Lecture 7 Networking Basics 2
Lecture 7 Networking Basics 2
Networking Basics-2
[Kurose2012]
Application
Presentation Application
Session Transport
Transport Network
Network Link
Link Physical
Physical
Five-layer
Seven-layer Internet Protocol
Open Systems Interconnection stack
(OSI) model
Protocols Layers and Their Service Models
• A layered architecture allows us to discuss a well-
defined, specific part of a large and complex system.
• Provides modularity, making it much easier to change
the implementation of the service provided by the layer.
• As long as the layer provides the same service to the
layer above it and uses the same services from the layer
below it, the remainder of the system remains
unchanged when a layer’s implementation is changed.
Internet protocol stack: Toy Example
• Sending a courier from company branch in Hyderabad
to company branch in New York
– Application Layer: Individuals giving parcels
– Transport Layer: office boy or admin assistant
– Network Layer: Speed post/ Blue Dart (representative)
– Link Layer: Different drivers (and vehicles)
– Physical Layer: Road/Air/Water
Encapsulation of data across layers
[Kurose2012]
Focus in this course
Application
Presentation Application
Session Transport
Transport Network
Network Link
Link Physical Application
MAC and PHY
Physical
Five-layer
Seven-layer Internet Protocol
Open Systems Interconnection stack
(OSI) model
Today’s Class
Internet protocol stack: Network Layer
Application
Transport
Network
Link
Physical
Five-layer
Internet Protocol
stack
Internet Protocol Stack: Network Layer
• Network Layer
– Each host and router has network and below layers
– Responsible for addressing, packaging, and routing functions
– Includes Internet protocol (IP): defines the fields in the datagram
as well as how the end systems and routers act on these fields
– Includes routing protocols such as IGMP, OSPF, BGP
– Includes other supplementary protocols such as internet
message control protocol (ICMP) and address resolution
protocol (ARP)
– Uses IPv4 and IPv6 addresses
Network Layer: Forwarding and Routing
Application
Transport
Network
Link
Physical
Five-layer
Internet Protocol
stack
Internet Protocol Stack: Link Layer
• Also called Data Link Layer
• Responsible for moving data packets from one node to
another across an individual link
• Implemented in network adapter or network interface
card (NIC)
• Provides medium access control (MAC) for multiple
nodes sharing a common medium
• Offer services like framing, reliable delivery, flow control,
error detection and correction,
• Each NIC has 48 bit unique LAN/MAC/physical address
• Examples of link-layer protocols include Ethernet, WiFi,
PPP
Link Layer: Various multiple access channels
Link Layer
• Different link layer protocols can be used over different
links along a route
– Trip from Hyderabad office to New York office
Link Layer: MAC and IP addresses
• MAC address is like social security number
• IP address is like house address
• Address resolution protocol to translate IP to MAC
address and vice-versa
Internet protocol stack: Physical Layer
Application
Transport
Network
Link
Physical
Five-layer
Internet Protocol
stack
Internet Protocol Stack: Physical Layer
• Defines the means of transmitting raw bits rather than
logical data packets over a physical link/medium
connecting two nodes on the same network
• Provides interface (such as electrical, optical, and
electromagnetic) to the transmission medium (such as
twisted-pair copper wire, optical, air)
• Signal processing of bits and physical signals:
Modulation, error correction and detection (Channel
Coding), Bit Interleaving, Synchronization, Carrier
sensing and collision detection, etc.
• Example: WLAN 802.11, LR-WPANs 802.15.4, Ethernet
802.3, Bluetooth 802.15.1
Questions?
Focus in this course
Application
Presentation Application
Session Transport
Transport Network
Network Link
Link Physical Application
MAC and PHY
Physical
Five-layer
Seven-layer Internet Protocol
Open Systems Interconnection stack
(OSI) model
Circuit Switched vs Packet Switched
https://www.apposite-tech.com/blog/packet-switching-vs-circuit-switching/
Statistical Multiplexing
• Number of users = 35
• Ten slots in TDM
• Probability of user being active = p = 0.1
• For this case, probability of outage is 0.0004
Statistical Multiplexing: An example
• Frame duration generally ranges from 1ms to 10ms
https://www.apposite-tech.com/blog/packet-switching-vs-circuit-switching/
Medium Access Control
(MAC) protocols
Medium Access Control (MAC)
• One of the two sublayers of data link layer
• Acts as an interface between the logical link control
(LLC) and the network’s physical layer
• Provides channel access control mechanisms across a
shared physical medium
X B
Link Layer: Various multiple access channels
Another Analogy: Roads
https://www.freepik.com/vectors/travel
Conversation Etiquettes
• Meeting
– Give everyone a chance to speak
– Don’t monopolize the conversation
• Class
– Don’t speak until you are spoken to
• General
– Don’t interrupt when someone is speaking
– Don’t fall asleep when someone is speaking
• What happens if somebody sleeps?
Desirable Properties of MAC protocols
A MAC protocol for a broadcast channel of rate R bps
should have following desirable properties
• When only one node has to send data, that node has
throughput of R bps
• When M nodes have to send data, each of the nodes
should have average rate of R/M bps
• The protocol is decentralized so that there is no master
node with single point of failure
• The protocol is simple so that it is inexpensive to
implement
Types of MAC protocols
• Channel Partitioning Protocols (or Fixed Assignment
Protocols)
– TDMA, FDMA, CDMA, SDMA
• Random Access Protocols
– Aloha, Slotted Aloha, CSMA/CA
• Taking Turn Protocols (or Demand Assignment
Protocols)
– Token Ring
– Polling
Channel Partitioning Protocols
Time Division Multiple Access (TDMA)
1 22 33 44 5 6
Time
• Advantages
– No Collision
– Fair usage
• Disadvantages
– Wastage of resources
– Delay
– Need Synchronization
Frequency Division Multiple Access (FDMA)
• FDMA divides the shared medium bandwidth into
individual channels
• Examples: Cable television system, FM stations
1 2 3 4 5
Frequency
• Advantages
– No Collision
– Fair usage
• Disadvantages
– Wastage of resources
– Need synchronization
Code Division Multiple Access (CDMA)
Source: http://www.electronicdesign.com/communications/fundamentals-
communications-access-technologies-fdma-tdma-cdma-ofdma-and-sdma
CDMA
• Use of higher rate
PN sequences
• Low auto and cross
correlation
CDMA
• Advantages
– No collisions
– Asynchronous CDMA possible
– Better efficiency than TDMA and FDMA
• Disadvantages
• Need extra processing
• Power control is needed
Space Division Multiple Access (SDMA)
• Space Division Multiple Access
– SDMA uses physical separation methods that permit the sharing
of wireless channels. For instance, a single channel may be
used simultaneously if the users are spaced far enough from
one another to avoid interference. Known as frequency reuse,
the method is widely used in cellular radio systems. Cell sites
are spaced from one another to minimize interference.
RSSI
Receiver Sensitivity
Coverage
Difference between different TDMA/FDMA/CDMA
Questions?