اسس الشبكات
اسس الشبكات
Client Client
Client Client
Client Client
FUNDAMENTAL
NETWORK
CLASSIFICATIONS
(CONT)
Wide Area Network
Fundamental Network
Classifications (cont)
METROPOLITAN AREA
NETWORK (MAN)
INTRANET AND INTERNET SPECIFICATIONS
Intranet: An intranet is a private network that is contained within an enterprise.
It may consist of many interlinked local area networks and also use leased
lines in the wide area network.
An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks
like a private version of the Internet. With tunneling, companies can send
private messages through the public network, using the public network with
special encryption/decryption and other security safeguards to connect one
part of their intranet to another.
Internet: is a worldwide system of computer networks - a network of networks
in which users at any one computer can, if they have permission, get
information from any other computer (and sometimes talk directly to users at
other computers).
CLIENT AND SERVER COMPUTER ROLE IN
NETWORKING
Server computer is a core component of the network, providing a link to the
resources necessary to perform any task.
A server computer provides a link to the resources necessary to perform any
task.
The link it provides could be to a resource existing on the server itself or a
resource on a client computer.
Client computers normally request and receive information over the network
client. Client computers also depends primarily on the central server for
processing activities
PEER-TO PEER NETWORK
A peer-to-peer network is a network where the computers act as both
workstations and servers.
great for small, simple, and inexpensive networks.
In a strict peer-to-peer networking setup, every computer is an equal, a
peer in the network.
Each machine can have resources that are shared with any other
machine.
There is no assigned role for any particular device, and each of the
devices usually runs similar software. Any device can and will send
requests to any other.
PEER-TO PEER NETWORK
(CONT..)
CLIENT/SERVER NETWORKING
In this design, a small number of computers are
designated as centralized servers and given the task
of providing services to a larger number of user
machines called clients
CLIENT/SERVER
NETWORKING (CONT..)
NETWORK TOPOLOGY
A topology is a way of “laying out” the network.
Topologies can be either physical or logical.
Physical topologies describe how the cables are run.
Logical topologies describe how the network
messages travel
NETWORK TOPOLOGY (CONT.)
Advantages and
Disadvantages of Network
Topologies
2 ﻓﯾدﯾو رﻗم
HARDWARE, SOFTWARE AND NETWORKS DEVICES https://t.me/duc3e9/2
For two computers to send and receive data, the cards must agree on several things.
These include the following:
- The maximum size of the data frames
- The amount of data sent before giving confirmation
- The time needed between transmissions
- The amount of time needed to wait before sending confirmation
- The amount of data a card can hold
- The speed at which data transmits
In order to successfully send data on the network, you need to make sure the network
cards are of the same type and they are connected to the same piece of cable.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
CONFIGURATION
When choosing a NIC, use one that fits the bus type of
your PC. If you have more than one type of bus in your PC
(for example, a combination ISA/PCI), use an NIC that fits
into the fastest type (the PCI, in this case).
This is especially important in servers, as the NIC can very
quickly become a bottleneck if this guideline isn’t followed.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
PERFORMANCE
Repeaters are very simple devices. They allow a cabling system to extend beyond its
maximum allowed length by amplifying the network voltages so they travel farther.
Repeaters are nothing more than amplifiers and, as such, are very inexpensive.
Repeaters can only be used to regenerate signals between similar network segments.
For example, we can extend an Ethernet 10Base2 network to 400 meters with a
repeater. But can’t connect an Ethernet and Token Ring network together with one.
The main disadvantage to repeaters is that they just amplify signals. These signals not
only include the network signals, but any noise on the wire as well.
Eventually, if you use enough repeaters, you could possibly drown out the signal with
the amplified noise. For this reason, repeaters are used only as a temporary fix.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
REPEATERS
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
HUBS
They join similar topologies and are used to divide network segments.
For example, with 200 people on one Ethernet segment, the performance will be
ordinary, because of the design of Ethernet and the number of workstations that are
fighting to transmit. If you divide the segment into two segments of 100 workstations
each, the traffic will be much lower on either side and performance will increase.
If it is aware of the destination address, it is able to forward packets; otherwise a
bridge will forward the packets to all segments. They are more intelligent than
repeaters but are unable to move data across multiple networks at once.
Unlike repeaters, bridges can filter out noise.
The main disadvantage to bridges is that they can’t connect different network types
or perform intelligent path selection. For that function, we would need a router.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
BRIDGES
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
ROUTERS
Routers are highly intelligent devices that connect multiple network types and
determine the best path for sending data.
The advantage of using a router over a bridge is that routers can determine the best
path that data can take to get to its destination.
Like bridges, they can segment large networks and can filter out noise.
However, they are slower than bridges because they are more intelligent devices; as
such, they analyze every packet, causing packet-forwarding delays. Because of this
intelligence, they are also more expensive.
Routers are normally used to connect one LAN to another.
Typically, when a WAN is set up, there will be at least two routers used.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
ROUTERS
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
SWITCH
52
CLASSIFY THE COMPUTER NETWORK
1- Delivery. The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
2.Accuracy. The system must deliver the data accurately. Data that have been altered
in transmission and left uncorrected are unusable.
3.Timeliness. The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, the Delivery called real-time transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay
in the delivery of audio or video packets.
3
COMPONENTS OF COMMUNICATION SYSTEM
1. Message. The message is the information (data) to be communicated. Popular
forms of information include text, numbers, pictures, audio, and video..
54
COMPONENTS OF COMMUNICATION SYSTEM
2. Sender. The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a
message travels from sender to receiver.
5. Protocol. A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices.
55
DATA REPRESENTATION:
Information comes in different forms such as text, numbers, images, audio, and
video.
