Datacom Notes
Datacom Notes
A computer network can be defined as a collection of interconnected nodes. A node can be any
device capable of transmitting or receiving data. The communicating nodes are connected by
communication links.
A Compute network should ensure reliability of the data communication process, security of
the data and performance by achieving higher throughput and smaller delay times.
PURPOSE OF NETWORKING
Some of the reasons for setting up computer networks include:
1). Resource sharing
A Network resource refers to any component that can be attached to the network for access by
users.
Some of the shared resources include:
i). Application programs. vii).Network Printers
ii). Data and information. viii). Fax machines
iii). Modems ix) Storage devices (optical drives).
iv). Graphics.
v). Communication ports.
vi). Computer processing power.
Users whose computers are connected to a network can, for example, share their files,
exchangemails, send faxes, schedule meetings, and print documents from any point on the
network. This centralized access to data & information leads to less waste of time, and
hence greater productivity.
For example;
In a large organization, each branch office has its own server that stores data, information, and
other resources required for their daily operations.
This implies that, files reside on the user’s computer rather than on a central computer, and are
only transmitted periodically to update the central computer.
5). Reliability
A computer network is reliable especially when communicating or accessing information:
i). Data can be transferred with minimum errors from source to destination.
ii). Incase one computer breaks down; the user can still access data & information from the other
computers using another computer on the network.
4). Spread of terrorism and drug trafficking-The Internet makes it easy for terrorists and drug
traffickers to operate. This is because; they use information networks for their business
communications.
5). Over-reliance on networks-Most organizations have done away with manual operations.
This means that, all business processes, and the society depend on computer networks.
Therefore, if by any chance the network fails or goes down, then many systems in the society
will stop working.
CATEGORIES OF NETWORKS
1. Peer-to-Peer network.
A Peer is a computer that acts both as the client and a server.
In this network, all the connected computers are equal & each machine acts as both client and
Server. This means that, there is no central storage area for information & no dedicated central
Server.
No system administrator. Therefore, the user of each computer determines what data &
resources the computer will shares with other computers on the network.
Peer-to-peer networks are appropriate in an environment where:
i. There are 10 or less users.
ii. The users are located in a general area.
iii. Security is not an issue, e.g. in Bulletin boards.
2. Server-basednetworks.
In this network, there is usually a Server, e.g. a company which is dedicated to handle files
and/or information for clients, make & service requests from network clients, and ensure
security of files and directories for them.
Server-based networks require a network operating system.
Advantages of Server based networks.
(i). There is security since the Server controls the resources the clients need to access.
(ii). It can support a large number of users.
(iii). The server can be optimized to hand out information as fast as possible.
(iv). Fewer connections are required by the clients to get the resources.
(v). Easier to maintain backup for files (synchronization of files).
(vi). Cost effective as client workstations don’t need large hard disk (storage capacity).
D) BRIDGES
Bridges are used to connect similar network segments. A bridge does not pass or signals it
receives. When a bridge receive a signal, it determines its destination by looking at its
destination and it sends the signals towards it. For example in a above figure a bridge has been
used to join two network segments A AND B. When the bridge receives the signals it read
address of both sender and receiver. If the sender is a computer in segment A and the receiver
is also segment A, it would not pass the signals to the segments B. It will however pass signals if
the sender is in one segment and the receiver in other segment. Bridge works at the data link
layer of O.S.I model.
Advantages of Bridges
· Bridge extends network segments by connecting them together to make one logical network.
· They can affect the segment traffic between networks by filtering data if it does not need to
pass.
· Like repeaters they can connect similar network types with different cabling.
Disadvantages of Bridges
· Bridge possess information about the data they receive which can slow performance.
E) HUB
Hubs are basically multi ports repeaters for U.T.P cables. Some hubs have ports for other type of
cable such as coaxial cable. Hubs range in size from four ports up to and for specific to the
network types. These are some hubs which are
I. Passive Hub
II. Active Hub
III. Switch/ Intelligent Hub
I Passive Hub
It provides no signal regeneration. They are simply cables connected together so that the signal is
broken out to other nodes without regeneration. These are not used often today because of loss
of cable length that is allowed.
II Active Hub
It acts as repeaters and regenerates the data signals to all ports. They have no real intelligence to
tell weather the signal needs to go to all ports that is blindly repeated.
III Switch Hub
Switches are multi ports bridges. They filter traffic between the ports on the switch by using the
address of computers transmitting to them.
Switches can be used when data performance is needed or when collision need to be reduce.
Advantages of Hub
· Hubs need almost no configuration.
· Active hub can extend maximum network media distance. No processing is done at the hub to
slow down performance
Disadvantages of Hub
· Passive hubs can greatly limit maximum media distance.
· Hubs have no intelligence to filter traffic so all data is send out on all ports whether it is need or
not.
Since hubs can act as repeaters the network using them must follow the same rules as repeaters
F) MODEM
The device that converts digital signals into analog signals and analog signals to digital
signals is called Modem.
The word modem stands for modulation and demodulation. The process of converting
digital signals to analog signals is called modulation. The process of converting analog
signals to digital signals is called demodulation.
Modems are used with computers to transfer data from one computer to another computer
through telephone lines.
Modems have two connections these are.
I Analog connection
II Digital connection
Analog connection.
The connection between the modem and the telephone line is called analog connection.
Types of Modem
THERE ARE TWO TYPES OF MODEMS
· Internal modem
· External modem
Digital connection.
The connection of modem to computer is called digital connection
INTERNAL MODEM
It fits into expansion slots inside the computer. It is directly linked to the telephone lines through
the telephone jack. It is normally less inexpensive than external modem. Its transmission speed
is also less external modem.
EXTERNAL MODEM
It is the external unit of computer and is connected to the computer through serial port. It is also
linked to the telephone line through a telephone jack. External modems are expensive and have
more operation features and high transmission speed.
Advantages of Modem
· Inexpensive hardware and telephone lines.
· Easy to setup and maintain.
Disadvantages of Modem
Very slow performance.
NETWORK TOPOLOGIES
A topology defines the arrangement of nodes, cables, and connectivity devices that make up the
network as well as how the data is passed from the source to destination.
it can also be defined as the way in which computers in a network are linked together. It
determines the data paths that may be used between any two communicating computers in a
network.
It can be categorised into:
i. Physical topology-it defines the arrangement of the network nodes and transmission links
ii. Logical topology-it defines how the data is passed from source to destination through the
intermediate devices and links.
Types of network topologies
There are four principal network topologies:
a) Star
b) Bus
c) Ring
d) Hierarchical (hybrid)
e) Completely connected (mesh)
Star network
In a star network there are a number of small computers or peripheral devices linked to a central
unit called a main hub. The central unit may be a host computer or a file server. All
communications pass through the central unit and control is maintained by polling. This type of
network can be used to provide a time-sharing system and is common for linking
microcomputers to a mainframe.
Advantages:
It is easy to add new and remove nodes
A node failure does not bring down the entire network
It is easier to diagnose network problems through a central hub
Disadvantages:
If the central hub fails the whole network ceases to function
It costs more to cable a star configuration than other topologies (more cable is required
than for a bus or ring configuration).
Node
Bus network
In a bus network each device handles its communications control. There is no host computer;
however there may be a file server. All communications travel along a common connecting cable
called a bus. It is a common arrangement for sharing data stored on different microcomputers. It
is not as efficient as star network for sharing common resources, but is less expensive. The
distinguishing feature is that all devices (nodes) are linked along one communication line - with
endpoints - called the bus or backbone.
Advantages:
Reliable in very small networks as well as easy to use and understand
Requires the least amount of cable to connect the computers together and therefore is
less expensive than other cabling arrangements.
Is easy to extend. Two cables can be easily joined with a connector, making a longer
cable for more computers to join the network
A repeater can also be used to extend a bus configuration
Disadvantages:
Heavy network traffic can also slow a bus considerably. Because any computer can
transmit at any time, bus networks do not coordinate when information is sent.
Computers interrupting each other can use a lot of bandwidth
Each connection between two cables weakens the electrical signal
The bus configuration can be difficult to troubleshoot. A cable break or malfunctioning
computer can be difficult to find and can cause the whole network to stop functioning.
Ring network
In a ring network each device is connected to two other devices, forming a ring. There is no central
file server or computer. Messages are passed around the ring until they reach their destination.
Often used to link mainframes, especially over wide geographical areas. It is useful in a
decentralized organization called a distributed data processing system.
Advantages:
Ring networks offer high performance for a small number of workstations or for larger
networks where each station has a similar work load
Ring networks can span longer distances than other types of networks
Ring networks are easily extendable
Disadvantages
Relatively expensive and difficult to install
Failure of one component on the network can affect the whole network
It is difficult to troubleshoot a ring network
Adding or removing computers can disrupt the network
Advantages:
Improves sharing of data and programs across the network
Offers reliable communication between nodes
Disadvantages:
Difficult and costly to install and maintain
Difficult to troubleshoot network problems
Advantages:
Yields the greatest amount of redundancy (multiple connections between same nodes) in
the event that one of the nodes fail where network traffic can be redirected to another
node.
Network problems are easier to diagnose
Disadvantages
The cost of installation and maintenance is high (more cable is required than any other
configuration)
1.0 BUS TOPOLOGIES
A bus physical topology is one in which all devices connect to a common, shared cable (called
the backbone).
Bus networks broadcast signals in both directions on the backbone cable, enabling all devices
to directly receive the signal.
ADVANTAGES
i. It is very reliable since any line break down only affects the connected computers
ii. Computer to computer communication is very fast
iii. Transmission may take different routes between any two communicating stations.
iv. Easy to expand the network since computers/nodes are connected to the backborn.
DIS-ADVANTAGES
i. It is expensive because of many transmission channels or links required as compared to
wireless transmission.
ii. In case several devices are transmiting at the same time it can lead to traffic collision hence the
data is corrupt.
iii. Incase of backborn failure no communication, the whole channel breaks.
2.0 RING TOPOLOGIES
Ring topologies are wired in a circle. Each node is connected to its neighbors on either side, and
data passes around the ring in one direction only.
Ring topologies are ideally suited for token-passing access methods.
The token passes around the ring, and only the node that holds the token can transmit data.
The token has sender address as well as destination address.
ADVANTAGES
i. It is more reliable since a breakdown of one computer does not affect others in the network
ii. Processing task is distributed to local computer stations thus not reliant to host computer
iii. If one line between any two computers breaks down alternate routing is possible
DIS-ADVANTAGES
(i) There is communication delay which is directly proportional to the number of computers in
network
(ii) There is duplication of resources at various stations of the network
(iii) High data security is needed.
DIS-ADVANTAGES
(i) If the central host computer fails, the entire network is affected.
(ii) All computers must be functioning for the network to work.
(iii) It is expensive to set due to the number of terminals needed.
(iv) Not easy to expand the network.
(v) Communication is slow due to high network traffic.
ADVANTAGES
(i) Breakdown of one station does not affect the entire network
(ii) It is easy to add new stations
(iii) Number of the physical links are reduced
DIS-ADVANTAGES
(i) Each computer in the network must have a good decision making capability
(ii) If the shared transmission channel breaks down the entire network fails
1. Point-to-point topology,
2. Bus (point-to-multipoint) topology,
3. Ring topology,
4. Star topology,
5. Hybrid topology,
6. Mesh topology and
7. Tree topology.
The interconnections between computers whether logical or physical are the foundation of this
classification.
Logical topology is the way a computer in a given networktransmits information, not the way it
looks or connected, along with the varying speeds of cables used from one network to another.
On the other hand the physical topology is affected by a number of factors:
Troubleshooting technique,
Installation cost,
Office layout and
Cables‘types.
The physical topology is figured out on the basis of a
network‘s capability to access media a tolerance desired and the cost of telecommunications
circuits.
The classification of networks by the virtue of their physical span is as follows: Local Area
Networks (LAN), Wide Area Internetworks (WAN) and Metropolitan Area Networks or campus
or building internetworks.
Hybrid Topology
The top level of the hierarchy, the central root node is connected to some
nodes that are a level low in the hierarchy by a point-to-point link where
the second level nodes that are already connected to central root would
be connected to the nodes in the third level by a point-to-point link. The
central root would be the only node having no higher node in the
hierarchy. The tree hierarchy is symmetrical. The BRANCHING FACTOR
is the fixed number of nodes connected to the next level in the hierarchy.
Such network must have at least three levels. Physical Linear Tree
Topology would be of a network whose Branching Factor is one.
132
If the backbone line breaks, the entire segment goes down. More difficult to
configure and wire than other topologies.
Cost
Often the fastest and most robust transmission media is desired, but a network designer must often
settle for something that is slower and less robust, because it more than suffices for the business
solution at hand. The major deciding factor is almost always price. As with nearly everything else in
the computer field, the fastest technology is the newest, and the newest is the most expensive. Over
time, economies of scale bring the price down, but by then, a newer technology comes along.
Installation Requirements
Installation requirements typically involve two factors. One is that some transmission media require
skilled labor to install. The second has to do with the actual physical layout of the network. Some
types of transmission media install more easily over areas where people are spread out, whereas
other transmission media are easier to bring to clusters of people or a roaming user.
Bandwidth
The term bandwidth refers to the measure of the capacity of a medium to transmit data. A medium that
has a high capacity, for example, has a high bandwidth, whereas a medium that has limited capacity
has a low bandwidth.
Data transmission rates are frequently stated in terms of the bits that can be transmitted per second. An
Ethernet LAN theoretically can transmit 10 million bits per second and has a bandwidth of 10
megabits per second (Mbps). The bandwidth that a cable can accommodate is determined in part by
the cable’s length. A short cable generally can accommodate greater bandwidth than a long cable,
which is one reason all cable designs specify maximum lengths for cable runs. Beyond those limits,
the highest-frequency signals can deteriorate, and errors begin to occur in data signals. You can see
this by taking a garden hose and snapping it up and down. You can see the waves traveling down the
hose get smaller as they get farther from your hand. This loss of the wave’s amplitude represents
attenuation, or signal degradation. Band Usage (Baseband or Broadband)
The two ways to allocate the capacity of transmission media are with baseband and broadband
transmissions. Baseband devotes the entire capacity of the medium to one communication channel.
Broadband enables two or more communication channels to share the bandwidth of the
communications medium.
Baseband is the most common mode of operation. Most LANs function in baseband mode, for example.
Baseband signaling can be accomplished with both analog and digital signals.
Multiplexing
Multiplexing is a technique that enables broadband media to support multiple data channels.
Attenuation
Attenuation is a measure of how much a signal weakens as it travels through a medium.
Attenuation is a contributing factor to why cable designs must specify limits in the lengths of
cable runs. When signal strength falls below certain limits, the electronic equipment that
receives the signal can experience difficulty isolating the original signal from the noise present
in all electronic transmissions.
