Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): frame format and specifications, Wireless LAN’s – 802.11x, 802.3 Bluetooth etc.
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol
Mature Packet Switching Protocols:ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and
Drawbacks
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol, Mature Packet Switching Protocols: ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and Drawbacks
The document discusses communications and network security basics including telecommunications, protocols, network architectures, and the OSI model. It provides an overview of each layer of the OSI model and how data is encapsulated as it moves through the layers. Key concepts covered include TCP/IP, IPv4 and IPv6 addressing, tunneling methods, wired transmission types, cable types, and plenum cable requirements.
The transport layer provides end-to-end communication over a network by providing services such as connection-oriented communication, reliability, flow control, and multiplexing. It links the application layer to the network layer and performs functions like segmenting messages and establishing connections between endpoints. Common transport protocols are TCP, which provides connection-oriented and reliable data transfer, and UDP, which provides connectionless datagram delivery.
Presentation of computer network on data link layersumit gyawali
The document presents information on the data link layer and services provided by the link layer. It discusses how the data link layer transfers data between network layers on different machines, divides data into frames, and adds headers for physical addressing. It describes three main services provided - unacknowledged connectionless, acknowledged connection-oriented, and acknowledged connectionless. Finally, it outlines how the data link layer is implemented using network interface cards that handle framing, linking, flow control, and error detection.
The document discusses data link layer protocols. It begins by introducing the data link layer and its functions, including providing an interface to the network layer, error control, and flow control. It then discusses three elementary data link protocols: 1) an unrestricted simplex protocol with no error control, 2) a simplex stop-and-wait protocol that uses acknowledgments for flow control, and 3) a simplex protocol for noisy channels that uses positive acknowledgments and retransmissions for error control. The document focuses on the algorithms and procedures used in these elementary protocols.
X.25 is a protocol standard developed in the 1970s for wide area network communications. It defines how connections are established and maintained between user devices and network devices. X.25 operates at the physical, data link, and network layers of the OSI model. It uses LAPB at the data link layer and PLP at the network layer to transfer data and establish virtual circuits between DTE devices across a packet switched network. Frame Relay was developed later to provide higher speeds and efficiency compared to X.25.
The document discusses various data link layer protocols. It begins by introducing stop-and-wait and sliding window protocols. It then provides an example of a stop-and-wait protocol where a frame is lost, leading the sender to retransmit a duplicate frame. Next, it discusses sliding window protocols and provides an example where the window allows multiple outstanding frames. Finally, it gives an example of a one-bit sliding window protocol that uses acknowledgments to control the window.
This document discusses the data link layer and media access control. It covers topics such as:
- The functions of the data link layer including framing, addressing, error control, and media access control.
- Common data link layer protocols like HDLC, PPP, Ethernet, and IEEE 802.11.
- Link layer addressing using MAC addresses and protocols like ARP.
- Media access control for networks including wired technologies like Ethernet and wireless technologies like IEEE 802.11.
The document discusses two network reference models: the OSI model and TCP/IP model. The OSI model has 7 layers - application, presentation, session, transport, network, data link, and physical. It defines the functions performed at each layer to allow for interoperability between vendors. The TCP/IP model has 4 layers - application, transport, internet, and network access. It combines functions of some OSI layers. Both models use encapsulation to break messages into packets at each layer for transmission across a network.
Transport protocols establish reliable communication between machines on a network. They provide services like error control, flow control, and multiplexing. The main transport protocols are TCP and UDP. TCP is connection-oriented and provides reliable, ordered delivery. UDP is connectionless and faster but unreliable. Both protocols use port numbers to identify sending and receiving processes and segment packet headers with fields like source/destination port and sequence numbers. DNS is an application layer protocol that maps domain names to IP addresses, enabling human-friendly web addresses. It uses a hierarchical system of root, TLD, and authoritative name servers to resolve names.
The document discusses the data link layer and its functions. It covers topics such as framing, addressing, error control, flow control, and media access control. Specific protocols discussed include CSMA/CD which is used to manage access to shared mediums and prevent collisions. The data link layer has two sublayers - the logical link control layer which handles error and flow control, and the media access control layer which handles framing, addressing, and multiple access control.
Packet switching is a data transmission technique that divides data into small packets before transmission. Each packet contains a header with source and destination addresses, a payload with the original data, and a trailer with a checksum. Packets are transmitted hop-by-hop through a packet switched network and reassembled at the destination. X.25 was an early protocol for packet switched networks that established virtual circuits to provide reliable connections over unreliable transmission links. It defined physical, link, and packet layer protocols to assemble and transmit packets through public data networks. Frame Relay and ATM are later protocols that also use virtual circuits to transmit packets through packet switched networks.
Packet switching is a data transmission technique where data is divided into small packets before being transmitted over a network. Each packet contains a header with addressing information and the data. Packet switching networks allow for efficient use of bandwidth and transmission of data from many sources simultaneously. The X.25 protocol was an early standard that used packet switching and virtual circuits to transmit data reliably over public packet switched networks. It defined protocols for call setup, data transfer, and flow control between network nodes.
Data Link Layer (DLL) is the second layer in the OSI model. It provides error...nilayarajait
The Data Link Layer (DLL) is the second layer in the OSI model. It provides error detection, flow control, and media access control for reliable communication over a physical network.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
The document discusses the Transmission Control Protocol (TCP). It explains that TCP provides reliable, ordered delivery of a stream of bytes between applications on networked hosts. It accomplishes this through functions like segmenting data, assigning port numbers to identify applications, establishing connections, providing acknowledgements and retransmissions to ensure reliable delivery, and maintaining sequence numbers to ensure correct ordering. The document also describes TCP's three-way handshake for connection establishment and four-step process for connection termination.
The data link layer is the second layer in the OSI model. It receives data from the network layer, applies addressing information, and provides error control, flow control and access control. It has two sublayers - the logical link control and media access control. It offers three types of services to the network layer: unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented. Common functions of the data link layer include framing data, error control using checksums, and flow control using protocols like stop-and-wait and sliding window. The media access control sublayer determines how nodes access shared broadcast networks.
The document discusses a 4th module course on computer networks taught by Dr. Shivashankar. The module covers transport layer protocols including UDP and TCP. Key topics include process-to-process communication using port numbers, flow control, error control, and connection-oriented vs connectionless protocols like Stop-and-Wait, Go-Back-N, and Selective Repeat. The document provides details on UDP including its connectionless and unreliable nature compared to TCP.