1. Text: In data communications, text is represented as a bit pattern, a sequence of
bits (0s or 1s). Different sets of bit patterns have been designed to represent text
symbols. Each set is called a code, and the process of representing symbols is
called coding (ASCII).
2. Numbers: Numbers are also represented by bit patterns. However, a code such as
ASCII is not used to represent numbers.
3. Images: Images are also represented by bit patterns. In its simplest form, an image
is composed of a matrix of pixels (picture elements), where each pixel is a small
dot.
6
INTRODUCTION AND CLASSIFY THE COMPUTER NETWORK
57
TRANSMISSION TECHNOLOGY OR DATA FLOW
58
TRANSMISSION TECHNOLOGY OR DATA FLOW
59
NETWORK CRITERIA
A network must be able to meet a certain number of criteria. The most important
of these are:
1. Performance; 2. Reliability; 3. Security.
1. Performance: Performance can be measured in many ways, including transit
time and response time.
Transit time is the amount of time required for a message to travel from one
device to another.
Response time is the elapsed time between an inquiry and a response.
11
NETWORK CRITERIA
2.Reliability
In addition to accuracy of delivery, network reliability is measured by the
frequency of failure, the time it takes a link to recover from a failure, and
the network’s robustness in a catastrophe.
3.Security
Network security issues include protecting data from unauthorized access,
protecting data from damage and development.
13
PHYSICAL STRUCTURES
Type of Connection
A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another.
➢Point-to-Point: A point-to-point connection provides a dedicated link between two
devices. The entire capacity of the link is reserved for transmission between those two
devices.
➢Multipoint: A multipoint (also called multidrop) connection is one in which more than
two specific devices share a single link. In a multipoint environment, the capacity of
the channel is shared, either spatially or temporally.
14
PHYSICAL STRUCTURES
15
NETWORKING MODELS
A networking model, sometimes also called either a networking
architecture or networking blueprint, refers to a comprehensive set of
documents. Individually, each document describes one small function
required for a network; collectively, these documents define everything
that should happen for a computer network to work.
Some documents define a protocol, which is a set of logical rules that
devices must follow to communicate. Other documents define some
physical requirements for networking. For example, a document could
define the voltage and current levels used on a particular cable when
transmitting data.
OSI MODEL
The Open Systems Interconnection (OSI) model defines a networking
framework to implement protocols in layers, with control passed from
one layer to the next. It is primarily used today as a teaching tool. It
conceptually divides computer network architecture into 7 layers in a
logical progression.
The lower layers deal with electrical signals, chunks of binary data, and
routing of these data across networks. Higher levels cover network
requests and responses, representation of data, and network protocols
as seen from a user's point of view. The OSI model is divided into 7
layers which starts from the physical layer that represents the first and
ending with the seventh layer which is the application layer
THE SEVEN LAYERS IN OSI MODEL
- The seventh layer / Application layer supplies network services to
end-user applications.
- The sixth layer / presentation layer handles syntax processing of
message data such as format conversions and encryption / decryption
needed to support the Application layer above it.
- The fifth layer / Session Layer manages the sequence and flow of
events that initiate and tear down network connections.
- The fourth layer / Transport Layer delivers data across network
connections. The transport layer decides on the type of whether it was
reliable or unreliable type of communication. Transport layer provides
error checking, data recovery and provides port numbers for services.
THE SEVEN LAYERS IN OSI MODEL (CONT.)
- The third layer / Network layer maintains logical addresses such as IP
addresses for devices on the network. The Network layer also
manages the mapping between these logical addresses and physical
addresses.
- The second layer / Data Link layer checks for physical transmission
errors and packages bits into data "frames". The Data Link layer also
manages physical addressing schemes such as MAC addresses for
Ethernet networks, controlling access of any various network devices to
the physical medium.
- The first layer / Physical layer of the OSI model is responsible for
ultimate transmission of digital data bits from the source to the
destination. At the Physical layer, data are transmitted using the type
of signals are supported by the physical medium: electric voltages,
radio frequencies, or pulses of infrared or ordinary light.
ﻣﮭم ﺟدا
OSI MODEL
TCP/IP MODEL
TCP/IP stands for Transmission Control Protocol and Internet Protocol was
developed by Department of Defence's Project Research Agency as a
part of a research project of network interconnection to connect remote
machines. The features that stood out during the research, which led to
making the TCP/IP reference model were:
• Support for a flexible architecture. Adding more machines to a
network was easy.
• The network was robust, and connections remained intact until the
source and destination machines were functioning.
The overall idea was to allow one application on one computer to talk
(send data packets) to another application running on different computer.
TCP/IP MODEL
DATA ENCAPSULATION
The term encapsulation refers to the process of putting headers
(and sometimes trailers) around some data.
The process by which a TCP/IP host sends data can be viewed as a
five-step process.
The first four steps relate to the encapsulation performed by the
four TCP/IP layers, and the last step is the actual physical
transmission of the data by the host. In fact, if you use the five-
layer TCP/IP model, one step corresponds to the role of each
layer.
DATA ENCAPSULATION
NETWORK ADDRESS
Network address serves as a unique identifier for a computer
(or other devices) on a network. When set up correctly, computers
can determine the addresses of other computers on the network
and use these addresses to send messages to each other.
NETWORK ADDRESS
Most network devices have several different addresses. Physical
addresses belong to individual network interfaces attached to a
device. For example, the Wi-Fi radio and the Bluetooth radio of a
mobile device will each possess their own physical network
addresses.
Separately, logical addresses can be assigned to devices
according to the kind of network they are attached to. The logical
addresses of a mobile device, for example, change as it migrates
from one network to another (while their physical addresses remain
fixed).
IP ADDRESSES
The most popular type of virtual network addressing is the Internet
Protocol (IP) address. A traditional IP address (IP version 4, IPv4)
consists of four bytes (32 bits) that uniquely identify connected
devices.