Electromagnetic Interference
Electromagnetic interference (EMI) consists of outside electromagnetic noise that distorts the
signal in a medium. When you listen to an AM radio, for example, you often hear EMI in the
form of noise caused by nearby motors or lightning. Some network media are more
susceptible to EMI than others.
Crosstalk is a special kind of interference caused by adjacent wires. Crosstalk occurs when the
signal from one wire is picked up by another wire. You may have experienced this when
talking on a telephone and hearing another conversation going on in the background.
Crosstalk is a particularly significant problem with computer networks because large
numbers of cables often are located close together, with minimal attention to exact placement.
CABLE MEDIA
Coaxial Cable
Coaxial cables were the first cable types used in LANs. Coaxial cable gets its name because two
conductors share a common axis; the cable is most frequently referred to as a “coax.” A type of
coaxial cable that you may be familiar with is your television cable. The components of a
coaxial cable are as follows:
. A center conductor, although usually solid copper wire, is sometimes made of stranded wire.
. An outer conductor forms a tube surrounding the center conductor. This conductor can consist of
braided wires, metallic foil, or both. The outer conductor, frequently called the shield, serves
as a ground and also protects the inner conductor from EMI.
. An insulation layer keeps the outer conductor spaced evenly from the inner conductor.
. A plastic encasement (jacket) protects the cable from damage.
Types of Coaxial Cable.
Thinnet
Thinnet is a light and flexible cabling medium that is inexpensive and easy to install.
Thicknet
Thicknet is thicker than Thinnet. Thicknet coaxial cable is approximately 0.5 inches (13 mm) in
diameter. Because it is thicker and does not bend as readily as Thinnet, Thicknet cable is
harder to work with. A thicker center core, however, means that Thicknet can carry more
signals a longer distance than Thinnet. Thicknet can transmit a signal approximately 500
meters (1,650 feet).
Thicknet can be used to connect two or more small Thinnet LANs into a larger network.
Because of its greater size, Thicknet is also more expensive than Thinnet. However, Thicknet can
be installed relatively safely outside, running from building to building.
Twisted-Pair Cable
Twisted-pair cable is inexpensive to install and offers the lowest cost per foot of any cable type.
Your telephone cable is an example of a twisted-pair type cable. A basic twisted-pair cable
consists of two strands of copper wire twisted together. The twisting reduces the sensitivity of
the cable to EMI and also reduces the tendency of the cable to radiate radio frequency noise
that interferes with nearby cables and electronic components, because the radiated signals
from the twisted wires tend to cancel each other out.
Fiber-Optic Cable
Fiber-optic cable is the ideal cable for data transmission. Not only does this type of cable
accommodate extremely high bandwidths, but it also presents no problems with EMI and
supports durable cables and cable runs as long as several kilometers. The two disadvantages
of fiber-optic cable, however, are cost and installation difficulty. Despite these disadvantages,
fiber-optic cable is now often installed into buildings by telephone companies as the cable of
choice.
The center conductor of a fiber-optic cable is a fiber that consists of highly refined glass or plastic
designed to transmit light signals with little loss. A glass core supports a longer cabling
distance, but a plastic core is typically easier to work with. The fiber is coated with a cladding
or a gel that reflects signals back into the fiber to reduce signal loss. A plastic sheath protects
the fiber. A fiber-optic network cable consists of two strands separately enclosed in plastic
sheaths. One strand sends and the other receives. Two types of cable configurations are
available: loose and tight configurations. Loose configurations incorporate a space between
the fiber sheath and the outer plastic encasement; this space is filled with a gel or other
material. Tight configurations contain strength wires between the conductor and the outer
plastic encasement.
Fiber-optic cable can support high data rates (as high as 200,000Mbps) even with long cable runs.
Although UTP cable runs are limited to less than 100 meters with 100Mbps data rates, fiber
optic cables can transmit 100Mbps signals for several kilometers.
1. Ground-wave propagation
2. Sky-wave propagation
Characteristics of Sky Propagation are as follows:
i. Signal reflected from ionized layer of atmosphere back down to earth
ii. Signal can travel a number of hops, back and forth between ionosphere and earth‘s surface
iii. Reflection effect caused by refraction
iv. Examples
a. Amateur radio
b. CB radio
3. Line-of-sight propagation
2. Microwaves:
• Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
• Microwaves are unidirectional; when an antenna transmits microwaves they can be narrowly
focused. This means that the sending and receiving antennas need to be aligned. The
unidirectional property has an obvious advantage. A pair of antennas can be aligned without
interfering with another pair of aligned antennas.
• Microwaves propagation is line-of-sight. Since the towers with the mounted antennas needs
to be in direct sight of each other, towers that are far apart need to be very tall, the curvature
of the earth as well as other blocking obstacles do not allow two short towers to communicate
using microwaves, Repeaters are often needed for long distance communication very high
frequency microwaves cannot penetrate walls.
• Parabolic dish antenna and horn antenna are used for this means of transmission
3.Infrared
• Infrared signals with frequencies ranges from 300 GHz to 400 GHz can be used for short range
communication.
• Infrared signals, having high frequencies, cannot penetrate walls. This helps to prevent
interference between one system and another. Infrared Transmission in one room cannot be
affected by the infrared transmission in another room.
• Infrared band, has an excellent potential for data transmission. Transfer digital data is
possible with a high speed with a very high frequency. There are number of computer devices
which are used to send the data through infrared medium e.g. keyboard mice, PCs and
printers. There are some manufacturers provide a special part called the IrDA port that allows
a wireless keyboard to communicate with a PC.
Multiplexing
Multiplexing is a technique to mix and send multiple data streams over a single medium.
This technique requires system hardware called multiplexer (MUX) for multiplexing the
streams and sending them on a medium, and de-multiplexer (DMUX) which takes information
from the medium and distributes to different destinations.
When multiple senders try to send over a single medium, a device a Multiplexer divides the
physical channel and allocates one to each.
On the other end of communication, a De-multiplexer receives data from a single medium,
identifies each, and sends to different receivers.
Types of multiplexing.
TDM is applied primarily on digital signals but can be applied on analog signals as well.
In TDM the shared channel is divided among its user by means of time slot.
Each user can transmit data within the provided time slot only.
Digital signals are divided in frames, equivalent to time slot i.e. frame of an optimal size which
can be transmitted in given time slot.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-multiplexer are timely
synchronized, and both switch to next channel simultaneously.
When channel A transmits its frame at one end, the De-multiplexer provides mediato channel
A on the other end.
As soon as the channel A’s time,this slotside ex switches to channel B. On the other end, the
De-multiplexer works in a synchronizedmanner and provides media to channel B.
Signals from different channels travel the path in interleaved manner.
Multiple data signals can be transmitted over a single frequency by using Code Division
Multiplexing.
FDM divides the frequency in smaller channels but CDM allows its users to full bandwidth and
transmit signals all the time using a unique code.
CDM uses orthogonal codes to spread signals.
Each station is assigned with a unique code, called chip. Signals travel with these codes
independently, inside the whole bandwidth.
The receiver knows in advance the chip code signal it has to receive.
Unguided Media
Unguided media transport electromagnetic waves without using a physical conductor. This type
of communication is often referred to as wireless communication. Signals are normally
broadcast through free space and thus are available to anyone who has a device capable of
receiving them. Unguided signals can travel from the source to destination in several ways:
ground propagation, sky propagation, and line-of-sight propagation. Wireless transmission is
of three types as shown below in Fig 1.22:
Fig 1.22 Wireless Transmission
Infrared: Infrared waves, with frequencies from 300 GHz to 400 THz
(wavelengths from 1 mm to 770 nm), can be used for short-range
communication. Infrared waves, having high frequencies, cannot
penetrate walls. This advantageous characteristic prevents interference
between one system and another; a short-range communication system
in one room cannot be affected by another system in the next room.
When we use our infrared remote control, we do not interfere with the
use of the remote by our neighbors. However, this same characteristic
makes infrared signals useless for long-range communication. In
addition, we cannot use infrared waves outside a building because the
sun's rays contain infrared waves that can interfere with the
communication. The infrared band, almost 400 THz, has an excellent
potential for data transmission. Such a wide bandwidth can be used to
transmit digital data with a very high data rate. The Infrared Data
Association (IrDA), an association for sponsoring the use of infrared
waves, has established standards for using these signals for
communication between devices such as keyboards, mice, PCs, and
printers. For example, some manufacturers provide a special port called
the IrDA port that allows a wireless keyboard to communicate with a PC.
The standard originally defined a data rate of 75 kbps for a distance up
to 8 m. The recent standard defines a data rate of 4 Mbps.
1. Delivery: The data should be delivered to the correctdestination and correct user.
2. Accuracy: The communication system should deliver the dataaccurately, without introducing any
errors. The data may get corrupted during transmission affecting the accuracy of the delivered
data.
3. Timeliness: Audio and Video data has to be delivered in atimely manner without any delay; such
a data delivery is called real time transmission of data.
4. Jitter: It is the variation in the packet arrival time. Uneven Jittermay affect the timeliness of data
being transmitted.
TRANSMISSION MODES
Data is transmitted between two digital devices on the network in the form of bits.
Transmission mode refers to the manner in which the bits are passed from the source to
destination.
The transmission medium may be capable of sending only a single bit in unit time or multiple bits
in unit time.
Types of Transmission Modes:
Example of Parallel Transmission is the communication between CPU and the Projector.
Serial Transmission
In Serial Transmission, as the name suggests data is transmitted serially, i.e. bit by bit, one bit at a
time.
Since only one bit has to be sent in unit time only a single channel is required.
The sender can start data transmission at any time instant without informing the receiver.
‘0’―start‖ and ‘1’ ―stop‖ bits are inserted group of 8 bits as shown below
0 1 BYTE 1
Fig: Start and Bit before and after every data byte
The sender and receiver may not be synchronized as seen above but at the bit level they have to
be synchronized i.e. the duration of one bit needs to be same for both sender and receiver for
accurate data transmission.
There may be gaps in between the data transmission indication that there is no data being
transmitted from sender. Ex. Assume a user typing at uneven speeds, at times there is no data
being transmitted from Keyboard to the CPU.
Disadvantages
Insertion of start bits, stop bits and gaps make asynchronous transmission slow.
Application
Keyboard
In Synchronous Serial Transmission, the sender and receiver are highly synchronized.
The sender simply send stream of data bits in group of 8 bits to the receiver without any start or
stop bit.
It is the responsibility of the receiver to regroup the bits into units of 8 bits once they are
received.
When no data is being transmitted a sequence of 0‘ indicating IDLE is put on the transmission
medium by the
sender.
Advantage
1. There are no start bits, stop bits or gaps between data units
• To compensate for this loss, amplifiers are used to amplify the signal.
Figure below shows the effect of attenuation and amplification.
Attenuation
Distortion
Distortion changes the shape of the signal as shownbelow
Distortion
Noise
Noise is any unwanted signal that is mixed or combined with the original
signal during transmission.
Due to noise the original signal is altered and signal received is not same
as the one sent.
1. Simplex
2. Half Duplex
3. Full Duplex
Simplex
In Simplex, communication is unidirectional
Only one of the devices sends the data and the other one only receives
the data.
Simplex transmission are not often used because it is not possible to
send back error or control signals to the transmit end.
Example: in the above diagram: a cpu send data while a monitor only
receives data.
Half Duplex
In half duplex both the stations can transmit as well as receive but not at
the same time.
When one device is sending other can only receive and vice-versa.
In addition, it is possible to perform error detection and request the
sender to retransmit information that arrived corrupted.
Example: A walkie-talkie.
Full Duplex
In Full duplex mode, both stations can transmit and receive at the same
time.
Example: mobile phones
Modulation
Analog or digital refers to how the data is modulated onto a sine wave.
Analog Modulation can be accomplished in three ways:
1. Amplitude modulation (AM)
2. Frequency modulation (FM)
3. Phase modulation (PM).
1 Amplitude modulation (AM)
Amplitude modulation is a type of modulation where the amplitude of
the carrier signal is varied in accordance with modulating signal.
The envelope, or boundary, of the amplitude modulated signal embeds
modulating signal.
Amplitude Modulation is abbreviated AM.
2 Frequency modulation (FM)
The number of levels is always a power of 2 (4, 8, 16, 32, 64, ...). These
numbers can be represented by two, three, four, five, six or more binary
digits (bits) respectively.
This technique may have better linearity, since it can go right down to an
cycles, and may jitter between minimum duty cycles of positive and
negative polarity.
1. Unipolar Scheme:
In a unipolar scheme, all the signal levels are on one side of the time axis, either above or
below. NRZ (Non-Return-to-Zero):
Traditionally, a unipolar scheme was designed as a non-return-to-zero (NRZ) scheme in
which the positive voltage defines bit I and the zero voltage defines bit O.
It is called NRZ because the signal does not return to zero at the middle of the bit.
2. Polar Schemes:
In polar schemes, the voltages are on the both sides of the time axis. For example, the
voltage level for 1 can be positive and the voltage level for 0can be negative.
A. NRZ-L
B. NRZ-I
C. RZ.
D. Biphase:
Manchester and Differential Manchester:
In Manchester encoding, the duration of the bit is divided into two halves.
The voltage remains at one level during the first half and moves to the other
level in the second half. The transition at the middle of the bit provides
synchronization.
Differential Manchester, on the other hand, combines the ideas of RZ and
NRZ-I. There is always a transition at the middle of the bit, but the bit values
are determined at the beginning of the bit.
3. Bipolar Schemes:
In bipolar encoding (sometimes called multilevel binary), there are three voltage
levels: positive, negative, and zero.
The voltage level for one data element is at zero, while the voltage level for the other
element alternates between positive and negative.
4. Multilevel Schemes:
The desire to increase the data speed or decrease the required bandwidth has
resulted in the creation of many schemes.
The goal is to increase the number of bits per baud by encoding a pattern of m data
elements into a pattern of n signal elements.
We only have two types of data elements (Os and 1s), which means that a group of
m data elements can produce a combination of 2m data patterns
Summary of Line Coding Schemes have been shown in Table 1.1
OSI MODEL
We use the concept of layers in our daily life. As an example, let us consider two friends
who communicate through postal mail. The process of sending a letter to a friend would be
complex if there were no services available from the post office. Figure 1.3 below shows
tasks involved in sending a letter:
Thus from above figure it is clearly understood that layer architecture simplifies the
network design. It is easy to debug network applications in a layered architecture
network. There are two layered Models namely OSI Model and TCP/IP Model.
OSI MODEL: OPEN SYSTEM FOR INTERCONNECTION
International Standard Organization (ISO) established a committee in 1977 to develop
architecture for computer communication. Open Systems Interconnection (OSI)
reference model is the result of this effort.
In 1984, the Open Systems Interconnection (OSI) reference model was approved as an
international standard for communications architecture.
Term “open” denotes the ability to connect any two systems which conform to the
reference model and associated standards.
The purpose of OSI Model is to facilitate communication between different systems
without requiring changes to the logic of the underlying hardware and software.
