CN Unit 1 Notes
CN Unit 1 Notes
Networks – Network Types – Protocol Layering – TCP/IP Protocol suite – OSI Model – Physical
Layer: Performance – Transmission media – Switching – Circuit-switched Networks – Packet
Switching.
1.2 NETWORKS
A network is the interconnection of a set of devices capable of communication. In thisdefinition,
a device can be a host (or an end system as it is sometimes called) such as alarge computer,
desktop, laptop, workstation, cellular phone, or security system. Adevice in this definition can
also be a connecting device such as a router, which connectsthe network to other networks, a
switch, which connects devices together, amodem (modulator-demodulator), which changes the
form of data, and so on. Thesedevices in a network are connected using wired or wireless
transmission media such ascable or air. When we connect two computers at home using a plug-
and-play router, wehave created a network, although very small.
1.2.1 Network Criteria
A network must be able to meet a certain number of criteria. The most important ofthese are
performance, reliability, and security.
Performance
Performance can be measured in many ways, including transit time and response time.Transit
time is the amount of time required for a message to travel from one device toanother. Response
time is the elapsed time between an inquiry and a response. The performanceof a network
depends on a number of factors, including the number of users,the type of transmission medium,
the capabilities of the connected hardware, and theefficiency of the software.
Performance is often evaluated by two networking metrics: throughput and delay.We often
need more throughput and less delay. However, these two criteria are oftencontradictory. If we
try to send more data to the network, we may increase throughputbut we increase the delay
because of traffic congestion in the network.
Reliability
In addition to accuracy of delivery, network reliability is measured by the frequency offailure,
the time it takes a link to recover from a failure, and the network’s robustness ina catastrophe.
Security
Network security issues include protecting data from unauthorized access, protectingdata from
damage and development, and implementing policies and procedures forrecovery from breaches
and data losses.
1.2.2 Physical Structures
Before discussing networks, we need to define some network attributes.
Type of Connection
A network is two or more devices connected through links. A link is a communicationspathway
that transfers data from one device to another. For visualization purposes, it issimplest to imagine
any link as a line drawn between two points. For communication tooccur, two devices must be
connected in some way to the same link at the same time.
There are two possible types of connections: point-to-point and multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. Theentire capacity
of the link is reserved for transmission between those two devices. Mostpoint-to-point
connections use an actual length of wire or cable to connect the twoends, but other options, such
as microwave or satellite links, are also possible. When we change television channels by
infrared remote control, we areestablishing a point-to-point connection between the remote
control and the television’scontrol system.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specificdevices
share a single link. The capacity of the channel is shared spatially or temporally.
Physical Topology
The term physical topology refers to the way in which a network is laid out physically.Two or
more devices connect to a link; two or more links form a topology. The topologyof a network is
the geometric representation of the relationship of all the links andlinking devices (usually called
nodes) to one another. There are four basic topologiespossible: mesh, star, bus, and ring.
Mesh Topology
In a mesh topology, every device has a dedicated point-to-point link to every otherdevice. The
term dedicated means that the link carries traffic only between the twodevices it connects. To
find the number of physical links in a fully connected mesh networkwith n nodes, we first
consider that each node must be connected to every othernode. Node 1 must be connected to n –
1 nodes, node 2 must be connected to n – 1nodes, and finally node n must be connected to n – 1
nodes. We need n (n – 1) physicallinks.
Star Topology
In a star topology, each device has a dedicated point-to-point link only to a central
controller,usually called a hub. The devices are not directly linked to one another. Unlike amesh
topology, a star topology does not allow direct traffic between devices. The controlleracts as an
exchange: If one device wants to send data to another, it sends thedata to the controller, which
then relays the data to the other connected device.
Bus Topology
The preceding examples all describe point-to-point connections. A bus topology, on theother
hand, is multipoint. One long cable acts as a backbone to link all the devices in anetwork .
Ring Topology
In a ring topology, each device has a dedicated point-to-point connection with only thetwo
devices on either side of it. A signal is passed along the ring in one direction, fromdevice to
device, until it reaches its destination. Each device in the ring incorporates arepeater. When a
device receives a signal intended for another device, its repeaterregenerates the bits and passes
them along.
1.3 NETWORK TYPES
The criterion of distinguishing one type of network from another is difficult and sometimes
confusing.We use a few criteria such as size, geographical coverage, and ownership to make
thisdistinction. After discussing two types of networks, LANs and WANs, we define
switching,which is used to connect networks to form an internetwork (a network of networks).
1.3.1 Local Area Network
A local area network (LAN) is usually privately owned and connects some hosts in asingle
office, building, or campus. Depending on the needs of an organization, a LANcan be as simple
as two PCs and a printer in someone’s home office, or it can extendthroughout a company and
include audio and video devices. Each host in a LAN has anidentifier, an address, that uniquely
defines the host in the LAN. A packet sent by a hostto another host carries both the source host’s
and the destination host’s addresses.
