Data Networkind Detailed Notes
Data Networkind Detailed Notes
message
sender
receiver
medium
protocol
Text
numbers
images
audio
video
Simplex - Only one of the two devices on a link can transmit; the other
can only receive.
Half-duplex - Each station can both transmit and receive, but not at
the same time.
Full-duplex - Both stations can transmit and receive simultaneously.
Network Categories
Local
Regional
National
International
ISO
ITU-T
ANSI
IEEE
EIA
Application
Transport
Network
Data link
Physical
Physical
Data link
Network
session
presentation
application
Transport layer
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
The Shannon capacity gives us the upper limit; the Nyquist formula
tells us how many signal levels we need.
The Shannon capacity gives us the upper limit; the Nyquist formula
tells us how many signal levels we need.
The bandwidth-delay product defines the number of bits that can fill
the link.
Data can be
Analog
Digital
Amplitude
Frequency
Phase
Attenuation
Distortion
Noise
The second, bandwidth in bits per second, refers to the speed of bit
transmission in a channel or link.
Formulas
Decibel
, dB = 20 log10(V2/V1)
Signla
Power/Average
Noise
Power
In NRZ-L the level of the voltage determines the value of the bit. In
NRZ-I the inversion or the lack of inversion determines the value of the
bit.
NRZ-L and NRZ-I both have an average signal rate of N/2 Bd.
Line coding
Block coding
Scrambling
Unipolar - the signal levels are on one side of the time axis, either
above or below. Traditionally, a unipolar scheme was designed as a
non-return-to-zero (NRZ) scheme in which the positive voltage defines
bit 1 and the zero voltage defines bit O.
Polar - the voltages are on the both sides of the time axis. In polar
NRZ encoding, we use two levels of voltage amplitude. We can have
two versions of polar NRZ: NRZ-L and NRZ-I.
Bipolar - there are three voltage levels: positive, negative, and zero.
The voltage level for one data element is at zero, while the voltage
level for the other element alternates between positive and negative.
Multilevel - The desire to increase the data speed or decrease the
required bandwidth has resulted in the creation of many schemes. The
goal is to increase the number of bits per baud by encoding a pattern
of m data elements into a pattern of n signal elements.
Multitransition- MLT-3, a scheme that maps one bit to one signal
element. The signal rate is the same as that for NRZ-I, but with greater
complexity (three levels and complex transition rules). It turns out that
the shape of the signal in this scheme helps to reduce the required
bandwidth.
4B/5B - A block coding technique in which 4 bits are encoded into a 5bit code. The four binary/five binary (4B/5B) coding scheme was
designed to be used in combination
with NRZ-I.
8B/10B - A block coding technique in which 8 bits are encoded into a
lO-bit code.
Ideal - pulses from the analog signal are sampled. This is an ideal
sampling method and cannot be easily implemented.
Natural - a high-speed switch is turned on for only the small period of
time when the sampling occurs.
Flat-top - The most common sampling method, called sample and hold,
however, creates flat-top samples by using a circuit.
Note: You can proceed to take the multiple choice exam regarding this
topic
Analog transmission refers to the transmission of analog signals
using a band-pass channel. Baseband digital or analog signals are
converted to a complex analog signal with a range of frequencies
suitable for the channel.
Digital-to-analog conversion is the process of changing one of the
characteristics of an analog signal based on the information in the
digital data. It is also called modulation of a digital signal. The
baseband digital signal representing the digital data modulates the
carrier to create a broadband analog signal.
In amplitude shift keying, the amplitude of the carrier signal is
varied to create signal elements. Both frequency and phase remain
constant while the amplitude changes.
In frequency shift keying, the frequency of the carrier signal is
varied
to
represent
data. The frequency of the modulated signal is constant for the
duration of one signal element, but changes for the next signal
element if the data element changes. Both peak amplitude and phase
remain constant for all signal elements.
In phase shift keying, the phase of the carrier is varied to represent
two or more different signal elements. Both peak amplitude and
frequency remain constant as the phase changes.
Quadrature amplitude modulation (QAM) is a combination of ASK
and PSK. QAM uses two carriers, one in-phase and the other
quadrature, with different amplitude levels for each carrier.
QAM enables a higher data transmission rate than other digital-toanalog methods.
Baud rate and bit rate are not synonymous. Bit rate is the number
of bits transmitted per second. Baud rate is the number of signal units
transmitted per second. One signal unit can represent one or more
bits.
The minimum required bandwidth for ASK and PSK is the baud rate.
