Ata Elahi, Alex Cushman - Computer Networks. Data Communications, Internet and Security. (2024)
Ata Elahi, Alex Cushman - Computer Networks. Data Communications, Internet and Security. (2024)
Alex Cushman
Computer
Networks
Data Communications, Internet and
Security
Computer Networks
Ata Elahi • Alex Cushman
Computer Networks
Data Communications, Internet and Security
Ata Elahi Alex Cushman
Southern Connecticut State University Southern Connecticut State University
New Haven, CT, USA New Haven, CT, USA
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2024
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Intended Audience
Organization
The materials of this book are presented using a practical approach, as opposed to
using theory only, and thus no special background is required to understand
the topics.
Chapter 1 – Introduction to Communications Networks: Network models,
Network topologies, Types of Networks, the OSI model, the TCP/IP Model,
Standard Organizations, and Communication Protocols
Chapter 2 – Data Communications: Analog Signals, Digital Signals, Binary
Numbers, ASCII code, Full-duplex, Half-duplex, Serial and Parallel Transmission,
Baseband Transmission, Broadband Transmission, Error Detection Methods (Parity
vii
viii Preface
Check, Block Check Character (BCC), One’s Complement of the Sum, and Cyclic
Redundancy Check (CRC))
Chapter 3 – Communications Channels and Media: UTP, Fiber Optic Cabling,
Wireless, Channel Bandwidth, Latency, Synchronous Optical Network (SONET),
SONET Signal Rates, SONET Frame Format
Chapter 4 – Multiplexer and Switching Concepts: Types of Multiplexers (TDM,
FDM, CDM, and WDM), Digitizing Voice, T1 Links, Circuit Switching, Packet
Switching, and Virtual Circuits
Chapter 5 – Error and Flow Control: The Data Link Layer, Frame Transmission
Methods, Flow Control (Stop and Wait ARQ, Continuous ARQ, and Sliding
Window), and IEEE 802 Standard Committee
Chapter 6 – Modulation Methods, Cable Modems, and FTTH: Modem Operation,
Modulation Methods (ASK, FSK, PSK, and QAM), Cable Modems, and Fiber to
The Home (FTTH)
Chapter 7 – Ethernet Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, 10
Gigabit Ethernet, and Ethernet Access Methods
Chapter 8 – LAN Interconnection Devices: Repeaters, Bridges, Switches,
Spanning Tree Protocol (STP), Layer 3 Switches, Virtual LAN (VLAN), VLAN
Operation, Routers, and Gateways
Chapter 9 – Internet Protocols Part I: The Internet Architecture Board (IAB),
TCP/IP Reference Model, TCP/IP Application Level, Transport Level Protocols
(UDP and TCP), Internet Level Protocols (IP), IPv4 Addressing, Classless IPV4
Addresses, ARP (Address Resolution Protocol), Internet Protocol version 6 (IPv6),
and IPV6 Address Format
Chapter 10 – Internet Protocols Part II and MPLS: Domain Name System
(DNS), Dynamic Host Configuration Protocol (DHCP), HTTP (Hypertext Transfer
Protocol), Internet Control Message Protocol (ICMP), Multi-protocol Label
Switching (MPLS), IP Multicast, Internet Group Management Protocol (IGMP),
and Socket Programming
Chapter 11 – Voice over Internet Protocol (Voice over IP): VoIP Operation, VoIP
Protocol, Session Initiation Protocol (SIP), SIP Components, Connection Operation,
and Bandwidth Calculation for VoIP
Chapter 12 – Wireless Local Area Network (WLAN): WLAN Topologies, Wireless
LAN Technology, WLAN Standards (IEEE 802.11 Families), Wireless LAN
Physical Layers, IEEE 802.11g/n/ax, WLAN Medium Access, and MAC
Frame Format
Chapter 13 – Low Power Wireless Technologies for Internet of Things (IoT):
ZigBee Operation and Components, ZigBee Topologies, ZigBee Application
Profiles, ZigBee Protocol Architecture, Physical Layer, IEEE 802.15.4 MAC Layer
ZigBee Security Modes, 6LoWPAN Architecture, LoRa Wide Area Network
Technology (LoRa WAN), LoRaWAN Components, and LoRaWAN Security
Chapter 14 – Introduction to Cryptography: Elements of Network Security,
Introduction to Cryptograph, RC4 Algorithm, Data Encryption Standard, Advanced
Encryption Standard (AES) RSA Algorithm, Diffie-Hellman Key Exchange
Preface ix
We would like to express our special thanks to Professor Lancor, Chairman of the
Computer Science Department at Southern Connecticut State University for her
support, and to Mr. Nicholas Brenckle for developing a program to find the points
and the sum of points on an elliptic curve.
We wish to acknowledge and thank Ms. Mary E. James, Senior Editor in Applied
Sciences, Professor Podnar, Mr. Omar Abid, and Vika Konovalenko for helping
develop the manuscript for this text. Finally, we would like to thank the students of
CSC 265 – Computer Networking and Security I and CSC 565 – Computer Networks
for testing the initial versions of this textbook.
xi
Contents
1
Introduction to Communications Networks������������������������������������������ 1
1.1 Introduction�������������������������������������������������������������������������������������� 1
1.2 Computer Networks�������������������������������������������������������������������������� 2
1.3 Network Models�������������������������������������������������������������������������������� 3
1.4 Network Components ���������������������������������������������������������������������� 4
1.5 Network Topology���������������������������������������������������������������������������� 5
1.6 Types of Networks���������������������������������������������������������������������������� 10
1.7 Communication Protocols and Standard Organizations ������������������ 12
1.7.1 Standard Organizations�������������������������������������������������������� 13
1.8 Networking Protocol Models������������������������������������������������������������ 14
Summary���������������������������������������������������������������������������������������������������� 16
Review Questions�������������������������������������������������������������������������������������� 17
2 Data Communications ���������������������������������������������������������������������������� 23
2.1 Introduction�������������������������������������������������������������������������������������� 23
2.2 Analog Signals���������������������������������������������������������������������������������� 24
2.3 Digital Signals���������������������������������������������������������������������������������� 26
2.4 Binary Numbers�������������������������������������������������������������������������������� 27
2.5 Coding Schemes�������������������������������������������������������������������������������� 29
2.6 Transmission Modes ������������������������������������������������������������������������ 31
2.7 Transmission Methods���������������������������������������������������������������������� 32
2.8 Communication Modes�������������������������������������������������������������������� 33
2.9 Signal Transmission�������������������������������������������������������������������������� 34
2.10 Digital Signal Encoding�������������������������������������������������������������������� 35
2.11 Error Detection Methods������������������������������������������������������������������ 37
Summary���������������������������������������������������������������������������������������������������� 43
Review Questions�������������������������������������������������������������������������������������� 45
3
Communications Channels and Media�������������������������������������������������� 49
3.1 Introduction�������������������������������������������������������������������������������������� 49
3.2 Conductive Media ���������������������������������������������������������������������������� 50
3.3 Fiber-Optic Cable������������������������������������������������������������������������������ 52
xiii
xiv Contents
Index������������������������������������������������������������������������������������������������������������������ 413
About the Authors
xix
Chapter 1
Introduction to Communications Networks
Objectives
After completing this chapter, you should be able to:
• Explain the components of a Data Communication System.
• Explain the advantages of computer networks.
• Describe the components of a network.
• Discuss the function of a client/server model.
• Explain various networking topologies.
• Describe different types of networks in terms of their advantages and
disadvantages.
1.1 Introduction
Transmission Link
Transmitter Receiver
Source Destination
Receiver The receiver accepts information from the transmission link. The infor-
mation is then converted to proper form so that it is acceptable to the destination.
Destination The receiver passes information to the destination for processing.
In networking technology, both the receiver and transmitter come in one unit and
are usually installed inside the computer, such as network cards or modems.
1.2 Computer Networks
Networking is a business tool for companies. For example, a bank can transfer funds
between branches by using a network, people can access their bank accounts using
automatic teller machines via a network, and travel agencies use networks to make
airline reservations. Everyday online activities such as shopping and banking trans-
actions are also possible because of computer networks. Students can now access
the Internet in any location on their campus from their laptop computers or smart-
phone, thanks to the rapid growth of networking technology.
Networking is a generic term. Several computers connected to each other are
called a computer network. A network is a system of computers and related equip-
ment connected by communication links to share data. The related equipment may
be printers, fax machines, modems, copiers, and so forth. The following are some of
the benefits of using computer networks:
Resource Sharing: Computers in a network can share resources such as data, print-
ers, disk drives, and scanners.
Reliability: Since computers in a network can share data, if one of the computers on
the network crashes, a copy of its resources might be found on other computers
in the network.
Cost: Microcomputers are much less expensive than mainframes. Instead of using
several mainframes, a network can use one mainframe as a server, with several
microcomputers connected to the server as clients. This creates a client/server
relationship.
Communication: Users can exchange messages via electronic mail or other messag-
ing systems, or they can transfer files.
1.3 Network Models 3
1.3 Network Models
Client
Sever
Fig. 1.3 Network with one server and three clients
Server Clients
1.4 Network Components
1.5 Network Topology
The topology of a network describes the way computers are connected. Topology is
a major design consideration for cost and reliability. The following is a list of com-
mon topologies found in computer networking.
• Star
• Ring
• Bus
• Mesh
• Tree
• Hybrid
Star Topology
In a star topology, all stations are connected to a central controller or hub as shown
in Fig. 1.5. For any station to communicate with another station, the source must
send information to the hub, then the hub must transmit that information to the des-
tination station. If station #1 wants to send information to station #3, it must send
information to the hub and the hub must pass the information to station #3.
The disadvantage of the star topology is that the operation of the entire network
depends on the hub. If the hub breaks down, the entire network is disabled. The
advantages of star topology are as follows:
HUB
Station 4 Station 3
6 1 Introduction to Communications Networks
Bus Topology
A bus network is a multi-point connection in which stations are connected to a
single cable called a bus. In the bus topology, all stations share one media as depicted
in Fig. 1.7. The bus topology is one of the most popular topologies used in LAN
networking and Ethernet is one of the most popular LANs that uses bus topology.
The advantages of bus topology are simplicity, low cost, and easy expansion of
the network. The disadvantage of bus topology is that a breakdown in the bus cable
brings the entire network down.
Mesh Topology
Mesh topology can be a full mesh topology (fully connected topology) or partial
mesh topology. In a full mesh topology, each station is directly connected to every
other station in the network, as shown in Fig. 1.8.
The advantage of a fully connected topology is that each station has a dedicated
connection to every other station. Therefore, this topology offers the highest reli-
ability and security. If one link in the mesh topology breaks, the network
remains active.
A major disadvantage of a fully connected topology is that it uses many connec-
tions and therefore requires a great deal of wiring, especially when the number of
stations increases. Consider, for example, a fully connected network with 100 work-
stations. Workstation #1 would require 99 network connections to connect it to
workstations 2 through 100. The total number of connections is determined by
N(N-1)/2, where N is the number of stations in the network. This type of topology
is seldom used because it is not cost-effective.
In partial mesh topology, some stations are connected to many other stations,
but others are connected only to those stations with which they exchange the most
data. Figure 1.9 shows partial mesh topology.
Tree Topology
The tree topology uses an active hub or repeater to connect stations together. The
hub is one of the most important elements of a network because it links stations in
the network together. The function of the hub is to accept information from one sta-
tion and repeat the information to other stations or hubs, as shown in Fig. 1.10.
The advantage of this topology is that when one hub breaks, only stations con-
nected to the broken hub will be affected. There are several types of hubs as
listed below.
(( )) (( )) (( ))
Internet Service
Provider (( )) (( ))
(( )) (( ))
(( ))
(( ))
(( )) (( ))
(( ))
( ( ))
(( )) (( ))
HUB
Bridge
Backbone
Bridge Bridge
HUB
Ring
HUB
Manageable Hub: Intelligent hubs are defined as manageable hubs, which means
each of the ports on the hub can be enabled or disabled by the network adminis-
trator through software.
Stand-Alone Hub: A stand-alone hub is a type of hub used for workgroups of com-
puters that are separate from the rest of the network. They cannot be linked
together logically to represent a larger hub.
Modular Hub: A modular hub comes with a chassis or card cage and the number of
ports can be extended by adding extra cards.
Stackable Hub: A stackable hub looks like a stand-alone hub, but several of them
can be stacked or connected together in order to increase the number of ports.
Hybrid Topology
Hybrid topology is a combination of different topologies connected together by a
backbone cable as shown in Fig. 1.11. Each network is connected to the backbone
cable by a device called a bridge.
10 1 Introduction to Communications Networks
1.6 Types of Networks
The distance between computers that are connected as a network determines the
type of network, such as a Local Area Network (LAN), Metropolitan Area Network
(MAN), and Wide Area Network (WAN).
Local Area Network (LAN)
A Local Area Network (LAN) is a high-speed network designed to link computers
and other data communication systems together within a small geographic area such
as an office, department, or a single floor of a multi-story building. Several LANs
can be connected together in a building or campus to extend the connectivity. A
LAN is considered a private network. The most popular LANs in use today are
Ethernet, Token Ring, and Gigabit Ethernet.
Metropolitan Area Network (MAN)
Metropolitan Area Networks (MAN) can cover approximately 30 to 100 miles,
connecting multiple networks which are in different locations of a city or town. The
communication links in a MAN are generally owned by a network service provider.
Figure 1.12 shows a Metropolitan Area Network.
Wide Area Networks (WANs)
A Wide Area Network (WAN) is used for long-distance transmission of informa-
tion. WANs cover a large geographical area, such as an entire country or continent.
WANs may use leased lines from telephone companies, Public Switch Data
Networks (PSDN), or satellites for communication links.
The Internet is a collection of globally scattered networks which are connected
through gateways, as shown in Fig. 1.13. Each gateway has a routing table contain-
ing information about the networks to which it is connected as one or more net-
works may be connected to a single gateway. A gateway is designed to accept
information from a source network and check its routing table to determine if the
Metropolitan
G G
G
Internet
G
G
G: Gateway
1.7.1 Standard Organizations
There are several organizations that are constantly working toward developing stan-
dards for computers and communication equipment. The development of standards
for computers enables hardware and software products made by different vendors to
be compatible. Standardization allows products from different manufacturers to
work together in creating customized systems. Without standards, only hardware
and software made by the same manufacturer can work properly together. The fol-
lowing is a list of standards organizations:
IEEE The Institute for Electrical and Electronics Engineers (IEEE) is the largest
technical organization in the world. The objective of IEEE is to advance the field of
electronics, computer science, and computer engineering. The IEEE also develops
standards for computers, electronics, and local area networks (in particular, the
IEEE 802 standards).
ITU The International Telecommunication Union (ITU) was founded in 1864 and
became a United Nations Agency with the purpose of defining standards for tele-
communications, Wide Area Networks (WAN), Asynchronous Transfer Mode
(ATM), and Integrated Services Digital Networks (ISDN).
EIA The Electrical Industry Association (EIA) is a trade association representing
high technology manufacturers in the United States. The EIA develops standards for
connectors and transmission media. Some of the well-known EIA standards are
RS-232 and RJ-45.
ANSI The American National Standards Institute was founded in 1918. ANSI is
composed of 1300 members representing computer companies, with the purpose of
developing standards for the computer industry. ANSI is the US representative in
the International Organization for Standardization (ISO). Some of the well-known
ANSI standards include optical cabling, programming languages (ANSI C), and the
Fiber Distributed Data Interface (FDDI).
ISO The International Organization for Standardization (ISO) is an international
organization that comprises national standards bodies of seventy-five countries. The
ISO develops standards for a wide range of products, including the model for net-
works called the Open System Interconnection (OSI) model.
IETF The Internet Engineering Task Force (IETF) develops standards for the
Internet, such as Internet Protocol version 6 (IPv6), HTTP, and DNS. The IETF is
composed of international network designers, network industries, and researchers.
World Wide Web Consortium (W3C) The World Wide Web Consortium develops
standards for web technologies, such as HTML.
14 1 Introduction to Communications Networks
Two common protocol models, or suites, in use today are the 5-layer TCP/IP
(Transmission Control Protocol/Internet Protocol) model and the 7-layer OSI
(Open Systems Interconnections) model.
TCP/IP Protocol Suite The TCP/IP Protocol suite consists of the following five
layers as shown in Fig. 1.15.
Layer 1: Physical Layer
The Physical layer defines the type of signal and type of connectors (such as
RS-232 or RJ-45) to be used for the Network Interface Card (NIC). It defines cable
types (such as coaxial cable, twisted pair or fiber-optic cable) to be used for the
transmission media. It accepts incoming signals from the media and converts those
signals bits and converts outgoing data bits to signals for the transmission over media.
Layer 2: Data Link Layer
The Data Link layer defines the frame format, such as the start of a frame, end of
a frame, size of a frame, and type of transmission. The Data Link layer performs the
following functions:
1. On the transmitting side: The Data Link layer accepts information from the
Network layer and breaks the information into frames. It then adds the destina-
tion MAC address, source MAC address, and Frame Check Sequence (FCS)
field, then passes each frame to the Physical layer for transmission.
2. On the receiving side: The Data Link layer accepts the bits from the Physical
layer and forms them into a frame, performing error detection. If the frame is
free of errors, the Data Link layer passes the frame up to the Network layer.
3. Frame synchronization: This layer identifies the beginning and end of each frame.
4. Flow control: Distinguishes between control frames and information frames.
5. Link management: It coordinates transmission between the transmitter and the
receiver.
6. Determine contention method: It defines an access method in which two or more
network devices compete for permission to transmit information across the same
communication media, such as in token passing and Carrier Sense Multiple
Access with Collision Detection (CSMA/CD).
Layer 3: Network Layer
The function of the Network layer is to perform routing. Routing determines the
route, or pathway, for moving information in a network with multiple LANs. The
Network layer checks the logical address of each frame and forwards the frame to
the next router based on a routing table. The Network layer is responsible for trans-
lating each logical address (name address) to a physical address (MAC address). An
example of a Network layer protocol is Internet Protocol (IP).
The Network layer provides two types of services: connectionless and connec-
tion- oriented services. In connection-oriented services, the Network layer makes a
connection between a source and a destination, then starts transmission. In a con-
nectionless service, there is no connection between source and destination. The
source transmits information regardless of whether the destination is ready or not. A
common example of this is e-mail.
Layer 4: Transport Layer
The Transport layer provides the reliable transmission of data in order to ensure
that each frame reaches its destination. If, after a certain period of time, the Transport
layer does not receive an acknowledgment from the destination, it retransmits the
frame and again waits for acknowledgment from the destination. An example of a
Transport layer protocol is Transmission Control Protocol (TCP).
Layer 5: Application Layer
The Application layer enables users to access the network with applications such as
E-mail, FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol),
and Telnet.
OSI Model The OSI model is like the TCP/IP model, but with two additional lay-
ers between the Application and Transport layers, as shown in Fig. 1.16.
Layer 5: Session Layer
The Session layer establishes a logical connection between the applications of two
computers that are communicating with each other. It allows two applications on
two different computers to establish and terminate a session. When a workstation
connects to a server, the server performs the login process, requesting a username
and password. This is an example of establishing a session.
Layer 6: Presentation Layer
The Presentation layer receives information from the Application layer and con-
verts it to a form acceptable by the destination. The Presentation layer converts
information to ASCII, or Unicode, or encrypts or decrypts the information.
Layer 7: Application Layer
The Application layer enables users to access the network with applications such as
E-mail, FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol),
and Telnet.
Layer 7 Application
Application
Layer 6 Layer 5
Presentation
Layer 5
Session
Layer 4 Layer 4
Transport Transport
Layer 3 Layer 3
Network Network
Layer 2 Layer 2
Data link Data link
Layer 1 Layer 1
Physical Physical
Comparing Models Essentially, the first four layers of the OSI and TCP/IP mod-
els serve the same purpose. However, the Application layer of the TCP/IP model
performs all the duties of top three layers of the OSI model as seen in Fig. 1.17.
Summary
• The function of the Session layer is to establish a session between a source appli-
cation and destination application and to disconnect a session between two
applications.
• The function of the Transport layer is to ensure that data gets to the destination,
to perform error control and flow control, and to assure quality of service.
• The function of the Network layer is to deliver information from a source to its
destination by routing that information.
• The function of the Data Link layer is framing, error detection, and retransmission.
• The functions of the physical layer are establishing the electrical interface for
transmission and the type of the signal, and the conversion of logical bits to elec-
tronic signals and vice versa.
Key Terms
Review Questions
24. Which layer of the OSI model is responsible for forming a frame?
(a) Data link
(b) Transport
(c) Session
(d) Physical
25. Which layer of the OSI model performs encryption? ________
(a) Session layer
(b) Presentation layer
(c) Data Link layer
(d) Transport layer
26. The function of the network layer is________.
(a) Error detection
(b) Routing
(c) To set up a session
(d) Encryption
27. Which layer of the OSI model converts electrical signals to bits?
(a) Physical
(b) Data link
(c) Network
(d) Application
28. Which layer determines the route for packets transmitted from source to desti-
nation? ______.
(a) Data Link
(b) Network
(c) Transport
(d) Physical
Objectives
After completing this chapter, you should be able to:
• Distinguish between analog and digital signals.
• Distinguish between periodic and non-periodic signals.
• Convert decimal numbers to binary and hexadecimal and vice versa.
• Represent characters and decimal numbers in the 7-bit ASCII code.
• Compare serial, parallel, asynchronous, and synchronous transmission.
• List the communication modes.
• Explain the different types of digital encoding methods.
• Calculate a Block Check Character (BCC).
• Calculate a Frame Check Sequence (FCS).
• Learn different error detection methods.
2.1 Introduction
2.2 Analog Signals
Periodic Signal A signal that repeats a pattern within a measurable time period is
called a periodic signal, and the completion of a full pattern is called a cycle. The
simplest periodic signal is a sine wave, which is shown in Fig. 2.2. In the time
domain, a sine wave’s amplitude a(t) can be represented mathematically as
a(t) = A Sin(ω t + θ), where A is the maximum amplitude, ω is the angular fre-
quency, and θ is the phase angle.
A periodic signal can also be represented in the frequency domain, where the
horizontal axis is the frequency and the vertical axis is the amplitude of signal.
Figure 2.3 shows the frequency domain representation of a sine wave signal.
Usually an electrical signal representing voice, temperature or a musical sound,
is made of multiple waveforms. These signals have one fundamental frequency and
multiple frequencies that are called harmonics.
Characteristics of an Analog Signal
The characteristics of a periodic analog signal are frequency, amplitude, and phase.
1
Frequency Frequency (F) is the number of cycles in one second, F = , and is
T
represented in Hz (Hertz). If each cycle of an analog signal is repeated every one
second, the frequency of the signal is one Hz. If each cycle of an analog signal is
repeated 1000 times every second (once every millisecond), the frequency is:
1 1
f 3 1000 Hz 1kHz
T 10
Voltage
0
Time
Time
ω ω
Table 2.1 shows different values for frequency and their corresponding periods.
Amplitude The amplitude of an analog signal is a function of time (as shown in
Fig. 2.4) and may be represented in volts (unit of voltage). In other words, the
amplitude is a signal’s voltage value at any given time. At the time of t1, the ampli-
tude of signal is V1.
Phase Two signals with the same frequency can differ in phase. This means that
one of the signals starts at a different time from the other one. This difference can
be measured in degrees, from 0 to 360 degrees, or in radians, where 360o = 2π radi-
ans. A sine wave signal can be represented by the equation a(t) = A Sin(ω t + θ),
where A is the peak amplitude, ω (omega) is the frequency in radians per second, t
is the time in seconds, and θ is the phase angle. Cyclic frequency fcan be expressed
in terms of ω according to f . A phase angle of zero means that the sine wave
2
starts at time t = 0 and a phase angle of 90 degrees means that the signal starts at 90
degrees as shown in Fig. 2.5.
Example 2.1 Find the equation for a sine wave signal with frequency of 10 Hz,
maximum amplitude of 20 volts, and phase angle of zero.
26 2 Data Communications
a(t)
V1=+A
T/2 3T/4 T
t
t1= T/4
-A
rad
2 f 2 3.1416 10 62.83
sec
a t 20 sin 62.83t
2.3 Digital Signals
Modern computers communicate by using digital signals. Digital signals are repre-
sented by two voltages: one voltage represents the number 0 in binary, and the other
voltage represents the number 1 in binary. An example of a digital signal is shown
in Fig. 2.6, where 0 volts represents 0 in binary and + 5 volts represents 1.
2.4 Binary Numbers 27
90°
270°
+5
1 0 0 1 1 1 0 1
0 time
Fig. 2.6 Digital signal
2.4 Binary Numbers
Example 2.3 Convert (3D5)16 to binary. By using Table 2.2, the result in binary is
3 D 5
0011 1101 0101
6 D B
0110 1101 1011
a 5 a 4 a 3 a 2 a1 a 0 .a 1 a 2a
3 2 (2.1)
a 5 a 4 a 3 a 2 a1 a 0 a 1 a a a0 20 a1 21 a 2 22 a3 23
Interger Fraction 2
a 2 1
a 2 . ..
1
110111.101 2 1 2 0 1 21 1 2 2 0 23 1 2 4 1 2 5 1 2 1
02 12 55.625
2.5 Coding Schemes
Since computers can only understand binary numbers (0 or 1), all information (such
as numbers, letters, and symbols) must be represented as binary data. One com-
monly used code to represent printable and non-printable characters is the American
Standard Code for Information Interchange (ASCII).
ASCII Code
Each character in ASCII code is represented by 8 bits where the most significant bit
is used for a parity bit. Table 2.3 shows the ASCII code and its hexadecimal equiva-
lent. Characters from hexadecimal 00 to 1F and 7F are control characters which are
nonprintable characters, such as NUL, SOH, STX, ETX, ESC, and DLE (data link
escape).
Example 2.6 Convert the word “Network” to binary and show the result in hexa-
decimal. By using Table 2.3, each character is represented by seven bits and results in
or in hexadecimal
4E 65 74 77 6F 72 6B
Binary Hex Char Binary Hex Char Binary Hex Char Binary Hex Char
ASCII code uses eight bits to represent each character in Latin, and it can represent
256 characters. The ASCII code does not support mathematical symbols and scien-
tific symbols. Unicode uses 16 bits, which can represent 65,536 characters or sym-
bols. A character in Unicode is represented by a 16-bit binary, equivalent to four
digits in hexadecimal. For example, the character B in Unicode is U0042H (U rep-
resents Unicode). The ASCII code is represented between (00)16 and (FF)16. For
converting ASCII code to Unicode, two zeros are added to the left side of ASCII
code; therefore, the Unicode to represent ASCII characters is between (0000)16 and
(00FF)16. Table 2.4 shows some of the Unicode for Latin and Greek characters.
Unicode is divided into blocks of code, with each block assigned to a specific lan-
guage. Table 2.5 shows each block of Unicode for some different languages.
2.6 Transmission Modes 31
Table 2.4 Unicode values for some Latin and Greek characters
Latin Greek
Character Code (Hex) Character Code (Hex)
A U0041 φ U03C6
B U0042 α U03B1
C U0043 γ U03B3
0 U0030 μ U03BC
8 U0038 β U03B2
Table 2.5 Unicode block Start code (Hex) End code (Hex) Block name
allocations U0000 U007F Basic Latin
U0080 U00FF Latin supplement
U0370 U03FF Greek
U0530 U058F Armenian
U0590 U05FF Hebrew
U0600 U06FF Arabic
U01A0 U10FF Georgian
2.6 Transmission Modes
When data is transferred from one computer to another by digital signals, the receiv-
ing computer has to distinguish the size of each signal to determine when a signal
ends and when the next one begins. For example, when a computer sends a signal as
shown in Fig. 2.7, the receiving computer has to recognize how many ones and
zeros are in the signal. Synchronization methods between source and destination
devices are generally grouped into two categories: asynchronous and synchronous.
Asynchronous Transmission
Asynchronous transmission occurs character by character and is used for serial
communication, such as by a modem or serial printer. In asynchronous transmis-
sion, each data character has a start bit which identifies the start of the character, and
one or two bits which identifies the end of the character, as shown in Fig. 2.8. The
data character is 7 bits. Following the data bits may be a parity bit, which is used by
the receiver for error detection. After the parity bit is sent, the signal must return to
high for at least one bit to identify the end of the character. The new start bit serves
as an indicator to the receiving device that a data character is coming and allows the
receiving side to synchronize its clock. Since the receiver and transmitter clocks are
not synchronized continuously, the transmitter uses the start bit to reset the receiver
clock so that it matches the transmitter clock. Also, the receiver is already pro-
grammed for the number of bits in each character sent by the transmitter.
Synchronous Transmission
Some applications require transferring large blocks of data, such as a file from disk
or transferring information from a computer to a printer. Synchronous
32 2 Data Communications
2.7 Transmission Methods
There are two types of transmission methods used for sending digital signals from
one station to another across a communication channel: serial transmission and par-
allel transmission.
2.8 Communication Modes 33
1 0 1 0 1 1 0 1
Ground Line
Fig. 2.10 Serial transmission
Serial Transmission
In serial transmission, information is transmitted one bit at a time over one wire as
shown in Fig. 2.10.
Parallel Transmission
In parallel transmission, multiple bits are sent simultaneously, one byte or more at
a time, instead of bit by bit as in serial transmission. Figure 2.11 shows how com-
puter A sends eight bits of information to computer B at the same time by using
eight different wires. Parallel transmission is faster than serial transmission, at the
same clock speed.
2.8 Communication Modes
A communication mode specifies the capability of a device to send and receive data
by determining the direction of the signal between two connections. There are three
types of communication modes: simplex, half-duplex, and full-duplex.
Simplex Mode
In simplex mode, the transmission of data goes in one direction only, as shown in
Fig. 2.12. A common analogy is a commercial radio or TV broadcast where the
sending device never requires a response from the receiving device.
34 2 Data Communications
Half-Duplex Mode
In half-duplex mode, two devices exchange information as shown in Fig. 2.13;
however, information can be transmitted across the channel one direction at a time.
A common example is Citizen Band radio (CB) or ham radio where a user can either
talk or listen, but both parties cannot talk at the same time.
Full-Duplex Mode
In full-duplex mode, both computers can send and receive information simultane-
ously, as shown in Fig. 2.14. An example of full-duplex is our modern telephone
system, in which both users may talk and listen at the same, with their voices carried
two ways simultaneously over the phone lines.
2.9 Signal Transmission
There are two methods used to transfer information over media: baseband and
broadband transmission.
Baseband Transmission Mode
When the entire bandwidth of a cable is used to carry only one signal, the cable
operates in baseband mode. Many digital signals use baseband transmission.
2.10 Digital Signal Encoding 35
Digital signal encoding is used to represent binary values in the form of digital sig-
nals. The receiver of the digital signal must know the timing of each signal, such as
the start and end of each bit. Following are some methods used to represent digital
signals:
• Unipolar encoding
• Polar encoding
• Bipolar encoding
• Non-return to zero (NRZ)
• Non-return to zero inverted (NRZ-I)
• Manchester and differential Manchester encoding
Manchester and differential Manchester, and non-return to zero inverted (NRZ-I)
encoding schemes are used in LANs and non-return to zero is used in WANs. Each
encoding technique is described below.
Unipolar Encoding
In unipolar encoding, only positive voltage or negative voltage are used to repre-
sent binary 0 and 1. For example, + 5 volts represents binary 1 and zero volts repre-
sents 0, as shown in Fig. 2.15.
Polar Encoding
In polar encoding, positive and negative voltages are used to represent binary one
and zero, respectively. For example, +5 volts represents binary one and −5 volts
represent binary zero, as shown in Fig. 2.16.
Bipolar Encoding
In bipolar encoding, signal voltage varies in three levels: positive, zero, and nega-
tive voltage. One of the most popular bipolar encoding methods is Alternate Mark
+5
1 0 1 1
0 Time
36 2 Data Communications
5
1 0 1 1 0
0
-5
Voltage
5
1 0 1 1 0 0 1
0
Time
-5
Inversion (AMI). In AMI encoding, binary 0 is represented by zero volts and binary
1 is represented by alternating swings between positive and negative voltages, as
shown in Fig. 2.17.
Non-return to Zero Encoding (NRZ)
NRZ is a simple format of polar encoding, which uses two voltage levels for repre-
senting 1 and 0, with binary 0 represented by a positive voltage and binary 1 repre-
sented by a negative voltage, as shown in Fig. 2.18.
Non-return to Zero Inverted Encoding (NRZ-I)
In NRZ-I, there is a transition at the start of logic 1 (low to high or high to low) and
no transition at start of 0, as shown in Fig. 2.19.
Manchester and Differential Manchester Encoding
In Manchester and differential Manchester encoding, the clock pulse is embed-
ded into the signal. Therefore, the receiver does not require any additional signal to
represent the clock pulse. This self-clocking feature and low error rates have made
Manchester and differential Manchester encoding the most popular line coding
methods for wired LANs and WANs. According to the IEEE standards, Manchester
encoding is used in Ethernet (IEEE 802.3) networks and differential Manchester
encoding is used in Token Ring (IEEE 802.5) networks.
2.11 Error Detection Methods 37
0 1 1 0 0 1 1 0
Time
0 1 1 0 0 1 1 0 NRZI
Time
Table 2.6 Conversion methods of digital signal to Manchester and differential Manchester
Digital
signal Manchester encoding Differential Manchester
Logic 1 Transition from high to low at the Transition only in the middle of the signal
middle of the signal
Logic 0 Transition from low to high at the Transition at the start of zero and at the
middle of signal middle of zero (original signal)
Table 2.6 describes how to convert digital signals to Manchester encoding and
differential Manchester encoding, and Fig. 2.20 shows the Manchester and differen-
tial Manchester encoding of a digital signal.
When the transmitter sends a frame to the receiver, the frame can become corrupted
due to external and internal noise. The receiver must first check the integrity of the
frame. Some possible sources of error are as follows:
Impulse Noise: A non-continuous pulse for a short duration is called impulse noise.
It may be caused by a lightning discharge or a spike generated by a power switch
being turned off and on.
Crosstalk: This type of noise can be generated when a transmission line carrying a
strong signal is coupled with a transmission line carrying a weak signal. The
transmission line with the strong signal will produce noise (crosstalk) on the
transmission line with the weak signal.
38 2 Data Communications
Voltage
Clock
Time
Original 1 0 1 1 0 0 0 1 1 0
Signal Time
M anchester
Encoding
Time
Differential
M anchester
Encoding Time
Attenuation: When a signal travels on a transmission line, the strength of the signal
is reduced over distance. This reduction is called attenuation. A weak signal is
more affected by noise than a strong signal.
White Noise or Thermal Noise: This type of noise exists in all electrical devices and
is generated by moving electrons in the conductor.
The following methods can be used to detect an error or errors:
• Parity Check
• Block Check Character (BCC)
• One’s Complement of the Sum
• Cyclic Redundancy Check (CRC)
Parity Check
The simplest error detection method is the parity check. The parity check method
can detect one error and is used in both the asynchronous transmission method and
the character-oriented synchronous transmission method. A parity bit is an extra bit
that the transmitter adds to the information before transmitting to the receiver. The
value of parity bit selected by the transmitter determines whether the data is given
an even number of ones (even parity) or an odd number of ones (odd parity). For
example, if a transmitter uses even parity to transmit the ASCII character 1000011
(upper case e), the transmitter adds parity bit 1 to the character so that the number
of ones in the character becomes even: 11000011. The transmitter would then trans-
mit 11000011 to the receiver. The receiver checks number of the ones in the charac-
ter. If the number of the ones is even, there is no error detected in the character.
Otherwise, the character contains an error. Parity error detection is used in serial
communications. Figure 2.21 shows the logic diagram for a parity bit generator
using Exclusive-OR gates.
2.11 Error Detection Methods 39
B6 B5 B4 B3 B2 B1 B0
+
+
+
Exclusive OR
+
1 1 0,1 0 1, and 0 0 0.
=
Message =
M 111010, K 6 bits
At the receiver side, the receiver divides T by P, and if the result has a remainder
of zero, there is no error in the frame. Otherwise, the message contains an error.
Since the above division takes time, special hardware is designed to generate FCS.
CRC Polynomial and Architecture
A binary number is represented by b5b4 b3b2 b1b0, where bi represents each bit that
can be represented by a polynomial:
b 5 X 5 + b 4 X 4 + b3 X 3 + b 2 X 2 + b1 X + b 0
The CRC method uses a special integrated circuit (IC) to generate the FCS. The
design of this IC is based on the CRC polynomial. In general, a CRC polynomial
can be represented by:
P X X n . a 4 X 4 a 3 X 3 a 2 X 2 a1 X 1
Figure 2.24 shows the general architecture of a CRC integrated circuit (IC). Ci is
a one-bit shift register and the output of each register is connected to the input of an
Exclusive-OR gate; ai is the coefficient of a CRC polynomial. In Fig. 2.24, if ai
equals zero, then there is no connection between the feedback line and the XOR
42 2 Data Communications
Clock
Message
C n-1 + + + + +
C3 C2 C1 C0
an-1 a3 a2 a1
Message
C4 + C3 C2 + C1 C0 +
a4 a2
gate. In order to find the FCS, the initial value for Ci is set to zero, and the message
2n∗M is shifted k + n times through the CRC circuit. The final content of Cn‐1, ….
C4 C3, C2, C1, C0 is the Frame Check Sequence (FCS).
Example 2.9
Show CRC circuit for polynomial:
P X X 5 X 4 X 2 1
In the above polynomial the value for a1, a3 are zero and Fig. 2.25 shows the
CRC circuit for above polynomial.
Example 2.10 Find FCS.