Switched WAN
A switched WAN is a network with more than two ends. A switched WAN, is used in the
backbone of global communication today. Switched WAN is a combination of several point-to-
point WANs that are connected by switches.
Internetwork
Today, it is very rare to see a LAN or a WAN in isolation; they are connected to oneanother.
When two or more networks are connected, they make an internetwork, orinternet.
1.3.3 Switching
An internet is a switched network in which a switch connects at least two linkstogether. A
switch needs to forward data from a network to another network whenrequired. The two most
common types of switched networks are circuit-switched andpacket-switched networks. We
discuss both next.
Circuit-Switched Network
In a circuit-switched network, a dedicated connection, called a circuit, is alwaysavailable
between the two end systems; the switch can only make it active or inactive.Figure, shows a very
simple switched network that connects four telephones toeach end. We have used telephone sets
instead of computers as an end system becausecircuit switching was very common in telephone
networks in the past, although part ofthe telephone network today is a packet-switched network.
In Figure the four telephones at each side are connected to a switch. Theswitch connects a
telephone set at one side to a telephone set at the other side. The thickline connecting two
switches is a high-capacity communication line that can handlefour voice communications at the
same time; the capacity can be shared between allpairs of telephone sets. The switches used in
this example have forwarding tasks but nostoring capability.
Figure An internetwork made of two LANs and one point-to-point WAN
Let us look at two cases. In the first case, all telephone sets are busy; four people atone site are
talking with four people at the other site; the capacity of the thick line isfully used. In the second
case, only one telephone set at one side is connected to a telephoneset at the other side; only one-
fourth of the capacity of the thick line is used. Thismeans that a circuit-switched network is
efficient only when it is working at its fullcapacity; most of the time, it is inefficient because it is
working at partial capacity. Thereason that we need to make the capacity of the thick line four
times the capacity ofeach voice line is that we do not want communication to fail when all
telephone sets atone side want to be connected with all telephone sets at the other side.
Figure A heterogeneous network made of four WANs and three LANs
Packet-Switched Network
In a computer network, the communication between the two ends is done in blocks ofdata called
packets. In other words, instead of the continuous communication we seebetween two telephone
sets when they are being used, we see the exchange of individualdata packets between the two
computers. This allows us to make the switches functionfor both storing and forwarding because
a packet is an independent entity that canbe stored and sent later.
A router in a packet-switched network has a queue that can store and forward thepacket. Now
assume that the capacity of the thick line is only twice the capacity of thedata line connecting the
computers to the routers. If only two computers (one at eachsite) need to communicate with each
other, there is no waiting for the packets.
However, if packets arrive at one router when the thick line is already working at its fullcapacity,
the packets should be stored and forwarded in the order they arrived. The twosimple examples
show that a packet-switched network is more efficient than a circuitswitchednetwork, but the
packets may encounter some delays.
1.3.4 The Internet
An internet (note the lowercase i) is two or more networks thatcan communicate with each other.
The most notable internet is called the Internet(uppercase I), and is composed of thousands of
interconnected networks. The figure shows the Internet as several backbones, provider networks,
and customernetworks. At the top level, the backbones are large networks owned by
somecommunication companies such as Sprint, Verizon (MCI), AT&T, and NTT. The
backbonenetworks are connected through some complex switching systems, called
peeringpoints. At the second level, there are smaller networks, called provider networks, thatuse
the services of the backbones for a fee. The provider networks are connected tobackbones and
sometimes to other provider networks. The customer networks are
networks at the edge of the Internet that actually use the services provided by the Internet.They
pay fees to provider networks for receiving services.Backbones and provider networks are also
called Internet Service Providers(ISPs). The backbones are often referred to as international
ISPs; the provider networksare often referred to as national or regional ISPs.
1.3.5 Accessing the Internet
The Internet today is an internetwork that allows any user to become part of it. Theuser,
however, needs to be physically connected to an ISP. The physical connection isnormally done
through a point-to-point WAN.
Using Telephone Networks
Today most residences and small businesses have telephone service, which meansthey are
connected to a telephone network. Since most telephone networks havealready connected
themselves to the Internet, one option for residences and smallbusinesses to connect to the
Internet is to change the voice line between the residenceor business and the telephone center to
a point-to-point WAN. This can be done intwo ways.
❑Dial-up service.The first solution is to add to the telephone line a modem thatconverts data to
voice. The software installed on the computer dials the ISP andimitates making a telephone
connection. Unfortunately, the dial-up service isvery slow, and when the line is used for Internet
connection, it cannot be used fortelephone (voice) connection. It is only useful for small
residences.
❑DSL Service.Since the advent of the Internet, some telephone companies haveupgraded their
telephone lines to provide higher speed Internet services to residencesor small businesses. The
DSL service also allows the line to be used simultaneouslyfor voice and data communication.
Using Cable Networks
More and more residents over the last two decades have begun using cable TV servicesinstead of
antennas to receive TV broadcasting. The cable companies have beenupgrading their cable
networks and connecting to the Internet. A residence or a smallbusiness can be connected to the
Internet by using this service. It provides a higherspeed connection, but the speed varies
depending on the number of neighbors that usethe same cable.