Much of the IPv4 address space (the numeric range of address
numbers from lowest to highest) is allocated to Internet service
providers and other large organizations to assign to their customers
and to Internet servers – these are called public IP addresses.
IP ADDRESSES (CONT.)
Certain private IP address ranges have also been established
to support internal networks (like home networks) with devices
that do not need to be directly connected to the Internet.
Note: The class A address 127.x.y.z is reserved for loopback testing and inter-process
communication on the local computer.
MAC ADDRESS
A well-known form of physical addressing us based on Media Access
Control (MAC) technology. MAC addresses (also known as “physical
addresses”) are six bytes (48 bits) that manufacturers of network
adapters embed in their products to uniquely identify them. IP and other
protocols rely on physical addresses to identify devices on a network.
The Media Access Control (MAC) address is a used to uniquely identify
computer network adapters. These numbers (sometimes called
"hardware addresses" or "physical addresses") are embedded into the
network hardware during the manufacturing process, or stored in
firmware, and designed to not be modified.
MAC ADDRESS (CONT.)
Traditional MAC addresses are 12-digit (6 bytes or 48
bits) hexadecimal numbers. By convention, they are usually
written in one of the following three formats:
- MM:MM:MM:SS:SS:SS
- MM-MM-MM-SS-SS-SS
- MMM.MMM.SSS.SSS
MAC ADDRESS (CONT.)
The leftmost 6 digits (24 bits) called a "prefix" is associated with the
adapter manufacturer. Each vendor registers and obtains MAC prefixes
as assigned by the IEEE. Vendors often possess many prefix numbers
associated with their different products. For example, the prefixes
00:13:10, 00:25:9C and 68:7F:74 (plus many others) all belong to
Linksys (Cisco Systems).
The rightmost digits of a MAC address represent an identification
number for the specific device. Among all devices manufactured with the
same vendor prefix, each is given their own unique 24-bit number. Note
that hardware from different vendors may happen to share the same
device portion of the address.
MAC ADDRESS (CONT.)
TCP/IP networks based on IPv6 also implement a different approach to
communicating MAC addresses compared to mainstream IPv4. Instead of
64-bit hardware addresses, though, IPv6 automatically translates 48-bit
MAC address to a 64-bit address by inserting a fixed (hardcoded) 16-
bit value FFFE in between the vendor prefix and the device identifier.
IPv6 calls these numbers "identifiers" to distinguish them from true 64-bit
hardware addresses. For example, a 48-bit MAC address
00:25:96:12:34:56 appears on an IPv6 network as (commonly written in
either of these two forms):
- 00:25:96:FF:FE:12:34:56
- 0025:96FF:FE12:3456
MAC ADDRESS FORMAT
IP ADDRESSING & SUBNETTING 3 ﻓﯾدﯾو رﻗم
https://t.me/duc3e9/5
▪IP Addressing
▪Subnetting
▪IPv4 vs IPvs6
IP ADDRESSES
An IP address is an address used to uniquely identify a device on
an IP network.
The address is made up of 32 binary bits which can be divisible
into a network portion and host portion with the help of a subnet
mask.
32 binary bits are broken into four octets (1 octet = 8 bits)
Dotted decimal format (for example, 137.45.104.172)
DOTTED DECIMAL VS BINARY
137.45.104.172
10001001001011010110100010101100
CONVERSION BETWEEN DECIMAL & BINARY
128 X 1 = 128
64 X 0 = 0
32 X 0 = 0
16 X 0 = 0
8 X 1 = 8
4 X 0 = 0
2 X 0 = 0
1 X 1 = 1
137
CONVERSION BETWEEN DECIMAL & BINARY
128 1 128 0 0 0 0 1 128
64 0 0 0 0 1 64 0 0
32 0 0 1 32 1 32 1 32
16 0 0 0 0 0 0 0 0
8 1 8 1 8 1 8 1 8
4 0 0 1 4 0 0 1 4
2 0 0 0 0 0 0 0 0
1 1 1 1 1 0 0 0 0
137 45 104 172
IP ADDRESS CLASSES
ADDRESS CLASSES (CONTINUED)
Determining which part of the IP address belongs to the network (N)and
which part belongs to the host(h).
▪Class A – NNNNNNNN.hhhhhhhh.hhhhhhhh.hhhhhhhh
▪Class B – NNNNNNNN.NNNNNNNN.hhhhhhhh.hhhhhhhh
▪Class C – NNNNNNNN.NNNNNNNN.NNNNNNNN.hhhhhhhh
▪140.179.220.200 is a Class B so the first 2 octets identify the
network address 140.179.0.0
▪If the address was then set to 140.179.255.255 this would be a
broadcast address for that network and all nodes would receive
communication
PRIVATE SUBNETS
▪There are 3 network address ranges reserved for private networks.
▪These are internal IP networks that sit behind a proxy server or external
router interface.
▪Routers on the internet by default will not forward packets coming from
these addresses
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
SUBNET MASKING
Applying a subnet mask to an IP address enables identification of network
part and the host parts of the address
The network bits are represented by 1’s and the host bits represented by 0’s
137.45.104.172
255.255.255.0
“ANDING” A BINARY SUBNET MASK
10001001001011010110100010101100
11111111111111111111111100000000
10001001001011010110100000000000
subnet ID = (137.45.104.0)
IP ADDRESS CLASSES
Class A: The first octet is the network portion. Octets 2, 3, and 4
are for subnets/hosts
Reserved for governments and large corporations throughout the
world
Class B: The first two octets are the network portion. Octets 3 and
4 are for subnets/hosts
Addresses are assigned to large- and medium-sized companies
IP CLASSES (CONTINUED)
IP CLASSES (CONTINUED)
• Class C
The first three octets are the network portion. Octet 4 is for subnets/hosts
– Addresses are assigned to groups that do not meet the qualifications to
obtain Class A or B addresses
• Class D
– Addresses (also known as multicast addresses) are reserved for
multicasting
– Multicasting is the sending of a stream of data (usually audio and
video) to multiple computers at the same time
IP CLASSES (CONTINUED)
IP CLASSES (CONTINUED)
Class E
Addresses are reserved for research, testing, and experimentation
The Class E range starts where Class D leaves off
Private IP ranges
Many companies use private IP addresses for their internal networks
Will not be routable on the Internet
Gateway devices have network interface connections to the internal
network and the Internet
Route packets between them
IP CLASSES (CONTINUED)
SUBNETTING
Creates multiple logical networks that exist within a single Class
A, B, or C network.
