each packet travels from its source to destination successfully and
efficiently. A key design issue is determining how packets are routed from source to
destination. Routes can be based on static tables that are “wired into” the network and
rarely changed.
They can also be determined at the start of each conversation, for example, a
terminal session. Finally, they can be highly dynamic, being determined anew for
each packet, to reflect the current network load.
When a packet has to travel from one network to another to get to its destination,
many problems can arise. The addressing used by the second network may be
different from the first one. The second one may not accept the packet at all because it
is too large. The protocols may differ, and so on. It is up to the network layer to
overcome all these problems to allow heterogeneous networks to be interconnected.
The basic function of the transport layer is to accept data from the session layer,
split it up into smaller units if need be, pass these to the Network Layer, and ensure
the pieces all arrive correctly at the other end. Furthermore, all this must be done
efficiently, and in a way that isolates the upper layers from the inevitable changes in
the hardware technology.
The transport layer provides location and media independent data transfer
service to session and upper layers.
17
3.5.1.5 The Session Layer
Session establishment
Session Release– Orderly or Abort
Data Exchange
Expedited Data Exchange.
Unlike all the lower layers which are just interested in moving bits
reliably from here to there, the presentation layer is concerned with the
syntax and semantics of the information transmitted.
18
composed of several simpler items. Different computers have different codes for
representing character strings, (e.g., ASCII and Unicode), integers (e.g., one’s
complement and two’s complement), and so on. In order to make it possible for
computers with different representations to communicate, the data structure to be
exchanged can be defined in an abstract way, along with a standard encoding to be
used “on the wire”. The presentation layer manages these abstract data structure
and converts from the representation used inside the computer to the network
standard representation and back.
Application layer supports functions that control and supervise OSI application
processes such as start/maintain/stop application, allocate/de–allocate OSI resources,
accounting, check point and recovering. It also supports remote job execution, file
transfer protocol, message transfer and virtual terminal.
The TCP/IP network architecture is a set of protocols that allow communication across
multiple device networks. The architecture evolved out of research that had the
original objective of transferring packets across three different packet networks: the
ARPANET packet– switching networks, a packet radio network, and a packet satellite
network. The military orientation of the research placed a premium on robustness with
regards to failures in the network and on flexibility in operating over diverse
networks. The environment led to a set of protocols that are highly effective in
enabling communication among the many different types of computer systems and
networks. Today, the internet has become the primary fabric for interconnecting the
world’s computers. In this section, we introduce the TCP/IP network architecture and
TCP/IP is the main protocol for carrying information.
Figure 3 shows the TCP/IP network architecture, which consists of four layers. The
Application Layer provides services that can be used by other applications. For
example, protocols have been developed for remote login, for e–mail, for file
transfer, and for network management.
The Application Layer programs are intended to run directly over the transport layer.
Two basic types of services are offered in the transport layer. The first service
consists of reliable connection–oriented transfer of a byte stream, which is
provided by the Transmission Control Protocol (TCP). The second service
consists of best–effort connectionless transfer of individual messages, which is
provided by the User Datagram Protocol (UDP). This service provides no
mechanisms
19
for error recovery or flow control. UDP is used for applications that
require quick but necessary or flow control. UDP is used for application
that require but necessarily reliable delivery layer.
Application
Layer
Transport
Layer
Internet
Layer
Network
Interface Layer
The TCP/IP model does not require strict layering. In other words, the
application layer has the option or bypassing intermediate layers. For
example, an application layer may run directly over the internet.
20
The network interface layer is particularly concerned with the protocols that access
the intermediate networks. At each gateway, the network access protocol
encapsulates the IP packet into a packet or frame of the underlying network or
link. The IP packet is recovered at the exit gateway of the given network. This
gateway must then encapsulate the IP packet into a packet or frame of the type of
the next network or link.
This approach provides a clear separation of the internet layer from the technology
dependent network interface layer. This approach also allows the internet layer
to provide a data transfer service that is transparent sense of not depending on
the details of the underlying networks. The next section provides a detailed
example of how IP operates over the underlying networks.
Figure 5 shows some of the protocols of the TCP/IP protocol suite. The figure
shows two of the many protocols that operate over TCP, namely, HTTP and SMTP.
The figure also shows DNS and Real time Protocol (RTP), which operate over
UDP. The transport layer protocols TCP and UDP, on the other hand, operate over
IP. Many network interfaces are defined to support IP. The salient part of figure 5 is
that all higher–layer protocols access the network interfaces through IP. This feature
provides the capability to operate over multiple networks. The IP protocol is
complemented by additional protocols (ICMP, IGMP, ARP, and RARP) that are
required to operate an internet.
21
HTTP SMTP DNS RTP
TCP UDP
IP
22
3.6 IEEE Standards for LAN
Although there are many standards, we will configure here to just three of them:
1. 802.3 is a simple protocol, Station can be installed on fly without taking network
down. A passive cable is used and modems are not required. Delay at low load is
practically zero. A station does not have to wait for a token, they just transmit
immediately. Each station has to be able to detect the signal of the weakest station
even when it is transmitting itself and all of the collision detect circuiting in the
transceiver is analog. Minimum valid frame is 64 bytes.
4.0 CONCLUSION
This unit has introduced you to Computer Networks. We have classified the different
types of networks, goal and motivation of Computer Networks. This unit has
introduced you to the two types of network models as well as the difference between
these two. The unit has also done a good job of defining various standards of LANs.
5.0 SUMMARY
23
Depending on the area of coverage, a network can be classified as LAN, MAN,
or WAN. A network is required for better utilisation of expensive resources,
sharing information, collaboration among different groups, multimedia
communication and video conferencing.
Two different types of networking models OSI and TCP/IP exist. The
difference between these models was discussed in detail.
7
UNIT 2: NETWORK STRUCTURE
1.0 INTRODUCTION
Topolog
y
Mesh Ring
Star Bus
8
3.1.1 Mesh
In a mesh topology, every device has a dedicated point to point link to every
other device. The term dedicated means that the link carries traffic only
between the two devices it connects. (see figure 2)
Statio
n
Station Station
Station Station
A mesh offers several advantages over other network topologies. First, the
use of dedicated links guarantees that each connection can carry its own data
load, thus eliminating the traffic problems that can occur when links must be
shared by multiple devices. Second, a mesh topology is robust. If one link
becomes unavailable it does not incapacitate the entire system. Third, there is
the advantage of privacy or security. Whenever message travels along a
dedicated line, only the intended recipient sees it. Finally, point to point links
make fault identification and fault isolation easy. Traffic can be routed to avoid
links with suspected problems. This enables the network manger to discover
the precise location of the fault and aids in finding its cause and solution.
The main disadvantages of a mesh are related to the amount of cabling and that
of I/O ports required. First, because every device must be connected to every
other device, installation and reconnection are difficult. Second, the sheer bulk
9
of the wiring can be greater than the available space (in walls, ceilings or floors)
can accommodate. Finally, the hardware required to connect each link (I/O
ports and cables) can be prohibitively expensive. For these reasons, a mesh
topology is usually implemented in a limited fashion, for example, as a
backbone connecting the main computers of a hybrid network that can include
several other topologies.
Hub
A Star topology is less expensive than a mesh topology. In a star, each device
needs only one link and one I/O port to connect to any number of others.
9
This factor also makes it easy to install and reconfigure. Far less calling needs
to be housed, and additions, moves and deletions involve only one connection
between that device and the hub.
Other advantages include robustness. If one link fails, only that link is affected.
All other remain active. This factor also lends itself to easy fault identification
and fault isolation. As long as the hub is working, it can be used to monitor link
problems and bypass detective links.
A bus topology is multipoint. One long cable acts as a backbone to link all the
devices in the network (see figure 4)
Nodes are connected to the bus cable by drop lines and taps. A drop line is
a connection running between the device and the main cable. A tap is a
connector that either splices into the main cable or punctures the sheathing of a
9
cable to create a contact with the metallic core. As a signal travels along the
backbone, some of its energy is transformed into heat. Therefore, it becomes
weaker and weaker as it travels farther and farther. For this reason, there is a
limit on the number of taps a bus can support and on the distance between those
taps.
In addition, a fault or break in the bus cable stops all transmission, even
between devices on the same side of the problem. The damaged area reflects
signals back in the direction of origin, creating noise in both directions.
Bus topology was the one of the first topologies used in the design of early
local area networks
In a ring topology, each device has a dedicated point to point connection with
only the two devices on either side of it. A signal is passed along the ring in
one direction from device to device, until it reaches its destination. Each device
in the ring incorporates a repeater. When a device receives a signal intended
for another device, its repeater regenerates the bits and
passes them along (see
figure 5).
Station Station
Station Station
A ring is relatively easy to install and reconfigure. Each device is linked to only
its immediate neighbors (either physically or logically). To add or delete a
device requires changing only two connections. The only constraints are media
and traffic considerations (maximum ring length and number of devices). In
addition, fault isolation is simplified. Generally in a ring, a signal is
circulating at all times. If one device does not receive a signal within a specified
period, it can issue an alarm. The alarm alerts the network operator to the problem
and its location.
However, unidirectional traffic can be a disadvantage. In a simple ring, a break
in the ring (such as a disabled station) can disable the entire network. This
weakness can be solved by using a dual ring or a switch capable of closing off
the break.
