المنهج الكامل لمادة اسس الشبكات
المنهج الكامل لمادة اسس الشبكات
Yasir Dawood
Client Client
Client Client
Client Client
FUNDAMENTAL
NETWORK
CLASSIFICATIONS
(CONT)
Wide Area Network
Fundamental Network
Classifications (cont)
METROPOLITAN AREA
NETWORK (MAN)
INTRANET AND INTERNET SPECIFICATIONS
Intranet: An intranet is a private network that is contained within an enterprise.
It may consist of many interlinked local area networks and also use leased
lines in the wide area network.
An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks
like a private version of the Internet. With tunneling, companies can send
private messages through the public network, using the public network with
special encryption/decryption and other security safeguards to connect one
part of their intranet to another.
Internet: is a worldwide system of computer networks - a network of networks
in which users at any one computer can, if they have permission, get
information from any other computer (and sometimes talk directly to users at
other computers).
CLIENT AND SERVER COMPUTER ROLE IN
NETWORKING
Server computer is a core component of the network, providing a link to the
resources necessary to perform any task.
A server computer provides a link to the resources necessary to perform any
task.
The link it provides could be to a resource existing on the server itself or a
resource on a client computer.
Client computers normally request and receive information over the network
client. Client computers also depends primarily on the central server for
processing activities
PEER-TO PEER NETWORK
A peer-to-peer network is a network where the computers act as both
workstations and servers.
great for small, simple, and inexpensive networks.
In a strict peer-to-peer networking setup, every computer is an equal, a
peer in the network.
Each machine can have resources that are shared with any other
machine.
There is no assigned role for any particular device, and each of the
devices usually runs similar software. Any device can and will send
requests to any other.
PEER-TO PEER NETWORK
(CONT..)
CLIENT/SERVER NETWORKING
In this design, a small number of computers are
designated as centralized servers and given the task
of providing services to a larger number of user
machines called clients
CLIENT/SERVER
NETWORKING (CONT..)
NETWORK TOPOLOGY
A topology is a way of “laying out” the network.
Topologies can be either physical or logical.
Physical topologies describe how the cables are run.
Logical topologies describe how the network
messages travel
NETWORK TOPOLOGY (CONT.)
Advantages and
Disadvantages of Network
Topologies
HARDWARE, SOFTWARE AND NETWORKS DEVICES
For two computers to send and receive data, the cards must agree on several things.
These include the following:
- The maximum size of the data frames
- The amount of data sent before giving confirmation
- The time needed between transmissions
- The amount of time needed to wait before sending confirmation
- The amount of data a card can hold
- The speed at which data transmits
In order to successfully send data on the network, you need to make sure the network
cards are of the same type and they are connected to the same piece of cable.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
CONFIGURATION
When choosing a NIC, use one that fits the bus type of
your PC. If you have more than one type of bus in your PC
(for example, a combination ISA/PCI), use an NIC that fits
into the fastest type (the PCI, in this case).
This is especially important in servers, as the NIC can very
quickly become a bottleneck if this guideline isn’t followed.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
PERFORMANCE
Repeaters are very simple devices. They allow a cabling system to extend beyond its
maximum allowed length by amplifying the network voltages so they travel farther.
Repeaters are nothing more than amplifiers and, as such, are very inexpensive.
Repeaters can only be used to regenerate signals between similar network segments.
For example, we can extend an Ethernet 10Base2 network to 400 meters with a
repeater. But can’t connect an Ethernet and Token Ring network together with one.
The main disadvantage to repeaters is that they just amplify signals. These signals not
only include the network signals, but any noise on the wire as well.
Eventually, if you use enough repeaters, you could possibly drown out the signal with
the amplified noise. For this reason, repeaters are used only as a temporary fix.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
REPEATERS
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
HUBS
They join similar topologies and are used to divide network segments.
For example, with 200 people on one Ethernet segment, the performance will be
ordinary, because of the design of Ethernet and the number of workstations that are
fighting to transmit. If you divide the segment into two segments of 100 workstations
each, the traffic will be much lower on either side and performance will increase.
If it is aware of the destination address, it is able to forward packets; otherwise a
bridge will forward the packets to all segments. They are more intelligent than
repeaters but are unable to move data across multiple networks at once.
Unlike repeaters, bridges can filter out noise.
The main disadvantage to bridges is that they can’t connect different network types
or perform intelligent path selection. For that function, we would need a router.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
BRIDGES
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
ROUTERS
Routers are highly intelligent devices that connect multiple network types and
determine the best path for sending data.
The advantage of using a router over a bridge is that routers can determine the best
path that data can take to get to its destination.
Like bridges, they can segment large networks and can filter out noise.
However, they are slower than bridges because they are more intelligent devices; as
such, they analyze every packet, causing packet-forwarding delays. Because of this
intelligence, they are also more expensive.
Routers are normally used to connect one LAN to another.
Typically, when a WAN is set up, there will be at least two routers used.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
ROUTERS
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (CONT.)
SWITCH
52
CLASSIFY THE COMPUTER NETWORK
1- Delivery. The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
2.Accuracy. The system must deliver the data accurately. Data that have been altered
in transmission and left uncorrected are unusable.
3.Timeliness. The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, the Delivery called real-time transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay
in the delivery of audio or video packets.
3
COMPONENTS OF COMMUNICATION SYSTEM
1. Message. The message is the information (data) to be communicated. Popular
forms of information include text, numbers, pictures, audio, and video..
54
COMPONENTS OF COMMUNICATION SYSTEM
2. Sender. The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a
message travels from sender to receiver.
5. Protocol. A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices.
55
DATA REPRESENTATION:
Information comes in different forms such as text, numbers, images, audio, and
video.
1. Text: In data communications, text is represented as a bit pattern, a sequence of
bits (0s or 1s). Different sets of bit patterns have been designed to represent text
symbols. Each set is called a code, and the process of representing symbols is
called coding (ASCII).
2. Numbers: Numbers are also represented by bit patterns. However, a code such as
ASCII is not used to represent numbers.
3. Images: Images are also represented by bit patterns. In its simplest form, an image
is composed of a matrix of pixels (picture elements), where each pixel is a small
dot.
6
INTRODUCTION AND CLASSIFY THE COMPUTER NETWORK
57
TRANSMISSION TECHNOLOGY OR DATA FLOW
58
TRANSMISSION TECHNOLOGY OR DATA FLOW
59
NETWORK CRITERIA
A network must be able to meet a certain number of criteria. The most important
of these are:
1. Performance; 2. Reliability; 3. Security.
1. Performance: Performance can be measured in many ways, including transit
time and response time.
Transit time is the amount of time required for a message to travel from one
device to another.
Response time is the elapsed time between an inquiry and a response.
11
NETWORK CRITERIA
2.Reliability
In addition to accuracy of delivery, network reliability is measured by the
frequency of failure, the time it takes a link to recover from a failure, and
the network’s robustness in a catastrophe.
3.Security
Network security issues include protecting data from unauthorized access,
protecting data from damage and development.
13
PHYSICAL STRUCTURES
Type of Connection
A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another.
Point-to-Point: A point-to-point connection provides a dedicated link between two
devices. The entire capacity of the link is reserved for transmission between those two
devices.
Multipoint: A multipoint (also called multidrop) connection is one in which more than
two specific devices share a single link. In a multipoint environment, the capacity of
the channel is shared, either spatially or temporally.
14
PHYSICAL STRUCTURES
15
NETWORKING MODELS
A networking model, sometimes also called either a networking
architecture or networking blueprint, refers to a comprehensive set of
documents. Individually, each document describes one small function
required for a network; collectively, these documents define everything
that should happen for a computer network to work.
Some documents define a protocol, which is a set of logical rules that
devices must follow to communicate. Other documents define some
physical requirements for networking. For example, a document could
define the voltage and current levels used on a particular cable when
transmitting data.
OSI MODEL
The Open Systems Interconnection (OSI) model defines a networking
framework to implement protocols in layers, with control passed from
one layer to the next. It is primarily used today as a teaching tool. It
conceptually divides computer network architecture into 7 layers in a
logical progression.
The lower layers deal with electrical signals, chunks of binary data, and
routing of these data across networks. Higher levels cover network
requests and responses, representation of data, and network protocols
as seen from a user's point of view. The OSI model is divided into 7
layers which starts from the physical layer that represents the first and
ending with the seventh layer which is the application layer
THE SEVEN LAYERS IN OSI MODEL
- The seventh layer / Application layer supplies network services to
end-user applications.
- The sixth layer / presentation layer handles syntax processing of
message data such as format conversions and encryption / decryption
needed to support the Application layer above it.
- The fifth layer / Session Layer manages the sequence and flow of
events that initiate and tear down network connections.