Message M = 111010
Assume P = 1101
P X X3 X2 1
Input 111010000
C2 + C1 C0 +
Table 2.8 shows the contents of each register after shifting one bit at the time.
After shifting 9 (k + n) times, the contents of the registers is the FCS.
Summary
• Information transfer between two computers occurs in one of two types of sig-
nals: digital or analog.
• Modern computers work with digital signals.
• A digital signal is represented by two voltages.
• Binary numbering is the representation of a number in Base-2.
• One digit in binary is called a bit, and eight bits are equal to one byte. More than
one byte is called a word.
• Information is represented and processed inside the computer in binary or
Base-2 form.
• Binary Coded Decimal (BCD) is used for representing decimal numbers
from 0 to 9.
• ASCII code is used to represent character information inside the computer;
ASCII code is made of 7 bits.
• There are two methods used for transmission of data: synchronous and asynchro-
nous transmission.
44 2 Data Communications
Key Terms
Review Questions
(d) 011111
15. A range of frequencies carried by a medium is called.
(a) Broadband signal
(b) Baseband signal
(c) Analog signal
(d) A digital signal
16. Asynchronous communication uses:
(a) Stop and start bits to indicate start of the character and end of the character
(b) Start bit is used to synchronize transmission
(c) Start and stop bits used for clocking
(d) None of the above
17. What is the efficiency of serial connection using asynchronous transmission
with 1 start bit, 2 stop bits, and 7 data bits?
(a) 70%
(b) 75%
(c) 80%
(d) 65%
1110001110012 _________ 16
11. Convert the following binary numbers to decimal.
111111112 __________ 10
101100012 __________ 10
FDE6 16 _________ 2
48 2 Data Communications
13. Convert the word DIGITAL to binary using the ASCII table (Table 2.3).
14. Convert the word NETWORK to hexadecimal using the ASCII table
(Table 2.3).
15. Write your name in binary ASCII, then change the result to hexadecimal.
16. What is serial transmission?
17. What is parallel transmission?
18. What is the advantage of parallel transmission over serial transmission.
19. Explain the following terms:
(a) Simplex
(b) Half Duplex
(c) Full Duplex
20. What is a synchronous transmission?
21. Why is a clock pulse needed for transmission of a digital signal?
22. Show the format of asynchronous transmission.
23. Sketch a clock pulse.
24. List two types of digital encoding methods in which the clock is embedded to
the data signal.
25. List methods of error detection.
26. List sources of error in networking.
27. Represent binary 110101 with a polynomial.
28. Find the BCC for word “ETHERNET.”
29. Show the CRC Circuit for 1011.
30. Find the FCS for message 10110110 using circuit in question 29.
31. Find the One’s Complement of the Sum for word “NETWORK.”
32. Show the digital wave form for 0101011110.
33. Draw the Manchester encoding and differential Manchester encoding for the
binary number 010110110.
34. Calculate the frequency of a signal repeated every 0.0005 seconds.
35. Find the FCS for data unit 111011 with divisor 1011.
36. What is burst error?
Chapter 3
Communications Channels and Media
Objectives
After completing this chapter, you should be able to:
• List the types of communication media currently in use.
• Distinguish between the different types of unshielded twisted-pair (UTP) cable.
• List the different types of coaxial cable and their applications.
• Discuss the different types of fiber-optic cables and their usage.
• Explain the operation of wireless transmission.
• Explain signal attenuation and channel bandwidth.
• Describe the characteristics of a synchronous optical network (SONET).
• List the components of SONET and define the function of each component.
• List SONET ‘s optical signal rates.
• Show the SONET frame format and explain the function of each overhead field.
3.1 Introduction
A transmission medium is a path between the transmitter and the receiver in a trans-
mission system. The type of transmission medium is defined by the various charac-
teristics of the digital signal, including the signal rate, data rate, and the bandwidth
of a channel. The bandwidth of a channel determines the range of frequencies that
the channel can transmit. There are three types of communications media cur-
rently in use:
1. Conductive, such as twisted-pair wire and coaxial cable.
2. Fiber-optic cable.
3. Wireless.
3.2 Conductive Media
The most popular conductive media used in networking are unshielded twisted-
pair (UTP) cable, shielded twisted-pair cable (STP), and coaxial cable.
Twisted-Pair Cable
Unshielded twisted-pair (UTP) cable is the least expensive transmission medium
and is typically used for LANs. Electrical interference, such as external electromag-
netic noise generated by nearby cables, can have a devastating effect on the perfor-
mance of a UTP cable. One way of improving the effect of noise on a UTP cable is
to shield the cable with a metallic braid. A shielded twisted-pair (STP) cable pro-
vides better performance but is more difficult to work with. Figure 3.1a, b shows
illustrations of UTP and STP cables.
The unshielded twisted-pair cable is divided into categories CAT-1 through
CAT-8. Only CAT-1 through CAT-6, however, are recognized by the Electronic
Industries Association (EIA) as CAT-7/7a and CAT-8 have not yet been standard-
ized. Even so, CAT-7/7a cables are currently used in datacenters, and while CAT-8
is still largely in development, CAT-8 cables are projected for use in extremely high-
bandwidth applications in the near future.
The EIA provides specifications for CAT-1 through CAT-6 UTP cables, as shown
in Table 3.1. These standards apply to four-pair UTP which uses RJ-45 and RJ-11
connectors, as shown in Fig. 3.2. In addition to these specifications, certain propri-
etary enhancements to CAT-5 allow for improved performance over longer
distances. Table 3.1 also shows the specifications for the non-standardized CAT-7/7a
and CAT-8 UTP cables.
PVC Coating
Plastic insulator
Conductor
Coaxial Cable
A coaxial cable is used to transmit high-speed digital and analog signals over long
distances. Figure 3.3 shows a coaxial cable that has an outer insulating cover made
of polyvinyl chloride (PVC), or Teflon, protecting the coaxial cable. Under the outer
cover is a wire mesh shield, which provides excellent protection from external elec-
trical noise. This shield is made of mesh wire or foil, or both. Under the shield is a
plastic insulator, which isolates the center conductor from the shield. The center
conductor is a solid copper or aluminum wire that is shielded from external interfer-
ence signals. There are different types of coaxial cable, categorized by the Radio
Government (RG) rating. RG represents a set of specifications for cables such as the
conductor diameter, thickness, and type of insulator. Coaxial cables use BNC con-
nectors as shown in Fig. 3.4.
52 3 Communications Channels and Media
3.3 Fiber-Optic Cable
A fiber-optic cable is made of fiber that is covered by a buffer and a jacket. The
fiber is composed of a core of thin glass or plastic covered by cladding which may
also be glass or plastic. This fiber (the core and the cladding) is then covered by a
buffer to strengthen it. The buffer is finally covered by a plastic outer layer, called
the jacket, which acts as a protective coating or shield. Figure 3.5 illustrates the
structure of a fiber-optic cable.
To transmit information using optical fiber, the digital information is converted
to light pulses by light-emitting diodes (LED) or injected-laser diodes (ILD) and
sent through the fiber-optic cable. An LED is a diode which generates a low power
light. At the receiving end, a photodiode or a photo transistor is used to convert the
light pulse signals back into electrical signals.
The following are the advantages of fiber-optic cables:
• Longer distance transmission due to reduced signal loss (attenuation).
• Greater bandwidth up to the Gigahertz range.
• Immunity from any kind of noise or external interference such as electromag-
netic signals.
• Smaller size.
• Secure media.
Some disadvantages of fiber-optic cables are as follows:
• Network interface cards and cabling can be expensive.
• Connection to the network is more difficult.
Characteristics of Light
The source of signals for a fiber-optic cable is light. The characteristics of light are
propagation speed, wavelength, and attenuation.
Propagation Speed Light propagates through a vacuum at a speed of 3.0*108 m/s.
Wavelength The length of a wave is measured in meters and is represented by λ
(lambda). The wavelength is the distance between two successive peaks of a wave
or the distance traveled by one cycle of a wave as shown in Fig. 3.6.
Equation 3.1 describes the wavelength in terms of the speed of light and the fre-
quency of a signal.
C/f (3.1)
Fig. 3.5 Fiber-optic cable
Fiber
Buffer Jacket
3.3 Fiber-Optic Cable 53
voltage
W avelength
meters
where:
C = the speed of light (3*108 m/s)
f = frequency of the signal
Attenuation of Light Attenuation is the reduction of the strength of a signal.
When light travels through a fiber, it loses energy. The greatest loss of energy is
often caused by absorption. Absorption is caused by fiber materials as the optical
power is converted to another form of energy such as heat. Attenuation is defined in
Eq. 3.2.
Pt (3.2)
A = 10 log10
Pr
where:
A is the attenuation in decibels.
Pt is the power of light at the transmitter side.
Pr is the power of light at the receiver side (after transmission).
The attenuation of a fiber-optic cable is specified by the manufacturer. Figure 3.7
shows the attenuation of a 1 km fiber-optic cable with different signal wavelengths
and two windows with the least attenuation (1300 nm and 1550 nm). The 850 nm
wavelength window offers the most economical solution as it uses the less-expensive
emitting diode. Fiber-optic systems operate at the wavelength defined by one of
these three windows.
A. The first window is centered at a wavelength of 850 nm
(nanometers = 10−9meters).
B. The second window is centered at 1300 nm.
C. The third window is centered at 1550 nm.
54 3 Communications Channels and Media
Cladding
Diameter
Core Diameter
mode fiber cable has a smaller diameter than a multimode fiber cable. The MMF
uses a light emitting diode (LED) as the source of light.
Multimode Graded Index Fiber: In multimode fiber, the index of refraction
across the core is gradually changed from maximum at the center to a minimum
near the edges. This type of fiber causes the light to travel faster in the low index of
refraction material than in the high-refraction material. Typical bandwidth for
graded index fibers ranges from 100 MHz*km to 1 GHz*km. Figure 3.9 shows a
multimode graded index fiber-optic cable.
Modal Bandwidth
Modal bandwidth is specified in units of MHz*km. The modal bandwidth indi-
cates the amount of bandwidth supported by a fiber cable for a 1 km (0.625 miles)
distance and is given by the manufacturer of the optical cable. For example, a cable
with a modal bandwidth of 500 MHz*km can support end-to-end bandwidth of
250 MHz at a maximum 2 km (1.25 miles) distance.
Fiber-Optic Connectors
There are three common types of fiber-optic connectors used for networking. These
connectors are listed below.
1. Subscriber Channel (SC) Connector: The SC connector, shown in Fig. 3.10,
uses a push-pull locking system. SC connectors are used for CATV, telephone
connections, and networks.
2. Straight Tip (ST) Connector: ST connectors use bayonet locking and are val-
ued for their high reliability. The ST connector is also shown in Fig. 3.10.
3. MT-RJ Connector: The MT-RJ is a duplex connector, as shown in Fig. 3.11.
The size of a MT-RJ connector is equal to that of an RJ-45 connector.
56 3 Communications Channels and Media
SC connector ST connector
3.4 Wireless Transmission
Wireless transmission does not use any transmission media, such as a conductor or
optical cable, to transmit and receive information. Microwave, radio, infrared light,
and laser are forms of wireless communication.
When electrons accelerate, they generate electromagnetic waves. Wireless trans-
mission uses these electromagnetic waves. Table 3.2 shows the electromagnetic
wave spectrum and its applications.
3.5 Transmission Impairment
Amplifier
Transmitter
side
Communication channel Receiver side
Fig. 3.12 Attenuation and amplification of a signal as it travels through a communication channel
Pt (3.3)
A p = 10 log10
Pr
where:
Ap is the power attenuation.
Pt is the power of the signal at the transmitter side.
Pr is the power of the signal at the receiver side.
Example 3.1 A signal with a power of 500 mW is transmitted over a communica-
tion channel. At the receiver side, the power of the signal is 50 mW. Calculate power
attenuation of the signal.
500
= =
Ap 10 log10 10 dB
500
Pt Vt I, where I Vt / R, then
58 3 Communications Channels and Media
Pt Vt / R
2
Pr Vr / R
2
Vt
Av = 20 log10 (3.4)
Vr
where:
Av is the voltage attenuation.
Vt is the voltage of signal at the transmitter side.
Vr is the voltage of signal at the receiver side (after transmission).
The attenuation of a cable is published by the cable manufacturer. Table 3.3
shows the attenuation of UTP Cat-5 and Cat-6 cables at different frequencies. It is
notable that attenuation increases as frequency increases.
The network designer uses attenuation data to find the maximum cable length
that can be used without using a repeater.
Example 3.2 Find the maximum length of a Cat-6 cable that transmits a signal
with 250 MHz, assuming the voltage of the signal at the transmitter side is 5000 mV
and at the receiver side is 200 mV.
5000
= =
Av 20 log10 27.8dB
200
From Table 3.3, attenuation for 100 meters of Cat-6 at frequency 250 MHz is
31 dB; thus, the maximum cable length is 89.6 meters. If the transmitter transmits
information at 20 MHz using Cat-6, then the maximum length of the cable would be
347.4 meters.
Table 3.3 Attenuation of Cat-5 and Cat-6 cables for various frequencies
Cat-5 Cat-6
Frequency (MHz) Attenuation Attenuation
(dB/100 m) (dB/100 m)
1 MHz 2 1.9
10 6.5 5.6
20 9.3 8.0
100 22 18.7
250 NA 31.0
3.6 Bandwidth, Latency, Throughput, and Channel Capacity 59
Bandwidth
In general, bandwidth is the maximum rate of data transferred over a communica-
tion link. It is categorized by the type of signal over the communication link.
Analog Bandwidth Analog bandwidth is the difference between the highest and
the lowest frequency in a communication channel. For example, the highest fre-
quency of the human voice is 3300 Hz and the lowest frequency of the human voice
is 300 Hz. Therefore, the bandwidth of the human voice is simply:
Digital Bandwidth The bandwidth of a digital link is the maximum number of bits
per second that can be transmitted over the communication link. For example, the
bandwidth of a T1 link is 1.54 Mbps meaning that it can transfer up to 1.54 million
bits per second. Ethernet’s bandwidth is 10 Mbps meaning each bit takes 0.1 μs to
get transmitted.
Latency (Delay)
Latency defines the time it takes to transmit one packet (unit of information) from
source to destination. Latency delay consists of propagation delay, transmission
time, and buffering time. Latency is defined in Eq. 3.5. Also, the two-way latency is
called round trip time (RTT).
Latency Tx Tp Tb (3.5)
where:
Tx is the transmission times.
Tp is the propagation delays.
Tb is the buffering times.
Transmission Time Transmission time is the time that it takes to put a message on
media. If the data rate of a link is 1000 bits per second, then each bit takes 0.001 sec-
onds to put on the media. Transmission time is defined by Eq. 3.6:
Example 3.3 Find the transmission time for transferring 1500 bytes using a com-
munication link with a data rate of 10 Mbps.
60 3 Communications Channels and Media
bit
1500 byte 8
Tx byte 0.0012 sec
bit
10 106
sec
where:
Speed of light = 3 × 108 m/s in a vacuum and less in wire and fiber medium.
Electrical and optical signals travel considerably less than almost at the speed of
light and are generally taken as 2.3 × 108 m/s and 2 × 108 m/s, respectively.
Example 3.4 Find the propagation time for transferring 100 bytes over 200 km of
fiber-optic cable.
2 10 5 m
Tp 0.001 sec
m
2 108
s
Transfer Size
Throughput = (3.8)
Latency
Example 3.5 Calculate the transmission time and the throughput of a communica-
tion link for a user to download 1500 bytes of information from a server. The user’s
computer is connected to the server by a modem with the data rate of 50 Kbps and
the distance between the two computers is 4000 km. Assume there is no buffer-
ing delay.
3.6 Bandwidth, Latency, Throughput, and Channel Capacity 61
bit
1500 byte 8
Tx byte 0.24 sec
50, 000 bps
4 106 m
Tp 0.018 sec
m
2.3 108
s
bit
1500 byte 8
Throughput byte 46.51 kbps
0.258 sec
Channel Capacity
The bandwidth of a channel is defined as the range of frequencies that pass through
bits
the channel. Nyquist’s theorem is defined as the maximum data rate in a
noiseless channel and is represented mathematically by Eq. 3.9. sec
where:
W is the bandwidth of the channel.
N is the number of signal levels or voltage levels.
Example 3.6 Find the maximum data rate of a channel with a bandwidth of 4000 Hz
transmitting two voltages (e.g., binary = two levels, 0 and 1).
Equation 3.9 is valid only when using a noiseless channel. Noise affects the data
rate of a channel. Figure 3.13 shows transmission of a digital signal through a noisy
channel.
Figure 3.13 indicates that the presence of noise in a communication channel may
cause distortion of the incoming signal such that the output signal is no longer a
square wave. When the amplitude of the noise is larger than expected, total destruc-
tion of the original signal occurs and affects the data rate of the communication
channel. The capacity of a channel may be obtained using Shannon’s theorem and
is represented mathematically by Eq. 3.10.
62 3 Communications Channels and Media
Communication Channel
S
max Data Rate MDR W log 2 1 bps (3.10)
N
where:
S
is the signal-to-noise ratio(SNR), the ratio of average signal power to average
N
noise power at the receiver, which is usually given in decibels(dB)by Eq. 3.11.
A decibel is defined as:
S
Decibels 10 log10 (3.11)
N
S
For example, if 10 , then (SNR) in decibels is:
N
SNR 10 log10 10
10 dB
Example 3.7 Find the maximum data rate of a channel with a bandwidth of
4000 Hzand a signal-to-noise ratio of30 dB.
S
30 dB 10 log10
N
Therefore,
S
= 103
N
Subsequently,
MDR W log 2 1 103
3.7 Synchronous Optical Network (SONET) 63
SONET is a high-speed optical carrier that uses fiber optic-cable as the transmission
media. The term SONET is used in North America and is a standard established by the
American National Standards Institute (ANSI). The International Telecommunication
Union (ITU) has also set a standard for SONET called Synchronous Digital Hierarchy
(SDH), which is used in Europe.
SONET optical architecture is based on a four-fiber bidirectional ring to provide
the highest possible level of service assurance. New application software, such as
Medical Images and CAD CAM applications, require more bandwidth than other
applications and rely on SONET for high-speed transmission with a large
bandwidth.
3.7.1 Characteristics of SONET
3.7.2 SONET Components
Electrical to optical
Converter Regenerator
STS-1 ADM
ADD/DROP STS
STS-1 OC-3 Multiplexer O/E
MUX E/O DEMUX
STS-1 Optical cable
STS-3
1 2 3 4 5 90
1
Section 2
Overhead
3
4
Path
5
Overhead
Data
Line 6
Overhead 7
8
9
STS Multiplexer: The function of the STS MUX is to multiplex electrical input
signals to a higher data rate and then convert the results to an optical signal, as
shown in Fig. 3.15.
Regenerator: The regenerator performs the functions of a repeater. If the optical
cable is longer than standard, the regenerator will be used to receive the optical
signal and then regenerate the optical signal.
Add/Drop Multiplexer: Add/drop multiplexers are used for extracting, or insert-
ing, lower rate signals from, or into, higher rate multiplexed signals without
completely demultiplexing the SONET signals.
STS Demultiplexer: STS demultiplexers convert and demultiplex optical signals to
electrical signals.
The lowest level signal in SONET is the Synchronous Transport Signal Level One
(STS-1), which has a signal rate of 51.84 Mbps. The STS-1 is an electrical signal
which is converted to an optical signal called OC-1. The higher SONET data rates
are represented by STS-n, where n is 1, 3, 9, 12, 18, 24, 34, 48, 96, and 192. Table 3.4
shows SONET and SDH signal rates.
3.7 Synchronous Optical Network (SONET) 65
Table 3.4 Data rate for OC, STS, and STM signals
Fiber-Optic (OC) Synchronous transport signal Synchronous transport module data
signal OC-n Level (STS) for SONET rate (STM) for SDH (Mbps)
OC-1 STS-1 51.84
OC-3 STS-3 STM-1155.52
OC-9 STS-9 STM-3446.56
OC-12 STS-12 STM-4622.08
OC-18 STS-18 STM-6933.12
OC-24 STS-24 STM-8 1244.16
OC-36 STS- 36 STM-12 1866.24
OC-48 STS-48 STM-16 2488.32
OC-96 STS-96 STM-32 4976.64
OC-192 STS-192 STM −64 9953.28
OC Optical carrier, STS Synchronous transport signal (electrical signal for SONET), STM
Synchronous transport module (electrical signal for SDH)
STS-1 1 MUX
3 2 1
STS-1 2 STS-3
STS-1
3
The basic transmission signal for SONET is the STS-1. The STS-1 format is shown
in Fig. 3.16. It is made up of 9 rows and 90 columns of bytes. The frame size is 90
* 9 = 810 bytes, or 810 * 8 = 6480 bits. SONET transmits 8000 frames per second.
The data rate for STS-1 is 6480 * 8000 = 51.84 Mbps.
The first three columns are referred to as transport overhead, which is 3 * 9 = 27
bytes. 9 of these 27 bytes are used for section overhead, 18 bytes are used for line
overhead, and 9 bytes are used for path overhead. The actual data rate is 86 columns
* 9 rows * 8 bits * 8000 frames/sec = 49.536 Mbps.
66 3 Communications Channels and Media
The STS-1 frame is transmitted by the byte from row 1, column 1 to row 9, col-
umn 90 (scanning from left to right).
Path Overhead Path overhead is part of SPE (synchronous payload envelope) and
contains the performance monitor of synchronous transport signal, path trace, parity
check, and the path status.
Section Overhead Section overhead contains information about frame
synchronization.
(informing the destination of incoming frame) and frame identification. It also
carries information about operation administration and maintenance (OAM), han-
dles frame alignment, and separates data from the voice.
Line Overhead Line overhead carries the payload pointers to specify the location
of SPE in the frame and provides automatic switching for standby equipment. It
separates voice channels and provides multiplexing, line maintenance, and perfor-
mance monitoring.
3.7.5 SONET Multiplexing
Higher levels of synchronous transport signals can be generated by using byte inter-
leave multiplexing. The STS-3 is generated by multiplexing three STS-1 signals as
shown in Fig. 3.15. The output of STS-3 is converted to an optical signal called
OC-3. The STS-3 frame is made up of 3 * 90 = 270 columns, and 9 rows, containing
2430 bytes. The STS-3 is transmitted at 8000 frames per second and, therefore, the
bit rate of STS-3 is:
Figure 3.17 shows the STS-3 frame format. The transport overhead is made up of
9 columns and 9 rows. The SONET payload envelope is 260 * 9 bytes. The STS-9
is generated by multiplexing three STS-3 s, as shown in Fig. 3.18.
1 9 10 11 270
1
2
3 STS-3 Synchronous Payload Envelop
4 Transport (SPE)
5
Overhead
6
7
8
9
STS-3 1 MUX
3 2 1
STS-3 2 E/O
OC-9
STS-9
STS-3
3
Summary
Key Terms
Review Questions
23. A packet of 100 bytes is transmitted over a 100 km cable with bandwidth of 100
Mbps. Calculate the following:
(a) Propagation delay of the link
(b) Transmission time
(c) Latency of the packet
(d) RTT.
24. What is the bandwidth of a 20 km link for transmitting 500 bytes of information
such that the propagation delay is equal to transmission delay?
25. Find the time that it takes to transmit 1000 kByte-files from a server that is
located 4000 km away from a host computer. Assume you are using a modem
with a data rate of 52 Kbps and size of each packet is 1000 bytes.
26. Calculate the latency for transmitting 1500 bytes of data over the follow-
ing links:
(a) 100 meters copper with a bandwidth of 10 Mbps
(b) 4000 meters optical fiber with a bandwidth of 10 Mbps
27. 500 bytes of data are transmitted over 200 km of a fiber-optic cable.
(a) Find the data rate such that the transmission time becomes equal to the
propagation time.
(b) What is throughput of this communication link?
28. Find the maximum data rate of a communication link with a bandwith of
3000 Hzusing 8 signal levels.
29. Find the bandwidth of communication channel in order to transfer data at a rate
S
of 100 Mbps, assume ratio is(50 dB).
30. What does SONET stand N for?
31. What does SDH stand for?
32. What is an application of SONET?
33. What is the basic electrical signal for SONET?
34. What is the transmission media for SONET?
35. List some of the advantages of SONET.
36. List the SONET components.
37. What does STS-1 stand for?
38. What is OC-1?
39. What is the data rate for STS-1?
40. How many bytes is STS-1?
41. How many STS-1 must be multiplexed to generate an STS-3?
42. SONET transmits how many frames per second?
43. Show the SONET frame format.
44. Explain the function of add/drop multiplexing.
45. What is STS-n?
46. Why is the STS-1 bit rate 51.84 Mbps?
Chapter 4
Multiplexer and Switching Concepts
Objectives
After completing this chapter, you should be able to:
• Explain the operation of multiplexers and demultiplexers.
• List the types of multiplexers.
• Discuss how a telephone system operates.
• Explain how pulse code modulation converts voice to digital signals.
• Explain T1 Link technology and how to calculate its data rate.
• Discuss switching concepts.
• List the types of switching methods.
4.1 Introduction
B
Terminals DCBA
C
Multiplexer
D
Host Computer
A
B 4*1 Output DCBA
Inputs
C MUX
Select lines
0 A
1 B
Input DCBA 1*4 2 C
DMUX D
3
Select Lines
This method continues until the switch moves to position D and transfers input D to
the output. After this function is completed, the switch starts over from input A.
The opposite of a multiplexer is a demultiplexer (DMUX), as shown in Fig. 4.3.
The switch moves to send each input to the appropriate output. A DMUX has one
input and N outputs – this is called a 1-to-N demultiplexer. When the switch is in
position 0, it transfers A to output port 0, then moves to output port 1 and transfers B
to this port. This process continues until the switch moves to output port 3 and trans-
fers D to port 3. Once the cycle is complete, the transfer of data starts over from port 0.
4.2 Types of Multiplexers 77
4.2 Types of Multiplexers
Multiplexers are categorized into the following types, where each type has a specific
application:
1. Time division multiplexing (TDM)
2. Frequency division multiplexing (FDM)
3. Statistical packet multiplexing (SPM)
4. Fast packet multiplexing (FPM)
5. Code division multiplexing (CDM)
6. Wavelength division multiplexing (WDM)
t2 t1 t0
AAA Frame #2 #1 #0
B-B 4*1 Output -CBA DC-A DCBA
Inputs MUX
CCC
-DD
- no data
Channel 2
0 6Mhz
Channel 4
AAA
DDD
idle channel does not receive any time allocation, as shown in Fig. 4.6. SPM uses a
store-and-forward mechanism in order to detect and correct any error from incom-
ing packets.
Fast Packet Multiplexing
Fast packet multiplexing (FPM) uses the same method as SPM and can assign
maximum bandwidth to any input needed. FPM does not use a store and forward
mechanism and, therefore, cannot perform error detection and correction. FPM will
forward a packet before it has been completely received by the multiplexer.
Code Division Multiplexing (CDM)
In time division multiplexing (TDM), each end user is allocated a time slot for
transmission. For instance, if 10 users are connected to a TDM and the bandwidth
of the transmission link is 10 Mbps, then each user can transmit at the rate of only
1 Mbps. One disadvantage of TDM is that each user must wait for its turn to trans-
mit its information. Code division multiplexing (CDM) is similar to TDM but
allows all users to transmit simultaneously.
CDM Operation In CDM, each bit is divided into multiple bits that are called chip
bits. This is done by multiplying logical 1 with a chip sequence, or by assigning chip
bits to each node to represent logical 1. Table 4.1 shows the chip bits that have
4.2 Types of Multiplexers 79
assigned to each node to represent logical 1. The complement of the chip bits repre-
sents logical zero. Chip bits can be represented by a bipolar value, so that +1 repre-
sents logical 1 and −1 represents logical zero.
Characteristics of Chip Bits In general, the chip bit sequence for A can be repre-
sented by A = (A4 A 3 A2 A 1) and the chip bit sequence for B can be represented by
B = (B4 B3 B2 B1). One property of chip bits is that the inner product of two different
chip bit sequences is zero and the inner product of the two identical chip sequences
bits is one.
The inner product A and B is represented by and is defined by Eq. 4.1:
1 4 1
A B Ai Bi A1 B1 A2 B2 A3 B3 A4 B4 (4.1)
m i 1 4
1 1
Therefore, A B 1 1 1 1 1 1 1 1 1 1 1 1 0 .
4 4
And the inner product A with itself A ⋅ A is:
1 1
A A 1 1 1 1 1 1 1 1 1 1 1 1 1
4 4
CDM Architecture Fig. 4.7 shows the general architecture of CDM with three
inputs and one output. The nodes A, B, and C are the inputs, and the chip bit
sequences for each input are 4 bits each. The chip bits of each input are added, and
that sum is then transmitted over the communication link. At the receiver side, the
inner product of the sum of the chip bits and the chip sequence of an input node is
used to determine the data bits for a specific node.
Example 4.1 Table 4.2 shows data to be transmitted by the nodes A, B, and C, and
their chip sequences.
(a) Find the output of CDM.
(b) Find the data bit that is transmitted by node A at the receiver side.
The chip bit sequence for each data node is represented by Table 4.3.
The sum of the data is then transmitted to the receiver side. At the receiver side,
the receiver uses the chip sequence of a specific node to recover the original data by
using the inner product. In order to recover user A’s data, the inner product of A’s
chip bit sequence and the sum of the chip bits is shown by Table 4.4, where +1 rep-
resents 1 and −1 represents 0.
80 4 Multiplexer and Switching Concepts
A4A3A2A1
B4B3B2B1
ΣA+B+C Data Bit
Σ Σ
i i i
C 4C 3 C 2C 1
Table 4.2 Chip bits and data Node Chip bit sequence Data to be transmitted
bits for nodes A, B, and C
A −1 −1 −1 −1 101
B −1 +1 −1 +1 110
C +1 +1 −1 −1 001
Table 4.4 Inner product of the sum and node A’s chip bits
Sum −3 −1 −1 +1 −1 +1 +1 +3 +1 −1 −1 −3
Node A chip sequence −1 −1 −1 −1 −1 −1 −1 −1 −1 −1 −1 −1
Inner product (+3−1 +1−1)/4 = +1 (+1 −1 −1 −3) (−1 +1 +1 +3)/4 = +1
/4 = −1
1310 nm 1310 nm
Optical Channel
Optical Optical
1330 MUX DeMUX 1330
nm
1490 nm
1470 1490 Transponder
Transponder 1490
1470 1510 Optical Cable 1490 nm
MUX DeMUX 1510
Transponder Transponder
1470 1490 nm
Transponder 1530 1530 Transponder
There are two types of WDM: dense wavelength division multiplexing (DWDM)
and coarse wave division multiplexing (CWDM).
Dense Wavelength Division Multiplexing (DWDM) In DWDM, the wavelengths
of the optical signals are close together. Current DWDM can transmit 60–80 wave-
lengths per channel with the wavelength spacing about 0.8 nm.
The wired telephone system transmits information in analog form from a telephone
set to the central office (CO). At the CO, the analog signal is converted to a digital
signal, which is then transferred to the next central office as shown in Fig. 4.11. This
digital signal is then converted to an analog signal and transmitted to the user. The
method of conversion from analog to digital is called pulse code modulation (PCM).
4.4 Digitizing Voice
Voice is an analog signal. In the central office of the telephone company, voices are
digitized by a device called a codec (coder-decoder). The function of a codec is to
digitize the voice signal and convert an already digitized signal to analog. According
to the Nyquist theorem, in order to convert an analog signal into a digital signal, the
analog signal must be sampled at least at the rate of two times its highest frequency.
The voice signal must be sampled at 8000 samples per second because human
speech is below 4000 Hz, as shown in Fig. 4.12. This method is called pulse ampli-
tude modulation (PAM).
Each PAM sample is represented by eight bits. In Fig. 4.13, it is represented by
four bits. Remember, this method of converting voice to digital signal is called pulse
code modulation (PCM). Since voice is digitized at the rate of 8000 samples per
second and each sample is represented by 8 bits, the data rate of the human voice is
8000*8 = 64 kbps.
Analog Signal
Analog Signal
Telephone Telephone
Voltage Voltage
Time Time
Fig. 4.12 Analog signal and pulse amplitude modulation (PAM). (a) Analog signal and (b) pulse
amplitude modulation
0111
0110
0101
0100
0011
0010
0001
0000
1001
1010
1011
1100
1101
1110
1111
4.5 T1 Links
Long-distance carriers use TDM to transmit voice signals over high-speed links.
One of the applications of TDM is the T1 link. A T1 link carries a level-1 digital
signal (DS-1). A DS-1 is generated by multiplexing 24 voice digital signals (digital
signal level-0 or DS-0), as shown in Fig. 4.14. Pulse code modulation (PCM) is used
to convert each analog signal to a digital signal. Each frame is made of 24 signals *
8 bits = 192 bits, with one extra bit added to separate each frame, making each
frame 193 bits. Each frame represents 1/ 8000th of a second. Therefore, the data rate
of T1 link is 193 * 8000 = 1.544 Mbps.
Table 4.5 shows TDM carrier standards for North America. Look at the table and
you will see that a DS-2 can carry 96 voice channels with 168 Kbps overhead.
84 4 Multiplexer and Switching Concepts
Analog Digital
1 PC
DS-0
M
Analog Digital
2 PC 1.544 Mbps
Voice Inputs DS-0
TDM DS-1
M
Digital
Analog
24 PC
DS-0
M
Therefore, the data rate for DS-2 is 6.312 Mbps (96 channels * 64Kbps + 168 Kbps
overhead). Figure 4.15 shows the DS-1 frame format where the 1-bit gap is used to
separate each frame.
4.6 Switching Concepts
A communication network that has more than two computers must establish links
between computers in order for them to be able to communicate with each other.
One way to connect these computers is via fully connected network (mesh), as
shown in Fig. 4.16.
The advantage of this method is that all stations can communicate with each
other. The disadvantage is large number of connections are required when the num-
ber of stations is greater than four. To overcome this disadvantage, a device called a
switch is used to connect stations, as shown in Fig. 4.17.
4.6 Switching Concepts 85
Computer Computer
Computer Computer
Switch 3
Switch 2
Switch 1
Switch 4
C
Switch 1 Switch 2
B
A
D
Fig. 4.18 Circuit switching
Message Switching
In message switching, station A sends its message to the switch. The switch stores
that message and then forwards it to the destination. The disadvantage of message
switching is that the switch needs to have a large buffer to store incoming messages
from other links.
Packet Switching
Figure 4.19 shows a network with several switches. Assume source A has a message
and wants to transfer it to destination B. Source A divides the message into packets
and sends each packet, possibly by a different route. This process is known as
packet switching. Each packet goes to the switch, which stores the packet and
looks at the routing table inside the switch to find the next switch or destination.
Each packet may take a different route and be received at the destination out of
order. To prevent mistakes in reassembling the packets, each packet is given a
sequence number which will be used by the destination to put the packets back
in order.
Summary 87
#3
B
Sourece C Destination
#5
CBA #1
A #2 #4
In Fig. 4.19, the source divides the message into 3 packets: A, B, and C. Then,
the source transmits packet A to switch #1. Switch #1 stores packet A, looks at the
congestion on all outgoing links, and finds that the link to switch #2 is the least
congested. Switch #1 then sends packet A to switch #2. Switch #2 stores the packet
and finds out from its routing table that packet A must go to Switch #4. Switch 2
then forwards the packet to switch# 4 and switch #4 forwards packet A to switch #5.
Packet B and C take different routes, and as such, the packets might be received out
of order. The destination uses the sequence numbers of the packets to put them in
proper order. Packet switching is used to send information across the internet. This
type of service is also called a connection-less oriented circuit.
Virtual Circuit
Virtual circuits are a type of packet switching which operate on the same concept
as packet switching, but the routing of the packets is specified before transmission.
As seen in Fig. 4.19, the source specifies the route, which is represented by dotted
lines. Therefore, all the packets from source A go via the dotted line. By using this
method, all packets will be received at the destination in the proper order.
Summary
• The pulse code modulation (PCM) method is used in the central switch to con-
vert human voice to digital signal.
• The bandwidth of the human voice is 4000 Hz and it is digitized at a rate of
64 kbps.
• A T1 link is a special digital transmission line which has 24 inputs (each input is
64 kbps) and one output, with a data rate of 1.544 Mbps.
• There are three types of switching used in networking: circuit switching, packet
switching, and virtual circuit.
• A message is divided into pieces. Each piece is called a packet.
• Packet switching treats each packet of a message separately.
• In circuit switching, a physical connection must be established between the
source and destination before transmitting information.
• A virtual circuit is a type of packet switching. In a virtual circuit all packets of a
message are transmitted in a specific path called a virtual path.
Key Terms
Review Questions
Objectives
After completing this chapter, you should be able to:
• Comprehend frame transmission methods.
• Demonstrate understanding of error and flow control.
• Draw the Logical Link Control (LLC) frame format.
As described in Chap. 1, the Data Link layer defines the frame format and type of
transmission. The Data Link layer performs the following functions:
1. On the transmitting side: The Data Link layer accepts packets from the
Network layer and breaks the information into frames. It then adds the destina-
tion MAC address, source MAC address, and Frame Check Sequence (FCS)
fields, and passes each frame to the Physical layer for transmission.
2. On the receiving side: The Data Link layer accepts the bits from the Physical
layer and forms them into a frame, performing error detection. If the frame is
free of error, the Data Link layer passes the frame up to the Network layer.
3. Frame synchronization: This layer identifies the beginning and end of
each frame.
4. Flow control: Distinguishes between control frames and information frames.
5. Link management: This layer coordinates transmission between the transmitter
and receiver.