Today, the need for higher speed LANS has made this
topology less popular
A network can be hybrid. For example, we can have a main star topology with
each branch connecting several stations in a bus topology as shown in Figure 6.
Hub
SELF-ASSESSMENT EXERCISES
a) What are the three criteria necessary for an effective and efficient network?
b) What is network topology?
4.0 CONCLUSION
5.0 SUMMARY
A mesh offers several advantages over other network topologies. The main
disadvantages of a mesh are the number of I/O ports required.
Star topology is less expensive than a mesh topology. One big disadvantage of a
star topology is the dependency of the whole topology on one single point, the
hub.
A bus topology is multipoint unlike mesh and star topologies that are
point to point connections. An advantage of a bus topology is ease of
installation. Disadvantages include difficult reconnection and fault isolation.
2. Forouzan, B.A, & Fegan, S.C. (2007). Data communications and Networking
(4th Ed). Mc
Graw Hill.
3. Limoncelli, T. A.,Hogan, C. J. & Chalup, S. R (2007}. The Practice of System
and Network
Administration. (2nd Ed.). Upper Saddle River, NJ: Addison-Wesley
1.0 INTRODUCTION
This unit looks at what constitutes a local area network (LAN), then a wide area
network (WAN) and then discusses the differences between the two. We then
discuss the technologies for implementing WAN.
2.0 OBJECTIVES
The category into which a network falls is determined by its size. A LAN
normally covers an area less than 2 miles; a WAN can be worldwide.
Networks of a size in between are normally referred to as metropolitan area
networks (MANs) and span tens of miles.
and topology. In general, a given LAN will use only one type of transmission
medium. The most common LAN topologies are bus, ringed star.
Early LANS had data rates in the 4 to 16 megabits per seconds (mbps) ranges. LANs
come in a parallel of different configurations. The most common is switched LANs
and wireless LANs. The most switched LAN is a switched Ethernet LAN, which
may consist of a single switch with a parallel of attached devices, or parallel of
interconnected switches. Today, however, speeds are normally 100 or 1000 mbps.
Wireless LANs are the newest evolution in LAN technology.
A wide area network (WAN) provides long distance transmission of data, image,
audio, video information over large geographic area that may comprise a
country, a continent or even the whole world. WAN can be as complex as the
backbones that connect the Internet or as simple as a dial-up line that a home
computer to the Internet. We normally refer to the first as a switched WAN
and to the second as a point to point WAN. The switched WAN connects the
end systems which usually comprise a router (internet – working
connecting devices) that connects together LAN or WAN. The point to
point WAN is normally a line leased from a telephone or cable T.V provider
that connects a home computer or a small LAN to an Internet service provider
(ISP). This type of WAN is often used to provide Internet access. Wireless
WANs are become more and more popular. Traditionally, WANs have been
implemented using one of two technologies: Circuit switching and packet
switching. More recently, frame relay and asynchronous transfer mode (ATM)
networks have assumed major roles.
CIRCUIT SWITCHING
In a circuit- switching network, a dedicated communications path is established
between two stations through the nodes of the network. That path is a connected
sequence of physical links between nodes. On each link, a logical channel is
dedicated to the connection. Data generated by the source station are transmitted
along the dedicated path as rapidly as possible. At each mode, incoming data
are routed or switched to the appropriate outgoing channel without delay.
The most common example of circuit switching is the telephone network.
PACKET SWITCHING
A quite different approach is used in a packet switching network. In this case, it
is not necessary to dedicate transmission capacity along a path through the
network. Rather, data are sent out in a sequence of small chunks, called packets.
Each packet is passed through the network from node to node along some path
leading from source to destination. At each node, the entire packet is
received, stored briefly, and then transmitted to the next node. Packet
switching networks are commonly used for terminal to computer
communications.
FRAME RELAY
A MAN is a network with a size between a LAN and WAN. It normally covers
the area inside a town or a city. It is designed for customers who need a high-
speed connectivity, normally to the Internet and have end points spread over a
city or part of a city.
19
Today, it is very rare to see a LAN, a MAN or a WAN in isolation; they are
connected to one another. When two or more networks are connected, they
become an internetwork or internet.
What is an internet?
4.0 CONCLUSION
Whereas wide area networks may be public or private, LANs usually are owned
by the organization that is using the network to interconnect equipment.
LANs have much greater capacity than WANS to carry what is generally a
greater internal communication load.
5.0 SUMMARY
20
6.0 TUTOR-MARKED ASSIGNMENTS
2. Forouzan, B.A, & Fegan, S.C. (2007). Data communications and Networking
(4th Ed). McGraw Hill.
3. Limoncelli, T. A.,Hogan, C. J. & Chalup, S. R (2007}. The Practice of System
and Network Administration. (2nd Ed.). Upper Saddle River, NJ: Addison-Wesley
1.0 INTRODUCTION
In this unit, and the next unit, we will examine features of several
network devices.
2.0 OBJECTIVES
repeaters
bridges
witches
hubs.
3.1.1 Repeaters
When a signal is sent over a long network cable, signal gets weakened
due to attenuation. This results in some data getting lost in the way. In
order to boost the data signal, Repeaters are needed to amplify the
weakened signal. They are known as signal boosters or amplifiers. They
are physical layer devices. They are like small boxes that connect two
segments of networks, refine and regenerate the digital signals on the
cable and send them on their way.
Repeaters help in increasing the geographical coverage of networks i.e.
LAN for example, IEEE802.3 Standard allows for up to four repeaters
connecting five cable segments to a maximum of 3000 metres distance.
This Ethernet cable and fibre optic cable: Token ring networks
translate between electrical signals on shielded or unshielded twisted
pair wiring and light pulse on fibre–optic cabling.
Bridges work at the Data Link Layer of the OSI model. Since bridges
work in the Data Link Layer they do not examine the network layer
addresses. They just look at the MAC addresses for Ethernet and Token
Ring, Token Bus and determine whether or not to forward or ignore a
packet.
Purpose of a Bridge
A bridge divides a network into separate collision domains (Fig. 2). This
reduces congestion as only frames that need to be forwarded are sent
across interfaces. All transmissions between nodes connected to same
segment are not forwarded and therefore, do not load the rest of the
network.
Collision Collision
Domain A Bridge Domain B
For example, if you have one segment called 100: it has 50 users (in
several departments) using this network segment. The Engineering
Department is CAD (Computer–Aided Design)–oriented, while the
Accounting Department is into heavy number crunching (year end
reports, month end statements, etc.). On this network, any traffic
between clients of Accounting Department and the Accounting File
Server (in the Accounting Department) will be heard across the Segment
100. Likewise, any traffic between the Engineering Dept clients (to the
CAD File Server) will be heard throughout the Network Segment. The
result is that “Other” Departments accesses to the Generic File Server
are incredibly slow: this is because of the unnecessary traffic that’s
being generated from other departments (Engineering and Accounting).
Bridges listen to the network traffic, and build an image of the network
on each side of the bridge. This image of the network indicates the
location of each node (and the bridge’s port that accesses it). With this
information, a bridge can make a decision whether to forward the packet
across the bridge – if the destination address is not on the same port – or,
it can decide not to forward the packet (if the destination is on the same
port).
The MAC layer also contains the Bus Arbitration method used by the
network. This can be CSMA/CD, as used in Ethernet, or Token Passing,
as used in Token Ring. Bridges are aware of bus arbitration and special
translation bridges can be used to translate between Ethernet and Token
Ring.
4. Local Bridges
Local Bridges are used (as in the previous examples) where the network
is being locally (talking about physical location now) segmented. The 2
segments are physically close together: same building, same floor, etc.
Only one bridge is required.
5. Remote Bridges
Remote Bridges are used in pairs, and also used where the network is
remotely segmented (again, talking of physical locations). The two
segments are physically far apart: different buildings, different floors,
etc. 2 x half–bridges are required; one at each segment. The remote
bridges are half of a normal bridge, and may use several different
communications media in between.
6. Bridging Methodologies
Now that the bridge knows where Station B is, it will forward packets destined for
Station B only onto Port 1. As stations transmit packets, the bridge will learn the
location of more and more stations until, finally, it knows the location of every station
that is attached to its ports. The beauty of the system is that even if the bridge doesn’t
know the location of a station, packets still get sent to their destination, just with a
tiny bit of wasted bandwidth.
Finally, the bridge ages each entry in its internal tables and deletes the entry if, after a
period of time known as the aging time, the bridge has not received any traffic from
that station. This is just an extra safeguard to keep the bridge’s tables up–to–date.
Can only work with one path between segments: loops are not allowed: A loop would
confuse the bridges as to which side of the bridge a node was really on (i.e., local
or remote)? Transparent Bridges are not suitable for use on MANs on WANs,
because many paths can be taken to reach a destination. In a LAN, it is simple to
determine that a loop occurs, but in a large corporate network (with several hundred
bridges), it may be next to impossible to determine. As such, bridges are most
commonly used in LAN–to–LAN connectivity (and not in MANs or WANs).
The Spanning Tree Protocol was developed to address the problem of loops in
Transparent Bridging. The IEEE 802.ID (Institute of Electrical
and Electronic Engineers) committee formed the Spanning Tree
Protocol.
The Spanning Tree Protocol (STP) converts a loop into a tree topology
by disabling a bridge link. This action ensures that there is a unique path
from any node to every other node (in a MAN or WAN). Disabled
bridges are kept in a stand–by–mode of operation until a network failure
occurs. At a time, the Spanning Tree Protocol will attempt to construct a
new tree, using any of the previously disabled links.