Because
it
uses
two
carrier
frequencies, FSK
modulation requires more bandwidth than ASK and PSK.
Trellis coding is a technique that uses redundancy to provide a lower
error rate.
The 56K modems are asymmetric; they download at a rate of 56 Kbps
and upload at 33.6 Kbps.
A constellation diagram shows us the amplitude and phase of a
signal element, particularly when we are using two carriers (one inphase and one quadrature).
Analog-to-analog conversion is the representation of analog
information by an analog signal. Conversion is needed if the medium is
bandpass in nature or if only a bandpass bandwidth is available to us.
In AM transmission, the carrier signal is modulated so that its
amplitude varies with the changing amplitudes of the modulating
signal. The frequency and phase of the carrier remain the same; only
the amplitude changes to follow variations in the information.
In PM transmission, the frequency of the carrier signal is modulated
to follow the changing voltage level (amplitude) of the modulating
signal. The peak amplitude and phase of the carrier signal remain
constant, but as the amplitude of the information signal changes, the
frequency of the carrier changes correspondingly.
In PM transmission, the phase of the carrier signal is modulated to
follow the changing voltage level (amplitude) of the modulating signal.
The peak amplitude and frequency of the carrier signal remain
constant, but as the amplitude of the information signal changes, the
phase of the carrier changes correspondingly.
In AM radio, the bandwidth of the modulated signal must be twice the
bandwidth of the modulating signal.
In FM radio, the bandwidth of the modulated signal must be 10 times
the bandwidth of the modulating signal.
AM band allocation
FM band allocation
Note: You can proceed to take the multiple choice exam regarding this topic.
form a new signal that is then sent across the link. In FDM, multiplexers
modulate and combine signals while demultiplexers decompose and
demodulate. Also in FDM, guard bands keep the modulated signals
from overlapping and interfering with one another.
Wavelength-division multiplexing (WDM) - similar in concept to
FDM, however, the signals being multiplexed are light waves.
Time-division multiplexing (TDM) - digital signals from n devices
are interleaved with one another, forming a frame of data (bits, bytes,
or any other data unit).
Digital hierarchy
E line rates
Note: You can proceed to take the multiple choice exam regarding this topic
Twisted-pair cable, coaxial cable, and optical fiber are the most popular
types of guided media.
Coaxial cable has the following layers (starting from the center): a
metallic rod-shaped inner conductor, an insulator covering the rod, a
metallic outer conductor (shield), an insulator covering the shield, and
a plastic cover.
Fiber-optic cables carry data signals in the form of light. The signal is
propagated along the inner core by reflection.
Twisted-pair cable
Coaxial cable
Optical fiber
Propagation modes
Ground Propagation
Sky Propagation
Line-of-sight Propagation
Frequency Bands
Wireless Transmission
Blocking occurs when not every input has its own unique path to every
output.
The time-slot interchange and the TDM bus are two types of timedivision switches.
The United States is divided into more than 200 local exchange carriers
(ILECs) and competitive local exchange carriers (CLECs). Inter-LATA services
are handled by interexchange carriers (IXCs).
The size of the packet is determined by the network and the governing
protocol.
Packet-switched
networks
can
also
be
divided
into
Message-switched -
Setup Phase - The end systems are normally connected through dedicated
lines to the switches, so connection setup means creating dedicated channels
between the switches.
voice, has a bandwidth of 4000 Hz (4 kHz). The first three digits of a local
telephone number define the office, and the next four digits define the local
loop number.
Formulas
k(N/n)2 which is much smaller than the number of crosspoints in a singlestage switch (N2).
Note: You can proceed to take the multiple choice exam regarding this topic.
In in-band signaling, the same circuit is used for both signaling and
data. In out-of band signaling, a portion of the bandwidth is used for
signaling and another portion for data. The protocol that is used for
signaling in the telephone network is called Signaling System Seven
(SS7).
In a single-bit error, only one bit in the data unit has changed.
A burst error means that two or more bits in the data unit have
changed.
An error-detecting code can detect only the types of errors for which it
is designed; other types of errors may remain undetected.
If the generator has more than one term and the coefficient of x0 is 1,
all single errors can be caught.
Error Categories:
Parity check- An extra bit (parity bit) is added to the data unit. The
parity check can detect only an odd number of errors; it cannot detect
an even number of errors. In the two-dimensional parity check, a
redundant data unit follows n data units.
Cyclic redundancy check (CRC) - a powerful redundancy checking
technique, appends a sequence of redundant bits derived from binary
division to the data unit. The divisor in the CRC generator is often
represented as an algebraic polynomial.