6. Determine contention method: This layer defines an access method in which
two or more network devices compete for permission to transmit information
across the same communication media, such as Token passing and Carrier Sense
Multiple Access with Collision Detection (CSMA/CD).
There are several existing protocols for the Data Link layer, such as:
• Synchronous Data Link Control (SDLC): SDLC was developed by IBM as a
link access for System Network Architecture (SNA).
• High-Level Data Link Control (HDLC): HDLC is a version of SDLC modified
by the ISO for use in the OSI model.
• Link Access Procedure Balanced (LAPB): HDLC was modified by ITU and it
is called LAPB used in ISDN.
Functions of the Data Link layer include error detection, error control, and flow
control. During the transmission of a frame from a source to its destination, the
frame may get corrupted or lost. It is the function of the Data Link layer of the des-
tination to check for error in the frame and inform the source about the status of the
frame. This function must be performed in order for the source to retransmit the
frame. One of the methods used is Automatic Repeat Request (ARQ). Positive or
negative acknowledgement is used to establish reliable communication between the
source and the destination. Automatic repeat request is carried out in two ways:
Stop-and-Wait ARQ and Continuous ARQ.
Stop and Wait ARQ In Stop-and-Wait ARQ, the source transmits a frame and
waits for a specific time for acknowledgement from the destination. If the source
does not receive acknowledgment during this time, the source retransmits the frame.
This method is used for networks with a half-duplex connection.
Case 1 The source station transmits a frame to the destination station. The destina-
tion station checks the frame for any errors. If there is no error in the frame, the
destination station responds to the source station with a Positive Acknowledgment
Frame ACK(N), where N is the sequence number of the frame. The source station
transmits the next frame as shown in Fig. 5.1.
Case 2 The source station transmits a frame to the destination station. The destina-
tion station checks the frame for error. If there is an error in the frame, the destina-
tion station responds to the source station with a Negative Acknowledgment Frame
NACK(N), where N is the sequence number of the corrupted frame. Then, the
source retransmits the frame as shown in Fig. 5.2.
Case 3 The source station transmits a frame to the destination station. The source
does not receive any acknowledgment due to the loss of the frame or loss of acknowl-
edgment from the destination. When the source starts to transmit a frame to the
destination, it sets a timer and waits for an acknowledgment. If the source does not
receive an acknowledgement from the destination during that period of time, the
frame is retransmitted, as shown in Fig. 5.3.
5.2 Error and Flow Control 95
I(N)
ACK(N)
I(N+1)
NACK(N
)
I(N)
Timer on I(N)
Timer on I(N)
ACK(N)
Timer
Expired Retransmit Timer
Expired Retransmit
I(N) I(N)
Loss of data frame Lost of ACK or NACK
Fig. 5.3 Loss of ACK or NACK and I-frame. (a) Loss of data frame. (b) Loss of ACK or NACK
96 5 Error and Flow Control
Continuous ARQ
In continuous ARQ, the transmitter continuously transmits frames to the destina-
tion. The destination sends ACK or NACK on different channels. Continuous ARQ
is used in packet-switching network and full-duplex connection. There are two
types of ARQ: Go-Back-N ARQ and Selective Reject ARQ.
Go-Back-N ARQ In the Go-Back-N ARQ method, the transmitter continuously
transmits, and the receiver acknowledges each frame in a different channel as shown
in Fig. 5.4.
Figure 5.4 shows that the source transmitted frame I5 and received NACK from
I3. The source then retransmits frames I3, I4, and I5. In Go-Back-N, the source
should hold a copy of those frames not receiving acknowledgment. When the source
receives acknowledgment for a frame, it removes the frame from its buffer.
Selective Reject ARQ In selective ARQ, the source will retransmit only those
frames for which the destination had sent a negative acknowledgment. Figure 5.5
shows the source transmitted frame I3 and received NACK1, which indicates that
frame I1 was corrupted. The source retransmits only frame I1. In this method, the
destination must have the capability to reorder frames that are out of order.
Sliding Window Method
In continuous ARQ, the source keeps a copy of transmitted frames in its buffer until
it receives acknowledgment for a frame; it then removes the frame from its buffer.
The continuous ARQ has the following deficiencies:
1. The destination may not have enough memory to store incoming frames.
2. The source may transmit frames faster than destination can process them.
3. The source must hold a copy of all unacknowledged transmitted frames in its
buffer; therefore, the source requires a large buffer.
4. The file to be transmitted is divided into packets. Each packet has a sequence
number; if the sequence number become large, it decreases network efficiency.
I3 I4 I5 I5
I2 I2 I3 I4 I4
I1 I1 I1 I2 I3 I3
Source
I1 I2 I3 I4 I5 I3 I4
Destination
ACK1 ACK2 NACK3
I3 I3 I4
I2 I2 I2 I3
I1 I1 I1 I1 I1
Source
I1 I2 I3 I1 I4
Destination
NACK(I1)
The Sliding Window Method limits the number of frames waiting for acknowl-
edgement in source. For example, a source with a window of seven means the source
can hold only seven unacknowledged frames in its buffer. The source will stop
transmitting once it has seven frames in its buffer and wait for an acknowledgment
frame. When the source receives acknowledgement for a frame, it removes that
frame from its buffer and transmits the next frame. In order to prevent the need for
large sequence numbers, most networking protocols use the following formula for
assigning a sequence number to each frame:
=
Sequence =
Number 25 Modulo 7 4
0 1 1 1 1 11 0 1101100000111111 0 1 1 1 1 1 10
Start Flag Information Field End Flag
Fig. 5.6 Format of bit-oriented synchronization
Receiver Side
Extra zero inserted by transmitter
any time five ones are repeated in the information field. The receiver will discard
this extra zero. This technique is called bit insertion, as shown in Fig. 5.7.
The IEEE 802 committee defined standards for the Physical layer and the Data
Link layer in February of 1980 and called it IEEE 802, with “80” representing 1980
and “2” representing the month of February. Figure 5.8 shows IEEE 802 standard
and OSI model. The IEEE standard divides the data link layer of OSI model into
two sub-layers: Logical Link Control (LLC) and Media Access Control (MAC).
Media Access Control (MAC)
The Media Access Control (MAC) layer defines the method that stations use to
access the network, such as:
• Carrier Sense Multiple Access/Collision Detection (CSMA/CD) used for
Ethernet
• Control Token used in Token Ring Networks and Token Bus Networks
Logical Link Control (LLC)
The Logical Link Control (LLC) defines the format of the frame. It is independent
of network topology, transmission media, and Media Access Control. Figure 5.9
shows different MAC layers for several IEEE 802 networks. All networks which are
listed use the same logical link control. Figure 5.10 shows the frame format of the
LLC, which is used by all IEEE 802.X projects.
5.4 IEEE 802 Standard Committee 99
Logical Link
OSI Model IEEE802 Model
Control
Data Link Layer Media Access
Control
OSI M odel
7 Application
6 Presentation
5 Session
4 Transport
802.2 Logical Link Control
3 Network
The following are the functions of each field of the LLC frame format:
Destination Service Access Point (DSAP) Since the destination station might run
several network protocols such as Novell Netware, NetBIOS, Windows NT, and
TCP/IP, the DSAP has to show the address of the protocol for the destination.
Table 5.1 shows the most common value for service access point (SSAP and DSAP).
100 5 Error and Flow Control
Source Service Access Point (SSAP) SSAP is a value of the source protocol and
indicates the protocol that was used by the transmitter to send the packet.
Control Field The control field determines what type of information is stored in
the information field, such as the information frame, supervisory frame, and unnum-
bered frame. The supervisory frames are receiver ready, receiver not ready, and
reject. Some of the unnumbered frames are reset, frame reject, disconnect, and set
asynchronous respond mode.
Summary
Key Terms
Review Questions
Objectives
After completing this chapter, you should be able to:
• Discuss modem operation.
• Explain the methods of signal modulation.
• Explain cable modem technology.
• Discuss fiber to the home (FTTH) operation.
6.1 Introduction
In order for two computers to communicate with each other, a link between them is
required.
Currently, about 63 million households have cable TV services, and the same
wire that brings TV signals to your house is a cable that can also provide Internet
access with speed 100 times faster than a dial-up modem. The device that enables
computers to access the Internet by cable TV lines is called a cable modem. The use
of cable TV lines for this purpose is advantageous as digital signals cannot travel a
long distance, but analog signals can.
6.2 Modem Operation
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 103
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_6
104 6 Modulation Methods, Cable Modems, and FTTH
DTE DTE
Digital Signal Digital Signal
the phone line (modulation). This device must also convert the incoming analog
signal from the phone line to digital (demodulation). Such a device is called
a modem.
A modem’s transmission speed can be represented by either a data rate or baud
rate. The data rate is the number of bits which a modem can transmit in 1 second.
The baud rate is the number of signals which a modem can transmit in 1 second.
6.3 Modulation Methods
The carrier signal on a telephone line has a bandwidth of 4000 Hz. Figure 6.2 shows
one cycle of a telephone carrier signal. The following types of modulation are used
to convert digital signals to analog signals:
• Amplitude Shift Keying (ASK)
• Frequency Shift Keying (FSK)
• Phase Shift Keying (PSK)
• Quadrature Amplitude Modulation (QAM)
Amplitude Shift Keying (ASK) In Amplitude Shift Keying (ASK), the ampli-
tude of the signal changes. This is also referred to as Amplitude Modulation (AM).
The receiver recognizes these modulation changes as voltage changes, as shown in
Fig. 6.3. The smaller amplitude is represented by zero and the larger amplitude is
represented by one. Each cycle is represented by one bit, with the maximum bits per
second determined by the speed of the carrier signal. In this case, the baud rate is
equal to the number of bits per second.
6.3 Modulation Methods 105
Original Signal
Amplitude Modulation
0
1
Original
Signal
Frequency
Modulation
0 1
1 Cycle
Original Signal
1 cycle
Fig. 6.6 Phase shift for 90, 180, and 270 degrees. (a) 90-degree shift, (b) 180-degree shift, and (c)
270-degree shift
6.3 Modulation Methods 107
11
270 degree
The relation between phase and the binary representation of each phase can be
plotted on a coordinate system called a constellation diagram. Figure 6.7 is a con-
stellation diagram showing the four distinct signals of a 90-degree shift, with each
signal represented by two bits. Figure 6.8 shows a constellation diagram using
45-degree shift and 3-bit representation (8-PSK).
Quadrature Amplitude Modulation (QAM) One method to increase the trans-
mission speed of a modem is to combine PSK and ASK modulation. This hybrid
modulation technique is called Quadrature Amplitude Modulation (QAM) and is
shown in Fig. 6.9. Here we see the combination of four phases and two amplitudes
which generates eight different signals called 8-QAM. Table 6.2 shows the binary
value of each signal and provides a constellation diagram for 8-QAM. The data rate
of this modem is 3 bits*4 K = 12 Kbps. Figure 6.10 shows the constellation diagram
for such a modem.
108 6 Modulation Methods, Cable Modems, and FTTH
110
111
6.4 Cable Modem
The Cable Modem is another technology used for remote connection to the Internet.
Residential access to the Internet is growing, and current modem technology can
transfer data at only 56 kbps. Local telephone companies also offer a service known
as Basic Rate ISDN, which has a transmission rate of 128 kbps. The cable modem
offers high-speed access to the Internet using a media other than phone lines.
6.4 Cable Modem 109
End User
Fiber
trunk Node
e Coaxial cable
Fiber cable End Users
Cable TV Fiber
Head End Node
e
Fiber
Node
8 6Mhz 48 Mbps
66Mhz 36 Mbps
Upstream transmission (from cable modem to head end) uses a 2 MHz channel
between 5 and 42 MHz. This low frequency is close to the CB radio frequency. The
Quadrature Phase Shift Keying (QPSK) modulation method is used. The data rate
of the cable modem for upstream transmission becomes:
6.4 Cable Modem 111
Head
END CM CM CM
Coaxial cable
CM CM
CM
UTP cable
10Base-T NIC
PC
Cable Modem
UTP
Downstream and upstream bandwidths are shared by 500 to 5000 cable modem
subscribers. If 100 subscribers are sharing a 36 Mbps connection, each user will
receive a data at rate of 360Kbps. A cable modem provides a constant connection
112 6 Modulation Methods, Cable Modems, and FTTH
(like a LAN); it does not require any dialing. The cable modem head end communi-
cates with the cable modem, and when the cable modem is commanded by cable
modem head end, the modem will select an alternate channel for upstream
transmission.
IEEE 802.14
A cable modem operates at the physical and data link layers of the OSI model. The
IEEE 802.14 standard provides a network logical reference model for the media
access control (MAC) and physical layer. The following are general requirements
defined for the cable modem by IEEE 802.14:
• Cable modems must support symmetrical and asymmetrical transmission in both
directions.
• They support Operation, Administration, and Maintenance (OAM) functions.
• They support a maximum of 80 km distance for transmission from head end to
the user.
• They support a large number of users.
• MAC layer should support multiple types of service, such as data, voice,
and images.
• MAC layer must support unicast, multicast, and broadcast service.
• MAC layer should support fair arbitration for accessing the network.
The demand for digital TV in the home, such as IPTV and HDTV, is growing fast.
Most service providers offer bundle services that include HDTV, phone, and Internet
services. This brings the question of how much bandwidth is needed to able to sup-
port standard digital TV, HDTV, phone, and Internet in a single home. Standard
digital TV (SDTV) displays an image at a rate of 24 f/s (frames per second) and this
rate is variable based on the country. In European countries, this rate is 25 f/s, while
in North America it is 30 f/s. The SDTV frame is made of 650* 480 pixels, and to
display a pixel, it requires two bytes. Therefore, the total bytes needed to display a
frame are:
HDTV (high-definition TV) frames are made of 1920* 1080 pixels and use 3
bytes for displaying a pixel in color. Therefore, the required bandwidth for a single
HDTV is:
The central head end (CO) compresses each frame before transmission. The
most popular compression algorithms are MPEG-2, with typical compression ratio
of 50/1, and MPEG-4, with compression ratio of 100/1.
SDTV uses MPEG- 2, so the bandwidth requirement becomes 140.4/50 = ~3 Mbps
HDTV uses MPEG-4, so the bandwidth requirement becomes 1493/100 = ~15 Mbps
A typical Internet user requires 2 Mbps.
The bandwidth retirement of VOIP is 100 kbps, which is negligible.
With this data, the bandwidth requirement for a house with two HDTVs, one
SDTV, 4 Internet users, and a phone can be estimated as:
2 15 3 4 2 41 Mbps
In order for a service provider to provide 41 Mbps bandwidth, fiber to the home
technology can be used.
FTTH Architecture
FTTH uses 100% fiber connections to the home and can be point to point (P2P)
architectures (sometimes called an All-Optical Ethernet Network, or AOEN) or
Passive Optical Networks. Figure 6.15 shows a P2P optical network, where a central
office (CO) has direct connections to each house via fiber cable.
Passive Optical Networks
Passive optical networks (PON) use a single fiber connection from a central office,
which is then split by a passive optical splitter as shown in Fig. 6.16. The function
of splitter is to broadcast incoming rays to all of the outputs of the splitter. The
maximum length of a feeder cable is 30,000 feet (9000 meters). If a splitter is a pas-
sive splitter, then it means it does not require any power. The maximum length of
fiber cable from a splitter to the home is 3000 feet (900 meters). The splitter’s input
to output ratio can be 1/2, 1/4, 1/8, 1/16, or 1/32.
The splitter will reduce the power of the signal and that loss is a function of
number of the outputs. The loss of the signal is represented in decibels, and the fol-
lowing equation can be used to determine the loss of signal in a splitter:
Most FTTH offers triple services such as voice, video, and Internet. The signals
are transmitted upstream and downstream by using different wavelengths. There are
three technologies that have been developed by standard bodies for FTTH
(Table 6.3):
B-PON: Broadband Passive Optical Network
E-PON: Ethernet Passive optical Network
G-PON: Gigabit Passive Optical Network
Summary 115
Summary
Key Terms
Review Questions
Objectives
After completing this chapter, you should be able to:
• Describe Ethernet access methods.
• Discuss the function of each field in the Ethernet frame format.
• Distinguish between Unicast address, Multicast address, and Broadcast address.
• Explain the different types of Ethernet media.
• Discuss Fast Ethernet technology.
• Distinguish between the different types of Fast Ethernet media.
• Explain the differences and similarities between 100BaseT4, 100BaseTX, and
100BaseFX.
• Distinguish between different types of repeaters and know the maximum net-
work diameter.
• Recognize Gigabit standards and the Gigabit Ethernet architecture.
• Identify the components of Gigabit Ethernet.
• Discuss the different types of gigabits Physical layers.
• List some of the applications for Gigabit Ethernet.
• List 10 GbE physical layers.
• Identify applications for 10 GbE.
7.1 Introduction
Ethernet was invented by the Xerox Corporation in 1972. It was further modified
by Digital, Intel, and Xerox in 1980, which lead to Ethernet II or DIX (Digital, Intel,
and Xerox). At that time, the IEEE (Institute of Electrical and Electronic Engineers)
was assigned to develop a standard for Local Area Networks. The committee that
standardized Ethernet, Token Ring, fiber optic, and other LAN technologies named
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 119
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_7
120 7 Ethernet Technologies
Logical Link
Control (LLC)
IEEE 802.2
Data link layer
Media Access
Control (MAC)
IEEE 802.3
this family of LAN standards “802.” The IEEE developed the standards for Ethernet
in 1984 and named them “IEEE 802.3.” Ethernet uses the bus topology physically
and the star topology logically. It is still widely used as it is the least expensive LAN
to implement. Figure 7.1 shows an Ethernet Bus topology.
Figure 7.2 shows how Ethernet fits into the OSI model. The Data Link layer is
divided into two sublayers: the Logical Link Control (LLC) and the Media Access
Control (MAC) layers. The function of the LLC is to establish a logical connection
between source and destination. The IEEE standard for the LLC sublayer is IEEE
802.2. The function of the Media Access Control sublayer is to access the network,
which uses CSMA/CD (Carrier Sense and Multiple Access with Collision Detection).
7.2 Ethernet Operation
Each network card has a unique physical address. When a station transmits a frame
on the bus, all stations connected to the network will copy the frame. Each station
checks the address of the frame, and if it matches the station’s NIC address, it will
accept the frame. Otherwise, the station discards the frame. In an Ethernet network,
each station uses the CSMA/CD protocol to access the network in order to transmit
information. CSMA/CD works as follows:
7.2 Ethernet Operation 121
1. If a station wants to transmit, the station senses the channel (listens to the chan-
nel). If there is no carrier, the station transmits and checks for a collision as
described in part 2. If the channel is in use, the station keeps listening until the
channel becomes idle. When the channel becomes idle, the station starts trans-
mitting again.
2. If two stations transmit frames at the same time on the bus, the frames will col-
lide. The station which first detected the collision sends a jamming code on the
bus (a jam signal is 32 bits of all ones), in order to inform the other stations that
there is a collision on the bus.
3. The two stations which were involved in the collision wait according to a back-
off algorithm (a method used to generate random waiting times for stations that
were involved in a collision), and then start retransmission. Figure 7.3 shows the
flowchart of CSMA/CD.
A block of data transmitted on the network, particularly with layer two traffic, is
called a frame. There are two types of Ethernet frame formats: the Ethernet II frame
format and the IEEE 802.3 frame format. These are shown in Fig. 7.4 and Fig. 7.6,
respectively.
Station
ready to send
Wait according to
back off Algorithm
Channel Busy
Sense the
Channel
No Collision
Transmission
complete
B0 = 0 Unicast address
B0 = 1 Multicast address
B1 = 0 Globally unique address
B1 = 1 Address is locally administrated
Start of Frame Delimiter (SFD) The SFD represents the start of a frame and is
always set to 10101011.
Destination Address (DA) The destination address is the six-byte (48 bit) hard-
ware address of a recipient station. This address is a unique address as no two are
the same in the entire world. The hardware address of the Network Interface Card
(NIC) is also called a MAC address (Media Access Control) or physical address.
The IEEE oversees the physical addresses of NICs worldwide by assigning 22 bits
of physical address to the manufacturers of Network Interface Cards. The 46-bit
address is burned into the Read Only Memory (ROM) of each NIC and is called the
universal administered address. Figure 7.5 shows the format of the destination
address with the following types of addresses:
• Unicast: Recipient is an individual station.
• Multicast: Recipients are a group of stations.
• Broadcast: Recipients are all stations in the network. The 48-bit destination
address is set to all ones, meaning that the DA address is FFFFFFFFFFFF in
Hex, for a broadcast address.
• Source Address (SA): The SA shows the address of the source from which the
frame originated.
• Protocol Type: The Protocol Type field defines the type of protocol generation
information. The following are some of the protocol type numbers.
• 0 × 0800 IP Internet Protocol (IPv4)
• 0 × 0806 Address Resolution Protocol (ARP)
• 0 × 8035 Reverse Address Resolution Protocol (RARP)
7.2 Ethernet Operation 123
Data Field According to Fig. 7.4, the data field contains the actual information.
The IEEE specifies that the minimum size of data field must be 46 bytes, and the
maximum size is 1500 bytes. If the data field is less than 46 bytes, then the MAC
layer will add as many bytes needed to reach a total of 46 bytes in the pad field..
Pad Field If the information in the data field is less than 46 bytes, extra informa-
tion is added in the pad field to increase the size to 46 bytes.
Frame Check Sequence (FCS) The FCS is used for error detection to determine
if any information was corrupted during transmission. IEEE uses CRC-32 for error
detection.
Figure 7.6 shows the IEEE 802.3 frame format. Currently, the manufacturers
producing NICs prefer to use Ethernet II due to that standard having less fields,
which results in faster processing of the frames.
Length Field The two-byte field defines the number of bytes in the data field.
Control Field The control field determines the type of information in the informa-
tion field, such as the supervisory frame, the unnumbered frame, and the informa-
tion frame.
The Preamble, SFD, DA, SA, PAD, and FCS fields of the Ethernet II frame for-
mat are similar to those of IEEE 802.3.
Destination Service Access Point (DSAP) The MAC layer passes information to
the LLC layer, which must then determine which protocol the incoming information
belongs to, such as IP, NetWare, or DecNet.
Source Service Access Point (SSAP) The SSAP determines which protocol is sent
to the destination protocol, such as IP or DecNet.
7.2.2 Ethernet Characteristics
The gap between each frame should not be less than 9.6 ms. A station can have a
maximum of ten successive collisions. The size of the jam signal is 32 bits of all 1’s.
The maximum size of the frame is 1512 bytes including the header. Slot time is the
propagation delay of the smallest frame. The smallest frame is 512 bits, and each bit
time is 10−7 seconds; therefore, the propagation delay of the smallest possible frame
is 512-bit time.
The Ethernet network uses UTP media called 10BaseT, where the 10 defines the
data rate, Base means Baseband transmission, and T means UTP cable. Figure 7.7
illustrates the port of a NIC which is used to connect a computer to a network.
10BaseT uses a UTP cable as transmission media and all stations are connected
to a repeater or hub (switch), as shown in Fig. 7.8. The function of repeater (hub) is
to accept frames from one port and retransmit the frames to all the other ports.
Table 7.1 shows the pin connection of an RJ-45 connector.
The specifications of 10Base-T are as follows:
• The maximum length of one segment is 100 m.
• The transceiver for 10BaseT is built into the NIC.
• Devices are connected to a 10BaseT hub in a physical star topology (while logi-
cally, they are in a Bus topology).
• A 10BaseT topology allows a maximum of four connected repeaters with a max-
imum diameter of 500 m.
7.2.4 UTP Cabling
There are two types of UTP cables used in networking. They are crossover and
straight-through cables, as shown in Fig. 7.9.
A straight-through cable has identical ends and is used as a patch cord in Ethernet
connections. A crossover cable is used to connect two Ethernet devices without a
hub, or for connecting two hubs (Table 7.2).
Table 7.2 Application of Device type Device type UTP cable type
straight-through and
Switch PC Straight through
crossover cables
Router PC Straight through
Switch Switch Crossover
PC PC Crossover
Router Router Crossover
Fast Ethernet is an extension of the Ethernet standard with a data rate of 100
Mbps, still using the Ethernet protocol. The goal of Fast Ethernet is to increase the
bandwidth of Ethernet networks while using the same CSMA/CD transmission pro-
tocol. Using the same protocol for Fast Ethernet allows users to connect an existing
10BaseT LAN to a 100BaseT LAN with switching devices.
One of the most popular media types for a Fast Ethernet network is unshielded
twisted-pair wire, because it is easy to work with and it is a less expensive medium.
The IEEE has approved specifications for the following three types of media for
Fast Ethernet:
• 100BaseT4: 100 Mbps, Baseband, 4 pair Cat-3 cabling
• 100BaseTX: 100 Mbps, Baseband, Cat-5 cabling
• 100BaseFX: 100 Mbps, Baseband, fiber-optic cabling
100BaseTX technology supports 100 Mbps over two pairs of Cat-5 UTP cables.
Cat-5 UTP cabling is the most common media for transmission and is designed to
handle frequencies of up to 100 MHz. Manchester encoding, which is used for
10BaseT, is not suitable for 100BaseT because it doubles the frequency of the origi-
nal signal. 100BaseT uses 4B/5B encoding with Multiple Level Transition-3
(MLT-3) levels for signal encoding. Figure 7.10 shows the hex value (0E)16 con-
verted from eight to ten bits (1111011100) using the 4B/5B encoding shown in
7.3 Fast Ethernet Networking Technology 127
+V
1 1 1 1 0 1 1 1 0 0
-V
Table 7.3. That is then converted to MLT-3. MLT-3 reduces the frequency of the
signal by a factor of four.
MLT encoding uses three voltage levels: +V, -V, and Zero. The MLT encoding
rules are as follows:
1. If the next bit of the original signal is zero, then the next output is the same as the
preceding value.
2. If the next bit of original signal is one, then the next output value has a transition
(high to low or low to high).
(a) If the preceding output was either +V or –V, then the next output value
is zero.
(b) If the preceding output was zero, then the next output is nonzero (it is the
opposite sign of the last none-zero output).
100BaseFX technology transfers data at a rate of 100 Mbps using fiber-optic
media for transmission. The standard cable for 100BaseFX is one pair of multimode
fiber-optic cables with a 62.5-micron core and 125-micron cladding. The EIA
128 7 Ethernet Technologies
Class II Optical
Tx Rx Tx Rx Tx Rx
100Base-Fx Tx
NIC Rx
Repeaters are used to expand the network diameter. There are two types of repeaters
used in Fast Ethernet: Class I repeaters and a Class II repeaters. The Class I repeater
converts line signals from the incoming port to digital signals. This conversion
allows different types of Fast Ethernet Technology to be connected to LAN seg-
ments. For example, it is possible to connect a 100BaseTX station to a 100BaseFX
station by using a Class I Repeater. A Class II repeater repeats the incoming signal
and sends it to every other port on the repeater. Most networks now use the switch,
a layer two device, to expand a network.
With recent advances in the PCI bus and CPU technologies, workstations are getting
faster. Today’s PCI bus can transfer data at gigabit speed. A 64-bit PCI bus runs at
533 MHz and can transfer data at up to 6.4 gigabits per second. Gigabit Ethernet
7.4 Gigabit Ethernet Technology 129
transfers data at one gigabit per second, or 10 times faster than Fast Ethernet.
Gigabit Ethernet is technology compatible with Ethernet and Fast Ethernet, and it is
used for backbones with gigabit switches.
Gigabit Ethernet is used for the campus backbone by connecting gigabit switches
together. The switches operate in store-and-forward or cut-through technology. The
IEEE 802 committee has developed a standard protocol called Quality of Service
(IEEE 802.1p) which corresponds to the network layer of the OSI model. The
IEEE802.1p standards provide tagging for each frame, indicating the priority or
class of the service desired for the frame to be transmitted.
In 1995, the IEEE 802.3 committee formed a study group called the IEEE 802.3z
Task Force to research and develop standards for Gigabit Ethernet. In 1996, the
Gigabit Ethernet Alliance was formed by more than 60 companies to support the
development of Gigabit Ethernet.
Gigabit Ethernet is used for linking Ethernet switches and Fast Ethernet switches,
as well as for interconnecting very high-speed servers. Gigabit Ethernet enables
organizations to upgrade their networks to 1000 Mbps while using the same operat-
ing systems and the same application software. The following are the characteristics
of Gigabit Ethernet:
• Operates at 1000 Mbps (1 Gbps)
• Uses the IEEE 802.3 frame format and maximum frame size
• Supports full-duplex and half-duplex operation
• Uses the CSMA/CD access method for half-duplex operation and supports one
repeater per collision domain
• Uses optical-fiber and copper wire for transmission media
• Supports 200-m collision domain diameters
Figure 7.12 shows the Gigabit Ethernet physical layer, and Table 7.4 shows the dif-
ferent cable types and maximum distances for signal transmission over Gigabit
Ethernet.
130 7 Ethernet Technologies
UPPER LAYER
Serializer / Deserializer
the receiver receives the first bit of the frame. Fast Ethernet overcomes this problem
by reducing the size of the cable, and Gigabit Ethernet increases the minimum size
of the frame from 64 bytes to 512 bytes by adding carrier extensions to the Ethernet
frame. Figure 7.13 shows the minimum frame size for Gigabit Ethernet.
The IEEE 802.3ae task force completed the standard for 10 Gigabit Ethernet (10
GbE) in March 2002. The 10 Gigabit Ethernet standard defines two types of physi-
cal layers: the LAN physical layer (LAN PHY) and the WAN physical layer
(WAN PHY). The WAN physical layer operates at the rate that is compatible with
OC-192C and it uses Wave Division Multiplexing (WDM).
Applications of 10 Gigabit Ethernet for LANs are:
• Connecting a server to a switch with 10GbE
• Connections between switches
Applications of 10 Gigabit Ethernet for WAN are:
• Connecting two campus networks
• Storage Network Architecture (SNA)
• Connecting multiple networks in one metropolitan area with 10 GbE to offer
services such as distance learning and video conferencing
Figure 7.14 shows the physical layer for 10 Gigabit Ethernet. It consists of serial
transmission and Wave Division Multiplexing (WDM). Serial transmission uses dif-
ferent types of laser wavelengths. The following are different physical medium defi-
nitions for 10 Gigabit Ethernet. The 10 Gigabit Ethernet types and transmission
distance are displayed in Table 7.5.
• 10GBASE- SR
• 10GBASE-SW
• 10GBASE- LR
• 10GBASE-LW
• 10GBASE-ER
• 10GBASE-EW
• 10GBASE-LX4
Fig. 7.14 Physical layer of 10 Gigabit Ethernet. (CWDM means Coarse Wave Division
Multiplexing)
Summary 133
The suffix for Gigabit Ethernet consists of three characters: the first character
indicates the wavelength of the laser, S, L, or E, where:
S represents a short wavelength laser with a wavelength of 850 nm.
L represents a long wavelength laser with a wavelength of 1310 nm.
E represents an extended long wavelength laser with a wavelength of 1550 nm.
The second letter of the suffix represents the type of physical layer where:
R means physical layer for LAN.
W means physical layer for WAN.
Summary
• Fast Ethernet uses Class II repeaters to connect stations having the same type of
network Interface Card.
• Gigabit Ethernet has a data rate of 1000 Mbps.
• 10 Gigabit Ethernet has a data rate of 10,000 Mbps.
Key Terms
Review Questions
18. Gigabit Ethernet uses ___________ access method for half-duplex operation.
(a) CSMA/CD
(b) Token passing
(c) Demand priority
(d) None of the above
19. Gigabit Ethernet uses ________ encoding.
(a) Manchester
(b) Differential Manchester
(c) 8B/10B
(d) 4B/5B
20. 1000BaseFX uses ____________ cable for transmission of data.
(a) UTP
(b) Fiber-optic cable
(c) Coaxial
(d) STP
21. What type of protocol should be added to Gigabit Ethernet in order to carry
voice and video information?
(a) TCP
(b) IP
(c) 802.1p
(d) RSVP
22. Gigabit Ethernet can operate in
(a) Full duplex
(b) Half duplex
(c) a and b
(d) None of the above
23. Gigabit Ethernet uses the CSMA/CD access method for_____.
(a) Half duplex
(b) Full duplex
(c) a and b
(d) None of the above
24. What is the transmission medium for 1000BaseT?
(a) Cat-5 UTP
(b) Cat 4 UTP
(c) Coaxial cable
(d) Fiber cable
138 7 Ethernet Technologies
Objectives
After completing this chapter, you should be able to:
• List LAN Interconnection devices.
• Describe the function and operation of a repeater.
• Describe the function and application of a bridge.
• Explain switch operation
–– Discuss the applications of LAN switching
–– Distinguish between symmetric and asymmetric switches
• Identify the application of a L2 switch, L3 switch and L4 switch.
• Discuss the application of virtual LANs.
• Understand the function of a router and the layers of the OSI model correspond-
ing to a router.
• Describe the function and application of a gateway.
Introduction
Local area network (LAN) interconnection devices are used to expand the LAN to
cover a larger geographical area and divide the traffic load by internetworking. By
linking local area networks (LANs) to form a single network, such as separate
LANs of different floors of a building or LANs in separate buildings, networks can
be connected so that all computers in one site are linked. The devices discussed in
this chapter are used for linking LANs together and can be distinguished by the OSI
(Open system interconnection) layer at which they are operating.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 141
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_8
142 8 LAN Interconnection Devices
8.1 Repeaters
8.2 Bridges
Functions of a Bridge
The function of a bridge is to analyze the incoming destination address of a frame
and make a forwarding decision based on the location of the station. Figure 8.3
shows a bridge that is used to connect two Ethernet LANs together. For example, if
station A sends a frame to station B, the bridge gets the frame and sees that station
B is in the same segment as A and discards the frame. However, if station A for-
wards a frame to station C, the bridge would realize that station C is in a different
LAN segment, so the bridge then forwards the frame to station C. The bridge for-
wards the data from one LAN to another without alteration of the frame. Bridges
allow network administrators to segment their networks transparently, meaning that
the individual station does not need to know that there is a bridge in the network.
Bridges are capable of filtering, which is useful for eliminating unnecessary
broadcast frames. They can also be programmed not to forward frames from spe-
cific sources. By dividing a large network into segments and using a bridge to link
the segments together, the throughput of the network will increase. If one segment
of the network has failed, the other segments connected to the bridge can keep the
network alive. Bridges also extend the length of the LAN. While stations A and B
are communicating with each other, stations C and D can communicate with each
other simultaneously.
Learning Bridge or Transparent Bridge The learning bridge requires no initial
programming. It can learn the location of each device by accepting a frame from the
network segment and recording the MAC address and the port number. The frame
comes to the bridge, which then retransmits the frame to all the segments of the
network except the segment which sent the frame. By using this method, the learn-
ing bridge learns which station is connected to which segment of the network.
8.3 Switch
Layer 2 Switching (L2 Switch) A layer 2 switch (L2 switch) operates in the data
link layer of the OSI model. It is used for network segmentation and for creating
workgroups. The operation of a Layer 2 switch is similar to that of a multiport
bridge, where a frame enters the switch from one port and is forwarded to the
intended port based on the MAC address of the frame. A frame with a broadcast
address will be repeated to all ports of the switch. During this process, a layer 2
switch learns the MAC addresses of the hosts connected to each port and creates a
switching table which maps MAC addresses to port numbers, as seen in Table 8.1.
The switch makes this table, called a switch forwarding table, through a learning
method. When PC1 sends a packet to PC2, the switch recognizes that PC1 is
connected to port 1, and when PC2 sends a packet to PC1 the switch recognizes that
PC2 is connected to port 2. The switch then uses this table to forward frames to the
proper ports. Figure 8.4 shows a 4-port switch with 4 PCs and their MAC addresses
represented by MAC1 through MAC4.
Figure 8.5 shows two connected switches: switch 1 and switch 2. The forwarding
table for switch 1 can be seen in Table 8.2. Assume that PC1 needs to send a packet
to PC5. In order to forward the packet to PC5, switch 1 must check the destination
MAC address of PC5 by consulting its switch forwarding table. Since the MAC
address for PC5 is not listed in its table, switch 1 forwards the packet to default port
4, which then forwards the packet to default port 5 of switch 2. When the packet
reaches switch 2, switch 2 then uses the information on its forwarding table to for-
ward the packet to PC5.
8.3 Switch 145
MAC4 Default
The spanning tree protocol is used to ensure a loop-free topology in a network with
multiple switches or bridges. A switch will forward a broadcast and multicast frame
to all of its ports. If there is a loop on the network, then the packet will travel in the
loop continuously. Figure 8.6 shows a network with a connection loop.
In order to overcome loop problems, each switch runs the spanning tree algo-
rithm (STP), also known as the standard IEEE 802.1d. The STP operation is
described in the following steps:
1. Each switch is identified by an 8-byte ID. This ID is a combination of a two-byte
priority field and the switch’s 6-byte MAC address.
2. The switches exchange their IDs using Bridge Protocol Data Units (BPDU). The
switch with the lowest ID is elected as the root bridge/switch.
3. The root bridge/switch places all its ports in the forwarding state.
4. Each nonroot bridge/switch finds the shortest path to the root bridge. The port
used for shortest path to root bridge is call root port and is placed in forward-
ing state.
5. If a switch has more than one path to the root bridge, all ports not in the forward-
ing state are placed in the blocking state.
146 8 LAN Interconnection Devices
Ethernet is one of the most popular LAN technologies because it uses unshielded
twisted-pair cables. However, when the number of stations increases in an Ethernet
LAN, the number of collisions also increases, and performance decreases accord-
ingly. In order to increase the performance of an Ethernet LAN, it can be seg-
mented with each of the segments connected to switch ports. In Fig. 8.7, each
segment acts as an independent LAN and each segment similarly has its colli-
sion domain.