Problems can arise where, for example, the Spanning Tree Algorithm
may select a path from Los Angeles to New York City – and back to San
Francisco rather than the preferred route of Los Angeles to San
Francisco.
Source–Routing uses two key parameters to identify a route between a source station
and a destination station. These parameters are ring numbers and bridge numbers. Each
ring is assigned a unique number.
These numbers generally range between 1 and FFF (hex). Each bridge is assigned a
bridge number, ranging between 0 and F (hex). The only restriction when assigning
bridge numbers is that parallel bridges connecting identical rings, must have
different bridge numbers. The route between the source and the destination stations
consists of LAN numbers and bridge numbers. The route is obtained by thus: each
bridge which receives the route discovery frame adds to the existing route, its number
and the ring number that it forwards this frame to.
The Pseudo Code for Source Routing Bridges can be written as:
The host uses its known path to the destination if it has one that is not
old.
Else, the host sends a probe message.
The probe will be forwarded by every bridge that sees it, on every
LAN to which the bridge is attached (except the one the probe
came in on).
If the bridge sees its own ID already in the path the probe is
accumulating, it will drop the probe without forwarding it (preventing
a loop).
The probe will eventually get to the destination by every possible
path, including the shortest.
The destination will return the probe to the sender, using the
discovered route as its source routing path.
The source will then send its “real” message using the newly
discovered route.
3.1.3 Switches
3.1.4 Hubs
Hubs are used to provide a Physical Star Topology. At the centre of the
star is the Hub, with the network nodes located on the tips of the star.
Star Topology
The hub is installed in a central wiring closet, with all the cables
extending out to the network nodes. The advantage of having a central
wiring location is that it’s easier to maintain and troubleshoot large
networks. All of the network cables come to the central hub. This way, it
is especially easy to detect and fix cable problems. You can easily move
a workstation in a star topology by changing the connection to the hub at
the central wiring closet.
Backbone Networks
Because a Hub is just many repeaters in the same box, any network
traffic between nodes is heard over the complete network. As far as the
stations are concerned, they are connected on 1 long logical bus (wire).
Switching Hubs
Switching hubs are hubs that will directly switch ports to each other.
They are similar to full duplex hubs, except that they allow dedicated 10
Mbps channels between ports.
HUBS SWITCHES
1. Collision Domain Broadcast Domain
2. All of the parts on a hub are Each part on a switch may be
part of the same Ethernet regarded as a separate Ethernet
(but all are part of the same local
area network).
3. All parts on a hub share the Each part on a switch has its own
same 10Mb (100 Mb) 10Mb (100 Mb) bandwidth
bandwidth)
4. Any frame appearing on one A directed frame appearing on one
port of a hub is repeated to part of a switch is forwarded only to
all other ports on the hub the destination port.
5. A sniffer on any hub port
can see all of the traffic on
the network
6. A hub will repeat defective Switched networks are difficult to
frames sniff.
4.0 CONCLUSION
In this unit, we have examined the features of several network devices such as
repeaters, bridges, switches, hubs, etc. and their various purposes in networks.
This unit has exposed you to when and how to use any of these devices. But you
should note that all the network devices discussed in this unit are used at physical
layer and Data link layer.
5.0 SUMMARY
In this unit we have studied about features of different network devices namely:
repeaters, bridges, hubs and switches.
Repeaters are used in long distance network cable to enhance the signals that get
weakened due to attenuation.
Bridges are used to interconnect multiple LANs two devices at the data link layers
of the OSI model.
Switches are used for performing the functions of bridges as well as point–to–
point dedicated connections.
Hubs are used to interconnect various incoming connections with
different outgoing connections at the Physical layer of the OSI
Model.
6.0 TUTOR–MARKED ASSIGNMENT
1.0 INTRODUCTION
In the previous unit, we studied some of the network devices which are used at
physical layer and data link layer. In this unit, we continue our discussion about
devices/operating at lower layers, and also look at higher layer devices. Routers
and Gateways work at network layers and above, whereas modem work at a lower
layer. We will also examine the differences between bridges and routers.
2.0 OBJECTIVES
routers
gateways
modems.
3.1.1 Routers
Routers are both hardware and software devices. They can be cards that
plug into a collapsed backbone, stand–alone devices or software that
would run on a file server.
Purpose of Routers
Routers that only know Novell IPX (Internetwork Packet Exchange) will
not forward Unix’s IP (Internetwork Packet) PDUs, and vice versa.
Routers only see the Network Layer protocols that they have been
configured for. This means that a network can have multiple protocols
running on it (e.g., SPX/IP, TCPIIP AppleTalk, XNS, etc.).
For example, a Novell SPX/IPX router; only sees the Network Layer
protocol, IPX. This means that any TCP/IP PDUs will not pass through:
the router does not recognise the PDUs, and doesn’t know what to do
with them. Therefore, routers allow network traffic to be isolated – or
segmented – based on the Network Layer Protocol. This provides a
functional segmentation of the network.
Routers that can only see one protocol are called Protocol–Dependent
Routers. Routers that can see many different protocols (two or more) are
called Multi–protocol Routers.
Routing Protocols
Routing Protocols are a “sub–protocol” of the Network Layer Protocol.
They deal specifically with the routing of packets from the source, to the
destination (across an Internetwork). Examples of Routing Protocols are: RIP, IGRP
and OSPF. Let us look at each of these protocols in some more detail.
RIP was one of the first routing protocols to gain widespread acceptance. It is
described in RFC1058, which is an internet standard. Commercial NOS, such as
Novell, Apple, Banyan Vines, and 3Com, use RIP as the base routing algorithm for
their respective protocol suites.
The routers are updated every 30 seconds, when each router sends out a RIP
broadcast. This advertisement process is what enables RIP routing to be dynamic.
Dynamic routers can change routing tables on the fly (as the network
configuration changes). By using the Hop Count information from their
routing tables, routers can select the shortest path (the least number of hops) to the
destination.
This adds a good, bad or suspect route status indicator, depending on the age of the
route information.
Ticks are dynamically assigned values that represent the delay associated
with a given route. Each tick is considered 1/18 of a second. LAN segments are
typically assigned a value of 1 tick. A T1 link may have a value of 5 to 6 ticks and
a 56 Kbps line may have a value of 20 ticks. A larger number of ticks indicate a
slower routing path.
Three commonest problems that can occur with RIP are shown below:
1. Routing loops
The router indicates that the shortest path is going back the way the
packet came from
2. Slow Route Convergence
Routers have delay timers that start counting after the RIP advertising
packet is broadcast. This gives the routers time to receive and formulate
a proper routing table from the other routers. If the delay timer is too
short, the routing table can be implemented with incomplete data
causing routing loops.
EGRP was created to solve many of the problems with RIP, and has
become the default routing protocol across the internet. EGRP is an
enhanced distance vectoring protocol; it uses up to5 metrics (conditions)
to determine the best route as shown below:
1. Bandwidth
2. Hop Count (Delay)–maximum of 255
3. Maximum Packet size
4. Reliability
5. Traffic (Load).
These routing metrics are much more realistic indicators (of the best
routes) than simple hop counts.
The top of the root is the Autonomous Router that connects to the
autonomous systems (the Internet). The next is the Backbone Routers,
the highest area in the OSPF system. Border routers are attached to
multiple areas and they run multiple copies of the routing algorithm.
Last are internal routers that run a single routing database for one area.
Basically, by dividing the network into a routing hierarchy, both substantial
reduction of routing update traffic and faster route convergence – result on a local
basis. Each level has a smaller routing table and less to update.
Both are stored–and forward devices, but Routers are Network Layer
devices (examine network layer headers) and Bridges are Link Layer devices.
3.1.3 Gateways
This device (Figure 1) is used to connect totally dissimilar networks. They function
at a high end of OSI model. They perform protocol conversion for all seven
layers of the OSI model. They are commonly used to connect a LAN and a main
frame computer. Gateways handle conversions of messages, addresses and protocol,
to deliver a message from one network to another. They offer greatest flexibility in
internetworking communications. Gateway’s decision – making is more complex
than Routers. They are very costly and their implementation, maintenance and
operations, are also very complex. They are slower than other devices. They can
recover e–mail messages in one format and convert them into another format.
Dual–homed Gateway is also present in the network. It is a system that has two or
more network interfaces. It acts to block or filter some or all of the traffic trying to
pass between the networks in firewall configuration.
A B C
GATEWAYS
WAN
GATEWAY GATEWAY
PCs Mainframe
Figure 1: Gateway
These gateways (Figure 2) are becoming very common because of the evolution of
enterprise networks and WAN. A PC on the remote site’s LAN functions as a
gateway and runs gateway software. This gateway PC functions as a cluster
controller and communications with a front- end processor using IBM’s
Synchronous Data Link Control (SDLC) protocol via synchronous modems located
at both sites.
The limitation of these gateways has speed. A synchronous modem can dial up a
front–end processor at speeds up to 64Kbps. Companies with heavy micro–
mainframe traffic might require multiple remote gateways to solve this congestion
problem.
X.25 Gateways
Remote LAN can also communicate with IBM mainframe viz., x.25 gateway. A
gateway PC with an adapter card functions as a cluster controller and runs special
gateway software that Contains the QLLC protocol, an IBM defined protocol that
runs over the X.25 suite. The other LAN workstations emulate IBM 3270 terminals.