Now wecan say that the communication between Maria and Ann takes place in three layers,
asshown in Figure 2.2. We assume that Ann and Maria each have three machines (orrobots) that
can perform the task at each layer.
Figure A single-layer protocol
Let us assume that Maria sends the first letter to Ann. Maria talks to the machine atthe third layer
as though the machine is Ann and is listening to her. The third layermachine listens to what
Maria says and creates the plaintext (a letter in English), whichis passed to the second layer
machine. The second layer machine takes the plaintext,encrypts it, and creates the ciphertext,
which is passed to the first layer machine. Thefirst layer machine, presumably a robot, takes the
ciphertext, puts it in an envelope,adds the sender and receiver addresses, and mails it.
At Ann’s side, the first layer machine picks up the letter from Ann’s mail box, recognizingthe
letter from Maria by the sender address. The machine takes out the ciphertextfrom the envelope
and delivers it to the second layer machine. The second layermachine decrypts the message,
creates the plaintext, and passes the plaintext to thethird-layer machine. The third layer machine
takes the plaintext and reads it as thoughMaria is speaking.
Figure A three-layer protocol
Protocol layering enables us to divide a complex task into several smaller and simplertasks. For
example, in Figure 2.2, we could have used only one machine to do thejob of all three machines.
However, if Maria and Ann decide that the encryption/decryption done by the machine is not
enough to protect their secrecy, they would haveto change the whole machine. In the present
situation, they need to change only the secondlayer machine; the other two can remain the same.
This is referred to as modularity.Modularity in this case means independent layers. A layer
(module) can be defined as ablack box with inputs and outputs, without concern about how
inputs are changed tooutputs. If two machines provide the same outputs when given the same
inputs, theycan replace each other. For example, Ann and Maria can buy the second layer
machinefrom two different manufacturers. As long as the two machines create the same
ciphertextfrom the same plaintext and vice versa, they do the job.
Advantages of protocol layering:
It allows us to separate theservices from the implementation.
A layer needs to be able to receive a set of servicesfrom the lower layer and to give the services
to the upper layer;
Communicationdoes not always use only two end systems; there are intermediate systems
thatneed only some layers, but not all layers. If we did not use protocol layering, we wouldhave
to make each intermediate system as complex as the end systems, which makesthe whole system
more expensive.
Disadvantage to protocol layering?
One can argue that having a singlelayer makes the job easier. There is no need for each layer to
provide a service to theupper layer and give service to the lower layer. For example, Ann and
Maria could findor build one machine that could do all three tasks. However, as mentioned
above, if oneday they found that their code was broken, each would have to replace the
wholemachine with a new one instead of just changing the machine in the second layer.
Let us assume that computer A communicates with computer B. As the figureshows, we have
five communicating devices in this communication: source host(computer A), the link-layer
switch in link 1, the router, the link-layer switch in link 2,and the destination host (computer B).
Each device is involved with a set of layersdepending on the role of the device in the internet.
The two hosts are involved in all fivelayers; the source host needs to create a message in the
application layer and send itdown the layers so that it is physically sent to the destination host.
The destination hostneeds to receive the communication at the physical layer and then deliver it
through theother layers to the application layer.
Figure Layers in the TCP/IP protocol suite
Figure Communication through an internet
The router is involved in only three layers; there is no transport or application layerin a router as
long as the router is used only for routing. Although a router is alwaysinvolved in one network
layer, it is involved in n combinations of link and physical layersin which n is the number of
links the router is connected to. The reason is that eachlink may use its own data-link or physical
protocol. For example, in the above figure, therouter is involved in three links, but the message
sent from source A to destination B isinvolved in two links. Each link may be using different
link-layer and physical-layerprotocols; the router needs to receive a packet from link 1 based on
one pair of protocolsand deliver it to link 2 based on another pair of protocols.
A link-layer switch in a link, however, is involved only in two layers, data-link andphysical.
Although each switch in the above figure has two different connections, theconnections are in
the same link, which uses only one set of protocols. This means that,unlike a router, a link-layer
switch is involved only in one data-link and one physicallayer.
1.5.2 Layers in the TCP/IP Protocol Suite
After the above introduction, we briefly discuss the functions and duties of layers inthe TCP/IP
protocol suite. Each layer is discussed in detail in the next five parts ofthe book. To better
understand the duties of each layer, we need to think about thelogical connections between
layers.
Using logical connections makes it easier for us to think about the duty of eachlayer. As the
figure shows, the duty of the application, transport, and network layers isend-to-end. However,
the duty of the data-link and physical layers is hop-to-hop, inwhich a hop is a host or router. In
other words, the domain of duty of the top threelayers is the internet, and the domain of duty of
the two lower layers is the link.
Another way of thinking of the logical connections is to think about the data unitcreated from
each layer. In the top three layers, the data unit (packets) should not bechanged by any router or
link-layer switch. In the bottom two layers, the packet createdby the host is changed only by the
routers, not by the link-layer switches.