The OSI model is now considered the primary Architectural model for inter-computer
communications.
The OSI model describes how information or data makes its way from application
programmes (such as spreadsheets) through a network medium (such as wire) to
another application programme located on another network.
The OSI reference model divides the problem of moving information between
computers over a network medium into SEVEN smaller and more manageable
problems.
This separation into smaller more manageable functions is known as layering.
The process of breaking up the functions or tasks of networking into layers reduces
complexity.
Each layer provides a service to the layer above it in the protocol specification. Each
layer communicates with the same layer’s software or hardware on other computers.
The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1)
are concerned with the flow of data from end to end through the network.
The upper four layers of the OSI model (application, presentation and session—Layers
7, 6 and 5) are orientated more toward services to the applications.
Data is encapsulated with the necessary protocol information as it moves down the
layers before network transit.
A message begins at the top application layer and moves down the OSI layers to the
bottom physical layer. As the message descends, each successive OSI model layer adds
a header to it. A header is layer-specific information that basically explains what
functions the layer carried out. Conversely, at the receiving end, headers are striped
from the message as it travels up the corresponding layers.
A) PHYSICAL LAYER
i. Provides physical interface for transmission of information.
ii. Defines rules by which bits are passed from one system to another on a physical
communication medium.
iii. Covers all - mechanical, electrical, functional and procedural - aspects for physical
communication.
iv. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum
transmission distances, physical connectors, and other similar attributes are defined by
physical layer specifications.
v. Concerned with line configuration, physical topology and transmission mode.
B) DATA LINK LAYER
i. Data link layer attempts to provide reliable communication over the physical layer interface.
ii. Breaks the outgoing data into frames and reassemble the received frames.
iii. Create and detect frame boundaries.
iv. Handle errors by implementing an acknowledgement and retransmission scheme.
v. Implement flow control.
vi. Responsible for Error Control.
vii. Supports points-to-point as well as broadcast communication.
viii. Supports simplex, half-duplex or full-duplex communication.
C) NETWORK LAYER
i. Implements routing of frames (packets) through the network.
ii. Defines the most optimum path the packet should take from the source to the destination.
iii. Defines logical addressing so that any endpoint can be identified.
iv. Handles congestion in the network.
v. The network layer also defines how to fragment a packet into smaller packets to
accommodate different media.
C) TRANSPORT LAYER
i. Purpose of this layer is to provide a reliable mechanism for the exchange of data between
two processes in different computers.
ii. Ensures that the data units are delivered error free.
iii. Ensures that data units are delivered in sequence.
iv. Ensures that there is no loss or duplication of data units.
v. Provides connectionless or connection oriented service.
vi. Provides for the connection management.
vii. Multiplex multiple a connection over a single channel.
D) SESSION LAYER
i. Session layer provides mechanism for controlling the dialogue between the two end
systems.
ii. It defines how to start, control and end conversations (called sessions) between
applications.
iii. This layer requests for a logical connection to be established on an end-user’s request.
iv. Any necessary log-on or password validation is also handled by this layer.
v. Session layer is also responsible for terminating the connection.
vi. This layer provides services like dialogue discipline which can be full duplex or half
duplex.
vii. Session layer can also provide check-pointing mechanism such that if a failure of some
sort occurs between checkpoints, all data can be retransmitted from the last checkpoint.
E) PRESENTATION LAYER
i. Presentation layer defines the format in which the data is to be exchanged between the
two communicating entities.
ii. Also handles data compression and data encryption (cryptography).
F) APPLICATION LAYER
Application layer interacts with application programs and is the highest level of OSI
model.
Application layer contains management functions to support distributed applications.
Examples of application layer are applications such as file transfer, electronic mail,
remote login etc.
TCP/IP MODEL: (TRANSMISSION CONTROL PROTOCOL/ INTERNET
PROTOCOL)
The layers in the TCP/IP protocol suite do not exactly match those in the
OSI model.
The original TCP/IP protocol suite was defined as having four layers: host
-to-network, internet, transport, and application.
However, when TCP/IP is compared to OSI, we can say that the TCP/IP
protocol suite is made of five layers: physical, data link, network,
transport, and application.
This model is currently being used on our systems. TCP/IP model is a
collection of protocols often called a protocol suite. It offers a rich variety
of protocols from which we can choose from.
It is also called as the TCP/IP protocol suite. It is a collection of protocols.
IT is a hierarchical model, ie. There are multiple layers and higher layer protocols are
supported by lower layer protocols.
It existed even before the OSI model was developed. Originally had four layers (bottom to
top):
1. Host to Network Layer
2. Internet Layer
3. Transport Layer
4. Application Layer
A. Host to Network Layer
This layer is a combination of protocols at the physical and data link layers.
It supports all standard protocols used at these layers.
B. Network Layer or IP
Also called as the InternetworkingProtocol Layer (IP). It holds the IP protocol which is a
network layer protocol and is responsible for source to destination transmission of data.
The Internetworking Protocol (IP) is aconnection-less&unreliable protocol.
It is a best effort delivery service. i.e. there is no error checking in IP, it simply sends the
data and relies on its underlying layers to get the data transmitted to the destination.
IP transports data by dividing it into packets ordatagrams of same size. Each packet is
independent ofthe other and can be transported across different routes and can arrive out
of order at the receiver.
In other words, since there is no connection set up between the sender and the receiver the
packets find the best possible path and reach the destination. Hence, the word connection-
less.
The packets may get dropped during transmission along various routes. Since IP does not
make any guarantee about the delivery of the data its call an unreliable protocol.
Even if it is unreliable IP cannot be considered weak and useless; since it provides only the
functionality that is required for transmitting data thereby giving maximum efficiency. Since
there is no mechanism of error detection or correction in IP, there will be no delay
introduced on a medium where there is no error at all.
IP is a combination of four protocols:
1. ARP
2. RARP
3. ICMP
4. IGMP
C. Transport Layer
Transport layer protocols are responsible for transmission of data running on a process of
one machine to the correct process running on another machine.
The transport layer contains three protocols:
1. TCP
2. UDP
3. SCTP
TCP(transmission control protocol)
The transmission Control Protocol (TCP) is one of the most important protocols of
Internet Protocols suitefor data transmission in communication network such as internet.
TCP is reliable protocol. That is, the receiver always sends either positive or negative
acknowledgement about the data packet to the sender, so that the sender always has bright
clue about whether the data packet is reached the destination or it needs to resend it.
TCP ensures that the data reaches intended destination in the same order it was sent.
TCP is connection oriented. TCP requires that connection between two remote points be
established before sending actual data.
TCP provides error-checking and recovery mechanism.
TCP provides end-to-end communication.
TCP provides flow control and quality of service.
TCP operates in Client/Server point-to-point mode.
TCP provides full duplex server, i.e. it can perform roles of both receiver and sender.
TCP Header/ format
The length of TCP header is minimum 20 bytes and maximum 60 bytes.
Source Port (16-bits): It identifies source port of the application process onthe
sending device.
Destination Port (16-bits): It identifies destination port of the applicationprocess on
the receiving device.
Sequence Number (32-bits): Sequence number of data bytes of a segmentin a session.
Acknowledgement Number (32-bits): When ACK flag is set, this numbercontains the
next sequence number of the data byte expected and works as acknowledgement of the
previous data received.
Data Offset (4-bits): This field implies both, the size of TCP header (32-bitwords) and
the offset of data in current packet in the whole TCP segment.
Reserved (3-bits): Reserved for future use and all are set zero by default.
Flags (1-bit each):
Windows Size: This field is used for flow control between two stations andindicates
the amount of buffer (in bytes) the receiver has allocated for a segment, i.e. how much
data is the receiver expecting.
Checksum: This field contains the checksum of Header, Data, and PseudoHeaders.
Urgent Pointer: It points to the urgent data byte if URG flag is set to 1.
Options: It facilitates additional options which are not covered by the regularheader.
Option field is always described in 32-bit words. If this field contains data less than 32-
bit, padding is used to cover the remaining bits to reach 32-bit boundary.
Features of UDP
UDP is used when acknowledgement of data does not hold any significance.
UDP is good protocol for data flowing in one direction.
UDP is simple and suitable for query-based communications.
UDP is not connection oriented.
UDP does not provide congestion control mechanism.
UDP does not guarantee ordered delivery of data.
UDP is stateless.
UDP is suitable protocol for streaming applications such as VoIP, multimedia streaming.
UDP Header/Format
ADDRESSING IN TCP/IP
The TCP/IP protocol suited involves 4 different types of addressing:
1. Physical Address
2. Logical Address
3. Port Address
4. Specific Address
1. Physical Address
Physical Address is the lowest level of addressing, also known as link address.
It is local to the network to which the device is connected and unique inside it.
The physical address is usually included in the frame and is used at the data link layer.
MAC is a type of physical address that is 6 byte (48 bit) in size and is imprinted on the
Network Interface Card (NIC) of the device.
The size of physical address may change depending on the type of network. Ex. An
Ethernet network uses a 6 byte MAC address.
2. Logical Address
Logical Addresses are used for universal communication.
Most of the times the data has to pass through different networks; since physical
addresses are local to the network there is a possibility that they may be duplicated
across multiples networks also the type of physical address being used may change
with the type of network encountered. For ex: Ethernet to wireless to fiber optic. Hence
physical addresses are inadequate for source to destination delivery of data in an
internetwork environment.
Logical Address is also called as IP Address (Internet Protocol address).
At the network layer, device i.e. computers and routers are identified universally by
their IP Address.
IP addresses are universally unique.
Currently there are two versions of IP addresses being used:
a. IPv4: 32 bit address, capable of supporting 232nodes
b. IPv6: 128 bit address, capable of supporting 2128nodes
3. Port Address
A logical address facilitates the transmission of data from source to destination device.
But the source and the destination both may be having multiple processes
communicating with each other.
Ex. Users A & B are chatting with each other using Google Talk, Users B & C are
exchanging emails using Hotmail. The IP address will enable transmitting data from A
to B, but still the data needs to be delivered to the correct process. The data from A
cannot be given to B on yahoo messenger since A & B are communicating using Google
Talk.
Since the responsibility of the IP address is over here there is a need of addressing that
helps identify the source and destination processes. In other words, data needs to be
delivered not only on the correct device but also on the correct process on the correct
device.
A Port Address is the name or label given to a process. It is a 16 bit address.
Ex. TELNET uses port address 23, HTTP uses port address 80
4. Specific Address
Port addresses address facilitates the transmission of data from process to process but still
there may be a problem with data delivery.
For Ex: Consider users A, B & C chatting with each other using Google Talk. Every user has
two windows open, user A has two chat windows for B & C, user B has two chat windows
for A & C and so on for user C
Now a port address will enable delivery of data from user A to the correct process ( in this
case Google Talk) on user B but now there are two windows of Google Talk for user A & C
available on B where the data can be delivered.
Again the responsibility of the port address is over here and there is a need of addressing
that helps identify the different instances of the same process.
Such address are user friendly addresses and are called specific addresses.
Other Examples: Multiple Tabs or windows of a web browser work under the same process
that is HTTP but are identified using Uniform Resource Locators (URL), Email addresses.
SWITCHING
In large networks we need some means to allow one-to-one communication between any
two nodes.
In LANs this is achieved using one of three methods:
i. Direct point-to-point connection (mesh)
ii. Via central controller (star)
iii. Connection to common bus in a multipoint configuration (bus/hup)
None of the previous works in larger networks with large physical separation or consisting
of a large number of computers because it requires too much infrastructure and majority
of those links would be idle for most of the time.
Better solution is a switching network. It consists of a series of interlinked nodes called
switched.
Switches are capable to create temporary connections between two or more devices.
Some of these nodes are connected to the end system and others are used only for routing.
End systems can be computers or telephones.
Types of switched networks
a) CIRCUIT SWITCHING
A circuit-switched network consists of a set of switches connected by physical links.
A connection between two stations is a dedicated path made of one or more links.
Each connection uses only one dedicated channel on each link. Each link is normally
divided into n channels by using FDM or TDM.
The link can be permanent (leased line) or temporary (telephone).
A switch in a datagram network uses a routing table that is based on the destination
address. The destination address in the header of a packet in a datagram network remains
the same during the entire journey of the packet.
The total delay is shown below
Virtual Circuit Networks
A virtual-circuit network is a cross between a circuit-switched
network and a datagram network.
The virtual -circuit shares characteristics of both. Packets form a
single message travel along the same path.
Following are the characteristics of virtual circuit networks:
Three phases to transfer data
Resources can be allocated during setup phase
Data are packetized and each packet carries an address in the
header
All packets follow the same path
Implemented in data link layer
The total delay in virtual circuit network is shown below
IPv4 ADDRESSING
An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a
device (for example, a computer or a router) to the Internet. IPv4 addresses are unique. They
are unique in the sense that each address defines one, and only one, connection to the
Internet.
Two devices on the Internet can never have the same address at the same time. By using some
strategies, an address may be assigned to a device for a time period and then taken away and
assigned to another device. On the other hand, if a device operating at the network layer has m
connections to the Internet, it needs to have m addresses.
The IPv4 addresses are universal in the sense that the addressing system must be accepted by
any host that wants to be connected to the Internet.
ADDRESS SPACE
Address notations
There are two prevalent notations to show an IPv4 address: binary notation and dotted
decimal notation.
i) Binary Notation
In binary notation, the IPv4 address is displayed as 32 bits. Each octet is often referred to
as a byte. So it is common to hear an IPv4 address referred to as a 32-bit address or a 4-
byte address. The following is an example of an IPv4 address in binary notation:
01110101 10010101 00011101 00000010
ii) Dotted-Decimal Notation
To make the IPv4 address more compact and easier to read, Internet addresses are usually
written in decimal form with a decimal point (dot) separating the bytes. The following is
the dotted~decimal notation of the above address:
117.149.29.2
Fig. shows an IPv4 address in both binary and dotted-decimal notation. Note that because
each byte (octet) is 8 bits, each number in dotted-decimal notation is a value ranging from
0 to 255.
A) CLASSFUL ADDRESSING
IPv4 addressing, at its inception, used the concept of classes. This architecture is called
classfull addressing. Although this scheme is becoming obsolete.
In classful addressing, the address space is divided into five classes: A, B, C, D,and E. Each class
occupies some part of the address space.
We can find the class of an address when given the address in binary notation or dotted-
decimal notation. If the address is given in binary notation, the first few bits can immediately
tell us the class of the address. If the address is given in decimal-dotted notation, the first byte
defines the class.
Classes and Blocks
One problem with classful addressing is that each class is divided into a fixed number of
blocks with each block having a fixed size as shown below
Let us examine the table. Previously, when an organization requested a block of addresses, it was
granted one in class A, B, or C. Class A addresses were designed for large organizations with a
large number of attached hosts or routers. Class B addresses was designed for midsize
organizations with tens of thousands of attached hosts or routers. Class C addresses were
designed for small organizations with a small number of attached hosts or routers.