The IBM host simply assumes it’s communicating with the remote cluster controller.
HOST
SDLC TRANSMISSION
FEP SYNCHRONOUS NODE
MODEM
SDLC Gateway
SYNCHRONOUS
MODEM
NODE LAN
3.14 Modem
Modem speed ranges from 300 bps to 56kbps. It normally transmits about 10
bits/character (each character has 8 bits); maximum rate of characters for a high
speed modem is 2,880 characters/sec. For example, a compressed image of 20KB
(equivalent to 20,000 characters) will take nearly 6 seconds to load on the
fastest modem. The tasks which a modem can perform are:
Modem standards
The CCIT (now known as ITU) has defined standards for modem communication.
Each uses v number to define their type.
Modem Commands
They are provided by Hayes Company that pioneered Modems and defined the
standard method of programming the mode of modem, which is the AT
command language. A computer gets the attention of the modem by sending “AT”
command. For example, ‘ATDT’ is the touch–tone dial command. Initially, a
modem is in the command mode and accepts commands from the computer. These
commands are sent at either 300 bps or 1200bps.
Most commands are sent with AT prefix. Each command is followed by carriage
return character; a command without this is ignored. More than one command can
be placed in a single line and spaces can be entered to improve readability, either
character case can be used.
Modem can enter two states; the normal state and command state. In the
normal state, the modem transmits or receives characters from the
computer an in the command state, characters sent to the modem are
interpreted as commands. Once a command is interpreted, the modem
goes into the normal state. Any character sent to the modem is then sent
along with line. To interpret the modem or to end a connection so that it
goes back into command mode, three consecutive ‘+’ characters are sent
i.e. ‘+++’.
Example:
The following figure shows a sample window from the MS Windows terminal
program (in both MS Windows 3.x and Windows 95/98). It shows the modem
command window. It can be seen that when the modem dials a number, the prefix
to the number dialed is ‘ATDT’. The hang–up command sequence is ‘+++’ ATH.
MODEM COMMANDS X
COMMAND
DIAL PREFIX SUFFX OK
Modem Indicator
These are used to inform the user about current status of a connection. Typically
the indicator lights are:
AA – ON when receiving call. OFF when not receiving calls, flash when
call is incoming.
CD – ON when modem detects the remote modem’s carrier,
else it is off.
OH – ON when modem is on the hook else off.
RD – Flashes when modem is getting data or a command from the
computer.
SD – Flashes when Modem is sending data.
TR – Shows that DTR line is active i.e., computer is ready to send or
receive data.
MR – Shows that modem is powered up.
The following table illustrates widely used modems with bit rates &
modulation techniques
Typical Modems:
Most modems operate with V .22 bis (2400bps), V.32 (9600bps), V.32
bis (14400bps) The V.32 and V.32 bis modems can be enhanced with
echo cancellation. They also typically have built–in compression using
either the V.42 bis standards or MNPC (Microcom Networking
Protocol) level 5.
4.0 CONCLUSION
In this unit you have been taken through network devices such as routers
and gateways that work at network layers and above, and modems that
work at a lower layer.
This unit has also exposed you to the differences between bridges and
routers.
5.0 SUMMARY
In this unit, we have studied about some networking devices which are
used at higher layers of OSI model. The devices which were covered are
the following:
1. Router
Used to connect two devices at the network layer of the OSI Model
2. Gateway
Used to connect the computer with the telephone lines. A Modem can convert
digital signal of a computer to analog signals, so that it can be transferred through
the telephone lines.
1.0 INTRODUCTION
Circuit Switching
This was the first type of data transfer mechanism used. Circuit
switching is used in the telephone networks to transmit voice and data
signals. In a synchronous transmission, which involves transmission of
voice, a synchronized connection must be made between the sender and
receiver because there must be a constant time interval between each
successive bit, character, or event. To enable synchronized transmission,
circuit switching establishes a dedicated connection between the sender
and the receiver involved in the data transfer over the network. As a
result, the connection consumes network capacity whether or not there is
an active transmission taking place; for example, the network capacity is
used even when a caller is put on hold. For different applications,
utilisation of the line can vary enormously. However, there is little delay
and effective transparency for the user. It is very efficient for Constant
Bit Rate (CBR).
Packet Switching
1. Datagram, where each packet can take any path through the
network as long as they all reach the destination.
2. Virtual Circuit, where all the packets are routed through the
same path without having the path dedicated.
Frame Relay
Cell Relay
ATM has a layered structure that is similar to the 7–layered OSI model.
However, ATM only addresses the functionality of the two lowest layers
of the OSI, i.e;
Apart from these two layers, all other layers of the OSI model are
irrelevant in ATM, as these layers are only part of the encapsulated
information portion of the cell which is not used by the ATM network.
Application Layer
User Layers
ATM Adaptation Layer (AAL):
Convergence sublayer
Segmentation and Reassembly sublayer
ATM Layer
Physical Layer
Transmission Convergence Sub layer
i) Physical Layer
The ATM form has left most of the specification for this level to the
implementer.
ii) The ATM layer deals with cells and cell transport. It defines the
layout of a cell and tells what the header fields mean. The size of
a cell is 53 bytes (5 bytes of header and 48 bytes of payload).
Because each cell is the same size and all are relatively small,
delay and other problems with multiplexing different sized
packets are avoided.
Routing
Switching
End-to-end virtual circuit set up
Traffic management
The ATM Adaptation Layer (AAL) maps the higher-level data into
ATM cells to be transported over the ATM network, i.e., this layer
segments the data and adds appropriate error control information as
necessary. It is dependent on the type of services (voice, data, etc.) being
transported by the higher layer.
This is the adaptation layer that divides all types of user data into 48–
byte cells. The ATM layer that adds the five–byte header information
to direct the user data to its destination.
1. AAL 1
2. AAL 2
3. AAL ¾
4. AAL 5
It is divided into two sublayers
This is the lower part of the AAL. The SAR sublayer breaks packets up
into cells on the transmission side and puts them back together again at
the destination. It can add headers and trailers to the data units given to
it by the CS to form payloads. It is basically concerned with cells.
Convergence Sublayer
When a user sends data over the ATM network, the higher–level data
unit is passed down to the Convergence Sublayer of the AAL Layer,
which prepares data for the ATM Layer according to the designated
AAL protocol. The data is then passed down to the Segmentation and
Reassembly sublayer of the AAL Layer, which divides the data unit into
appropriately sized segments.
These segments are then passed down to the ATM Layer, which defines
an appropriate cell header for each segment and encapsulates the header
and payload segment into a 53–byte ATM cell. The cells are then passed
down to the Physical Layer; which streams the cells at an appropriate
pace for the transmission medium being used, adding empty cells as
needed.
Each virtual channel and virtual path has an identifier associated with it.
Virtual path is identified by Virtual Path Identifiers (VPI) and a virtual
channel is identified by a Virtual Channel Identifier (VCI). All channels
within a single path must have distinct channel identifiers but may have
the same channel identifier as channels in different virtual paths.
3. The ATM switch then retransmits the cell on that outgoing link
with the appropriate connection identifiers.
The manner in which the local translation tables are set up determines
the two fundamental types of ATM connections:
ATM ATM
User 1 SWITCH SWITCH
ATM Network 1
ATM ATM
Private ATM SWITCH SWITCH
Switch
ATM Network 2
User 2
Communication across the NNI and the ICI will require signaling for
virtual–path and virtual–channel establishment, together with various
exchange mechanisms for the exchange of information such as routing
tables, etc.
Notice that only the user at either end of the transmission deal with the
48–byte information load within the cell. At each stage of the
transmission, the switch is only concerned with accepting the cell from
one port, changing the VPI/VCI according to its tables, and routing the
cell out the appropriate switch port.
The structure of the header is different in UNI and NNI. In the network–
network interface, the virtual path identifier field is expanded from 8 to
12 bits.
8 7 6 5 4 3 2 1
8 7 6 5 4 3 2 1
The GFC field of the header is only defined across the UNI and does not
appear in the NNI.
Function
The VPI is an 8–bit field for the UNI and a 12–bit field for the NNI
Function
It is a 16–bit field used to identify a virtual channel. For idle cells, the
VCI is set to all 0’s.
Function
The PTI field indicates the type of information in the information field.
The value in each of the three bits of PTI indicates different conditions.
The 1–bit CLP field is used for indication of the priority of the cell. It is
used to provide guidance to the network in the event of congestion.
When set to value 1, it indicates that the cell is subject to discard within
the network. When the CLP value is set to 0, it indicates that the cell is
of relatively high priority and should be discarded only in situations
when no alternative is available.
Each ATM cell includes an 8–bit HEC that is calculated based on the
remaining 32 bits of the header.
Function:
ATM is connection oriented and allows the user to specify the resources
required on a per–connection basis (per SVC) dynamically. There are
five classes of service defined for ATM (as per ATM Forum UNI 4.0
specification).
Technical Definition
Parameters
Cell loss CLR is the percentage of cells not delivered at their
ratio (CLR) destination because they were lost in the network due
to congestion and buffer overflow.
Cell transfer The delay experienced by a cell between network
delay entry and exit points is called the CTD. It includes
(CTD) propagation delays, queuing delays at various
intermediate switches, and service times at queuing
points.