Checksum - used in the Internet by several protocols although not at
the data link layer.
First, if two data items are swapped during transmission, the sum and
the checksum values will not change.
Second, if the value of one data item is increased (intentionally or
maliciously) and the value of another one is decreased (intentionally or
maliciously) the same amount, the sum and the checksum cannot
detect these changes.
Third, if one or more data items is changed in such a way that the
change is a multiple of 216 1, the sum or the checksum cannot detect
the changes.
Data link control deals with the design and procedures for
communication
between
two
adjacent
nodes:
node-to-node
communication.
The two main functions of the data link layer are data link
control and media access control.
Data link control functions include framing, flow and error control, and
software-implemented protocols that provide smooth and reliable
transmission of frames between nodes.
Flow control is the regulation of the senders data rate so that the
receiver buffer does not become overwhelmed.
Error control is both error detection and error correction.
Frames can be of fixed or variable size. In fixed-size framing, there
is no need for defining the boundaries of frames; in variable-size
framing, we need a delimiter (flag) to define the boundary of two
frames.
Variable-size framing uses two categories of protocols: byte-oriented
(or character-oriented) and bit-oriented. In a byte-oriented protocol,
the data section of a frame is a sequence of bytes; in a bit-oriented
protocol, the data section of a frame is a sequence of bits.
In byte-oriented (or character-oriented) protocols, we use byte
stuffing; a special byte added to the data section of the frame when
there is a character with the same pattern as the flag.
Byte stuffing is the process of adding 1 extra byte whenever there is
a flag or escape character in the text.
In bit-oriented protocols, we use bit stuffing; an extra 0 is added to
the data section of the frame when there is a sequence of bits with the
same pattern as the flag.
Bit stuffing is the process of adding one extra 0 whenever five
consecutive 1s follow a 0 in the data, so that the receiver does not
mistake the pattern 0111110 for a flag.
Flow control refers to a set of procedures used to restrict the amount
of data that the sender can send before waiting for acknowledgment.
Error control refers to methods of error detection and correction.
PPP is a byte-oriented protocol using byte stuffing with the escape byte
01111101.
Data link control - deals with the design and procedures for
communication
between
two
adjacent
nodes:
node-to-node
communication.
Media access - control deals with procedures for sharing the link.
Note: You can proceed to take the multiple choice exam regarding this
topic. Data Link Control - Set 1 MCQs
Definition of Terms
We can consider the data link layer as two sublayers. The upper
sublayer is responsible for data link control, and the lower
sublayer is responsible for resolving access to the shared media.
Many formal protocols have been devised to handle access to a shared
link. We categorize them into three groups: random access protocols,
controlled access protocols, and channelization protocols.
In random access or contention methods, no station is superior to
another station and none is assigned the control over another.
ALOHA allows multiple access (MA) to the shared medium. There are
potential collisions in this arrangement. When a station sends data,
another station may attempt to do so at the same time. The data from
the two stations collide and become garbled.
To minimize the chance of collision and, therefore, increase the
performance, the CSMA method was developed. The chance of
collision can be reduced if a station senses the medium before trying
to use it. Carrier sense multiple access (CSMA) requires that each
station first
listen
to
the
medium
before
sending. Three
methods have been devised for carrier sensing: I-persistent,
nonpersistent, and p-persistent.
Carrier sense multiple access with collision detection
(CSMA/CD) augments the CSMA algorithm to handle collision. In this
method, a station monitors the medium after it sends a frame to see if
the transmission was successful. If so, the station is finished. If,
however, there is a collision, the frame is sent again.
To avoid collisions on wireless networks, carrier sense multiple
access with collision avoidance (CSMA/CA) was invented. Collisions are
avoided through the use three strategies: the interframe space, the
contention window, and acknowledgments.
In CSMA/CA, the IFS can also be used to define the priority of a station
or a frame.
In CSMA/CA, if the station finds the channel busy, it does not restart
the timer of the contention window; it stops the timer and restarts it
when the channel becomes idle.
In controlled access, the stations consult one another to find which
station has the right to send. A station cannot send unless it has been
authorized by other stations. We discussed three popular controlledaccess methods: reservation, polling, and token passing.
In the reservation access method, a station needs to make a
reservation before sending data. Time is divided into intervals. In each
interval, a reservation frame precedes the data frames sent in that
interval.
In the polling method, all data exchanges must be made through the
primary device even when the ultimate destination is a secondary
device. The primary device controls the link; the secondary devices
follow its instructions.
In the token-passing method, the stations in a network are
organized in a logical ring. Each station has a predecessor and a
successor. A special packet called a token circulates through the ring.
Channelization is a multiple-access method in which the available
bandwidth of a link is shared in time, frequency, or through code,
between different stations. We discussed three channelization
protocols: FDMA, TDMA, and CDMA.
In frequency-division multiple access (FDMA), the available
bandwidth is divided into frequency bands. Each station is allocated a
band to send its data. In other words, each band is reserved for a
specific station, and it belongs to the station all the time.
In FDMA, the available bandwidth of the common channel is divided
into bands that are separated by guard bands.
In time-division multiple access (TDMA), the stations share the
bandwidth of the channel in time. Each station is allocated a time slot
during which it can send data. Each station transmits its data in its
assigned time slot.
In TDMA, the bandwidth is just one channel that is timeshared
between different stations.
In code-division multiple access (CDMA), the stations use different
codes to achieve multiple access. CDMA is based on coding theory and
uses sequences of numbers called chips. The sequences are generated
using orthogonal codes such the Walsh tables.
In CDMA, one channel carries all transmissions simultaneously.
The original Ethernet was created in 1976 at Xeroxs Palo Alto Research
Center (PARC). Since then, it has gone through four generations.
The IEEE
802.3
the
access
The data link layer of Ethernet consists of the LLC sublayer and the MAC
sublayer.
The MAC sublayer is responsible for the operation of the CSMAlCD access
method and framing.
The
minimum
frame
length
for lO-Mbps
Ethernet is 64
bytes;
the
Ethernet),
coaxial
of
Ethernet
uses thick
coaxial
twisted-pair
cables that connect each station to a common hub. lOBase-F uses fiber-optic
cable.
A bridge can increase the bandwidth and separate the collision domains on
an Ethernet LAN.
A switch allows each station on an Ethernet LAN to have the entire capacity
of the network to itself.
Full-duplex mode doubles the capacity of each domain and removes the
need for the CSMAlCD method.
Fast Ethernet was designed to compete with LAN protocols such as FDDI or
Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast
Ethernet is backward-compatible with Standard Ethernet, but it can transmit
data 10 times faster at a rate of 100 Mbps.
The Fast Ethernet MII is an interface that can be used with both a 10- and a
100-Mbps interface.
The Fast Ethernet PHY sublayer is responsible for encoding and decoding.
fiber-optic
cables),
and 100Base-
The Gigabit Ethernet PHY sublayer is responsible for encoding and decoding.
In 1985, the Computer Society of the IEEE started a project, called Project
802, to set standards to enable intercommunication among equipment from
a variety of manufacturers. Project 802 is a way of specifying functions of
the physical layer and the data link layer of major LAN protocols.
Channelization is
multiple-access
method
in
which
the
available
In FDMA, the bandwith is divided into bands; each band is reserved fro the
use of a specific station.
In TDMA, the bandwidth is not divided into bands; instead the bandwidth is
timeshared.
In CDMA, the bandwidth is not divided into bands, yet data from all inputs
are transmitted simultaneously.
The preamble is a 56-bit field that provides an alert and timing pulse. It is
added to the frame at the physical layer and is not formally part of the frame.
SFD is a one byte field that serves as a flag.
A multicast
address identifies
group
of
stations;
a broadcast
The least significant bit of the first byte defines the type of address. If the bit
is 0, the address is unicast; otherwise, it is multicast.
100Base-TX
100Base-FX
100Base-T4
1000Base-SX
1000Base-LX
1000Base-CX
1000Base-T
10GBase-S
10GBase-L
10GBase-E
Definition of Terms
The IEEE
802.11 standard
for
wireless
LANs
defines
two
services: basic service set (BSS) and extended service set
(ESS). An ESS consists of two or more BSSs; each BSS must have an
access point (AP).
A BSS without an AP is called an ad hoc network; a BSS with an AP is
called an infrastructure network.
The basic service set (BSS) is the building block of a wireless LAN.
IEEE 802.11 defines several physical layers, with different data rates
and modulating techniques.
In multiple-secondary communication, the primary sends on the evennumbered slots; the secondary sends on the oddnumbered slots.
CSMA/CA flowchart
Physical layers
Piconet
Scatternet
Bluetooth layers
Definition of Terms
Note that there is only one single path from any LAN to any other
LAN in the spanning tree system. This means there is only one
single path from one LAN to any other LAN. No loops are created.
The bridges send special messages to one another, called bridge
protocol data units (BPDUs), to update the spanning tree.
VLANs are cost- and time-efficient, can reduce network traffic, and
provide an extra measure of security.
In 1996, the IEEE 802.1 subcommittee passed a standard
called 802.1Q that defines the format for frame tagging. The standard
also defines the format to be used in multiswitched backbones and
enables the use of multivendor equipment in VLANs.
An amplifieramplifies the signal, as well as noise that may come with
the signal, whereas a repeater regenerates the signal, bit for bit, at the
original strength.
Stations can be grouped by port number, MAC address, IP address, or
by a combination of these characteristics.
then changes the channel carrying the call (hands the signal off from
the old channel to a new one).
In a hard handof, a mobile station only communicates with one base
station. When the MS moves from one cell to another, communication
must first be broken with the previous base station before
communication can be established with the new one. This may create
a rough transition.
In Soft Handof, a mobile station can communicate with two base
stations at the same time. This means that, during handoff, a mobile
station may continue with the new base station before breaking off
from the old one.
Roaming means, in principle, that a user can have access to
communication or can be reached where there is coverage.
Advanced Mobile Phone System (AMPS) is a first-generation
cellular phone system.
AMPS is an analog cellular phone system using FDMA.
Digital AMPS CD-AMPS) is a second-generation cellular phone
system that is a digital version of AMPS.
D-AMPS, or IS-136, is a digital cellular phone system using TDMA and
FDMA.
Global System for Mobile Communication (GSM) is a secondgeneration cellular phone system used in Europe.
Based on the location of the orbit, satellites can be divided into three
categories: geostationary Earth orbit (GEO), low-Earth-orbit (LEO), and
middle-Earth-orbit (MEO).
A geosynchronous Earth orbit (GEO) is at the equatorial plane and
revolves in phase with the earth.
Global Positioning System (GPS) satellites are medium-Earthorbit (MEO)satellites that provide time and location information for
vehicles and ships.
Iridium satellites are low-Earth-orbit (LEO) satellites that provide
direct universal voice and data communications for handheld
terminals.
The Iridium system has 66 satellites in six LEO orbits, each at an
altitude of 750 km.
Cellular system
GSM bands
Satellite orbits
Satellite categories
In SONET, the data rate of an STS-n signal is n times the data rate of
an STS-1 signal.
STS multiplexers/demultiplexers mark the beginning points and
endpoints of a SONET link.
An STS multiplexer multiplexes signals from multiple electrical
sources and creates the corresponding optical signal.
An STS
demultiplexer demultiplexes
an
optical
signal
into
corresponding electric signals.
Add/drop multiplexers allow insertion and extraction of signals in an
STS. An add/drop multiplexer can add an electrical signals into a given
path or can remove a desired signal from a path.
SONET has defined a hierarchy of signals called synchronous
transport signals (STSs). SDH has defined a similar hierarchy of
signals callefd synchronous transfer modules (STMs).
An OC-n signal is the optical modulation of an STS-n (or STM-n) signal.
Pointers are used to show the offset of the SPE in the frame or for
justification.
SONET uses two pointers show the position of an SPE with respect to
an STS.
SONET use the third pointer for rate adjustment between SPE and
STS.
A regenerator takes a received optical signal and regenerates it.
STSs can be multiplexed to get a new STS with a higher data rate.
1. STS multiplexers
2. STS demultiplexers
3. Regenerators
4. Add/drop multiplexers
5. Terminals
SONET/SDH rates
The setup phase can use the permanent virtual circuit (PVC) approach
or the switched virtual circuit (SVC) approach.
Frame Relay operates only at the physical and data link layers.
Frame Relay does not provide flow or error control; they must be
provided by the upper-layer protocols.
In ATM, a combination of a virtual path identifier (VPI) and a virtualcircuit identifier identifies a virtual connection.
There are four different AALs, each for a specific data type:
ATM LANs
Note: You can proceed to take the multiple choice exam regarding this
topic. Virtual-Circuit Networks: Frame Relay and ATM - Set 1 MCQs
Addresses in classes A,
communication.
B,
or
C are
mostly
used
for unicast
Every computer attached to the Internet must know its IP address, the
IP address of a router, the IP address of a name server, and its subnet
mask (if it is part of a subnet).
DHCP is a dynamic configuration protocol with two databases.
A static routing
administrator.
table's
entries
are
updated
manually
by
an
A block in class A address is too large for almost any organization. This
means most of the addresses in class A are wasted and not used. A
block in class C is probably too small for many organizations.
Multicast addresses in IPv4 are those that start with the 1110 pattern.
Multicast addresses in IPv6 are those that start with the 11111111
pattern.