We can see the flaw in this design. A block in class A address is too large for almost any
organization. This means most of the addresses in class A were wasted and were not used. A
block in class B is also very large, probably too large for many of the organizations that
received a class B block. A block in class C is probably too small for many organizations. Class
D addresses were designed for multicasting. Each address in this class is used to define one
group
of hosts on the Internet. The Internet authorities wrongly predicted a need for 268,435,456
groups. This never happened and many addresses were wasted here too. And lastly, the class
E addresses were reserved for future use; only a few were used, resulting in another waste of
addresses.
In classful addressing, an IP address in class A, B, or C is divided into netid and hostid. These
parts are of varying lengths, depending on the class of the address. Fig. 4.6 shows some netid
and hostid bytes. The netid is in color, the hostid is in white.
Note that the concept does not apply to classes D and E. In class A, one byte defines the netid
and three bytes define the hostid. In class B, two bytes define the netid and two bytes define
the hostid. In class C, three bytes define the netid and one byte defines the hostid.
Mask
Although the length of the netid and hostid (in bits) is predetermined in classful addressing, we
can also use a mask (also called the default mask), a 32-bit number made of contiguous Is
followed by contiguous as. The masks for classes A, B, and C are shown in Table 4.2. The
concept does not apply to classes D and E
Default masks for classful addressing
The mask can help us to find the netid and the hostid. For example, the mask for a class A address
has eight 1s, which means the first 8 bits of any address in class A define the netid; the next 24
bits define the hostid. The last column of Table 4.2 shows the mask in the form In where n can
be 8, 16, or 24 in classful addressing. This notation is also called slash notation orClassless
Interdomain Routing (CIDR) notation. The notation is used in classless addressing, which we
will discuss later. We introduce it here because it can also be applied to classful addressing.
Subnetting
During the era of classful addressing, subnetting was introduced. If an organization was
granted a large block in class A or B, it could divide the addresses into several contiguous
groups and assign each group to smaller networks (called subnets) or, in rare cases, share
part of the addresses with neighbors. Subnetting increases the number of Is in the mask,
Supernetting
In supernetting, an organization can combine several class C blocks to create a larger range of
addresses. In other words, several networks are combined to create a supernetwork or a
supemet. The time came when most of the class A and class B addresses were depleted;
however, there was still a huge demand for midsize blocks. The size of a class C block with a
maximum number of 256 addresses did not satisfy the needs of most organizations. Even a
midsize organization needed more addresses. One solution was supernetting. An organization
can apply for a set of class C blocks instead of just one. For example, an organization that
needs 1000 addresses can be granted four contiguous class C blocks. The organization can
then use these addresses to create one supernetwork. Supernetting decreases the number of
Is in the mask. For example, if an organization is given four class C addresses, the mask
changes from /24 to /22.
Address Depletion
The flaws in classful addressing scheme combined with the fast growth of the Internet led to the
near depletion of the available addresses. Yet the number of devices on the Internet is much
less than the 232 address space. We have run out of class A and B addresses, and a class C
block is too small for most midsize organizations. One solution that has alleviated the problem
is the idea of classless addressing.
A) IPv4 datagram format
The datagram is also referred to as IP payload
B) IPv6
Although IPv4 is well designed, data communication has evolved since the inception of IPv4 in
the 1970s. IPv4 has some deficiencies that make it unsuitable for the fast-growing Internet.
Despite all short-term solutions, such as subnetting, classless addressing, and NAT, address
depletion is still a long-term problem in the Internet.
The Internet must accommodate real-time audio and video transmission. This type of
transmission requires minimum delay strategies and reservation of resources not provided in
the IPv4 design.
The Internet must accommodate encryption and authentication of data for some applications.
No encryption or authentication is provided by IPv4.
To overcome these deficiencies, IPv6 (Internetworking Protocol, version 6), also known as
IPng (Internetworking Protocol, next generation), was proposed and is now a standard..
The format and the length of the IP address were changed along with the packet format.
Related protocols, such as ICMP, were also modified.
Other protocols in the network layer, such as ARP, RARP, and IGMP, were either deleted or
included in the ICMPv6 protocol, Routing protocols, such as RIP and OSPF were also slightly
modified to accommodate these changes.
Advantages
· Larger address space. An IPv6 address is 128 bits long. Compared with the 32-bit address of
IPv4, this is a huge (296) increase in the address space.
· Better header format. IPv6 uses a new header format in which options are separated from the
base header and inserted, when needed, between the base header and the upper-layer data.
This simplifies and speeds up the routing process because most of the options do not need to
be checked by routers.
· New options. IPv6 has new options to allow for additional functionalities.
· Allowance for extension. IPv6 is designed to allow the extension of the protocol if required by
new technologies or applications.
· Support for resource allocation. In IPv6, the type-of-service field has been removed, but a
mechanism (called flow label) has been added to enable the source to request special handling
of the packet. This mechanism can be used to support traffic such as real-time audio and
video.
· Support for more security. The encryption and authentication options in IPv6 provide
confidentiality and integrity of the packet.
Version/IP version (4-bits) The 4-bit version field contains the number 6. It indicates the
version of the IPv6 protocol.
Packet priority/Traffic class (8 bits) The 8-bit Priority field in the IPv6 header can assume
different values to enable the source node to differentiate between the packets generated by it
by associating different delivery priorities to them. This field is subsequently used by the
originating node and the routers to identify the data packets that belong to the same traffic
class and distinguish between packets with different priorities.
Flow Label/QoS management (20 bits) The 20-bit flow label field in the IPv6 header can be
used by a source to label a set of packets belonging to the same flow. Multiple active flows may
exist from a source to a destination as well as traffic that are not associated with any flow. The
IPv6 routers must handle the packets belonging to the same flow in a similar fashion
Payload length in bytes(16 bits) The 16-bit payload length field contains the length of the
data field in octets/bits following the IPv6 packet header.
Next Header (8 bits) The 8-bit Next Header field identifies the type of header immediately
following the IPv6 header and located at the beginning of the data field (payload) of the IPv6
packet. This field usually specifies the transport layer protocol used by a packet's payload. The
two most common kinds of Next Headers are TCP (6) and UDP (17).
Time To Live (TTL)/Hop Limit (8 bits) The 8-bit Hop Limit field is decremented by one, by
each node (typically a router) that forwards a packet. If the Hop Limit field is decremented to
zero, the packet is discarded. The main function of this field is to identify and to discard
packets that are stuck in an indefinite loop due to any routing information errors.
Source address (128 bits) The 128-bit source address field contains the IPv6 address of the
originating node of the packet.
Destination address (128 bits) The 128-bit contains the destination address of the recipient
node of the IPv6 packet.
INTRODUCTION TO ROUTING
ROUTING
Routing is the act of moving information across an internetwork from a source to a
destination. Along the way, at least one intermediate node typically is encountered.
Routing involves two basic activities: determining optimal routing paths and transporting
information groups (typically called packets) through an internetwork.
In the context of the routing process, the latter of these is referred to as packet switching.
Although packet switching is relatively straightforward, path determination can be very
complex.
Path Determination
Routing protocols use metrics to evaluate what path will be the best for a packet to travel.
A metric is a standard of measurement, such as path bandwidth, that is used by routing
algorithms to determine the optimal path to a destination.
To aid the process of path determination, routing algorithms initialize and maintain
routing tables, which contain route information. Route information varies depending on
the routing algorithm used.
Routing algorithms fill routing tables with a variety of information. Destination/next hop
associations tell a router that a particular destination can be reached optimally by sending
the packet to a particular router towards the final destination. When a router receives an
incoming packet,
it checks the destination address and attempts to associate this address with a next hop.
Routing tables also can contain other information, such as data about the desirability of a
path.
ROUTING METRICS
Routing tables contain information used by switching software to select the best route.
Routing algorithms have used many different metrics to determine the best route.
Sophisticated routing algorithms can base route selection on multiple metrics, combining
them in a single (hybrid) metric.
All the following metrics have been used:
•Path length
•Hop count
•Reliability
•Delay
•Bandwidth Load
•Communication cost
i. Path length is the most common routing metric. Some routing protocols allow network
administrators to assign arbitrary costs to each network link. In this case, path length is
the sum of the costs associated with each link traversed.
ii. Hop count is a metric that specifies the number of passes through internetworking
products, such as routers, that a packet must take and route from a source to a destination.
iii. Reliability, in the context of routing algorithms, refers to the dependability (usually
described in terms of the bit-error rate) of each network link. Some network links might
go down more often than others. After a network fails, certain network links might be
repaired more easily or more quickly than other links. Any reliability factors can be taken
into account in the assignment of the reliability ratings, which are arbitrary numeric
values usually assigned to network links by network administrators.
iv. Routing delay refers to the length of time required to move a packet from source to
destination through the internetwork. Delay depends on many factors, including the
bandwidth of intermediate network links, the port queues at each router along the way,
network congestion on all intermediate network links, and the physical distance to be
travelled. Because delay is a conglomeration of several important variables, it is a common
and useful metric.
v. Bandwidth refers to the available traffic capacity of a link. All other things being equal, a
10-Mbps Ethernet link would be preferable to a 64-kbps leased line. Although bandwidth
is a rating of the maximum attainable throughput on a link, routes through links with
greater bandwidth do not necessarily provide better routes than routes through slower
links. For example, if a faster link is busier, the actual time required to send a packet to the
destination could be greater.
vi. Load refers to the degree to which a network resource, such as a router, is busy. Load can
be calculated in a variety of ways, including CPU utilization and packets processed per
second. Monitoring these parameters on a continual basis can be resource-intensive itself.
vii. Communication cost is another important metric, especially because some companies may
not care about performance as much as they care about operating expenditures. Although
line delay may be longer, they will send packets over their own lines rather than through
the public lines that cost money for usage time.
Design Goals
Routing algorithms often have one or more of the following design goals:
•Optimality
•Simplicity and low overhead
•Robustness and stability
•Rapid convergence
•Flexibility
Optimality refers to the capability of the routing algorithm to select the best route, which
depends on the metrics and metric weightings used to make the calculation.
For example, one routing algorithm may use a number of hops and delays, but it may weigh delay
more heavily in the calculation. Naturally, routing protocols must define their metric
calculation algorithms strictly.
Routing algorithms also are designed to be as simple as possible. In other words, the routing
algorithm must offer its functionality efficiently, with a minimum of software and utilization
overhead. Efficiency is particularly important when the software implementing the routing
algorithm must run on a computer with limited physical resources.
Routing algorithms must be robust, which means that they should perform correctly in the
face of unusual or unforeseen circumstances, such as hardware failures, high load conditions,
and incorrect implementations. Because routers are located at network junction points, they
can cause considerable problems when they fail. The best routing algorithms are often those
that have withstood the test of time and that have proven stable under a variety of network
conditions.
Routing algorithms must converge rapidly. Convergence is the process of agreement, by all
routers, on optimal routes. When a network event causes routes to either go down or become
available, routers distribute routing update messages that permeate networks, stimulating
recalculation of optimal routes and eventually causing all routers to agree on these routes.
Routing algorithms that converge slowly can cause routing loops or network outages.
Routing algorithms should also be flexible, which means that they should quickly and
accurately adapt to a variety of network circumstances. Assume, for example, that a network
segment has gone down. As many routing algorithms become aware of the problem, they will
quickly select the next-best path for all routes normally using that segment. Routing
algorithms can be programmed to adapt to changes in network bandwidth, router queue size,
and network delay, among other variables.
Routing Algorithms
Routing Algorithm Types
Routing algorithms can be classified by type. Key differentiators include these:
1. Static versus dynamic
2. Single-path versus multipath
3. Flat versus hierarchical
4. Host-intelligent versus router-intelligent
5. Intradomain versus interdomain
6. Link-state versus distance vector
1. Static Versus Dynamic
Static routing algorithms are hardly algorithms at all, but are table mappings established
by the network administrator before the beginning of routing. These mappings do not
change unless the network administrator alters them. Algorithms that use static routes are
simple to design and work well in environments where network traffic is relatively
predictable and where network design is relatively simple.
Because static routing systems cannot react to network changes, they generally are
considered unsuitable for today constantly changing networks. Most of the dominant
routing algorithms today are Dynamic routing algorithms, which adjust to changing
network circumstances by analyzing incoming routing update messages. If the message
indicates that a network change has occurred, the routing software recalculates routes and
sends out new routing update messages. These messages permeate the network,
stimulating routers to rerun their algorithms and change their routing tables accordingly.
Dynamic routing algorithms can be supplemented with static routes where appropriate. A
router of last resort (a router to which all unroutable packets are sent), for example, can
be designated to act as a repository for all unroutable packets, ensuring that all messages
are at least handled in some way.
1. The packet is put at the end of the input queue while waiting to be checked.
2. The processing module of the router removes the packet from the input queue once it reaches
the front of the queue and uses its routing table and the destination address to find the route.
3. The packet is put in the appropriate output queue and waits its turn to be sent.
We need to be aware of two issues. First, if the rate of packet arrival is higher than the packet
processing rate, the input queues become longer and longer. Second, if the packet departure
rate is less than the packet processing rate, the output queues become longer and longer.
CONGESTION CONTROL METHODS
Congestion control mechanisms can be divided into two broad categories: open-loop
congestion control (prevention) and closed-loop congestion control (removal) as shown
Node III in the figure has more input data than it can handle. It drops some packets in its input
buffer and informs node II to slow down. Node II, in turn, may be congested because it is
slowing down the output flow of data. If node II is congested, it informs node I to slow down,
which in turn may create congestion. If so, node I inform the source of data to slow down.
This, in time, alleviates the congestion. Note that the pressure on node III is moved backward
to the source to remove the congestion. It was, however, implemented in the first virtual-
circuit network, X.25. The technique cannot be implemented in a datagram network because
in this type of network, a node (router) does not have the slightest knowledge of the upstream
router.
b) Choke Packet
A choke packet is a packet sent by a node to the source to inform it of congestion. Note the
difference between the backpressure and choke packet methods. In backpressure, the
warning is from one node to its upstream node, although the warning may eventually reach
the source station.
In the choke packet method, the warning is from the router, which has encountered
congestion, to the source station directly. The intermediate nodes through which the packet
has travelled are not warned, an example of this type of control in ICMP. When a router in the
Internet is over-whelmed with IP datagram’s, it may discard some of them; but it informs the
source host, using a source quench ICMP message. The warning message goes directly to the
source station; the intermediate routers, and does not take any action. The Figurebelow
shows the idea of a choke packet.
c) Implicit Signaling
In implicit signaling, there is no communication between the congested node or nodes and the
source.
The source guesses that there is congestion somewhere in the network from other symptoms.