Cell delay CVD is a measure of the variance of the cell transfer
variation delay. High variation implies larger buffering for
(CVD) delay–sensitive traffic such as voice and video.
Peak cell The maximum cell rate at which the user will
rate (PCR) transmit. PCR is the inverse of the minimum cell
inter–arrival time.
Sustained This is the average rate, as measured over a long
cell rate interval, in the order of the connection lifetime.
(SCR)
Burst This parameter determines the maximum burst that
tolerance can be sent at the peak rate. This is the bucket–size
(BT) parameter for the enforcement algorithm that is used
to control the traffic entering the network.
Priority Control
Congestion Control
ATM technologies, standards, and services are being applied in a wide range of
network environments.
ATM Services
Enterprise users are deploying ATM campus networks based on the ATM
LANE standards. Workgroup ATM is more of a niche market with the wide
acceptance of switched–Ethernet desktop technologies.
Frame–Relay Backbones
Internet Backbones
4.0 CONCLUSION
This unit has discussed the different types of switching techniques and
how the Asynchronous Transfer Mode (ATM) – layered architecture
compares with the OSI model.
Also, you have been taken through how the ATM protocol works,
together with a detailed discussion on the ATM network, the ATM cell,
the ATM traffic control and classes of services, benefits of ATM and its
applications.
5.0 SUMMARY
In the previous unit, the basics of computer network were discussed. This unit
covers topics related to the physical layer, which will comprise the difference
between data rate and bandwidth, analog and digital and finally, characteristics of
different transmission media.
2.0 OBJECTIVES
types of transmission
domain concepts – time and frequency
difference between analog & digital signal
type of transmission impairments
transmission media.
3.0 MAIN CONTENT
Guided
Unguided
In both cases, communication is in the form of electromagnetic
waves.
With guided media, the waves are guided along a physical path.
Examples of guided media are twisted pair, coaxial cable, and optical
fibre. Unguided media provide a means for transmitting electromagnetic
waves but do not guide them; examples are propagation through air,
vacuum and seawater. In this unit, we will discuss about guided media
only.
A transmission may be
Simplex
Half–duplex
Full duplex
So, we can say that for each signal, there is a time–domain function (t) that
specifies the amplitude of the signal at each instance of time. Similarly, there
is a frequency–domain function S(t) that specifies the constituent frequency of the
signal. The spectrum of the signal is the range of frequencies that it contains.
The concept of effective bandwidth is somewhat a fuzzy one. It is the band within
which most of the energy is confined. The term “most” in this context is somewhat
arbitrary. The important issue here is that, although a given waveform may contain
frequencies over a very broad range, as a practical matter, any transmission
medium that is used will be able to accommodate only a limited band of
frequencies. This, in turn, limits the data rate that can be carried on the
transmission.
The terms ‘analog’ and ‘digital’ correspond, roughly, to continuous and discrete,
respectively. These two terms are used frequently in data communications at least in
three contexts:
Data
Signaling
Transmission
3.2.1 Data
3.2.2 Signals
3.2.3 Transmissions
The purpose of the physical layer is to transport a raw bit stream from
one machine to another. Various physical media can be used for the
actual transmission. Each one has its own niche in terms of bandwidth,
delay, cost, and ease of installation and maintenance. Media are roughly
grouped into guided media, such as copper wire and fibre optics, and
unguided media, such as radio and lasers through the air. We will look at
these in this section and next one.
Twisted pairs can be used for either analog or digital transmission. The bandwidth
depends on the thickness of the wire and the distance travelled, but several
megabytes/sec can be achieved for a few kilometres in many cases. Due to their
adequate performance and low cost, twisted pairs are widely used and are likely to
remain so for years to come.
Twisted pair cabling comes in several varieties, two of which are important for
computer networks Category 3 twisted pairs consist of two insulated wires gently
twisted together. Four such pairs are typically grouped together in a plastic sheath
for protection and to keep the eight wires together.
Starting around 1988, the more advanced category 5 twisted pairs were introduced.
They are similar to Category 3 pairs, but with more twists per centimetres and
insulation, which result in less cross talk and a better quality signal over longer
distances, making them more suitable for high–speed computer communication.
Both of these wiring types are often referred to as UTP (Unshielded Twisted Pair, to
contrast them with the bulky, expensive, shielded twisted pair cables IBM
introduced in the early 1980s, but which have not proven popular outside of IBM
installations.
3.4 Multiplexing
In communication, multiplexing is a technique that transmits signals
from several sources over a single communication channel. So in order
to minimize the cost of communication bearer, various means of sharing
a communication channel between several users, have been devised;
these are known as multiplexing. In this section, we will discuss about
two multiplexing techniques: FDM & TDM.
In TDM, the users take turns (in a round robin), each one is periodically getting the
entire bandwidth for a little burst of time. Television broadcasting provides an
example of both kinds of multiplexing. Each TV channel operates in a different
frequency range, which is a portion of the allocated spectrum, with the inter–
channel separation great enough to prevent interference. This system is an example
of FDM. During the transmission of any program (Serial/film), there is an
advertisement as well. These two alternate in time on the same frequency. This is an
example of TDM.
4.0 CONCLUSION
This unit covered topics relating to the physical layer, which comprises the
difference between data rate and bandwidth, analog and digital transmission
and characteristics of transmission media except wireless transmission.
Also, the unit has taken you through the types of transmission impairments and how
to minimize them.
5.0 SUMMARY
Transmissions can take place through the media of guided and unguided type and it
can be simplex, half–duplex and full–duplex. In simplex, the data/signals are
transmitted in one direction by a station i.e., by the sender; in half–duplex, the
transmission can be done in one direction at a time whereas in full–duplex, the
transmission can take place in directions. The concept of time domain and
frequency domain deals with the electromagnetic signals and components at
various frequencies spectrum. The concept of analog and digital transmission deals
with data signaling and transmission which can be analog data i.e., signal occupies
same spectrum and digital data are encoded using a modem to produce analog
signal. The other type of signal is digital, which uses a bit stream.
Media used in transmission are of the magnetic type and it is one of the most
common ways to store data physically on tapes, floppy disks and hard disks.
Twisted pairs are used both for analog as well as digital transmission. Twisted pair
can be Cat 3, or Cat 5. Both of them are UTP cables. Baseband cable is used for
longer distances at high–speed 50 ohm and 75 ohm are normally used. Broadband
Coaxial cable refers to anything wider than 4KHz. Broadband is divided into
multiple channels and each channel can be used for analog signal also. It is used for
CD– quality audio or a bit stream.
6.0 TUTOR MARKED ASSIGNMENT
1.0 INTRODUCTION
This unit introduces the design of Data Link Layer and its Medium
Access Control Sublayer. This includes various protocols for achieving
reliable, efficient communication. It also covers the study of nature of
errors, causes and how they can be detected and corrected.
The MAC sublayer contains protocols which determine who goes next
on a multi access channel.
2.0 OBJECTIVES
The Data Link Layer constitutes the second layer of the hierarchical OSI
Model. The Data Link Layer together with Physical Layer and the
interconnectivity medium provide a data link connection for reliable
transfer of data bits over an imperfect physical connection.
It accomplishes the task by having the sender break the input data up
into data frames, transmit the frames sequentially and process the
acknowledgement frames sent back by the receiver. It is up to the Data
Link Layer to create and recognise frame boundaries.
Another issue that arises in Data Link Layer is how to keep a fast
transmitter from overflowing a slow receiver in data.
The Data Link Layer incorporates certain processes, which carry out
error control, flow control and the associated link management
functions. The data block along with the control bits is called a frame.
Framing: Some control bits are added to the data packets from
network layer to mark the start and end of a frame. This is done
using character count, character or bit stuffing.
Flow Control: Flow Control deals with how to keep the fast
sender from overflowing a slow receiver by buffer at the receiver
sides and acknowledgement.
The sender allows one message to be transmitted, checked for errors and
an appropriate ACK (Positive Acknowledgement) or NAK (Negative
Acknowledgement) returned to the sending station. No other data
messages can be transmitted until the receiving station sends back a
reply, thus the same STOP & WAIT is derived from the originating
station sending a message, stopping further transmission and waiting for
a reply.
Its major drawback is the idle line time that results when the stations are
in the waiting period. If the ACK is lost, then the master station
retransmits the same message to the receiver side. The redundant
transmission could possibly create a duplicate frame. A typical approach
to solving this problem is the provision for a sequence number in the
header of the message. The receiver can then check for the sequence
number to determine if the message is a duplicate. The Stop and Wait
mechanism requires a very small sequence number, since only one
message is outstanding at any time. The sending and the receiving
station only use a one bit alternating sequence of 0 and 1 to maintain the
relationship of the transmitted message and its ACK/NAK status.
Sliding Window
The data control signals flow from sender to receiver in a more
continuous manner and several messages can be outstanding at any one
time.
The transmitting station maintains a sending window that maintains the
number of frames it is permitted to send to the receiving station and the
receiving station also maintains a receiving window that performs
complementary functions. The two sides use the window to coordinate
the flow of frames between each other. The window wrap around is used
to reuse the same set of numbers for different frames. There are sliding
window techniques:
(1) Go Back N
(2) Selective Repeat
The following two diagrams (Figure 1 and Figure 2) explain the function
of Go Back N and Selective Repeat respectively.