Figure Logical connections between layers of the TCP/IP protocol suite
Data-link Layer
We have seen that an internet is made up of several links (LANs and WANs) connectedby
routers. There may be several overlapping sets of links that a datagram can travelfrom the host to
the destination. The routers are responsible for choosing the best links.However, when the next
link to travel is determined by the router, the data-link layer isresponsible for taking the datagram
and moving it across the link. The link can be awired LAN with a link-layer switch, a wireless
LAN, a wired WAN, or a wirelessWAN. We can also have different protocol used with any link
type. In each case, thedata-link layer is responsible for moving the packet through the
link.TCP/IP does not define any specific protocol for the data-link layer. It supports allthe
standard and proprietary protocols. Any protocol that can take the datagram andcarry it through
the link suffices for the network layer. The data-link layer takes a datagramand encapsulates it in
a packet called a frame.Each link-layer protocol may provide a different service. Some link-layer
protocolsprovide complete error detection and correction, some provide only error correction.
Network Layer
The network layer is responsible for creating a connection between the source computerand the
destination computer. The communication at the network layer is host-to-host.However, since
there can be several routers from the source to the destination, the routersin the path are
responsible for choosing the best route for each packet. We can say that thenetwork layer is
responsible for host-to-host communication and routing the packetthrough possible routes.
Again, we may ask ourselves why we need the network layer. Wecould have added the routing
duty to the transport layer and dropped this layer. One reason,as we said before, is the separation
of different tasks between different layers. The secondreason is that the routers do not need the
application and transport layers. Separating thetasks allows us to use fewer protocols on the
routers.
The network layer in the Internet includes the main protocol, Internet Protocol(IP), that defines
the format of the packet, called a datagram at the network layer. IPalso defines the format and
the structure of addresses used in this layer. IP is alsoresponsible for routing a packet from its
source to its destination, which is achieved byeach router forwarding the datagram to the next
router in its path.IP is a connectionless protocol that provides no flow control, no error control,
andno congestion control services. This means that if any of theses services is required foran
application, the application should rely only on the transport-layer protocol. The networklayer
also includes unicast (one-to-one) and multicast (one-to-many) routing protocols.A routing
protocol does not take part in routing (it is the responsibility of IP),but it creates forwarding
tables for routers to help them in the routing process.The network layer also has some auxiliary
protocols that help IP in its delivery androuting tasks. The Internet Control Message Protocol
(ICMP) helps IP to report someproblems when routing a packet. The Internet Group
Management Protocol (IGMP) isanother protocol that helps IP in multitasking. The Dynamic
Host Configuration Protocol(DHCP) helps IP to get the network-layer address for a host. The
Address ResolutionProtocol (ARP) is a protocol that helps IP to find the link-layer address of a
host ora router when its network-layer address is given.
Transport Layer
The logical connection at the transport layer is also end-to-end. The transport layer at thesource
host gets the message from the application layer, encapsulates it in a transportlayerpacket (called
a segment or a user datagram in different protocols) and sends it,through the logical (imaginary)
connection, to the transport layer at the destination host.In other words, the transport layer is
responsible for giving services to the applicationlayer: to get a message from an application
program running on the source host anddeliver it to the corresponding application program on
the destination host. We may askwhy we need an end-to-end transport layer when we already
have an end-to-end applicationlayer. The reason is the separation of tasks and duties, which we
discussed earlier.The transport layer should be independent of the application layer. In addition,
we willsee that we have more than one protocol in the transport layer, which means that
eachapplication program can use the protocol that best matches its requirement.
As we said, there are a few transport-layer protocols in the Internet, each designedfor some
specific task. The main protocol, Transmission Control Protocol (TCP), is aconnection-oriented
protocol that first establishes a logical connection between transportlayers at two hosts before
transferring data. It creates a logical pipe between twoTCPs for transferring a stream of bytes.
TCP provides flow control (matching the sendingdata rate of the source host with the receiving
data rate of the destination host toprevent overwhelming the destination), error control (to
guarantee that the segmentsarrive at the destination without error and resending the corrupted
ones), and congestioncontrol to reduce the loss of segments due to congestion in the network.
The othercommon protocol, User Datagram Protocol (UDP), is a connectionless protocol
thattransmits user datagrams without first creating a logical connection. In UDP, each user
datagram is an independent entity without being related to the previous or the next one(the
meaning of the term connectionless). UDP is a simple protocol that does not provideflow, error,
or congestion control. Its simplicity, which means small overhead, isattractive to an application
program that needs to send short messages and cannotafford the retransmission of the packets
involved in TCP, when a packet is corrupted orlost. A new protocol, Stream Control
Transmission Protocol (SCTP) is designed torespond to new applications that are emerging in
the multimedia.