- The fourth layer / Transport Layer delivers data across network
connections. The transport layer decides on the type of whether it was
reliable or unreliable type of communication. Transport layer provides
error checking, data recovery and provides port numbers for services.
THE SEVEN LAYERS IN OSI MODEL (CONT.)
- The third layer / Network layer maintains logical addresses such as IP
addresses for devices on the network. The Network layer also
manages the mapping between these logical addresses and physical
addresses.
- The second layer / Data Link layer checks for physical transmission
errors and packages bits into data "frames". The Data Link layer also
manages physical addressing schemes such as MAC addresses for
Ethernet networks, controlling access of any various network devices to
the physical medium.
- The first layer / Physical layer of the OSI model is responsible for
ultimate transmission of digital data bits from the source to the
destination. At the Physical layer, data are transmitted using the type
of signals are supported by the physical medium: electric voltages,
radio frequencies, or pulses of infrared or ordinary light.
OSI MODEL
TCP/IP MODEL
TCP/IP stands for Transmission Control Protocol and Internet Protocol was
developed by Department of Defence's Project Research Agency as a
part of a research project of network interconnection to connect remote
machines. The features that stood out during the research, which led to
making the TCP/IP reference model were:
• Support for a flexible architecture. Adding more machines to a
network was easy.
• The network was robust, and connections remained intact until the
source and destination machines were functioning.
The overall idea was to allow one application on one computer to talk
(send data packets) to another application running on different computer.
TCP/IP MODEL
DATA ENCAPSULATION
The term encapsulation refers to the process of putting headers
(and sometimes trailers) around some data.
The process by which a TCP/IP host sends data can be viewed as a
five-step process.
The first four steps relate to the encapsulation performed by the
four TCP/IP layers, and the last step is the actual physical
transmission of the data by the host. In fact, if you use the five-
layer TCP/IP model, one step corresponds to the role of each
layer.
DATA ENCAPSULATION
NETWORK ADDRESS
Network address serves as a unique identifier for a computer
(or other devices) on a network. When set up correctly, computers
can determine the addresses of other computers on the network
and use these addresses to send messages to each other.
NETWORK ADDRESS
Most network devices have several different addresses. Physical
addresses belong to individual network interfaces attached to a
device. For example, the Wi-Fi radio and the Bluetooth radio of a
mobile device will each possess their own physical network
addresses.
Separately, logical addresses can be assigned to devices
according to the kind of network they are attached to. The logical
addresses of a mobile device, for example, change as it migrates
from one network to another (while their physical addresses remain
fixed).
IP ADDRESSES
The most popular type of virtual network addressing is the Internet
Protocol (IP) address. A traditional IP address (IP version 4, IPv4)
consists of four bytes (32 bits) that uniquely identify connected
devices.
Much of the IPv4 address space (the numeric range of address
numbers from lowest to highest) is allocated to Internet service
providers and other large organizations to assign to their customers
and to Internet servers – these are called public IP addresses.
IP ADDRESSES (CONT.)
Certain private IP address ranges have also been established
to support internal networks (like home networks) with devices
that do not need to be directly connected to the Internet.
Note: The class A address 127.x.y.z is reserved for loopback testing and inter-process
communication on the local computer.
MAC ADDRESS
A well-known form of physical addressing us based on Media Access
Control (MAC) technology. MAC addresses (also known as “physical
addresses”) are six bytes (48 bits) that manufacturers of network
adapters embed in their products to uniquely identify them. IP and other
protocols rely on physical addresses to identify devices on a network.
The Media Access Control (MAC) address is a used to uniquely identify
computer network adapters. These numbers (sometimes called
"hardware addresses" or "physical addresses") are embedded into the
network hardware during the manufacturing process, or stored in
firmware, and designed to not be modified.
MAC ADDRESS (CONT.)
Traditional MAC addresses are 12-digit (6 bytes or 48
bits) hexadecimal numbers. By convention, they are usually
written in one of the following three formats:
- MM:MM:MM:SS:SS:SS
- MM-MM-MM-SS-SS-SS
- MMM.MMM.SSS.SSS
MAC ADDRESS (CONT.)
The leftmost 6 digits (24 bits) called a "prefix" is associated with the
adapter manufacturer. Each vendor registers and obtains MAC prefixes
as assigned by the IEEE. Vendors often possess many prefix numbers
associated with their different products. For example, the prefixes
00:13:10, 00:25:9C and 68:7F:74 (plus many others) all belong to
Linksys (Cisco Systems).
The rightmost digits of a MAC address represent an identification
number for the specific device. Among all devices manufactured with the
same vendor prefix, each is given their own unique 24-bit number. Note
that hardware from different vendors may happen to share the same
device portion of the address.
MAC ADDRESS (CONT.)
TCP/IP networks based on IPv6 also implement a different approach to
communicating MAC addresses compared to mainstream IPv4. Instead of
64-bit hardware addresses, though, IPv6 automatically translates 48-bit
MAC address to a 64-bit address by inserting a fixed (hardcoded) 16-
bit value FFFE in between the vendor prefix and the device identifier.
IPv6 calls these numbers "identifiers" to distinguish them from true 64-bit
hardware addresses. For example, a 48-bit MAC address
00:25:96:12:34:56 appears on an IPv6 network as (commonly written in
either of these two forms):
- 00:25:96:FF:FE:12:34:56
- 0025:96FF:FE12:3456
MAC ADDRESS FORMAT
Dr. Yasir Dawood
Braided-shield
This shield protects signals from external interference and noise. This shield is built from the same metal that is used to
build the core.
Insulation
Insulation protects the core. It also keeps the core separate from the braided-shield. Since both the core and the braided-
shield use the same metal, without this layer, they will touch each other and create a short- circuit in the wire.
Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable can be categorized into two types;
single-core coaxial cable and multi-core coaxial cable.
A single-core coaxial cable uses a single central metal (usually copper) conductor,
while a multi-core coaxial cable uses multiple thin strands of metal wires.
TWISTED-PAIR CABLES
Usually, there are four pairs. Each pair has one solid color and one stripped color
wire. Solid colors are blue, brown, green and orange. In stripped color, the solid
color is mixed with the white color.
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-
pair cable; UTP and STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic
sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional
metal shield, then all pairs are wrapped in a single outer plastic sheath.
SIMILARITIES AND DIFFERENCES BETWEEN STP
AND UTP CABLES
STP UTP
can transmit data at 10Mbps, 100Mbps, 1Gbps, and can transmit data at 10Mbps, 100Mbps, 1Gbps, and
10Gbps. 10Gbps.
the STP cable contains more materials, the UTP cable contains less materials,
it is more expensive than the UTP cable it is less expensive than the STP cable
Both cables use the same RJ-45 (registered jack) Both cables use the same RJ-45 (registered jack)
modular connectors. modular connectors
The STP provides more noise and EMI resistant than The UTP provides less noise and EMI resistant than the
the UTP cable. STP cable.
The maximum segment length for both cables is 100 The maximum segment length for both cables is 100
meters or 328 feet. meters or 328 feet.
Both cables can accommodate a maximum of 1024 Both cables can accommodate a maximum of 1024
nodes in each segment. nodes in each segment.
CABLES
FIBER OPTIC CABLE
This cable consists of core, cladding, buffer, and jacket. The core is made from the thin strands
of glass or plastic that can carry data over the long distance. The core is wrapped in the
cladding; the cladding is wrapped in the buffer, and the buffer is wrapped in the jacket.
Core carries the data signals in the form of the light. Cladding reflects light back to the core.
Buffer protects the light from leaking. The jacket protects the cable from physical damage.
Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over a
long distance at the highest speed. It can transmit data up to 40 kilometres at the speed of
100Gbps.
Fiber optic uses light to send data. It reflects light from one endpoint to another. Based on how
many beams of light is transmitted at a given time, there are two types of fiber optical cable;
SMF and MMF.
STRAIGHT THROUGH AND CROSSOVER CABLE
Ethernet cables can be wired as straight through or crossover.
The straight through is the most common type and is used to connect computers
to hubs or switches. They are most likely what you will find when you go to
your local computer store and buy a patch cable.
Crossover Ethernet cable is more commonly used to connect a computer to a
computer and may be a little harder to find since they aren’t used nearly as
much as straight through Ethernet cable.
T568A AND T568B WIRING STANDARD BASIS
WHAT IS STRAIGHT THROUGH CABLE?
A straight through cable is a type of twisted pair cable that is used in local
area networks to connect a computer to a network hub such as a router. This
type of cable is also sometimes called a patch cable and is an alternative to
wireless connections where one or more computers access a router through
wireless signal.
On a straight through cable, the wired pins match. Straight through cable use
one wiring standard: both ends use T568A wiring standard or both ends use
T568B wiring standard.