GO Back N
| Time Period |
Figure 1: Go Back N
Selective Repeat
Figure 2: Selective Repeat
In any broadcast network, the key issue is how to determine who gets to
use the channel when there is competition for it. The protocols used to
determine who goes next on a multi–access channel belong to a sub–
layer of a Data Link Layer called MAC sublayer.
These are the two possibilities for the path of a message from source to
destination workstation:
Token Passing
It is a linear cable onto which the stations are attached. When the logical
ring is initialized, the highest numbered station may send the first frame
after it is done, it passes permission to its immediate neighbour by
sending the neighbour a special control frame called a token.
In a token ring, the token circulates around the ring whenever all stations
are idle. When a station wants to transmit a frame, it is required to seize
the token and remove it from the ring before transmitting. This action is
done by inverting a single bit in the 3–byte token which instantly
changes it into the first 3 bytes of a normal data frame. Because there is
only one token, only one station can transmit at a given instant, thus
solving the channel access problem.
4.0 CONCLUSION
Also, the unit has discussed issues relating to error handling methods.
5.0 SUMMARY
1.0
INTRODUCTION
Network and distribution processing systems are of critical and growing
importance in business, government and other organizations. Therefore,
networks must be managed for effectiveness and efficiency. This unit discusses
fundamental aspects of network administration.
2.0
OBJECTIVES
administration
Know the scope of network administration
State the goals of system administration
Understand the challenges of system administration
State the Meta principles of system administration
3
3.0 MAIN CONTENT
4
Network and system administration are increasingly challenging. The
complexity of computer systems is increasing all the time. Even a single PC
today, running Windows NT, and attached to a network, approaches the level
of complexity that mainframe computers had ten years ago. We are now
forced to think systems not just computers.
5
3.4 The challenges of system administration
Many of the principles in this course material derive from a single overriding
issue: they address the predictability of a system. The term system clearly
implies an operation that is systematic, or predictable – but, unlike simple
mechanical systems, like say a clock, computers interact with humans in a
complex cycle of feedback, where uncertainty can enter at many levels.
That makes human–computer systems difficult to predict, unless we somehow
fix the boundaries of what is allowed, as a matter of policy.
individually.
• Balancing a fatalistic view (the inevitability of errors) with a
determination to gain firmer control of the system.
Some counter-productive practices could be
avoided:
• The belief that there exists a right answer to every problem.
• Getting fraught and upset when things do not work the way we expect.
• Expecting that every problem has a beginning, middle and an end
(some problems are chronic and cannot be solved without impractical
restructuring).
We can begin with a
checklist:
• Look for answers in manuals and newsgroups.
• Use controlled trial and error to locate problems.
• Consider all the information; listen to people who tell you that there is
a problem. It might be true, even if you can’t see it yourself.
• Write down experiences in an A–Z so that you learn how to solve the
same problem again in the future.
• Take responsibility for your actions. Be prepared for accidents.
They are going to happen and they will be your fault. You will have to
fix them.
• Remember tedious jobs like vacuum cleaning the hardware once a year.
• After learning about something new, always pose the question: how
does this apply to me?
SELF-ASSESSMENT EXERCISES
5.0 SUMMARY
Network and system administration is a branch of engineering that concerns
the operational management of human–computer systems. System
administration is not just about installing operating systems. It is about
planning and designing an efficient community of computers so that real users
will be able to get their jobs done. System administration begins with a policy –
a decision about what we want and what should be, in relation to what we
can afford. Policy speaks of what we wish to accomplish with the system, and
what we are willing to tolerate of behavior within it. To study this subject, we
need to cultivate a way of thinking which embodies a basic scientific humility
and some core principles:
10
UNIT 2: NETWORK PROTOCOL
1.0 INTRODUCTION
This unit discusses packets and protocols which are the fundamental building
blocks of data transmission over the network.
2.0 OBJECTIVES
3.1.2.1 Header
The header section of a packet contains the routing information. This
information includes the source and destination of the packet. The header also
contains the number of the packet, which is generated when the packet is
created. In addition, the header can contain a protocol version number, the length
of the header, the type of service, the length of the entire packet, the flags, the
time to live, and other information.
3.1.2.2 Data
The data is the actual information that is being transmitted over the
network from one application to another. Each protocol has a predefined
maximum data size. If the data is larger than this maximum data size, the data is
broken into smaller pieces and transmitted in multiple packets.
3.1.2.3 CRC
A CRC (Cyclic redundancy check) is calculated prior to the data being sent and
attached to the bottom of a packet. At the destination, a new CRC is computed
and compared to the original to verify that the packet was not corrupted. A
CRC is usually attached to the bottom of a packet, but some protocols include
CRC within the header.
contains the source address, destination address, and packet number, along
with other information, is attached to the beginning of the packet. A
CRC is then calculated and added to the end of
the packet.
3.1.4 Encapsulation
Encapsulation is the process of encoding data for transmitting it across the
network. Once a packet is created as described previously, in order for the
packet to be transmitted to its final destination, it may need to use a protocol in
addition to the one that it is currently using. A header and CRC are then added
to the newly created packet. This packet is an encapsulated packet. Figure 1
illustrates an encapsulated packet.
13
Header CRC
Data
Figure 1 Encapsulated packet
3.2 PROTOCOLS
In computer networking, communication occurs between entities in different
systems. An entity is anything capable of sending or receiving information.
However, two entities cannot simply send bit streams to each other and expect to
be understood. For communication to occur, the entities must agree on a protocol.
A protocol is a set of nodes that govern data communications. A protocol defines
what is communicated, how it is communicated, and when it is communicated. The
key elements of protocol are syntax, semantics and timing.
Syntax: The term syntax refers to the structure or format of the data, meaning
the order in which they are presented. For example, a simple protocol might expect
the first 8 bits of data to be the address of the sender, the second 8 bits to be the
address of the receiver, and the rest of the stream to be message itself.
SEMANTICS:
The word semantics refers to the meaning of each section of bits. How is a
particular pattern to be interpreted, and what action is to be taken based on that
interpretation? For example, does the address identify the route to be taken or the
final destination of the message?
TIMING:
The term timing refers to two characteristics: When data should be sent and how
fast they can be sent. For example, if a sender produces data of 100mbps and the
receiver can process data
at only 1 mbps, the transmission will overload the receiver and some data will be lost.
oo
3.2.1 How Protocols Work at
When an application first attempts to transfer data across the network, the data is
usually t 24 large to be sent in a single transmission. To meet the need of
networking, the protocol th governs the transmission of the data first breaks the
data into packets. The protocol numbers
each of the packets so can later be put back together when they arrive at their
destination and transmits each of the packets across the network. In addition to this
numbering, information on the source, destination, and the protocol used is added
to the header of the packet.
Protocols are the first software layer to receive data that has been transmitted
across the network. After all packets have been received, they are put back
together using the numbers that were placed in the header at the origin of the
packet. Once the data has all been put back together, it can be used by the
application that the data was sent across the network to.
3.4 Standards
Are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international
interoperability of data and telecommunications technology and processes.
Standards provide guidelines to manufacturers, vendors, government
agencies and other service providers to ensure the kind of
interconnectivity necessary in today’s market place and in international
communication.
Standards play an important role in our everyday lives and facilitate the
operation of products produced by different manufacturers. For example:
Countries adopt a standard type of mains plug and socket. Without such
a standard, we would find that we had to continually rewire mains plugs or
employ some form of adaptor. This provides an example of national
standard.
Car manufacturers adopt a standard for the relative placement of the
clutch, brake and accelerator pedals. This provides an example of global
standard.
Computers are equipped with standard interface sockets (e.g. serial,
parallel and USB) via
which they are able to connect to peripheral devices. This provides an
example of global standard.
Standards may come into being in various ways.
For example:
A standard may be established (imposed) by the company that plays the
most dominant role in any particular area. For example, the serial and
parallel ports employed by today’s PC were implemented on the earliest
PCs introduced by IBM. They soon became standard for desktop computing
A standard may gradually evolve
A standard may be developed/defined by a committee of experts.
Although standardization can facilitate our use of technologies and products,
standards seldom reflect an optimal solution. For example, the VHS videotape
format became a standard, while 28 other superior and equally cost-effective
formats fell by the wayside. Furthermore, in the case
of standards developed by committees, these often reflect many technological
compromises and take long periods to develop. Such standards are often out of
date even before they are released.
They tend to slow down technological change. This is due to the fact that, in
some cases, by the time a standard is developed, subjected to scrutiny,
reviewed, compromised and endorsed by all concerned parties – and then
disseminated, more efficient technologies could have developed.
Many standards may exist for the same thing. It is often difficult to decide
which standard will provide better compatibility and remain in place for the
greatest amount of time.
In the 1980s, many companies entered the desktop computing market and this
led to a rich diversity of products. Unfortunately, these systems would often
not operate together, nor could software developed for use on one particular
type of machine necessarily be used on another. In short, although the lack
of standards enabled product diversity, it hampered computer usage.
Quickly, standards were developed (and/or evolved) and these impacted on
many areas of computing. For example:
Compatibility improved. By conformance to standards, hardware and
software systems developed by different manufacturers could be used
together (although there were often unforeseen problems)
The diversity of available products
decreased
Backwards compatibility became an important issue. For example, a
new model of computer, or a new release of an operating system should
support the function of older products. This has greatly increased hardware
and software complexity and retarded the development of radically new
computer products.