The document discusses network models and protocol layering. It describes the OSI model which divides network communication tasks into 7 layers - physical, data link, network, transport, session, presentation, and application layer. It also describes the TCP/IP protocol suite which has 5 layers - physical, data link, internet, transport, and application layer. The layers define standardized services and protocols to enable communication between systems and applications.
The document provides information about the data link layer in the OSI model. It discusses that the data link layer is the second layer, and performs functions like addressing, flow control, error control, and accessing. It has two sublayers - logical link control and media access control. It provides services to the network layer like transferring data frames. The three main services are unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented. Error control methods like checksums are used. Flow control is implemented through protocols like stop-and-wait and sliding window. Framing converts data into frames. The medium access sublayer determines how nodes access shared channels and discusses protocols like ALOHA and CSMA.
This document provides an overview of the syllabus for the Computer Networks course CS 6551. It begins with introducing the fundamentals of computer networks including characteristics, components, and transmission modes. It then discusses building a network based on requirements and different network architectures like OSI and TCP/IP models. The document covers various link layer services such as framing, flow control, and error detection. It also discusses concepts related to network performance like bandwidth, throughput, latency, and bandwidth-delay product.
The OSI model is a conceptual framework that characterizes networking functions into 7 layers - physical, data link, network, transport, session, presentation and application. Each layer has a specific role, with the physical layer defining physical connections and signals and the application layer supporting file transfer, email and directories. Data moves down from the application layer through each layer, with each adding information like headers for routing. This allows interoperability between different network products and software.
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...Infopitaara
A Boiler Feed Pump (BFP) is a critical component in thermal power plants. It supplies high-pressure water (feedwater) to the boiler, ensuring continuous steam generation.
⚙️ How a Boiler Feed Pump Works
Water Collection:
Feedwater is collected from the deaerator or feedwater tank.
Pressurization:
The pump increases water pressure using multiple impellers/stages in centrifugal types.
Discharge to Boiler:
Pressurized water is then supplied to the boiler drum or economizer section, depending on design.
🌀 Types of Boiler Feed Pumps
Centrifugal Pumps (most common):
Multistage for higher pressure.
Used in large thermal power stations.
Positive Displacement Pumps (less common):
For smaller or specific applications.
Precise flow control but less efficient for large volumes.
🛠️ Key Operations and Controls
Recirculation Line: Protects the pump from overheating at low flow.
Throttle Valve: Regulates flow based on boiler demand.
Control System: Often automated via DCS/PLC for variable load conditions.
Sealing & Cooling Systems: Prevent leakage and maintain pump health.
⚠️ Common BFP Issues
Cavitation due to low NPSH (Net Positive Suction Head).
Seal or bearing failure.
Overheating from improper flow or recirculation.
Ad
More Related Content
Similar to Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): frame format and specifications, Wireless LAN’s – 802.11x, 802.3 Bluetooth etc. (20)
The document discusses various data link layer protocols. It begins by introducing stop-and-wait and sliding window protocols. It then provides an example of a stop-and-wait protocol where a frame is lost, leading the sender to retransmit a duplicate frame. Next, it discusses sliding window protocols and provides an example where the window allows multiple outstanding frames. Finally, it gives an example of a one-bit sliding window protocol that uses acknowledgments to control the window.
This document discusses the data link layer and media access control. It covers topics such as:
- The functions of the data link layer including framing, addressing, error control, and media access control.
- Common data link layer protocols like HDLC, PPP, Ethernet, and IEEE 802.11.
- Link layer addressing using MAC addresses and protocols like ARP.
- Media access control for networks including wired technologies like Ethernet and wireless technologies like IEEE 802.11.
The document discusses two network reference models: the OSI model and TCP/IP model. The OSI model has 7 layers - application, presentation, session, transport, network, data link, and physical. It defines the functions performed at each layer to allow for interoperability between vendors. The TCP/IP model has 4 layers - application, transport, internet, and network access. It combines functions of some OSI layers. Both models use encapsulation to break messages into packets at each layer for transmission across a network.
Transport protocols establish reliable communication between machines on a network. They provide services like error control, flow control, and multiplexing. The main transport protocols are TCP and UDP. TCP is connection-oriented and provides reliable, ordered delivery. UDP is connectionless and faster but unreliable. Both protocols use port numbers to identify sending and receiving processes and segment packet headers with fields like source/destination port and sequence numbers. DNS is an application layer protocol that maps domain names to IP addresses, enabling human-friendly web addresses. It uses a hierarchical system of root, TLD, and authoritative name servers to resolve names.
The document discusses the data link layer and its functions. It covers topics such as framing, addressing, error control, flow control, and media access control. Specific protocols discussed include CSMA/CD which is used to manage access to shared mediums and prevent collisions. The data link layer has two sublayers - the logical link control layer which handles error and flow control, and the media access control layer which handles framing, addressing, and multiple access control.
Packet switching is a data transmission technique that divides data into small packets before transmission. Each packet contains a header with source and destination addresses, a payload with the original data, and a trailer with a checksum. Packets are transmitted hop-by-hop through a packet switched network and reassembled at the destination. X.25 was an early protocol for packet switched networks that established virtual circuits to provide reliable connections over unreliable transmission links. It defined physical, link, and packet layer protocols to assemble and transmit packets through public data networks. Frame Relay and ATM are later protocols that also use virtual circuits to transmit packets through packet switched networks.
Packet switching is a data transmission technique where data is divided into small packets before being transmitted over a network. Each packet contains a header with addressing information and the data. Packet switching networks allow for efficient use of bandwidth and transmission of data from many sources simultaneously. The X.25 protocol was an early standard that used packet switching and virtual circuits to transmit data reliably over public packet switched networks. It defined protocols for call setup, data transfer, and flow control between network nodes.
Data Link Layer (DLL) is the second layer in the OSI model. It provides error...nilayarajait
The Data Link Layer (DLL) is the second layer in the OSI model. It provides error detection, flow control, and media access control for reliable communication over a physical network.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
The document discusses the Transmission Control Protocol (TCP). It explains that TCP provides reliable, ordered delivery of a stream of bytes between applications on networked hosts. It accomplishes this through functions like segmenting data, assigning port numbers to identify applications, establishing connections, providing acknowledgements and retransmissions to ensure reliable delivery, and maintaining sequence numbers to ensure correct ordering. The document also describes TCP's three-way handshake for connection establishment and four-step process for connection termination.