Application Layer
As Figure 2.6 shows, the logical connection between the two application layers is endto-end. The
two application layers exchange messages between each other as thoughthere were a bridge
between the two layers. However, we should know that the communicationis done through all
the layers.Communication at the application layer is between two processes (two
programsrunning at this layer). To communicate, a process sends a request to the other
processand receives a response. Process-to-process communication is the duty of the
applicationlayer. The application layer in the Internet includes many predefined protocols, buta
user can also create a pair of processes to be run at the two hosts.
The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the WorldWide Web
(WWW). The Simple Mail Transfer Protocol (SMTP) is the main protocolused in electronic mail
(e-mail) service. The File Transfer Protocol (FTP) is used fortransferring files from one host to
another. The Terminal Network (TELNET) andSecure Shell (SSH) are used for accessing a site
remotely. The Simple Network ManagementProtocol (SNMP) is used by an administrator to
manage the Internet at globaland local levels. The Domain Name System (DNS) is used by other
protocols to findthe network-layer address of a computer. The Internet Group Management
Protocol(IGMP) is used to collect membership in a group.
1.5.4 Encapsulation and Decapsulation
One of the important concepts in protocol layering in the Internet is encapsulation/decapsulation.
We have not shown the layers for the link-layer switches because no
encapsulation/decapsulationoccurs in this device.
Encapsulation at the Source Host
At the source, we have only encapsulation.
1. At the application layer, the data to be exchanged is referred to as a message. Amessage
normally does not contain any header or trailer, but if it does, we refer tothe whole as the
message. The message is passed to the transport layer.
2. The transport layer takes the message as the payload, the load that the transportlayer should
take care of. It adds the transport layer header to the payload, whichcontains the identifiers of the
source and destination application programs thatwant to communicate plus some more
information that is needed for the end-toenddelivery of the message, such as information needed
for flow, error control, orcongestion control. The result is the transport-layer packet, which is
called the segment(in TCP) and the user datagram (in UDP). The transport layer then passes
thepacket to the network layer.
Figure Encapsulation/Decapsulation
3. The network layer takes the transport-layer packet as data or payload and adds itsown header
to the payload. The header contains the addresses of the source anddestination hosts and some
more information used for error checking of the header,fragmentation information, and so on.
The result is the network-layer packet,called a datagram. The network layer then passes the
packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or payload and adds itsown header,
which contains the link-layer addresses of the host or the next hop (therouter). The result is the
link-layer packet, which is called a frame. The frame ispassed to the physical layer for
transmission.
Decapsulation and Encapsulation at the Router
At the router, we have both decapsulation and encapsulation because the router is connectedto
two or more links.
1. After the set of bits are delivered to the data-link layer, this layer decapsulates thedatagram
from the frame and passes it to the network layer.
2. The network layer only inspects the source and destination addresses in the datagramheader
and consults its forwarding table to find the next hop to which the datagram is tobe delivered.
The contents of the datagram should not be changed by the network layerin the router unless
there is a need to fragment the datagram if it is too big to be passedthrough the next link. The
datagram is then passed to the data-link layer of the next link.
3. The data-link layer of the next link encapsulates the datagram in a frame andpasses it to the
physical layer for transmission.
Decapsulation at the Destination Host
At the destination host, each layer only decapsulates the packet received, removes thepayload,
and delivers the payload to the next-higher layer protocol until the messagereaches the
application layer. It is necessary to say that decapsulation in the hostinvolves error checking.
1.5.5 Addressing
It is worth mentioning another concept related to protocol layering in the Internet,addressing. As
we discussed before, we have logical communication between pairs oflayers in this model. Any
communication that involves two parties needs two addresses:source address and destination
address. Although it looks as if we need five pairs ofaddresses, one pair per layer, we normally
have only four because the physical layer doesnot need addresses; the unit of data exchange at
the physical layer is a bit, which definitelycannot have an address. Figure shows the addressing
at each layer.As the figure shows, there is a relationship between the layer, the address used
inthat layer, and the packet name at that layer. At the application layer, we normally usenames to
define the site that provides services, such as someorg.com, or the e-mailaddress, such as
[email protected]. At the transport layer, addresses are calledport numbers, and these
define the application-layer programs at the source anddestination. Port numbers are local
addresses that distinguish between several programsrunning at the same time. At the network-
layer, the addresses are global, with the wholeInternet as the scope. A network-layer address
uniquely defines the connection of adevice to the Internet. The link-layer addresses, sometimes
called MAC addresses, arelocally defined addresses, each of which defines a specific host or
router in a network(LAN or WAN). We will come back to these addresses in future chapters.
By twisting the pairs, a balance is maintained. For example, suppose in one twist, onewire is
closer to the noise source and the other is farther; in the next twist, the reverse istrue. Twisting
makes it probable that both wires are equally affected by external influences(noise or crosstalk).
This means that the receiver, which calculates the differencebetween the two, receives no
unwanted signals. The unwanted signals are mostly canceledout. From the above discussion, it is
clear that the number of twists per unit oflength (e.g., inch) has some effect on the quality of the
cable.