If you do not subnet, you will only be able to use one network
from your Class A, B, or C network, which is unrealistic.
Each data link on a network must have a unique network ID, with
every node on that link being a member of the same network
BENEFITS OF SUBNETTING
3) Simplified management
2x – 2 = # of usable hosts per subnet (where x is the number of bits remaining in the
host field after borrowing)
SUBNETTING FORMULAS (CONTINUED)
SUBNETTING FORMULAS (CONTINUED)
LEARNING TO SUBNET (CONTINUED)
SUBNETTING A CLASS A/B/C ADDRESS
Subnets? 21 = 2
Hosts? 215– 2 = 32,766 (7 bits in the third octet, and 8 in the fourth)
Valid subnets? 256 – 128 = 128. (0, 128). Remember that subnetting is performed
in the third octet, so the subnet numbers are really 0.0 and 128.0, as shown in the
next table
Broadcast address for each subnet?
Valid hosts?
PRACTICE EXAMPLE #1B: 255.255.128.0 (/17)
NETWORK 172.16.0.0
IP version 6 (IPv6)
Originally designed to address the eventual depletion of IPv4 addresses
Classless inter-domain routing (CIDR) has slowed the exhaustion of IPv4 address
o One of the major functions of the physical layer is to move data in the form of
electromagnetic signals across a transmission medium.
o It is responsible for movements of individual bits from one node to next node
Digital Data: refers to information that has discrete states. (a digital clock)
Digital data take on discrete values. For example, data are stored in computer
memory in the form of 0s and 1s.
ﻣﮭم ﺟدا
ANALOG AND DIGITAL
Signals can be analog or digital.
An analog signal has infinitely many levels of intensity over a period of time.
A digital signal, can have only a limited number of defined values.
ANALOG AND DIGITAL
Digital Signal
Information can also be represented by a digital signal
For example, a 1 can be encoded as a positive voltage and a 0 as zero voltage.
A digital signal can have more than two levels. In this case, we can send more than
1 bit for each level.
• Most digital signals are non-periodic, and thus period and (frequency are not
appropriate characteristics).
Solution
The bit rate can be calculated as
ANALOG AND DIGITAL
Example 5
What is the bit rate for high-definition TV (HDTV)?
Solution
HDTV uses digital signals to broadcast high quality video signals. The HDTV screen
is normally a ratio of 16 : 9. There are 1920 by 1080 pixels per screen, and the screen
is renewed 30 times per second. Twenty-four bits represents one color pixel.
The first, bandwidth in hertz, refers to the range of frequencies in a composite signal
or the range of frequencies that a channel can pass.
The second, bandwidth in bits per second, refers to the speed of bit transmission in
a channel or link. Often referred to as Capacity.
Solution
We can calculate the throughput as
Solution
We can calculate the propagation time as
The example shows that a bit can go over the Atlantic Ocean in only 50
ms if there is a direct cable between the source and the destination.
EXAMPLE 2
What are the propagation time and the transmission time for a 2.5-kbyte
message (an e-mail) if the bandwidth of the network is 1 Gbps? Assume
that the distance between the sender and the receiver is 12,000 km and that
light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission time as shown on the
next slide:
EXAMPLE 2 (CONTINUED)
Note that in this case, because the message is short and the bandwidth is high,
the dominant factor is the propagation time, not the transmission time. The
transmission time can be ignored.
EXAMPLE 3
What are the propagation time and the transmission time for a 5-Mbyte
message (an image) if the bandwidth of the network is 1 Mbps? Assume
that the distance between the sender and the receiver is 12,000 km and that
light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission times as shown on the
next slide.
EXAMPLE 3 (CONTINUED)
Note that in this case, because the message is very long and the bandwidth is
not very high, the dominant factor is the transmission time, not the
propagation time. The propagation time can be ignored.
FILLING THE LINK WITH BITS FOR CASE 1
EXAMPLE 4
We can think about the link between two points as a pipe. The cross
section of the pipe represents the bandwidth, and the length of the pipe
represents the delay. We can say the volume of the pipe defines the
bandwidth-delay product, as shown in Figure 3.7.
below shows the throughput vs. time. Use this figure to calculate the following:
500
2) Amount of data transferred between second 70 and second 120 ?
That is why a wire carrying electric signals gets warm, if not hot, after a while
some of the electrical energy in the signal is converted to heat.
To compensate for this loss, amplifiers are used to amplify the signal.
ATTENUATION
Figure shows the effect of attenuation and amplification.
DECIBEL
To show that a signal has lost or gained strength, engineers use the unit of the
decibel.
The decibel (dB) measures the relative strengths of two signals or one signal at
two different points.
Note that the decibel is negative if a signal is attenuated and positive if a signal is
amplified.
dB = 10 log10 P2/P1
EXAMPLE 1
Suppose a signal travels through a transmission medium and its power is reduced to
one-half.
