Chapter 4 Networking
Chapter 4 Networking
Chapter 4 Networking
10Base5 uses – thick coaxial cable, vampire taps, speed is 10 Mbps, baseband signal,
support segment upto 500meters,
10Base2 uses – thin coaxial cable, BNC Connector, Speed is 10 mbps, baseband signal,
support segment upto185 meter, appxoximately 30 machines can connect
10BaseT uses – central hub to solve the problem aasociated with finding cable
breakdown.
10BaseF uses -
Fig. Variation in topology, cabling as per standard
Medium Access Control Sublayer
(MAC sublayer)
• It is responsible for flow control and
multiplexing for transmission medium.
• It controls the transmission of data packets via
remotely shared channels.
• It sends data over the network interface card.
MAC Layer and LLC Layer in the OSI Model
Disadvantages of NIC
• NIC is inconvenient as compared to the wireless card.
• For wired NIC, a hard-wired connection is required.
• NIC needs a proper configuration to work efficiently.
• NIC cards are not secure, so the data inside NIC is not safe.
Wireless LANs
• Wireless LANs (WLANs) are wireless computer
networks
• Uses high-frequency radio waves for connecting the
devices within a limited area forming LAN (Local Area
Network).
• Users connected by wireless LANs can move around
within this limited area such as home, school, campus,
office building, railway platform, etc.
• Most WLANs are based upon the standard IEEE 802.11
standard or WiFi.
Components of WLANs
The components of WLAN architecture as laid down in IEEE 802.11 are
• Stations (STA) − Stations comprises of all devices and equipment
that are connected to the wireless LAN. Each station has a wireless
network interface controller. A station can be of two types −
– Wireless Access Point (WAP or AP)
– Client
• Basic Service Set (BSS) − A basic service set is a group of stations
communicating at the physical layer level. BSS can be of two
categories −
– Infrastructure BSS
– Independent BSS
• Extended Service Set (ESS) − It is a set of all connected BSS.
• Distribution System (DS) − It connects access points in ESS.
Types of WLANS
WLANs, as standardized by IEEE 802.11, operates in
two basic modes
• Infrastructure Mode − Mobile devices or clients
connect to an access point (AP) that in turn
connects via a bridge to the LAN or Internet. The
client transmits frames to other clients via the AP.
• Ad Hoc Mode − Clients transmit frames directly to
each other in a peer-to-peer fashion.
MAC Sublayer Frame Structure of IEEE
802.11
• WLAN or WiFi uses high frequency radio waves
• The 802.11 MAC sublayer provides an abstraction of
the physical layer to the logical link control sublayer
and upper layers of the OSI network.
• It is responsible for encapsulating frames
• describing frame formats.
The main fields of a frame in WLANs as laid down by
IEEE 802.11 are as depicted in the following diagram
• Frame Control −It is a 2 bytes starting field composed
of 11 subfields. It contains control information of the
frame. The 11 subfields are −
• Protocol version − The first sub-field is a two – bit
field set to 00. It has been included to allow future
versions of IEE 802.11 to operate simultaneously.
• Type − It is a two-bit subfield that specifies whether
the frame is a data frame, control frame or a
management frame.
• Subtype − it is a four – bit subfield states whether the
field is a Request to Send (RTS) or a Clear to Send
(CTS) control frame. For a regular data frame, the
value is set to 0000.
• To DS − A single bit subfield indicating whether the
frame is going to the access point (AP), which
coordinates the communications in centralised
wireless systems.
• From DS − A single bit subfield indicating whether
the frame is coming from the AP.
• More Fragments − A single bit subfield which when
set to 1 indicates that more fragments would follow.
• Retry − A single bit subfield which when set to 1
specifies a retransmission of a previous frame.
• Power Management − A single bit subfield indicating
that the sender is adopting power-save mode.
• More Data − A single bit subfield showing that sender has further
data frames for the receiver.
• Protected Frame − A single bit subfield indicating that this is an
encrypted frame.
• Order − The last subfield, of one – bit, informs the receiver that
to the higher layers the frames should be in an ordered
sequence.
• Duration − It is a 2-byte field that specifies the time period for
which the frame and its acknowledgement occupy the channel.
• Address fields - There are three 6-byte address fields containing
addresses of source, immediate destination and final endpoint
respectively.
• Sequence − It a 2 bytes field that stores the frame numbers. It
detects duplicate frames and determines the order of frames for
higher layers. Among the 16 bits, the first 4 bits provides
identification to the fragment and the rest 12 bits contain the
sequence number that increments with each transmission.
• Data − This is a variable sized field that carries
the payload from the upper layers. The
maximum size of data field is 2312 bytes.
• Frame Check Sequence (FCS) − It is a 4-byte
field containing error detection information.
Wireless Frame Types
• Management frames: Used for joining and
leaving a wireless cell. Management frame
types include association request, association
response, and reassociation request, just to
name a few.
• Control frames: Used to acknowledge when
data frames are received.
• Data frames: Frames that contain data.
Bluetooth
• Bluetooth technology allows devices to communicate
with each other without cables or wires.
• Bluetooth relies on short-range radio frequency
• any device that incorporates the technology can
communicate as long as it is within the required
distance.
For example
1. you may be able to operate your computer with a
wireless keyboard
2. use a wireless headset to talk on your mobile phone.
Architecture
• Bluetooth network technology connects mobile
devices wirelessly over a short-range to form a
personal area network (PAN).
• The Bluetooth architecture has its own independent
model with a stack of protocols, instead of following
the standard OSI model or TCP/IP model.
• The protocols in the Bluetooth standard can be loosely
grouped into the physical layer, data link layer,
middleware layer, and application layer as shown in
the following diagram
Protocols in the Bluetooth Architecture
• Physical Layer − This includes Bluetooth radio
and Baseband (also in the data link layer.)
– Radio − This is a physical layer equivalent protocol
that lays down the physical structure and
specifications for transmission of radio waves. It
defines air interface, frequency bands, frequency
hopping specifications, and modulation techniques.
– Baseband − This protocol takes the services of radio
protocol. It defines the addressing scheme, packet
frame format, timing, and power control algorithms.
• Data Link Layer − This includes Baseband, Link Manager
Protocol (LMP), and Logical Link Control and Adaptation
Protocol (L2CAP).
– Link Manager Protocol (LMP) − LMP establishes logical links
between Bluetooth devices and maintains the links for enabling
communications. The other main functions of LMP are device
authentication, message encryption, and negotiation of packet
sizes.
– Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP
provides adaption between upper layer frame and baseband
layer frame format. L2CAP provides support for both
connection-oriented as well as connectionless services.
• Middleware Layer − This includes Radio Frequency
Communications (RFComm) protocol, adopted protocols, SDP,
and AT commands.
– RFComm − It is short for Radio Frontend Component. It provides a
serial interface with WAP.
– Adopted Protocols − These are the protocols that are adopted from
standard models. The commonly adopted protocols used in Bluetooth
are Point-to-Point Protocol (PPP), Internet Protocol (IP), User
Datagram Protocol (UDP), Transmission Control Protocol (TCP), and
Wireless Application Protocol (WAP).
– Service Discovery Protocol (SDP)− SDP takes care of service-related
queries like device information so as to establish a connection
between contending Bluetooth devices.
– AT Commands − ATtention command set.