8.3.3 Switch Classifications
1. Symmetric switching provides switching between segments that have the same
bandwidth. For example, 10Mbps to 10Mbps or 100Mbps to 100Mbps.
2. Asymmetric switching provides switching between segments of different band-
widths. For example, 10Mbps to 100Mbps or 100Mbps to 10Mbps.
A layer 3 switch (L3 switch) is a type of router that uses hardware rather than soft-
ware. An L3 switch, sometimes called a routing switch, uses ASIC switching tech-
nology. This switch operates on the Network layer of the OSI model. The function
of an L3 switch is to route the packet based on the logical address (layer 3) informa-
tion. An L3 Switch accepts the packet from the incoming port and forwards the
packet to the proper port based on a logical address, such as an IP address. In order
to increase performance, the switch finds the route for the first packet and estab-
lishes a connection between the incoming and outgoing port for transferring the rest
of the packets. This is called “route once and switch many.”
8.4 Virtual LAN
A virtual LAN (VLAN), also known as the IEEE 802.1q standard, is a configura-
tion option on a LAN switch that allows network managers the flexibility to group
or segment ports on an individual switch into logically defined LANs. There are two
immediate benefits from a VLAN. First, it provides a way for network administra-
tors to decrease the size of a broadcast domain and second, VLANs can provide
security options for administrators. A VLAN is one way to prevent hosts on virtual
segments from reaching one another. Another application of a VLAN is for logical
segmentation of workgroups within an organization.
Port-Based VLAN In this method, VLAN membership is based on a switch port
where the network administrator assigns each port of the switch to a specific VLAN
ID. Only the stations connected to ports with same VLAN ID can communicate
with each other. For example, Fig. 8.8 shows a four-port switch where ports 1 and 2
are assigned to VLAN ID 10 and ports 4 and 5 are assigned to VLAN ID 20. In this
case, PC1 and PC2 can only communicate with each other and PC3 and PC4 can
only communicate with each other.
8.4.1 VLAN Operation
IEEE 802.1q developed a standard for the tagging of a frame for use with
VLAN. The IEEE 802.1q defines a method which allows a switch to add a tag to the
frame. It can process an untagged frame or a tagged frame. Figure 8.9 shows an
IEEE 802.1q frame format. The tag is 4 bytes and is inserted between the source
address (SA) and type/length field in the Ethernet frame format.
The functions of each subfield of the Tag field are described below:
TPID (Tag Protocol Identifier): This field is 16 bits and is set to 8100 (Hex) to
identify the frame in IEEE 802.1q.
Priority: This field is 3 bits and identifies the priority of the frame.
CFI (Canonical Format Indicator): The CFI bit is mainly used for compatibility
between Ethernet and token ring Networks and is set to 0 for Ethernet Switches.
VID (VLAN ID): This field is 12 bits and represents the VLAN number to which the
frame belongs.
8.5 Routers
A router operates at the network layer of the OSI model to route a frame from one
LAN to another using a routing algorithm, as shown in Fig. 8.10.
8.5 Routers 149
The main function of a router is to determine the optimal data path and transfer
information using that path. Figure 8.11 shows how routers can be used to connect
several LANs together at different locations. Node A has a frame for Node B, so the
Node A transmits the packet to Router A for it to find the best route to Router B,
who then finally transmits the packet to Node B.
A router which can be configured manually by a network administrator is called
a static router and a router that is configured by itself is called a dynamic router. In
a static router, the routing table is administered manually by the network adminis-
trator who determines the route. In a dynamic router, the router uses routing algo-
rithm to find the best route and updates it routing table automatically. The dynamic
router also exchanges information with the next router on the network.
150 8 LAN Interconnection Devices
8.6 Gateways
Gateways operate up to the application layer, as shown in Fig. 8.12. The application
of a gateway is to convert one protocol to another protocol. Figure 8.12 shows a
network with IBM SNA (System Network Architecture) connected through a gate-
way, with an LAN running the TCP/IP protocol.
Summary
• A switch accepts a packet from one port and examines the destination address; it
then retransmits the packet to the port having a host with the same destination
address.
• When the number of users is increased in an Ethernet LAN, the number of colli-
sion will increase. To overcome this problem, Ethernet LAN can be segmented,
with each segment connected to a port on a switch.
• Symmetric switch: It provides switching between LAN segments with the same
data rate.
• Asymmetric switch: It provides switching between LAN segments with different
data rates.
• Virtual LAN (VLAN): The IEEE802.10 committee approved the standard for
VLAN. In VLAN, the switch port can be enabled and disabled by a network
administrator. The administrator can also connect several ports to make a VLAN.
• Layer 2 switch: A multiport device that operates on layer 2 of the OSI model.
• Layer 3 switch: A type of router that uses integrated switching technology.
• A router is used to route a frame from one LAN to another LAN according to its
routing table. Routers operate in the network layer of the OSI model.
• A gateway is used to convert one protocol to another protocol and operates in all
seven layers of the OSI model.
Key Terms
Review Questions
Objectives
After completion of this chapter, you should be able to:
• Discuss the history of the Internet.
• List the applications of the Internet and explain the function of each application
protocol.
• Explain the function of the Internet Architecture Board (IAB).
• List Transmission Control Protocol and Internet Protocol (TCP/IP) and describe
the service of each protocol.
• Distinguish between IP address classes and understand how IP addresses are
assigned to a network of an organization.
• Show the TCP/IP reference model.
• Show the User Datagram Protocol (UDP) packet format and define the function
of each field.
• List the applications protocol for Transmission Control Protocol (TCP).
• Describe the function of TCP, show the TCP packet format, and describe the
function of each field.
• Explain the function of Internet Protocol (IP) and identify IP packet format.
• Explain TCP connection and disconnection.
• Show the IPv6 format and explain the function of each field.
• Describe the advantages of IPv6.
Introduction
The term Internet, short for Internetwork, describes a collection of networks that use
the TCP/IP (Transmission Control Protocol and Internet Protocol) to communicate
among nodes. These networks are connected through routers and gateways.
Figure 9.1 shows an organization whose networks are connected by router to the
Internet through an external gateway.
In 1968, the United States Department of Defense (DOD) created the Defense
Advanced Research Project Agency (DARPA) for research on packet-switching
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 155
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_9
156 9 Internet Protocols Part I
Website: www.internic.net
E-mail: [email protected]
Mailing address: Network Information Center
333 International
Menlo Park, CA 94025.
Any organization that obtains a network IP address will submit its server’s name
to InterNIC. InterNIC will ensure that no two servers have the same name. For
Example: elahia1@ southernct.edu is the author’s Internet address. Reading from
right to left, the above domain name consists of:
edu: A top level domain which represents that Elahi is at some US educational site.
southernct: Represents the organization which owns the machine that has informa-
tion about Elahi’s IP address.
The application level enables the user to access the Internet. The following are com-
mon Internet applications:
• Simple Mail Transfer protocol (SMTP)
• Telnet
• File Transfer Protocol (FTP)
• Hyper Text Transfer Protocol (HTTP)
• Simple Network Management Protocol (SNMP)
• Domain Name System (DNS)
Simple Mail Transfer Protocol (SMTP)
SMTP is used for E-mail (electronic mail), which is used for transferring messages
between two hosts. To send a mail message, the sender types in the address of the
recipient and a message. The electronic mail application accepts the message/mail
(if the address is right) and deposits it in the storage area/mailbox of the recipient.
The recipient then retrieves the message from his/her mailbox.
An E-mail address (or just “email”) is made up of a Username @ Mail Server
Address. For example, in [email protected], “Elahia1” is the username and
“southernct.edu” is the domain name of the mail server. The “southernct” stands for
Southern Connecticut State University, and “edu” stands for education.
Some email addresses are little more complicated, for example, Elahi@scsu1.
southernct.edu. Here, “Elahi” is the username, “scus1” is the name of a workstation
that is a part of “southernct,” and “edu” is the top-level domain representing an
education center.
Telnet or Remote Login
Telnet is one of the most important Internet applications. It enables one computer
to establish a connection to another computer. Users can login to a local computer
and then remote login across the network to any other host. The computer establish-
ing the connection is referred to as the local computer and the computer accepting
the connection is referred to as the remote or host computer. The remote computer
could be a hardwired terminal or a computer in another country. Once connected,
the commands typed in by the user are executed on the remote computer. What the
user sees on their monitor is what is taking place on the remote computer.
Remote login was originally developed for Berkeley UNIX to work with the
UNIX operating system only, but it has since been ported to other operating sys-
tems. Telnet uses the client/server model. That is, a local computer uses a Telnet
client program to establish the connection. The remote or host computer runs the
Telnet server version to accept the connection and sends responses to requests.
File Transfer Protocol (FTP)
File Transfer Protocol (FTP) is an Internet standard for file transfer. It allows Internet
users to transfer files from remote computers without having to log into them. FTP
establishes a connection to a specified remote computer using FTP remote-host-
address. Once connected, the remote host will ask the user for identification and a
password. Upon compliance, the user can download or upload files.
9.4 Transport Level Protocols: UDP and TCP 161
Some sites make files available to the public. To access these files, users can
enter anonymous or guest for identification and use his/her Internet address as a
password. This application is called anonymous FTP.
Hyper Text Transfer Protocol (HTTP)
HTTP is an advanced file retrieving program that can access distributed and linked
documents on the Web. Messages in HTTP are divided into request and response
categories and work on the client/server principle. The request command is sent
from the client to the server. The response command is sent from the server to client.
HTTP is a stateless protocol which treats each transaction independently. A con-
nection is established between a client and a server for each transaction and is ter-
minated as soon as the transaction is complete.
Simple Network Management Protocol (SNMP)
SNMP provides information for monitoring and controlling a network. It is used by
network administrators to detect problems in networks such as issues with routers
and gateways. SNMP is divided to the two parts; SNMP management system and
SNMP agent. The SNMP management system issues commands to the SNMP
agent, and the SNMP agent responds to the commend. The SNMP management
system can mange network devices remotely.
DNS (Domain Name System)
DNS provides a way for users to easily remember websites. Memorizing a word
such as “Yahoo” is much easier than memorizing numbers like “67.195.160.76”;
therefore, the host name of a website is represented by a word rather than an IP
address. However, for a client computer to access a website, send an E-mail, or con-
nect to another computer through the Internet, the client computer must have the IP
address of the destination. To obtain the IP address of the host, the client uses DNS
to consult the DNS server and translate the word to the corresponding IP address.
The Transport level of the TCP/IP protocol consists of UDP (User Datagram
Protocol) and TCP (Transmission Control Protocol). The UDP protocol performs
an unreliable connection service for receiving and transmitting data. TCP performs
reliable delivery of data by adding a sequence number to each packet. When a
packet reaches its destination, the destination acknowledges the sequence number
of the next packet that it expects to receive.
Some User Datagram Protocol (UDP) applications are Trivial File Transfer Protocol
(TFTP) and Remote Call Procedure (RCP). UDP accepts information from the
Application level and adds the source port, destination port, UDP length, and UDP
162 9 Internet Protocols Part I
Application
TFTP,RCP
Application layer Data
UDP Datagram
IP Datagram
Network
Data Link MAC Frame Header IP Datagram FCS
Interface Card
Layer
Ethernet or Token Ring Format
Transmission Media
0 31
Source Port 16 bits Destination Port 16 bits
Define application, TFTP is port 69 Specifies Destination port on server
UDP Length 16 bits Checksum 16 bits
Define number of bytes in UDP header Checksum use for error detection of UDP
and data header and data
DATA
checksum. The resulting packet is called a UDP datagram packet with a total header
length of eight bytes. The UDP protocol then passes the UDP packet to the IP. The
IP adds its own header to the packet and passes the packet to the Logical Link
Control (LLC). The LLC generates an 802.2 frame (LLC frame) and passes the
LLC frame to the Medium Access Control (MAC) layer, which adds its own header
and transfers the frame to the physical layer for transmission, as shown in Fig. 9.5.
UDP allows applications to exchange individual packets over a network as data-
grams. A UDP packet sends information to the IP for delivery. There is no guaran-
teed reliability. Figure 9.6 shows the UDP packet format.
Most applications prefer to use reliable delivery of information. TCP offers reliable
delivery of information through the Internet and gives users a way to transmit data
in a reliable fashion. In TCP, before data are transmitted to the destination, a logical
connection (not a physical connection) must be established before the information
9.4 Transport Level Protocols: UDP and TCP 163
Application
FTP, Telent, SMTP Application layer Data
HTTP
IP Datagram
Transmission Media
is transmitted. TCP assigns a sequence number to each packet. The receiving end
checks the sequence number of all packets to ensure that they are received. When
the receiving end gets a packet, it responds to the destination by acknowledging the
next sequence number. If the sending node does not receive an acknowledgment
within a given time, it retransmits the previous packet.
Figure 9.7 shows application data passing through TCP. TCP adds a 20-byte
header and passes it to the IP. The IP adds its own header and passes it to a Network
Interface Card (NIC). The NIC adds a MAC header to the information and transmits
the packet. Figure 9.8 shows the TCP packet format.
The following describes the function of each field in a TCP packet:
Sequence number: The number label for each packet sent by the source.
ACK sequence number: Acknowledges the next packet expected to be received
from the source.
Header length: Identifies the length of the header in 32-bit word.
Flag bits: Six bits used for establishing a connection and disconnection.
URG: Urgent Pointer is set to “1” when that field contains urgent data.
ACK: ACK bit is set to “1” to represent that the acknowledge number is valid.
PSH: Set to “1” means the receiver should pass the data to an application as soon as
possible.
RST: Resets connection.
SYN: Set to “1” when a node wants to establish a connection.
FIN: Set to “1” means this is the last packet.
164 9 Internet Protocols Part I
Port Numbers
A port number is a logical channel in a communications system. The Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP) use port numbers to
demultiplex messages to an application. Each application program has a unique port
number associated with it. TCP/IP port numbers are between 1 and 65,535. The
well-known ports are those from 0 to 1023 which are assigned by the IANA. Registered
ports are those numbers from 1024 through 49,151. Dynamic or private port num-
bers range from 49,152 through 65,535. Table 9.2 shows a few commonly used port
numbers.
9.5 Internet Level Protocols: IP and ARP 165
Internet level protocols consist of the IP, Address Resolution Protocol (ARP),
Reverse ARP, and Internet Control Message Protocol (ICMP).
Internet Protocol Version 4(IPv4)
The function of IP is packet delivery with unreliable and connectionless service.
These Internet datagrams are also called IP datagrams. All TCP, UDP, ICMP, and
ARP data are transmitted as IP datagrams. Figure 9.9 shows an IP datagram
packet format.
The following describes the function of each field in an IP packet:
Version: Contains 4-bit IP version number, and the current number, which is
4 (IPV4).
Header length: Represents the number of 32-bit words in the header. If there are no
IP options and padding, header length is 20 bytes (5 words). IP is an unreliable
service so there is no acknowledgment from the destination to the source. There
is also no physical connection between the source and destination. As such, IP
datagrams can arrive at the destination out of order.
Type of services (TOS): TOS is 8 bits. For most purposes, the values of all bits in
TOS are set to zero; meaning that the normal service unused bit is always zero.
Precedence indicates the importance of a datagram (0 is normal, 1 is next impor-
tant). TCP/IP Protocol ignores this field.
31
IP Version Header Length 4 bits Type of the Total Length 16
4 bits (current Define number of 32-bit Service(TOS) 8 bits bits specifies the
version is 4) words in the header specifies how the length of IP
datagram should be datagram including
handled the header in bytes.
Identification Flags 3 bits Fragment Offset 13 bits
16 bits used by currently uses the first 2 bits contains the offset of the fragment
destination to DF and MF bits, DF=1 from the beginning of the original
identify different means do not fragment, datagram
datagram from one MF=1 means More
file fragments are coming
Time-to-Live TTL Protocol 8 bits Header Checksum 16 bits
8 bits specifies specifies the protocol which the 16 bit one’s complement sum of
number of routers data belongs to such as the header
the datagram can TCP, UDP, ICMP
pass
Source IP Address 32 bits
IP address of sending machine
Destination IP address 32 bits
IP address of receiving information
Options if Any Padding
Data
0 1 2 3 4 5 6 7
Precedence D T R Unused
D, T, and R identify the type of transport the datagram requests. D is for Delay,
T is for throughput, and R is for reliability.
D=0 Normal delay
D=1 Low delay
T=0 Normal throughput
T=1 High throughput
R=0 Normal reliability
R=1 High reliability
Total length: This field identifies the total length of the datagram (including the
header) in bytes.
Identification: This is a number created by the sending node. This number is
required when reassembling fragmented messages. The identification field is
used by the destination to put together related datagrams.
Fragmented offset field: The offset field represents the offset of data in multiples
of eight; therefore, the fragment size should be multiples of eight.
Example: 1000 bytes are to be transferred over a network with an MTU of 256
bytes. Assume the header of each datagram is 20 bytes. Find the number of data-
grams if the following information is given:
1. Identification: Can be any number
2. Total Length
3. Frame Offset
4. More Fragment
256–20 = 236 bytes
8 * 30 = 240
8 * 29 = 232. Each fragmented datum contains 232 bytes.
Identification 20 20 20 20 20
Total length 232 + 20 232 + 20 232 + 20 232 + 20 72 + 20
Of each packet
Fragmented offset 0 29 58 87 116
MF 1 1 1 1 0
Example: 5480 bytes are being transferred from the FTP protocol to TCP for
transmission. Show the fragment offset of the IP header:
9.5 Internet Level Protocols: IP and ARP 167
Header checksum: This field is the checksum of the header (not the data field). The
checksum is the sum of the one’s complement of the 16-bit word of the header.
Sending address: This is the IP address of the source.
Destination address: This is the IP address of the destination.
Maximum Transfer Unit (MTU)
The Maximum Transfer Unit (MTU) is the largest frame length that can possibly be
sent over a given physical medium as there is a limit on frame size. For example,
802.3’s maximum frame size is 1500 bytes. If the datagram is larger than the MTU,
the datagram is fragmented into several frames, each less than the MTU. Table 9.4
shows MTU values for a few common network types:
168 9 Internet Protocols Part I
9.6 IPv4 Addressing
An IPv4 address is a 32-bit number which forms a unique address for each host con-
nected to the Internet. No two hosts can have the same IP address. The assignment
and maintenance of IP addressing is maintained by InterNIC. An IP address is writ-
ten in dotted decimal (Base10) notation and is represented by four 8-bit binary num-
bers with the range of 0 to 255 (4 × 8 = 32 bits).
Binary (Base2) 00000000 to 11111111
Decimal (Base10) 0 to 255
IP addresses are organized into the following five classes:
1. Class A IP Address
The Class A IP address, as seen in Fig. 9.10, is used for organizations with a large
number of users connected to the Internet and a small number of networks.
9.6 IPv4 Addressing 169
7 bits 24 bits
0 NET ID HOST ID
3. Class C IP Address
A Class C address, as seen in Fig. 9.12 is used for networks with a small number
of hosts (those networks whose number of hosts does not exceed 255).
The first 3 bits of a Class C address are 1, 1, and 0.
Twenty-one bits are used for Network ID, and 8 bits are used for the Host ID.
A Class C IP address can handle 221 networks, where each network can have 256
host IDs.
The range of a Class C Network ID is from: The IP address of 192.0.2.1 was
never assigned and used for test purposes only.
4. Class D IP Address
Class D address is reserved for multicasting. In multicasting, a packet is sent to
a group of hosts.
The range of a Class D Network ID is from 224.0.0.0 to 239.255.255.255. The
IP address format for Class D addresses can be seen in Fig. 9.13.
5. Class E IP Address
Reserved for research, the range of a Class E addresses is from 240.0.0.0 to
247.255.255.255.
170 9 Internet Protocols Part I
14 bits 16 bits
1 0 NET ID HOST ID
21 bits 8 bits
1 1 0 NET ID HOST ID
28 bits
1 1 1 0 MULTICAST GROUP ID
X .Y .Y .Z / n
where n defines the number of bits for the Network Prefix. For example, the Class
C IP address 192.10.20.1 uses 24 bits for the prefix and 8 bits for the host ID, which
means that it can generate 256 IP addresses. This Class C IP address can be used as
a CIDR address based on the number of Host IDs needed to determine prefix bits. If
n = 16, then the IP address 192.10.10.1/16 has 16 bits for the network prefix and 16
bits for the host ID. Therefore, it can generate 216 IP addresses where the starting
address is 192.10.0.0/16 and the ending address is 192.10.255.255.
Assume a company needs 1000 IP addresses and only Class C addresses are
available. This company is only able to use Class C addresses as classless addresses
to assign the IPs to the interfaces.
CIDR Address Assignments
The IANA (Internet Assigned Numbers Authority) allocates a block of IP address to
each ISP (Internet Service Provider). The ISP then distributes these IP addresses to
their customers.
Assume a Network Information center allocates the block IP address
206.0.64.0/18 to Comcast. Comcast will have 232–18 = 214 IP addresses. If an organi-
zation requires 800 IP addresses, then Comcast will give the following addresses to
the organization.
210 = 1024 therefore, comcast allocates 10 bits of its host ID to this
organization.
9.6 IPv4 Addressing 171
168.194.168.82 / 27 = 10100111.11000010.10100000.01010010
where the least significant 5 bits are for the Host ID.
b. The starting address is: 10100111.11000010.10100000.01000000.
The last address is 10100111.11000010.10100000.01011111.
Example 9.2 An organization is granted IP addresses 15.24.74.0/24. The organiza-
tion has three networks. Network A with 120 addresses, Network B with 60
addresses, and Network C with 32 addresses. Assign addresses to each network.
The size of the Host ID is 32–24 = 8 bits. So, the total number of addresses avail-
able for the organization is 28 = 256.
Network A requires 120 addresses that use 7 bits for the host ID, where 27 = 128
addresses.
Network A’s IP addresses start at 00001111.00011000.01001010.00000000/25.
The ending address for Network A is 00001111.00011000.0100101
0.01111111/25.
Network B requires 60 addresses, so it requires 6 bits, where 26 = 64 addresses.
The starting address of Network B is the next address after the ending address of
Network A.
The starting address of Network B is 00001111.00011000.0100101
0.10000000/26.
The ending address of Network B is 00001111.00011000.01001010.10111111/26
.
Network C requires 32 addresses, and it uses 5 bits for the Host ID. The starting
address of Network C is the next address after the ending address of network B.
The starting address of Network C is 00001111.00011000.0100101
0.11000000/27.
The ending address of Network C is 0 0001111.00011000.01001010.11011111/27.
172 9 Internet Protocols Part I
Loopback IP Address
The last address of each class is used as a loopback address for testing. The loop-
back address is used on a computer to communicate with another process on the
same computer.
The loopback addresses are:
Class A 127.0.0.1
Class B 191.255.0.0
Class C 223.255.255.0
Network Addresses
The host portion of network address is set to zero. For example, 129.49.0.0 is a
network address, not a node address. No node is assigned to 0.0.
Broadcast Addresses
The host portion is set to all ‘1’s in a broadcast. A packet with a broadcast address
is sent to every node in the network. For example, address 129.49.255.255 is a
broadcast address.
Private IP Addresses
The following IP addresses are reserved for ‘private’ networks
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
169.254.0.0 to 169.254.255.255.
Most universities will have networks connected to the Internet, as shown in Fig. 9.14.
The network administrator must contact InterNIC and obtain an IP address for the
University. The InterNIC assigns a Class B address with a network ID of 129.47 (the
first two bytes of the IP address). From these two bytes the network administrator
must decide how many bits are needed for each subnetwork. This is determined by
analyzing the growth of the network and the future needs of the university. In this
example, we use one byte to represent our sub network address.
The subnetwork ID is 8 bits, implying that we can have 256 networks in the uni-
versity with 255 nodes each. Each subnet ID is prefixed with the network ID. The
following subnet IDs are assigned to each department as follows:
9.7 Assigning IP Addresses to a Network 173
Address Mask
Address masks are used to define how many bits of an IP address are allocated for
the host ID. It is used to separate the network address from a host ID. In the above
example, the least significant byte is used for a host ID, as shown in Fig. 9.15.
In a TCP Connection, the client first establishes a connection with the server before
any information is transmitted. This connection process, commonly referred to as
TCP three-way handshaking, is shown below in Fig. 9.16. The following steps
describe the TCP connection set up.
1. The client sends a SYN packet to the server by setting the SYN flag to one and
selecting a sequence number in TCP packet format (assume the sequence num-
ber is X).
2. The server responds to the Client by setting the SYN bit to 1, the ACK bit to 1,
the acknowledge field to X + 1, and the sequence number to Y (sequence number
of server). This packet is called a SYN-ACK packet.
3. The client then transmits the ACK packet with the ACK bit set to one, the
Sequence number set to X + 1, and the ACK number (ACKnum) set to Y + 1.
4. Now that the connection has been established, the client sends 200 bytes of data
to the server with sequence number X + 1, ACKnum Y + 1, and the ACK bit
set to 1.
5. The server responds by sending 100 bytes of data back to the client, with the
ACK bit set to 1 and the ACKnum set to X + 201. The ACKnum is the sum of the
sequence number and the number of bytes received.
6. The client then responds with the ACK bit set to one, the sequence number
X + 201, and the ACKNum Y + 101.
TCP Disconnection When the source sends the last packet to the destination, the
source sets FIN to 1 to inform the destination that this is the last packet. The destina-
tion acknowledges the last packet and sets the FIN to 1 to inform the source that the
destination does not have any packet to send. The source sends a packet with RS set
9.9 ARP (Address Resolution Protocol) 175
Send ACK y +1
RST=1 Seq X+1
to 1 and the destination responds to the source with a packet whose RS bit is set to 1.
Figure 9.17 shows the disconnection process.
The ARP command is used to display and modify entries in the Address Resolution
Protocol (ARP) cache. The ARP cache contains the IP addresses and their resolved
Ethernet or Token Ring physical addresses. Figure 9.18 shows a network with four
computers, where IPi represents the IP address and MACi represents the MAC
176 9 Internet Protocols Part I
address of each PC. In order for PC1 to send a packet to PC4, PC1 requires MAC4.
If the ARP cache of PC1 contains MAC4, then PC1 will be able to send a packet to
PC4. If PC1 does not have MAC4 in its ARP cache, then PC1 will send an ARP
command to request MAC4 of PC4. If PC1 wants to send a packet outside of the
network, then it will send the packet to the default gateway.
ARP Commands
(a) Displays all ARP command options:
>arp
(b) Displays the ARP cache tables for all interfaces:
>arp –a
(c) Displays the ARP cache table for the interface that is assigned the IP address
10.0.0.99:
>arp -a -N 10.0.0.99
(d) Delete the IP address and corresponding MAC address from the ARP cache table:
>arp –d Internet address
a. Adding Internet address and MAC address to ARP cache table:
>arp –s Internet Address MAC address
Intet_address: IP address represented by dotted decimal such as
10.12.10.23
ether_addr: MAC address of the NIC represented in hexadecimal such as
cd-34-35-6f-ab-45
b. Clear ARP cache table:
>arp –d *
ARP Packet Format
Figure 9.19 shows the ARP packet format. The following describes the function of
each field in an ARP packet format:
9.9 ARP (Address Resolution Protocol) 177
0 15
Hardware Type 16 bits
Protocol Type 16 bits
HLEN Hardware address Length 8 bits PLEN IP address Length 8 bits
Operation Code 16 bits
ARP Request =1 ARP Response =2
RARP Request=3 RARP response =4
Sender Hardware Address
48 bits
Sender IP Address
32 bits
Target Hardware Address
48 bits
Target IP Address
32 bits
Hardware Type
Hardware type identifies the type of hardware interface and following are
some of the hardware types:
Type Description
1 Ethernet
2 IEEE802.3
3 X.25
4 Token ring
Protocol type Protocol type identifies the type of protocol the sending device is
using. For example: Protocol type 0800H is used for IP.
HELN Hardware Address Length (HELN) in bytes (means 6*8 = 48 bits is the size
of the hardware address).
9.10 Demultiplexing Information
Figure 9.20 illustrates the general block diagram of Internet hardware and proto-
cols. The packets (in the form of electrical signals) come to the physical layer of the
Network Interface Card. The physical layer changes the signal to bits and passes it
to the MAC sublayer. The MAC sublayer takes off its header (preamble, SFD, SA
and DA) and passes it to the LLC (Logical Link Control) sublayer, which checks the
type field. If the type field is 0800H the packet is an IPv4 datagram and is passed to IP.
For IPv6, the type field would be 86DDH (hexadecimal). IP looks at the 8-bit
protocol field, removes its header, and passes the data to a protocol depending on
the protocol number (TCP = 6, UDP = 17, ICMP = 1 and IGMP = 6). Assuming the
data is passed to TCP, TCP will look at the port number and pass it to the applica-
tion layer.
Due to the growth of the Internet and the address limitations of IPv4, the Internet
Engineering Task Force (IETF) approved IPv6 in 1995. The limitations that led to
Internet Protocol Version 6 are summarized in the next paragraph.
The IPv4 address size is 32 bits and can connect up to 232, or 4 billion, users to
the Internet. The IPv4 address field is divided into two parts: the network address
(Network ID) and host address (Host ID). Once a network number is assigned to an
organization, the organization might not use all host IDs in the host ID field, mean-
ing that some IPv4 addresses may not be used. Also, the number of networks
Application Application
TCP UDP
RARP IP ARP
connected to the exterior gateway increases rapidly which causes the routing table
to become too large which ultimately increases the time it takes to search through
the table.
The IPv6 protocol will reduce the size of the routing table in exterior gateways
because IPv6 uses a hierarchical scheme to define an IP address. IPv6 has the fol-
lowing features:
• Expanded addressing
• Simplified header format
• Support extension
• Flow labeling
• Authentication and privacy
The IETF developed IPV6 and published the IPV6 document RFC 2460 in 1994.
IPv6 has the following features:
1. Larger address space.
An IPV6 address is 128 bits which gives IPv6 an address range of 2128, which is
equivalent to
340,282,366,920,938,463,463,374,607,431,770,000,000 addresses or
340 × 1036, as compared to the address space of IPV4, which results in only 232,
or 4294967296, IPV4 addresses.
2. IPV6 contains less headers than IPV4.
Figure 9.21 compares the IPV4 packet format with IPV6.
IPV6 Header Explanation
Traffic class: Identifies different priorities.
Flow label: Used by the source to label the packets that require special handling by
the routers such as real time service.
3. Hierarchical addressing (prefix).
IPv6 uses 16 bits to represent the organization address.
4. Auto configuration.
(a) Stateless (RFC2462): The host can automatically configure its IPv6 address
based on the prefix advertised by router.
(b) Stateful (DHCPv6): A DHCP server assigns an IPv6 address to the host.
5. Supports authentication and encryption.
IPSec is mandatory for IPV6, but it is optional for IPV4.
6. Transition techniques to IPv4.
(a) Dual Stack: A router that can accept and transmit IPv6 and IPV4 packets is
called a Dual Stack router, as shown in Fig. 9.22.
(b) Tunneling: Encapsulating IPv4 inside IPV6, as shown in Fig. 9.23.
180 9 Internet Protocols Part I
IPV6
Dual stack Internet
Router
IPV6 & IPV4
Traffics
Server
IPV4
Internet
The IPv6 address is 128 bits. It is divided into eight fields of 16 bits. Each field is
represented in hexadecimal form:
Y :Y :Y :Y :Y :Y :Y :Y
The IPV6 address is 128 bits and Fig. 9.24 shows the IPV6 address format.
(RIR) Regional Internet Registry: 12 bits are assigned to a regional Internet
Register.
(ISP) Internet Service Provider: The 20-bit ID of the ISP.
SITE: 16 bits used to identify an organization network.
Subnet: 16 bits used for organization network subnet.
The combination of RIR, ISP, and SITE is called the global prefix and it is 48
bits, as shown in Fig. 9.25.
4. Anycast address
5. No broadcast address
Unicast: The unicast address defines addresses of a single interface thatmay have
multiple IPv6 addresses. IPV6 unicast types are:
(a) Link-local address
(b) Site-local unicast address
(c) Global unicast address
Link-local address: A link local address is used by a node to communicate with
other nodes that are on the same link. A router will not pass a link-local address
to other links. Link-local addresses are identified by the prefix FE80::/10. A host
will automatically configure its own local-link address. Figure 9.26 shows the
link-local address format.
The following are some of the IPV6 multicast addresses for routing protocols:
IPV6 addresses can be assigned to any host using Stateless or DHCPv6 Address
Configuration.
Stateless Address Configuration
A node can automatically generate its IPv6 address without intervention or a DHCP
Server by using one of the following methods to receive the 64-bit IPv6 prefix from
a router.
A. Router advertisement: Router advertises its IPv6 on the link.
B. A node sends a Neighbor Discovery Packet (NDP) to all nodes on the link.
C. A node sends a solicitation request to the router, and the router responds with
the request.
A node uses the IPv6 prefix to generate an IPV6 address through the follow-
ing steps.
DHCPv6 (Stateful)
The Dynamic Host Configuration Protocol IPv6 (DHCPv6) server is used for state-
ful IPv6 configuration. DHCPv6 messages are:
DHCPv6 Solicit: This is an IP multicast message. The DHCPV6 of a client sends a
DHCPv6 solicit message to FF02::1:2, which is the multicast address for all
DHCPv6 (relays and servers). If received by a relay, the relay forwards the mes-
sage to FF05::1:3, the multicast address of DHCPv6 servers.
DHCPv6 Advertise: This is a unicast message sent in response to a DHCPv6
Solicit. A DHCPv6 server will respond directly to the soliciting client if on the
same link or through the relay agent if the DHCPv6 Solicit was forwarded by
a relay.
188 9 Internet Protocols Part I
DHCPv6 Request: After the client has located the DHCPv6 server, the DHCPv6
request (unicast message) is sent to request an IPV6 address from DHCPv6. The
request must be forwarded by a relay if the server is not on the same link as
the client.
DHCPv6 Reply: An IP unicast message sent in response to a DHCPv6 request
which can be sent directly to the client or through a relay.
DHCPv6 Release: An IP unicast sent by the client to the server, informing the
server of resources that are being released.
DHCPv6 Reconfigure: The DHCPv6 may send IP unicast or multicast messages to
the client/clients for a new configuration and the client/clients must respond to
the DHCPv6 request.
ICMPv6 is a combination of ICMP and ARP with some additional functions. The
functions of ICMPv6 are to generate error messages and information messages.
ICMPv6 Error Messages
(a) Packet is too large
(b) Path MTU discovery
(c) Destination unreachable
(d) Time exceeded
ICMPv6 Information Messages
(a) Ping command
(b) Echo request
(c) Echo response
(d) Neighbor Discovery Protocol
(e) Route Solicitation
(f) Route advertisement
(g) Neighbor solicitation
(h) Neighbor advertisement
(i) Multicast Listener Discovery
(j) Multicast listener query
(k) Multicast listener response
(l) Multicast listener done
Neighbor Discovery Protocol
Neighbor discovery protocol is used for:
1. Stateless Address configuration. The node solicits the router for the IPV6 prefix
and the address of the default gateway.
2. Duplicate Address Detection (DAD).
Summary 189
Summary
Key Terms
Review Questions
34. There are two computers, A and B, with IP addresses of 174.20.45.37 and 174.
20.67.45.
If these two computers have a subnet mask ID of 255.255.0.0, can you deter-
mine if these two computers are in the same network?
35. The following figure shows the network of an organization. As a network
administrator:
(a) Assign an IP address to each network and interface using a Class B address.
(b) Show the routing table for each router.
Chapter 10
Internet Protocols Part II and MPLS
Objectives
After completing this chapter, you should be able to:
• Explain the application of DNS.
• List DNS operations.
• List top level DNS domains.
• Define the components of DHCP.
• Explain the operation of DHCP.
• Explain the operation of HTTP.
• Define the types of HTTP packets.
• Explain Internet Control Message Protocol (ICMP).
• List several routing protocols.
• Explain link characteristics.
• List network diagnostic commands.
• Explain the operation of MPLS.
• List the applications of IP multicasting.
• Able to write simple socket program.
Introduction
Memorizing a word is much easier than memorizing a long number, such as seen
when trying to remember the word “Yahoo” vs the number “67.195.160.76”.
Therefore, computer hostnames are frequently represented by a word rather than an
IP address. In order for a client computer to access a website, send an email, or con-
nect to another computer through the Internet, the client computer must have the IP
address of the destination, but this may not be known to the user. To accomplish this,
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 197
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_10
198 10 Internet Protocols Part II and MPLS
Root
Country
TLD
aero coop pro biz name com edu net gov org int mil jp uk ca
museum scsu
cs math
the client computer uses domain name system (DNS) to obtain resolve a known
hostname to the IP address of the host. The RFC 881, 882, and 883, which have
been published by IETF, explain DNS operation.
DNS is a distributed database containing information about domain names and
their corresponding IP addresses. DNS uses a tree hierarchy that consists of a root
and top level domains (TLDs). The TLD defines the type of organization, such as
“edu,” which represents an educational organization. Top level domain names can
be categorized as shown in Fig. 10.1.
A two-letter abbreviation is used for a particular country, such as “uk” for the
United Kingdom and “fr” for France.
An organization must register its sub-domain name with the Internet Assigned
Number Authority (IANA). For instance, southernct.edu is registered by IANA and
must be a unique name in its domain. Southern must also specify two DNS servers:
primary and secondary, which hold the hosts’ names and corresponding IP addresses.
DNS Root Servers
There are 13 DNS root servers, and they support both IPv4 and IPv6; the website
https://www.iana.org/domains/root/servers shows information about DNS root
servers.
DNS Names
DNS names use a fully qualified domain name (FQDN). A FQDN is a DNS domain
name made of its location on the TLD separated by “.”, such as cs.southernct.edu.
