CS8591 UNIT I Notes
CS8591 UNIT I Notes
1.1 NETWORKS
A network is the interconnection of a set of devices capable of communication. In this
definition, a device can be a host (or an end system as it is sometimes called) such as a
large computer, desktop, laptop, workstation, cellular phone, or security system.
Data communiction
Exchange of data between two devices via some form of transmission medium such as a
wire cable.
Characteristics:
▪ Correct delivery
▪ Accuracy
▪ Timeliness
▪ Jitter
Components of Data Communication
▪ Message
▪ Sender
▪ Receiver
▪ Medium
▪ Protocol
1. Message
Information to be communicated which consist of text, numbers, pictures, sound or video
combination.
2. Sender
Device that sends the data message may be computer, workstation, telephone handset,
video camera etc.
3. Receiver
Device that receives the message can be computer, workstation, telephone handset,
television and so on.
4. Medium
Physical path by which a message travels from sender to receiver – twisted pair wire,
coaxial cable, fiber optic cable or radio waves
5. Protocol
Set of rules that governs data communication. It represents an agreement between the
communicating devices.
Direction of data flow
▪ 1. Simplex – Sends information in one direction
▪ 2. Half Duplex – data can be transmitted in both direction on a signal carrier
except not at the same time
▪ 3. Full Duplex – Transmit data in both directions on a signal carrier except not at
the same time
another. Response time is the elapsed time between an inquiry and a response.
The performance of a network depends on a number of factors, including the number of
users, the type of transmission medium, the capabilities of the connected hardware, and
the efficiency of the software.
Performance is often evaluated by two networking metrics: throughput and delay.
Reliability
Network reliability is measured by the frequency of failure, the time it takes a link to
recover from a failure, and the network’s robustness in a catastrophe.
Security
Network security issues include protecting data from unauthorized access, protecting
data from damage and development, and implementing policies and procedures for
recovery from breaches and data losses.
1. Mesh Topology
In a mesh topology, every device has a dedicated point-to-point link to every other
device. The term dedicated means that the link carries traffic only between the two
devices it connects.
For ‘n’ nodes, there would be n (n – 1) / 2 duplex-mode links. To accommodate that
many links, every device on the network must have n – 1 input/output (I/O) ports (see
Figure 1.3) to be connected to the other n – 1 stations.
Disadvantages:
Installation and reconfiguration are more difficult
Large amount of cabling is required
2. Star Topology
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another.
Unlike a mesh topology, a star topology does not allow direct traffic between devices.
The controller acts as an exchange: If one device wants to send data to another, it sends
the data to the controller, which then relays the data to the other connected device (see
Figure 1.4).
3. Bus Topology
A bus topology provides multipoint communication where as all other topologies
provides point to point communication. In this case a long cable called bus forms the
backbone to all the nodes. (see Figure 1.5).
Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable. A tap is a connector that either splices
into the main cable or punctures the sheathing of a cable to create a contact with the
metallic core. As a signal travels along the backbone, some of its energy is transformed
into heat.
Advantages:
▪ Easy to use and easy to install
▪ It uses less cables than mesh, star or tree topologies
▪ Needs less number of physical connectivity devices.
▪ A repeater can also be used to extend a bus topology network
▪ Low cost
Disadvantages:
▪ Heavy network traffic can slow a bus considerably
▪ It is difficult to troubleshoot a bus
▪ Failure of cable affects all devices on the network
▪ Difficult to add a new nodes to a bus, thus making it more inflexible.
4. Ring Topology
In a ring topology, each device has a dedicated point-to-point connection with only the
two devices on either side of it. A signal is passed along the ring in one direction, from
device to device, until it reaches its destination. Each device in the ring incorporates a
repeater. When a device receives a signal intended for another device, its repeater
regenerates the bits and passes them along (see Figure 1.6).
1. Point-to-Point WAN
A point-to-point WAN is a network that connects two communicating devices through a
transmission media (cable or air). Figure 1.9 shows an example of a point-to-point WAN.
Figure 1.11 An internetwork made of two LANs and one point-to-point WAN
1.3.3 Switching
An internet is a switched network in which a switch connects at least two links together.
A switch needs to forward data from a network to another network when required. The
two most common types of switched networks are circuit-switched and packet-switched
networks.
Circuit-Switched Network
In a circuit-switched network, a dedicated connection, called a circuit, is always
available between the two end systems; the switch can only make it active or inactive.