This means that P2 = ½ P1. In this case, the attenuation (loss of power) can be
calculated as
This means that P2 = 10 P1. In this case, the amplification (gain of power) can be
calculated as
EXAMPLE 3
One reason that engineers use the decibel to measure the changes in the strength of
a signal is that decibel numbers can be added (or subtracted) when we are
measuring several points (cascading) instead of just two. In the figure a signal travels
from point 1 to point 4. In this case, the decibel value can be calculated as
DISTORTION
Distortion means that the signal changes its shape.
Signal components at the receiver have phases different from what they had
at the sender.
DISTORTION
NOISE
Several types of noise, may corrupt the signal.
• Thermal noise: is the random motion of electrons in a wire, which creates an
extra signal not originally sent by the transmitter.
• Induced noise: comes from sources such as motors and appliances. These devices
act as a sending antenna, and the transmission medium acts as the receiving
antenna.
• Crosstalk: is the effect of one wire on the other. One wire acts as a sending
antenna and the other as the receiving antenna.
• Impulse noise: is a spike (a signal with high energy in a very short time) that
comes from power lines, lightning, and so on.
NOISE
SIGNAL-TO-NOISE RATIO (SNR):
To find the theoretical bit rate limit, we need to know the ratio of the signal power
to the noise power.
The signal-to-noise ratio is defined as:
SNR = (average signal power) / (average noise power)
Television broadcasting
Internet communication
terrestrial communication.
FACTORS IN SATELLITE COMMUNICATION
Disadvantages
▪A GEO satellite’s distance also cause it to have both a comparatively weak
signal and a time delay in the signal, which is bad for point to point
communication.
▪GEO satellites, centered above the equator, have difficulty broadcasting
signals to near polar regions
LOW EARTH ORBIT (LEO)
LEO satellites are much closer to the earth than GEO satellites, ranging from 500 to
1,500 km above the surface.
LEO satellites don’t stay in fixed position relative to the surface, and are only visible
for 15 to 20 minutes each pass.
A network of LEO satellites is necessary for LEO satellites to be useful
LEO ADVANTAGES
Advantages
▪A LEO satellite’s proximity to earth compared to a GEO satellite
gives it a better signal strength and less of a time delay, which
makes it better for point to point communication.
▪A LEO satellite’s smaller area of coverage is less of a waste of
bandwidth.
LEO DISADVANTAGES
Disadvantages
▪A network of LEO satellites is needed, which can be costly
▪LEO satellites have to compensate for Doppler shifts cause by
their relative movement.
▪Atmospheric drag effects LEO satellites, causing gradual orbital
deterioration.
MEDIUM EARTH ORBIT (MEO)
Advantage
▪A MEO satellite’s longer duration of visibility and wider footprint means
fewer satellites are needed in a MEO network than a LEO network.
Disadvantage
▪A MEO satellite’s distance gives it a longer time delay and weaker signal
than a LEO satellite, though not as bad as a GEO satellite.
OTHER ORBITS
TDMA
▪ Advantages over FDMA
FDMA
Satellite frequency is already broken into bands, and is broken in to smaller channels
in Frequency Division Multiple Access (FDMA).
Overall bandwidth within a frequency band is increased due to frequency reuse (a
frequency is used by two carriers with orthogonal polarization).
FDMA (CONT.)
The number of sub-channels is limited by three factors:
▪ Thermal noise (too weak a signal will be effected by background noise).
▪ Intermodulation noise (too strong a signal will cause noise).
▪ Crosstalk (cause by excessive frequency reusing).
FDMA (CONT.)
FDMA can be performed in two ways:
▪ Fixed-assignment multiple access (FAMA): The sub-channel assignments are of a fixed allotment.
Ideal for broadcast satellite communication.
▪ Demand-assignment multiple access (DAMA): The sub-channel allotment changes based on demand.
Ideal for point to point communication.
TDMA
TDMA (Time Division Multiple Access) breaks a transmission into multiple time slots,
each one dedicated to a different transmitter.
TDMA is increasingly becoming more widespread in satellite communication.
TDMA uses the same techniques (FAMA and DAMA) as FDMA does.
TDMA (CONT.)
▪ Configure Hostnames
• IOS hostnames should:
• Start with a letter
• Contain no spaces
• End with letter or digit
• Use only letters, digits or dashes
• Be less than 64 characters in length
HOSTNAMES
LIMIT ACCESS TO DEVICE CONFIGURATIONS
▪ Secure Device Access
• Secure privileged EXEC and user EXEC
access with a password.
• Secure virtual terminal lines with a
password.
▪ Configure Passwords
• Use strong passwords.
• Avoid re-using passwords
▪ Encrypt Passwords
• Cisco IOS displays passwords in plain text
by default.
• Passwords should be encrypted.
LIMIT ACCESS TO DEVICE CONFIGURATIONS
▪ Secure Device Access
▪ To secure privileged EXEC access, use the enable secret password command.
▪ An older, less secure variation of this command is the enable password password command.
▪ The enable secret command provides greater security because the password is encrypted.
LIMIT ACCESS TO DEVICE CONFIGURATIONS
▪ The console port of network devices must be secured by requiring
the user to supply a strong password.
▪ This reduces the chance of unauthorized person physically plugging
a cable into the device and gaining device access.
▪ The following commands are used in global configuration mode to
set a password for the console line:
ip name-server serverip-1 serverip-2 A configure mode command that sets the IP addresses of DNS servers
Troubleshooting Commands
ping {hostname | system-address} [source source- Used in enable mode to diagnose basic network connectivity
address]
speed {10 | 100 | 1000 | auto} An interface mode command that manually sets the speed to the specified
value or negotiates it automatically
duplex {auto | full | half} An interface mode command that manually sets duplex to half, full or auto
show interfaces Displays detailed information about interface status, settings and counters
show interfaces switchport Displays a large variety of configuration settings and current operational
status, including VLAN trunking details.