WHAT IS CROSSOVER CABLE?
A crossover Ethernet cable is a type of Ethernet cable used to
connect computing devices together directly.
Unlike straight through cable, the RJ45 crossover cable uses two
different wiring standards: one end uses the T568A wiring
standard and the other end uses the T568B wiring standard.
The internal wiring of Ethernet crossover cables reverses the
transmit and receive signals. It is most often used to connect two
devices of the same type: e.g. two computers or two switches to
each other.
STRAIGHT THROUGH VS CROSSOVER CABLE,
WHICH TO CHOOSE?
Straight through vs crossover cable, which one should I choose? Usually, straight through cables are
primarily used for connecting unlike devices. And crossover cables are use for connecting alike devices.
Use straight through Ethernet cable for the following cabling:
Switch to router
Switch to PC or server
Hub to PC or server
Switch to hub
PC to PC
TWISTED-PAIR (STP AND UTP) NETWORK CABLE
CRIMPING TOOLS
NETWORK CABLE TESTING AND TROUBLESHOOTING
TOOLS
A network cable testing and troubleshooting tool is used for the
following purposes.
To measure the length of a segment or network cable.
To detect loose connectors.
To identify an un-labeled network cable from all network cables.
To find a break in the network cable.
To certify the cable installation.
CABLE CERTIFIER TIME DOMAIN REFLECTOMETER
BASIC CABLE TESTER
Dr. Yasir Dawood
IP Addressing
Subnetting
IPv4 vs IPvs6
IP ADDRESSES
An IP address is an address used to uniquely identify a device on
an IP network.
The address is made up of 32 binary bits which can be divisible
into a network portion and host portion with the help of a subnet
mask.
32 binary bits are broken into four octets (1 octet = 8 bits)
Dotted decimal format (for example, 137.45.104.172)
DOTTED DECIMAL VS BINARY
137.45.104.172
10001001001011010110100010101100
CONVERSION BETWEEN DECIMAL & BINARY
128 X 1 = 128
64 X 0 = 0
32 X 0 = 0
16 X 0 = 0
8 X 1 = 8
4 X 0 = 0
2 X 0 = 0
1 X 1 = 1
137
CONVERSION BETWEEN DECIMAL & BINARY
128 1 128 0 0 0 0 1 128
64 0 0 0 0 1 64 0 0
32 0 0 1 32 1 32 1 32
16 0 0 0 0 0 0 0 0
8 1 8 1 8 1 8 1 8
4 0 0 1 4 0 0 1 4
2 0 0 0 0 0 0 0 0
1 1 1 1 1 0 0 0 0
137 45 104 172
IP ADDRESS CLASSES
ADDRESS CLASSES (CONTINUED)
Determining which part of the IP address belongs to the network (N)and
which part belongs to the host(h).
Class A – NNNNNNNN.hhhhhhhh.hhhhhhhh.hhhhhhhh
Class B – NNNNNNNN.NNNNNNNN.hhhhhhhh.hhhhhhhh
Class C – NNNNNNNN.NNNNNNNN.NNNNNNNN.hhhhhhhh
140.179.220.200 is a Class B so the first 2 octets identify the
network address 140.179.0.0
If the address was then set to 140.179.255.255 this would be a
broadcast address for that network and all nodes would receive
communication
PRIVATE SUBNETS
There are 3 network address ranges reserved for private networks.
These are internal IP networks that sit behind a proxy server or external
router interface.
Routers on the internet by default will not forward packets coming from
these addresses
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
SUBNET MASKING
Applying a subnet mask to an IP address enables identification of network
part and the host parts of the address
The network bits are represented by 1’s and the host bits represented by 0’s
137.45.104.172
255.255.255.0
“ANDING” A BINARY SUBNET MASK
10001001001011010110100010101100
11111111111111111111111100000000
10001001001011010110100000000000
subnet ID = (137.45.104.0)
IP ADDRESS CLASSES
Class A: The first octet is the network portion. Octets 2, 3, and 4
are for subnets/hosts
Reserved for governments and large corporations throughout the
world
Class B: The first two octets are the network portion. Octets 3 and
4 are for subnets/hosts
Addresses are assigned to large- and medium-sized companies
IP CLASSES (CONTINUED)
IP CLASSES (CONTINUED)
• Class C
The first three octets are the network portion. Octet 4 is for subnets/hosts
– Addresses are assigned to groups that do not meet the qualifications to
obtain Class A or B addresses
• Class D
– Addresses (also known as multicast addresses) are reserved for
multicasting
– Multicasting is the sending of a stream of data (usually audio and
video) to multiple computers at the same time
IP CLASSES (CONTINUED)
IP CLASSES (CONTINUED)
Class E
Addresses are reserved for research, testing, and experimentation
The Class E range starts where Class D leaves off
Private IP ranges
Many companies use private IP addresses for their internal networks
Will not be routable on the Internet
Gateway devices have network interface connections to the internal
network and the Internet
Route packets between them
IP CLASSES (CONTINUED)
SUBNETTING
Creates multiple logical networks that exist within a single Class
A, B, or C network.
If you do not subnet, you will only be able to use one network
from your Class A, B, or C network, which is unrealistic.
Each data link on a network must have a unique network ID, with
every node on that link being a member of the same network
BENEFITS OF SUBNETTING
3) Simplified management
2x – 2 = # of usable hosts per subnet (where x is the number of bits remaining in the
host field after borrowing)
SUBNETTING FORMULAS (CONTINUED)
SUBNETTING FORMULAS (CONTINUED)
LEARNING TO SUBNET (CONTINUED)
SUBNETTING A CLASS A/B/C ADDRESS
Subnets? 21 = 2
Hosts? 215– 2 = 32,766 (7 bits in the third octet, and 8 in the fourth)
Valid subnets? 256 – 128 = 128. (0, 128). Remember that subnetting is performed
in the third octet, so the subnet numbers are really 0.0 and 128.0, as shown in the
next table
Broadcast address for each subnet?
Valid hosts?
PRACTICE EXAMPLE #1B: 255.255.128.0 (/17)
NETWORK 172.16.0.0
IP version 6 (IPv6)
Originally designed to address the eventual depletion of IPv4 addresses
Classless inter-domain routing (CIDR) has slowed the exhaustion of IPv4 address
o One of the major functions of the physical layer is to move data in the form of
electromagnetic signals across a transmission medium.
o It is responsible for movements of individual bits from one node to next node
Digital Data: refers to information that has discrete states. (a digital clock)
Digital data take on discrete values. For example, data are stored in computer
memory in the form of 0s and 1s.
ANALOG AND DIGITAL
Signals can be analog or digital.
An analog signal has infinitely many levels of intensity over a period of time.
A digital signal, can have only a limited number of defined values.
ANALOG AND DIGITAL
Digital Signal
Information can also be represented by a digital signal
For example, a 1 can be encoded as a positive voltage and a 0 as zero voltage.
A digital signal can have more than two levels. In this case, we can send more than
1 bit for each level.
• Most digital signals are non-periodic, and thus period and (frequency are not
appropriate characteristics).
Solution
The bit rate can be calculated as
ANALOG AND DIGITAL
Example 5
What is the bit rate for high-definition TV (HDTV)?
Solution
HDTV uses digital signals to broadcast high quality video signals. The HDTV screen
is normally a ratio of 16 : 9. There are 1920 by 1080 pixels per screen, and the screen
is renewed 30 times per second. Twenty-four bits represents one color pixel.
The first, bandwidth in hertz, refers to the range of frequencies in a composite signal
or the range of frequencies that a channel can pass.
The second, bandwidth in bits per second, refers to the speed of bit transmission in
a channel or link. Often referred to as Capacity.
Solution
We can calculate the throughput as
Solution
We can calculate the propagation time as
The example shows that a bit can go over the Atlantic Ocean in only 50
ms if there is a direct cable between the source and the destination.
EXAMPLE 2
What are the propagation time and the transmission time for a 2.5-kbyte
message (an e-mail) if the bandwidth of the network is 1 Gbps? Assume
that the distance between the sender and the receiver is 12,000 km and that
light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission time as shown on the
next slide:
EXAMPLE 2 (CONTINUED)
Note that in this case, because the message is short and the bandwidth is high,
the dominant factor is the propagation time, not the transmission time. The
transmission time can be ignored.
EXAMPLE 3
What are the propagation time and the transmission time for a 5-Mbyte
message (an image) if the bandwidth of the network is 1 Mbps? Assume
that the distance between the sender and the receiver is 12,000 km and that
light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission times as shown on the
next slide.
EXAMPLE 3 (CONTINUED)
Note that in this case, because the message is very long and the bandwidth is
not very high, the dominant factor is the transmission time, not the
propagation time. The propagation time can be ignored.