Unshielded Versus Shielded Twisted-Pair Cable
The most common twisted-pair cable used in communications is referred to asunshielded
twisted-pair (UTP). IBM has also produced a version of twisted-pair cablefor its use, called
shielded twisted-pair (STP). STP cable has a metal foil or braidedmeshcovering that encases
each pair of insulated conductors. Although metal casingimproves the quality of cable by
preventing the penetration of noise or crosstalk, it isbulkier and more expensive.
Categories
The Electronic Industries Association (EIA) has developed standards to classifyunshielded
twisted-pair cable into seven categories. Categories are determined by cablequality, with 1 as the
lowest and 7 as the highest. Each EIA category is suitable forspecific uses. Table 7.1 shows these
categories.
Figure UTP and STP cables
Connectors
The most common UTP connector is RJ45 (RJ stands for registered jack), as shownin Figure.
The RJ45 is a keyed connector, meaning the connector can be inserted inonly one way.
Performance
One way to measure the performance of twisted-pair cable is to compare attenuationversus
frequency and distance. A twisted-pair cable can pass a wide range of frequencies.However,
Figure 7.6 shows that with increasing frequency, the attenuation, measured indecibels per
kilometer (dB/km), sharply increases with frequencies above 100 kHz. Notethat gauge is a
measure of the thickness of the wire.
Applications
Twisted-pair cables are used in telephone lines to provide voice and data channels.The local
loop—the line that connects subscribers to the central telephone office—commonly consists of
unshielded twisted-pair cables. The DSL lines that are used by the telephone companies to
provide high-data-rateconnections also use the high-bandwidth capability of unshielded twisted-
pair cables.
1.8.1.2 Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twistedpaircable,
in part because the two media are constructed quite differently. Instead ofhaving two wires, coax
has a central core conductor of solid or stranded wire (usuallycopper) enclosed in an insulating
sheath, which is, in turn, encased in an outer conductorof metal foil, braid, or a combination of
the two. The outer metallic wrapping servesboth as a shield against noise and as the second
conductor, which completes the circuit.This outer conductor is also enclosed in an insulating
sheath, and the whole cable isprotected by a plastic cover.
Optical fibers use reflection to guide light through a channel. A glass or plastic coreis
surrounded by a cladding of less dense glass or plastic. The difference in density of thetwo
materials must be such that a beam of light moving through the core is reflected offthe cladding
instead of being refracted into it.
Propagation Modes
Current technology supports two modes (multimode and single mode) for propagating lightalong
optical channels, each requiring fiber with different physical characteristics. Multimodecan be
implemented in two forms: step-index or graded-index.
Multimode
Multimode is so named because multiple beams from a light source move through thecore in
different paths. How these beams move within the cable depends on the structureof the core.
Figure Propagation modes
In multimode step-index fiber, the density of the core remains constant from thecenter to the
edges. A beam of light moves through this constant density in a straightline until it reaches the
interface of the core and the cladding. At the interface, there isan abrupt change due to a lower
density; this alters the angle of the beam’s motion. Theterm step-index refers to the suddenness
of this change, which contributes to the distortionof the signal as it passes through the fiber.
Figure 7.13 Modes
A second type of fiber, called multimode graded-index fiber, decreases this distortionof the
signal through the cable. The word index here refers to the index ofrefraction. As we saw above,
the index of refraction is related to density. A gradedindexfiber, therefore, is one with varying
densities. Density is highest at the center ofthe core and decreases gradually to its lowest at the
edge. Figure 7.13 shows the impactof this variable density on the propagation of light beams.
Single-Mode
Single-mode uses step-index fiber and a highly focused source of light that limitsbeams to a
small range of angles, all close to the horizontal. The single-mode fiberitself is manufactured
with a much smaller diameter than that of multimode fiber, andwith substantially lowers density
(index of refraction). The decrease in density results ina critical angle that is close enough to 90°
to make the propagation of beams almosthorizontal. In this case, propagation of different beams
is almost identical, and delaysare negligible. All the beams arrive at the destination “together”
and can be recombinedwith little distortion to the signal.
Fiber Sizes
Optical fibers are defined by the ratio of the diameter of their core to the diameter oftheir
cladding, both expressed in micrometers.
Fiber-Optic Cable Connectors
There are three types of connectors for fiber-optic cables. Thesubscriber channel (SC)
connector is used for cable TV. It uses a push/pull lockingsystem. The straight-tip (ST)
connector is used for connecting cable to networkingdevices. It uses a bayonet locking system
and is more reliable than SC. MT-RJ is aconnector that is the same size as RJ45.
Performance
The plot of attenuation versus wavelength in Figure 7.16 shows a very interestingphenomenon in
fiber-optic cable. Attenuation is flatter than in the case of twisted-paircable and coaxial cable.
The performance is such that we need fewer (actually onetenthas many) repeaters when we use
fiber-optic cable.