Extra
ip route network-number network-mask {ip-address | Sets a static route in the IP routing table
interface}
password pass-value Lists the password that is required if the login command (with no other
parameters) is configured
username name password pass-value A global command that defines one of possibly multiple user names and
associated passwords used for user authentication. It is used when the login
local line configuration command has been used.
enable password pass-value A configuration mode command that defines the password required when
using the enable command
enable secret pass-value A configuration mode command that sets this Cisco device password that is
required for any user to enter enable mode
ip domain-name name Configures a DNS domain name
logging ip-address Configures the IP address of the host that will receive the system logging
(syslog) messages
terminal monitor An enable mode command that tells Cisco IOS to send a copy of all syslog
messages, including debug messages, to the Telnet or SSH user who issues
this command
COMPUTER NETWORKING
FUNDAMENTALS
8 ﻓﯾدﯾو رﻗم
The Physical Layer https://t.me/duc3e9/19
Dr. Yasir Dawood
THE PHYSICAL LAYER
•Theoretical Basis for Data Communications
•Guided Transmission Media
•Wireless Transmission
•Communication Satellites
•Digital Modulation and Multiplexing
•Public Switched Telephone Network
•Mobile Telephone System
•Cable Television
THEORETICAL BASIS FOR DATA TRANSMISSION
There are physical limits to what can be sent over a channel.
Three types of transmission media- each with different properties and performance
capabilities:
Guided (copper wire and fiber)
Wireless (radio frequency)
Satellite
Digital modulation - how analog signals are converted into digital bits and back
again.
Multiplexing to put multiple conversation on the same transmission medium without
interfering with one another.
3 examples of communication systems: telephone, mobile phone and cable TV.
THE PHYSICAL LAYER
Foundation on which other layers build
Properties of wires, fiber, wireless limit what the network can do Application
Transport
Key problem is to send (digital) bits using only (analog) signals Network
This is called modulation Link
Physical
THEORETICAL BASIS FOR DATA COMMUNICATION
Communication rates have fundamental limits
Fourier analysis »
Bandwidth-limited signals »
Maximum data rate of a channel »
FOURIER ANALYSIS
A time-varying signal can be equivalently represented as a series of frequency
components (harmonics) or the sum of sines and cosines:
a, b weights of harmonics
Signal over time
FOURIER ANALYSIS
No transmission facility can transmit signal with losing some power in process.
If all Fourier components were equally diminish, the resulting signal would be
reduced in amplitude, but not distorted. Unfortunately all transmission facilities
diminish different Fourier components by different amount, thus introducing
distortion.
The width of this frequency range is called the bandwidth.
Baseband run from 0 to some max frequency
Passband- shifted to occupy higher frequencies such as wireless
BANDWIDTH
Bandwidth is a physical property of the transmission medium such
as the construction, thickness and length of the wire or fiber.
Limiting the bandwidth, limits the data rate.
Goal for digital transmission is to receive a signal with enough
fidelity to reconstruct the sequence of bits that was sent.
BANDWIDTH-LIMITED SIGNALS
8 harmonics
Having less bandwidth (harmonics) degrades the signal
Lost!
Bandwidth
4 harmonics
Lost!
2 harmonics
Lost!
MAXIMUM DATA RATE OF A CHANNEL
Nyquist’s theorem relates the data rate to the bandwidth (B) and number of signal levels (V):
Shannon's theorem relates the data rate to the bandwidth (B) and signal strength (S) relative to
the noise (N):
Shannon reminds us that there is a fundamental limit to the number of bits pre second
that can be transmitted in a real communication system ( due to the laws of Physics).
GUIDED TRANSMISSION (WIRES & FIBER)
Media have different properties, hence performance
Reality check
Storage media »
Wires:
Twisted pairs »
Coaxial cable »
Power lines »
Fiber cables »
SOME USEFUL TERMS
Different media have different properties such as bandwidth, delay, cost and ease of
installation.
Delay or latency is the time needed to transfer data across a network, usually from one point
to another, like cars on a highway going from point A to point B
Throughput or capacity is the amount of data that can be transmitted in a unit of time, usually
bps.
Bandwidth is the difference between the highest and lowest frequency or the number of signal
changes. In computing, bandwidth refers to the capacity of the channel, or the rate of data
transfer in bps.
SOME TYPICAL 56 kbit/s
1.5 Mbit/s
Modem / Dialup
ADSL Lite
Microwave
ELECTROMAGNETIC SPECTRUM (2)
To manage interference, spectrum is carefully divided, and its use regulated and licensed,
e.g., sold at auction.
802.11 802.11a/g/n
b/g/n
RADIO TRANSMISSION
Radio signals penetrate buildings well and propagate for long distances with path loss
In the VLF, LF, and MF bands, radio waves follow the In the HF band, radio waves bounce off the
curvature of the earth ionosphere.
MICROWAVE TRANSMISSION
Microwaves have much bandwidth and are widely used indoors (WiFi) and outdoors (3G, 4G
satellites)
Signal is attenuated/reflected by everyday objects
Strength varies with mobility due multipath fading, etc.