For example, when a source sends several packets and there is no acknowledgment for a
while, one assumption is that the network is congested. The delay in receiving an
acknowledgment is interpreted as congestion in the network; the source should slow down.
d) Explicit Signaling
The node that experiences congestion can explicitly send a signal to the source or destination.
The explicit signaling method, however, is different from the choke packet method. In the
choke packet method, a separate packet is used for this purpose; in the explicit signaling
method, the signal is included in the packets that carry data.
e) Backward Signaling
A bit can be set in a packet moving in the direction opposite to the congestion. This bit can
warn the source that there is congestion and that it needs to slow down to avoid the
discarding of packets.
f) Forward Signaling
A bit can be set in a packet moving in the direction of the congestion. This bit can warn the
destination that there is congestion. The receiver in this case can use policies, such as slowing
down the acknowledgments, to alleviate the congestion.
DATA LINK LAYER
Data can be corrupted during transmission.
Some applications require that errors be detected and corrected. Whenever bits flow from
one point to another, they are subject to unpredictable changes because of interference.
Thus, we say that error had occurred.
There are two types of error: single-bit error and burst error.
In a single-bit error, only 1 bit in the data unit has changed whereas, in burst error means
that 2 or more bits in the data unit have changed as shown in Fig 2.1
The central concept in detecting or correcting errors is redundancy. To be able to detect or
correct errors, we need to send some extra bits with our data.
These redundant bits are added by the sender and removed by the receiver. Their presence
allows the receiver to detect or correct corrupted bits.
Redundancy is achieved through various coding schemes. The sender adds redundant bits
through a process that creates a relationship between the redundant bits and the actual
data bits. The receiver checks the relationships between the two sets of bits to detect or
correct the errors.
Coding schemes into two broad categories: block coding and convolution coding.
Block Coding: In block coding, we divide our message into blocks, each of k bits, called
datawords. We add r redundant bits to each block to make the length n = k + r. The resulting
n-bit blocks are called codewords as shown below.
Error Detection
An error-detecting code can detect only the types of errors for which it is designed; other
types of errors may remain undetected. Fig 2.15 shows the process of error detection in
block coding.
Fig 2.15 Process of Error Detection
2.2.2 Error Correction
Once an error has been detected, it has to be corrected. Fig 2.16 shows the process of error
correction.
One of the central concepts in coding for error control is the idea of the Hamming Distance. The
Hamming distance between two words is the number of differences between corresponding
bits. The minimum Hamming distance is the smallest Hamming distance between all possible
pairs in a set of words.
· To guarantee the detection of up to s errors in all cases, the minimum Hamming distance in a
block code must be dmin = s + 1.
Linear Block Codes: Almost all block codes used today belong to a subset called linear block
codes. A linear block code is a code in which the exclusive OR (addition modulo-2) of two valid
codewords creates another valid codeword. A single parity-check code is of linear block code.
A simple parity-check code is a single-bit error-detecting code in which n = k + 1 with dmin =
2.A simple parity-check code can detect an odd number of errors as shown in Fig 2.17.
Cyclic Codes: Cyclic codes are special linear block codes with one extra property. In a cyclic code,
if a codeword is cyclically shifted (rotated), the result is another codeword as shown in Fig
2.18.
In cyclic code, concept of long division has been used. The divisor in a cyclic code is normally
called the generator polynomial or simply the generator as shown in Fig 2.19.
o No bit is corrupted
Some bits are corrupted, but the decoder failed to detect them.
The data link layer needs to pack bits into frames, so that each frame is distinguishable from
another.
2.3.1 Framing
There are two types of framing namely fixed size framing and variable size framing.
In fixed size framing, we send fixed size of frames so there is no need to specify the
boundaries of the frame.
In variable size framing, size of frame is not fixed rather it is variable so we need to define
boundaries of frame i.e ending of one frame and beginning of next frame. Thus, we use two
techniques namely character oriented and bit oriented. In character oriented, we use the
concept of byte stuffing. Byte stuffing is the process of adding 1 extra byte whenever there is a
flag or escape character in the text.
In bit oriented, we use bit stuffing.Bit stuffing is the process of adding one extra 0
whenever five consecutive 1s follow a 0 in the data, so that the receiver does not
mistake the pattern 0111110 for a flag.
Flow
The most important responsibilities of the data link layer are flow control and error control.
Collectively, these functions are known as data link control.
Flow control refers to a set of procedures used to restrict the amount of data that the sender
can send before waiting for acknowledgment.
Error Control Protocol
Error control in the data link layer is based on automatic repeat request, which is the
retransmission of data.
The data link layer can combine framing, flow control, and error control to achieve the
delivery of data from one node to another.
The protocols are normally implemented in software by using one of the common
programming languages. Protocols can be broadly classified into two categories as Noiseless
channel and Noisy Channel.
There is a difference between the protocols in real networks.
All the protocols we discuss are unidirectional in the sense that the data frames.travel
from one node, called the sender, to another node, called the receiver. Although special
frames, called acknowledgment (ACK) and negative acknowledgment (NAK) can flow in
the opposite direction for flow and error control purposes, data flow in only one direction.
In a real-life network, the data link protocols are implemented as bidirectional; data flow
in both directions.
In these protocols the flow and error control information such as ACKs and NAKs is
included in the data frames in a technique called piggybacking.
NOISELESS CHANNEL PROTOCOL
Noiseless protocols take channel as an ideal one in which no frames are lost, duplicated, or
corrupted.
There are two types of protocols used for noiseless channels namely simplest and stop &wait
protocol.
Simplest protocol:
it has no flow or error control. In simplest protocol, data frames are sent continuously, there is
no concept of acknowledgement.
The data link layer at the sender site gets data from its network layer, makes a frame out of
the data, and sends it.
The data link layer at the receiver site receives a frame from its physical layer, extracts data
from the frame, and delivers the data to its network layer.
The sender sends a sequence of frames without even thinking about the receiver. To
send three frames, three events occur at the sender site and three events at the receiver
site.
Stop & Wait Protocol:
In this protocol, one frame is sent at a time and the sender waits for acknowledgement of that
frame. Once it receives acknowledgement, it sends another frame
If data frames arrive at the receiver site faster than they can be processed, the frames must be
stored until their use. Normally, the receiver does not have enough storage space, especially if
it is receiving data from many sources. This may result in either the discarding of frames or
denial of service.
To prevent the receiver from becoming overwhelmed with frames, we somehow need to tell
the sender to slow down. There must be feedback from the receiver to the sender.
The sender sends one frame and waits for feedback from the receiver. When the
ACK arrives, the sender sends the next frame. Note that sending two frames in the
protocol involves the sender in four events and the receiver in two events.
Noisy Channel Protocol
Although the Stop-and-Wait Protocol gives us an idea of how to add flow control to its
predecessor, noiseless channels are nonexistent.
There are three protocols used in case of noisy channels namely: stop & wait automatic
repeat request, go-back- n automatic repeat request and selective automatic repeat request.
Stop & Wait Automatic Repeat Request (ARQ):
It adds a simple error control mechanism to the Stop-and-Wait Protocol. To detect and correct
corrupted frames, we need to add redundancy bits to our data frame.
When the frame arrives at the receiver site, it is checked and if it is corrupted, it is silently
discarded. The detection of errors in this protocol is manifested by the silence of the receiver.
Lost frames are more difficult to handle than corrupted ones. In our previous protocols, there
was no way to identify a frame. The received frame could be the correct one, or a duplicate, or
a frame out of order. The solution is to number the frames. When the receiver receives a data
frame that is out of order, this means that frames were either lost or duplicated.
The corrupted and lost frames need to be resent in this protocol. If the receiver does not
respond when there is an error, how can the sender know which frame to resend? To remedy
this problem, the sender keeps a copy of the sent frame. At the same time, it starts a timer. If
the timer expires and there is no ACK for the sent frame, the frame is resent, the copy is held,
and the timer is restarted.
Since the protocol uses the stop-and-wait mechanism, there is only one specific frame that
needs an ACK even though several copies of the same frame can be in the network.
Go-Back-N Automatic Repeat Request:
To improve the efficiency of transmission (filling the pipe), multiple frames must be in
transition while waiting for acknowledgment. In other words, we need to let more than one
frame be outstanding to keep the channel busy while the sender is waiting for
acknowledgment.
In this protocol we can send several frames before receiving acknowledgments; we keep a
copy of these frames until the acknowledgments arrive.
This protocol makes use of sliding window at sender and at receiver site. The send window is an
abstract concept defining an imaginary box of size 2m− 1 with three variables: Sf, Sn, and Ssize.
The send window can slide one or more slots when a valid acknowledgment arrives as shown
in Fig.2.29.
The receive window is an abstract concept defining an imaginary box of size 1 with one single
variable Rn. The window slides when a correct frame has arrived; sliding occurs one slot at a
time as shown in Fig. 2.30.
1. Thermal noise (gaussian noise)(the familiar background hiss or static on radios and
telephones), also called white noise, is present in electrical circuits, for example, in the front
end of the receiving equipment. Thermal noise is caused by thermal agitation of electrons in a
conductor. Usually this type of noise is not a problem. Such noise cannot be eliminated and
can often be heard as background noise in radios and telephones.
2. Cross-talkcan be experienced during telephone conversations. You can probably hear another
conversation during your own. Cross-talk can occur by electrical coupling between a nearby
twisted pair or coax cable lines carrying multiple signals. Cross-talk between lines increases
with increased communication distance, increased proximity of the two wires, increased signal
strength, and higher frequency signals. Wet or damp weather can also increase cross-talk.
3. Inter modulation noiseproduces signals at a frequency that is the sum or difference of the
two original frequencies, or multiples of these frequencies. Inter modulation noise is
produced when some non-linearity in the transmitter, receiver, or intervening transmission
system is present. The signals from two circuits combine to form a new signal that falls into a
frequency band reserved for another signal. This type of noise is similar to harmonics in music.
On a multiplexed line, many different signals are amplified together, and slight variations in the
adjustment of the equipment can cause intermodulation noise. A maladjusted modem may
transmit a strong frequency tone when not transmitting data, thus producing this type of noise.
4. Impulsive noise(sometimes called spikes) occurs as short impulses or noise spikes of short
duration and intersperses with short burst of errors. Impulsive noise consists of randomly
occurring unwanted signals. The source of this kind of noise can be switching gear or
thunderstorms, for example. Impulsive noise is not a big problem for analog data, e.g., while
using a telephone, it is possible to understand the telephone conversation with small breaks
caused by noise. Unlike in analog data, this type of noise is the primary cause of errors in data
communication. Impulse noise is heard as a click or a crackling noise and can last as long as
1/100 of a second. It occurs between pairs of wires that are carrying separate signals, in
multiplexed links carrying many discrete signals, or in microwave links in which one antenna
picks up a minute reflection from another antenna. Impulse noise is sharp quick spikes on the
signal caused from electromagnetic interference, lightning, sudden power switching,
electromechanical switching, etc.. These appear on the telephone line as clicks and pops which
are not a problem for voice communication but can appear as a loss of data or even as wrong
data bits during data transfers. Impulse noise has a duration of less than 1 mSec and their
effect is dissipated within 4 mSec.
8. Jitter may affect the accuracy of the data being transmitted because minute variations in
amplitude, phase, and frequency always occur. The generation of a pure carrier signal in an
analog circuit is impossible.. The signal may be impaired by continuous and rapid gain and/or
phase changes. This jitter may be random or periodic. Phase jitter during a telephone call causes
the voice to fluctuate in volume. There are 2 types of Jitter:
Amplitude Jitter
Phase Jitter
Amplitude Jitter is the small constantly changing swings in the amplitude of a signal. It is
principally caused by power supply noise (60 Hz) and ringing tone (20 Hz) on the signal.
Phase Jitter is the small constantly changing swings in the phase of a signal. It may result in the
pulses moving into time slots allocated other data pulses when used with Time Domain
Multiplexing. Telephone company standards call for no more than 10 degrees between 20 and
300 Hz and no more than 15 degrees between 4 and 20 Hz.
9. Harmonic distortion usually is caused by an amplifier on a circuit that does not correctly
represent its output with what was delivered to it on the input side. Phase hits are short-term
shifts "out of phase," with the possibility of a shift back into phase.
10. Propagation DelaySignals transmitted down a phone line will take a finite time to reach the
end of the line. The delay from the time the signal was transmitted to the time it was received
is called Propagation Delay. If the propagation delay was the exact same across the frequency
range, there would be no problem. This would imply that all frequencies from 300 to 3000 Hz
have the same amount of delay in reaching their destination over the phone line. They would
arrive at the destination at the same time but delayed by a small amount called the
propagation delay. This is heard as the delay when talking on long distance telephones. We
have to wait a little longer before we speak to ensure that the other person hasn't already
started to talk. All phone lines have propagation delay.
If the Propagation Delay is long enough, the modem or communications package may time-out
and close the connection. It may think that the receive end has shut off!
11. Envelope Delay DistortionIf the Propagation Delay changes with frequency than we would
have the condition where the lower frequencies such as 300 Hz may arrive earlier or later
than the higher frequencies such as 3000 Hz. For voice communication, this would probably
not be noticeable but for data communication using modems, this could affect the phase of the
carrier or the modulation technique used to encode the data. When the Propagation Delay
varies across the frequency range, we call this Envelope Delay Distortion. We measure
propagation delay in microseconds (us) and the reference is from the worst case to the best
case.
12. Gain Hits: Gain Hits are sudden increase in amplitude that last more than 4 mSec. Telephone
company standards allow for no more than 8 gain hits in any 15 minute interval. A gain hit
would be heard on a voice conversation as if the volume were turned up for just an instance.
Amplitude modulated carriers are particularly sensitive to Gain Hits.
TYPES OF ERRORS
Random single bit errors: if we occasionally just have a dropped bit as in certain types of
memory storage then a parity check or row/column parity/ECC check will be effective
(although redundancy will be high)
Multiple Errors (burst noise): Parity checks have poor performance at identifying multiple
sequential errors but a CRC is effective for detecting them. As noted previously a CRC will
detect any stream of errors shorter than the CRC. Other multi-bit ECC algorithms can detect
and correct burst errors shorter than a given length.
Burst bit error model: Bit errors take place in a correlated manner.
– Periods of low error-rate transmission are interspersed by periods of high error rate
– Low error-rate: similar to random bit error model
– High error-rate: similar to random error vector model
In normal practice bit errors occur in bursts.
Error Prevention
There are many techniques to prevent errors (or at least reduce them) depending upon the
situation.
I. Shielding (protecting wires by covering them with an insulating coating) is one of the best
ways to prevent impulse noise, cross-talk and intermodulation noise. Many different types of
wires and cables are available with different amounts of shielding. In general, the greater the
shielding, the more expensive the cable, and the more difficult it is to install.
II. Moving cables away from sources of noise (especially power sources) can also reduce
impulse noise cross-talk and intermodulation noise. For impulse noise, this means avoiding
lights and heavy machinery. Locating communication cables away from power cables is
always a good idea. For cross-talk, this means physically separating the cables from other
communication cables.
III. Cross-talk and intermodulation noise is often caused by improper multiplexing. Changing
multiplexing techniques (e.g., from FDM to TDM), or changing the frequencies or size of the
guard bands in frequency division multiplexing can help.
IV. Many types of noise (e.g., echoes, white noise, jitter, harmonic distortion) can be caused by
poorly maintained equipment or poor connections and splices among cables. This is
particularly true for echo in fiber optic cables, which is almost always caused by poor
connections. The solution here is obvious: tune the transmission equipment and redo the
connections.
V. To avoid attenuation, telephone circuits have repeaters or amplifiers spaced throughout their
length. The distance between them depends on the amount of power lost per unit length of
the transmission line. An amplifier takes the incoming signal, increases its strength, and
retransmits it on the next section of the circuit. They are typically used on analog circuits
such as the telephone company’s voice circuits. The distance between the amplifiers depends
on the amount of attenuation, although one- to ten-mile intervals are common. On analog
circuits, it is important to recognize that the noise and distortion are also amplified, along
with the signal. This means some noise from a previous circuit is regenerated and amplified
each time the signal is amplified
VI. If the circuit is provided by a common carrier such as the telephone company, you can
lease a more expensive conditioned circuit. A conditioned circuit is one that has been
certified by the carrier to experience fewer errors. There are several levels of conditioning
that provide increasingly fewer errors at increasingly higher cost. Conditioned circuits
employ a variety of the techniques described previously (e.g., shielding) to provide less
noise.
EROR DETECTION TECHNIQUE
DETECTION METHODS
Modulo 2 Arithmetic Modulo 2 arithmetic uses binary addition with no carries,which is just the
exclusive-OR (XOR) operation. Binary subtraction with no carries is also interpreted as the
XOR operation: For example,
Checksums more suitable for software implementation (use only addition and shift).
Used in TCP header and is easy for routers to re-calculate (update) checksum as datagrams
are forwarded.
Can’t detect errors if one or more bits of a segment are damaged and the corresponding bit or
bits of opposite value in a second segment are also damaged.
Detect all errors involving odd number of bits, as well as most errors involving even number
of bits
Anytime a bit inversion is balanced by an opposite bit inversion in the corresponding digit of
another data segment, the error is invisible
Detects all single-bit errors.
Detects all double-bit errors.
Detects 99.999981% of all bursts not exceeding 16 bits.
Detects 99.9985% of all longer bursts.
MULTIPLE ACCESS
We can consider the data link layer as two sublayers. The upper sublayer is responsible for
data link control, and the lower sublayer is responsible for resolving access to the shared
media. If the channel is dedicated, we do not need the lower sublayer.
With all these precautions, there still may be a collision resulting in destroyed data. In addition,
the data may be corrupted during the transmission. The positive acknowledgment and the
time-out timer can help guarantee that the receiver has received the frame.
Procedure
Fig. 3.10 shows the procedure. Note that the channel needs to be sensed before and after the IFS.
The channel also needs to be sensed during the contention time. For each time slot of the
contention window, the channel is sensed. If it is found idle, the timer continues; if the channel
is found busy, the timer is stopped and continues after the timer becomes idle again
2 CONTROLLED ACCESS
In controlled access, the stations consult one another to find which station has the right to
send.
A station cannot send unless it has been authorized by other stations.
The following are the popular controlled-access methods.
A) RESERVATION
A station needs to make a reservation before sending data.
Time is divided into intervals. In each interval, a reservation frame precedes the data frames
sent in that interval.
If there are N stations in the system, there are exactly N reservation mini slots in the
reservation frame. Each mini slot belongs to a station.
When a station needs to send a data frame, it makes a reservation in its own mini slot. The
stations that have made reservations can send their data frames after the reservation frame.
B) POLLING
Polling works with topologies in which one device is designated as a primary station and the
other devices are secondary stations.
All data exchanges must be made through the primary device even when the ultimate
destination is a secondary device. The primary device controls the link; the secondary devices
follow its instructions.
It is up to the primary device to determine which device is allowed to use the channel at a
given time. The primary device, therefore, is always the initiator of a session.
If the primary wants to receive data, it asks the secondary’s if they have anything to send; this
is called poll function.
If the primary wants to send data, it tells the secondary to get ready to receive; this is called
select function.
Select
The select function is used whenever the primary device has something to send.
Remember that the primary controls the link.
If the primary is neither sending nor receiving data, it knows the link is available. If it has
something to send, the primary device sends it. What it does not know, however, is
whether the target device is prepared to receive.
So the primary must alert the secondary to the upcoming transmission and wait for an
acknowledgment of the secondary's ready status. Before sending data, the primary creates
and transmits a select (SEL) frame, one field of which includes the address of the intended
secondary.
Poll
The poll function is used by the primary device to solicit transmissions from the secondary
devices.
When the primary is ready to receive data, it must ask (poll) each device in turn if it has
anything to send.
When the first secondary is approached, it responds either with a NAK frame if it has
nothing to send or with data (in the form of a data frame) if it does. If the response is
negative (a NAK frame), then the primary polls the next secondary in the same manner
until it finds one with data to send.
When the response is positive (a data frame), the primary reads the frame and returns an
acknowledgment (ACK frame), verifying its receipt.
C) TOKEN PASSING
In the token-passing method, the stations in a network are organized in a logical ring. In other
words, for each station, there is a predecessor and a successor. The right to this access has been
passed from the predecessor to the current station. The right will be passed to the successor
when the current station has no more data to send.
But how is the right to access the channel passed from one station to another? In this method,
a special packet called a token circulates through the ring. The possession of the token gives
the station the right to access the channel and send its data.
When a station has some data to send, it waits until it receives the token from its predecessor.
It then holds the token and sends its data. When the station has no more data to send, it
releases the token, passing it to the next logical station in the ring.
The station cannot send data until it receives the token again in the next round. In this
process, when a station receives the token and has no data to send, it just passes the data to
the next station.
Token management is needed for this access method. Token management ensures:
i. Stations must be limited in the time they can have possession of the token.
ii. The token must be monitored to ensure it has not been lost or destroyed. For example, if a
station that is holding the token fails, the token will disappear from the network.
iii. Another function of token management is to assign priorities to the stations and to the types
of data being transmitted. And finally, token management is needed to make low-priority
stations release the token to high priority stations.
Logical Ring
In the physical ring topology, when a station sends the token to its successor, the token cannot
be seen by other stations; the successor is the next one in line. This means that the token does
not have to have the address of the next successor.
The problem with this topology is that if one of the links-the medium between two adjacent
stations fails, the whole system fails.
The dual ring topology uses a second (auxiliary) ring which operates in the reverse direction
compared with the main ring. The second ring is for emergencies only. If one of the links in the
main ring fails, the system automatically combines the two rings to form a temporary ring.
After the failed link is restored, the auxiliary ring becomes idle again. Note that for this
topology to work, each station needs to have two transmitter ports and two receiver ports.
The high-speed Token Ring networks called FDDI (Fiber Distributed Data Interface) and CDDI
(Copper Distributed Data Interface) use this topology.
In the bus ring topology, also called a token bus, the stations are connected to a single cable
called a bus. They, however, make a logical ring, because each station knows the address of its
successor (and also predecessor for token management purposes).
When a station has finished sending its data, it releases the token and inserts the address of its
successor in the token. Only the station with the address matching the destination address of
the token gets the token to access the shared media and removing stations from the ring is
easier.
3. CHANNELIZATION
Channelization is a multiple-access method in which the available bandwidth of a link is
shared in time, frequency, or through code, between different stations.
In this section, we discuss three channelization protocols: FDMA, TDMA, and CDMA.
We need to emphasize that although FDMA and FDM conceptually seem similar, there are
differences between them. FDM, is a physical layer technique that combines the loads from
low-bandwidth channels and transmits them by using a high-bandwidth channel. The
channels that are combined are low -pass. The multiplexer modulates the signals, combines
them, and creates a bandpass signal. The bandwidth of each channel is shifted by the
multiplexer. FDMA, on the other hand, is an access method in the data link layer. The data link
layer in each station tells its physical layer to make a bandpass signal from the data passed to
it. The signal must be created in the allocated band. There is no physical multiplexer at the
physical layer. The signals created at each station are automatically bandpass-filtered. They
are mixed when they are sent to the common channel.
b) POINT-TO-POINT PROTOCOL
It is one the commonly used protocols for point to point connection links, millions of Internet
users who need to connect their home computers to the server of an Internet service provider
use PPP.
PPP frame format’
It provides several services:
PPP defines the format of the frame to be exchanged between devices.
PPP defines how two devices can negotiate the establishment of the link and the exchange of
data.
PPP defines how network layer data are encapsulated in the data link frame.
PPP defines how two devices can authenticate each other.
PPP provides multiple network layer services supporting a variety of network layer protocols.
PPP provides connections over multiple links.
PPP provides network address configuration. This is particularly useful when a home user
needs a temporary network address to connect to the Internet.
To keep PPP simple, several services are missing i.e it lacks the following features:
PPP does not provide flow control. A sender can send several frames one after another with
no concern about overwhelming the receiver.
PPP has a very simple mechanism for error control. A CRC field is used to detect errors. If the
frame is corrupted, it is silently discarded; the upper-layer protocol needs to takecare of the
problem. Lack of error control and sequence numbering may cause a packet to be received out
of order.
PPP does not provide a sophisticated addressing mechanism to handle frames in a multipoint
configuration.
c)X.25
• X.25 is a standard used by many older public networks specially outside the U.S.
• This was developed in 1970s by CCITT for providing an interface between public packet-
switched network and their customers.
• X.25 was developed for computer connections, used for terminal/timesharing connection.
• This protocol is based on the protocols used in early packet switching networks such as
ARPANET, DATAPAC, and TRANSPAC etc.
• X.25 Packet Switched networks allows remote devices to communicate with each other across
high speed digital links without the expense of individual leased lines.
• X.25 is a connection oriented service. It supports switched virtual circuits as well as the
permanent circuits.
• Packet Switching is a technique whereby the network routes individual packets of HDLC data
between different destinations based on addressing within each packet.
• A switched virtual circuit is established between a computer and network when the computer
sends a packet to the network requesting to make a call to other computer.
• Packets can then be sent over this connection from sender to receiver.
• X.25 provides the flow control, to avoid a fast sender overriding a slow or busy receiver.
• A permanent virtual circuit is analogous to-a leased line. It is set up in advance with a mutual
agreement between the users.
d) Frame Relay
Frame relay has evolved from X.25 packet switching and objective is to reduce network
delays, protocol overheads and equipment cost.
Error correction is done on an end-to-end basis rather than a link -to-link basis as in X.25
switching.
Frame relay can support multiple users over the same line and can establish a permanent
virtual circuit or a switched virtual circuit.
Frame relay is considered to be a protocol, which must be carried over a physical link. While
useful for connection of LANs, the combination of low throughput, delay variation and frame
discard when the link is congested will limit its usefulness to multimedia.
Frame relay was developed for taking the advantage of the high data rates and low error rates
in the modem communication system.
The frame relay frame formatis very similar to the HDLC frame except for the missing control
field here.
The control field is not needed because flow and error control are not needed.
Advantages of frame relay:
3. Lower delay.
4. Higher throughput.
6. Frame Relay is cost- effective, partly due to the fact that the network buffering requirements
are carefully optimized.
7. Compared to X.25, with its store and forward mechanism and full error correction, network
buffering is minimal.
8. Frame Relay is also much faster than X.25: the frames are switched to their destination with
only a few byte times delay, as opposed to several hundred milliseconds delay on X.25.
Disadvantages of frame relay:
2. Packets may not be delivered in the same sequence as that at the sending end.
6. Frame discarded in case of network congestion. If congestion occurs in the network, frame
(data) is discarded within the network without retransmission of this frame. The sender must
perform retransmission control at his own responsibility.
e) ISDN
ISDN (Integrated Services Digital Network) is a system of digital phone connections that has
been designed for sending voice, video, and data simultaneously over digital or ordinary
phone lines, with a much faster speed and higher quality than an analog system can provide.
ISDN uses two channels for communication which are the Bearer Channel or the B channel
and the Delta Channel of the D Channel.
The B channel is used for the data transmission and the D channel is used for signaling and
control, though data can be transmitted through the D channels as well.
ISDN has two access options, the Basic Rate Interface, also known as the BRI or the Basic Rate
Access or BRA and Primary Rate Interface or Primary Rate Access.
Basic Rate Interface is made up of two B channels with a bandwidth of 64 Kbit/s and a D
channel with a bandwidth with 16 Kbit/s.
The Basic Rate Interface is also known as 2B+D.
Primary Rate Interface has a greater number of B channels, which varies from nation to nation
across the globe, and a D channel with a bandwidth of 64 Kbit/s. For example, in North
America and Japan a PRI is represented as 23B+D (a total bit rate of 1.544 Mbit/s) while it is
30B+D in Australia and Europe (equivalent to a bit rate of 2.048 Mbit/s).
ISDN is relatively old technology. ISDN is the technology that is often used behind the recent
technology. 0
IEEE STANDARDS
In 1985, the Computer Society of the IEEE started a project, called Project 802, to set
standards to enable intercommunication among equipment from a variety of manufacturers.
Project 802 does not seek to replace any part of the OSI or the Internet model. Instead, it is a
way of specifying functions of the physical layer and the data link layer of major LAN
protocols.
The standard was adopted by the American National Standards Institute (ANSI). In 1987, the
International Organization for Standardization (ISO) also approved it as an international
standard under the designation ISO 8802.
The IEEE has subdivided the data link layer into two sublayers: logical link control (LLC) and
media access control (MAC). IEEE has also created several physical layer standards for
different LAN protocols.
A) DATA LINK LAYER
As we mentioned before, the data link layer in the IEEE standard is divided into two
sublayers: LLC and MAC.
Logical Link Control (LLC)
Data link control handles framing, flow control, and error control.
In IEEE Project 802, flow control, error control, and part of the framing duties are collected
into one sublayer called the logical link control.
Framing is handled in both the LLC sublayer and the MAC sublayer. The LLC provides one
single data link control protocol for all IEEE LANs.
In this way, the LLC is different from the media access control sublayer, which provides
different protocols for different LANs. A single LLC protocol can provide interconnectivity
between different LANs because it makes the MAC sublayer transparent.
Framing LLC defines a protocol data unit (PDU) that is somewhat similar to that of HDLC.
The header contains a control field like the one in HDLC; this field is used for flow and
error control. The two other header fields define the upper-layer protocol at the source
and destination that uses LLC.
These fields are called the destination service access point (DSAP) and the source service
access point (SSAP). The other fields defined in a typical data link control protocol such as
HDLC are moved to the MAC sublayer.
In other words, a frame defined in HDLC is divided into a PDU at the LLC sublayer and a
frame at the MAC sublayer.