3.5.1 Application
layer
This should not be confused with the applications programs that may be running on
a computer. The application layer provides network access to the user and to applications
programs. This layer passes data to (and receives data from) the presentation layer,
and logically communicates directly to the application layer on the remote computer.
This is indicated in figure 3 where the horizontal lines indicate the logical communication of
each layer with its remote counterpart. The application layer needs know nothing of the
tasks carried out by the lower layers – it needs only interface with the user (and applications
programs) and with the presentation layer.
3.5.2 Presentation
layers
Different computers may employ different character set formats. A user is not interested in
31 such differences and one of the tasks undertaken by the presentation layer is to
translate between different formats that may be used to represent numbers, characters
and other
symbols. Additionally, the presentation layer is also involved in ensuring secure
data transmission (consequently, when data is being transmitted the presentation layer
undertakes encryption, and when data is being received it performs decryption).
3.5.3 Session
layer
A user applications program may need to open a ‘session’ with a remote machine. For
example, a user may wish to log on to a remote computer and carry out various tasks and
this will involve the transmission and reception of data over a period of time. This
necessitates synchronization whereby each node knows when it can transmit and when it is
to receive data (i.e. when it must
‘listen’). The session layer deals with this synchronization and additionally is involved in error
recovery. Consider the case that a file is being transmitted between two nodes, and during
this process the network fails. Without the support of the session layer it would be
necessary to start the transmission process again from the beginning. However, the session
layer inserts checkpoints into the transmitted data stream and these are used to
efficiently recover from such failures. Following a failure, transmission can be
recommenced from the point at which the last checkpoint was successfully delivered to the
destination node. The session layer carries out various other activities, such as bracketing a
set of related and non-independent activities. For example, there may be a need to carry
out a task on a remote machine, which involves the execution of series of commands.
Perhaps if only some of these commands are executed (i.e. they are not carried out in their
entirety) problems will ensue. If the individual commands are executed as each arrives at the
remote machine then, in the case that the network connection fails, there is the likelihood of
incomplete execution. One task performed by the session layer relates to the buffering of
such commands – as each arrives it is temporarily stored and not passed to higher layers
until all commands (and any associated data) have been received. The series of commands
may then execute in full.
3.5.4 Transport
layer
This acts as the intermediary between the lower layers (whose implementation is dependent
on the underlying network architecture) and the three upper layers which provide user
services and whose architecture is (at least in principle) independent of the
detailed network
characteristics
.
The type of transport service that is provided to the session layer is determined by
the transport layer. Suppose a node wished to send an extremely large file to a remote
machine via a shared network (or set of interconnected networks). Without judicious
design (in relation to
the type of transport service used), there is the possibility that such a transmission could block
32
the network(s) in such a way that whilst the transmission is in progress no other
machines
could communicate. The approach commonly used to prevent such a situation is to split
the data into chunks (‘packets’) which are individually encapsulated within a frame
containing all the necessary data needed to enable a packet delivery to the intended
destination. The splitting of the data into smaller units is carried out by the transport layer.
These packets may traverse a
set of networks by different routes and so arrive at their destination out of order. The
transport layer reorders packets and so enables them to be correctly reassembled.
3.5.5 Network
Layer
This layer decides on routing issues, determining the path that should be followed by
packets when they traverse networks. In fact, in such a situation the path taken is not
defined solely by the source node but by all the nodes (network devices) through which
packets pass on their way to the destination. Consider the situation illustrated in figure 4
Node A Node C
Node E
Node D Node B
Figure 4: A simple network in which a packet may be sent from Node A to B via
different routes. The circles represent nodes, and the lines network interconnects.
Suppose that a packet is to be sent from Node A to Node B. The packet will have to
pass through at least one intermediate node (network device). These nodes may simply
forward the packet, or may decide on the direction of the next step in its voyage. Thus, for
example, Node D simply performs a forwarding function, whereas Nodes C and E are able to
make routing decisions. The transport layer plays a critical role in determining the time it
will take for packets to reach their destination and in this sense the actions of the transport
layer impact on transmission latency.
This layer is responsible for various low-level network specific tasks and plays a crucial part in
33
the detection and correction of errors that may occur during the transmission
process.
Correction may be achieved by means of additional information inserted into messages prior
to their transmission that can be used to modify bits corrupted during the transmission
process.
Thus a device able to transmit at high speed (i.e. that has high bit-rate) could readily swamp
a slower recipient. Buffering techniques are used to circumvent this problem and
this necessitates a protocol that ensures that the capacity of the buffer is not exceeded.
This is referred to as flow control.
This layer deals with the transmission of the bit stream through the transmission medium,
and the connection strategy used to enable the transfer of bits from one node to another.
Thus the physical layer defines the signal levels, the type of transmission medium employed
(e.g. twisted pair cable, coaxial cable, fiber optic cable), and also the techniques that will
be used to permit the passage of data, such as circuit switching (in which a dedicated path is
set up between two communicating nodes), packet switching, etc.
In the late 1960s, the US Department of Defence’s Advance Research Project Agency (ARPA)
initiated a project that centered upon the interconnection of geographically
dispersed computing systems. Gradually a large-scale network of university and government
computing facilities evolved (this network was named ARPANET), which used packet
switching techniques and initially employed leased phone lines. Early networking protocols
were slow and unreliable and in 1974 a new set of protocols were proposed. These formed
the basis for TCP/IP (Transmission Control Protocol/Internet Protocol (TCP/IP) which today
underpins the operation of the Internet.
3.6.1 Application
layer
This layer provides communication services to the user and to applications programs. It can
be viewed as corresponding to the application, presentation and session layers found in the
OSI model. The application layer contains all the high-level protocols (such as those
that we commonly encounter when accessing the Internet – such as DNS (Domain Name
System) and HTTP).
3.6.2 Transport
layer
Two different protocols are defined in this layer (TCP and UDP (User Datagram Protocol)).
These differ in a number of important respects. For example:
Reliability: in the case of UDP, error correction is not implemented – the onus for
this activity is placed on the applications program. This contrast with TCP in which
error detection and correction form an integral part. Free from error correction
overheads, UDP can (under some circumstances) demonstrate high performance
Flow control: in the case of TCP, flow control is implemented and this prevents a
faster machine from swamping a recipient that operates more slowly.
Figure 5: A conceptual model of TCP/IP set alongside the layers that
comprise the OSI model
A stream of data that is to be transmitted is fragmented into chunks and the
transport layer appends various information, before passing these to the
internet layer. At the receiving node, the transport layer reassembles these
data chunks. In the case of TCP, the transport layer encapsulates the data
chunks into a TCP segment (in the case of UDP, the encapsulated data is
usually referred to as a packet. There are differences between the information
contained in the UDP and TCP headers.) Here the data is provided with a
‘header’ containing various important information; see Figure 6. It is
instructive to consider the purpose of several pieces of information
contained in the header:
Source and Destination ports: many well known (widely used) application
protocols are designated by unique identification numbers provided by the
‘Internet Assigned Numbers Authority’. For example, the File Transfer
Protocol (FTP) is identified as “port21’, and the Simple Mail Transfer
Protocol (SMTP) as ‘port 25’. TCP inserts this information into the header
and thereby provides information on the source and destination applications
protocol associated with the data to be transferred. The source port and
destination port fields are each two bytes
long, and values below 256 are used to reference ‘well-
known’ ports.
0 16 31 bits
Sequence number
TCP header
Acknowledge number
Offset Reserved U A P R S F Window
Checksum Urgent pointer
Options Padding
Data
Data
…
Internet
layer
At the sending node, the Internet layer takes packets or segments generated by
the transport layer, and further encapsulate these to produce datagrams. The
additional information appended by the Internet layer (the ‘IP header’) is
intended to enable the datagrams to be injected onto any network and travel (via
intermediate networks) to the intended destination. During their transit,
intermediate network devices will use this information to determine the direction
they should take. Since the routing of packets is fundamental to the Internet
layer, it may be considered to be equivalent to the network layer used in the OSI
model.
Figure 7F:rame
Theheader
process IP encapsul ation TCP
ofheader used headIePr .This isData
by TCP/
or UDP deptiocted for the sou rce
be transmitted
(sending) node. At the receiving node, the process operates in the reverse: bottom up.
38
Application (4)
Transport (3)
- a connectionless protocol
- provides unreliable datagram service (no end -to-end error detection or correction)
- does not retransmit any unreceived data
- requires little overhead
- application protocols include Trivial File Transfer Protocol (TFTP), Network File System (NFS),
Simple Network Management Protocol (SNMP), Bootstrap Protocol (BOOTP), and Domain
Name Service (DNS)
Internet (2)
(The IP of TCP/IP)
Transfers user messages from source host to destination host
Connectionless datagram service
Route selection is based on a metric
Uses Internet or IUP addresses to locate a host within the Internet
Relies on routers or switches
Integral part is Internet Control Message Protocol (ICMP); this uses an IP datagram to carry
messages about state of communications environment
5.0 SUMMARY
A protocol is a set of rules that govern data communication; the key elements of
a protocol are syntax, semantics and timing.
2. Forouzan, B.A, & Fegan, S.C. (2007). Data communications and Networking
(4th Ed). Mc
Graw Hill.
1.0 INTRODUCTION
2.0 OBJECTIVES
The network layer services have been designed with the following goals:
The function of the network layer is routing packets from the source machine to
the destination machine. In most subnets, packets will require multiple hops to
make the journey. The only notable exception is for broadcast networks, but even
here, routing is an issue if the source and destination are not on the same network.