Figure 1.12 shows a very simple switched network that connects four telephones to each
end.
In Figure 1.12, the four telephones at each side are connected to a switch. The switch
connects a telephone set at one side to a telephone set at the other side. The thick line
connecting two switches is a high-capacity communication line that can handle four
voice communications at the same time; the capacity can be shared between all pairs of
telephone sets. The switches used in this example have forwarding tasks but no storing
capability.
2. Second Scenario
Benefits
▪ To make the design process easy by breaking unmanageable tasks into several
smaller and manageable tasks (by divide and conquer approach)
▪ Each layer can be analyzed and tested independently of all other layers
the destination host. The destination host needs to receive the communication at the
physical layer and then deliver it through the other layers to the application layer.
The router is involved in only three layers; there is no transport or application layer in a
router as long as the router is used only for routing. For example, in the above figure,
▪ The router is involved in three links, but the message sent from source A to
destination B is involved in two links.
▪ Each link may be using different link-layer and physical-layer protocols; the
router needs to receive a packet from link 1 based on one pair of protocols and
deliver it to link 2 based on another pair of protocols.
▪ A link-layer switch in a link, however, is involved only in two layers, data-link
and physical.
▪ Although each switch in the above figure has two different connections, the
connections are in the same link, which uses only one set of protocols. This means
that, unlike a router, a link-layer switch is involved only in one data-link and one
physical layer.
Fig 1.20 Logical connections between layers of the TCP/IP protocol suite
The duty of the application, transport, and network layers is end-to-end. The duty of the
data-link and physical layers is hop-to-hop, in which a hop is a host or router.
The domain of duty of the top three layers is the internet, and the domain of duty of the
two lower layers is the link
In the top three layers, the data unit (packets) should not be changed by any router or
link-layer switch. In the bottom two layers, the packet created by the host is changed
only by the routers, not by the link-layer switches.
Figure below shows the second principle discussed previously for protocol layering. We
show the identical objects below each layer related to each device.
Data-link Layer
• Responsible for taking the datagram and moving it across the link. The link
can be a wired LAN with a link-layer switch, a wireless LAN, a wired WAN, or a
wireless WAN
• Any protocol that can take the datagram and carry it through the link suffices for
the network layer. The data-link layer takes a datagram and encapsulates it in a
packet called frame.
• Each link-layer protocol may provide a different service. Some link-layer
protocols provide complete error detection and correction, some provide only
error correction.
Network Layer
• Responsible for creating a connection between the source computer and the
destination computer.
• The communication at the network layer is host-to-host
• There can be several routers from the source to the destination, the routers in the
path are responsible for choosing the best route for each packet.
• Responsible for host-to-host communication and routing the packet through
possible routes.
Transport Layer
• The logical connection at the transport layer is also end-to-end. The transport
layer at the source host gets the message from the application layer, encapsulates
it in a transport layer packet (called a segment or a user datagram in different
protocols) and sends it, through the logical (imaginary) connection, to the
transport layer at the destination host.
• In other words, the transport layer is responsible for giving services to the
application layer: to get a message from an application program running on the
source host and deliver it to the corresponding application program on the
destination host.
Application Layer
• The logical connection between the two application layers is end to-end. The two
application layers exchange messages between each other as though there were a
bridge between the two layers.
3. The network layer takes the transport-layer packet as data or payload and adds its own
header to the payload. The header contains the addresses of the source and destination
hosts and some more information used for error checking of the header, fragmentation
information, and so on. The result is the network-layer packet, called a datagram. The
network layer then passes the packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or payload and adds its own
header, which contains the link-layer addresses of the host or the next hop (the router).
The result is the link-layer packet, which is called a frame. The frame is passed to the
physical layer for transmission.
1.5.5 Addressing
Figure 1.23 shows the addressing at each layer.
As the figure shows, there is a relationship between the layer, the address used in that
layer, and the packet name at that layer.
▪ At the application layer, we normally use names to define the site that provides
services, such as someorg.com, or the e-mail address, such as
[email protected].
▪ At the transport layer, addresses are called port numbers, and these define the
application-layer programs at the source and destination.
▪ Port numbers are local addresses that distinguish between several programs
running at the same time. At the network-layer, the addresses are global, with the
whole Internet as the scope.