The purpose of the LLC is to provide flow and error control for the upper-layer protocols
that actually demand these services. For example, if a LAN or several LANs are used in an
isolated system, LLC may be needed to provide flow and error control for the application
layer protocols. However, most upper-layer protocols such as IP, do not use the services of
LLC
Media Access Control (MAC)
We have already discussed multiple access methods including random access, controlled
access, and channelization. IEEE Project 802 has created a sublayer called media access
control that defines the specific access method for each LAN.
For example, it defines CSMA/CD as the media access method for Ethernet LANs and the
token passing method for Token Ring and Token Bus LANs.
As we discussed in the previous section, part of the framing function is also handled by the
MAC layer. In contrast to the LLC sublayer, the MAC sublayer contains a number of distinct
modules; each defines the access method and the framing format specific to the
corresponding LAN protocol.
STANDARD ETHERNET
The original Ethernet was created in 1976 at Xerox's Palo Alto Research Center (PARC).
Since then, it has gone through four generations: Standard Ethernet (lot Mbps), Fast Ethernet
(100 Mbps), Gigabit Ethernet (l Gbps), and Ten-Gigabit Ethernet (l0 Gbps)
Frame Format
Ethernet does not provide any mechanism for acknowledging received frames, making it what
is known as an unreliable medium.
Acknowledgments must be implemented at the higher layers. The format of the MAC frame is.
· Preamble. The first field of the 802.3 frame contains 7 bytes (56 bits) of alternating Os and Is
that alerts the receiving system to the coming frame and enables it to synchronize its input
timing. The pattern provides only an alert and a timing pulse. The 56-bit pattern allows the
stations to miss some bits at the beginning of the frame. The preamble is actually added at the
physical layer and is not (formally) part of the frame.
· Start frame delimiter (SFD). The second field (l byte: 10101011) signals the beginning of the
frame. The SFD warns the station or stations that this is the last chance for synchronization.
The last 2 bits is 11 and alerts the receiver that the next field is the destination address.
· Destination address (DA). The DA field is 6 bytes and contains the physical address of the
destination station or stations to receive the packet.
· Source address (SA). The SA field is also 6 bytes and contains the physical address of the
sender of the packet.
· Length or type. This field is defined as a type field or length field. The original Ethernet used
this field as the type field to define the upper-layer protocol using the MAC frame. The IEEE
standard used it as the length field to define the number of bytes in the data field. Both uses
are common today.
· Data. This field carries data encapsulated from the upper-layer protocols. It is a minimum of
46 and a maximum of 1500 bytes.
· CRC. The last field contains error detection information, in this case a CRC-32
a) Standard Ethernet.
The Standard Ethernet defines several physical layer implementations; four of the most
common, are.
c) GIGABIT ETHERNET
The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol
(1000 Mbps).
The IEEE committee calls the Standard 802.3z. The goals of the Gigabit Ethernet design can be
summarized as follows:
IEEE 802.11
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the
physical and data link layers.
A) ARCHITECTURE
The standard defines two kinds of services: the basic service set (BSS) and the extended service
set (ESS).
Basic Service Set
IEEE 802.11 defines the basic service set (BSS) as the building block of a wireless LAN. A basic
service set is made of stationary or mobile wireless stations and an optional central base
station, known as the access point (AP). Fig. 3.23 shows two sets in this standard. The BSS
without anAP is a stand-alone network and cannot send data to other BSSs. It is called an ad
hocarchitecture. In this architecture, stations can form a network without the need of an AP;
theycan locate one another and agree to be part of a BSS. A BSS with an AP is sometimes
referred to as an infrastructure network.
Extended Service Set
An extended service set (ESS) is made up of two or more BSSs with APs. In this case, the BSSs are
connected through a distribution system, which is usually a wired LAN. The distribution
system connects the APs in the BSSs. IEEE 802.11 does not restrict the distribution system; it
can be any IEEE LAN such as an Ethernet. Note that the extended service set uses two types of
stations: mobile and stationary. The mobile stations are normal stations inside a BSS. The
stationary stations are AP stations that are part of a wired LAN. Fig. 3.24 shows an ESS
Piconet
Although a piconet can have a maximum of seven secondaries, an additional eight secondaries
can be in the parked state. A secondary in a parked state is synchronized with the primary, but
cannot take part in communication until it is moved from the parked state. Because only eight
stations can be active in a piconet, activating a station from the parked state means that an
active station must go to the parked state.
Scatternet
Piconets can be combined to form what is called a scatternet. A secondary station in one piconet
can be the primary in another piconet. This station can receive messages from the primary in
the first piconet (as a secondary) and, acting as a primary, deliver them to secondaries in the
second piconet. A station can be a member of two piconets. Fig. 3.26 illustrates a scatternet.
Scatternet
B) BLUETOOTH LAYERS
Bluetooth uses several layers that do not exactly match those of the Internet model Fig. 3.27
shows these layers.
Bluetooth layers
Radio Layer
The radio layer is roughly equivalent to the physical layer of the Internet model. Bluetooth
devices are low-power and have a range of 10 m. Bluetooth uses a 2.4 -GHz ISM band divided
into 79 channels of 1 MHz each. Bluetooth uses the frequency-hopping spread spectrum
(FHSS) method in the physical layer to avoid interference from other devices or other
networks. Bluetooth hops 1600 times per second, which means that each device changes its
modulation frequency 1600 times per second. To transform bits to a signal, Bluetooth uses a
sophisticated version of FSK, called GFSK.
Baseband Layer
The baseband layer is roughly equivalent to the MAC sublayer in LANs. The access method is
TDMA. The primary and secondary communicate with each other using time slots. The length
of a time slot is exactly the same as the dwell time, 625µs. This means that during the time
that one frequency is used, a sender sends a frame to a secondary, or a secondary sends a
frame to the primary. Note that the communication is only between the primary and a
secondary; secondaries cannot communicate directly with one another.
L2CAP
The Logical Link Control and Adaptation Protocol, or L2CAP (L2 here means LL), is roughly
equivalent to the LLC sublayer in LANs. It is used for data exchange on an ACL link; SCQ
channels do not use L2CAP. Figure 14.25 shows the format of the data packet at this level. The
I6-bit length field defines the size of the data, in bytes, coming from the upper layers. Data can
be up to 65,535 bytes. The channel ID (CID) defines a unique identifier for the virtual channel
created at this level (see below). The L2CAP has specific duties: multiplexing, segmentation
and reassembly, quality of service (QoS), and group management.
Network Troubleshooting
Network troubleshooting is the collective measures and processes used to identify, diagnose
and resolve problems and issues within a computer network.
It is a systematic process that aims to resolve problems and restore normal network
operations within the network.
Network troubleshooting is primarily done by network engineers or administrators to repair
or optimize a network. It is generally done to recover and establish network or Internet
connections on end nodes/devices.
Some of the processes within network troubleshooting include but are not limited to:
Network troubleshooting can be a manual or automated task. When using automated tools,
network management can be done using network diagnostic software.
Network security is the process by which digital information assets and data are protected.
Computer Security means to protect information. It deals with prevention and detection of
unauthorized actions by users of a computer.
The goals of network security are as follows:
■Protect confidentiality
■Maintain integrity
■Ensure availability
It is important that all networks be protected from threats and vulnerabilities for a business
to achieve its fullest potential.
Typically, these threats are persistent because of vulnerabilities, which can arise from the
following:
■End-user carelessness
Vulnerability
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to
attack i.e A weakness that is inherent in every network and device. This includes routers,
switches, desktops, servers, and even security devices themselves.
A vulnerability may also refer to any type of weakness in a computer system itself, in a set of
procedures, or in anything that leaves information security exposed to a threat.
Vulnerabilities are what information security and information assurance professionals seek to
reduce.
Cutting down vulnerabilities provides fewer options for malicious users to gain access to
secure information.
Computer users and network personnel can protect computer systems from vulnerabilities by
keeping software security patches up to date. These patches can remedy flaws or security
holes that were found in the initial release.
Computer and network personnel should also stay informed about current vulnerabilities in
the software they use and seek out ways to protect against them.
Classification of vulnerabilities
hardware vulnerabilities
susceptibility to humidity
susceptibility to dust
susceptibility to soiling
susceptibility to unprotected storage
software vulnerabilities
insufficient testing
lack of audit trail
network vulnerabilities
unprotected communication lines
insecure network architecture
personnel vulnerabilities
inadequate recruiting process
inadequate security awareness
site vulnerabilities
area subject to flood
unreliable power source
organizational vulnerabilities
lack of regular audits
lack of continuity plans
lack of security
Threats
The people eager, willing, and qualified to take advantage of each securityweakness, and they
continually search for new exploits and weaknesses.
In computer security a threat is a possible danger that might exploit a vulnerability to breach
security and thus cause possible harm.
A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal
organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the
possibility of an "act of God" such as an earthquake, a fire, or a tornado) or otherwise a
circumstance, capability, action, or event.
Threats classification
Type
o Physical damage
fire
water
pollution
o natural events
climatic
seismic
volcanic
electrical power
air conditioning
telecommunication
o compromise of information
eavesdropping,
theft of media
o technical failures
equipment
software
capacity saturation
o compromise of functions
error in use
abuse of rights
denial of actions
Origin
spying
o accidental
equipment failure
software failure
o environmental
natural event
using easily available hacking tools such as shell scripts and password crackers. Even
unstructured threats that are only executed with the intent of testing and challenging a
hacker’s skills can still do serious damage to a company. For example, if an external company
website is hacked, the integrity of the company is damaged. Even if the external website
is separate from the internal information that sits behind a protective firewall, the public
does not know that. All the public knows is that the site is not a safe environment to
conduct business.
■Structured threats— Structured threats come from hackers who are more highly motivated
and technically competent. These people know system vulnerabilities and can understand
and develop exploit code and scripts. They understand, develop, and use sophisticated
hacking techniques to penetrate unsuspecting businesses. These groups are often involved
with the major fraud and theft cases reported to law enforcement agencies.
■External threats—External threats can arise from individuals or organizations working outside
of a company. They do not have authorized access to the computer systems or network.
They work their way into a network mainly from the Internet or dialup access servers.
■Internal threats—Internal threats occur when someone has authorized access to the network
with either an account on a server or physical access to the network. According to the
FBI, internal access and misuse account for 60 percent to 80 percent of reported incidents.
a) Network security threats:
i. hacking
ii. unauthorized access
iii. tapping
iv. eavesdropping
v. spying
vi. phishing
b) Security techniques
Password
Encryption techniques
Authentication
Privileges - A special right, advantage, or immunity granted or available only to one person or
group of people.
INTERNET.
What is the Internet?
It is a large no. of connected computers (or a large set of computer networks) linked together
that communicate with each other, over telephone lines.
It is a worldwide computer network connecting thousands of computer networks, through a
mixture of private & public data using the telephone lines.
It is a worldwide (global or an international) network of computers that provide a variety of
resources and data to the people that use it.
Internet refers to a global inter-connection of computers and computer networks to facilitate
global information transfer. It is an interconnection of computers throughout the world,
using ordinary telecommunication lines and modems.
The other names for the Internet are:
- The Net.
- Information Superhighway.
- Cyber space.
HISTORY (DEVELOPMENT) OF THE INTERNET.
The Internet was started by the U.S Department of Defence in 1969 as a network of 4 computers
called ARPANET. Its aim was to connect a set of computers operated by several Universities
and Scientists doing military research so as to enable them share research data.
The original network grew as more computers were added to it. By 1974, 62 computers were already
attached.
In 1983, the Internet split into 2 parts; one dedicated exclusively (solely/only) to military installations
(called Milnet), and the other dedicated to university research (called the Internet), with around
1,000 host computers.
In 1985, the Canadian government developed the BITNET to link all the CanadianUniversities, and
also provided connections into the U.S Internet.
In 1986, the U.S National Service Foundation created NSFNET to connect leading U.S universities.
By the end of 1987, there were 10,000 host computers on the Internet and 1,000 on BITNET.
In 1987, the National Science Foundation leased (acquired/rent) high-speed circuits to build a new
high-speed backbone for NSFNET. In 1988, it connected 13 regional internal networks
containing 170 LAN‟s and 56,000 host computers.
The Canadian Research Council followed in 1989, replacing BITNET with a high-speed network
called CA*net that used the Internet protocols. By the end of 1989, there were almost 200,000
host computers on the combined U.S and Canadian Internet.
Similar initiatives (plans/projects) were undertaken by other countries in the world, such that by the
early 1990s, most of the individual country networks were linked together into one worldwide
network of networks.
Each of these individual country networks was different (i.e., each had its own name, access rules,
and fees structure), but all the networks used the same standard as the U.S Internet network. So,
users could easily exchange messages with each other.
By 1990s, the differences among the networks in each of the countries had disappeared, and the U.S
name; Internet began to be used to mean the entire worldwide system of networks that used the
Internet TCP/IP protocols.
A Protocol - a set of rules and standards that computers use to communicate with each other over a
Network.
(i). The Internet is a collection of networks; it is not owned or controlled by any single
organization, and it has no formal management organization. However, there is an Internet
Society that co-ordinates and sets standards for its use.
In addition, Networks have no political boundaries on the exchange of information.
(ii). Networks are connected by Gateways that effectively remove barriers so that one type of
network can “talk” to a different type of network.
(iii). To join the Internet, an existing network will only be required to pay a small registration fee
and agree to certain standards based on TCP/IP.
The costs are low, because the Internet owns nothing, and so it has no real costs to offset. Each
organization pays for its own network & its own telephone bills, but these costs usually
exist independent of the Internet.
(iv). Networks that join the Internet must agree to move each other‟s traffic (data) at no charge
to the others, just as it is the case with mail delivered through the International Postal
system. This is why all the data appear to move at the cost of a local telephone call, making
the Net a very cheap communication media.
FUNCTIONS OF THE INTERNET.
1. Communication.
Many people all over the world use the Internet to communicate with each other.
Internet communication capabilities include; E-mail, Usenet Newsgroups, Chatting and Telnet.
You can send e-mails to your friends anywhere in the world, chat with your friends, send
instant messages, etc.
2. Information retrieval.
The Internet is a library. Thousands of books, magazines, newspapers and encyclopedias can be
read on the Internet.
3. Easy-to-use offerings of information and products.
You can find information for your school assignments, buy books online, check what the weather
is like anywhere in the world, and much more.
INTERNET SERVICES.
The following are some of the services offered by Internet:
E-mail is a quick, cheap, efficient & convenient means of communication with both individuals and
groups. It is faster than ordinary mail, easy to manage, inexpensive and saves paper.
With Internet mail, it is possible to send and receive messages quickly from businesses, friends or
family in another part of the world. An E-mail message can travel around the world in minutes.
Fax services.
Fax services enable individuals & businesses to send faxes through e-mail at a lower cost compared
to the usual international Fax charges.
Conference services.