The algorithms that choose the routes and the data structures that they use are a
major area of network layer design.
The routing algorithm is that part of the network layer software responsible for
deciding which output line an incoming packet should be transmitted on.
Regardless of whether routes are chosen independently for each packet or only
when new connection is established, there are certain properties that are desirable in
a routing algorithm: correctness, simplicity, robustness, stability, fairness and
optimality.
Stability is also an important goal for the routing algorithm. Routing algorithms can
be grouped into two major classes: non–adaptive and adaptive. Non–adaptive
algorithms do not base their routing decisions on measurements or estimates of
the current traffic and topology. Instead, the choice of the route to use to get from
I to J is computed in advance, off–line, and downloaded to the routers when the
network is booted. This procedure is something called static routing.
Let us begin our study of routing algorithms with a technique that is widely used in
many forms because it is simple and easy to understand. The idea is to build a
graph of the subnet, with each node of the graph representing a router and each arc
of the graph representing a communication line. To choose a route between a given
pair of routers, the algorithm just finds the shortest path between them on the
graph. One way of measuring path length is the number of hops.
3.1.1.2 Flooding
The situation in which when too many packets are present in the subnet,
performance degrades. This situation is called congestion.
Subnet can become congested, increasing the delay and lowering the
throughput for packets. Network designers attempt to avoid congestion
by proper design. Techniques include traffic shaping, flow
specifications, and bandwidth reservation. If congestion does occur, it
must be dealt with. Choke packets can be sent back, load can be shed,
and other methods applied.
Congestion control has to do with making sure the subnet is able to carry the
offered traffic. It is a global issue, involving the behavior of all the hosts, all
the routers, the store and forwarding process within the routers, and all the
other factors that tend to diminish the carrying capacity of the subnet.
Inside the subnet, several trade–offs exist between virtual circuits and datagrams.
3.1.4 Internetworking
3.1.4.1 Repeaters
3.1.4.2 Bridges
Bridges filter input and output traffic so that only packets intended for a network are
actually routed into the network and only packets intended for the outside are
allowed out of the network.
3.1.4.3 Routers
Routers examine the network address field and determine the best route for the
packet. They have the great advantage that they normally support several different
types of network layer protocols.
Routers, which only read one type of protocol, will normally have high filtering and
forwarding rates. If they support multiple protocols, then there is normally an
overhead in that the router must detect the protocol and look into the correct place
for the destination address.
The Transport Layer provides reliable cost effective data transport from the source
machine to destination machine.
The Transport Layer provides various services, the most important being an end–to–
end, reliable, connection–oriented byte stream from sender to receiver. It is accessed
through service primitives that permit the establishment, use and release of
connections.
The need to define quality of service arises from the realisation that
users require different quality presentations at different times. The
different quality presentations map onto different parameter values.
When a multimedia presentation is transmitted via a network, it
translates into different requirements of network performance. To be
able to specify QoS aspects concisely and to request them of a network,
QoS must be specified as a set of parameters that can be assigned
numerical values. In a multimedia presentation, the ultimate user of the
system is a human being. Thus, the quality of the presentation is a matter
of the user’s perception, which is limited by the response of the human
vision and auditory senses. This perceptual nature of QoS makes it
subjective and difficult to quantify precisely. Thus, it is easier to specify
a range of values rather than a single value.
Environments in which they operate (at the data link layer, two
routers communicate directly via a physical channel, whereas at the
transport layer, this physical channel is replaced by the entire subnet.
3.2.3.1 Addressing
Flow control of transport layer is similar to that of Data Link Layer, but in
Transport layers, the number of connections open is numerous as compared to Data
Link Layer.
If the subnet provides datagram service, the sending transport entity must also
be buffered, for re–transmitting in the case of loss. If the receiver knows that the
sender buffer all TPDUs (Transport Protocol Data Units) until they are
acknowledged, the receiver may or may not dedicate specific buffers to specific
connections.
In summary, if the network service is unreliable, the sender must buffer all TPDUs.
However, with reliable network services, other trade–off becomes possible.
The optimum trade–off between source buffering and destination buffering depends
on the type of traffic carried by the connection. For low–bandwidth bursty traffic,
such as that produced by an interactive terminal, it is better not to dedicate any
buffer, but rather to acquire them dynamically at both ends.
3.2.3.3 Multiplexing
A number of virtual circuits are open by the users or one user opening
more than one, which requires a lot of buffer in the router; this gives a
solid reason for packet switched network.
To bill the users based on the amount of data sent, not the connection
time.
If host and routers are subject to crashes, recoveries from these crashes
become an issue. If the transport entity is entirely within the hosts,
recovery from network and router crashes is straightforward. If the
network later provides datagram services, the transport entity expects
lost TPDUs all the time and knows how to cope with them. If the
network layer provides connection–oriented service, then loss of virtual
circuits is handled by establishing a new one and then probing the
remote transport entity to ask it which TPDUs it has received and which
one it has not received.
3.2.4 TCP/UDP
The sender’s TCP layer communicates with the receiver’s TCP layer using the
TCP protocol data unit. It defines parameters such as the source port,
destination port, sequence number and so on. Its descriptions are given
below:
Source and destination port number – which are 16 bit values to identify the
local port number.
Sequence number – which identifies the current sequence number of the data
segment. This allows the receiver to keep track of the data segments
received. Any segment that is missing can be easily identified.
Data offset – which is a 32–bit value and identifies the start of the data.
Flags – the flag field is defined as UAPRSE, where U is the urgent flag,
a the acknowledgement flag, P the push function, R the reset flag, S the
sequence synchronize flag and E the end of transmission flag.
Windows – is a 16 bit values and gives the number of data blocks that the
receiving host can accept at a time.
The internet protocol suite also supports a connectionless transport protocol, UDP
(User Data Protocol). UDP provides a way for applications to send encapsulated
raw IP datagrams and send them without having to establish a connection.
Many client–server applications that have one request and one response use UDP
rather than go through the trouble of establishing and later releasing a connection.
A UDP segment consists of an 8–byte header followed by the data. The two ports
serve the same function as they do in TCP: to identify the end–points within the
source and destination machines. The UDP length field includes the 8–byte
header and the data. The UDP checksum includes the same format pseudo–
header, the UDP header, and the UDP
data, padded out to an even number of bytes if need be. It is optional and
stored as 0 if not computed.
This is the most widely used service facilitating users to send and receive
messages electronically in a store and forward manner. Different E–mail standards,
viz., SMTP, UUCP and X400 Message Handling system, are supported on
ERNET.
Electronic Mail is a system whereby a computer user can exchange messages with
other computer users or group of users via a communications network.
Many users first encounter computer networks when they send or receive
electronic mail to or from a remote site. E–mail is the most widely used application
service. Indeed, many computer users access networks only through electronic mail.
E–mail is popular because it offers a fast, convenient method of
transferring information. E–mail can accommodate small notes or large
voluminous memos with a single mechanism. It should not surprise you
to learn that more users send files with electronic mail than with file
transfer protocols.
Characteristics
Plain–old mail
Notices
Auto–save and processing
News dissemination through LISTSRV
Archival search and retrieval
Access to network–wide news (bulletin boards)
The designers chose to build three independent pieces; the NFS protocol itself, a
general purpose Remote Procedure Call (RPC) mechanism, and a general purpose
External Data Representation (XDR). Their intent was to separate the three to make
it possible to use RPC and XDR in other software, including application programs
as well as other protocols. For example, a programmer can divide a program into a
client side and a server side that use RPC as the chief communication mechanism
can one of the client sides, the programmer designates some procedures as remote,
forcing the compiler to incorporate RPC code into those procedures. On the server
side, the programmer implements the desired procedures and uses other RPC
facilities to declare them to be part of a server. When the executing client
program calls one of the remote procedures, RPC automatically collects values
for argument, from a message, sends the message to the remote server, awaits a
response, and stores returned values in the designated arguments. In essence,
communication with the remote server occurs automatically as a side– effect of a
remote call. The RPC mechanism hides all the details of protocols, making it
possible for programmers who know little about the underlying communication
protocols to write distributed programs.
FTP (File Transfer Protocol) is the primary method of transferring files over the
Internet. “FTP” transfers files to and from a remote network site. Some sites
maintain Anonymous accounts on the system for retrieval of public domain
softwares stored on the system.
The ftp protocol is used to access files by FTP, the Internet’s file transfer
protocol. FTP has been around more than two decades and is well entrenched.
Numerous FTP servers all over the world allow people anywhere on the internet to
log in and download whatever files have been placed on the FTP server. The web
does not change this; it just makes obtaining files by FTP easier, as FTP has a
somewhat arcane interface.
3.6 Telnet
In this unit, you have been taken through Network Layer, Transport
Layer and Application layer. Also the various algorithms, mechanisms,
and protocols relating to each of these layers have been discussed.
5.0 SUMMARY
In this unit, you have been introduced to the network, transport and
application layers, their features, services offered by them and the
algorithms used by them. Other concepts covered include
internetworking, repeaters, routes, bridges, multiplexing, addressing and
transport control mechanisms. Standards and definitions of commonly
used terms in Application Layer are covered briefly to familiarise you
with current trends.
h
3
5
6
Course Marking Scheme