DNS Operation
The function of DNS is to convert the host name to the IP address much like a phone
directory converts a name to a phone number. In order for a client computer to
10.1 Domain Name System (DNS) 199
access the yahoo.com web site, the client must have the IP address of the Yahoo
server. The client must send a query to the DNS server and request the IP address of
Yahoo. There are two methods that can be used by a client to request an IP address.
These methods are DNS recursive queries and DNS iterative queries. By default,
DNS uses iterative queries.
A. DNS Iterative Query
The client computer at southern requests connection to yahoo.com. The client
computer requires the IP address of yahoo.com’s server. The following steps
describe the iterative query that allows the client to obtain the IP address of yahoo
as shown in Fig. 10.2.
1. The client sends a query to the southernct.edu DNS server (ns1.southernct.edu)
to resolve the name to an IP address. If Southern’s DNS server resolves the client
request, then it will send the IP address of yahoo’s server to the client. If
Southern’s sever does not have IP address for yahoo, the process goes to step 2.
2. Southern’s DNS server sends a request to the Root DNS server, requesting the IP
address of yahoo.
3. The Root server sees that the requested information (FDQN) name has a TLD
with .com. It sends the IP address of one of the .com servers that has the IP
address of Yahoo’s DNS server to Southern’s DNS.
4. Southern’s server sends the request to the .com TLD server to resolve the name
to an IP address.
2 3
SCSU.edu
4
1
TLD DNS .COM
5
8
Requesng IP address
for Yahoo.com
6 7
5. The .com TLD server responds with the IP address of yahoo’s DNS server.
6. Southern’s DNS server sends a request to the DNS server of yahoo (authorita-
tive) for the IP address.
7. The Yahoo DNS server resolves the request and transmits the IP address to
Southern’s Server.
8. Southern’s server transmits the IP address to the client.
3
2
7 6
SCSU.edu
1
TLD DNS .COM
8
Requesting IP address
for Yahoo.com 5 4
A zone is a part of domain name system that contains resource records and is
managed by an administrator. Figure 10.4 shows one of Southern’s DNS zones. The
southernct.edu can have one zone which include all subdomains, or split each sub-
domain into separate zones or across DNS servers.
Zone file
The zone file holds resource records (information about domain names and their
corresponding IP addresses). This file is transferred to the secondary server using
TCP connection.
Resolver
A resolver is a program that runs on a client for generating query messages from the
server, and the same program runs on a DNS server for responding to DNS queries.
C. DNS Packet Format
DNS uses the UDP protocol for transmitting query packets and receiving query
responses. Figure 10.5 shows the DNS packet format.
Identification (16 bits): The identification field is used to identify the packet, and
it is generated by the device transmitting the query packet. The response packet
uses the same identification number as the query packet.
Flags: The flag field is 16 bits, and contains the following flags:
1 4 1 1 1 1 3 4
0 31
Identification Flags
Number of Questions Number of answer RRs
Number of Authority Number of additional RRs
Questions (Name, Type)
Answers (Resource Record)
Authority
Additional Information
Fig. 10.5 DNS packet format
1. Name: The domain name that the resource record belongs to (the domain name
may have more than one resource record).
2. Time-to-Live: This is a 32-bit integer. The TTL is measured in seconds. The
value zero indicates the data should not be cached.
3. Class: This field usually contains the value ‘IN’, and it represents if this record
is to be used by the internet.
4. Type: The type field defines the type of resource record, which can be:
Type Description
A The address in the record is IPV4.
AAAA The address in the record is IPv6.
MX The record is a mail exchange.
NS The record is a name server.
PTR This is a pointer that points to another file to resolve name server and IP.
CNAME This is canonical name type of record.
SOA This is the start of authority type of record.
5. Value: This field can be a number, ASCII strings, or any domain. The semantics
of name and value depends on the type field.
DNS Root Servers
DNS root servers are a network of 100 servers that are located in different countries
and managed by 12 organizations. For locations of the root servers, visit https://
root-servers.org/.
Introduction
Manually assigning IP addresses to host computers in a large network is very time
consuming. To overcome this problem, TCP/IP offers Dynamic Host Configuration
204 10 Internet Protocols Part II and MPLS
Protocol (DHCP), which is an extension of the boot protocol. DHCP uses the UDP
protocol to communicate with a DHCP server. The client broadcasts a packet with
the IP address 255.255.255.255 (broadcast address). The broadcasted packet con-
tains the hardware address of the client. The DHCP sever responds to this request.
DHCP Components
To have a DHCP service on a network, it requires three types of software: a DHCP
client, DHCP server, and DHCP relay agent.
DHCP Client Most Network Operating Systems (NOS) offer DHCP software for
clients such as Windows 10. The DHCP client software enables the client worksta-
tion to obtain its IP address from the DHCP server automatically. Clients broadcast
a packet to the network that has the DHCP server in its broadcast domain (i.e., the
same segment).
DHCP Server The DHCP server holds a range of IP addresses and responds to any
request made by a DHCP client. Note that the DHCP server and the client host must
be in the same broadcast domain; otherwise, the DHCP relay agent software is
required.
DHCP Relay Agent When the DHCP server is not located in a broadcast domain
of the client station, the router that the client station is connected to requires the
DHCP relay agent software, as shown in Fig. 10.6.
The function of the DHCP relay agent is to accept the broadcast packet from the
DHCP client and send the packet to the DHCP server. The relay agent changes the
broadcast packet to a unicast address by using its own IP address, then sends it to
the DHCP server. The DHCP server responds to the DHCP relay agent. The DHCP
relay agent then forwards this response to the DHCP client.
The DHCP server supports different methods to allocate IP addresses to a cli-
ent host:
1. Automatic allocation: DHCP assigns a permanent IP address to the host.
2. Dynamic allocation: DHCP assigns an IP address to a host for a limited period
of time (this time is called lease time). If the client does not need the IP address,
the DHCP server can reuse this IP address and assign it to another host. This
method is used by internet service providers to assign IP addresses to their cli-
ents in order to be connected to the Internet temporarily.
3. Manual allocation: The network administrator assigns an IP address to the host
and the DHCP server transfers that IP address to the client.
Fig. 10.6 A router with a relay agent in a client host/DHCP server connection
10.2 Dynamic Host Configuration Protocol (DHCP) 205
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
DHCPRELESE
DHCP Operation
The following steps describe the operation of DHCP, as shown in Fig. 10.7:
1. The DHCP client does not have an IP address, and so it broadcasts a packet on
the network requesting an IP address from the DHCP server. This packet is
called a DHCP Discovery packet.
2. The DHCP server responds to the DHCP Discovery packet by sending a DHCP
Offer packet to the client. The DHCP Offer packet includes the client IP address,
the address mask and the lease time (the amount of the time that the client can
hold this address). In the middle of the lease time the client host sends a renewal
packet to the DHCP server to find out if it can keep the same IP address for the
next lease time.
3. When the client host has received a DHCP Offer packet from the DHCP server,
it can accept the address offered or reject it. Therefore, the client sends a packet
to the DHCP server to inform either the acceptance or rejection of the IP address.
This packet is called the DHCP Request packet.
4. The DHCP server sends a DHCP ACK to the client in response to the client’s
DHCP Request and informs the client of the completion of the DHCP process.
206 10 Internet Protocols Part II and MPLS
5. The client receives the DHCP ACK packet with configuration from the DHCP
server. Now the client is configured. If a client receives a DHCP NACK (nega-
tive acknowledgment from the DHCP server), then the client host cannot use this
IP address.
6. If the client host does not need an IP address, it will send a DHCP Release packet
to the DHCP server to release the IP address.
DHCP is an application protocol for UDP. Figure 10.8 shows the payload of an IP
packet with DHCP. Figure 10.9 shows the DHCP packet format.
The following describes the function of each field in the DHCP packet format:
OP code: The Op code indicates a request from a client or a reply to a request (1 for
request, 2 for reply).
Hardware type: The hardware type indicates the type of network card being used
(such as IEEE 802.3 or Token Ring).
Hardware length: The hardware length indicates the size of the hardware address
or MAC address (6 bytes).
Hops: The hops field indicates the number of hops a packet can make on route to
the destination. The maximum number of hops is 3.
Transaction ID: A random number set by the client. It is used by the client and the
server to coordinate messages and responses.
1 32
Op Code 8 bits Hardware Type 8 bits Hardware Length 8 bits Hop Count 8 bits
Transaction ID 32 bits
Number of Seconds 16 bits Unused 16 bits
Client IP Address 4 bytes
Machine IP Address 4 bytes
Server IP Address 4 bytes
Gateway IP Address 4 bytes
Client MAC Address 6 bytes
Server Host Name up to 64 bytes
Boot file name up to 1284 bytes
Vendor-Specification Information up to 64 bytes
Number of seconds: The number of seconds is set by the client. The secondary
server does not respond until this time has expired.
Client IP address: If the client does not have an IP address, this field will be set to
0.0.0.0.
Server IP address: The server IP address is set by the server.
Router IP: The router IP is set by the forwarding router.
Client hardware: The client address is set by the client and is used by the server to
identify which client the request came from.
Server host name: optional.
Boot file name: The client can leave this field null or indicate the type of the
boot file.
Vendor specification: This field is used for various extensions of the bootstrap.
UDP header: The UDP header contains source and destination port numbers. The
BOOTP uses two reserved port numbers. Port number 68 is used for the client
and port number 67 is used for the server.
The IETF published HTTP (Hypertext Transfer Protocol0) documents RFC 1945
and RFC 2616. HTTP is an application protocol for TCP that uses port 80 for com-
munications between clients and servers. Hypertext Transfer Protocol is used for the
transferring of Hypertext Markup Language (HTML) documents. HTML is a tag,
and hypertext documents have links to other documents such as images and videos.
The address of a web page is defined by a URL (Uniform Resource Locator),
such as http://www.southernct.edu/csdept/picture.gif
Where http is the protocol, southern is the host name, “.edu” is the TLD, and
csdept/picture.gif is the path name.
In HTTP, the client requests a web page and the server responds by sending the
web page to the client, as shown in Fig. 10.10.
HTTP is implemented by both client and server software. It performs the follow-
ing tasks for transferring a web page from a server to a requesting client.
1. The browser makes a connection to the server over TCP port 80.
2. The browser sends a request to the server.
3. The server sends a response to the browser.
HTTP Characteristics
1. HTTP is a stateless protocol, meaning that an http server does not keep any
information about the clients that requested web page.
2. HTTP connections: HTTP offers two type of connections called nonpersistent
and persistent connections.
A. Nonpersistent connection: Each request and response are sent over a sepa-
rate connection and the connection is closed after a single request/response
pair. HTTP/0.9 and HTTP 1.0 use non-persistent connection.
B. Persistent connection: All requests and responses are sent over the same con-
nection. HTTP version 1.1 uses persistent connection.
HTTP Packet Format
HTTP defines two types of packets: client packets and server packets.
A. HTTP Client Packet Format: Figure 10.11 shows an HTTP packet format that
consists of a Request line, Header lines, a Blank line, and a Message Body.
SP: Space
CR: Carriage Return
LF: Line Feed
CR = %0d = \r
LF = %0a = \n
% means hex
Method: Defines the type of request sent by the client to the server, such as:
GET: Used by the client to request a document from the server and is identi-
fied by the URL.
HEAD: The HEAD method is similar to GET except that the server does not
return a message-body in the response.
POST: Used by a client to submit information to the server.
PUT: Used for updating information on the server.
Client Error (4xx): This class of codes indicates client errors such as:
400 Bad Request
401 Unauthorized
402 Payment Required
403 Forbidden
404 Not Found.
Internet Control Message Protocol (ICMP) is used to report error messages dur-
ing packet delivery by an Internet Protocol such as protocol unreachable, network
unreachable, network congestion, packet is too large, and announcing timeouts
(TTL field drops to zero). Also, ICMP is used by the network administration for
diagnostics purposes, such as the Ping and Tracert commands. ICMP is an Internet
Layer Protocol and ICMP packets are transported by IP to the destination. ICMP
messages can be divided into two groups: error messages and information mes-
sages. Figure 10.10 shows the ICMP packet format (Fig. 10.13).
Type (8 bits): Indicates the type of message. Numbers 0 through 127 indicate error
messages, and numbers larger than 127 represent information messages.
Table 10.1 shows type values and their meanings.
Code (8 bits): Provides additional information about the message type. For exam-
ple, for a type value of 1 (destination unreachable), the code number specifies
more detail information as shown in Table 10.2.
Checksum: This field is used for error detection of ICMP headers and messages.
Packet too large: Consider Fig. 10.14, in which two networks are connected by a
router. Network A is a token ring with MTU of 18,000 bytes and Network B is
an Ethernet with MTU of 1500 bytes. If station A sends an IP packet to station B,
station A sends the packet to the router and the router examines the DF bit (do
not fragment) in the IP header. If this bit is set, indicating that the packet is not to
be fragmented, then the router is not able to send the packet to station B and the
router discards the packet. The router then sends an error message to station A
indicating that the packet is too large and the MTU for the packet should be 1500
0 78 15 31
Router
Token Ring
B A
Fig. 10.14 Two networks with different MTUs are connected via a router
0 78 15 31
MTU
Message Body
bytes. Station A sends a new packet with the MTU of 1500 bytes to the router.
This is called Path MTU discovery. Figure 10.15 shows the ICMP packet format
for Path MTU discovery.
In Fig. 10.15, the type field is equal to 2, code field is zero, and MTU field is
maximum transmission unit of the next-hop link.
212 10 Internet Protocols Part II and MPLS
Time exceeded: When an IP packet travels through the Internet, the TTL field dec-
rements by one each time the packet passes through a gateway. When the TTL
value becomes zero, the gateway sends the ICMP message of Time Exceeded.
Parameter problem: When a router discovers an error in an IP packet, the router
discards the packet and sends a Parameter Problem to the source.
Echo request and response: An ICMP echo-request message, which is generated
by the ping command, is sent by any host to test node reachability across an
Internetwork. The ICMP echo-reply message indicates that the node can be suc-
cessfully reached.
10.5 Routing
The function of a router is to determine the path for transporting information (pack-
ets) through the Internet. Furthermore, routing is the method of moving packets
from one network to another network. Figure 10.16 shows four networks connected
through the routers R1, R2, R3, and R4. Consider the following questions when host
A wants to send a packet to host B:
1. How does host A know that host B is connected to router R3?
2. What is the best route for sending information from host A to host B? Host A can
send packets to host B by using three different paths. Host A can send packets to
host B using the path R1-R2-R3 or R1-R4-R3 or R1-R2- R4-R3. The router
determines the best route for sending information by using a routing algorithm
to build a routing table.
Link Characteristics
Routers use different metrics (link characteristics) to find the best route for sending
a packet to the destination. The metrics are:
Hop count: The hop count measures the number of hops that a packet must go
through in order to get to the destination.
Throughput: The data rate of the link.
Communication cost: The cost of transmitting information from source to
destination.
Network 2 Network3
R2 R3
B
A
Network 4
Network1
R1 R4
Fig. 10.16 Networks connected by four routers
10.5 Routing 213
Delay: Measures the amount of time it takes a packet to travel from source to
destination.
Configuring the Routing Table
There are two ways to configure the routing table: dynamic routing and static
routing.
Dynamic routing: In dynamic routing, the routers use a routing protocol to build
their routing tables. If there is a change in the network configuration, a dynamic
routing protocol broadcasts the changes to all the routers in the network in order
to update all routing tables. Some of the most popular dynamic routing proto-
cols are:
(a) Routing Information Protocol (RIP)
(b) Open Short Path First Protocol (OSPF)
(c) Interior Gateway Routing Protocol (IGRP)
Static routing: Static routing tables are configured manually by the network admin-
istrator. Static routing is often used for small networks. The problem with this
type of routing is that if there is a change in network topology or a network link
failure, all the routing tables need to be manually updated.
Figure 10.17 shows a network with three routers: A, B, and C. Router A has an
Ethernet link E0 and one serial link S0. Router B has two serial links S0 and S1 and
one Ethernet link E0. Router C has one serial link S0 and one Ethernet link E0.
Class B IP addresses (180.160.0.0) are used to assign an IP address to each host.
As a network administrator, one would need to assign an IP address to each net-
work and to each host.
The following IP addresses are assigned to the following networks:
180.160.10. the network connected to the Ethernet port of router A
180.160.20. the serial link between router A and router B
180.160.30. the Ethernet network connected to router B
180.160.40. the serial link between routers B and C
180.160.50. the Ethernet network connected to router C
180.160.30.
180.160.50
Table 10.3 Routing table for Remote network Subnet mask Default gateway
router A
180.160.50. 255.255.255 180.160.20.2
180.160.40. 255.255.255 180.160.20.2
180.160.30. 255.255.255 180.160.20.2
In static routing, the routing table is built and updated manually. The IP routing
table has the following fields:
A. IP address of remote network
B. Subnet mask
C. IP address of default gateway
Tables 10.3, 10.4, and 10.5 show the routing table for routers A, B, and C.
Router A can access the other networks through the S0 link of router B. Therefore,
S0 is the default gateway for router A.
broadcast packet to the hosts on the network and requests the hardware address of
the host. All the hosts in the network accept the packet and compare the IP address
of the packet with its own IP address. If both IP addresses are the same, the host will
respond to the router with a RARP, which contains the hardware address of the host.
arp tables contain both the IP address and the MAC address of a computer. The
following is a list of arp commands:
arp -a Display the contents of the ARP table
arp -d Delete an entry with an IP address
arp -s Add an entry with a MAC address
C. ipconfig /all
ipconfig displays the network settings, physical address, IP address, and subnet
mask of the host, as well as the IP address of the default gateway.
D. Tracert command
Tracert shows the path of a packet from source to destination and the number of
gateways the packet travels through.
E. Netstat command
The netstat command displays information about your network configuration. It
comes with following options:
netstat –n displays information on the NIC of your computer
netstat –r displays the IP routing table
netstat –a displays information on TCP and UDP ports
netstat –s displays operational statistics of network protocols
MPLS was developed to overcome the deficiency of IP packet delivery over private
and public networks. An IP network is connectionless and when an IP packet is
received in a router, the router uses its routing table and the IP address of the packet
to find the next hop. The IP address does not use a fixed size, such as class A, B, C,
or D; therefore, it takes time to find the next hop. MPLS defines a method for fast
packet forwarding over an IP network. It is an independent protocol, and it works
with multiple protocols, such as IP, ATM, and Frame Relay. MPLS adds a label or
tag to an IP packet, and it uses this label to find the path or next hop. Because the
length of the label is fixed, it becomes faster to look up in a table than IP routing.
Routers on an IP network use this label to find the next hop. The operation of MPLS
is similar to cell switching in ATM networks and Frame Relay. MPLS performs the
same function as a router but with higher performance. MPLS can be used for VPN,
transport layer (layer 2), and connection-oriented service.
216 10 Internet Protocols Part II and MPLS
IP packet 1 20 3 6
2 4 40 9
LER1 LSR2 LER4
IP packet 30
7
5
Network A Network B
60
8
LSR3 LSR5
topology and configures the routing table by using an IP routing protocol such as
OSPF, BGP, or RIP. Signaling protocols are used to inform the routers which label,
and link, are to be used by the switch for each label switching path. MPL advan-
tages are:
• The path from source to destination can be identified in advance.
• It can select network paths in order to have a balanced load in the network.
• MPLS can provide a specific path for data.
• MPLS offers quality of Service (QoS) by choosing a specific path in order to
provide bandwidth to the application, less delay, and less packet loss.
MPLS label: The MPLS label is inserted in the frame but the location of the
label depends on the layer 2 technology. In ATM, the label is VPI/VCI, and in Frame
Relay, it is DLCI filed. In an IP packet, the label inserted between layer 2 and layer
3 is shown in Fig. 10.19. The MPLS label field is 32 bits and the following list
describes the function of each field.
Label: This is 20 bits.
CoS (Class of Service): This field is 3 bits and is used for queuing and discarding
packets traveling through the network.
S (Stack): This field is one bit and it is used for multiple MPLS labels.
TTL (Time-to-Live): This field is 8 bits and works similar to TTL field in IPv4.
10.8 IP Multicast
Figure 10.20 shows Unicast and Multicast. In Unicast, the source must send
three packets, while in IP multicast, the source sends only one packet.
Characteristics of Multicast Network
• A multicast group is a set of hosts that all have the same IP multicast address.
• The transmitter of a multicast packet transmits the packet to a multicast router
and the router transmits the packet to all hosts in the multicast group.
• A multicast router requires running Multicast Routing Protocol and Internet
Group Message Protocol (IGMP).
• Each multicast group is identified by a single Class D IP multicast address.
• Members of a multicast group can be any place in a network.
• Each host in the network can join a multicast group.
• A multicast member (host) can leave the group by informing its multicast router.
• A receiver of a multicast packet must be a member of group.
• Any host on the network can transmit a multicast packet.
• Each multicast router manages the hosts connected directly to its port using
Internet Group Managed Protocol (IGMP).
The IETF published IGMP in RFC 1112. IGMP is a management protocol for IP
multicast and is used for managing host group membership. It is located in the IP
layer of the TCP/IP model as shown in Fig. 10.21. IGMP has three versions: IGMP
v1, IGMPv2, and IGMPv3.
10.8 IP Multicast 219
IGMP Messages
In general, IGMP has two types of messages:
E. Membership query message
F. Membership report message
A membership query message is transmitted by the router periodically to active,
directly connected, hosts. This type of message is used for requesting information
about host membership. Each active host member responds to the query with a
membership report message. A Host sends an IGMP report to a router for joining a
group. When a host wants to send a multicast packet to a group, it places its data in
a UDP packet with a multicast IP address as the destination address. Figure 10.22
shows the IP multicast network.
A multicast router uses IGMP to learn which groups have members on each of
their attached physical networks. It also keeps a list of multicast group memberships
for each attached network.
IGMP Packet Format
Figure 10.23 shows the IGMP packet location in an IP packet, and Fig. 10.24 shows
the IGMP packet format.
Type (8 bits): This field defines the type of packet as shown in the follow-
ing table.
Max Response Time: This field is 8 bits and is used for membership. It defines the
maximum allowed time before sending a responding report.
IGMP Checksum: This field is 16 bits and is used for error detection.
Group Address: This field is 32 bits. For a general query, this field set to zero such
as in a membership query, and for a specific group, it is set to the group address.
220 10 Internet Protocols Part II and MPLS
Group Address
10.9 Socket Programming
Summary
Key Terms
Review Questions
7. List three diagnostic tools you can use for DNS troubleshooting.
8. List at least 5 TLDs.
9. What is the minimum number of DNS servers an organization must have?
10. Does an organization have separate DNS servers for IPv4 and IPv6?
11. What is the application of DHCP?
12. List the components of DHCP.
13. Explain DHCP dynamic IP allocation.
14. List DHCP packets and explain the function of each.
15. What is the function of a relay agent?
16. List the link characteristics.
17. Explain static routing and dynamic routing.
18. What is the function of Internet Control Message Protocol (ICMP).
19. List three applications IP multicast.
20. What is the application of a socket?
21. Which device requests connection to a socket?
22. Socket is combination of IP address and_____.
Chapter 11
Voice over Internet Protocols
(Voice over IP)
Objectives
After completing this chapter, you should be able to:
• Discuss the applications of VoIP.
• Describe the factors that impact voice quality using VoIP.
• Explain the operation of VoIP.
• Discuss standards and protocols used for VoIP.
• List the components of SIP.
• Show the SIP protocol architecture.
• Describe the SIP connection setup between end users.
• Calculate the minimum bandwidth requirement for VoIP.
Introduction
Public telephone systems are based on circuit switching networks, which allow for
real time communication between users. Voice over IP (VoIP) technology enables
data networks such as the Internet, LANs, and WANs to be used for voice commu-
nication. Since VoIP reduces the cost of voice communication, it has become high
in demand for corporations and organizations which have multiple locations.
Corporations can avoid paying extra telephone charges by setting up a VoIP network
for long-distance communication between office locations. Voice quality is an
important factor in the success of Voice over data networks; it is imperative that
VoIP offers the same quality as Voice over the Public Switch Telephone
Network (PSTN).
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 229
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_11
230 11 Voice over Internet Protocols (Voice over IP)
11.1 Voice Quality
There are three factors that impact voice quality over data networks: transmission
delay, jitter, and packet loss.
Transmission Delay (Latency)
Transmission delay, or latency, is the time it takes a packet to travel one way from
its destination to its source. For a one-way transmission, a transmission delay of
between 150 and 250 m/sec is acceptable. This delay is generally caused by the fol-
lowing factors: propagation delay, the storage and forwarding of packets in routers
and gateways, compression at the source, and decompression at the destination.
When a voice packet is received late at the destination, it will just be discarded; the
loss of a packet reduces the quality of the service. The latency can be reduced in
private networks (Intranet, LAN) by adding quality of service (QoS) priority to the
voice packets. However, the latency can not be controlled for the transmission of
voice packets over the Internet.
Jitter Delay
Jitter delay is the difference in arrival time between packets. It is desired that the
average arrival time between packets is constant. A variable delay is caused by con-
gestion on networks and by voice packets being sent over different paths. If voice
packets are received by the destination at irregular times, distortions in the sound
will occur.
Packet Loss
Voice packets are transmitted over UDP, and therefore there is no guarantee that
packets will reach their destinations. Packets may also be dropped by gateways
when there is congestion in the network. When a packet is dropped, the gateway
inserts a silence packet instead; this will result in gaps in the conversation. VoIP can
tolerate about a 2% packet loss.
VoIP can be implemented on the Internet, a LAN, or a WAN. Currently, many cor-
porations offer long-distance calls using Voice over Internet technology at one-fifth
of the price of using the PSTN. VoIP offers voice communication in two ways:
VoIP for an Organization
Currently, VoIP is used for telephone calls between offices in an organization by
using the organization’s pre-existing LAN.
International Call Provider
Some corporations offer international call services at a lower price for their custom-
ers. Figure 11.1 shows a block diagram of an International Call Provider. If User A
11.3 Voice over IP Operation 231
would like to have a conversation with User B, then User A calls the server in the
USA. Then, the server prompts User A for the destination phone number. User A
enters 001 (international) and then 33 (France’s country code), followed by the
10-digit phone number. The server in the USA then makes the connection to the
server in France and transmits the 10-digit number to that server. The server in
France finally dials the User B for communication.
Figure 11.2 shows the components and protocols used for transmitting voice pack-
ets over a data network. During this transmission, the following process will
take place:
At the transmission side:
1. The microphone accepts the voice signal and passes it to the Pulse Code
Modulation (PCM) section.
2. The PCM converts the voice signals to digital signals and passes the signals to
the compression section.
3. The compression section compresses the voice bits and forms a voice packet.
The voice packet is then passed to the Real Time Protocol (RTP).
4. The RTP adds its header to the voice packet and passes the packet to UDP for
transmission over IP.
At the receiving side:
1. The RTP passes its payload to the decompression section. The decompression
section decompresses the voice packet and passes it to the analog-to-digital
(A/D) converter.
2. The A/D converter converts the voice packet to analog and then passes it to the
speaker.
232 11 Voice over Internet Protocols (Voice over IP)
Internet,LAN
WAN
Before a voice packet is transmitted over a data network, a connection between the
two parties must exist. Currently, there are two protocols used for VoIP. They are
H.323 developed by ITU and Session Initiation Protocol (SIP) developed by
IETF. The functions of these protocols are to set up a connection, disconnect a con-
nection, and handle call management. The SIP and H.323 protocols are used at the
application level of the TCP/IP protocol.
Audio Codec
The function of an audio codec at the transmission side is to accept audio signals
from a microphone and convert the audio signals to digital using an A/D converter.
The audio codec then compresses, or encodes, the digital bits to form a voice packet.
The function of the audio codec at the receiving side is to decompress, or decode,
the voice packets and convert them to audio signals using a D/A converter and send
the analog signal to the speaker.
Voice compression is performed by a device called a Vocoder (Voice Encoder/
Decoder), This device provides multiple types of voice compression. The type of
compression is selected by a negotiation between the source and destination gate-
ways. The following are some of the voice compression standards:
2 1 1 4 1 7 16 bits
V P X CC M PT Sequence number
Time Stamp
SSRC
CSRC
Pay Load
The following describes the function of each field in RTP packet format:
Version (V): Defines the RTP version.
Padding (P): When this field is set to 1, it means that extra bytes were padded to the
payload. The last byte of the payload determines the number of the bytes that
were padded the payload; these bytes should be discarded.
Extension (X): When this bit is set to 1, it means that that header is extended (for
experimental use).
Contributing Source Count (CC): Used for multipoint call management.
Mark (M): This bit is to inform the receiver whether the packet is from a voice
source or a video source. For voice applications, this bit is set for the first packet
following silent suppression. For video applications, this bit is set only for the
last packet of a video frame.
Payload Type (PT): Determines the type of payload.
Sequence Number: The receiver uses this number to correct any packets that were
received out of order or to detect any packet losses.
Time Stamp: The time stamp depends on the payload. If the payload is a voice
packet, then the time stamp is 8000, which is the sampling rate of the digitized
human voice. If the payload is a video packet, then the time stamp is the clock
rate for the video payload, which is 9000 Hz.
Synchronization Source Identifiers (SSRC): Used for multipoint calls.
Contributing Source Identifiers (CSSRC): Used for multipoint calls.
Real Time Control Protocol (RTCP): RTCP provides a control mechanism for
jitter delay and packet loss in RTP; it is used for end-to-end monitoring of data
delivery. The endpoints use RTP to exchange packets that carry voice data and
periodically they exchange RTCP packets to monitor the quality of data
exchange.
PCM
SDP Compression
Transport Layer
TCP UDP
Internet Layer IP
Link/Physical layer
NIC or PPP
11.6 SIP Components
The components of SIP are user agents, gateways, and servers. The following
describes the function of each component:
SIP User Agent or SIP Endpoint
The SIP user agent can be an IP phone or a PC with the SIP protocol. The user agent
(UA) should be able to send a SIP request and response. The UA works in client and
server mode. The UA also communicates with other user agents through a
proxy server.
Gateway
A gateway is a special device that connects the PSTN to the Internet.
Server
SIP defines three types of servers: proxy servers, redirector servers, and registered
servers. These three servers can be implemented in a SIP proxy server.
SIP Proxy Server A SIP proxy server performs the following functions:
11.7 SIP Request and Response Commands 235
1. Accepts a user agent request and forwards the request to another user agent
or server.
2. Accepts a response from a server or user agent and forwards it to a user agent.
3. If a proxy server does not have the IP address of the destination user agent, the
proxy will contact a DNS server to obtain the IP address of the UA.
4. Requests a route on the behalf of user agent from a location server and also
requests an IP address of the next proxy from a DNS server.
Proxy Server Types The SIP standard defines two types of SIP proxy servers:
stateless proxy and stateful proxy:
A. Stateless Proxy Server: The stateless proxy server receives a request from a
UA, processes the request, and forwards the response to a UA (user agent) or a
server. The stateless proxy server does not keep any information (transactions)
about the forwarded responses or requests. Therefore, if a response were lost
due to congestion, the server would be unable to retransmit the response. The
stateless proxy server is the simplest form of a proxy server.
B. Stateful Proxy Server: The server also acts as client when it responds to
requests and sends requests. The stateful proxy server keeps information about
responses and requests. Therefore, if a packet were lost due to congestion, the
server would be able to retransmit the packet.
SIP Redirector Server The function of a redirector server is to accept requests and
direct the client to contact alternate user agents (the same concept as when a secre-
tary answers a phone and gives the caller another phone number). The redirector
uses 3XX code to respond to a request. Some of the codes are as follows:
301 The destination has moved permanently.
302 The destination has moved temporarily, and the user is available at a different
address.
305 The request source should contact the proxy server.
Registrar and Location Server The user agents register with a registrar server
and the registrar server updates the location database (location server). The location
database holds the address of the server that the UAs are connected to. Therefore,
the proxy server can submit a client URL address to the location server and obtain
an IP address of the user agent. The DNS server holds the IP addresses of the proxy
servers.
SIP uses request and response commands to setup, change, or terminate a conversa-
tion between endpoints. A request is initiated by the client to the server, and a
response is initiated by the server to the clients. The SIP entities use special words
236 11 Voice over Internet Protocols (Voice over IP)
for requests and call methods. The following defines the methods and their
descriptions:
Method Description
INVITE Used for inviting an endpoint for communication
BYE Request for terminating a connection
ACK Used for response to an invitation or for reliable communication between source
and destination
REGISTER Used by a user agent to register with a registrar server
CANCEL Used for canceling a pending call
OPTIONS Used for requesting information about call connection such as bandwidth or
compression methods
Response Codes
SIP uses codes for responding to a request as well. The response codes are classified
in as follows:
The following table shows some of the specific response code and their
descriptions:
Code Description
100 Trying
180 Ringing
200 OK
301 Destination has moved permanently
302 Destination has moved temporarily
403 Not permitted
480 Unavailable
600 Busy
603 Declined
11.9 SIP Connection Operation 237
11.8 SIP Addressing
SIP uses addressing similar to e-mail addressing, such as by the usage of Universal
Resource Locators (URLs) for addressing
sip: [email protected]
sip: +1-800-555-[email protected]; user located in different network
sip: [email protected]; user located in the same network
Consider a connection is made between two UAs through one proxy server.
Figure 11.5 shows two UAs and a proxy server. SIP uses the following commands
and responses in order to set up a connection between user A and B:
Sip:[email protected]
SIP:[email protected]
Proxy
Server
Invite
SIP:[email protected]
1 2 invite
3 trying =100
4 ringing =180
5 ringing =180
6 ok 200
7 ok=200
Fig. 11.5 Connections between two user agents and one proxy server
238 11 Voice over Internet Protocols (Voice over IP)
DNS server
4
3 Response
Query
134.145.12.1
scsu.edu Proxy
server
scsu.edu
Proxy
Invite server Invite Invite
Sip:[email protected] 5 sip:[email protected] 7 sip:[email protected]
1
6 100 trying 8 180 Ringing
2 100 trying
8 180 Ringing 10
9 180 Ringing
11 200ok 200ok
12 200ok
RTP
1. The user agent A sends a packet called an invite to the proxy server.
2. The proxy server accepts the packet and sends it to UA B.
3. The proxy server sends a code 100 to user A and user A waits.
4. Endpoint B accepts the invite packet, and it starts ringing (B agent is ringing).
5. The proxy server passes the code 180 to UA A and A generates rings indicating
that user B is ringing.
6. When user B picks up the phone, B sends an ok packet with code 200 to the
proxy server.
7. The proxy server sends an ok packet with code 200 to user A, user A stops ring-
ing, and a session for communication using RTP is established between A and B.
Figure 11.6 shows a connection between two endpoints through two proxy serv-
ers. As shown in Fig. 11.6, the endpoint A invites endpoint B for connection
through the proxy server A. The proxy server A does not have the IP address of
endpoint B. Therefore, a query is sent to the DNS server to obtain the IP address of
endpoint B.
Voice packets must be received at a constant bit rate. The bit rate is dependent on the
type of codec selection. The audio frame is made in 10 ms and the G.711 codec data
rate is 64,000 bps. Therefore, in 10 ms, 640 bits or 80 bytes can be encoded.
Summary 239
The G.792 data rate is 8000 bps, which means that 10 ms at this data rate is 80
bits or 10 bytes. The voice packet goes through RTP, UDP, and IP protocols, and
these protocols all add their headers to the voice frame as shown in Fig. 11.7.
The voice packet goes through the Network Card (Ethernet, PPP, or Frame
Relay) and the Network Card also adds its header and trailer, assuming an Ethernet
NIC is used. Ethernet has a 22-byte header and a 4-byte trailer, which gives a total
of 26 bytes added to the voice packet. Therefore, the total voice packet with a 10 ms
payload using G.711 as a codec is calculated as follows:
Voice packet = 80 bytes payload + 40 Bytes (RTP, UDP and IP) header + 26 Ethernet
header = 146 bytes
The voice packet must reach its destination at 64,000 bits per second or 8,000
bytes per second. The 8,000 bytes per second is equal to 100 voice packets per sec-
ond. Therefore, the bandwidth of channel should not be less than:
Bandwidth of a channel =146 bytes*100 = 116800 bps
Summary
Key Terms
Review Questions
8. A ______ accepts a SIP user agent request and forwards it to another user agent.
(a) SIP endpoint
(b) SIP gateway
(c) SIP proxy server
(d) SIP redirector server
9. A ________ accepts requests and directs the client to contact the alternate
user agent.
(a) SIP endpoint
(b) SIP gateway
(c) SIP proxy server
(d) SIP redirector server
Objectives
After completing this chapter, you should be able to:
• Discuss the applications and advantages of a wireless LAN (WLAN).
• Understand wireless LAN technology.
• Describe the applications of the ISM and UNII bands.
• Explain the operation of physical layers for a WLAN.
• Explain the access methods for WLANs.
• Distinguish between different types of IEEE 802.11.
• Discuss wireless LAN security.
Introduction
The wireless local area network (WLAN), or IEEE 802.11, is a LAN technology
that enables users to access an organization’s network from any location inside the
organization without any physical connection to the organization’s network. WLAN
uses radio frequency or infrared waves as transmission media. The WLAN is the
next generation of campus networks. Students are able to connect their laptops to
the campus network from any location inside the campus. In hospitals, a WLAN
allows doctors and nurses to access patients’ files from any site in the hospital.
Likewise, WLANs are used in warehouses and workshops. The following are some
of the advantages of wireless LANs over wired LANs:
1. Wireless LANs can be used in places where wiring is impossible.
2. Wireless LANs can be expanded without any rewiring.
3. Wireless LANs provide the users mobility, that is, the users can move their com-
puters anywhere inside the organization.