Conferencing on the Web can be defined as the dynamic exchange of all kinds of information –
text, graphics, audio, video, etc – in a situation whereby the conversations are organized by item
and allows a participant to contribute spontaneous responses to any item in the conversation.
Chatting.
Internet Relay Chat (IRC) is a chatting system on the Internet that allows a large no. of people from
various locations of the world who are on the computer to chat (i.e., simultaneously hold live and
interactive electronic conversations) among themselves.
You can join discussion groups on the Internet and meet people around the world with similar
interests. You can ask questions, discuss problems and read interesting stories.
Anyone interested in chatting can join a discussion forum on one of the listed topics. Only people
who happen to be signed on at the same time are able to talk because messages are not stored.
This discussion can be an effective business tool if people who can benefit from interactive
conversation set a specific appointment to meet and talk on a particular topic.
Disadvantage.
(i). Usually, the topic is open to all without security; so intruders can participate.
Information retrieval.
The Internet is a voluntarily decentralized network with no central listing of participants or sites.
Therefore, End-users, usually working from PCs are able to search & find information of interest
located in different sites assisted by special software and data stored in readily usable formats.
The Internet gives you information on almost any subject. This is because of the Worldwide Web
(www).
The World Wide Web is a global (an international) system of connected Web pages containing
information such as, text, pictures, sound and video. The WWW is hypertext based (i.e., it is able
to access text and graphical data formatted for easy search, retrieval and display).
With the WWW, you can review Newspapers, magazines, academic papers, etc. In addition,
Governments, colleges, universities, companies and individuals offer free information on the
Internet. E.g., you can inquire (find out) about universities in Britain or America.
Note. Its major problem is finding what you need from among the many storehouses of data found in
databases and libraries all over the world.
Downloading of Programs.
There are thousands of programs available on the Internet. These programs include; Word
processors, Spreadsheets, Electronic cards, etc.
You can therefore, look for the latest software over the Internet, e.g., you can get the latest Anti-virus
software, and in addition, retrieve a free trial issue.
Entertainment.
There are hundreds of simple games available on the Internet. These include; Chess, Football, etc.
The Internet also allows you review current Movies and hear Television theme songs.
Online Shopping.
You can order goods and services on the Internet without leaving your desk. E.g., you can view a
catalogue of a certain clothes shop over the Internet and fill in an online Order form.
Commercial enterprises use the Web to provide information on demand for purposes of customer
support, marketing and sales.
File Transfer.
Data in the form of files can be transferred across the Internet from one site to another using theFile
Transfer Protocol (FTP). FTP software is needed at both ends to handle the transfer. It is
through FTP that the two pieces of software manage to „understand‟ each other.
Discussion Groups.
A Discussion group is a collection of users who have joined together to discuss some topic.
There are many discussions on different topics including Cooking, Skydiving, Politics, Education,
recreational, scientific research, etc.
Using a facility on the Internet called USENET, individuals can gain access to a very wide
variety of information topics.
Usenet Newsgroups are usually worldwide discussion groups in which people share
information and ideas on a defined topic through large electronic Bulletin Boards where
anyone can read any articles or write articles and post messages on the topic for others to
see and respond to.
The individuals can add messages to different topics and read those contributed by others. For
instance, users such as students can ask questions about problems they face, or they could
contribute or give an advice on how to improve the teaching of the subject.
Messages can be easily linked so that it is easy to know messages that are related.
Establishing a new newsgroup requires a vote of all interested people on the Internet. If
enough people express interest, the new topic is established.
Note. To join a Newsgroup and be able to read messages on various topics, your computer
must have Newsreader software such as Outlook Express, or Internet News.
Any Internet user can access some of these newsgroups, while other newsgroups will require to
subscribe to a specific topic or set of topics.
Once you have subscribed, each time you access the newsgroups you are informed of any new
messages added to the topics. You can then read these messages and respond to them by
adding your own message.
The Usenet software receives “postings” of information and transmits new postings to users
who have registered their interest in receiving the information. Each individual posting
takes the form like that used for e-mail.
There are over 10,000 such newsgroups; however, each Usenet site is financed independently
& controlled by a Site Administrator, who carries only those groups that he/she chooses.
List servers are more focused that the Usenet newsgroups and have fewer members. They are
harder to find than the Usenet newsgroups because literally anyone can create one.
Video Conferencing.
Video conferencing provides real-time transmission of video & audio signals to enable people in 2 or
more locations to have a meeting.
The Internet has a facility called TELNET that enables a user on one computer to use another
computer across the network, i.e., the user is able to run programs on the other machine as if
he/she is a local user.
Telnet is a protocol, which enables a user on one computer to log in to another computer on the
Internet.
TELNET establishes an error-free, rapid link between two computers, allowing a user to log on to
his/her home computer from a remote computer even when traveling. You can also log on to and
use third-party computers that have been made available to the public.
TELNET will use the computer address you supply to locate the computer you want to reach and
connect you to it. You will, of course, have to log in & go through any security procedures you,
your company, or the third-party computer owner have put in place to protect that computer.
Telnet requires an application image program on the Client computer and an application layer
program on the Server of the host computer. Many programs conform to the Telnet Standard
(e.g., EWAN).
Once Telnet enables the connection from the Client to the Server, you can log in by use of
commands. The exact commands to gain access to these newsgroups vary from computer to
computer.
Telnet enables you to connect to a remote computer without incurring long-distance telephone
charges.
Telnet can be useful because, it enables you to access your Server or Host computer without sitting at
its Keyboard.
Telnet can be faster or slower than a modem, depending on the amount of traffic on the Internet.
Note. Telnet is insecure, because everyone on the Internet can attempt to log in your computer and
use it as they wish. One commonly used security precaution is to prohibit remote log ins via Tel-
net unless a user specifically asks for his/her account to be authorized for it, or permit remote log
ins only from a specific set of Internet addresses., e.g., the Web server at a university can be
configured to only accept telnet log ins from computers located on the Kabete Campus network.
Electronic Commerce.
Many people are actively using the Internet for Electronic Commerce (i.e., doing business on the
Internet).
The use of the Internet in E-commerce isnot necessary for making money as such, but mainly to find
information, improve communication and provide information.
Many people automatically focus on the retail aspect of e-commerce, i.e., selling products to
individuals. However, this is just one small part of e-commerce. The fastest group and the
largest segment of e-commerce is business-to-business settings.
There are 4 ways in which the Web can be used to support E-commerce;
(i). Electronic Store.
Electronic Store is a Website that lists all the products or services a business wishes to sell,
thus enabling customers to purchase them by using the Internet itself.
By doing so, such sites provide a wealth of information about the firms and products complete
with technical details and photos. Customers can review these but cannot buy over the
Web. The idea is to encourage the user to visit a local dealer, who will then make a sale.
Computers also use e-marketing sites to provide newsletters with information on the latest
products and tips on how to use them. Other companies enable potential customers to sign
up for notification of new product releases.
E-marketing is cheaper in many ways than traditional marketing (radio, direct marketing, TV or
print media). This is because while it costs the same to develop these traditional media, it
costs nothing to send information to the customers. It is also easier to customize the
presentation of information to a potential customer, because the Web is interactive. In
contrast, the other media are fixed once they are developed, and they provide the same
marketing approach to all who use it.
(iii). Information/Entertainment provider.
The Information/Entertainment provider supplies information (in form of text or graphics) or
entertainment. These providers provide information from many sources with an aim of
helping the users.
Several radio and TV stations are using the Web to provide broadcast of audio and video. The
Web also offers new forms of real entertainment e.g., enables new multiplayer interactive
games, which are not available in any other media. The information / entertainment
providers generate revenue by selling advertisement printouts.
(iv). Customers Service sales.
This provides a variety of information for customers after they have purchased a product or
service – to allow customers access most commonly needed information 24 hrs a day.
Many software companies post updates that fix problems so that customers can download for
themselves.
Customer service sites benefit both the company and the customers. They enable customers to
get a 24 hr support and easy access to needed information.
They often reduce the no. of staff needed by automating routine information requests that
previously had to be handled by an employee.
GroupWare.
GroupWare is a software that helps groups of people to work together more productively.
Both e-mail and documents-based GroupWare are designed to support individuals and groups
working in different places at different times. They are not suited to support groups working
together at the same time and in the same place. In addition, they don‟t provide advanced tools
for helping groups to make decisions.
Group Support Systems (GSS) are software tools, designed to improve group‟s decision-making.
GSS are used with special-purpose meeting rooms that provide each group member with a
network computer plus a large screen video projection system that acts as electronic blackboards.
These rooms are equipped with special-purpose GSS software that enables participants to
communicate, propose ideas, analyse options, evaluate alternatives, etc. Typically, a meeting
facilitator assists the group.
The group members can either discuss verbally or use computers to type ideas and information,
which are then shared with all other group members via the network. For large groups where
only one person can speak at a time, typing ideas is faster than talking. Everyone has the same
opportunity to contribute and ideas can be collected much faster. In addition, GSS enables users
to make anonymous comments. Without anonymity, certain participants may withhold ideas
because they fear their ideas may not be well received.
The system also provides tools to support voting and ranking of alternatives, so that more structured
decision-making process can be used.
Just like in document-based GroupWare, vendors use the Web browser as their client software. So,
almost anyone can access GroupWare Server.
Note. Discussion groups, document-based GroupWare and GSS all focus on the transmission of text
and graphical images.
Information Superhighway.
A facility that provides a global electronic data interchange between computer users at a
higher rate of message exchange, and at cheaper costs. E.g., the Internet that allows
researchers, businesses, and electronic media to exchange information.
An Information Communication Technology (ICT) network, which delivers all kinds of
electronic services – audio, video, text, and data to households and businesses.
The communication services on the superhighway can be one-to-oneway (Telephones, e-mail, fax,
etc); one-to-many (Broadcasting, interactive TV, video conferencing, etc), many-to-many
(typified by bulletin boards and forums on the Internet).
Origin.
The concept emerged as the brainchild (idea) of U.S vice president Al Gore. It is an alliance
between the Federal government and a no. of industries.
The Information superhighway describes networks of Optic fiber and Coaxial cable linked by
sophisticated switches that can deliver voice, data, image, text, and video signals all in the same
digital language.
In the U.S, it has been proclaimed (declared) as the foundation for a national transformation to an
information-based society, and a key element in the national efforts to sustain leadership in the
world economy.
Governments and industries are developing a new method of competition, which will enable
telecommunications, cable television, computer hardware and software companies, and
entertainment corporations to work together to create and operate information superhighways.
These activities will finally result into a wide range of electronic services including electronic
Shopping malls, collaborate electronic Education and distance learning, electronic Libraries,
Multimedia information, messaging, and entertainment.
Web casting.
Web casting (or “Push technology”) is a special application of the Web that has the potential to
dramatically change the way we use the Web /Internet.
With Web casting, the user signs up for a type of information on a set of channels. Regularly
(minutes, hours, days), the user browser contacts the Web server providing these channels to see
if they have been updated. If so, the browser will load the information, and if required by the
user, will automatically display the information on the user screen.
Web casting changes the nature of the Web from one in which the user searches for information (a
“pull” environment) into an environment in which the user accepts whatever information is on the
Webcast Server (a “push” environment). This is called the “Push” because the user does not
request specific information, but rather permits the Web server to “push” the information when it
becomes available.
The Web has been likened to a library because users move form site to site and page to page just like
they move from shelf to shelf and book to book in a library.
Web casting is more like TV because the content and time of delivery is selected using the Web
caster, the user only chooses the channels.
Web casting can be used for news (e.g., CNN) or financial reports (e.g., Stock market quotations),
Corporate announcement, and as a replacement for broadcast e-mail. It even has the potential to
provide automatic updates to software packages.
Considering the facilities & the various tools offered, the Internet has attracted among others the
following users;
Exercise (a).
Exercise (b).
Downloadingis the process of copying files from one computer to another by using a
Modem or a network connection. You canalso download files from the Web to your hard
disk.
HTML (Hypertext Markup Language) -The language used to create Web pages. To
view HTML documents, use Web browsing Software.
√ If you want to get some information concerning an area or subject of interest over the Web
but you do not know where to find it, you can use a Search engine to locate sites that contain
the information.
√ Locate particular information in a Website, e.g., if you wish to read the Sports news you
canload a Web site likehttp://www.cnn.com/, and then use a search engine within that site to
locate information on Sports.
The following are the various search engines:
A Modem is a device that enables you to connect to the Internet, and access information.
The Modem must be fast. This helps to reduce the amount of time spent waiting for Web pages,
files, or messages from the Internet.
Modem speeds are expressed in Bits per second (bps). The typical speeds are 9,600 bps, 4.4
Kbps (Kilobits per second), 28.8 Kbps, 56 Kbps, etc.
5). Web Address (Uniform Resource Locator – URL). An Address is the location of a
file.
6). Internet Service Provider (ISP).
When connecting to the Internet using a modem, you need to sign up with an Internet Service
Provider (ISP).
An ISP usually has a no. of Host computers. These host computers usually provide space for
the storage of user‟s electronic mail messages, storage of user‟s Web sites and a set of related
facilities such as, advice, support software and appropriate security.
(i). Username – Every time you get connected, you require a name to identify yourself on
the Internet.
(ii). Password – This is needed for security purposes. It ensures that your Internet account
is secure.
Note. ISPs charge for the services rendered.
7). Website.
This is an area in the Internet where information of a particular organization is kept. The
Website must be updated on daily basis.
Content Provider - A business that uses the Internet to supply you with information such as news,
weather, business reports & entertainment.
World Wide Web.
The World Wide Web (www).
The World Wide Web is also known as the Web, WWW or W3.
The WWW is a collection of hyperlinked Web pages published on the Internet.
The World Wide Web is a global (an international) system of connected Web pages
containing information such as, text, pictures, sound and video. The WWW is hypertext
based (i.e., it is able to access text & graphical data formatted for easy search, retrieval and
display).
Web Site.
A collection of Web pages belonging to an organization or individual. These organizations
or individuals maintain the Website.
Web site - A group of related Web pages.
A Web site is a screen or a collection of screens that provide information in text or graphical
form that can be viewed by Internet users by activating the appropriate icon or commands.
Web pages.
Web pages are documents published by organizations and individuals who are interested in
putting themselves on the Web. Web pages can include text, pictures, sound and video.
Web page is a location on the WWW, usually a Web site.
The Web pages can also be found on company Intranets.
Intranets and Extranets.
Intranet
An Intranet is an internal corporate network used in organizations to enable the sharing of
documents among coworkers. It supports users inside one organization (usually on a LAN).
Intranet - A private network within an organization. It can connect all types of computers
within an organization.
Extranet:
An Extranet works in much the same manner as an Intranet, but provides information to selected
users outside the organization. The networks can be accessed by members who are not part of the
organisation through logging on where they are authenticated and authorised.
Browsing the Web.
This is also known as Navigating or „Surfing’ the Web.