FILLING THE LINK WITH BITS FOR CASE 1
EXAMPLE 4
We can think about the link between two points as a pipe. The cross
section of the pipe represents the bandwidth, and the length of the pipe
represents the delay. We can say the volume of the pipe defines the
bandwidth-delay product, as shown in Figure 3.7.
below shows the throughput vs. time. Use this figure to calculate the following:
500
2) Amount of data transferred between second 70 and second 120 ?
That is why a wire carrying electric signals gets warm, if not hot, after a while
some of the electrical energy in the signal is converted to heat.
To compensate for this loss, amplifiers are used to amplify the signal.
ATTENUATION
Figure shows the effect of attenuation and amplification.
DECIBEL
To show that a signal has lost or gained strength, engineers use the unit of the
decibel.
The decibel (dB) measures the relative strengths of two signals or one signal at
two different points.
Note that the decibel is negative if a signal is attenuated and positive if a signal is
amplified.
dB = 10 log10 P2/P1
EXAMPLE 1
Suppose a signal travels through a transmission medium and its power is reduced to
one-half.
This means that P2 = ½ P1. In this case, the attenuation (loss of power) can be
calculated as
This means that P2 = 10 P1. In this case, the amplification (gain of power) can be
calculated as
EXAMPLE 3
One reason that engineers use the decibel to measure the changes in the strength of
a signal is that decibel numbers can be added (or subtracted) when we are
measuring several points (cascading) instead of just two. In the figure a signal travels
from point 1 to point 4. In this case, the decibel value can be calculated as
DISTORTION
Distortion means that the signal changes its shape.
Signal components at the receiver have phases different from what they had
at the sender.
DISTORTION
NOISE
Several types of noise, may corrupt the signal.
• Thermal noise: is the random motion of electrons in a wire, which creates an
extra signal not originally sent by the transmitter.
• Induced noise: comes from sources such as motors and appliances. These devices
act as a sending antenna, and the transmission medium acts as the receiving
antenna.
• Crosstalk: is the effect of one wire on the other. One wire acts as a sending
antenna and the other as the receiving antenna.
• Impulse noise: is a spike (a signal with high energy in a very short time) that
comes from power lines, lightning, and so on.
NOISE
SIGNAL-TO-NOISE RATIO (SNR):
To find the theoretical bit rate limit, we need to know the ratio of the signal power
to the noise power.
The signal-to-noise ratio is defined as:
SNR = (average signal power) / (average noise power)
Television broadcasting
Internet communication
terrestrial communication.
FACTORS IN SATELLITE COMMUNICATION
Disadvantages
A GEO satellite’s distance also cause it to have both a comparatively weak
signal and a time delay in the signal, which is bad for point to point
communication.
GEO satellites, centered above the equator, have difficulty broadcasting
signals to near polar regions
LOW EARTH ORBIT (LEO)
LEO satellites are much closer to the earth than GEO satellites, ranging from 500 to
1,500 km above the surface.
LEO satellites don’t stay in fixed position relative to the surface, and are only visible
for 15 to 20 minutes each pass.
A network of LEO satellites is necessary for LEO satellites to be useful
LEO ADVANTAGES
Advantages
A LEO satellite’s proximity to earth compared to a GEO satellite
gives it a better signal strength and less of a time delay, which
makes it better for point to point communication.
A LEO satellite’s smaller area of coverage is less of a waste of
bandwidth.
LEO DISADVANTAGES
Disadvantages
A network of LEO satellites is needed, which can be costly
LEO satellites have to compensate for Doppler shifts cause by
their relative movement.
Atmospheric drag effects LEO satellites, causing gradual orbital
deterioration.
MEDIUM EARTH ORBIT (MEO)
Advantage
A MEO satellite’s longer duration of visibility and wider footprint means
fewer satellites are needed in a MEO network than a LEO network.
Disadvantage
A MEO satellite’s distance gives it a longer time delay and weaker signal
than a LEO satellite, though not as bad as a GEO satellite.
OTHER ORBITS
TDMA
Advantages over FDMA
FDMA
Satellite frequency is already broken into bands, and is broken in to smaller channels
in Frequency Division Multiple Access (FDMA).
Overall bandwidth within a frequency band is increased due to frequency reuse (a
frequency is used by two carriers with orthogonal polarization).
FDMA (CONT.)
The number of sub-channels is limited by three factors:
Thermal noise (too weak a signal will be effected by background noise).
Intermodulation noise (too strong a signal will cause noise).
Crosstalk (cause by excessive frequency reusing).
FDMA (CONT.)
FDMA can be performed in two ways:
Fixed-assignment multiple access (FAMA): The sub-channel assignments are of a fixed allotment.
Ideal for broadcast satellite communication.
Demand-assignment multiple access (DAMA): The sub-channel allotment changes based on demand.
Ideal for point to point communication.
TDMA
TDMA (Time Division Multiple Access) breaks a transmission into multiple time slots,
each one dedicated to a different transmitter.
TDMA is increasingly becoming more widespread in satellite communication.
TDMA uses the same techniques (FAMA and DAMA) as FDMA does.
TDMA (CONT.)
Configure Hostnames
• IOS hostnames should:
• Start with a letter
• Contain no spaces
• End with letter or digit
• Use only letters, digits or dashes
• Be less than 64 characters in length
HOSTNAMES
LIMIT ACCESS TO DEVICE CONFIGURATIONS
Secure Device Access
• Secure privileged EXEC and user EXEC
access with a password.
• Secure virtual terminal lines with a
password.
Configure Passwords
• Use strong passwords.
• Avoid re-using passwords
Encrypt Passwords
• Cisco IOS displays passwords in plain text
by default.
• Passwords should be encrypted.
LIMIT ACCESS TO DEVICE CONFIGURATIONS
Secure Device Access
To secure privileged EXEC access, use the enable secret password command.
An older, less secure variation of this command is the enable password password command.
The enable secret command provides greater security because the password is encrypted.
LIMIT ACCESS TO DEVICE CONFIGURATIONS
The console port of network devices must be secured by requiring
the user to supply a strong password.
This reduces the chance of unauthorized person physically plugging
a cable into the device and gaining device access.
The following commands are used in global configuration mode to
set a password for the console line:
ip name-server serverip-1 serverip-2 A configure mode command that sets the IP addresses of DNS servers
Troubleshooting Commands
ping {hostname | system-address} [source source- Used in enable mode to diagnose basic network connectivity
address]
speed {10 | 100 | 1000 | auto} An interface mode command that manually sets the speed to the specified
value or negotiates it automatically
duplex {auto | full | half} An interface mode command that manually sets duplex to half, full or auto
show interfaces Displays detailed information about interface status, settings and counters
show interfaces switchport Displays a large variety of configuration settings and current operational
status, including VLAN trunking details.
Extra
ip route network-number network-mask {ip-address | Sets a static route in the IP routing table
interface}
password pass-value Lists the password that is required if the login command (with no other
parameters) is configured
username name password pass-value A global command that defines one of possibly multiple user names and
associated passwords used for user authentication. It is used when the login
local line configuration command has been used.
enable password pass-value A configuration mode command that defines the password required when
using the enable command
enable secret pass-value A configuration mode command that sets this Cisco device password that is
required for any user to enter enable mode
ip domain-name name Configures a DNS domain name
logging ip-address Configures the IP address of the host that will receive the system logging
(syslog) messages
terminal monitor An enable mode command that tells Cisco IOS to send a copy of all syslog
messages, including debug messages, to the Telnet or SSH user who issues
this command
COMPUTER NETWORKING
FUNDAMENTALS
Dr. Yasir Dawood
The Physical Layer
THE PHYSICAL LAYER
•Theoretical Basis for Data Communications
•Guided Transmission Media
•Wireless Transmission
•Communication Satellites
•Digital Modulation and Multiplexing
•Public Switched Telephone Network
•Mobile Telephone System
•Cable Television
THEORETICAL BASIS FOR DATA TRANSMISSION
There are physical limits to what can be sent over a channel.
Three types of transmission media- each with different properties and performance
capabilities:
Guided (copper wire and fiber)
Wireless (radio frequency)
Satellite
Digital modulation - how analog signals are converted into digital bits and back
again.
Multiplexing to put multiple conversation on the same transmission medium without
interfering with one another.
3 examples of communication systems: telephone, mobile phone and cable TV.
THE PHYSICAL LAYER
Foundation on which other layers build
Properties of wires, fiber, wireless limit what the network can do Application
Transport
Key problem is to send (digital) bits using only (analog) signals Network
This is called modulation Link
Physical
THEORETICAL BASIS FOR DATA COMMUNICATION
Communication rates have fundamental limits
Fourier analysis »
Bandwidth-limited signals »
Maximum data rate of a channel »
FOURIER ANALYSIS
A time-varying signal can be equivalently represented as a series of frequency
components (harmonics) or the sum of sines and cosines:
a, b weights of harmonics
Signal over time
FOURIER ANALYSIS
No transmission facility can transmit signal with losing some power in process.