4. Wireless LANs support roaming allowing users to move around with their lap-
tops without interrupting their connections.
5. Wireless LANs are cost effective as they make it possible to move from one loca-
tion to another without the expense of connecting wires.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 243
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_12
244 12 Wireless Local Area Network (WLAN)
12.1 WLAN Components
Wireless LANs are composed of three main components: the WLAN Network
Interface Card (NIC), Access Point, and Network Operating System.
A. WLAN Network Interface Card (NIC): The WLAN Interface Card operates
at the data link layer. The MAC frame is transmitted to the physical layer, and
then the physical layer changes the bits to a radio frequency (RF) signal for
transmission. Also, the physical layer accepts RF signals converted to bits.
B. Access Point (AP): An Access Point is a wireless hub. It is connected to a wired
LAN. The AP provides coordination between wireless devices. Figure 12.1
shows an AP. The antenna of the AP accepts a signal (acting as a receiver) and
transmits signals (as a transmitter). The combination of the receiver and trans-
mitter is called a transceiver.
Antenna
Antenna
Directional Antenna
Omni-directional Antenna
Antenna Gain The Antenna Gain is measured in dBi, where dB stands for decibel
and i stands for isotropic. An isotropic antenna is an ideal antenna that transmits the
RF signal in all directions equally; but real antennas do not transmit RF signals in
all directions. Therefore, the gain of antennas is given by Eq. 12.1
G = Pa / Pi (12.1)
where:
G is the Antenna Gain (measured in dBi)
G dBi = 10 log10 G
Pi = Pt / 4 pi r 2 (12.2)
C. Network Operating System: Most operating systems come with a wireless NOS.
12.2 WLAN Topologies
antena
Server
Ethernet Access
HUB Point
Cell
Server
Distribution
System
AP AP
PC PC
PC PC
• Wireless Bridge: Will turn the Access Point into a wireless bridge. It will link a
wireless network to a wired network.
Wireless Unmanaged Network The topology for an unmanaged network is called
Ad-Hoc. In an Ad-Hoc topology, the LAN is made of wireless devices without any
Access Point. In this topology, each device communicates directly with other
devices, as shown in Fig. 12.5.
Two types of technology used for the transmission of information in WLANs are
infrared (IR) technology and radio frequency (RF) technology.
248 12 Wireless Local Area Network (WLAN)
Frequency
Power
F1 Fn Frequency
The IEEE 802.11 committee has approved several standards for WLAN. The stan-
dard defines functions of the Medium Access Control (MAC layer) and the Physical
Layer. Table 12.1 shows the physical layer and data link layer for various WLAN
standards.
902 MHz 928 MHz 2.4 GHz 2.48 GHz 5.725 GHz 5.85 GHz
Industrial Band Scientific Band Medical Band
I-band S-band M-band
IEEE 802.11b and g operate at 2.4 GHz, while IEEE02.11n operates at both the 2.4
and 5 GHz band. The physical layer signal transmission methods are Frequency
Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS),
Orthogonal Frequency Division Multiplexing (OFDM), and Orthogonal Frequency
Division Multiple Access (OFDMA).
Frequency Hopping Spread Spectrum (FHSS) The IEEE 802.11 standard rec-
ommends the use of the scientific band (2.4 GHz to 2.483 GHz) of the ISM band for
WLAN. This band is divided into 79 channels of 1 MHz each. The transmitter sends
each part of its information on a different channel. Figure 12.9 shows frequency
hopping spread spectrum.
The order of the channels used by the transmitter to transmit information to the
receiver is predefined, and the receiver knows the order of the incoming channels.
For example, the transmitter may use a hop pattern of 3, 6, 5, 7, and 2 for transmit-
ting information. The hop sequence can be selected during the installation of the
WLAN. The FCC requires that a transmitter spend a maximum of 400 ms in each
frequency for the transmission of data (this time is called the Dwell time) and use
75 hop patterns (each hop is one channel). The FCC also requires that the maximum
power for the transmitter in the United States should not exceed one watt.
Frequency Hopping Spread Spectrum (FHSS) is more immune to noise because
information is transmitted at different channels. In FHSS, if one channel is noisy, it
can retransmit information on another channel.
Direct Sequence Spread Spectrum (DSSS) In DSSS, before transmission, each
bit of information is broken down to a pattern of bits called a Chip. For the genera-
tion chip bits, each information bit is Exclusive-ORed with Pseudo Random Code,
as shown in Fig. 12.10. The output of the Exclusive-OR for each data bit is called
chip bits. These chip bits are modulated and then transmitted. This method creates
a higher modulation rate because the transmitter transmits the chip bit over a larger
frequency spectrum. Figure 12.11 shows the transmission section of the physical
layer. The receiver uses the same pseudo random code to decode the original data.
Power
1 0
Data Bit
Output
of XOR
Antena
Information Exclusive
OR Modulator Amplifier
Pseudo code
Carrier
frequency
A larger chip sequence generates a larger frequency band. IEEE 802.11 recom-
mends 11 bits for each chip.
The DSSS supports two types of modulation: Differential Binary Phase Shift
Keying (DBPSK), which is used for a data rate of 1 Mbps, and Differential
Quadrature Phase Shift Keying (DQPSK), which is used for data rates of 2 Mbps.
Orthogonal Frequency Division Multiplexing (OFDM) Multipath fading occurs
when a communication signal transmitted through the air takes multiple paths to its
destination. Due to this problem, multiple copies of the same signal will reach the
intended target at different times. The problem may become compounded if this
delay is greater than the time it takes to transmit a signal. This may cause what is
known as Inter-Signal Interference (ISS), whereby a subsequent signal transmission
arrives before a primary transmission. Applying OFDM to the transmitted signal
will eliminate the problems associated with ISS.
OFDM, also called Multicarrier Modulation, divides the channel bandwidth into
multiple orthogonal (out of phase by 90 degrees) subchannels, as shown in
Fig. 12.12. The data stream is divided into n*m bit streams, where n is the number
252 12 Wireless Local Area Network (WLAN)
of channels and m is the number of bits in the data stream. The value of m depends
on the modulation technique used by the Modulation block shown in Fig. 12.13. If
QPSK is used for modulation, then m is equal to 2 bits. Each bit stream will use a
different subcarrier for transmission.
OFDM has been used in IEEE 802.11a/g, IEEE 802.11n, IEEE 802.16a, and
Digital Audio Broadcast (DAB).
Orthogonal Frequency Division Multiple Access (OFDMA) In OFDM, only
one user transmits on a subcarrier channel. Multiple users transmit on subcarrier
channels at different times, where each user is assigned subchannels for transmission.
The IEEE 802.11b standard extends the DSSS physical layer of 802.11 to provide
higher data rates of 5.5 Mbps and 11 Mbps. 802.11b uses Complementary Code
Keying (CCK that may be used) to support the two data rates: 5.5 Mbps and 11
Mbps, in addition to 1 Mbps and 2 Mbps.
IEEE 802.11b Channels The IEEE 802.11b standard defines 11 channels; each
channel is represented by its center frequency. For example, channel 1’s center
frequency is 2412Mhz, and channel 2’s is 2417 Mhz. The center frequency of each
channel is separated from adjacent channels by 5 MHz. The bandwidth of each
12.5 Wireless LAN Physical Layer 253
channel is 16 MHz, and using adjacent channels will cause interference. IEEE
802.11b supports three nonoverlapping channels, 1, 6, and 11, to overcome interfer-
ence. To avoid channel overlap, the most common used channels are 1, 6, and 11.
Figure 12.14 shows an arrangement of APs in a three-story building, where each
row represents one floor with its Access Point and channel number.
IEEE 802.11a Physical Layer IEEE 802.11a operates at 5 GHz and it is not com-
patible with IEEE802.11b; it uses DSSS technology. IEEE 802.11a operates in the
Unlicensed National Information Infrastructure Band (U-NII). The U-NII band
consists of three 100 MHz frequency bands, as shown in Fig. 12.15. The physical
layer of IEEE 802.11a uses Orthogonal Frequency Division Multiplexing (OFDM)
for transmitting data at higher rates. IEEE 802.11a offers data rates of 6, 9, 12, 18,
24, 36, 48, and 58 Mbps. The physical layer can use any of the BPSK, QPSK,
16QAM, and 64QAM for modulation depending on the data rate. The frequency of
the operation is made of twelve 20Mhz channels.
IEEE 802.11g Physical Layer IEEE 802.11a and IEEE 802.11b define different
standards, which are not compatible with each other. IEEE 802.11b operates at
2.4 GHz and transmits data at the rate of 11 Mbps using DSSS technology, whereas
IEEE 802.11a uses OFDM. IEEE 802.11g operates in 2.4 GHz using DSSS and
OFDM for the transmission of information. Table 12.2 shows the characteristic of
IEEE 802.11 a, b, and g.
254 12 Wireless Local Area Network (WLAN)
Figure 12.16 shows the physical layer architecture of the IEEE 802.11 family. The
physical layer is divided into two sublayers: the Physical Layer Convergence
Procedure (PLCP) and Physical Medium Dependent.
The MAC layer transfers a frame to the Physical Layer Convergence Procedure
(PLCP). The PLCP adds its own header to the MAC frame and transmits the frame
to PMD for transmission. The IEEE 802.11 defines frequency hopping and DSS for
the physical layer. Figure 12.17 shows the PLCP header for DSSS, and Fig. 12.18
shows the PLCP frame format for frequency hopping spread spectrum (FHSS).
The following describes the function of each field in the PLCP frame format:
Sync Field: Sync Field is used for synchronization. It is 80 bits of alternating 0’s
and 1’s.
SFD Field: The SFD Field is 00001100 10111101.
Length Field: This field defines the length of PLCP in bytes.
Signaling: This field indicates to the physical layer the modulation type that must
be used for transmission of the frame. The data rate is calculated as follows:
Physical Layer
Convergence Procedure
Physical Medium Physical
Dependent (PMD) Layer
80 16 12 4 16 bits
128 16 8 8 16 16 bits
Table 12.3 Value of Value of signal field in Hex Data rate in Mbps
signaling field and data rate 0A 1
14 2
37 5.5
6E 11
The value of signaling field and its data rate is shown in Table 12.3.
CRC-16: Is used for error detection in the PLCP header.
Service Field: This field is reserved.
IEEE 802.11b has two types of PLCP Preamble headers, Short PLCP preamble
headers and Long PLCP preamble headers. The short PLCP Preamble header has 56
bits for the Synchronization field and the Long Preamble header has a 128-bit
Synchronization header.
Interframe Space
In general, the Interframe space enables the receiver to complete the frame before
the next frame comes. The IEEE 802.11 defines three types of Interframe Spaces
(IFS) among the frames transmitted between source and destination. They are:
1. Short Interframe Space (SIFS): This Interframe Space is used for immediate
responses such as ACK, CTS and RTS.
2. Distribution Coordination Function Interframe Gap Space (DIFS): DIFS is used
for the spacing of data frames.
3. Point Coordination Function Interframe Space (PIFS): This interval is used for
the point condition access method and the gap is used for polling of a client. The
client should respond after this time.
The Medium Access Control (MAC) layer performs the following functions:
• Supports multiple physical layers
• Supports access control
• Fragmentation of frame
• Frame encryption
• Roaming
IEEE 802.11a defines distribution coordination function (Carrier Sense Multiple
Access with Collision Avoidance CSMA/CA) and point coordination function as
methods for a station to access Wireless LANs.
256 12 Wireless Local Area Network (WLAN)
Is channel no
idle
yes
Is channel No
idle
yes
Transmit packet
Coverage B Coverage C
AP
Coverage A
RTS
or
Busy
CTS
Data
ACK/ NACK
be transmitting to the AP at the same time and cause a collision. Station C is a hid-
den station; therefore, there is no physical connection to detect this collision. The
following steps describe the CSMA/CA operation and Fig. 12.21 shows the CSMA/
CA process.
1. Station B wants to transmit to the AP so it senses the medium. If the medium is
clear, it sends a short message to the AP called the Request to Send (RST). This
message contains the destination and source addresses, and the size of the data
to be transmitted.
2. If the AP is ready to communicate with B, the AP will send a Clear to Send
(CTS) frame to B; otherwise, it will send a busy frame. This signal can be
detected by station C and is taken as a busy medium. Station B receives a CTS
signal and then transmits its frame. The receiver acknowledges each frame trans-
mitted by B.
258 12 Wireless Local Area Network (WLAN)
IEEE 802.11 defines three types of frames for WLAN: Management frames, Control
frames, and Data frames. Figure 12.22 shows the MAC frame format for IEEE 802.11.
The function of each field in MAC frame of IEEE 802.11 are described as
follows:
Frame Control: The Frame Control field is 2 bytes and defines the type of frame,
as shown in Fig. 12.23.
The following describes the function of each field of Fig. 12.23:
Protocol: Defines the protocol version. The current version is zero.
Type: Defines the type of the frame. 00 means management frame, 01 means control
frame, and 10 means data frame.
Subtype: Defines the subframe in each type. There are several subtype manage-
ment frames.
To DS and From DS Fields: To DS and From DS define the direction of the frame
and the function of the address fields in Fig. 12.23. Table 12.4 describes the func-
tion of To DS, From DS, and address fields (Address1, Address2, Address 3, and
Address 4 fields).
In Table 12.4, DA is the destination address (MAC address) and SA is the source
address.
More Fragment: The fragment field set to 1 indicates that more frames, belonging
to the same application, are coming. This field set to zero indicates to the destina-
tion that the current frame is the last frame.
Power Management: This bit set to 1 indicates that the transmitter is operating
under power management.
2 2 6 6 6 2 6 0-2312 4 bytes
bits 2 2 4 1 1 1 1 1 1 1 1
Protocol More
Type Subtype To DS Fro m Retry Power More WE R
DS Frag ment Man Data P S
Wired Equivalent Privacy (WEP): This bit set to 1 to indicate that a Cryptographic
Algorithm has changed the information.
Retry: Retry set to1 indicates that this is a copy of the previous frame.
RS: Reserved bit.
Duration/ID This field contains the duration value (Network Allocation Vector
NAV value) to inform other stations how long it will take for the source to complete
its transmission (in microseconds). The other stations use the NAV value to defer
their transmissions.
Sequence Number This field is divided into two fields: a 4-bit field and a 12-bit
field. The first four bits indicates a fragment number, and the 12-bit field indicates
the sequence number of the frame.
The IEEE defines three types of frames: management frames, control frames, and
data frames.
Management Frames The management frame is used by a station to make a con-
nection to the AP, to disconnect the station from the AP, and for timing and synchro-
nization. Some of the management frames are:
• Association Request (subtype = 0000): Client sends a request frame for joining
a BSS network.
• Association Response (subtype = 0001): AP responds to client request as to
whether the AP is accepting this request or not.
260 12 Wireless Local Area Network (WLAN)
In order for a client to associate with an Access Point, it must perform the probe
phase, authentication phase, and association phase. The following describes each
phase in detail:
Probe phase: When a station wants to join a BSS, the station needs to get synchro-
nization information from the AP (clock value of AP). This can be accomplished
in two ways: by passive scanning and active scanning.
Passive scanning: In this method, the station can receive a beacon frame,
which is being sent out periodically by the Access Point. This beacon frame
contains synchronization information.
Active scanning: In this method, the station transmits a Probe request frame
to locate an Access Point and waits for a Probe response. The Probe response
frame contains the synchronization clock.
Association phase: If the authentication phase is completed successfully, the sta-
tion will send an association request packet to the Access Point. The Access
Point adds the station to its association table. A station can associate only with
one Access Point at a time.
12.11 Roaming
Roaming is when a station moves from one cell to another cell without losing con-
nection. In WLAN, moving from one cell to another must be performed between
packet transmissions, meaning the packet must be transmitted completely before
moving to another cell.
12.12 Wi-Fi Certification
The RF signal can be distorted while going through physical obstacles such as a
wall, a ceiling, or by multipath fading.
262 12 Wireless Local Area Network (WLAN)
Ceiling
Access Point
Reflector
12.14 IEEE 802.11n
The IEEE 802.11n protocol adds several enhancements to the physical and MAC
layers of the IEEE802.11a/b/g protocols in order to improve performance, effi-
ciency, and throughput. These enhancements are:
1. Multiple-Input Multiple-Output (MIMO): MIMO uses multiple transmitters and
multiple receivers. MIMO, as defined under IEEE 802.11n, is characterized by
the formula N*M, where N is the number of transmitters and M is the number of
receivers ranging from 1*1 to 4*4.
2. 40 MHZ operation band.
3. Frame aggregation: Combining two or more frames into a single frame for
transmission.
4. Block acknowledgment: Multiple packets can be acknowledged with sin-
gle packet.
5. Backward compatibility with IEEE 802.11 a/b/g.
6. Spatial multiplexing: Simultaneously send multiple data stream to the receivers.
12.14 IEEE 802.11n 263
Spatial streams are transmitted by Tx1 and TX2, respectively, and the M3 and M4
spatial streams are transmitted by TX1 and TX2, respectively. The receiving side
reassembles the streams.
12.14 IEEE 802.11n 265
12.15 IEEE 802.11AC
Summary
Key Terms
Review Questions
Objectives
After completing this chapter, you should be able to:
• List types of Low Power Wireless Networks.
• Describe Low Power Wide Area Networks.
• List the applications of ZigBee.
• Explain ZigBee topologies.
• Show the ZigBee Protocol Architecture.
• List ZigBee device types.
• Show the ZigBee physical layer frame format.
• Describe ZigBee node address assignment.
• List ZigBee physical management services.
• Explain the IEEE standard for ZigBee’s MAC and physical layers.
• Show the 6LoPAN Protocol Architecture.
• Describe the Application of 6LoPAN.
• List the applications of the LoRa Wide Area Network.
• Describe LoRaWAN characteristics.
• List LoRa WAN components and their function.
• Show LoRaWAN Protocol Architecture.
• Describe LoRaWAN end devices.
• List LoRaWAN security keys.
Introduction
Internet of Things technology (IoT) is growing fast due the advancement of low
power wireless sensor networks. These low power networks find use in automation
of commercial building systems, home automation, industrial automation, energy
and utility automation, healthcare, and remote control. The power of a wireless
network can be classified based on the network’s distance coverage.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 273
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_13
274 13 Low Power Wireless Technologies for Internet of Things (IoT)
A. Low Power Wireless networks cover up to 100 m and include Bluetooth, ZigBee,
Z-wave, Thread, 6LoWPAN, and WirelessHart.
B. Low Power Wide Area network technologies cover up to 15 km and include
LoRa, Sigfox, and DASH.
The remainder of this chapter will cover ZigBee, 6LoWPAN, and LoRa in detail.
13.1 ZigBee
In 2007, the ZigBee Alliance published two feature sets called ZigBee and ZigBee
PRO. The ZigBee has the following characteristics:
• Low battery consumption: a ZigBee end device should operate for months or
even years without battery replacement.
• Low data rate: the maximum data rate for ZigBee device is 250 Kbps.
• Easy to implement.
• Supports up to 65,000 nodes connected in a network.
• ZigBee can automatically set up its network.
• ZigBee uses small packets, unlike Wi-Fi and Bluetooth
Table 13.1 shows a comparison of ZigBee with Bluetooth and Wi-Fi.
ZigBee Node Operation The ZigBee node can operate as a full function device
(FFD) or reduced function device (RFD) for specific operations. The full function
device operates in the full IEEE 802.15.4 MAC layer, while the reduced function
device performs only a limited number of tasks.
ZigBee Device Types ZigBee offers following device types:
A. Coordinator: A coordinator is a FFD and is responsible for overall network
management. Each network has exactly one coordinator. The coordinator per-
forms the following functions:
• Selects the channel to be used by the network.
• Starts the network.
• Defines how addresses are allocated to nodes or routers.
• Permits other devices to join or leave the network.
• Holds a list of neighbors and routers.
• Transfers application packets.
B. Router: A router is a FFD which is used in tree and mesh topologies to expand
network coverage. A router performs all functions like a coordinator except for
the establishing of a network.
C. End Device: An end device is a RFD that performs the following functions:
• Each end device (child) can be connected to a router or coordinator (parent).
• Can join or leave a network at will.
• Transfers application packets.
D. ZigBee Trust Center (ZTC): The ZigBee Trust Center is a device which pro-
vides security management, security key distribution, and device authentication.
E. ZigBee Gateway: The ZigBee Gateway is used to connect the ZigBee network
to another network, such as a LAN, by performing protocol conversion.
276 13 Low Power Wireless Technologies for Internet of Things (IoT)
13.1.2 ZigBee Topologies
ZigBee offers Star, Tree, and Mesh topologies. Figure 13.2a–c all show ZigBee
topologies. Note that each topology uses only one controller.
The ZigBee alliance developed several application profiles that are ready to be used
by the users, which are as follows:
• Home automation (HA)
• Smart Energy (SE)
• Commercial Building Automation (CBA)
• ZigBee Health Care (ZHC)
• Telecom Applications (TA)
• ZigBee RF4CE Remote Control
One the most popular ZigBee profiles is Smart Energy (SE). The Smart Energy
network is a combination of Advanced Metering Infrastructure (AMI) and Home
Fig. 13.2 (a) Star topology. (b) Tree topology. (c) Mesh topology
13.1 ZigBee 277
Area Network (HAN), where each meter is equipped with ZigBee node. The AMI
network is connected through a gateway and to a server. The Home Area Network
consists of a connected washer, dryer, thermostat, and display. The Smart Energy
network can perform the following functions:
• The utility company can read the meters at any time.
• Smart energy enables the utility companies to give specific information to cus-
tomers regarding how to save energy.
• Detects power interruption and location.
• The meter can receive commands and, in the case of emergency, turn off cus-
tomer power.
• Notify customer of high peak, allowing the customer to reduce consumption.
• Customers can receive time-based pricing, allowing them to make smart energy
choices.
• Time-based billing report (monthly, weekly or daily).
• Communicates in two ways: from meter to central utility and from central utility
to meter.
Another application profile is the RF4CE Remote control. Radio Frequency for
Consumer Electronics (RF4CE) is a protocol developed by a consortium of compa-
nies as such as Freescale, Texas Instruments, OKI, Panasonic, Philips, Samsung,
and Sony. It defines a standard specification for designing remote control devices
for the TV, VCR, and DVD player. The characteristics of a RF4CE device are as
follows:
• Does not require line-of-sight to the receiver.
• Supports two-way RF communication between the controller node and the tar-
get device.
• Communication between target devices.
• Enables the remote control to display device status.
• Supports paging to locate the remote control.
• Operates in 2.4 GHz.
• Uses a multi-star topology.
Figure 13.3 shows the ZigBee Protocol Architecture. The ZigBee Alliance devel-
oped the ZigBee Device Object (ZDO), the Application Support Sub-layer (APS),
the Network Layer, and Security Management. IEEE 802.15.4 is used for the MAC
layer and physical layer.
278 13 Low Power Wireless Technologies for Internet of Things (IoT)
ZDO Public
Application Application Application
Interface
or ZigBee
Object 240 Object 239 Object 1
Endpoint 0 Application
or or or
Endpoint 240 Endpoint 239 Endpoint 1 Device Binding, Management
and Security
ZOD Management
Security
Service
NLDE-SAP NLME-SAP
MLDE-SAP MLME-SAP
MDLE MLME
MIB
Medium Access Control (MAC)
13.1.5 Physical Layer
The physical layer performs data service and physical layer management. The func-
tions of the data service are as follows:
• Receiving frames from the upper layer and converting to RF signals for
transmission.
• Receiving RF signals from the air and converting them to bits for transfer to the
upper layer.
The physical layer management services are as follows:
• Activation and deactivation of the transceiver.
• Clear Channel Assessment (CCA): Checks if the channel is clear or not.
• Energy Detection (ED): Measures energy level of the channel.
• Link Quality Indication (LQI): Indicates the quality of incoming packets.
• Channel Selection: As channels are divided into pages, IEEE 802.15.4 offers 27
channels on page 0 and 11 channels each on pages 1 and 2.
13.1 ZigBee 279
The IEEE 802.15.4 uses 32 bits to represent the page number and channel num-
ber, where the five most significant bits represent the page number and the 27 least
significant bits represent the channel number. Table 13.2 shows examples of page
numbers and the channel numbers related to each page, as well as the frequency
bands, data rate, and the types of frequency modulations. As shown in the table,
there are 27 channels in page 0, and on page 2 the type of modulation used is
O-QPSK (Offset-QPSK).
The physical layer uses Direct Sequence Spread Spectrum (DSSS) for transmis-
sion of information.
Physical Layer Frame Format Figure 13.4 shows the physical layer frame for-
mat. The physical layer can carry only 127 bytes from the MAC layer.
The MAC layer performs data services (transmits and receives frames from the
upper and lower layers) and management services. The management services per-
form following functions:
• End device association and disassociation.
• In a coordinator, it offers optional Guarantee Time Slot (GTS) for each device
accessing the network.
• In a coordinator, it generates the beacon frame.
• Provides Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
as the access method for the network.
• Provides reliable connection between two MAC layers by using an acknowledg-
ment frame.
Device Address and PAN ID Each node is assigned a unique address which can
either be a 64-bit address assigned by the IEEE or a 16-bit short address. Each net-
work is assigned a 16-bit PAN ID (Personal Wireless Network ID).
280 13 Low Power Wireless Technologies for Internet of Things (IoT)
SHR PHR
MAC Layer Scanning Channels The MAC layer can perform the following chan-
nel scanning operations:
• Energy Detection: Energy detection is used by a coordinator to measure the
energy level of selected channels in order to select the best channel.
• Active Scan: The active scan is used to determine if any network is in its vicinity.
This is done by sending a beacon request command.
• Passive Scan: The full functional device or reduced functional device listens for
any beacon transmitted by any coordinator. A passive scan is used by a device in
order to join a network.
• Orphan Scan: Orphan scan is used by a device which has lost its parent and is
trying to re-associate itself with the parent device.
General MAC frame format Figure 13.5 shows the MAC frame format and
Fig. 13.6 shows the frame control fields.
The FCS is calculated over the MHR and MAC payload parts. FCS uses CRC
G(16) = X16 + X12 + X5 + 1
Frame Type 000 denotes a Beacon Frame, 001 a Data Frame, 010 an Acknowledge
Frame, 011 a Command Frame, and 100–111 are all reserved.
PAN ID Compression This bit indicates if the destination device is located in the
same network or a different network as the source device.
Source and Destination Addresses Mode 00 means indirect addressing, 10 means
16-bit addressing, and 11 means 64-bit addressing.
Frame Pending This field indicates there is more data being held for this device
which the device can request.
Auxiliary Security ZigBee does not support MAC layer security.
The Network Layer performs Data and Management services. Management ser-
vices are as follows:
13.1 ZigBee 281
Address fields
MAC Footer
(MFR)
MAC header (MHR)
3 1 1 1 1 2 2 2 2
Dest Source
Frame Security Frame Ack PAN ID Reserved Frame
Address address
type enable pending Request Compression Version
Mode Mode
13.1.8 Application Layer
The application layer consists of application objects (endpoints) which hold user
applications and ZigBee Device Objects (ZDOs). Each node has 240 endpoints
meaning each node can have 240 sensors.
ZigBee Security ZigBee provides message integrity, authentication, freshness and
privacy for a ZigBee device.
• ZigBee security uses Counter Mode (CTR) with 128-bit AES for the encryption
of messages.
• ZigBee security uses Cipher Block Chaining (CBC) with 128-bit AES for the
generation of the Message Integrity Code (MIC).
• ZigBee security uses symmetric keys for all levels of security.
• ZigBee security can apply cryptography and frame integrity at the application
and network layers.
ZigBee Security Keys and Trust Center ZigBee defines three types of keys for
security: the link key which is used for the application link key and Trust Center
Link, as well as the Network Key and Master Key.
Application Link Key This key is used for security of application data between
two devices and it is shared only between two devices. An application link key may
be preconfigured, distributed by a trust center to the devices, generated from a mas-
ter key, or installed using the Symmetric-Key Key Establishment (SKKE) protocol.
Trust Center Link Key This key is used by the trust center and devices on the
network for securing communication between the trust center and devices. This key
is preconfigured in the devices.
Standard Mode Standard security mode is used by ZigBee and ZigBee Pro.
Standard security uses two network keys that are transmitted by the trust center to
the devices for encryption and decryption.
High Security Mode High security mode is used by ZigBee Pro. The high security
mode provides all functions supported by standard security with the following addi-
tional functions:
• Entity authentication: This is used by two devices to authenticate each other
based on their active network key.
• Permission table: This table indicates which devices have permission for using
commands such as permission to join or leave.
• Generating link keys between devices using the SKKE protocol.
• Two network keys
• The trust center holds network keys, master keys, and list of devices
13.2 6LoWPAN Architecture 283
13.2 6LoWPAN Architecture
6LoWPAN stands for IPV6 over Low Power Personal Area Network. 6LoWPAN
was developed by the IETF (Internet Engineering Task Force) to enable Low Power
Wireless Devices to be able to carry IPv6 packets in order to support the Internet of
Things. 6LoWPAN defines encapsulation and header compression mechanisms that
allow IPv6 packets to be sent and received over IEEE 802.15.4-based networks.
Assume in Fig. 13.5 that the Auxiliary Security field is 8 bytes, then the size of
MAC header will be 31 bytes. Add to that the size of the MAC Header and MAC
footer = 31 + 2 = 33 bytes.
The Physical Layer Payload of IEEE802.15.4 can carry only 127 bytes; there-
fore, the maximum size of IPV6 will be 127 − 33 = 96 bytes. From these 96 bytes,
40 bytes are used for IPV6, resulting in 56 bytes used for the TCP packet. The IETF
developed 6LoWPAN layered architecture as shown in Fig. 13.7.
The functions of the Adaptation Layer are as follows:
A. Compression: The IPv6 header can be compressed from 40 bytes to a minimum
of 3 bytes, but the hop limit cannot be compressed. When the Adaptation Layer
is set to 01000001, it means that there is no IPV6 header compression, as shown
in the uncompressed IPv6 header in Fig. 13.8.
If the Adaptation Layer is set to 01000010, then that means the IPV6 header is
compressed based on information provided in the HC1 field, as shown in Fig. 13.9.
The HC1 field determines which field of IPV6 is to be compressed.
B. Fragmentation: Fragments the IPv6 payload into multiple frames. Figure 13.10
shows a combination of fragmentation with compression.
Figure 13.11 shows the 6LoWPAN architecture where the Low Power Wireless
Networks are connected to the Internet through the Border Routers. The Border
Routers perform the following functions:
• Compress incoming packets from an IPv6 Network and forward them to
6LoWPAN.
• Segmentation of large IPv6 packets and forward the segments to 6LoWPAN.
• Decompress incoming packets from 6LoWPAN and forward them to an IPv6
Network.
Low Power Wide Area Network (LPWAN) technology is capturing a large market
of IoT, which offers long range, low power, low data rate communications. There
are several LPWAN technologies such as LoRa, SIGFOX, and NB-IoT. LoRa stands
for Long Range, and it is a wireless modulation method that is used for LPWAN. LoRa
WAN wireless technology was developed by the LoRa Alliance and LoRa wireless
radio frequency technology was developed by SEMTECH Corporation. Table 13.3
shows some of the applications of LoRa.
LoRa End Device (Sensor Node) The end device communicates with the Gateway
through LoRa RF, and the Gateways communicate with a network server through
TCP/IP through a public or private network. The end device transmits packets in the
form of broadcasts and receives from multiple gateways within the range. The gate-
ways then transmit the packets to a network server. With this design, the network
server will receive multiple copies of a packet and select one of the packets to trans-
mit to the appropriate application server. For example, if the packet belongs to the
gas meter, then the network server will transmit the packet to the Gas Meter Server
(an application server).
End Device Identifiers Each end device has the following identifiers:
A. Device Identifier (DevEUI): This is a 64-bit unique identifier which is set by
vendors or developers.
B. End Device Address: Each end device has a 32-bit address which is used for
communication between the end device and gateway. The device address is
unique in the network and assigned by the network server to the device during
the join process.
C. Application Identifier (AppEUI): AppEUI is a unique identifier for the applica-
tion server that assigns to the end device. This is used by the network server to
send the packet to the appropriate application server.
LoRa Gateway The LoRaWAN gateway is connected to the network server
through Ethernet or the Internet. The end device transmits the packet to gateway,
then the gateway demodulates the received signals, adds the following information
to the packet, and then transmits to the network server:
(a) The arrival time of the packet
(b) SNR (Signal to Noise Ratio)
(c) RSSI (Receive Signal Strength)
(d) Data rate
(e) Channel number
The gateway listens to multiple channels and processes multiple packets. In a
LoRaWAN with multiple gateways, the end device broadcast message may be
received by multiple gateways. The gateways transmit the packets to the network
server, then the network server will select the best packet based on signal quality
and reject rest of the packets.
Network Server The network server performs the following functions:
A. The network server receives the data packets from multiple gateways and
removes duplicate packet if received by multiple gateways then transmit one
packet to the application server.
B. The communication between the Gateways and application servers can use by
Public or Private Networks
C. The network server responsible for managing end devices and Gateways such as
device Join request, device authentication, assign an address to the end device,
and register new device.
D. The Network Server supports channel re-configuration. It will automatically
disable channels on the node that are not being used by the network.
13.3 LoRa Wide Area Network Technology (LoRa WAN) 287
E. The network server can implement Adaptive Data Rate (ADR) for the end
device. The ADR is used to assign the best data rate to end device with the least
transmission power.
F. The network server uses information when receiving the packet from the gate-
way, such as the SNR or SSR to select the best gateway for the downlink
transmission.
Application Server The application server is connected to the network server. It
decrypts incoming packets and encrypts outgoing packets using the Application
Session Key.
Join Server The function of the join server is to activate and de-activate the end
device, as well as to also generate session security keys.
The LoRa Alliance developed the LoRa Protocol Architecture. Figure 13.12 shows
the LoRaWAN Protocol Architecture, which consists of a Physical, Data Link, and
Application Layer. The word “LoRa” refers to the Physical (PHY) layer of
LoRaWAN.
The physical layer consists of LoRa Modulation with regional ISM bands. The
LoRa physical layer uses Chirp Spread Spectrum (CSS) modulation which enables
LoRaWAN to consume low power and transmit rf signals up to 15 km.
LoRa MAC Layer
The LoRa MAC Layer offers three different types of end-user operations, those
being Class A, Class B, and Class C. The LoRa MAC Layer performs the following
functions:
13.3.4 LoRaWAN Security
When a node requests connection to LoRaWAN, then the network server and nodes
generate several keys that are used for security, authentication, and message integ-
rity. The LoRaWAN specification defines two versions of LoRa Security, version 1,
and version 1.1. LoRAWAN version 1 only uses one root key called the APPKey
(Application Key) to generate the Application Session Key and Network Session
Key for security. To address the shortcomings of security version 1, the LoRa
Alliance published LoRaWAN security version 1.1.
Summary
• ZigBee end devices can operate for months and years without battery replacement.
• The maximum ZigBee data rate is 250 Kbps.
• ZigBee supports Mesh, Star, and Tree topologies.
• ZigBee supports 65,000 nodes per network.
• The ZigBee device types are the end nodes, the coordinator, the router, and
ZigBee trust center.
• In a ZigBee network, only one coordinator can exist.
• The function of the coordinator is to manage the network and assign addresses to
the end nodes and routers.
• ZigBee defines two types of node operations: full function and reduced function.
• End devices operate at reduced function and the coordinator operates at full
function.
• ZigBee developed applications for home automation, Smart Energy, healthcare,
and more.
• ZigBee uses IEEE 802.15.4 for the physical and MAC layers.
• ZigBee operates at 2.4 GHz band in USA.
• ZigBee end devices use CSMA/CD to access the network.
• ZigBee offers Standard and High security modes.
• ZigBee operates at a short-range distance of 100 m.
• 6LoWPAN stands for IPV6 over Personal Area Network.
290 13 Low Power Wireless Technologies for Internet of Things (IoT)
• IETF developed 6LoPAN in order to allow Low Power Wireless Devices to con-
nect to the Internet using IPv6.
• IEEE802.15.4 can carry only 137 bytes.
• LoRa offers long-range communication up to 5 km in urban and 15 km in subur-
ban environments, called a LoRa Wide Area Network.
• LoRa stands for Long Range.
• LoRa applications are electric meters, irrigation control, water meters, and more.
• LoRa uses the star of star topology.
• LoRa operates in the ISM band.
• LoRa uses frequency modulation.
• LoRa offers a data rate between 300 bps and 5 Kbps.
• LoRa components are LoRa end devices, LoRa Gateway, and Network Server.
Key Terms
Review Questions
8. List ZigBee device types and explain the function of each device.
9. List the applications of ZigBee.
10. What is IEEE 802.15.4?
11. Show the ZigBee Protocol Architecture.
12. List the functions of the ZigBee physical layer.
13. How many channels does ZigBee Support on page 0?
14. Show the ZigBee physical layer frame format.
15. What is the maximum payload for ZigBee?
16. How many bits are addressed to a ZigBee end device?
17. List three functions of the ZigBee MAC layer.
18. What is the difference between a full function device and a reduced func-
tion device?
19. What is the function of the Coordinator in a ZigBee network?
20. What method does ZigBee use for encryption?
21. What method does ZigBee use for message integrity?
22. List the ZigBee security modes.
23. What does 6LoWPAN stand for?
24. What is the application of 6LoWPAN?
25. Show the 6LoWPAN Protocol Architecture.
26. What is the function of the Adaptation Layer in 6LoWPAN?
27. What is the function of the Border Router in 6LoWPAN?
28. List four applications for LoRa WAN.
29. What is the topology of LoRa WAN?
30. What frequency band does LoRa operate?
31. What is the maximum coverage of LoRa WAN?
32. What is the data rate of LoRa WAN?
33. List LoRa WAN components
34. Show the LoRa WAN Protocol Architecture
Chapter 14
Introduction to Cryptography
Objectives
After completing this chapter, you should be able to:
• Explain different types of network attacks.