Applications
Fiber-optic cable is often found in backbone networks because its wide bandwidth iscost-
effective. Today, with wavelength-division multiplexing (WDM), we can transferdata at a rate of
1600 Gbps. The SONET network that we discuss in Chapter 14 providessuch a backbone.
Some cable TV companies use a combination of optical fiber and coaxial cable,thus creating a
hybrid network. Optical fiber provides the backbone structure whilecoaxial cable provides the
connection to the user premises. This is a cost-effective configurationsince the narrow bandwidth
requirement at the user end does not justify theuse of optical fiber.
Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-Xalso use
fiber-optic cable.
Advantages and Disadvantages of Optical Fiber
Advantages
Fiber-optic cable has several advantages over metallic cable (twisted-pair or coaxial).
❑Higher bandwidth. Fiber-optic cable can support dramatically higher bandwidths(and hence
data rates) than either twisted-pair or coaxial cable. Currently, data ratesand bandwidth
utilization over fiber-optic cable are limited not by the medium butby the signal generation and
reception technology available.
❑Less signal attenuation. Fiber-optic transmission distance is significantly greaterthan that of
other guided media. A signal can run for 50 km without requiringregeneration. We need
repeaters every 5 km for coaxial or twisted-pair cable.
❑Immunity to electromagnetic interference.Electromagnetic noise cannot affectfiber-optic
cables.
❑Resistance to corrosive materials.Glass is more resistant to corrosive materialsthan copper.
❑Light weight.Fiber-optic cables are much lighter than copper cables.
❑Greater immunity to tapping.Fiber-optic cables are more immune to tapping thancopper
cables. Copper cables create antenna effects that can easily be tapped.
Disadvantages
There are some disadvantages in the use of optical fiber.
❑Installation and maintenance.Fiber-optic cable is a relatively new technology. Itsinstallation
and maintenance require expertise that is not yet available everywhere.
❑Unidirectional light propagation.Propagation of light is unidirectional. If weneed
bidirectional communication, two fibers are needed.
❑Cost.The cable and the interfaces are relatively more expensive than those of otherguided
media. If the demand for bandwidth is not high, often the use of optical fibercannot be justified.
1.8.2.2 Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves.Microwaves are unidirectional. When an antenna transmits microwaves, theycan be
narrowly focused. This means that the sending and receiving antennas need tobe aligned. The
unidirectional property has an obvious advantage. A pair of antennascan be aligned without
interfering with another pair of aligned antennas. The followingdescribes some characteristics of
microwave propagation:
❑ Microwave propagation is line-of-sight. Since the towers with the mounted antennasneed to
be in direct sight of each other, towers that are far apart need to be very tall.The curvature of the
earth as well as other blocking obstacles do not allow two shorttowers to communicate by using
microwaves. Repeaters are often needed for longdistancecommunication.
❑ Very high-frequency microwaves cannot penetrate walls. This characteristic can bea
disadvantage if receivers are inside buildings.
❑The microwave band is relatively wide, almost 299 GHz. Therefore wider subbandscan be
assigned, and a high data rate is possible.
❑ Use of certain portions of the band requires permission from authorities.
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction. Twotypes of
antennas are used for microwave communications: the parabolic dish and the horn.
Radio waves are used for multicast communications,such as radio and television, and
paging systems.
A parabolic dish antenna is based on the geometry of a parabola: Every lineparallel to the line
of symmetry (line of sight) reflects off the curve at angles such thatall the lines intersect in a
common point called the focus. The parabolic dish works as afunnel, catching a wide range of
waves and directing them to a common point. Inthis way, more of the signal is recovered than
would be possible with a single-pointreceiver.
Outgoing transmissions are broadcast through a horn aimed at the dish. The microwaveshit the
dish and are deflected outward in a reversal of the receipt path.A horn antenna looks like a
gigantic scoop. Outgoing transmissions are broadcastup a stem (resembling a handle) and
deflected outward in a series of narrow parallelbeams by the curved head. Received
transmissions are collected by the scooped shape ofthe horn, in a manner similar to the parabolic
dish, and are deflected down into the stem.
Applications
Microwaves, due to their unidirectional properties, are very useful when unicast (oneto-one)
communication is needed between the sender and the receiver. They are used in cellular phones,
satellite networks, and wireless LANs.
1.8.2.3 Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mmto 770
nm), can be used for short-range communication. Infrared waves, having highfrequencies, cannot
penetrate walls. This advantageous characteristic prevents interferencebetween one system and
another; a short-range communication system in oneroom cannot be affected by another system
in the next room. When we use our infraredremote control, we do not interfere with the use of
the remote by our neighbors. However,this same characteristic makes infrared signals useless for
long-range communication.In addition, we cannot use infrared waves outside a building because
the sun’srays contain infrared waves that can interfere with the communication.
Applications
The infrared band, almost 400 THz, has an excellent potential for data transmission.Such a wide
bandwidth can be used to transmit digital data with a very high data rate.The Infrared Data
Association (IrDA), an association for sponsoring the use of infraredwaves, has established
standards for using these signals for communication betweendevices such as keyboards, mice,
PCs, and printers. For example, some manufacturersprovide a special port called the IrDA port
that allows a wireless keyboard to communicate with a PC. The standard originally defined a
data rate of 75 kbps for a distance up to8 m. The recent standard defines a data rate of 4 Mbps.