LIGHT TRANSMISSION
Line-of-sight light (no fiber) can be used for links
Light is highly directional, has much bandwidth
Use of LEDs/cameras and lasers/photodetectors
WIRELESS VS. WIRES/FIBER
Wireless:
+ Easy and inexpensive to deploy
+ Naturally supports mobility
+ Naturally supports broadcast
− Transmissions interfere and must be managed
− Signal strengths hence data rates vary greatly
Wires/Fiber:
+ Easy to engineer a fixed data rate over point-to-point links
− Can be expensive to deploy, esp. over distances
− Doesn’t readily support mobility or broadcast
SATELLITE VS. FIBER
Satellite:
+Can rapidly set up anywhere/anytime communications (after satellites have
been launched)
+Can broadcast to large regions
- Limited bandwidth and interference to manage
Fiber:
+Enormous bandwidth over long distances
- Installation can be more expensive/difficult
9 ﻓﯾدﯾو رﻗم
MULTIPLEXING https://t.me/duc3e9/22
◼ The channel access methods in the link layer are packet-mode methods
that are based on multiple access protocols in the media access control
(MAC) sublayer
◼ The duplexing methods are used to separate the uplink and downlink
channels
27
◼ A multiplexing system with multiplexer (MUX) and demultiplexer
(DEMUX) is shown as follows
❑ Data streams from multiple data sources multiplexed and
transmitted over a shared physical channel
MULTIPLEXING TECHNIQUES
❑ Time-Division Multiplexing (TDM)
❑ Frequency-Division Multiplexing (FDM)
❑ Wavelength-Division Multiplexing (WDM)
❑ Code Division Multiple (CDM)
The mapping of channel access scheme and multiplexing
TIME-DIVISION MULTIPLEXING (TDM)
Remember that a WAN connection normally uses a provider’s network.
Time Division Multiplexing (TDM) is used to give each conversation a share of the
connection in turn.
TDM assures that a fixed capacity connection is made available to the subscriber.
TIME-DIVISION MULTIPLEXING (TDM)
◼ TDM is a technique to combine multiple digital signals from low-rate
channels into a high-rate channel shared alternately in time slots
◼ A simplified scheme of TDM is shown as follows, where data
streams from different sources are interleaved in a stream of time
slots
32
◼ TDM divides a time domain into several recurrent time slots of certain time
length
❑ Each time slot is considered part of a sub-channel or logical channel
❑ Multi-slot allocation
37
◼ FDM application
❑ The radio broadcasting of AM and FM signals
❑ For example, the bandwidth from 530 kHz to 1700 kHz is assigned
to AM radio
❑ This is the bandwidth of a physical channel medium and is shared
by several radio stations
◼ Frequency-Division Multiple Access (FDMA)
❑ An access method extended from FDM
◼ Variants of FDMA
❑ Orthogonal Frequency-Division Multiple Access (OFDMA) based
on Orthogonal Frequency-Division Multiplexing (OFDM)
❑ Single Carrier FDMA (SC-FDMA) based on Single-Carrier
Frequency Domain Equalization (SC-FDE)
❑ Wavelength-Division Multiple Access (WDMA) based on
wavelength-division multiplexing (WDM)
39
WAVELENGTH-DIVISION MULTIPLEXING (WDM)
◼ WDM is equivalent to frequency-division multiplexing, but WDM is
often used in fiber-optic communications where wavelength is the
common term to describe the carrier modulated by optical signals
◼ WDM uses different wavelengths of laser light to carry different
signals, and each wavelength is specified as a sub-channel in a
single optical fiber
◼ Because the data rate of the optical fibers is much higher than that
of twisted pair cables, WDM is normally used to aggregate the data
from multiple users
◼ WDM application: SONET (Synchronous Optical Networking)
40
CODE DIVISION MULTIPLE ACCESS (CDM)
oAll terminals send on the same frequency probably at the same time and can use the whole
bandwidth of the transmission channel
oSo, how the receivers identify the data/signals for them?
oEach sender has a unique random number (code), the sender XORs the signal with this random
number
oDifferent senders use different codes
oThe codes separate the signals from different senders
oThe encoded signals are concatenated together for sending, i.e., as a signal stream of signals
oThe receiver “tunes” into this signal stream if it knows the virtual random number. Tuning is
done via a correlation function
oThe received decodes the signal stream using the known code to identify the data for it
oDifferent receivers received different data as they use different codes
MOBILE TELEPHONE SYSTEM
Mobile telephone service (MTS) connects mobile radio
telephones with other networks like public switched
telephone networks (PSTN), other mobile telephones and
communication systems like Internet.
GENERATIONS OF MOBILE TELEPHONE SYSTEMS
1G, analog voice
AMPS (Advanced Mobile Phone System) is example, deployed from 1980s. Modulation based on FM (as in radio).
Internet
UMTS – UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (2)
Air interface based on CDMA over 5 MHz channels
Rates over users <14.4 Mbps (HSPDA) per 5 MHz
CDMA allows frequency reuse over all cells
CDMA permits soft handoff (connected to both cells)
Soft
handoff
WHAT IS LTE?
•LTE stands for “Long Term Evolution”
•Fourth-generation (4G) cellular technology from 3GPP
•Deployed worldwide
•4G LTE: First global standard
–Increased speed
–IP-based network (All circuits are gone/fried!)
–New air interface: OFDMA (Orthogonal Frequency-Division Multiple Access),
MIMO (multiple antennas)
• Also includes duplexing, timing, carrier spacing, coding...
–New service paradigm (e.g., VoLTE)
WHAT IS LTE?