The data link layer is the second layer in the OSI model. It receives data from the network layer, applies addressing information, and provides error control, flow control and access control. It has two sublayers - the logical link control and media access control. It offers three types of services to the network layer: unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented. Common functions of the data link layer include framing data, error control using checksums, and flow control using protocols like stop-and-wait and sliding window. The media access control sublayer determines how nodes access shared broadcast networks.
The document discusses a 4th module course on computer networks taught by Dr. Shivashankar. The module covers transport layer protocols including UDP and TCP. Key topics include process-to-process communication using port numbers, flow control, error control, and connection-oriented vs connectionless protocols like Stop-and-Wait, Go-Back-N, and Selective Repeat. The document provides details on UDP including its connectionless and unreliable nature compared to TCP.
The document discusses network models and protocol layering. It describes the OSI model which divides network communication tasks into 7 layers - physical, data link, network, transport, session, presentation, and application layer. It also describes the TCP/IP protocol suite which has 5 layers - physical, data link, internet, transport, and application layer. The layers define standardized services and protocols to enable communication between systems and applications.
The document provides information about the data link layer in the OSI model. It discusses that the data link layer is the second layer, and performs functions like addressing, flow control, error control, and accessing. It has two sublayers - logical link control and media access control. It provides services to the network layer like transferring data frames. The three main services are unacknowledged connectionless, acknowledged connectionless, and acknowledged connection-oriented. Error control methods like checksums are used. Flow control is implemented through protocols like stop-and-wait and sliding window. Framing converts data into frames. The medium access sublayer determines how nodes access shared channels and discusses protocols like ALOHA and CSMA.
This document provides an overview of the syllabus for the Computer Networks course CS 6551. It begins with introducing the fundamentals of computer networks including characteristics, components, and transmission modes. It then discusses building a network based on requirements and different network architectures like OSI and TCP/IP models. The document covers various link layer services such as framing, flow control, and error detection. It also discusses concepts related to network performance like bandwidth, throughput, latency, and bandwidth-delay product.
The OSI model is a conceptual framework that characterizes networking functions into 7 layers - physical, data link, network, transport, session, presentation and application. Each layer has a specific role, with the physical layer defining physical connections and signals and the application layer supporting file transfer, email and directories. Data moves down from the application layer through each layer, with each adding information like headers for routing. This allows interoperability between different network products and software.
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...Infopitaara
A Boiler Feed Pump (BFP) is a critical component in thermal power plants. It supplies high-pressure water (feedwater) to the boiler, ensuring continuous steam generation.
⚙️ How a Boiler Feed Pump Works
Water Collection:
Feedwater is collected from the deaerator or feedwater tank.
Pressurization:
The pump increases water pressure using multiple impellers/stages in centrifugal types.
Discharge to Boiler:
Pressurized water is then supplied to the boiler drum or economizer section, depending on design.
🌀 Types of Boiler Feed Pumps
Centrifugal Pumps (most common):
Multistage for higher pressure.
Used in large thermal power stations.
Positive Displacement Pumps (less common):
For smaller or specific applications.
Precise flow control but less efficient for large volumes.
🛠️ Key Operations and Controls
Recirculation Line: Protects the pump from overheating at low flow.
Throttle Valve: Regulates flow based on boiler demand.
Control System: Often automated via DCS/PLC for variable load conditions.
Sealing & Cooling Systems: Prevent leakage and maintain pump health.
⚠️ Common BFP Issues
Cavitation due to low NPSH (Net Positive Suction Head).
Seal or bearing failure.
Overheating from improper flow or recirculation.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...Infopitaara
A feed water heater is a device used in power plants to preheat water before it enters the boiler. It plays a critical role in improving the overall efficiency of the power generation process, especially in thermal power plants.
🔧 Function of a Feed Water Heater:
It uses steam extracted from the turbine to preheat the feed water.
This reduces the fuel required to convert water into steam in the boiler.
It supports Regenerative Rankine Cycle, increasing plant efficiency.
🔍 Types of Feed Water Heaters:
Open Feed Water Heater (Direct Contact)
Steam and water come into direct contact.
Mixing occurs, and heat is transferred directly.
Common in low-pressure stages.
Closed Feed Water Heater (Surface Type)
Steam and water are separated by tubes.
Heat is transferred through tube walls.
Common in high-pressure systems.
⚙️ Advantages:
Improves thermal efficiency.
Reduces fuel consumption.
Lowers thermal stress on boiler components.
Minimizes corrosion by removing dissolved gases.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
its all about Artificial Intelligence(Ai) and Machine Learning and not on advanced level you can study before the exam or can check for some information on Ai for project
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
The role of the lexical analyzer
Specification of tokens
Finite state machines
From a regular expressions to an NFA
Convert NFA to DFA
Transforming grammars and regular expressions
Transforming automata to grammars
Language for specifying lexical analyzers
Value Stream Mapping Worskshops for Intelligent Continuous SecurityMarc Hornbeek
This presentation provides detailed guidance and tools for conducting Current State and Future State Value Stream Mapping workshops for Intelligent Continuous Security.
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
This presentation provides a high level insight about DFT analysis and test coverage calculation, finalizing test strategy, and types of tests at different levels of the product.
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
Ad
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): frame format and specifications, Wireless LAN’s – 802.11x, 802.3 Bluetooth etc.
2. Connection oriented Vs Connection less network
Connection-Oriented means that when devices
communicate, they perform handshaking to set up
an end-to-end connection.
In connectionless design every packet is addressed
and routed independently.
3. Connection oriented Protocols
Characteristics:
1.Handshaking (Setting up connection) between
communicating devices. Connections sometimes are
called as sessions, virtual circuits or logical
connections.
2.Acknowledgement procedure. This provides a high
level of network reliability.
3.It provides means of error control. Whenever
receiving station found that received data packet
consist of errors it request sender to retransmit that
packet.
4.It is a uni-cast (point-to-point) operation.
4. •Connection-oriented
•Setup data transfer ahead of time (through
handshaking)
•Internet’s connection-oriented service is TCP
(Transmission Control Protocol). It provides :
•reliable, in-order byte delivery
•flow control
•congestion control.
•Applications using TCP: Email (SMTP), web
browsing (HTTP), and file transfer (FTP)
5. Connectionless (Stateless) Protocols
Characteristics:
• It sends data with a source and destination
address without a handshake.