• Define the elements of network security.
• Understand the basics of cryptography.
• List encryption algorithms.
• Distinguish between symmetric and public key cryptography.
• Explain how Diffie–Hellman generates symmetric key.
• Explain how elliptic curve is used for cryptography.
• Understand the application of digital certificates and signatures.
Introduction
Cryptography is a technique used to establish secure communications and is used
frequently in the case of network security. Information flowing across public spaces
such as the internet drives a need for encrypted communications to prevent eaves-
dropping or any other malicious activity. Additionally, cryptography can assist in
verifying the integrity of data to ensure that it is not modified or otherwise altered in
transit. There are two main types of network attacks:
(i) Direct Attack: The attacker is able to disrupt the system by breaking passwords
accessing the system to modify information. For example, a person breaks the
security of a bank server and then alters the account information.
(ii) Indirect Attack or Passive Attack: The attacker obtains the information and
data in a system (such as a name, address, social security, or credit card num-
ber). For example, a person using a cable modem can use a packet sniffer to
capture packets transmitted over the modem and obtain sensitive information.
A packet sniffer is a piece of software that captures packets traveling in and out
of a network. The packet sniffer is used for network monitoring or analysis. The
following are some common attacks used against an organization’s network:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 293
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_14
294 14 Introduction to Cryptography
In order to have secure network, the following network security components are
necessary:
(i) Confidentiality: Confidentiality, or secrecy, means that information being sent
through the network must remain unknown to unauthorized people. This is
handled through the use of various encryption methods.
(ii) Authentication: Authentication methods verify the identity of a person or
computer accessing the network.
(iii) Authorization: To prevent unauthorized access.
(iv) Integrity: Integrity maintains data consistency and prevents tampering with
information.
(v) Non-repudiation: Non-repudiation provides proof of origin to the recipient.
14.2 Introduction to Cryptography
Decryption Key
Encryption Key
PlainText
Encryption Ciphertext Decryption
plaintext Algorithm
Algorithm
Receiver side
Transmission side
1 2 3 4
W E L C
O M E –
T O – C
L A S S
Example 14.2
Figure 14.3 shows the stream cipher and output of XOR is ciphertext. The cipher-
text is transmitted to the receiver which uses the same key to decrypt the text.
Block Ciphers A block cipher is a group of bits that are encrypted. Some of the
symmetric cryptography algorithms using block cipher are the Data Encryption
Standard (DES) that takes 64 bits per block and the Advanced Encryption
Standard (AES).
Key Key
14.3 RC4 Algorithm
RC4 was developed by Ron Rivest and it is also called Ron’s Code. RC4 is a sym-
metric key stream cipher which encrypts bit by bit. The RC4 encryption algorithm
consists of two sub-algorithms, and they are as follows:
A. Key Scheduling Algorithm (KSA)
B. Pseudo Random Generation Algorithm (PRGA)
Key Scheduling Algorithm (KSA)
KSA consists of two sub-algorithms, initialization of State Array or S-box and
scrambling of State Array.
A. Initialization State Array
The RC4 algorithm uses an array of 256 elements which is represented by S[I]
where the value of I goes from 0 to 255 and is initialized to a state where S[I] = I.
Initialization Algorithm
For I= 0 to 255
S[I] = I means S[0] = 0, S[1] = 1, S[2] = 0, S[3] = 0, ….
S[255] = 255,
or it can represent S[I] in the following form:
S =[0, 1, 2, 3, …….255]
Set J=I
For I = 0 to 255 then
J= (J+ S[I] + K[I modulo L]) ( modulo N)
where N represents the number of elements in S[I] and L is the key
length in bytes.
Swap S[I], S[J]
Example Assume S = [0, 1, 2, 3] which holds 4 values and each value represented
by three bits rather than 8 bits for simplicity
Assume encryption K = [1, 5, 2, 4] and apply the scrambling algorithm:
298 14 Introduction to Cryptography
If message represented by M = M0, M1, M2, M3, then the cipher text is the out-
put of Fig. 14.4.
Figure 14.5 shows a block diagram of DES. DES is a block cipher, where a message
is divided into 64-bit blocks of plaintext (b0… b63) and utilizes an initial key of 56
bits. The function of the permutation box is to change the order of bits in the
plaintext. For example, bit b0 becomes b58, b1 becomes b50, etc. The function of the
key generator is to generate 16 different 48-bit keys from a 56-bit key. As shown in
Fig. 14.5, the plaintext goes through 16 iterations using different keys and the results
are permutated to generate the ciphertext.
Figure 14.6 shows a diagram of a single iteration of DES. The output of the per-
mutation box is divided into two groups of 32 bits, called L0 and R0. R0 is changed
to 48 bits by using the expansion/permutation table. The output of the expansion/
permutation box is XORed with the 48-bit key creating a 48-bit result. The 48 bits
14.4 Data Encryption Standard 299
56 Key
Permutation
Key1 48 bits
Iteration1
Key2 48 bits
Iteration2
Key16
Iteration 16
Permutation
Ciphertext
Fig. 14.5 Block diagram of DES
are converted by the substitution box (S-BOX is a table used for converting 48 bits
to 32 bits) to 32 bits. These 32 bits are XORed with L0 yielding the result R1 for the
next iteration. The output of R0 becomes L1 for the next iteration.
Key generation is done by dividing 56 bits into two groups of 28 bits. Both
groups of 28 bits are shifted by one bit and the output becomes the input to the per-
mutation table where 48 bits are generated for the first key. The following method is
repeated with 16 different keys to produce ciphertext as shown in Fig. 14.6.
Triple DES (3DES)
Triple DES is similar to DES but applied three times in series as shown in Fig. 14.7.
The 3DES offers following options:
A. All three keys are independent.
B. K1 and K2 are impendent and K3 = K1.
C. All three keys are the same K1 = K2 = K3.
300 14 Introduction to Cryptography
Permutation
Substitution
32 bits
L1 R1
AES, or Rijndael (the combination of the names Rijman and Daemen, the develop-
ers of the AES algorithm), is a block cipher which can use a 128-bit block of plain-
text and either a 128-, 192-, or 256-bit key for encryption. Figure 14.8 shows a block
diagram of AES. The key generator generates different key for each round.
The number of the rounds is dependent on the key size, and Table 14.1 shows the
number of rounds for a given key size.
The cipher text and key are each represented by a 4 * 4 array of bytes (16 bytes
* 8 = 128 bits) called the cipher state and key, respectively. Figure 14.9 shows the
cipher state and key.
Pre-round Transformation In pre-round transformation, each element of cipher-
text is XORed with the encryption key and the result of the Metrix is input to the
first round.
14.5 Advanced Encryption Standard (AES) 301
| 0 1 2 3 4 5 6 7 8 9 a b c d e f
---|--|--|--|--|--|--|--|--|--|--|--|--|--|--|--|--|
00 |63 7c 77 7b f2 6b 6f c5 30 01 67 2b fe d7 ab 76
10 |ca 82 c9 7d fa 59 47 f0 ad d4 a2 af 9c a4 72 c0
20 |b7 fd 93 26 36 3f f7 cc 34 a5 e5 f1 71 d8 31 15
30 |04 c7 23 c3 18 96 05 9a 07 12 80 e2 eb 27 b2 75
40 |09 83 2c 1a 1b 6e 5a a0 52 3b d6 b3 29 e3 2f 84
50 |53 d1 00 ed 20 fc b1 5b 6a cb be 39 4a 4c 58 cf
60 |d0 ef aa fb 43 4d 33 85 45 f9 02 7f 50 3c 9f a8
70 |51 a3 40 8f 92 9d 38 f5 bc b6 da 21 10 ff f3 d2
80 |cd 0c 13 ec 5f 97 44 17 c4 a7 7e 3d 64 5d 19 73
90 |60 81 4f dc 22 2a 90 88 46 ee b8 14 de 5e 0b db
a0 |e0 32 3a 0a 49 06 24 5c c2 d3 ac 62 91 95 e4 79
b0 |e7 c8 37 6d 8d d5 4e a9 6c 56 f4 ea 65 7a ae 08
c0 |ba 78 25 2e 1c a6 b4 c6 e8 dd 74 1f 4b bd 8b 8a
d0 |70 3e b5 66 48 03 f6 0e 61 35 57 b9 86 c1 1d 9e
e0 |e1 f8 98 11 69 d9 8e 94 9b 1e 87 e9 ce 55 28 df
f0 |8c a1 89 0d bf e6 42 68 41 99 2d 0f b0 54 bb 16
2. Shift Row Step: Performs the following operation on each row of the result of
step 1 as shown in Fig. 14.10.
(a) No shift on first row.
(b) Circular shift left one byte (each bit is shifted 8 times) on the second row.
(c) Circular shift two bytes (each bit is shifted 16 times) on the third row.
(d) Circular shift three bytes (each bit is shifted 24 times) on the fourth row.
5. The result of step 4, array B, becomes the new state for step 1 and this process is
repeated 10 times. The encryption key is generated by key generator for
each round
14.6 Asymmetric Cryptography
Fig. 14.13 (a) Public key encryption and private key decryption. (b) Private key encryption and
public key encryption
14.7 RSA Algorithm 305
Key generator
Request Connection
Customer#1
Stock
Kp1, N1 Broker
Server
Ks1,N1
Ks2,N2
Customer ..
#2 Kp2, N2 Ks99, N99
Kp99, N99
Customer
#99
A. RSA: RSA was named after three inventors: Ron Rivest, Adi Shamir, and
Leonard Adleman, and it is a standard for public key cryptography algorithms.
B. Diffie–Hellman Key Exchange: The Diffie–Hellman key exchange enables
two parties to establish a shared secret key over an insecure network.
14.7 RSA Algorithm
One of the most useful public key cryptography algorithms is the RSA, which is
named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman (already
stated above). RSA is based on number theory and works as follows:
306 14 Introduction to Cryptography
1. Select two prime numbers p and q (prime number is a number divisible by 1 and
itself only). The larger the number, the harder it is to break the RSA algorithm.
2. Let N = p * q, where N is the product of two prime numbers p and q.
3. Let Z = (p − 1) * (q − 1), where Z is the product of p − 1 and q − 1.
4. Select Kp (public key) such that Kp is less than N and has no common fac-
tors of Z.
5. Find Ks (secret key) such that Ks * Kp − 1 is divisible by Z or Ks = (1 + n * Z)/
Kp; where n = 0, 1, 2, . . .
6. The transmitter uses Kp and N to encrypt message M using Eq. 14.1.
EM = M kp modulo N (14.1)
where:
EM is ciphertext
The transmitter then transmits EM to the receiver.
7. The receiver decrypts EM using Ks and N according to Eq. 14.2.
M = EM Ks Modulo N (14.2)
1. Alice and Bob share two random numbers: G for the generator and P for a
prime number.
2. Alice uses equation A = GN Modulo P to generate A, where N is Alice’s
secret number.
3. Alice transmits A, P, and G to the Bob
4. Bob calculates B = GM Modulo P, where M is Bob’s secret number.
5. Bob transmits B to Alice.
6. Alice uses the following equation to calculate the symmetric key.
KA = BN Modulo P
KB = A M Modulo P
Example Find the points on the curve y2 mod 11 = (x3 + x + 3) Mod 11, where in
the above equation a = 1, b = 3, and P = 11.
By using the equation 4a3 + 27b2 ≠ 0 to verify that y2 = (x3 + x + 3) does not have
repeated factors, therefore 4 * 13 + 27 * 32 ≠ 0.
Table 14.3 shows the values of X from 0 to 10 and the corresponding values for
(x3 + x + 3) Mod 11. Also shown are the values of Y from 0 to 10 and the corre-
sponding value of y2 Mod 11.
By observing the results of Table 14.3:
When (x3 + x + 3) mod 11 = Y2 mod 11 = 3, the results are points (0, 5) and (0, 6).
(x3 + x + 3) Mod 11 = Y2 Mod11 = 5 results in the points (1, 4), (1, 7), (4, 4), (4,
7), (0, 4), and (0, 7).
(x3 + x + 3) Mod 11 = Y2 Mod11 = 0 results in the point (3, 0).
(x3 + x + 3) Mod 11 = Y2 Mod11 = 1 results in the points (7, 1), (7, 10), (10, 10),
and (10, 1).
(x3 + x + 3) Moe 11 = Y2 Mod11 = 4 results in the points (8, 2), (8, 9), (9, 2),
and (9, 9).
Therefore, the points on the curve are: (0, 5), (0, 6), (1, 4), (1, 7), (3, 0), (4, 4),
(4, 7), (5, 1), (5, 10), (6, 4), (6, 7), (7, 1), (7, 10), (9, 2), (9, 9), (10, 1), (10, 10)
B. Adding points on the elliptic curve: The elliptic curve is symmetrical about the
x-axis. When given any point P, point −P has to be the point opposite to P.
If P and Q are two points on the curve, then they can uniquely describe a third
point, P + Q. by drawing the line that intersects P and Q it will intersect the curve at
point R, where P + Q is −R, or the point opposite of R, as shown in Fig. 14.17. The
following properties apply for adding two points:
P + Q = R, Q + P = R, P + P = 2P
If P = P(x, y), then −P = P(x, −y)
P − P = 0.
Finding Point R
Assume points P, Q, and R are represented by P = (xp, yp), Q = (xq, yq), and R = (xr, yr).
Table 14.3 (x3 + x + 3) mod 11 and Y2 mod 11
X
F1 = (x3 + x + 3) mod 11 y F2 = y2 mod 11
0 3 0 0
1 5 1 1
2 2 2 4
3 0 3 9
4 5 4 5
5 1 5 3
0 5 6 3
7 1 7 5
8 4 8 9
9 4 9 4
10 1 10 1
310 14 Introduction to Cryptography
R
P
–R= 2P
yq y p
m
xq x p
xr m 2 xq x p mod p
y r m x r – x q – y r mod p
10 4 6
m 1
7 1 6
Xr = (1 − 1 − 7) = −7 mod 11 = 4
Yr = (1(−7 − 7) − 4) = −18 mod 11 = 4
R (4, 4), which is listed on the points discovered in the previous section.
Adding a point to itself (P + P = 2P)
To add a point P to itself, a tangent line to the curve is drawn at the point P as
shown in Fig. 14.17. If YP is not 0, then the tangent line intersects the elliptic curve
at exactly one other point, −R, where −R is reflection of R on the x-axis.
P P 2P
The slope of the line that passes through the ECC curve is defined by:
14.9 Elliptic Curve Cryptography (ECC) 311
3x p2 a
m
2 yp
x r m 2 – 2 x p mod P
y r m x p – x r – y p mod P
3 1 1
2
m 1
24 2
7 mod 11
x r 1 / 22 2 1 mod 11 7 / 4 mod 11
4 mod 11
4 / 4 1
Yr 1 1 1 4 mod 11 4 mod 11 7
2
where C is cypher text, AP is Alice’s public key, N is Alice’s random number, and
BP is Bob’s public key. Using Table 14.4 to evaluate, the results are as follows:
C 0,5 , 3,0 0,6 0,5 , 1,7
Bob uses Eq. 14.3 to decrypt C:
S Y2 – Nb Y1 (14.5)
A hash function generates a hash value (message digest) from a given message as
shown in Fig. 14.18, and it is used for data integrity and password protection. Hash
values have the following characteristics:
1. A hash function must be collision resistant which means it is hard to find two
messages that will generate the same message digest.
2. Changing any bit of message will totally change the message digest.
3. It is impossible to generate the original message from the message digest.
Applications of hash function include hashing passwords and verifying message
integrity
Hashing Passwords If a server holds encrypted passwords and a hacker accesses
the password file and has the encryption key, then the passwords will be open to
decryption. By hashing the passwords, the attacker will not be able to recover the
passwords. When a user enters their password, the server will use the hash algo-
rithm and generate the hash value of the password. If the hash value is the same as
the stored hash value, then the password is correct.
The following are some of the basic hash functions:
Frame Check Sequence (FCS) as a Hash Value: Host B generates the FCS of
the information, encrypts the FCS, and sends it to Host A. If one alters the docu-
ment, the new FCS will differ from the one generated by Host B.
Checksum (generating checksum from a message): Information can be bro-
ken into blocks of characters and arranged in each column, the message $6,578,100
can be broken into 4 ASCII characters per block as shown below, and the checksum
of each column can be calculated
$657 44 36 35 37
8100 38 31 30 30
Checksum 7C 67 65 67
If the message changes to $5,578,200, it will generate the same checksum; there-
fore, the checksum method is not a strong message digest. The simplest form of a
hash function is to break the message into m blocks of n bits as shown below.
H H1H 2 H 3 Hn
where:
Or in general:
Example 14.3 Find the hash code for the word “WELCOME.”
W 1010111
E 1000101
L 1001100
C 1000011
O 1001111
M 1001101
E 1000101
Hash code 1001001
14.11 Message Authentication Code (MAC) 315
MAC is used for message integrity and authentication of the sender. To generate a
MAC both Alice and Bob must share a secret key. The secret key is used for authen-
tication, and the following steps describe the message authentication process.
Figure 14.19 shows the Message Authentication Code generation and usage.
1. Alice generates a hash value from the message and encrypts it with the shared
key. This is called the MAC.
2. Alice attaches the MAC to the message and transmits it to Bob.
3. Bob generates the hash value of the message and decrypts the MAC to generate
a Hash value.
4. If both hashes are equal, there was no message tampering.
14.12 Digital Signature
The disadvantage of the above method is that the entire document must be
encrypted and stored on the receiver side thus requiring a large amount of memory.
Another method is when one signs a message digest (i.e., a summary of the docu-
ment contents) rather than the entire document. A message digest is a summary of
the message such as a frame check sequence. A hash value encrypted by private key
is called digital signature as shown in Fig. 14.22.
14.13 Kerberos
User A
Server
B
5. User A sends the ticket to server B; server B encrypts the ticket and compares it
with the ticket that was sent by KS. If both tickets are the same, then user A is
allowed to access server B.
Summary
Key Terms
Authentication Firewall
Authenticator Hash function
Block cipher Hash value
Certificates Indirect attack
Ciphertext Integrity
Cryptography Kerberos
Data Encryption Standard Mutual authentication
Decryption Public key cryptography
Digital signature RSA algorithm
Direct attacks Stream cipher
Review Questions
(a) Cleartext
(b) Cipher
(c) Ciphertext
(d) Digital signature
6. Stream ciphers encrypt information __________
(a) One bit at a time
(b) One byte at a time
(c) One block at time
(d) All at the same time
7. Which of following algorithms use a private key?
(a) DES
(b) RAS
(c) Hash function
(d) Digital signature
8. Computer A uses a public key for encrypting its information and sends it to sta-
tion B. What does Computer B Use for decryption?
(a) Computer B uses its public key for decryption
(b) Computer B uses its private key for decryption
(c) Computer B uses Computer A’s public key for decryption
(d) Computer B randomly chooses a key for decryption
9. The objective of a digital signature is __________
(a) To verify the identity of a user or a client
(b) To provide privacy for a document
(c) To inform the acceptance of the document by user
(d) For the user to copy the document
10. A hash function is used for __________
(a) Digital signature
(b) Digital certificates
(c) Encryption
(d) Authentication
11. Keberos is used for:
(a) Encryption of a document
(b) Digital signatures
(c) Digital certificates
(d) Authentication purposes
(e) None of the above
322 14 Introduction to Cryptography
Objectives
After completing this chapter, you should be able to:
• Explain the application of the Secure Socket Layer (SSL).
• Describe the components of SSL/TLS.
• Understand VPNs and how they operate.
• Explain the application of EAP.
• Explain the application of the SSH protocol.
• Discuss different applications of a firewall.
• Explain the purpose of certificates.
• Distinguish between WPA, WPA2, and WPA3.
Introduction
The transfer of information across networks and the Internet is increasing exponen-
tially due to e-commerce and business transactions. Network security plays an
important role in successful e-commerce. Currently, many people are accessing
their bank accounts, buying and selling stocks, and paying bills over the Internet.
People using these services need to have their transactions be secure. This means
that the information transmitted should not be able to be accessed or modified by
anyone other than the authorized user. Network security is implemented to protect
information in transit and to protect a system from an attack.
The Secure Socket Layer protocol (SSL) was developed by the Netscape
Communication Corporation in 1995 for secure communication between a web
browser and a web server. Version 3 is the latest version of SSL. The IETF modified
SSL v3 and called it Transport Layer Security (TLS), which is what is typically seen
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024 323
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4_15
324 15 Network Security
in use today. However, even when TLS is in use, the term “SSL” tends to be used
interchangeably. The main difference between TLS and SSL is that TLS uses
Keyed-Hash Message Authentication Code (HMAC), and SSL uses MAC. SSL/
TLS provides data encryption, server authentication, message integrity, and client
authentication (optional) for both ends.
The SSL/TLS protocol is located between the TCP protocol layer and the appli-
cation protocol layer as shown in Fig. 15.1. HTTPS is Hypertext Transfer Protocol
over Secure Socket Layer, which replaces HTTP. HTTPS uses port 443, where
HTTP uses port 80 for interaction with TCP, as shown in Fig. 15.2. The SSL/TLS
protocol consists of the following components:
A. The Handshake Layer consists of Handshake, Change Cipher Specification, and
Alert Protocols
B. The Record Layer consists of Record Protocol
TCP
IP
(d) Server Certificate: The server provides the client with a digital certificate,
which establishes the server’s identity, contains the server’s public key, and
is digitally signed in a chain of trust. Digital certificates will be covered in
detail in Sect. 15.6.
(e) Handshake Done.
5. The client, now with the server’s certificate, sends a Key Exchange Packet, as
seen in Fig. 15.6, with the following information:
(a) Premaster Key: Another random number is chosen by the client to be a
premaster key, which is then encrypted using the public key provided in the
server’s certificate. Both the client and the server will use this premaster key,
as well as the other random numbers generated by the client and server, to
generate a symmetric session key. The server does so by decrypting the pre-
master key that was just sent, which it should only be able to do if it has the
corresponding private key for the public key provided in the certificate.
(b) The client transmits a Change Cipher Specification packet to the server as
shown in Fig. 15.7. This message notifies the server that all messages from
now on will be encrypted using the key and algorithms negotiated. If the
server is able to decrypt the premaster key, then the client and server should
have identical session keys and should now be able to communicate securely.
Record Protocol The Record Protocol receives the data from the application
layer or TCP layer and performs following functions:
(a) Fragments the data into blocks or reassembles the data packet.
(b) Adds sequence numbers to each block.
(c) Compresses or decompresses the data packet using the compression algorithm
negotiated in the handshake protocol.
328 15 Network Security
Large organizations and corporations have multiple sites in different locations and
would often like to connect LANs together. One solution is to lease a data commu-
nication line and connect the LANs together thus creating a private network. A
corporation with 100 offices in different locations throughout a country must lease
100 lines to connect its LANs together. This method is not cost-effective. In order
to reduce the cost of leasing private lines, Virtual Private Networks (VPNs) can be
employed over Internet.
Figure 15.8 shows two networks that are connected through the Internet using
VPN devices. The function of a VPN device is to make a secure communication
between two LANs by establishing a tunnel between its two endpoints. The disad-
vantage of using the Internet as a communication channel between corporations is
poor security. Therefore, the VPN needs to provide security components such as
authentication, confidentiality and data integrity.
Tunneling
Tunneling is the process of placing one packet inside another packet for transmis-
sion over a public network. In Fig. 15.8, it is assumed that both networks are run-
ning IP. If station A wants to send an IP packet to station B, it sends the packet to the
VPN device A first. VPN device A then encapsulates the packet into an IP packet
and transmits it over the Internet. When VPN device B receives the IP packet, it
15.3 IP Security Protocol (IPsec) 329
VPN device
VPN device Tunnel
B
A
B
A
Fig. 15.8 Virtual Private Network (VPN)
discards the IP header and sends the IP packet to station B. Some of the tunneling
protocols are listed below.
1. Point-to-Point Tunneling Protocol (PPTP): PPTP was developed by the PPTP
forum. PPTP supports 40 and 128-bit encryption.
2. Layer-2 Forwarding (L2F): L2F was developed by CISCO and it uses any
authentication method.
3. Layer-2 Tunneling Protocol (L2FT): L2FT was developed by CISCO and
IETF. It is a combination of L2F and Point-to-Point Tunnel Protocol
4. IP security (IPsec) Protocol: The IP Security Protocol was developed by IETF.
In order to protect information traveling via VPNs from attack, the IETF developed
the IPsec protocol for integrity, authentication, and confidentiality of data over IP
networks. The IPsec Protocol is an open standard and does not define any specific
protocol for authentication and encryption. The IP Security Protocol is becoming
increasingly more popular than the other protocols. IPsec is made of two protocols
Authentication Header Protocol (AH) and Encapsulation Security
Protocol (ESP).
Authentication Header Protocol
The Authentication Header Protocol (AH) is used for identification of a user or
application and it can operate in either tunneling mode or transport mode. AH does
not provide any encryption. Figure 15.9 shows the AH packet format.
The following describes the function of each field of authentication header:
• Next Header: Identifies the next header (such as TCP).
• Payload Length: Number of 32-bit words in AH.
330 15 Network Security
1 8 16 32
Next Header Payload Length Reserved
Sequence Number
• Security Parameter Index (SPI): The SPI informs the receiving station of the
location of the security information such as the decryption key.
• Sequence Number: Every packet has a unique number. If an intruder copies a
packet and resends it with the same sequence number, then the receiver discards
the packet.
• Authentication Data: This is digital signature of the payload.
Figure 15.10 shows the AH location in an IPsec packet in transport mode. In the
IP header, the protocol type is 50 thus indicating that the next header is an IPsec
header. Figure 15.11 shows the location of AH in the IPsec packet using tunneling
mode. In tunneling mode, the entire packet is encapsulated into another IP packet
and AH includes the entire IP packet.
Encapsulation Security Packet (ESP)
The Encapsulation Security Packet performs encryption and authentication of data.
Figure 15.12 shows an ESP format.
ESP can operate in tunneling mode or in transport mode. Figure 15.13 shows the
ESP format using transport mode. In transport mode, only the TCP header and data
fields are encrypted. The authentication data is a digital signature of the data, pad-
ding, TCP header, and ESP header. As shown in Fig. 15.13, the protocol type in IP
header is 50 thus indicating that the next protocol is ESP. Figure 15.14 shows ESP
using tunneling mode. In tunneling mode, the entire IP packet is encrypted and has
the entire ESP header encapsulated into the IP packet for transmission.
SSH was developed in 1995 and is widely used in many Unix systems to overcome
the weaknesses of Telnet and FTP. The SSH standards were developed by the IETF
and then the Secure Shell was commercialized in 1998 by www.ssh.com where it
was implemented for the Windows and UNIX systems. SSH version one (SSH1)
had numerous weaknesses, but SSH2 overcame these. SSH2 is open source, and it
can be found at the following websites:
15.4 Secure Shell (SSH) 331
IP Header
AH TCP Data
Protocol type=50
1 32
Security Parameter Index (SPI)
Sequence Number
Payload
Authentication Data
IP header
ESP Header TCP Header Data and Padding Authentication Data
Protocol type=50
Encrypted fields
New IP header
ESP Header IP header TCP Header Data and Padding Authentication Data
Protocol type 50
Encrypted fields
1. www.openssh.com
2. http://www.freesshd.com/
3. www.filezilla.com
Telnet is used for remote logging and FTP is used for file transfer from a remote
computer. These protocols have the following weaknesses.
1. Telnet and FTP use passwords as an authentication method. When transmitted
for authentication, these passwords are transmitted in plaintext.
2. Telnet and FTP transmit all data in plaintext, which does not provide protection
from attacks that monitor data that can read plaintext.
3. Telnet and FTP clients do not authenticate the server.
Advantages of SSH Secure Shell SSH offers logging into a remote device securely
with the following features:
1. SSH transmits data in cipher text.
2. SSH transmits user authentication information in cipher text.
3. SSH clients authenticate the server.
4. SSH dynamically generates a key exchange between the client and the server for
encryption and decryption between the server and the client.
SSH Protocol
SSH protocol is used to establish a secure connection between client and server. The
objective of the creation of SSH was to replace Telnet and File Transfer Protocol.
Figure 15.15 shows the SSH Protocol Stack.
SSH User Authentication Protocol (SSH-AUTH) This verifies the client’s iden-
tity by using the provided public key or password.
SSH Connection Protocol (SSH-CONNECT) The SSH connections provide
multiple channels, and these channels are multiplexed to one encrypted tunnel.
SSH Transport Protocol (SSH-TRANS) SSH-TRANS runs on top of TCP with
the port number 22. It makes a secure connection between a client and a server by
providing Integrity and Confidentiality
SSH-TRANS performs the following operations:
15.5 IEEE 802.1X 333
1. The server and the client negotiate the SSH version and software to be used.
2. Another negotiation takes place to determine the algorithm for encryption and
the MAC algorithm for integrity. Some of the used encryption algorithms are
AES128-CBC, AES256-CBC, AES-CTR, and Blowfish-CBC. Some of the
algorithms for Message Authentic Code (MAC) are HMAC-MD5, HMAC-
SHA-256, and HMAC-SHA-512.
3. Key exchanges such Diffie–Hellman. The client and the server share a secret key
and use the secret key to generate encryption and authentication keys.
Figure 15.16 shows a client and a server exchanging packets for establishing a
secure connection.
15.5 IEEE 802.1X
Security is one of the most important issues in the development of Wireless LAN. In
a wired LAN, users have a direct connection to the network, whereas WLAN users
do not. WLAN users must verify their identity before accessing the network.
Authentication is a process used by a wireless station or a wired station to identify
oneself on the network. A password is used for authentication when accessing a
network’s resources.
Typically, the communication channel between a user and a WLAN is not secure.
An attacker can monitor the communication channel and collect user data and
334 15 Network Security
Authenticator
(Access Point)
Network
Controlled Port
Server
Supplicant
or
Client Uncontrolled
Port
Authentication
Server
passwords. The network administrator operates the access point (where a user
accesses the network), but a hacker may set up a rogue access point to capture the
connection of an unsuspecting client. Therefore, a method is needed such that the
user can verify the authenticity of the access point. This method of authentication is
called Mutual Authentication.
The IEEE 802.1X is a standard for port-based network access control and is an
open standard for authentication of both wireless and wired stations using an
authentication server. Figure 15.17 shows the components of a network employing
the IEEE 802.1x standard.
Supplicant A supplicant can be any device using IEEE 802.11 protocol for net-
working, or any PC connected to the network.
Authenticator The authenticator can be an access point for 802.11 LAN or a
switch for a wired LAN. The authenticator uses controlled and uncontrolled ports
for authentication of a supplicant.
Authentication Server The authentication server performs an authentication pro-
cess for a supplicant. One type of authentication server is called a RADIUS (Remote
Authentication Dial-In User Service). A RADIUS is both an authentication server
and an accounting server and is used to authorize a station on the network.
Authentication Protocol An authentication protocol is a procedure that is used by
the client and the authentication server for the authentication process. IEEE 802.1x
uses EAP for exchanging messages during the authentication process. EAP sup-
ports the following authentication messages between client and server:
(a) Request
(b) Response
(c) Success
(d) Failure
EAP messages between the client and the AP are carried by the EAPOL (EAP
over LAN) protocol. EAP messages from the AP to the server are carried by the
EAP over RADIUS protocol.
15.6 Certificates 335
IEEE 802.1X does not define which authentication protocol to use. There are 40
authentication protocols available, and some of the most popular are as follows:
1. EAP-MD5 (Message Digest 5): EAP-MD5 is a password-based authentication
protocol.
2. EAP-TLS (EAP-Transport Layer Security): EAP-TLS is based on mutual
authentication of the client to the server and the server to the client. Both the cli-
ent and the server must be assigned a digital certificate.
3. LEAP (Lightweight Extensible Authentication Protocol): Used by CISCO.
4. EAP-TTLS (Tunneled TLS).
5. PEAP (Protected EAP).
802.1X Operation
The authenticator (i.e., access point) contains both the logical controlled and uncon-
trolled ports for authentication. When using the uncontrolled logical ports, the client
can communicate with the authentication server but does not have access to the
network services. The following steps describe the authentication process of a client
by an authentication server.
1. The client requests an association with the AP (access point).
2. The AP responds to the client’s request.
3. The client sends an EAP start message to the AP.
4. The AP requests the identity of the client (such as the user name).
5. The client sends an EAP packet containing their identity to the authentica-
tion server.
6. The authentication server identifies the client.
7. The authentication server can accept or reject the client request.
8. Upon accepting the client’s request, the AP sends an EAP success packet to the
client and authorizes the controlled port so that the client can access the network
services.
15.6 Certificates
A customer requests a web page from a stockbroker by logging into to the broker’s
server. The server requests an account number and a password for verification. If the
information submitted by the customer is correct, then the server sends its public
key to the customer for encryption. Suppose an intruder installs a system between a
customer and a broker’s server, as shown in Fig. 15.18. When the customer requests
the broker’s web page, the intruder system responds with a fake web page. The
customer logs into the fake web page and the intruder sends a fake public key to the
customer to use for encryption. To check the authenticity of the public key, the pub-
lic key must be certified by a certificate authority.
Certificates verify the identity of a server, a program, or personal identification
information such as a pictured driver license and number. A driver license is issued
336 15 Network Security
15.7 Firewalls
A firewall is a system that is used for preventing unauthorized users from accessing
private networks. Firewalls are located between private networks and the Internet
(un-trusted Network) as shown in Fig. 15.20. They can be implemented by a com-
bination of software and hardware. Firewalls examine all packets leaving and enter-
ing a private network, blocking packets that do not meet security criteria. Firewall
technologies are classified into the following types:
(a) Packet Filtering Firewall
(b) Application Proxy Server or Network Address Translation Firewall
(c) Stateful Firewall
Packet Filtering A firewall can examine each incoming packet’s header such as
the IP header, TCP, or UDP header, and, based on security criteria set by the net-
work administration, accept or reject any packet. These criteria are as follows:
A. Source IP Address and Destination IP Address: A firewall can be programmed
to block packets based on the IP address of the packet. This task is done at the
Network Level of the TCP/IP model.
B. Protocol Type: The firewall can block packets based on protocols such as TCP,
UDP, and ICMP protocols. For example, protocol filtering can filter any packet
338 15 Network Security
intended for ICMP. Protocol filtering is done at the Network Level of the TCP/
IP model.
C. Source Port and Destination Port Filtering: The firewall can block packets
based on the port number of the incoming packets. The port number is used to
define application protocols such as HTTP, SMTP, Telnet, and TFTP. For exam-
ple, a firewall may block any incoming mail by blocking SMTP or port 25. Port
filtering is done at the transport level of the TCP/IP model.
D. Packet Payload (information on the payload): A firewall can block packets
based on the information contained in a packet’s payloads such as a packet con-
taining a “dirty word” or a specific sentence. The information filtering is done at
the application level of TCP/IP model.
Application Proxy Server or Network Address Translation (NAT) The proxy
server application is located between the trusted network and the un-trusted net-
work. Assume a client of the private network wants to access the un-trusted network
such as Internet. First, it sends a request to the proxy server and the proxy server
uses its IP address to send the request, on the behalf of client, to the destination
server. Therefore, destination server sees only the proxy server’s IP address. The IP
addresses of the clients in the private network are not exposed to the Internet. A
proxy server should contain a software module for each application protocol such as
HTTP, Telnet SMTP, and TFTP.
Stateful Firewall A Stateful Firewall keeps track of its connections and deter-
mines if the incoming packets belong to the current connections or not. This type of
firewall can be configured such that it will deny any connection from the un-trusted
network to the trusted server. The un-trusted network can only send packets to the
trusted server if the trusted server requests them; otherwise, the un-requested pack-
ets will be discarded by the firewall.
Dual Firewall In any organization, there are some servers that clients from both
inside and outside the network must be able to access including Web servers, DNS
servers, and E-mail servers. Within these same organizations are servers which only
clients from inside the organization are allowed access to, such as database servers
or file servers. To protect both types of servers, two firewalls will be used as shown
in Fig. 15.21. The servers that both inside and outside clients must have access to
are located between two firewalls in an area known as the Demilitarized Zone (DMZ).
15.8 WLAN Security 339
15.8 WLAN Security
A WLAN is less secure than a wired LAN. In a wired LAN, any person who wants
access to the network must make a physical connection. In WLANs, users can
access an AP if the AP signal is detectable. The following methods are used for the
security of WLANs:
(a) Service Set Identifier
(b) MAC Address Filtering
(c) Wired Equivalent Privacy (WEP)
(d) Wi-Fi Protected Access (WPA), WPA2 and WPA3
(e) Authentication
Packet Sniffer
A packet sniffer is a piece of software that captures packets coming into and going
out of a network. It is used for network monitoring or analysis. A packet sniffer
captures all the data that passes through a network and is set to capture packets for
a specific machine.
The IEEE 802.11 standard includes WEP in the MAC layer of WLAN to protect
wireless communications. WEP uses a secret key that is shared between the AP and
the users. At the transmitter side, a 24-bit Initialization Vector (IV) is appended to
the secret key at the transmitter side and secret key can be 40 or 108 bits. WEP uses
RC4 algorithm to generate a keystream for encryption as shown in Fig. 15.22.