•LTE is always evolving and 3GPP often has new “releases”
–First release: Rel-8
–Current: Rel-11, Rel-12
–Toward LTE-Advanced (4.5G)
NETWORK ARCHITECTURE EVOLUTION
2G 3G 4G
ISP
(Internet)
SPECTRUM ALLOCATION
Upstream and downstream data are allocated to frequency channels not used for TV
channels:
CABLE MODEMS
Cable modems at customer premises implement the physical layer of the DOCSIS standard
QPSK/QAM is used in timeslots on frequencies that are assigned for upstream/downstream data
CABLE VS. ADSL
Cable:
+Uses coaxial cable to customers (good bandwidth)
Data is broadcast to all customers (less secure)
Bandwidth is shared over customers so may vary
ADSL:
+Bandwidth is dedicated for each customer
+Point-to-point link does not broadcast data
Uses twisted pair to customers (lower bandwidth)
COMPUTER NETWORKING
FUNDAMENTALS
10 ﻓﯾدﯾو رﻗم
Circuit Switching and Packet Switching https://t.me/duc3e9/28
Network Interface
Control Unit
Establish connections
Generally on demand
Handle and acknowledge requests
Determine if destination is free
construct path
Maintain connection
Disconnect
PUBLIC CIRCUIT SWITCHED NETWORK
TELECOMS COMPONENTS
Subscriber
Devices attached to network
Subscriber line
Local Loop
Subscriber loop
Connection to network
Few km up to few tens of km
Exchange
Switching centers
End office - supports subscribers
Trunks
Branches between exchanges
Multiplexed
CIRCUIT
ESTABLISHMENT
CIRCUIT SWITCHING CONCEPTS
Blocking or Non-blocking
Blocking
A network is unable to connect stations because all paths are in use
Used on voice systems since we have Short duration calls
Non-blocking
Permits all stations to connect (in pairs) at once
Used for some data connections
Multistage Switch
Reduced number of crosspoints
More than one path through network
Increased reliability
More complex control
May be blocking
TIME DIVISION SWITCHING
Modern digital systems rely on intelligent control of space and time division elements
Use digital time division techniques to set up and maintain virtual circuits
Partition low speed bit stream into pieces that share higher speed stream
CONTROL SIGNALING FUNCTIONS
Audible communication with subscriber
Transmission of dialed number
Call can not be completed indication
Call ended indication
Signal to ring phone
Billing info
Equipment and trunk status info
Diagnostic info
Control of specialist equipment
CONTROL SIGNAL SEQUENCE
Both phones on hook
Subscriber lifts receiver (off hook)
End office switch signaled
Switch responds with dial tone
Caller dials number
If target not busy, send ringer signal to target subscriber
Feedback to caller
Ringing tone, engaged tone, unobtainable
Within network
Management of subscriber calls and network
ore complex
IN CHANNEL SIGNALING
Use same channel for signaling and call
Requires no additional transmission facilities
Inband
Uses same frequencies as voice signal
Can go anywhere a voice signal can
Impossible to set up a call on a faulty speech path
Out of band
Voice signals do not use full 4kHz bandwidth
Narrow signal band within 4kHz used for control
Can be sent whether or not voice signals are present
Need extra electronics
Slower signal rate (narrow bandwidth)
DRAWBACKS OF IN CHANNEL SIGNALING
Limited transfer rate
Delay between entering address (dialing) and connection
Overcome by use of common channel signaling
COMMON CHANNEL SIGNALING
Control signals carried over paths independent of voice channel
One control signal channel can carry signals for a number of subscriber
channels
Common control channel for these subscriber lines:
Associated Mode
Common channel closely tracks Interswitch trunks
Disassociated Mode
Additional nodes (signal transfer points)
Effectively two separate networks
COMMON V. IN CHANNEL SIGNALING
COMMON
CHANNEL
SIGNALING
MODES
Advantages of circuit switching over packet switching:
•Decreases the delay the user experiences before and during a call
•The call will be done with a steady bandwidth, dedicated channel, and consistent
data rate
•Packets are always delivered in the correct order
Disadvantages of circuit switching:
•Great for only voice communication
•Doesn’t use resources efficiently
•Dedicated channels for circuit switching are unavailable for any other use
•There is a higher cost to dedicate one channel per use
Advantages of packet switching over circuit switching:
•More efficient than circuit switching
•Data packets are able to find the destination without the use of a dedicated channel
•Reduces lost data packets because packet switching allows for resending of packets
•More cost-effective since there is no need for a dedicated channel for voice or data
traffic
Disadvantages of packet switching:
•Not ideal for applications that are in constant use, such as high volume voice calls
•High-volume networks can lose data packets during high-traffic times; those data
packets cannot be recovered or resent during transmission
•There is a lack of security protocols for data packets during transmission
CIRCUIT-SWITCHED VS. PACKET SWITCHED NETWORKS
11 ﻓﯾدﯾو رﻗم
SIGNALING SYSTEM NUMBER 7 (SS7) https://t.me/duc3e9/30
Control plane
Responsible for establishing and managing connections
Information plane
Once a connection is set up, info is transferred in the information plane
TRANSFER
POINTS
SIGNALING NETWORK STRUCTURES
STP capacities
Number of signaling links that can be handled
Message transfer time
Throughput capacity
Network performance
Number of SPs
Signaling delays
Control info
Routing (addressing) info
Packets are received, stored briefly (buffered) and past on to the next node
Store and forward
USE OF PACKETS
ADVANTAGES
Line efficiency
Single node to node link can be shared by many packets over time
Packets queued and transmitted as fast as possible
Datagram
No call setup phase
Better if few packets
More flexible
Routing can be used to avoid congested parts of the network
PACKET SIZE
EVENT TIMING
X.25
1976
Interface between host and packet switched network
Almost universal on packet switched networks and packet switching in ISDN
Defines three layers
Physical
Link
Packet
X.25 - PHYSICAL
Interface between attached station and link to node
Data terminal equipment DTE (user equipment)
Data circuit terminating equipment DCE (node)
Uses physical layer specification X.21
Reliable transfer across physical link
Sequence of frames
X.25 - LINK
Link Access Protocol Balanced (LAPB)
Subset of HDLC
see chapter 7
X.25 - PACKET
External virtual circuits
Logical connections (virtual circuits) between subscribers
X.25 USE OF VIRTUAL CIRCUITS
VIRTUAL CIRCUIT SERVICE
Logical connection between two stations
External virtual circuit
Typically one to one relationship between external and internal virtual circuits
Can employ X.25 with datagram style network
External virtual circuits require logical channel
All data considered part of stream
X.25 LEVELS
User data passes to X.25 level 3
X.25 appends control information
Header
Identifies virtual circuit
Provides sequence numbers for flow and error control
No inband signaling
No sequence numbers
No flow nor error control