▪ A network-layer address uniquely defines the connection of a device to the
Internet. The link-layer addresses, sometimes called MAC addresses, are locally
defined addresses, each of which defines a specific host or router in a network
(LAN or WAN).
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate but
related layers, each of which defines a part of the process of moving information
across a network (see Figure 1.25).
1.7 PERFORMANCE
In network design, Performance is an important factor for any computer systems and
computer networks. Four approaches:
1. Bandwidth
2. Throughput
3. Latency (delay)
4. Jitter
1.7.1 Bandwidth
• Is the number of bits that can be transmitted over the network in a certain period
of time.
• Two types:
• Bandwidth in hertz
• Bandwidth in bits per second
• Bandwidth in hertz
• Refers to the range of frequencies contained in a composite signal or the
range of frequencies that a channel can pass.
• Ex: Bandwidth of a subscriber telephone line is 4 KHz
• Bandwidth in bits per second
• Refers to the number of bits per second that a channel, a link or even a
network can transmit.
• Ex: Bandwidth of Ethernet network is a maximum of 100 Mbps. This
network can send 100 Mbps
1.7.2 Throughput
• IS a measure of the number of bits that can pass through a network per second.
• Throughput = Transfer size / Transfer time
1.7.3 Latency
• Also termed a delay
• It is a measure of how long a single bit takes to propagate from one end of a link
to an other end
• It is defined using four components
• Propagation time
• Transmission time
• Queuing
• Processing Delay
• Latency (D) = Propagation time + Transmission time + Queuing +
Processing Delay
1.7.4 Delay
• Delay × Bandwidth gives the volume of the pipe – maximum number of bits that
could be in transmit through the pipe at any given instant.
• RTT - time takes for a bit of information to propagate from one end of a network
to the other end and revert back
1.7.5 Jitter
• Refers to the variation in the packet arrival time, that is an uneven delay in the
delivery of audio or video packets.
Connectors
The most common UTP connector is RJ45 (RJ stands for registered jack), as shown in
Figure 1.31. The RJ45 is a keyed connector, meaning the connector can be inserted in
only one way.
computer or other device. The BNC terminator is used at the end of the cable to prevent
the reflection of the signal.
If the angle of incidence I (the angle the ray makes with the line perpendicular to the
interface between the two substances) is less than the critical angle, the ray refracts and
moves closer to the surface.
If the angle of incidence is equal to the critical angle, the light bends along the
interface.
If the angle is greater than the critical angle, the ray reflects (makes a turn) and travels
again in the denser.
Optical fibers use reflection to guide light through a channel. A glass or plastic core is
surrounded by a cladding of less dense glass or plastic. The difference in density of the
two materials must be such that a beam of light moving through the core is reflected off
the cladding instead of being refracted into it. See Figure 1.35.
Single-Mode
Single-mode uses step-index fiber and a highly focused source of light that limits beams
to a small range of angles, all close to the horizontal. The single-mode fiber itself is
manufactured with a much smaller diameter than that of multimode fiber, and with
substantially lower density (index of refraction).
Fiber Sizes
Table 7.3 Fiber types
Unguided signals can travel from the source to the destination in several ways: ground
propagation, sky propagation, and line-of-sight propagation, as shown in Figure 1.39.
• In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth.
• These low-frequency signals emanate in all directions from the transmitting
antenna and follow the curvature of the planet. Distance depends on the amount of
power in the signal: The greater the power, the greater the distance.
• Example: AM radio
• In sky propagation, higher-frequency radio waves radiate upward into the
ionosphere (the layer of atmosphere where particles exist as ions) where they are
reflected back to earth.
• This type of transmission allows for greater distances with lower output power.
• Example: Amateur radio, an international broadcasts such as BBC and voice of
America
• In line-of-sight propagation, very high-frequency signals are transmitted in
straight lines directly from antenna to antenna. Antennas must be directional,
facing each other, and either tall enough or close enough together not to be
affected by the curvature of the earth.
• Line-of sight propagation is tricky because radio transmissions cannot be
completely focused.
1.10.2 Microwaves
• Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves.
• Microwaves are unidirectional. When an antenna transmits microwaves, they can
be narrowly focused. This means that the sending and receiving antennas need
to be aligned. The unidirectional property has an obvious advantage.
• A pair of antennas can be aligned without interfering with another pair of aligned
antennas.
Characteristics:
▪ Microwave propagation is line-of-sight. Since the towers with the mounted
antennas need to be in direct sight of each other, towers that are far apart need to
be very tall.