340 15 Network Security
Data ICV
IV RC4 XOR
algorithm Keystream
IV Secret Key
IV Encrypted Data
Transmitted Packet
IV RC4 XOR
Keystream Data ICV
algorithm
IV Secret Key
The IEEE 802.11 standard defines two types of authentications: Open System
Authentication and Shared Key Authentication.
Opens System Authentication
This is the simplest method of authentication for a WLAN as the access point and
the client set their own criteria for authentication. If a client has the SSID of the
access point, the client sends an authentication frame with its secret key to the
access point. If the secret key of the client matches the secret key of the access point,
then the AP sends a positive response to the client and the client becomes associated
with the AP.
Shared Key Authentication Figure 15.23 shows the shared key authentication
process. In shared key authentication, the clients and AP use the same key, which
makes it easy for a hacker to obtain the shared key by using special sniffer software
such as AirSnort or WEPcrak. Therefore, the network administrator needs to change
the shared secret key frequently, which is difficult in large networks. Some of the
WEP weakness are as follows: WEP does not support key management and all cli-
ents use the same shared key, WEP uses a small key size, WEP uses a 24-bit
Initialization vector which is appended to a 40-bit secret key, resulting in a 64-bit
WEP key and WEP does not support replay prevention.
15.9 IEEE 802.11i 341
Request Authentication
Challenge Text
Authentication response
15.9 IEEE 802.11i
WPA is a subset of IEEE 802.11i and was developed to overcome the weakness of
WEP by adding TKIP (Temporal Key Integrity Protocol), IEEE802.1X, Extensible
Authentication Protocol (EAP), and the RADIUS Server. TKIP enhanced WEP by
adding the following features:
1. Initialization vector (IV)
(a) IV size changed from 24 bits to 48 bits.
(b) IV created from a number sequence to avoid replay attacks.
2. For each packet a new IV is used.
3. Key management.
342 15 Network Security
WPA2 operates in two modes, WPA2 Pre-shared Key (WPA2-PSK) and WPA2
Enterprise.
WPA2 Enterprise mode uses RADIUS Server and EAP for authentication. The
user provides authentication information and is authenticated by an authentica-
tion server (RADIUS). Larger networks use WPA2 Enterprise mode.
WPA2 Personal mode (WPA2-PSK) provides a simple authentication method
called pre-shared key for authentication and does not require a specific authenti-
cation server.
IEE802.11i ratified the Robust Security Network (RSN) for Wireless LANs.
RSN includes the following:
1. IEEE 802.1x Authentication.
2. Extensile Authentication Protocol (EAP).
3. WPA2 Enterprise uses the AES algorithm with Counter Mode (CTR) for encryp-
tion and combines CTR with Cipher Block Chaining Message Authentication
Code to generate the MAC. This is called AES-CCMP for encryption and mes-
sage integrity.
4. Supports multiple Authentication Protocols.
Counter Mode (CTR)
The information is divided into blocks as shown in Fig. 15.24. The counter value is
encrypted by AES and XORed with each block of data resulting in encrypted text,
or ciphertext.
Cipher Block Chaining Message Authentication Code (CBC-MAC)
Figure 15.25 shows the Cipher Block Chaining Message Authentication Code. The
ciphertexts of Fig. 15.24 are the inputs to the CBC-MAC.
WPA and WPA2 Key management
IEEE 802.11i defines a Pairwise Key for unicast transmission and a Group Key for
multicast and broadcast transmission:
Pairwise Master Key (PMK): This key can be generated by a server-based key
generator and transmitted to an AP and a client during an authentication operation,
or as a pre-shared key.
Temporal keys consist of the following 128-bit keys:
15.9 IEEE 802.11i 343
MAC1 and MAC2 are the MAC addresses for a client and access point.
Nonce1 and Nonce2 are random numbers which are used only once.
ASE-CCMP uses the same key for encryption and message integrity, and the
PTK for WPA2 utilizes 3 keys instead of 4.
• Data protection: The Suite-B 192-bit security suite is used to increase the
key length.
• Key protection: The HMAC-SHA-384 algorithm is used to export keys in the
four-way handshake phase.
• Traffic protection: The 256-bit Galois/Counter Mode Protocol (GCMP-256) is
used to protect wireless traffic after STAs go online.
• PMF (Protect Multicast Frame): The 256-bit Galois Message Authentication
Code (GMAC-256) is used to protect multicast management frames.
WPA3-Enterprise supports the following EAP cipher suites:
• TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
• TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
• TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Summary
• The Secure Socket Layer (SSL) is used for secure communication between a
web browser and a web server.
• The IETF modified SSL v3 and called it Transport Layer Security (TLS).
• The SSL/TLS protocol is located between the TCP protocol layer and the appli-
cation protocol.
• HTTPS uses port 443, where HTTP uses port 80 for interaction with TCP.
• The SSL/TLS protocol consists of a Handshake Layer and Record Layer.
• The function of a VPN (Virtual Private Network) device is to make secure com-
munication between two LANs by establishing a tunnel between its two
endpoints.
346 15 Network Security
Key Terms
Review Questions
2. In a Client/Server network, the client submits a task to the server, then the
server executes and returns the result to the requesting client station.
(a) Peer-to-Peer
(b) Server Based
(c) Client/Server
(d) All of the above
4. A mail server stores all the client’s mail.
(a) File server
(b) Print server
(c) Communication server
(d) Mail server
6. In a star topology, all stations are connected to a central controller or hub.
(a) Star
(b) Ring
(c) Bus
(d) Mesh
8. A hybrid topology is a combination of different topologies connected together
by a backbone cable.
(a) Star
(b) Ring
(c) Bus
(d) Hybrid
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 351
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
352 Chapter 1: Introduction to Communications Networks
24. Which layer of the OSI model is responsible for forming a frame? Data-Link
(a) Data-Link
(b) Transport
(c) Session
(d) Physical
26. The function of the network layer is Routing
(a) Error detection
(b) Routing
(c) To set up a session
(d) Encryption
28. Which layer determines the route for packets transmitted from source to desti-
nation? Network
(a) Data-Link
(b) Network
(c) Transport
(d) Physical
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 355
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
356 Chapter 2: Data Communications
2. What is frequency?
Frequency is the number of cycles of a signal per second, which is mea-
sured in Hz.
4. What is the frequency of an analog signal that is repeated every .02 ms?
f = 1/T
f = 1/.02 ms
f = 1/.00002 s
f = 50 kHz
6. Sketch a digital signal.
Chapter 2: Data Communications 357
8. What is a byte?
A byte is eight bits grouped together.
10. Convert the following binary number to Hex.
(111000111001)2 = (E39)16
12. Convert the following number to binary.
(FDE6)16 = (1111110111100110)2
14. Convert the word NETWORK to hexadecimal.
N E T W O R K
4E 45 54 57 4F 52 4B
24. List two types of digital encoding methods in which clock is embedded to
data signal
Manchester Encoding and Differential Manchester Encoding.
26. List sources of error in networking.
Crosstalk, white noise, impulse noise, and attenuation.
28. Find the BCC for word “ETHERNET.”
0 1001110 N
1 1000101 E
1 1010100 T
1 1101110 Odd parity for columns
The BCC is 11101110
28. Find the FCS for message 10110110 using circuit in question 29.
Input C2 C1 C0
Initial value 0 0 0
1 0 0 1
0 0 1 0
1 1 0 1
1 0 0 0
0 0 0 0
1 0 0 1
1 0 1 1
0 1 1 0
0 1 1 1
0 1 0 1
0 0 0 1
2. Coaxial and fiber-optic cables are used to transmit high-speed and analog
signals.
(a) UTP and coaxial
(b) STP and UTP
(c) Coaxial and fiber-optic
(d) Fiber-optic and STP
4. Wireless transmission does not use any transmission medium.
(a) WAN
(b) LAN
(c) Wireless
(d) Internet
6. Which of the following UTP cables is suitable for a data rate of 100 Mbps? Cat-5
(a) Cat-2
(b) Cat-4
(c) Cat-3
(d) Cat-5
8. What type of fiber-optic cable is used for long distance transmission?
Single-mode
(a) Multimode graded index
(b) Single mode
(c) UTP
(d) STP
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 359
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
360 Chapter 3: Communications Channels and Media
10. What is the maximum length that a fiber cable with a modal bandwidth of
1000 MHz*km can be in order to transmit information with a 200 MHz
speed? 5 km
(a) 1 km
(b) 10 km
(c) 5 km
(d) 20 km
12. SONET uses byte multiplexing in all levels.
(a) Upper
(b) Mid
(c) All
(d) None of the above
14. SONET transmits the STS-1 at the rate of 8000 frames/second.
(a) 6000
(b) 7000
(c) 8000
(d) 1000
16. STS-1 has data rate of 51.84 Mbps.
(a) 810
(b) 8000
(c) 51.84
(d) 1.54
18. An STS-1 frame made of 9 rows and 90 columns
(a) 9 columns and 90 rows
(b) 9 rows and 90 columns
(c) 10 rows and 100 columns
(d) None of the above
20. An STS-3 is generated by multiplexing three STS-1s
(a) Three STS-1s
(b) Six STS-1s
(c) Five STS-1s
(d) Two STS-1s
22. An STS-3 frame format is made up of 9 rows and 270 columns
(a) 270 rows and 9 columns
(b) 9 rows and 270 columns
(c) 10 rows and 300 columns
(d) None of the above
Chapter 3: Communications Channels and Media 361
Tx 1500 bytes 8 bits / byte / 100 Mbps 106 bits per second
0.00012 s .12 ms
22. 2000 bytes of data are to be transferred between a server and a host computer,
which are connected via a 1000-m Cat-5 cable with a transmission rate of 10
Mbps. Calculate the following:
(a) Transmission time
Tx = packet size (bits) / bandwidth
Tx = (2000 bytes 8 bits/byte) / (10 Mbps * 106)
Tx = 1.6 ms
(b) Propagation delay
Tp = Length of communication channel (meters) / Speed of light
Tp = 1000 m / 2 * 108
Tp = .5 ms
362 Chapter 3: Communications Channels and Media
20 km
10 3 km / m / 2 10 8 500 bytes 8 bits / byte / Bandwidth
.1 s 4000 bits / Bandwidth
Bandwidth = 40 Mbps
26. Calculate the latency for transmitting 1500 bytes of data over the follow-
ing links:
(a) 100 m copper with a bandwidth of 10 Mbps
L Tp Tx Tb
L 100 m / 2.3 10 8 1500 bytes 8 bits / byte / 10 Mbps 10 6 0
L .0004 ms 1.2 ms 0
L = 1.2004 ms
L Tx Tp Tb
L 4000 m / 2 10 8 1500 bytes 8 bits / byte / 10 Mbps 10 6 0
L .002 ms 1.2 ms 0
L = 1.202 ms
Chapter 3: Communications Channels and Media 363
28. Find the maximum data rate of a communication link with a bandwith of
3000 Hz using 8 signal levels.
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 365
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
366 Chapter 4: Multiplexer and Switching Concepts
22. The following inputs are connected to a 4 * 1 Statistical Multiplexer, show the
outputs of the multiplexer:
a. Input #1 A- A-A
b. Input #2 BB- BB DBA CB DCA B DBA
c. Input #3 - CC- -
d. Input #4 D- D – D
24. Use the chip sequences from Table 4.2 to find the data transmitted for Node C
at the receiver side. Assume nodes A, B, and C have transmitted the follow-
ing data:
Node A 111
Node B 010
Node C 001
Node A −1 −1 −1 −1 −1 −1 −1 −1 −1 −1 −1 −1
Node B +1 −1 +1 −1 −1 +1 −1 +1 +1 −1 +1 −1
Node C −1 −1 +1 +1 −1 −1 +1 +1 +1 +1 −1 −1
Sum −1 −3 +1 −1 −3 −1 −1 +1 +1 −1 −1 −3
Node C’s chip bit +1 +1 −1 −1 +1 +1 −1 −1 +1 +1 −1 −1
Node C data 0 0 1
Inner product of Node C’s chip (−1 −3 −1 +1) /4 (−3 −1 +1 −1)/4 (+1 −1 +1 +3) /4
bit and Sum
Results −1 −1 1
Chapter 5: Error and Flow Control
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 369
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
370
16. Show the transmitted frame after bit insertion for following frame:
01111111000000011111011111110
Bit-insertion will add the following zeroes:
011111(0)11000000011111(0)011111(0)110
hapter 6: Modulation Methods, Cable
C
Modems, and FTTH
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 371
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
372 Chapter 6: Modulation Methods, Cable Modems, and FTTH
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 373
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
374 Chapter 7: Ethernet Technology
6. Show the IEEE 802.3 frame format and function of each field.
24. What is function of the protocol type field in the Ethernet II frame format.
The protocol type field indicates what protocol is in use, such as ARP.
26. What is function of the pad field in the IEEE 802.3 frame format?
The pad field is used to pad extra bits if the total Ethernet’s data field is
lower than 46 bytes.
28. Explain the following terms:
(a) 100Base4T
100 Mbps, baseband, 4 pair Cat-3 cabling
(b) 100BaseTX
100 Mbps, baseband, Cat-5 cabling
(c) 100BaseFX
100 Mbps, baseband, fiber-optic cabling
30. What is the difference between 100BaseTX and 100BaseT4?
100BaseTX uses Cat-5 cabling, while 100BaseT4 uses Cat-3 cabling.
32. What is the application of a Class II repeater?
A class II repeater takes an input signal and repeats it out of its multi-
ple ports.
34. Name the IEEE committee that developed the standard for Fast Ethernet.
IEEE 802.3u.
36. What are the types of media used for Fast Ethernet?
Fast Ethernet uses UTP cabling and fiber-optic cabling.
38. What type of signal encoding is used for 100BaseFX?
NRZ-I
40. What is the IEEE standard number for Gigabit Ethernet?
IEEE 802.3z.
42. What type of frame is used by Gigabit Ethernet?
Gigabit Ethernet uses the IEEE 802.3 frame format.
44. List the kinds of transmission media used for Gigabit Ethernet.
UTP cabling and fiber-optic cabling.
46. What are the hardware components of Gigabit Ethernet?
Gigabit Ethernet connections use UTP or fiber-optic cabling to connect to
gigabit switches in order to transmit data to other stations with giga-
bit NICs.
48. Explain the following terms:
(a) 10GBASE-SR
10 gigabit, baseband, short wavelength, LAN connection
(b) 10GBASE-SW
10 gigabit, baseband, short wavelength, WAN connection
(c) 10GBASE-LR
10 gigabit, baseband, long wavelength, LAN connection
378 Chapter 7: Ethernet Technology
(d) 10GBASE-LW
10 gigabit, baseband, long wavelength, WAN connection
(e) 10GBASE-ER
10 gigabit, baseband, extended long wavelength, LAN connection
(f) 10GBASE-EW
10 gigabit, baseband, extended long wavelength, WAN connection
Chapter 8: LAN Interconnection Devices
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 379
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
380 Chapter 8: LAN Interconnection Devices
(a) Draw a diagram showing an Ethernet switch with seven computers and file
server.
1 2 3 4 5 6 7 8
Group A Group B
FS
(b) Show the VLAN connectivity matrix for the above requirements.
Port # 1 2 3 4 5 6 7 8
1 + + + + + − − −
2 + + + + + − − −
3 + + + + + − − −
4 + + + + + − − −
5 + + + + + + + +
6 − − − − + + + +
7 − − − − + + + +
8 − − − − + + + +
Chapter 9: Internet Protocols Part I
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 383
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
384 Chapter 9: Internet Protocols Part I
10. Telnet uses which of the following protocols for remote login: TCP
(a) UDP
(b) TCP
(c) IP
(d) FTP
12. Telnet enables a user to remote login.
(a) Transfer a file
(b) Send E-mail
(c) Remote login
(d) Transfer mail
14. What is the application of a loopback address? Used for testing.
(a) Reserved by Internet authority
(b) Used for testing
(c) Used for broadcast address
(d) Used for unicast
16. What protocol is used for the World Wide Web? HTTP
(a) TCP/IP
(b) HTTP
(c) UDP
(d) ARP
18. What is the function of the source and destination port in a TCP header?
(a) It is used to identify the source and destination host on the network.
(b) It is used to identify the application source protocol and application of
destination protocol.
(c) It is used to identify source protocol and destination protocol.
(d) None of the above.
20. What is the function of Time-to-Live (TTL) in a TCP header? It defines the
number of routers a datagram can pass.
(a) It holds time of the day.
(b) It defines the number of routers a datagram can pass.
(c) It defines transmission time of a datagram between the source and
destination.
(d) It defines the number of words in a packet.
22. How many bits is IPv6? 128 bits
(a) 32 bits
(b) 48 bits
(c) 64 bits
(d) 128 bits
Chapter 9: Internet Protocols Part I 385
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 387
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
388 Chapter 10: Internet Protocols Part II and MPLS
10. The function of a router is to find the path to a destination for transporting
packets.
(a) Find the destination IP addresses
(b) Find the destination MAC addresses
(c) Find the path to a destination for transporting packets
(d) None of the above
12. Dynamic routing tables are updated by automatic methods.
(a) A server
(b) The network administrator
(c) Automatic methods
(d) None of the above
14. A socket is a combination of a port number and IP address.
(a) IP address
(b) Hostname
(c) Default gateway
(d) (a) & (b)
2. One of the factors that plays an important role in successful VoIP is:
(a) Cost
(b) Quality of service
(c) Speed
(d) Delay
4. The Internet Engineering Task Force approved ________ for VoIP.
(a) TCP
(b) SIP
(c) H.323
(d) RTP
6. Real time protocol is used for_________.
(a) Transporting data
(b) Transporting voice
(c) Transporting audio and video packet
(d) Transporting images
8. A ______ accepts a SIP user agent request and forwards it to another user agent.
(a) SIP endpoint
(b) SIP gateway
(c) SIP proxy server
(d) SIP Redirector server
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 391
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
392 Chapter 11: Voice over Internet Protocols (Voice over IP)
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 393
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
394 Chapter 12: Wireless Local Area Network (WLAN)
10. IEEE 802.11g uses DSSS and OFDM for transmitting information.
(a) DSSS and FHS
(b) DSSS and OFDM
(c) DSSS and CCK
(d) FHS and OFDM
12. DSSS uses 11 chip bits.
(a) 11
(b) 12
(c) 15
(d) 20
2. List the name of the Low Power Wide Area Network Technology that covers
more than 100 m.
ZigBee.
4. What is the maximum number of nodes that can be used in a ZigBee Network?
ZigBee can support up to 65,000 nodes in a single network.
6. List the ZigBee topologies.
ZigBee uses star, tree, and mesh topologies.
8. List ZigBee device types and explain the function of each device.
Coordinator – the coordinator starts and oversees the network, allocating
addresses, and permitting devices to join and leave.
Router – this device expands network coverage, sharing responsibilities
with the coordinator except for being able to start a new network.
Trust Center – the trust center provides authentication and security key
distribution.
End Node – the end nodes are the end devices that make up the clients in
the ZigBee network.
10. What is IEEE 802.15.4?
IEEE 802.15.4 is the standard for the MAC and physical layers of a low
power personal area network, such as is in use with ZigBee.
12. List the functions of the ZigBee physical layer.
The ZigBee physical layer receives frames and converts them to RF signals,
as well as takes in RF signals for conversion to frames.
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 397
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
398 Chapter 13: Low Power Wireless Technologies for Internet of Things (IoT)
SHR PHR
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 401
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
402 Chapter 14: Introduction to Cryptography
2. List the elements of network security and explain the function of each.
Confidentiality – information sent through a network must remain confi-
dential to those who are not authorized. This is accomplished through
encryption.
Authentication – The identity of users in a network must be authenticated
to ensure that the identity is who they say they are.
Integrity – Data should be protected against tampering to ensure that mes-
sages and information sent arrive at a destination in-tact and it its origi-
nal state.
Non-repudiation – A recipient should be provided with proof of origin.
4. What is the definition of cryptography?
Cryptography is a technique used to establish secure communications
through the use of encryption.
6. What is a cipher?
A cipher is an encryption or decryption algorithm.
8. Explain symmetric cryptography.
In symmetric cryptography, both sides encrypt and decrypt using the same
key, which is kept private from everybody else besides the two
communicating.
10. Distinguish between stream ciphers and block ciphers
Stream ciphers encrypt one byte at a time, while block ciphers encrypt
multiple bits in groups at a time called blocks.
12. List three encryption algorithms that use block ciphers.
DES, 3DES, and AES are all block ciphers.
14. What does AES stand for?
AES stands for Advanced Encryption Standard.
16. Name an algorithm which generates asymmetric keys.
RSA generates asymmetric keys.
18. What are the characteristics of a hash value?
A hash value should be collision resistant (difficult to find two messages
that produce the same hash), respond to changes of any bit of the source
with a complete change of the resulting hash value, and be impossible to
reverse.
Chapter 14: Introduction to Cryptography 403
N p q
N 711 77
Z p 1 q 1
Z 7 – 1 11 – 1 60
Kp 13
13 is less than N 77 and shares no common factors with Z 60
Ks 1 n Z / Kp
When n 8, Ks 1 8 60 / 13 37
Ks 1 n 60 / 13
Therefore, the public key is 13, the private key is 37, and N is 77
28. What are the applications of MAC?
MAC is used for message integrity and authentication of the sender, to
determine if a message was tampered while in transit
Chapter 15: Network Security
2. The Secure Socket Layer is located between the TCP and HTTPS protocols.
(a) TCP and IP protocols
(b) TCP and HTTP protocols
(c) TCP and HTTPS protocols
(d) TCP and DNS protocols
4. Which of the following is not an SSL/TLS handshake packet? Server Certificate
(a) Client Hello
(b) Server Hello
(c) Client Key Exchange
(d) Server Certificate
6. VPNs use the Internet to connect networks.
(a) Leased lines
(b) Modems
(c) The Internet
(d) Public Networks
8. Which of the following servers are usually in the DMZ? DNS Server
(a) DNS Server
(b) Database Server
(c) Accounting Server
(d) Print Server
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 405
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
406 Chapter 15: Network Security
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 409
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
410 Bibliography
References by Topic
https://www.energy.gov/sites/prod/files/2016/12/f34/AMI%20Summary%20Report_09-26-16.pdf
ZigBee Specification
https://csa-iot.org/wp-content/uploads/2022/01/docs-05-3474-22-0csg-zigbee-specification-1.pdf
LoRa Wireless
https://www.semtech.com/lora/what-is-lora
6LowPAN
https://www.rfc-editor.org/rfc/rfc8138.html
WirelessHart
https://www.cse.wustl.edu/~lu/cse521s/Slides/wirelesshart.pdf
Sigfox
https://www.sigfox.com/
Protocol Analyzer
https://www.wireshark.org
Bibliography 411
Cable Modem
https://www.sis.pitt.edu/mbsclass/standards/langer/cablest1.html
http://www.cablelabs.com
Gigabit Ethernet
http://www.gigabit-ethrnet.org
Internet
https://www.ietf.org/rfc/
https://www.internetsociety.org/internet/history-internet/brief-history-internet/
https://www.w3schools.in/types-of-network-protocols-and-their-uses
http://www.dhcp.org/
http://www.internetvalley.com
http://www.broadwatch.com
http://www.vbns.com
http://rs.internic.net
Firewall
https://www.firewall.com
https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
https://usa.kaspersky.com/resource-center/definitions/firewall
SONET
http://www.atis.org
http://bugs.wpi.edu:8080/EE535/virtext.html
http://www.niuf.nist.gov
https://www.ibm.com/topics/network-security
http://www.cisco.com/warp/public/cc/neso/sqso/eqso/ipsec_wp.htm
http://wp.netscape.com
412 Bibliography
http://www.ssh.fi/support/cryptography/introduction/random.html
http://www.iacr.org/
https://www.cisecurity.org/
Voice Over IP
http://www.iec.org
http://www.h323forum.org/papers/
http://voip.internet2.edu
Wireless Networking
https://grouper.ieee.org/groups/802/11/Reports/802.11_Timelines.htm
https://www.wi-fi.org/
http://grouper.ieee.org/groups/802/16/index.html
IEEE Standards
http://standards.ieee.org/getieee802/
Index
© The Editor(s) (if applicable) and The Author(s), under exclusive license to 413
Springer Nature Switzerland AG 2024
A. Elahi, A. Cushman, Computer Networks,
https://doi.org/10.1007/978-3-031-42018-4
414 Index
Block cipher, 296, 298, 300, 320, 322, 402 Continuous ARQ, 94, 96, 100, 369
Border Router, 283, 290, 291 Coordinator, 275, 279–281, 289–291, 397
Bridge, 9, 142–145, 150, 244, 246, 247 Crosstalk, 37, 44, 357
Broadband mode, 35, 44 Cryptography, 282, 293–319, 324, 344
Broadcast, 33, 112, 113, 122, 143, 145, 147, Cyclic Redundancy check (CRC), 38, 39,
172, 204, 205, 215 41–44, 139, 280, 356, 376
Broadcast address, 119, 122, 133, 139, 144,
172, 183, 190, 192, 204, 384
Bus network, 7, 17, 98 D
Byte, 27, 33, 43, 44, 59, 60, 63, 65, 66, 68, Data Encryption standard (DES), 296,
112, 123, 124, 130, 131, 133, 135, 148, 298–300, 320–322, 349, 402
162, 165–168, 172, 174, 177, 186, 189, Data rate, 32, 49, 59–62, 64, 65, 68, 82–84,
194, 206, 210, 211, 214, 222, 233, 238, 88, 104, 107, 110, 114, 115, 124, 126,
239, 254, 258, 279, 283, 290, 297, 300, 128, 133–136, 138, 139, 151, 212, 232,
302, 316, 317, 321, 357, 360–363, 373, 238, 239, 249, 251–255, 260, 263,
375–377, 385, 392, 401, 402 266–268, 270–272, 274, 279, 285–291,
355, 359–361, 363, 372, 374, 375, 381,
392–395, 398
C Decibel, 53, 56, 62, 113, 245
Carrier Sense Multiple Access With Collision Decryption, 16, 282, 294, 296, 304, 307,
Avoidance (CSMA/CA), 249, 255–257, 312, 313, 319–321, 330, 332,
268, 269, 271, 279, 394, 395 398, 401–403
Carrier Sense Multiple Access with Collision Demodulation, 104
Detection (CSMA/CD), 14, 93, 98, Demultiplexer (DMUX), 76, 81
120, 121, 126, 129, 130, 133, 134, Dense wavelength division multiplexing
136–138, 256, 289, 374, 376 (DWDM), 81
Cell, 215, 246, 259, 261, 269, 271, 394 Destination address (DA), 122, 123, 134, 135,
Certificates, 320, 321, 327, 335–337, 346–348, 143, 150, 151, 167, 178, 258, 259, 373,
402, 405, 406 375, 376
Channel capacity, 59–63 Destination Service access Point (DSAP), 99,
Chip, 78–80, 250, 251, 269, 271, 367, 394 100, 123, 134, 376
Ciphertext, 294–296, 298, 300, 302, 304, 306, DHCP relay agent, 204, 223, 224, 388
312, 319–321, 342, 401 Differential Manchester encoding, 32,
Circuit switching, 85, 86, 88, 191, 229, 383 35–38, 44, 357
Class I repeater, 128, 133, 134, 139 Digital signal, 23, 26–27, 31, 32, 34–37, 43,
Class II repeater, 128, 134, 139, 377 44, 49, 61, 62, 67, 77, 82, 83, 88, 103,
Client, 2, 160, 197, 234, 244, 319, 324 104, 115, 128, 139, 231, 239, 240, 270,
Client/server model, 4, 16, 17, 160, 353 355, 356, 365, 366, 392, 393
Coarse wave division multiplexing Digital signature, 307, 317–322, 330, 336,
(CWDM), 81, 132 347, 402, 403
Coaxial amplifier, 109, 110 Direct attacks, 293, 319, 320
Coaxial cable, 5, 14, 49–51, 67, 77, 109, 110, Direct sequence spread spectrum (DSSS),
135, 137, 361, 375 249–254, 260, 268–271, 279, 394
Codec, 82, 238, 239, 241, 366, 392 Distributed scheme (Cskip), 281, 290
Code division multiplexing (CDM), 77–80, 87 DNS root servers, 198, 203, 223, 224
Commercial Building Automation (CBA), Domain name, 158–161, 189, 190, 197–203
276, 290 Downstream, 110, 111, 114
Complementary Code Keying (CCK), 252, Dynamic Host Configuration Protocol
268–271, 394 (DHCP), 179, 183, 185, 187, 203–207,
Computer network, 2, 16, 17 223–225, 227, 387, 388
Conductive media, 50–52, 57 Dynamic router, 149, 151, 154
Constellation diagram, 107, 108, 372 Dynamic routing, 213, 224, 226, 227, 388
Index 415
E I
Encapsulation Security Packet (ESP), 168, IEEE 802 committee, 98, 100, 129
329–331, 346, 407 IEEE 802.11i, 341–346
End device, 273–275, 279, 281, 285–291, IEEE 802.14 standards, 112, 115
397, 398 IEEE 802.1d, 145, 151
Energy detection (ED), 278, 280, 290 IEEE 802.1X extensible authentication
Ethernet frame format, 119, 121, 131, 134, protocol (EAP), 334, 346
139, 148 IEEE 802.3, 36, 120, 121, 123, 129, 133, 134,
Extended Service Set (ESS), 245–247, 136, 138, 139, 206, 373, 376, 377, 381
268, 269 IEEE 802.3u, 125, 134, 135, 373, 377
Extensible Authentication Protocol (EAP), Indirect attack, 293, 319, 320
334, 335, 341–343, 345, 346, 348–350, Industrial scientific and medical band
406, 407 (ISMB), 269
Infrared (IR), 56, 57, 67, 243, 247, 248,
268–270, 393
F Injected-laser diode (ILD), 52
Fast Ethernet, 119, 125–129, 131, 133–136, Integrity, 12, 37, 282, 288, 291, 293, 294, 313,
139, 373, 374, 377 315, 316, 319, 320, 324, 328, 329, 332,
Fast Packet Multiplexer (FPM), 77, 78, 365 333, 341–347, 376, 402, 403
Fiber-optic cable, 1, 5, 14, 49, 52–56, 60, 63, Internet, 2, 39, 87, 103, 122, 155, 197, 229,
67, 68, 109, 110, 127, 128, 133, 137, 283, 293, 328
359, 361, 366, 374 Internet Engineering Task Force (IETF), 13,
Fiber to the home (FTTH), 103–115, 371–372 16, 158, 178, 179, 191, 198, 207, 218,
File server model, 3, 17 232, 233, 239, 240, 283, 290, 323, 329,
Firewalls, 153, 320, 337–339, 346, 349, 350, 330, 345, 346, 348, 352, 391
406, 407 Internet Protocol (IP), v, 15, 16, 39, 122, 123,
Frequency division multiplexing 155–189, 197–224, 229–239, 283, 328
(FDM), 77, 78 Internet Protocol Version 6 (IPV6), 13,
Frequency hopping spread spectrum (FHSS), 178–190, 283, 284, 289
250, 254, 268, 269 IP Security Protocol (IPsec), 168, 179,
Full-duplex mode, 34 329–330, 346, 348, 349, 406, 407
G J
Go-Back-N ARQ, 96, 369 Jitter delay, 230, 233, 239
H K
H.323, 232, 239, 240, 391, 392 Kerberos, 318–320, 322
Half-duplex mode, 34
Hash function, 313–315, 317, 320–322, 402
Hash value, 313–315, 317, 318, 320, 322, L
401, 402 LAN interconnection, 141–151, 154, 379–381
Head end, 109, 110, 112, 113, 115 LAN Switch, 147, 151, 153
Hello packet, 324–326, 346 Latency, 59–63, 67, 230, 362
Home automation (HA), 273, 276, 289, 290 Layer 2 (L2) Switch, 144, 151
HTTPS uses port 443, 324, 345, 346 Layer 3 (L3) Switch, 147, 151
Hybrid Fiber Cable (HFC), 110, 372 Learning bridge, 143, 150–152, 379
Hybrid topology, 9, 16, 17, 351 Light-emitting diode (LED), 52, 55, 67, 361
Hypertext transfer protocols (HTTPs), 13, 15, Line overhead, 65, 66
159, 161, 189, 207–210, 324, 338, 345 LLC frame format, 99, 100, 123
416 Index
M O
Manchester encoding, 32, 35–38, 44, 126 One’s complement of the sum, 38–40, 44
Maximum Transfer Unit (MTU), 166–168, Open System Interconnection (OSI)
188, 190, 194, 210, 211, 386 model, 13, 16
Media Access Control (MAC), 13–15, 93, 98, Operation administration and maintenance
100, 112, 120, 122, 123, 130–131, 134, (OAM), 63, 66, 112
135, 138, 143–145, 162, 163, 175, 176, Optical Carrier Signal (OC), 65
178, 183, 193, 206, 215, 225, 226, 244, Optical splitter, 113, 372
249, 254, 255, 258–259, 262, 265, 267, Orphan Scan, 280, 290
268, 273, 275, 277, 279–281, 283, 287, Orthogonal Frequency Division Multiplexing
289, 291, 315–317, 322, 324, 328, 333, (OFDM), 249–253, 263, 267–271, 394
339, 342, 344, 346, 373, 375, 376, 388, Over-The -Air-Activation (OTAA), 289, 290
397, 403
Mesh, 5, 7, 8, 16, 17, 51, 84, 274–276, 281,
289, 351–353, 397 P
Metropolitan Area Network (MAN), 10, 16, Packet switching, 12, 85–88, 96, 155, 191,
17, 138, 352, 354 383
Microwave, 56, 57, 67, 361 Parallel transmission, 32, 33, 44, 357
Modal bandwidth, 55, 130, 360 Parity check, 38, 39, 44, 66
Modem, 1, 2, 31, 60, 103–115, 191, 193, 293, Passive scan, 280, 290
347, 365, 371–372, 405 Path overhead, 65, 66
Modulation, 103–115, 249–252, 263, 265, Peer-to-peer model, 3, 17
266, 285 Peer-to-peer-network, 3
MT-RJ Connector, 55, 56 Phase Shift Keying (PSK), 104, 105, 107, 110,
Multicast, 112, 122, 145, 218 115, 251, 345, 371, 372
Multicast address, 119, 133, 182, 185–187, Polar encoding, 35, 36
190, 218 Port number, 143–145, 150, 152, 164, 178,
Multimode fiber (MMF), 54, 55, 67, 130, 190, 194, 207, 220–222, 224, 226, 332,
138, 361 338, 388, 389
Multimode graded index fiber, 55 Propagation delay, 59, 60, 124, 134, 230,
Multipath fading, 251, 261, 262, 269, 272 361, 362
Multiple Level Transition-3 (MLT-3), 126, Proxy server, 151, 234, 235, 237, 238, 337,
127, 134 338, 346, 392
Multiplexer (MUX), 63, 64, 75–81, 87 Public key cryptography, 296, 304, 305, 319,
Multi-protocol Label Switching (MPLS), 123, 320, 322, 324, 403
197–224, 226, 387–389 Pulse code modulation (PCM), 82, 83, 88,
Mutual authentication, 320, 334, 335, 346 231, 239, 241, 366, 392
Index 417
Transmission delay, 230, 239, 241, 362, 392 Virtual Private Network (VPN), 215, 328–329,
Transmission medium, 5, 11, 13, 14, 16, 17, 345, 346
44, 49, 50, 56, 63, 67, 68, 87, 98, 124, Voice over IP (VoIP), 113, 229–241, 391–392
129, 131, 137, 139, 243, 269, 353, 359,
363, 375, 377
Transmission time, 59, 60, 193, 361, 384 W
Transparent bridge, 143, 150, 151, 154 Wavelength, 52–54, 80, 81, 114, 130, 132, 133
Transponder, 80, 81, 366 Wavelength division multiplexing (WDM), 77,
Tree topology, 8, 9, 17, 276, 281, 289 80, 81, 87
Trunk cable, 109 White noise, 38, 44, 357
Trust Center Link Key, 282, 290 Wide Area Network (WAN), 10, 13, 16, 35,
Tunneling, 179, 328–331, 346 36, 131–133, 138, 229, 230, 240
Wi-Fi Protected Access (WPA), 339,
341–342, 344–346
U Wired Equivalent Privacy (WEP), 259, 268,
Unicast, 112, 122, 204, 218 339–341, 344–346
Unicast address, 119, 133, 139, 182–186, 190, Wireless Fidelity (Wi-Fi), 267–269, 274
204, 376 Wireless Local Area Network (WLAN), 11,
Unicode, 12, 15, 29–31 243–272, 333, 339–341, 346, 393–395
Unipolar encoding, 35 Wireless transmission, 56, 67, 359
Unlicensed National Information Word, 3, 25, 27, 29, 40, 43, 161, 163, 165,
Infrastructure Band (U-NII), 253, 167, 193, 197, 235, 287, 295, 296, 314,
268–271, 393 329, 338, 357, 384
Unshielded twisted pair (UTP), 6, 50, 58, 67, WPA2, 339, 341–346, 349, 350, 407
124–126, 130, 133, 135–138, 146, 269, WPA3, 339, 344–346
359, 361, 374, 375, 377
Upstream, 110–112, 114, 371, 372
User Datagram Protocol (UDP), 160–165, X
168, 178, 189–194, 201, 204, 206, 207, 802.1x, 335, 341
215, 219–221, 225, 230–232, 239, 240,
337, 383, 384, 387, 388, 392
Z
ZigBee, 11, 274–282
V ZigBee Health Care (ZHC), 276, 290
Virtual circuit, 87, 88, 191, 383 ZigBee Protocol Architecture, 273, 277–278,
Virtual LAN (VLAN), 147–148, 151, 153, 290, 291
154, 348, 381, 406 ZigBee RF4CE Remote Control, 276, 290