If all Fourier components were equally diminish, the resulting signal would be
reduced in amplitude, but not distorted. Unfortunately all transmission facilities
diminish different Fourier components by different amount, thus introducing
distortion.
The width of this frequency range is called the bandwidth.
Baseband run from 0 to some max frequency
Passband- shifted to occupy higher frequencies such as wireless
BANDWIDTH
Bandwidth is a physical property of the transmission medium such
as the construction, thickness and length of the wire or fiber.
Limiting the bandwidth, limits the data rate.
Goal for digital transmission is to receive a signal with enough
fidelity to reconstruct the sequence of bits that was sent.
BANDWIDTH-LIMITED SIGNALS
8 harmonics
Having less bandwidth (harmonics) degrades the signal
Lost!
Bandwidth
4 harmonics
Lost!
2 harmonics
Lost!
MAXIMUM DATA RATE OF A CHANNEL
Nyquist’s theorem relates the data rate to the bandwidth (B) and number of signal levels (V):
Shannon's theorem relates the data rate to the bandwidth (B) and signal strength (S) relative to
the noise (N):
Shannon reminds us that there is a fundamental limit to the number of bits pre second
that can be transmitted in a real communication system ( due to the laws of Physics).
GUIDED TRANSMISSION (WIRES & FIBER)
Media have different properties, hence performance
Reality check
Storage media »
Wires:
Twisted pairs »
Coaxial cable »
Power lines »
Fiber cables »
SOME USEFUL TERMS
Different media have different properties such as bandwidth, delay, cost and ease of
installation.
Delay or latency is the time needed to transfer data across a network, usually from one point
to another, like cars on a highway going from point A to point B
Throughput or capacity is the amount of data that can be transmitted in a unit of time, usually
bps.
Bandwidth is the difference between the highest and lowest frequency or the number of signal
changes. In computing, bandwidth refers to the capacity of the channel, or the rate of data
transfer in bps.
SOME TYPICAL 56 kbit/s
1.5 Mbit/s
Modem / Dialup
ADSL Lite
Microwave
ELECTROMAGNETIC SPECTRUM (2)
To manage interference, spectrum is carefully divided, and its use regulated and licensed,
e.g., sold at auction.
802.11 802.11a/g/n
b/g/n
RADIO TRANSMISSION
Radio signals penetrate buildings well and propagate for long distances with path loss
In the VLF, LF, and MF bands, radio waves follow the In the HF band, radio waves bounce off the
curvature of the earth ionosphere.
MICROWAVE TRANSMISSION
Microwaves have much bandwidth and are widely used indoors (WiFi) and outdoors (3G, 4G
satellites)
Signal is attenuated/reflected by everyday objects
Strength varies with mobility due multipath fading, etc.
LIGHT TRANSMISSION
Line-of-sight light (no fiber) can be used for links
Light is highly directional, has much bandwidth
Use of LEDs/cameras and lasers/photodetectors
WIRELESS VS. WIRES/FIBER
Wireless:
+ Easy and inexpensive to deploy
+ Naturally supports mobility
+ Naturally supports broadcast
− Transmissions interfere and must be managed
− Signal strengths hence data rates vary greatly
Wires/Fiber:
+ Easy to engineer a fixed data rate over point-to-point links
− Can be expensive to deploy, esp. over distances
− Doesn’t readily support mobility or broadcast
SATELLITE VS. FIBER
Satellite:
+Can rapidly set up anywhere/anytime communications (after satellites have
been launched)
+Can broadcast to large regions
- Limited bandwidth and interference to manage
Fiber:
+Enormous bandwidth over long distances
- Installation can be more expensive/difficult
MULTIPLEXING
A physical channel in a transmission medium may provide bandwidth greater
than required for a data stream
To efficiently utilize the capacity of the channel, several channel access
schemes are applied
Multiple transceivers share a transmission medium
The channel access methods in the link layer are packet-mode methods
that are based on multiple access protocols in the media access control
(MAC) sublayer
The duplexing methods are used to separate the uplink and downlink
channels
27
A multiplexing system with multiplexer (MUX) and demultiplexer
(DEMUX) is shown as follows
Data streams from multiple data sources multiplexed and
transmitted over a shared physical channel
MULTIPLEXING TECHNIQUES
Time-Division Multiplexing (TDM)
Frequency-Division Multiplexing (FDM)
Wavelength-Division Multiplexing (WDM)
Code Division Multiple (CDM)
The mapping of channel access scheme and multiplexing
TIME-DIVISION MULTIPLEXING (TDM)
Remember that a WAN connection normally uses a provider’s network.
Time Division Multiplexing (TDM) is used to give each conversation a share of the
connection in turn.
TDM assures that a fixed capacity connection is made available to the subscriber.
TIME-DIVISION MULTIPLEXING (TDM)
TDM is a technique to combine multiple digital signals from low-rate
channels into a high-rate channel shared alternately in time slots
A simplified scheme of TDM is shown as follows, where data
streams from different sources are interleaved in a stream of time
slots
32
TDM divides a time domain into several recurrent time slots of certain time
length
Each time slot is considered part of a sub-channel or logical channel
Multi-slot allocation
37
FDM application
The radio broadcasting of AM and FM signals
For example, the bandwidth from 530 kHz to 1700 kHz is assigned
to AM radio
This is the bandwidth of a physical channel medium and is shared
by several radio stations
Frequency-Division Multiple Access (FDMA)
An access method extended from FDM
Variants of FDMA
Orthogonal Frequency-Division Multiple Access (OFDMA) based
on Orthogonal Frequency-Division Multiplexing (OFDM)
Single Carrier FDMA (SC-FDMA) based on Single-Carrier
Frequency Domain Equalization (SC-FDE)
Wavelength-Division Multiple Access (WDMA) based on
wavelength-division multiplexing (WDM)
39
WAVELENGTH-DIVISION MULTIPLEXING (WDM)
WDM is equivalent to frequency-division multiplexing, but WDM is
often used in fiber-optic communications where wavelength is the
common term to describe the carrier modulated by optical signals
WDM uses different wavelengths of laser light to carry different
signals, and each wavelength is specified as a sub-channel in a
single optical fiber
Because the data rate of the optical fibers is much higher than that
of twisted pair cables, WDM is normally used to aggregate the data
from multiple users
WDM application: SONET (Synchronous Optical Networking)
40
CODE DIVISION MULTIPLE ACCESS (CDM)
oAll terminals send on the same frequency probably at the same time and can use the whole
bandwidth of the transmission channel
oSo, how the receivers identify the data/signals for them?
oEach sender has a unique random number (code), the sender XORs the signal with this random
number
oDifferent senders use different codes
oThe codes separate the signals from different senders
oThe encoded signals are concatenated together for sending, i.e., as a signal stream of signals
oThe receiver “tunes” into this signal stream if it knows the virtual random number. Tuning is
done via a correlation function
oThe received decodes the signal stream using the known code to identify the data for it
oDifferent receivers received different data as they use different codes
MOBILE TELEPHONE SYSTEM
Mobile telephone service (MTS) connects mobile radio
telephones with other networks like public switched
telephone networks (PSTN), other mobile telephones and
communication systems like Internet.
GENERATIONS OF MOBILE TELEPHONE SYSTEMS
1G, analog voice
AMPS (Advanced Mobile Phone System) is example, deployed from 1980s. Modulation based on FM (as in radio).
Internet
UMTS – UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (2)
Air interface based on CDMA over 5 MHz channels
Rates over users <14.4 Mbps (HSPDA) per 5 MHz
CDMA allows frequency reuse over all cells
CDMA permits soft handoff (connected to both cells)
Soft
handoff
WHAT IS LTE?
•LTE stands for “Long Term Evolution”
•Fourth-generation (4G) cellular technology from 3GPP
•Deployed worldwide
•4G LTE: First global standard
–Increased speed
–IP-based network (All circuits are gone/fried!)
–New air interface: OFDMA (Orthogonal Frequency-Division Multiple Access),
MIMO (multiple antennas)
• Also includes duplexing, timing, carrier spacing, coding...
–New service paradigm (e.g., VoLTE)
WHAT IS LTE?