1.9 SWITCHING:
A network is a set of connected devices. Whenever we have multiple devices, we havethe
problem of how to connect them to make one-to-one communication possible. Onesolution is to
make a point-to-point connection between each pair of devices (a meshtopology) or between a
central device and every other device (a star topology). Thesemethods, however, are impractical
and wasteful when applied to very large networks.The number and length of the links require too
much infrastructure to be cost-efficient,and the majority of those links would be idle most of the
time. Other topologiesemploying multipoint connections, such as a bus, are ruled out because the
distancesbetween devices and the total number of devices increase beyond the capacities of
themedia and equipment.
A better solution is switching. A switched network consists of a series of interlinkednodes, called
switches. Switches are devices capable of creating temporary connectionsbetween two or more
devices linked to the switch. In a switched network, some of thesenodes are connected to the end
systems (computers or telephones, for example). Othersare used only for routing.
The end systems (communicating devices) are labeled A, B, C, D, and so on, and theswitches
are labeled I, II, III, IV, and V. Each switch is connected to multiple links.
Three Phases
The actual communication in a circuit-switched network requires three phases: connectionsetup,
data transfer, and connection teardown.
Setup Phase
Before the two parties (or multiple parties in a conference call) can communicate, adedicated
circuit (combination of channels in links) needs to be established. The end systemsare normally
connected through dedicated lines to the switches, so connection setupmeans creating dedicated
channels between the switches. For example, in Figure,when system A needs to connect to
system M, it sends a setup request that includes theaddress of system M, to switch I. Switch I
finds a channel between itself and switch IVthat can be dedicated for this purpose. Switch I then
sends the request to switch IV,which finds a dedicated channel between itself and switch III.
Switch III informs systemM of system A’s intention at this time.
In the next step to making a connection, an acknowledgment from system M needsto be sent in
the opposite direction to system A. Only after system A receives thisacknowledgment is the
connection established.Note that end-to-end addressing is required for creating a connection
between thetwo end systems. These can be, for example, the addresses of the computers
assignedby the administrator in a TDM network, or telephone numbers in an FDM network.
Data-Transfer Phase
After the establishment of the dedicated circuit (channels), the two parties can transfer data.
Teardown Phase
When one of the parties needs to disconnect, a signal is sent to each switch to releasethe
resources.
Efficiency
It can be argued that circuit-switched networks are not as efficient as the other twotypes of
networks because resources are allocated during the entire duration of the connection.These
resources are unavailable to other connections.
Delay
Although a circuit-switched network normally has low efficiency, the delay in this typeof
network is minimal. During data transfer the data are not delayed at each switch; theresources are
allocated for the duration of the connection.
All four packets (or datagrams) belong to the same message, butmay travel different paths to
reach their destination. This is so because the links may beinvolved in carrying packets from
other sources and do not have the necessary bandwidthavailable to carry all the packets from A
to X. This approach can cause the datagrams ofa transmission to arrive at their destination out of
order with different delays between thepackets. Packets may also be lost or dropped because of a
lack of resources. In mostprotocols, it is the responsibility of an upper-layer protocol to reorder
the datagrams orask for lost datagrams before passing them on to the application.
The datagram networks are sometimes referred to as connectionless networks. Theterm
connectionless here means that the switch (packet switch) does not keep informationabout the
connection state. There are no setup or teardown phases. Each packet is treatedthe same by a
switch regardless of its source or destination.
Routing Table
If there are no setup or teardown phases, how are the packets routed to their destinationsin a
datagram network? In this type of network, each switch (or packet switch) has a routingtable
which is based on the destination address. The routing tables are dynamic andare updated
periodically. The destination addresses and the corresponding forwardingoutput ports are
recorded in the tables. This is different from the table of a circuitswitchednetwork (discussed
later) in which each entry is created when the setup phaseis completed and deleted when the
teardown phase is over.Switch in a datagram network uses a routing table that is based on the
destinationaddress.
Destination Address
The destination address in the header of a packet in a datagram networkremains the same during
the entire journey of the packet.Every packet in a datagram network carries a header that
contains, among other information,the destination address of the packet. When the switch
receives the packet,this destination address is examined; the routing table is consulted to find the
correspondingport through which the packet should be forwarded. This address, unlike
theaddress in a virtual-circuit network, remains the same during the entire journey of thepacket.
Efficiency
The efficiency of a datagram network is better than that of a circuit-switched network;resources
are allocated only when there are packets to be transferred. If asource sends a packet and there is
a delay of a few minutes before another packet canbe sent, the resources can be reallocated
during these minutes for other packets fromother sources.
Delay
There may be greater delay in a datagram network than in a virtual-circuit network.Although
there are no setup and teardown phases, each packet may experience a wait at aswitch before it is
forwarded. In addition, since not all packets in a message necessarilytravel through the same
switches, the delay is not uniform for the packets of a message.