• Do not use any acknowledgment procedure.
• Usually do not support error control.
• Connectionless protocols are more efficient
than that of connection oriented protocols.
• It allows multicast and broadcast operations.
6. •Connectionless
Internet’s connectionless service is UDP (User
Datagram Protocol) . It provides
unreliable data transfer
no flow control
no congestion control
Applications using UDP: streaming media, video
conferencing, and IP telephony
7. A comparison of Connection-Oriented and Connectionless Network
8. Peer-to-Peer Network
• A peer-to-peer network is a distributed network
architecture composed of participants that make a
portion of their resources, such as processing power,
disk storage or network bandwidth directly to network
participants without the need for central coordination
instances.
• Used largely for sharing of content files such as audio,
video, data or anything in a digital format.
• Can be very large
9. • End-systems (or peers), are capable of behaving
as clients and servers of data, hence system is
scalable and reliable
• Peers participation is voluntary, membership is
dynamic, hence topology keeps changing
• Most popularly used for file sharing, hence peer-
to-peer systems have become synonymous with
peer-to-peer file sharing networks
Peer-to-Peer Network
10. A Peer
• Peers are both suppliers and consumers
while in the traditional client-server model,
the server supplies while the client only
consumes.
12. Advantages
• The more nodes that are part of the system,
demand increases and total capacity of the
system also increases. Where in client-server
network architectures as more clients are
added to the system, the system resources
decreases.
• There is no single point of failure, due to
robustness of the system.
• All clients provide to the system
13. Disadvantages
• Security is a major concern, not all shared files
are from beginning sources. Attackers may add
malware to p2p files as an attempt to take
control of other nodes in the network.
• Heavy bandwidth usage
• ISP speeding/slowing of P2P traffic.
• Potential legal/moral concerns
14. CO Vs. CL
• In connection oriented service authentication is
needed while connectionless service does not need
any authentication.
• Connection oriented protocol makes a connection
and checks whether message is received or not and
sends again if an error occurs connectionless
service protocol does not guarantees a delivery.
• Connection oriented service is more reliable than
connectionless service.
• Connection oriented service interface is stream
based and connectionless is message based.
15. Service Primitives
• A service is specified by a set of primitives. A
primitive means operation. To access the
service a user process can access these
primitives.
• These primitives are different for connection
oriented service and connectionless service.
16. • LISTEN : When a server is ready to accept an
incoming connection it executes the LISTEN primitive.
It blocks waiting for an incoming connection.
• CONNECT : It connects the server by establishing a
connection. Response is awaited.
• RECIEVE: Then the RECIEVE call blocks the server.
• SEND : Then the client executes SEND primitive to
transmit its request followed by the execution of
RECIEVE to get the reply. Send the message.
• DISCONNECT : This primitive is used for
terminating the connection. After this primitive one
can’t send any message. When the client sends
DISCONNECT packet then the server also sends the
DISCONNECT packet to acknowledge the client.
When the server package is received by client then the
process is terminated.
Connection Oriented Service Primitives
17. Primitives for Connectionless Oriented Service
• UNIDATA - This primitive sends a packet of data
• FACILITY, REPORT - Primitive for enquiring
about the performance of the network, like
delivery statistics.
18. CO Vs. CL
• In connection oriented service authentication is
needed while connectionless service does not
need any authentication.
• Connection oriented service is more reliable
than connectionless service.
• Connection oriented service interface is stream
(01 format) based and connectionless is
message based.
19. X.25 Networks
• X.25 is a standard used by many older public
networks specially outside the U.S.
• The packet switching networks use X.25 protocol
.
• X.25 was developed for computer connections,
used for terminal/timesharing connection.
20. X.25 Networks
• A protocol X.21 which is a physical layer
protocol is used to specify the physical electrical
and procedural interface between the host and
network.
21. • It allows the user to establish virtual circuits and
send packets on them. These packets are
delivered to the destination reliably and in order.
• X.25 is a connection oriented service.
• It supports switched virtual circuits as well as
the permanent circuits.
22. • Packets can then be sent over this connection from
sender to receiver.
• X.25 provides the flow control, to avoid a fast
sender overriding a slow or busy receiver.
23. • A permanent virtual circuit is analogous to-a
leased line. It is set up in advance with a
mutual agreement between the users.
• Since it is always present, no call set up is
required for its use.
24. • X.25 Most widely used today
• X.25 is an interface between DTE ( Data Terminal
Equipment) and DCE (Data Communication
Equipment) for terminal operation at the packet mode
on public data network.
– A packet switching protocol used in WAN.
25. • DTE is typically either a dumb terminal or the
serial port on a computer/workstation.
• DCE is typically a modem, or other piece of
data communications equipment, hence the
names.
26. Three Layers of X.25
The X.25 interface is defined at three levels:
The three levels are:
(i) Physical layer (level 1)
(ii) Data link layer (level 2)
(iii) Packet layer (level 3).
29. • The three layers of X.25 interface are as
shown in Fig..
• At the physical level X.21 physical interface is
being used which is defined for circuit
switched data network.
• At the data link level, X.25 specifies the link
access procedure-B (LAP-B) protocol.
31. • At the network level (3rd
level), X.25 defines a
protocol for an access to packet data subnetwork.
• This protocol defines the format, content and
procedures for exchange of control and data
transfer packets. The packet layer provides an
external virtual circuit service.
• Next Fig. shows the relationship between the
levels of X.25. User data is passed down to X.25
level 3.
• ---------------------
33. • The entire X.25 packet formed at the packet level
is then passed down to the second layer i.e. the
data link layer.
• Information packets and Control packets formed
at packet level and passed to LAP-B frame.
• This frame is then passed to the physical layer
for transmission.
34. Packet Layer Protocol
• PLP packets : Information packets and Control packets
• Information Packets (I-packets)
– transmit user data
– consists of a header and a user data field
– The last bit in the header = 0 for I-packets
35. Packet Layer Protocol
• I-packet fields
– General format identifier (GFI) field: 4 bits
• Q bit : not defined in the standard. Users define
two types of data.
• D bit: for packet sequencing.