•LTE is always evolving and 3GPP often has new “releases”
–First release: Rel-8
–Current: Rel-11, Rel-12
–Toward LTE-Advanced (4.5G)
NETWORK ARCHITECTURE EVOLUTION
2G 3G 4G
ISP
(Internet)
SPECTRUM ALLOCATION
Upstream and downstream data are allocated to frequency channels not used for TV
channels:
CABLE MODEMS
Cable modems at customer premises implement the physical layer of the DOCSIS standard
QPSK/QAM is used in timeslots on frequencies that are assigned for upstream/downstream data
CABLE VS. ADSL
Cable:
+Uses coaxial cable to customers (good bandwidth)
Data is broadcast to all customers (less secure)
Bandwidth is shared over customers so may vary
ADSL:
+Bandwidth is dedicated for each customer
+Point-to-point link does not broadcast data
Uses twisted pair to customers (lower bandwidth)
COMPUTER NETWORKING
FUNDAMENTALS
Dr. Yasir Dawood
Circuit Switching and Packet Switching
CIRCUIT SWITCHING AND PACKET SWITCHING
Packet-switched networks move data in separate, small blocks “packets” based on
the destination address in each packet. When received, packets are reassembled in
the proper sequence to make up the message. Circuit-switched networks require
dedicated point-to-point connections during calls.
Circuit-switched networks and packet-switched networks have traditionally occupied
different spaces within corporations. Circuit-switched networks were used for phone
calls and packet-switched networks handled data. But because of the reach of
phone lines and the efficiency and low cost of data networks, the two technologies
have shared chores for years.
SWITCHING NETWORKS
Long distance transmission is typically done over a network of switched nodes
Nodes not concerned with content of data
End devices are stations
Computer, terminal, phone, etc.
Network Interface
Control Unit
Establish connections
Generally on demand
Handle and acknowledge requests
Determine if destination is free
construct path
Maintain connection
Disconnect
PUBLIC CIRCUIT SWITCHED NETWORK
TELECOMS COMPONENTS
Subscriber
Devices attached to network
Subscriber line
Local Loop
Subscriber loop
Connection to network
Few km up to few tens of km
Exchange
Switching centers
End office - supports subscribers
Trunks
Branches between exchanges
Multiplexed
CIRCUIT
ESTABLISHMENT
CIRCUIT SWITCHING CONCEPTS
Blocking or Non-blocking
Blocking
A network is unable to connect stations because all paths are in use
Used on voice systems since we have Short duration calls
Non-blocking
Permits all stations to connect (in pairs) at once
Used for some data connections
Multistage Switch
Reduced number of crosspoints
More than one path through network
Increased reliability
More complex control
May be blocking
TIME DIVISION SWITCHING
Modern digital systems rely on intelligent control of space and time division elements
Use digital time division techniques to set up and maintain virtual circuits
Partition low speed bit stream into pieces that share higher speed stream
CONTROL SIGNALING FUNCTIONS
Audible communication with subscriber
Transmission of dialed number
Call can not be completed indication
Call ended indication
Signal to ring phone
Billing info
Equipment and trunk status info
Diagnostic info
Control of specialist equipment
CONTROL SIGNAL SEQUENCE
Both phones on hook
Subscriber lifts receiver (off hook)
End office switch signaled
Switch responds with dial tone
Caller dials number
If target not busy, send ringer signal to target subscriber
Feedback to caller
Ringing tone, engaged tone, unobtainable
Within network
Management of subscriber calls and network
ore complex
IN CHANNEL SIGNALING
Use same channel for signaling and call
Requires no additional transmission facilities
Inband
Uses same frequencies as voice signal
Can go anywhere a voice signal can
Impossible to set up a call on a faulty speech path
Out of band
Voice signals do not use full 4kHz bandwidth
Narrow signal band within 4kHz used for control
Can be sent whether or not voice signals are present
Need extra electronics
Slower signal rate (narrow bandwidth)
DRAWBACKS OF IN CHANNEL SIGNALING
Limited transfer rate
Delay between entering address (dialing) and connection
Overcome by use of common channel signaling
COMMON CHANNEL SIGNALING
Control signals carried over paths independent of voice channel
One control signal channel can carry signals for a number of subscriber
channels
Common control channel for these subscriber lines:
Associated Mode
Common channel closely tracks Interswitch trunks
Disassociated Mode
Additional nodes (signal transfer points)
Effectively two separate networks
COMMON V. IN CHANNEL SIGNALING
COMMON
CHANNEL
SIGNALING
MODES
Advantages of circuit switching over packet switching:
•Decreases the delay the user experiences before and during a call
•The call will be done with a steady bandwidth, dedicated channel, and consistent
data rate
•Packets are always delivered in the correct order
Disadvantages of circuit switching:
•Great for only voice communication
•Doesn’t use resources efficiently
•Dedicated channels for circuit switching are unavailable for any other use
•There is a higher cost to dedicate one channel per use
Advantages of packet switching over circuit switching:
•More efficient than circuit switching
•Data packets are able to find the destination without the use of a dedicated channel
•Reduces lost data packets because packet switching allows for resending of packets
•More cost-effective since there is no need for a dedicated channel for voice or data
traffic
Disadvantages of packet switching:
•Not ideal for applications that are in constant use, such as high volume voice calls
•High-volume networks can lose data packets during high-traffic times; those data
packets cannot be recovered or resent during transmission
•There is a lack of security protocols for data packets during transmission
CIRCUIT-SWITCHED VS. PACKET SWITCHED NETWORKS
SIGNALING SYSTEM NUMBER 7 (SS7)
Signaling System No. 7 is a set of telephony signaling
protocols developed in 1975, which is used to set up and
tear down telephone calls in most parts of the world-wide
public switched telephone network.
SS7 SIGNALING NETWORK ELEMENTS
Signaling point (SP)
Any point in the network capable of handling SS7 control message
Control plane
Responsible for establishing and managing connections
Information plane
Once a connection is set up, info is transferred in the information plane
TRANSFER
POINTS
SIGNALING NETWORK STRUCTURES
STP capacities
Number of signaling links that can be handled
Message transfer time
Throughput capacity
Network performance
Number of SPs
Signaling delays
Control info
Routing (addressing) info
Packets are received, stored briefly (buffered) and past on to the next node
Store and forward
USE OF PACKETS
ADVANTAGES
Line efficiency
Single node to node link can be shared by many packets over time
Packets queued and transmitted as fast as possible
Datagram
No call setup phase
Better if few packets
More flexible
Routing can be used to avoid congested parts of the network
PACKET SIZE
EVENT TIMING
X.25
1976
Interface between host and packet switched network
Almost universal on packet switched networks and packet switching in ISDN
Defines three layers
Physical
Link
Packet
X.25 - PHYSICAL
Interface between attached station and link to node
Data terminal equipment DTE (user equipment)
Data circuit terminating equipment DCE (node)
Uses physical layer specification X.21
Reliable transfer across physical link
Sequence of frames
X.25 - LINK
Link Access Protocol Balanced (LAPB)
Subset of HDLC
see chapter 7
X.25 - PACKET
External virtual circuits
Logical connections (virtual circuits) between subscribers
X.25 USE OF VIRTUAL CIRCUITS
VIRTUAL CIRCUIT SERVICE
Logical connection between two stations
External virtual circuit
Typically one to one relationship between external and internal virtual circuits
Can employ X.25 with datagram style network
External virtual circuits require logical channel
All data considered part of stream
X.25 LEVELS
User data passes to X.25 level 3
X.25 appends control information
Header
Identifies virtual circuit
Provides sequence numbers for flow and error control
No inband signaling
No sequence numbers
No flow nor error control
COMPUTER NETWORKING
FUNDAMENTALS
Dr. Yasir Dawood
Error Detection and Correction
DATA LINK LAYER
INTRODUCTION
Networks must be able to transfer data from one device to another with
complete accuracy. A system that cannot guarantee that the data received
by one device are identical to the data transmitted by another device is
essentially useless. Yet any time data are transmitted from source to
destination, they can become corrupted in passage. In fact, it is more likely
that some part of a message will be altered in transit than that the entire
contents will arrive intact. Many factors, including line noise, can alter or
wipe out one or more bits of a given data unit. Reliable systems must have
a mechanism for detection, and correcting such errors.
TYPES OF ERRORS
Whenever an electromagnetic signal flows from one point to another, it is subject to
unpredictable interference from heat, magnetism, and other forms of electricity. This
interference can change the shape or timing of the signal.
Such changes can alter the meaning of the data. Changing 0 to 1 or 1 to 0. Bits can
be changed singly or in clumps. So, it is important to understand three types of errors.
These types are usually referred to as single-bit, multiple-bit, and burst errors. Of the
three, a single-bit, error is the most likely to occur and a burst error the least likely.
Errors can be of three types, namely single bit errors, multiple bit errors, and burst
errors.
SINGLE BIT ERROR
Single bit error − In the received frame, only one bit has been
corrupted, i.e., either changed from 0 to 1 or from 1 to 0. Single bit
errors type of errors in serial data transmission because the noise must
have a very short duration which is very rare.
