All - Topic - Summary - Lecture
All - Topic - Summary - Lecture
Introduction
What is Data communication?
Communication model (e.g. Human communication)
Source
Generates data
Transmitter
Converts data into transmitting signals
Transmission system
Carries data
Receiver
Converts received signals into data
Destination
Takes incoming data
Communication model in networks
Pipelining:
When data sent from B to C at the
same time data packet is being sent
from A to B.
This results in gain of efficiency. And
total delay for the transmission of
Message is very less.
Types of Packet switching network
LANs
WANs
ISPs
(will be discussed in detail once we set strong base for these networks)
Physical Topologies
Difference between Network topology and physical
topology.
Network Topology: Defines structure of network
Physical topology: Layout of the wire or media.
But physical topology is a part of network topology.
Physical topology:
BUS
Star
Ring
Mesh
Tree
BUS
Uses single backbone cable, All hosts directly
connected to this backbone.
Inexpensive and easy to install
All nodes receives data
Ends terminated with a device terminator.
Two types of BUS
Linear
All nodes connected to common medium which has only two end
points.
Distributed
All nodes connected to common medium which has more then
two end points.
RING
All nodes connected to one another in form of closed
loop.
Expensive and difficult to install but offers high
bandwidth, not robust.
Point to point connection with only two devices.
Signal is passed in one direction only, moves until it
reaches to its destination.
Each device connected with a repeater.
One signal always circulates for fault detection. If
device don’t receives signal for specified time it
generates alarm.
STAR
Connects all devices with central point.
Central point can be hub.
Data transmitted reaches to central point, who
decides where to send data.
Bottleneck occur because all data pass from hub.
Less expensive and easy to install, robust if one
link is down still remains active.
Disadvantage: dependency one central unit.
Star is used in LANs
Types of STAR Topology
Extended STAR
Has one or more repeaters from central node to extend maximum transmission
distance.
If repeaters in extended star topology is replace with hub or switches then it
creates Hybrid topology.
Or if backbone as star topology and extended with bus then it also creates
Hybrid topology.
Connecting two or more topologies with each other forms hybrid topology.
Distributed STAR
Individual networks based on
star topology
These networks do not have central
or top level connection points.
MESH
Each host has its dedicated point to point link with every other host.
Link only carries data between two devices only (no other can use that
link)
If there are n number of nodes in network then we need n(n-1) links.
If link is multi directional or duplex mode then we need n(n-1)/2 links.
Each device requires n-1 I/O ports to be connected to each device.
Eliminates traffic problem, Robust, privacy/security of message.
More cabling required, more I/O ports needed, hard to install, expensive.
TREE
Central node connected to one or
more nodes one level lower in
hierarchy.
Combines characteristics of linear bus and star topology.
Must have three levels of hierarchy.
If only two levels then it forms star.
If branching factor one then linear hierarchy.
Physical hierarchy will be one less then total number of nodes in network.
Disadvantage: requires point to point wiring, requires more hardware,
dependent on backbone, difficult to configure.
OSI Layer model
OSI: Open System interconnection
Comprises of seven layers
For network communication all network devices must speak same
language or protocol.
Each layer defines how data is treated and goes through different stages
while traveling in network from one place to another.
All layers are like set of instruction of assembly.
Gives complete picture of information flows within network.
All layer are used in end to end systems but only first three layers used in
intermediate systems while network communication.
OSI layers are divided into two different sets.
Application Set
Application set consist of Layer 5,6 and 7.
Transport set
Consist of layer 1,2,3 and 4
Layer 1: Physical Layer
Physical Layer
Define physical characteristics of network. E.g. wires,
connector, voltages, data rates, Asynchronous,
Synchronous Transmission
Handles bit stream or binary transmission
Used to maintain, activate and deactivate physical link.
For receiver it reassembles bits and send to upper layer
for frames.
For Sender it convert frames
into bit stream and send on
transmission medium.
Properties Physical Layers
Deals with bit stream.
Transmits raw bit stream over physical cable
defines cables, cards, and physical aspects
defines NIC attachments to hardware, how cable is
attached to NIC
defines techniques to transfer bit stream to cable
Layer 1 Device: Repeater, Hub, Multiplexer
Layer 2: Data Link Layer
other
When communication between individual
communicated (LLC)
Sub layers of Layer 2
Logical link layer (LLC)
Used for communication with upper layers
Error correction
Flow control
Media Access Control (MAC)
Access to physical medium
Header and trailer
Difference between Layer 1 and Layer 2
order).
TCP/IP Layers
Application layer of TCP/IP includes
functionality of session and presentation
layer of OSI model. Like encoding, dialog
control.
Application layer includes
file transfer, email, remote login, network
Management, name management
Transport layer includes QoS, Flow control
λ1 λ1
λ2 DE
MUX λ2
λ3 λ1 λ2 λ3 MUX
λ3
Time division multiplexing
Instead of sharing portion of bandwidth as in FDM,
time is shared.
Each connection occupies a portion of time in link.
1
1
2 DE
MUX 2
3 MUX
3
Data flow
Spread Spectrum
We combine different sources to fit in larger bandwidth.
But used in wireless applications.
Wireless application uses air as medium for communication.
Frequency of transmitted signal varies which results in higher bandwidth
then required.
So it spreads the original spectrum.
conventional wireless systems remains at a fixed frequency. E.g. 101 MHz
not goes upto 105Mhz, location can be identified.
Two types
Frequency hoping spread spectrum
Signal is modulated by set of frequencies to expand bandwidth.
Direct sequence spread spectrum
Each bit is assigned a code of n bits to increase the bandwidth.
IPv4 Addressing
Class A addresses begin with 0xxx, or 1 to 126
decimal.
Class B addresses begin with 10xx, or 128 to 191
decimal.
Class C addresses begin with 110x, or 192 to 223
decimal.
Class D addresses begin with 1110, or 224 to 239
decimal.
Class E addresses begin with 1111, or 240 to 254
decimal
Parts of IP address belong to Network
Class A --
NNNNNNNN.nnnnnnnn.nnnnnnnn.nnnnnnnn
Class B --
NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn
Class C --
NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnn
n
Each network IP has two parts
Network where system is connected
System itself
Subnetting
Dividing and identifying separate networks through
LANs
Prevents complete address exhaustion.
Break into smaller pieces
2n-2 is the formula used to calculate total number
of subnets and nodes.
CIDR: Classless InterDomain Routing
Example: we need 32 IP
Datagram Networks
Each message transmitted is converted into different
packets of same sizes.
Each packet is treated independently.
Packets in this approach are referred to as datagram .
Do not follow same path.
Reach at destination in out of order.
Datagram are connectionless.
No setup or teardown phases.
Routing table is used to send packets from source to
destination.
Case study
Efficiency: better then circuit switching network.
Resources can be controlled, only used when
transmitting packets.
Delay: datagram network has greater delay then
circuit switching network.
Have to wait at each switch before transmission.
Virtual circuit networks
Combination of circuit and packet switching networks.
Has following properties.
Setup and teardown connection, like circuit switching, before data transfer.
Resources are allocated during setup phase (circuit) or on demand (packet).
Data is divided into datagram packets.
But all packets follow same path.
Has following processes.
Setup
Data transfer
Acknowledgement
teardown
Random Access method
Each station is independent and can send data at any time.
Has different protocols
ALOHA
CSMA/CD
CSMA/CA
ALOHA
Developed earlier in 1970
Each station can sends frame at any time.
There is only one channel
Collision possible.
ALOHA relies on acknowledgements
If ACK not received after time out period sender assumes frame destroyed it
resends.
If all nodes resend at same time again collision possible.
So each station waits for random amount of time.