– Virtual circuit identification (VCI) fields
• Logical channel group number (LCGN) : 4 bits
• Logical channel number (LCN) : 8 bits
• total 12 bits to identify the virtual circuit for a
transmission
36. Packet Layer Protocol
• I-packet fields
• P(S) and P(R) : packet sequence numbers for
flow and error control
• P(S) for packet send, P(R) for packet receive
37. Packet Layer Protocol
• Control Packets (C-packets)
~ flow and error control
~ connection, termination and management control
– Category I (for flow and error control)
• RR: Receive Ready - the station is ready to
receive more packets
• RNR: Receive Not Ready
• REJ: Reject - an error in the packet (go-back-n
ARQ)
38. Packet Layer Protocol
• Control Packet (C-packet)
– Category II
• for connection, termination and management control
• control packet types
39. Control Packets
• Category II
– Call Request/Incoming Call
• request the establishment of a connection between
two DTEs
– Call Accepted/Call Connected
• indicate the acceptance of the requested connection
by the called system
40. Control Packets
• Category II (cont’d)
– Clear Request/Clear Indication
• to disconnect the connection at the end of an exchange
– Clear Confirm
• sent in response to the clear indication
– and More...
41. Virtual Circuit Service
• With the X.25 packet layer, data are
transmitted in packets over external virtual
circuits, The virtual circuit service of X.25
provides for two types of virtual circuits.
• The virtual circuit service of X.25 provides for
two types of virtual circuits i.e. "virtual call"
and "permanent virtual circuit".
42. Virtual Circuit Service
• A virtual call is a dynamically established
virtual circuit using a call set up and call
clearing procedure.
• A permanent virtual circuit is a fixed, network
assigned virtual circuit. Data transfer takes
place as with virtual calls, but no call set up or
clearing is required.
43. Characteristics of X.25
• Multiple logical channels can be set on a single
physical line.
• Terminals of different communication speeds can
communicate.
44. Wired LANs: Ethernet
.
•The LAN market has several technologies such as
Ethernet, Token Ring, Token Bus and ATM LAN.
• Ethernet is dominant technology.
45. IEEE STANDARDS
•Computer Society of the IEEE started a project,
called Project 802, to set standards to enable
intercommunication among equipment from a variety
of manufacturers.
•Project 802 is a way of specifying functions of the
physical layer and the data link layer of major LAN
protocols.
46. •The relationship of the 802 Standard to the
traditional OSI(open source interconnection) model
is shown in Figure .
•The IEEE has subdivided the data link layer into
two sub layers:
logical link control (LLC)
Media Access Control (MAC).
•IEEE has also created several physical layer
standards for different LAN protocols.
48. Data Link Layer:
•Data link control handles framing, flow control, and
error control.
•In IEEE Project 802, flow control, error control, and
part of the framing duties are collected into one sub
layer called the logical link control.
•Framing is handled in both the LLC sub layer and
the MAC sub layer.
49. Data Link Layer:
•The LLC provides one single data link control
protocol for all IEEE LANs.
•The purpose of the LLC is to provide flow and error
control for the upper-layer protocols(like Network
layers etc.) that actually demand these services.
50. Data Link Layer:
•IEEE Project 802 has created a sub layer called
Media Access Control (MAC) that defines the
specific access method for each LAN.
•For example, it defines the token passing method
for both Token Ring and Token Bus LANs.
51. STANDARD ETHERNET
• It has gone through four generations: Standard
Ethernet (10+ Mbps), Fast Ethernet (100
Mbps), Gigabit Ethernet (l Gbps), and Ten-
Gigabit Ethernet (10 Gbps), as shown in
Figure.
52. Media Access Control (MAC) Sublayer
• Frame Format : The Ethernet frame contains
seven fields: preamble, SFD, DA, SA, length or
type of protocol data unit (PDU), upper-layer
data, and the CRC.
• Ethernet does not provide any mechanism for
acknowledging received frames, making it what
is known as an unreliable medium.
53. 802.3 MAC frame
• Preamble: The first field of the 802.3 frame
contains 7 bytes (56 bits) of alternating 0s and 1s
that alerts the receiving system to the coming frame
and enables it to synchronize its input timing.
• The pattern provides only an alert and a timing
pulse.
54. 802.3 MAC FRAME
START FRAME DELIMITER (SFD).
• The second field (1 byte: 10101011) signals the
beginning of the frame.
55. DESTINATION ADDRESS (DA)
•The DA field is 6 bytes and contains the physical
address of the destination station or stations to receive
the packet.
SOURCE ADDRESS (SA)
•The SA field is also 6 bytes and contains the physical
address of the sender of the packet.
56. LENGTH OR TYPE.
•This field is defined as a type field or length field.
DATA.
•This field carries data encapsulated from the upper-
layer protocols. It is a minimum of 46 and a
maximum of 1500 bytes.
CRC.
•The last field contains error detection information,
in this case a CRC-32
57. Frame Length
• Ethernet has imposed restrictions on both the
minimum and maximum lengths of a frame, as shown
in Figure.
58. ADDRESSING
• Each station on an Ethernet network (such as a PC,
workstation, or printer) has its own network interface card
(NIC).
• The NIC fits inside the station and provides the station
with a 6-byte physical address. As shown in Figure, the
Ethernet address is 6 bytes (48 bits), normally written in
hexadecimal notation, with a colon between the bytes.
Example of an Ethernet address in hexadecimal notation
59. Unicast, Multicast, and Broadcast Addresses
• A source address is always a unicast address-the
frame comes from only one station.
• The destination address, however, can be unicast,
multicast, or broadcast.
• Figure shows how to distinguish a unicast address
from a multicast address.
60. Unicast, Multicast, and Broadcast Addresses
• The least significant bit of the first byte defines the
type of address.
• If the bit is 0, the address is unicast; otherwise, it is
multicast
Unicast and Multicast addresses
61. • A unicast destination address defines only one
recipient; the relationship between the sender
and the receiver is one-to-one.
• A multicast destination address defines a
group of addresses; the relationship between
the sender and the receivers is one-to-many.
62. • The broadcast address is a special case of the
multicast address; the recipients are all the
stations on the LAN. A broadcast destination
address is forty-eight 1s.
• The broadcast destination address is a special
case of the multicast address in which all bits
are 1s.
65. 1OBase5: Thick Ethernet
• The first implementation is called 10Base5, thick
Ethernet, or Thicknet.
• 1OBase5 was the first Ethernet specification to
use a bus topology with an external transceiver
(transmitter/receiver) connected via a tap to a
thick coaxial cable.
• Figure shows a schematic diagram of a 1OBase5
implementation.
67. • The transceiver is responsible for transmitting,
receiving, and detecting collisions.
• The transceiver is connected to the station via a
transceiver cable that provides separate paths for
sending and receiving. This means that collision
can only happen in the coaxial cable.
• The maximum length of the coaxial cable must
not exceed 500 m, otherwise, there is excessive
degradation of the signal.
68. 10Base2: Thin Ethernet
• The second implementation is called 1OBase2,
thin Ethernet, or Cheapernet.
• 1OBase2 also uses a bus topology, but the cable
is much thinner and more flexible. The cable can
be bent to pass very close to the stations.
• In this case, the transceiver is normally part of the
network interface card (NIC), which is installed
inside the station. Figure shows the schematic
diagram of a 1OBase2 implementation.
70. • Collision here occurs in the thin coaxial cable.
This implementation is more cost effective
than 10Base5 because thin coaxial cable is less
expensive than thick coaxial and the tee
connections are much cheaper than taps.
• Installation is simpler because the thin coaxial
cable is very flexible. However, the length of
each segment cannot exceed 185 m .
71. 1OBase-T: Twisted-Pair Ethernet
• The third implementation is called 1OBase-T
or twisted-pair Ethernet. 1OBase-T uses a
physical star topology. The stations are
connected to a hub via two pairs of twisted
cable, as shown in Figure.
72. • Note that two pairs of twisted cable create two
paths (one for sending and one for receiving)
between the station and the hub.
• Any collision here happens in the hub.
• Compared to 1OBase5 or 1OBase2, we can
see that the hub actually replaces the coaxial
cable as far as a collision is concerned.
• The maximum length of the twisted cable here
is 100 m.
73. 1OBase-F: Fiber Ethernet
• Although there are several types of optical fiber
1O-Mbps Ethernet, the most common is called
10Base-F. 1OBase-F uses a star topology to
connect stations to a hub. The stations are
connected to the hub using two fiber-optic cables,
as shown in Figure.
75. CHANGES IN THE STANDARD
• The 10-Mbps Standard Ethernet has gone through
several changes before moving to the higher data
rates.
• These changes actually opened the road to the
evolution of the Ethernet to become compatible with
other high-data-rate LANs.
76. BRIDGED ETHERNET
• Bridges have two effects on an Ethernet LAN:
– They raise the bandwidth
– they separate collision domains.
• In an unbridged Ethernet network, the total capacity (10
Mbps) is shared among all stations with a frame to send;
the stations share the bandwidth of the network.
• If only one station has frames to send, it benefits from
the total capacity (10 Mbps). But if more than one
station needs to use the network, the capacity is shared.
• A bridge divides the network into two or more networks.
Bandwidth-wise, each network is independent.
77. A network with and without a bridge
•Another advantage of a bridge is the separation of
the collision domain.
• In Bridge the collision domain becomes much
smaller and the probability of collision is reduced .
79. Switched Ethernet
• If we can have a multiple-port bridge, why not
have an N-port switch? In this way, the
bandwidth is shared only between the station
and the switch (5 Mbps each). In addition, the
collision domain is divided into N domains.
• A layer 2 ( Data Link Layer) switch is an N-
port bridge with additional sophistication that
allows faster handling of the packets.
• Combination of a bridged Ethernet to a
switched Ethernet gives faster Ethernet. Figure
shows a switched LAN.
80. Full-Duplex Ethernet
• One of the limitations of 10Base5 and
10Base2 is that communication is half-duplex
(10Base-T is always full-duplex); a station can
either send or receive, but may not do both at
the same time.
• The full-duplex mode increases the capacity of
each domain from 10 to 20 Mbps.
• Instead of using one link between the station
and the switch, the configuration uses two
links: one to transmit and one to receive.
82. FAST ETHERNET
• Fast Ethernet is backward-compatible with
Standard Ethernet, but it can transmit data 10
times faster at a rate of 100 Mbps. The goals
of Fast Ethernet can be summarized as
follows:
– Upgrade the data rate to 100 Mbps.
– Make it compatible with Standard Ethernet.
– Keep the same 48-bit address.
– Keep the same frame format.
83. AUTONEGOTIATION
• A new feature added to Fast Ethernet is called
autonegotiation. It allows a station or a hub a
range of capabilities.
• Autonegotiation allows two devices to negotiate
the mode or data rate of operation.
84. AUTONEGOTIATION
• It is designed particularly for the following
purposes:
• To allow incompatible devices to connect to one
another. For example, a device with a maximum
capacity of 10 Mbps can communicate with a
device with a 100 Mbps capacity (but can work at
a lower rate).
• To allow a station to check a hub's capabilities.
85. Topology :
•Fast Ethernet is designed to connect two or more
stations together.
• If there are only two stations, they can be connected
point-to-point.
• Three or more stations need to be connected in a
star topology with a hub or a switch at the center, as
shown in Figure.
87. • Fast Ethernet implementation at the physical layer
can be categorized as either two-wire or four-wire.
• The two-wire implementation can be either
category 5 UTP (100Base-TX) or fiber-optic cable
(100Base-FX).
• The four-wire implementation is designed only for
category 3 UTP (l00Base-T4).
89. WIRELESS LANs
• Wireless communication is one of the fastest-
growing technologies. Wireless LANs can be
found on college campuses, in office
buildings, and in many public areas.
• We concentrate on two promising wireless
technologies for LANs:
– IEEE 802.11 wireless LANs, sometimes called
wireless Ethernet
– Bluetooth, a technology for small wireless LANs.
90. IEEE 802.11
• IEEE has defined the specifications for a wireless
LAN, called IEEE 802.11, which covers the
physical and data link layers.
• Architecture: The standard defines two kinds of
services: the basic service set (BSS) and the
extended service set (ESS).
• Basic Service Set:
• IEEE 802.11 defines the basic service set (BSS) as
the building block of a wireless LAN.
• A basic service set is made of stationary or mobile
wireless stations and an optional central base
station, known as the access point (AP).
91. • The BSS without an AP is a stand-alone
network and cannot send data to other BSSs.
• It is called an ad-hoc architecture. In this
architecture, stations can form a network
without the need of an AP; they can locate one
another and agree to be part of a BSS.
• A BSS with an AP is sometimes referred to as
an infrastructure network.
• A BSS without an AP is called an ad-hoc
network; a BSS with an AP is called an
infrastructure network.
93. Extended Service Set
• An extended service set (ESS) is made up of two
or more BSSs with APs. In this case, the BSSs are
connected through a distribution system, which is
usually a wired LAN.
• The distribution system connects the APs in the
BSSs. IEEE 802.11 does not restrict the
distribution system; it can be any IEEE LAN such
as an Ethernet.
• Extended service set uses two types of stations:
mobile and stationary.
• The mobile stations are normal stations inside a
BSS.
• The stationary stations are AP stations that are
part of a wired LAN. Figure shows an ESS.
95. • When BSSs are connected, the stations within
reach of one another can communicate without
the use of an AP. However, communication
between two stations in two different BSSs
usually occurs via two APs.
• The idea is similar to communication in a
cellular network if we consider each BSS to be
a cell and each AP to be a base station.
• A mobile station can belong to more than one
BSS at the same time.
96. STATION TYPES
• IEEE 802.11 defines three types of stations based
on their mobility in a wireless LAN: no-
transition, BSS-transition, and ESS-transition
mobility.
• A station with no-transition mobility is either
stationary (not moving) or moving only inside a
BSS.
• A station with BSS-transition mobility can move
from one BSS to another, but the movement is
confined inside one ESS.
• A station with ESS-transition mobility can move
from one ESS to another.
97. MAC SUBLAYER
• IEEE 802.11 defines two MAC sublayers: the distributed
coordination function (DCF) and point coordination function
(PCF). Figure shows the relationship between the two MAC
sublayers, the LLC sublayer, and the physical layer.
98. Distributed Coordination Function
• One of the two protocols defined by IEEE at the
MAC sublayer is called the distributed
coordination function (DCF).
• DCF uses CSMA/CA [Carrier Sense Multiple
Access/ Collision Avoidance]as the access
method.
• Wireless LANs cannot implement CSMA/CD
[Carrier Sense Multiple Access/ Collision
Detection] for three reasons:
99. Distributed Coordination Function
three reasons:
•For collision detection a station must be able to
send data and receive collision signals at the same
time.
•Collision may not be detected because of the
hidden station problem.
•The distance between stations can be great. Signal
fading could prevent a station at one end from
hearing a collision at the other end.
100. Distributed Coordination Function
Figure :
NAV ( Network Allocation Vector) is virtual carrier sensing
mechanism used with wireless network protocol such as IEEE 802.11.
101. Distributed Coordination Function
• Before sending a frame, the source station senses
the medium by checking the energy level at the
carrier frequency.
– The channel uses a persistence strategy with back-off
until the channel is idle.
– After the station is found to be idle, the station waits for
a period of time called the distributed inter-frame space
(DIFS); then the station sends a control frame called the
request to send (RTS).
102. Distributed Coordination Function
• After receiving the RTS and waiting a period of
time called the short inter-frame space (SIFS), the
destination station sends a control frame, called the
clear to send (CTS), to the source station. This
control frame indicates that the destination station
is ready to receive data.
• The source station sends data after waiting an
amount of time equal to SIFS.
103. Distributed Coordination Function
• The destination station, after waiting an amount of
time equal to SIFS, sends an acknowledgment to
show that the frame has been received.
• Acknowledgment is needed in this protocol
because the station does not have any means to
check for the successful arrival of its data at the
destination.
• On the other hand, the lack of collision in
CSMA/CD is a kind of indication to the source that
data have arrived.
104. Point Coordination Function (PCF)
• The point coordination function (PCF) is an
optional access method that can be implemented in
an infrastructure network (not in an ad-hoc
network).
• It is implemented on top of the DCF and is used
mostly for time-sensitive transmission.
• PCF has a centralized, contention-free polling
access method. The AP performs polling for
stations that are capable of being polled.
• The stations are polled one after another, sending
any data they have to the AP.
105. Point Coordination Function (PCF)
• To give priority to PCF over DCF, another set of
inter frame spaces has been defined: PIFS and
SIFS.
• The SIFS is the same as that in DCF, but the PIFS
(PCF IFS) is shorter than the DIFS.
• This means that if, at the same time, a station wants
to use only DCF and an AP wants to use PCF, the
AP has priority.
106. • Due to the priority of PCF over DCF, stations that only
use DCF may not gain access to the medium. To prevent
this, a repetition interval has been designed to cover both
contention-free (PCF) and contention-based (DCF) traffic.
• The repetition interval, which is repeated continuously,
starts with a special control frame, called a beacon frame.
• When the stations hear the beacon frame, they start their
NAV for the duration of the contention-free period of the
repetition interval.
• NAV ( Network Allocation Vector) is virtual carrier
sensing mechanism used with wireless network protocol
such as IEEE 802.11.
107. • During the repetition interval, the PC (point
controller) can send a poll frame, receive data, send
an ACK, receive an ACK, or do any combination of
these (802.11 uses piggybacking).
• At the end of the contention-free period, the PC
sends a CF end (contention-free end) frame to allow
the contention-based stations to use the medium.
• The wireless environment is very noisy; a corrupt
frame has to be retransmitted. The protocol,
therefore, recommends fragmentation-the division of
a large frame into smaller ones. It is more efficient to
resend a small frame than a large one.
110. WLAN PROBLEMS
HIDDEN STATION PROBLEMS
• Figure shows an example of the hidden station
problem. Station B has a transmission range shown by
the left oval (sphere in space); every station in this
range can hear any signal transmitted by station B.
• Station C has a transmission range shown by the right
oval (sphere in space); every station located in this
range can hear any signal transmitted by C.
• Station C is outside the transmission range of B;
likewise, station B is outside the transmission range of
C. Station A, however, is in the area covered by both
Band C; it can hear any signal transmitted by B or C.
112. • Assume that station B is sending data to station A. In the
middle of this transmission, station C also has data to send
to station A. However, station C is out of B's range and
transmissions from B cannot reach C. Therefore C thinks
the medium is free. Station C sends its data to A, which
results in a collision at A because this station is receiving
data from both B and C.
• In this case, we say that stations B and C are hidden from
each other with respect to A. Hidden stations can reduce
the capacity of the network because of the possibility of
collision. The solution to the hidden station problem is the
use of the handshake frames (RTS and CTS)
• The CTS frame in CSMA/CA handshake can prevent
collision from a hidden station.
114. EXPOSED STATION PROBLEM
• Consider a situation that is the inverse of the previous one: the exposed
station problem. In this problem a station refrains from using a channel when
it is, in fact, available. In Next Figure, station A is transmitting to station B.
• Station C has some data to send to station D, which can be sent without
interfering with the transmission from A to B. However, station C is exposed
to transmission from A; it hears what A is sending and thus refrains from
sending. In other words, C is too conservative and wastes the capacity of the
channel.
116. • Station C hears the RTS from A, but does not hear the CTS from B.
Station C, after hearing the RTS from A, can wait for a time so that
the CTS from B reaches A; it then sends an RTS to D to show that it
needs to communicate with D. Both stations B and A may hear this
RTS, but station A is in the sending state, not the receiving state.
Station B, however, responds with a CTS.
• The problem is here. If station A has started sending its data, station
C cannot hear the CTS from station D because of the collision; it
cannot send its data to D. It remains exposed until A finishes
sending its data as in next Figure.
118. BLUETOOTH
• A Bluetooth LAN is an ad hoc network, which
means that the network is formed spontaneously;
the devices, sometimes called gadgets, find each
other and make a network called a piconet
• Bluetooth technology has several applications.
Peripheral devices such as a wireless mouse or
keyboard can communicate with the computer
through this technology.
119. • Monitoring devices can communicate with
sensor devices in a small health care center.
• Bluetooth technology is the implementation of
a protocol defined by the IEEE 802.15
standard.
• The standard defines a wireless personal-area
network (PAN) operable in an area the size of
a room or a hall.
120. ARCHITECTURE
• Bluetooth defines two types of networks: piconet
and scatternet.
• Piconets: A Bluetooth network is called a piconet,
or a small net. A piconet can have up to eight
stations, one of which is called the primary; the
rest are called secondaries.
• All the secondary stations synchronize their
clocks and hopping sequence with the primary.
Note that a piconet can have only one primary
station.
• The communication between the primary and the
secondary can be one-to-one or one-to-many.
Figure shows a piconet.
121. • Although a piconet can have a maximum of seven
secondaries, an additional eight secondaries can be in the
parked state. A secondary in a parked state is
synchronized with the primary, but cannot take part in
communication until it is moved from the parked state.
• Because only eight stations can be active in a piconet,
activating a station from the parked state means that an
active station must go to the parked state.
122. • Scatternet: Piconets can be combined to form
what is called a scatternet. A secondary station in
one piconet can be the primary in another piconet.
• This station can receive messages from the
primary in the first piconet (as a secondary) and,
acting as a primary, deliver them to secondaries in
the second piconet. A station can be a member of
two piconets. Figure illustrates a scatternet.
123. Bluetooth Devices
A Bluetooth device has a built-in short-range radio
transmitter. The current data rate is 1 Mbps with a 2.4-
GHz bandwidth.
125. • Radio Layer: The radio layer is roughly
equivalent to the physical layer of the Internet
model. Bluetooth devices are low-power and have
a range of 10 m.
– Band: Bluetooth uses a 2.4-GHz ISM (Industrial
Scientific and Medical) band divided into 79 channels
of 1 MHz each.
– FHSS: Bluetooth uses the frequency-hopping spread
spectrum (FHSS) method in the physical layer to avoid
interference from other devices or other networks.
– Bluetooth hops 1600 times per second, which means
that each device changes its modulation frequency
1600 times per second.
126. BASEBAND LAYER:
•The baseband layer is roughly equivalent to the
MAC sublayer in LANs. The access method is
TDMA.
•The primary and secondary communicate with
each other using time slots.
•This means that during the time that one
frequency is used, a sender sends a frame to a
secondary, or a secondary sends a frame to the
primary.
•Note that the communication is only between the
primary and a secondary; secondaries cannot
communicate directly with one another.
127. • TDMA: Bluetooth uses a form of TDMA that is
called TDD-TDMA (time division duplex TDMA).
• TDD-TDMA is a kind of half-duplex
communication in which the secondary and
receiver send and receive data, but not at the same
time (half duplex); however, the communication for
each direction uses different hops.
• This is similar to walkie-talkies using different
carrier frequencies.
128. Physical Links
• Two types of links can be created between a
primary and a secondary: SCO links and ACL
links.
• SCO: A synchronous connection-oriented (SCO)
link is used when avoiding latency (delay in data
delivery) is more important than integrity (error-
free delivery).
• In an SCO link, a physical link is created between
the primary and a secondary by reserving specific
slots at regular intervals.
129. Physical Links
• The basic unit of connection is two slots, one for
each direction.
• If a packet is damaged, it is never retransmitted.
SCO is used for real-time audio where avoiding
delay is all-important.
• A secondary can create up to three SCO links
with the primary, sending digitized audio (PCM)
at 64 kbps in each link.
• ACL :An asynchronous connectionless link
(ACL) is used when data integrity is more
important than avoiding latency.
130. • In this type of link, if a payload encapsulated in
the frame is corrupted, it is retransmitted.
• A secondary returns an ACL frame in the
available odd-numbered slot if and only if the
previous slot has been addressed to it.
• ACL can use one, three, or more slots and can
achieve a maximum data rate of 721 kbps.
131. L2CAP
• The Logical Link Control and Adaptation
Protocol, or L2CAP (L2 here means LL), is
roughly equivalent to the LLC sublayer in
LANs.
• It is used for data exchange on an ACL link
(If frame is corrupted, it is retransmitted. );
SCQ channels do not use L2CAP.
• The 16-bit length field defines the size of the
data, in bytes, coming from the upper layers.
132. • The L2CAP has specific duties:
– Multiplexing,
– segmentation and reassembly,
– quality of service (QoS),
– group management.
Multiplexing:
– The L2CAP can do multiplexing. At the sender site, it
accepts data from one of the upper-layer protocols,
frames them, and delivers them to the baseband layer.
– At the receiver site, it accepts a frame from the
baseband layer, extracts the data, and delivers them to
the appropriate protocol layer.
L2CAP
133. Segmentation and Reassembly:
– The L2CAP divides these large packets into
segments and adds extra information to define the
location of the segments in the original packet.
– The L2CAP segments the packet at the source and
reassembles them at the destination.
L2CAP
134. QoS:
– Bluetooth allows the stations to define a quality-
of-service level.
Group Management:
– This is similar to multicasting. For example, two
or three secondary devices can be part of a
multicast group to receive data from the primary.
L2CAP