MULTIPLE-BIT ERROR
Multiple bits error − In the received frame, more than
one bit is corrupted.
BURST ERROR
Burst error − In the received frame, more than one consecutive bit is corrupted. means
that two or more bits in the data unit have changed from 1 to 0 or from 0 to 1.
EXAMPLE 1
The number of bits affected depends on the data rate and duration of noise.
Example1/ Describe briefly the burst error and mention how many bits can be affected by noise if data
is sent at rate 1Kbps then a noise of 0.01 sec.
Answer :
Burst error: means that two or more bits in the data unit have changed from 1 to 0 or from 0 to 1.
Number of bits can be affected = Noise × bit rate = (0.01) × (1 × 103) = 10 𝑏𝑏𝑖𝑖𝑡𝑡𝑠𝑠
EXAMPLE 2
How many bits can be affected by noise if data is sent at rate 1Mbps
then a noise of 0.01 sec.
Answer:
Error detection − Error detection involves checking whether any error has occurred or not. The
number of error bits and the type of error does not matter.
Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the
destination.
Error correction − Error correction involves ascertaining the exact number of bits that has been
corrupted and the location of the corrupted bits.
For both error detection and error correction, the sender needs to send some additional bits along with
the data bits. The receiver performs necessary checks based upon the additional redundant bits. If it
finds that the data is free from errors, it removes the redundant bits before passing the message to the
upper layers.
ERROR DETECTION
Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the
destination.
Redundancy
** Redundancy: send some extra bits with data.
These bits are added by sender and deleted by
the receiver. These bits are used for error
detection and correction.
THE STRUCTURE OF ENCODER AND DECODER
TYPES OF REDUNDANCY CHECKS
Four types of redundancy checks are used in data communications:
The first three, VRC, LRC, and CRC, are implemented in the physical layer for use in the data link layer. The fourth, checksum, is used
primarily by networks, including the Internet, and is implemented in the transport layer.
VERTICAL REDUNDANCY CHECK (VRC)
The most common and least expensive mechanism for error detection is the vertical
redundancy check (VRC), often called a parity check.
(One Dimension Parity Checks)
Parity checks: Parity checking at the receiver can detect the presence of an error if
the parity of the receiver signal is different from the expected parity.
• There are two types VRC.
1. Even parity
2. Odd Parity.
CON.
The parity check is done by adding an extra bit, called parity bit to the data to make a number of 1s either even in
case of even parity or odd in case of odd parity. There are two types of parity bits:
Even parity bit:
In the case of even parity, for a given set of bits, the number of 1’s is counted. If that count is odd, the parity bit
value is set to 1, making the total count of occurrences of 1’s an even number. If the total number of 1’s in a given
set of bits is already even, the parity bit’s value is 0.
Odd Parity bit:
In the case of odd parity, for a given set of bits, the number of 1’s is counted. If that count is even, the parity bit
value is set to 1, making the total count of occurrences of 1’s an odd number. If the total number of 1’s in a given set
of bits is already odd, the parity bit’s value is 0.
***In Single error parity check cannot detect even number of errors
THE STRUCTURE OF ENCODER AND DECODER
EXAMPLE 3
Suppose that a sender wants to send (1000101, 1000001, 1000011, and 1110001) with one dimensional
EVEN PARITY, find the parity bit need to be added to the message and then check received data at
receiver side as shown in the table below
Data Parity Sender Data Received Data at Result
Bit Receiver
1000101 10001011
1000001 10000010
1000011 11100111
1110001 11100000
Answer:
Answer:
Data Parity Sender Data Received Data at Result
Bit Receiver
1000101 0 10001010 10001110 Error (Even)
1001001 0 10010010 10000010 Error (Even)
1100011 1 11000111 11010111 Error (Even)
1111001 0 11110010 11110010 Accept (Odd)
1010101 1 10101011 10101011 Accept (Odd)
LONGITUDINAL REDUNDANCY CHECK (LRC)
In this error detection method, a block of bits is organized in a table with rows and
columns. Then the parity bit for each column is calculated and a new row of eight bits,
which are the parity bits for the whole block, is created. After that the new calculated
parity bits are attached to the original data and sends to the receiver.
LRC fields consist of one byte containing an eight-bit binary value. LRC values are
calculated by transmitting devices, which append LRC to messages. The device at the
receiving end recalculates the LRC on receipt of the message and compares the
calculated value to the actual value received in the LRC field. If the values are equal,
the transmission was successful; if the values are not equal, this indicates an error.
EXAMPLE 5 Answer:
11100111
11011101
00111001
10101001
10101010
HOW LRC FAIL TO DETECT THE BURST NOISE
However, if two bits in one data unit are damaged and two bits in exactly the same positions in another data unit
are also damaged, the LRC checker will not detect an error.
Notice that although the 5th bit and the 7th bit for 3rd and 4th data unit have been changed but the LRC
calculated by receiver is still the same as the LRC received. Thus, the receiver checker cannot detect this burst
error.
COMPUTER NETWORKING
FUNDAMENTALS
Dr. Yasir Dawood
Error Detection and Correction
CYCLICAL REDUNDANCY CHECK (CRC)
The most powerful redundancy technique, unlike the VRC and LRC,
CRC is based on binary division. The redundancy bits used by CRC
are derived by dividing the data unit by the predetermined divisor
(The CRC generator uses modulo-2 division).and appends it to the
end of the data string so that the resulting bit sequence must be
exactly divisible by the divisor.
This process can be described as a step at the source and we call it
the encoder, the other step is performed at the receiver and we
call it the decoder.
CRC STEPS
In the encoder (see the figure below), the dataword has k bits (4
here); the predetermined divisor (normally called the generator
polynomial or simply the generator) has m bits (4 here).
The resulting codeword from the binary division would have n bits
calculated as k + (m -1) (7 here). The size of the dataword is
augmented by adding (m – 1) (3 here) 0s to the right-hand side of
the word. The result is fed into the generator.
THE STRUCTURE OF ENCODER AND DECODER
CON
The generator circuit divides the augmented dataword by the divisor (modulo-2
division). The quotient of the division is discarded; the remainder (r2 ,r1and r0) is
appended to the dataword to create the codeword.
At the receiver (decoder) this operation is repeated with the same divisor. The
analyzer has a simple function. If the syndrome bits are all 0s (remaineder), the 4
leftmost bits of the codeword are accepted as the dataword (interpreted as no
error); otherwise, the 4 bits are discarded (error).
CRC
CRC or Cyclic Redundancy Check is a method of detecting accidental changes/errors in
communication channel. CRC uses Generator Polynomial which is available on both sender and
receiver side.
k : datawor d
m: divisor (normally called the gener ator polynomial or simply the generator)
n : The resulting codeword (augmented datawor d ), n = k + (m-1)
remainder =m -1
n
codeword
k m-1
dataword remainder
EXAMPLE
Let the data word be 1001 The Generator 1011
A) Find the codeword that would be sent from the sender
B) Perform the checking operation at the receiver if the
received codeword was
1- 1001110
2- 1000110
Solution:
A: The sender side
EXAMPLE CON.
B) Receiver Side both
cases 1 and 2
CRC GENERATOR FUNCTION AS POLYNOMIAL
The CRC generator is most often represented as an algebraic polynomial. This is useful because the
code is short and can be easily mathematically understood. For example:
Reliability
CRC will detect all possible errors except those that change the bit value of a
block of code by exactly the value of the divisor.
EXAMPLE
Dataword CRC
101110 110
Codeword
CHECKSUM
The last error detection method we discuss here is called the checksum. The checksum
is used in the Internet by several protocols although not at the data link layer. However,
we briefly discuss it here to complete our discussion on error checking
In the receiver, the coming data is subdivided into data and checksum. The total value
of the data unit and the checksum must be zero for errorless transmission.
2- Once all the values are added in this manner, invert all the bits in the result.
A binary value that has all the bits of another binary value inverted is called
its "one's complement," or simply its “complement."
01100
+ 01110 Third 5-bit value
Answer: 0100
+ 0101 Third 4-bit value
1 0101
+ \------> 1 add carry
0010
+ 0101 Third 4-bit value
1 0011
+ \------> 1 add carry
0100
+ 1001 Fifth 4-bit value
2
CABLE TELEVISION
• Cable television - generally, any system that distributes
television signals by a network of coaxial or fiber-optic
cables.
• It typically have 50 or more video channels.
• In the late 1990's, many cable systems started converting
to digital transmission using fiber optic cable and digital
signal compression.
3
CABLE TELEVISION
Analog Cable
• An analog cable system distributes television (and other information
services) via a cable television distribution system in analog modulated
form. (ex. CATV)
Digital Cable
• A digital cable system distributes television (and other information services)
via a cable television distribution system in digital modulated form.