▪ The curvature of the earth as well as other blocking obstacles do not allow two
short towers to communicate by using microwaves. Repeaters are often needed for
long distance communication.
▪ Very high-frequency microwaves cannot penetrate walls. This characteristic can
be a disadvantage if receivers are inside buildings.
▪ The microwave band is relatively wide, almost 299 GHz. Therefore wider
subbands can be assigned, and a high data rate is possible.
▪ Use of certain portions of the band requires permission from authorities.
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction. Two
types of antennas are used for microwave communications: the parabolic dish and the
horn (see Figure 1.41).
A parabolic dish antenna is based on the geometry of a parabola: Every line parallel to
the line of symmetry (line of sight) reflects off the curve at angles such that all the lines
intersect in a common point called the focus. The parabolic dish works as a funnel,
catching a wide range of waves and directing them to a common point. In this way, more
of the signal is recovered than would be possible with a single-point receiver.
A horn antenna looks like a gigantic scoop. Outgoing transmissions are broadcast up a
stem (resembling a handle) and deflected outward in a series of narrow parallel beams by
the curved head. Received transmissions are collected by the scooped shape of the horn,
in a manner similar to the parabolic dish, and are deflected down into the stem.
Applications:
Used for Unicast communication such as cellular telephones, Satellite networks and
wireless LANs
1.10.3 Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to
770 nm), can be used for short-range communication. Infrared waves, having high
frequencies, cannot penetrate walls. This advantageous characteristic prevents
interference between one system and another; a short-range communication system in
one room cannot be affected by another system in the next room.
Infrared signals can be used for short-range communication in a closed area using
line-of-sight propagation
Applications
• Used for short range communications such as those between a PC and a peripheral
device. It can also be used for indoor LANs
1.11 SWITCHING
• For transmission of data beyond a local area, communication is typically achieved
by transmitting data from source to destination through the network of
intermediate switching nodes.
• A switched network consists of a series of interlinked nodes, called switches.
• Switches are devices capable of creating temporary connections between two or
more devices linked to the switch. In a switched network, some of these nodes are
connected to the end systems (computers or telephones, for example). Others are
used only for routing.
In circuit switching, the resources need to be reserved during the setup phase; the
resources remain dedicated for the entire duration of data transfer until the
teardown phase.
• All four packets (or datagrams) belong to the same message, but may travel
different paths to reach their destination.
• This is so because the links may be involved in carrying packets from other
sources and do not have the necessary bandwidth available to carry all the packets
from A to X.
• This approach can cause the datagrams of a transmission to arrive at their
destination out of order with different delays between the packets.
• Packets may also be lost or dropped because of a lack of resources
• Upper-layer protocol to reorder the datagrams or ask for lost datagrams before
passing them on to the application
Efficiency – better than that of a circuit switched network because the resources are
allocated only when there are many packets to be transferred.
Delay – Greater delay in a datagram network than in a virtual-circuit network
2. Virtual approach
• A virtual-circuit network is a cross between a circuit-switched network and a
datagram network.
• Also called connection oriented approach
• A preplanned single virtual connection route is chosen between the sender and the
receiver before any data is sent. When data are sent, all packets travel one after
another along this route.
Addressing
• Two types of addressing are involved: global and local (virtual-circuit identifier).
• Global Addressing – is an address that is required for a source or destination if
the network is part of an international network. Used only to create VCI
• The identifier that is actually used for data transfer is called the virtual-circuit
identifier (VCI). Is a small number that has only switch scope; It is used by a
frame between two switches.
• When a frame arrives at a switch, it has a VCI; when it leaves, it has a different
VCI.
• This means that the switch holds four pieces of information for each virtual circuit
that is already set up.
• Figure below shows such a switch and its corresponding table.
• It shows a frame arriving at port 1 with a VCI of 14. When the frame arrives, the
switch looks in its table to find port 1 and a VCI of 14. When it is found, the
switch knows to change the VCI to 22 and send out the frame from port 3.
• This figure 1.48 shows how a frame from source A reaches destination B and how
its VCI changes during the trip. Each switch changes the VCI and routes the
frame.
• The data-transfer phase is active until the source sends all its frames to the
destination.
• The procedure at the switch is the same for each frame of a message. The process
creates a virtual circuit, not a real circuit, between the source and destination.