• Digital cable systems may include high-speed data and two-way
interactive services.
4
A SAMPLE CATV SYSTEM
5
• The CATV system gathers content from a variety of sources including network feeds, stored
media, communication links and live studio sources.
• The headend converts the media sources into a form that can be managed and distributed.
• The asset management system stores, moves and sends out (playout) the media at scheduled
times.
• The distribution system simultaneously transfers multiple channels to users who are
connected to the CATV system.
• Users view CATV programming on televisions that are directly connected to the cable line
(cable ready TVs) or through an adapter box (set top box).
6
SATELLITE TELEVISION
• Satellite television is the broadcasting of television signals through
satellites to viewers who have viewing devices that can receive
satellite signals.
• Satellite viewing devices can range from televisions that are
connected to a satellite receiver to mobile telephones that have built
in satellite receivers.
7
A SATELLITE TV SYSTEM
8
A SATELLITE TV SYSTEM
• A satellite TV system is a wide area media distribution system.
• All the TV channels and media programs are sent on an uplink radio
channel to a satellite that retransmits the signal back toward Earth.
• The satellite is located approximately 22,300 miles above the Earth
which allows it to travel at the same rotational speed of the Earth so
it appears stationary to the antennas that are receiving its signal.
9
BROADCAST TELEVISION
• Broadcast television is the sending of video and audio signals to
devices (such as television sets) that can receive broadcast signals.
• Analog Broadcast TV
• Digital Terrestrial Television – DTT
• Enhanced TV
• Hybrid Broadcast Broadband Television - HBBTV
10
BROADCAST TELEVISION
Analog Broadcast TV - broadcasting is the sending of video
information in an analog form.
Digital Terrestrial Television - DTT- are land based broadcast high
speed digital signals that can contain a mix of digital television
channels and other digital media
Enhanced TV - is the sending of additional data or signals along with
broadcast media that can enhance the viewing experience.
11
DIGITAL TERRESTRIAL TELEVISION SYSTEM
12
DIGITAL TERRESTRIAL TELEVISION SYSTEM
• A DTT system uses a single wide digital radio channel that is divided
into multiple digital television channels.
• Television broadcasters are linked to the DTT system by a digital
channel and they are assigned (mapped) to a specific portion (logical
channel) on the digital radio channel.
• The DTT system combines (multiplexes) the incoming channels to form
one digital transmission channel.
• DTT receivers receive and decode a DTT frequency, separate out
(demultiplexes) the specific digital (logical) channel and converts the
digital channel back into its original television (video and audio) form.
13
MOBILE TELEVISION
Mobile television is the transferring of signals that carry
moving picture information to mobile devices.
Mobile TV services may be provided using cellular
systems, mobile broadcast systems, or mobile satellite
systems.
14
IPTV
• Internet protocol television - IPTV is a process of providing television
(video and/or audio) services through the use Internet protocol - IP
networks.
• These IP networks initiate, process, and receive voice or multimedia
communications using Internet protocol.
• These IP systems may be public IP systems (e.g. the Internet), private
data systems (e.g. LAN based), or a hybrid of public and private
systems.
15
MULTICAST VS UNICAST
TV Servers support two types of streaming: unicast
and multicast streaming.
Unicast is a form of network communication where the
stream is sent multiple times directly to each receiver:
CON.
Multicast is a stream that is sent once but can be
received by multiple receivers:
The internet is almost entirely unicast: a browser connects to a server and packets flow
along a direct connection between the server and the receiver. Multicast is more similar to
a radio station, broadcasting a single stream that is received by more than one receiver.
COMPUTER NETWORKING
FUNDAMENTALS
Dr. Yasir Dawood
WWW and HTTP
ARCHITECTURE
The World Wide Web (WWW) today is a distributed client/server service, in
which a client using a browser can access a service using a server. However,
the service provided is distributed over many locations called sites.
Topics discussed in this section:
Server
Client (Browser)
Uniform Resource Locator (URL)
Cookies
27.2
Figure 1 Architecture of WWW
Figure 2 Browser
Figure 3 URL
http:// 80 by default
https://
ftp://
Cookies
HTTP cookies, or internet cookies, are built specifically for Internet web
browsers to track, personalize, and save information about each user's
session. A “session” just refers to the time you spend on a site. Cookies are
created to identify you when you visit a new website.
Cookies are needed for extending functionalities of the Web, such as:
To remember past client in order to show a customized webpage.
Save login session to keep the user always logged in.
For advertiser to show what the customer might need
Cookies: Creation and stor age
27.8
Figure 4 Static document
Example:
<a href=“index.html">Home Page</a>
<img src="../images/logo.gif" width="200" border="0" height=“150">
Figure 8 Dynamic document using Common Gateway Inter face (CGI)
The Common Gateway Interface (CGI) is a technology that creates and handles dynamic
documents. CGI is a set of standards that defines how a dynamic document is written, how data
are input to the program, and how the output result is used.
Figure 9 Dynamic document using ser ver-site scr ipt
A few technologies have been involved in creating dynamic documents using scripts. Among the most common
are Hypertext Preprocessor (pHP), which uses the Perl language; Java Server Pages (JSP), which uses the
Java language for scripting; Active Server Pages (ASP), a Microsoft product which uses Visual Basic
language for scripting; and ColdFusion, which embeds SQL database queries in the HTML document.
Figure 10 Active document using J ava applet
The idea of scripts in dynamic documents can also be used for active documents. If the active part
of the document is small, it can be written in a scripting language; then it can be interpreted and
run by the client at the same time.
HTTP
The Hypertext Transfer Protocol (HTTP) is a protocol used mainly to access
data on the World Wide Web.
Topics discussed in this section:
HTTP Transaction
Persistent vs Nonpersistent Connection
Figure 12 HTTP tr ansaction
General header The general header gives general information about the message and
can be present in both a request and a response. Next table lists some general headers
with their descriptions
Table Gener al Header for mat
PERSISTENT VS NONPERSISTENT CONNECTION
HTTP can use both nonpersistent connections and persistent connections.
A nonpersistent connection is the one that is closed after the server sends the
requested object to the client. In other words, the connection is used exactly for one
request and one response.
With persistent connections, the server leaves the TCP connection open after
sending responses and hence the subsequent requests and responses between the
same client and server can be sent. The server closes the connection only when it is
not used for a certain configurable amount of time.
With persistent connections, the performance is improved by 20%
COMPUTER NETWORKING
FUNDAMENTALS
Dr. Yasir Dawood
Domain Name System
INTRODUCTION
There are several applications in the application layer of the
Internet model that follow the client/server paradigm.
The client/server programs can be divided into two categories:
those that can be directly used by the user, such as e-mail, and
those that support other application programs.
The Domain Name System (DNS) is a supporting program that is
used by other programs such as e-mail.
EXAMPLE OF USING THE DNS SERVICE
NAME SPACE
To be clear, the names assigned to machines must be carefully selected from a name
space with complete control over the binding between the names and IP addresses.
A name space that maps each address to a unique name can be organized in two ways:
flat or hierarchical.
In a Hierarchical Name Space, each name is made of several parts. The first part can
define the nature of the organization, the second part can define the name of an
organization, the third part can define departments in the organization, and so on.
DOMAIN NAME SPACE
To have a hierarchical name space, a domain name space was designed. In this design
the names are defined in an inverted-tree structure with the root at the top. The tree can
have only 128 levels: level 0 (root) to level 127..
DOMAIN NAMES AND LABELS
FQDN AND PQDN
DOMAINS
A domain is a subtree of the
domain name space. The name
of the domain is the domain
name of the node at the top of
the subtree. Note that a domain
may itself be divided into
domains.
DISTRIBUTION OF NAME SPACE
The information contained in the domain name space must be stored. However, it is very
inefficient and also unreliable to have just one computer store such a huge amount of
information.
It is inefficient because responding to requests from all over the world places a heavy load
on the system. It is not unreliable because any failure makes the data inaccessible.
HIERARCHY OF NAME SERVERS
ZONES AND DOMAINS
Since the complete domain name
hierarchy cannot be stored on a single
server, it is divided among many
servers. What a server is responsible
for or has authority over is called a
zone. We can define a zone as a
contiguous part of the entire tree. If a
server accepts responsibility for a
domain and does not divide the domain
into smaller domains, the domain and
the zone refer to the same thing.
DNS IN THE INTERNET
DNS is a protocol that can be used in different platfor ms. In the
Inter net, the domain name space (tree) is divided into three different
sections: gener ic domains, countr y domains, and the inver se domain.
To register, the organization needs to give the name of its server and the IP
address of the server. For example, a new commercial organization named
wonderful with a server named ws and IP address 200.200.200.5 needs to
give the following information to one of the registrars: