Professional Documents
Culture Documents
N. O. Sadiku
Cajetan M. Akujuobi
Fundamentals
of Computer
Networks
Fundamentals of Computer Networks
Matthew N. O. Sadiku
Cajetan M. Akujuobi
Fundamentals of
Computer Networks
Matthew N. O. Sadiku Cajetan M. Akujuobi
Prairie View A&M University Prairie View A&M University
Prairie View, TX, USA Prairie View, TX, USA
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher,
whether the whole or part of the material is concerned, specifically the rights of translation,
reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any
other physical way, and transmission or information storage and retrieval, electronic adaptation,
computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are
exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in
this book are believed to be true and accurate at the date of publication. Neither the publisher nor
the authors or the editors give a warranty, expressed or implied, with respect to the material
contained herein or for any errors or omissions that may have been made. The publisher remains
neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Dedicated to our wives:
Janet and Caroline
Preface
vii
viii Preface
c omputer networks. People now can easily and conveniently connect to any-
body anywhere in the world, send emails, access information, do shopping,
and chat on the Internet without leaving their homes.
The major objectives of this book are:
1 Introduction�������������������������������������������������������������������������������������� 1
1.1 What Are Computer Networks?������������������������������������������������ 1
1.2 Short History���������������������������������������������������������������������������� 3
1.3 Applications������������������������������������������������������������������������������ 4
1.4 Standards���������������������������������������������������������������������������������� 5
2 Digital Communications������������������������������������������������������������������ 7
2.1 Introduction������������������������������������������������������������������������������ 7
2.2 Transmission Media������������������������������������������������������������������ 8
2.2.1 Guided Media��������������������������������������������������������������� 8
2.2.2 Unguided Media����������������������������������������������������������� 9
2.3 Encoding ���������������������������������������������������������������������������������� 10
2.3.1 Summary of Digital Signal Encoding Formats������������ 13
2.4 Bit/Byte Stuffing ���������������������������������������������������������������������� 14
2.5 Multiplexing������������������������������������������������������������������������������ 14
2.6 Switching���������������������������������������������������������������������������������� 15
3 Network Models ������������������������������������������������������������������������������ 19
3.1 Introduction������������������������������������������������������������������������������ 19
3.2 OSI Model�������������������������������������������������������������������������������� 20
3.2.1 The Physical Layer ������������������������������������������������������ 20
3.2.2 The Data Link Layer���������������������������������������������������� 20
3.2.3 The Network Layer ������������������������������������������������������ 21
3.2.4 The Transport Layer������������������������������������������������������ 21
3.2.5 Session Layer���������������������������������������������������������������� 22
3.2.6 Presentation Layer�������������������������������������������������������� 22
3.2.7 Application Layer �������������������������������������������������������� 22
3.3 TCP/IP Model �������������������������������������������������������������������������� 22
3.3.1 Physical Layer�������������������������������������������������������������� 23
3.3.2 Network Interface Layer ���������������������������������������������� 23
3.3.3 Internet Layer���������������������������������������������������������������� 23
3.3.4 Transport Layer������������������������������������������������������������ 25
3.3.5 Application Layer �������������������������������������������������������� 26
3.4 Application I: Internetworking Devices������������������������������������ 27
3.4.1 Repeaters���������������������������������������������������������������������� 27
3.4.2 Hubs������������������������������������������������������������������������������ 27
3.4.3 Bridges�������������������������������������������������������������������������� 28
3.4.4 Switches������������������������������������������������������������������������ 29
xi
xii Contents
xvii
xviii About the Authors
Brian Kernighan
Abstract
(a) Telegraph network: It uses Morse code to
send messages between users.
This chapter introduces the reader to what (b) Telephone network: It uses circuit switching
computer networking is all about. Computer to exchange messages between two or more
networks differ in the transmission medium users.
(wired or wireless), topology, size, and scope. (c) A computer network is an interconnection of
They may be classified as switched or dedi- autonomous computers or digital devices.
cated. They may also be classified as local
area networks, metropolitan area networks,
and wide area networks. The chapter presents A computer network is an interconnec-
common applications of computer networks. tion of computing devices that facilitates
communication among the devices.
Keywords
cards, software, and computers/workstations/ need 24-hour-a-day access. In either case, a com-
devices to be connected. The software consists of munication network consists of a transmitter, a
network operating system (NOS) and specific receiver, and a transmission medium, which may
application programs. The NOS coordinates mul- be wired or wireless. A computer network con-
tiple computers across a network and keeps the sists of a set of digital devices using common
network running smoothly. Examples of NOSs protocols to communicate over connecting trans-
are AppleShare, LANtastic, and Novell NetWare. mission media.
For wireless network, network cards are nec- Computer networks differ in the transmission
essary, but no cable is needed. medium (wired or wireless), topology, size, and
In order for the devices connected to a com- scope. In terms of their geographical scope, com-
puter network to communicate with each other, puter networks may be classified as:
they must speak the same language, i.e., a com- (a) Local area network (LAN) covering 0–2 km,
mon language, called protocol, must be e.g., within a room, a single building, and a
established. campus. Typical examples are the Ethernet
and Cambridge ring. LANs have low delay
and make few errors. They operate on mod-
A protocol is a set of rules and procedures
erately high data rates (e.g., 1–10 Mbps).
that permit orderly exchange of informa-
Typically, Ethernet operates at data transfer
tion within a network.
rates of 10 Mbps to 400 Gbps. A typical
LAN is shown in Fig. 1.1.
(b) Metropolitan area network (MAN) covers a
Computer networks extensively use protocols city, extending from 2 to 50 km. Typical
to accomplish various communication tasks. Two MANs include FDDI (Fiber Distributed Data
examples of popular protocols are Real-time Interface) and WiMAX (Worldwide Interop-
Transport Protocol (RTP) which supports real- erability for Microwave Access). The cable
time services such as audio and video and Internet TV network is another example. A MAN is
Protocol Security (IPSec) which is regarded as basically a high-speed, backbone network
the “standard” for achieving secure communica- that interconnects a number of LANs in a
tions over the Internet. large city or metropolitan area. It occupies a
Communication networks can be classified as middle ground between LANs and WANs.
switched or dedicated. A switched network is (c) Wide area network (WAN) (or long-haul)
composed of three phases—call setup, call trans- covers a nation, a continent, or the entire
mission, and call termination. A dedicated net- world. Examples of WANs are ARPANET,
work consists of private lines for businesses that TYMNET, and the Internet (the so-called
Fig. 1.2 Interconnection of LANs, MANs, and WANs. (Source: Sadiku 1995, p. 2)
• In 1995, the transmission speed capacity for electronic voting, which outperforms tradi-
Ethernet increased from 10 Mbps to 100 Mbps. tional voting in many ways. These include
By 1998, Ethernet supported transmission accessibility and easy ballot management.
speeds of a Gigabit. Currently, 400 Gbps Eth- Electronic voting can lead to efficient voting
ernet is being developed. and smarter government.
• Ecommerce: Electronic commerce is the pro-
Computer networks have literally grown expo- cess of conducting business over computer
nentially and become an integral part of our mod- networks such as the Internet. It has revolu-
ern life. The growth is interesting and exciting. It tionized business transactions by enabling
can be attributed to the expansion of Internet consumers to purchase, invest, bank, and com-
access to almost every section of our society. municate from virtually anytime, anywhere. It
enables such transactions as online shopping,
online banking, payment systems, electronic
1.3 Applications air tickets, hotel reservation, tourism, and tele-
conferencing. The ecommerce has become an
We live in an exciting time in which we are indispensable tool for businesses worldwide
directly or indirectly involved in computer com- because it allows people to conduct business
munication networks such as Internet. Businesses transactions and reach consumers directly.
of every size and kind, education systems, gov- • Education: Computer networks such as the
ernment at all levels, entertainment industries, Internet have transformed education at all lev-
and organizations embrace computer networks as els to meet the demand of the twenty-first cen-
a means of sharing information and resources, tury. Online education has a great potential to
conducting commerce, and engaging socially. reach students with personalized education at
Here we discuss some of the common applica- a low cost. It is gaining ground as an extension
tions of computer networks. of traditional education. The emergence of
social networking technologies is rapidly
• Electronic mail: This the most common use of changing the delivery of online education. By
computer networks. It allows a user to send a taking advantage of these technologies, online
message to another user. Closely related to education can provide quality education any-
this is file transfer (also known as FTP). It where, anytime. Education providers are mov-
allows files to be transferred from one com- ing from traditional face-to-face environments
puter to another. to those that are completely electronic. Online
• Government: Computer networks are making education provides university equivalent
significant changes in all levels of govern- courses for millions of students across the
ment—federal, state, and local. Digital gov- globe.
ernment (or networked-government) refers to • Social media: When computers connect peo-
the use of information technologies such as ple with machines, they become social net-
the Internet and mobile computing to support works. Social networks have now become
government operations and provide popular means of social networking and com-
government services. It has improved the
munication about social events. They facilitate
access of citizens to services. It has made gov- interaction with family and friends who share
ernment to be more effective, accessible, and their personal or political interests. They allow
transparent. Digital government enables citi- the discussion of self-actualization, self-
zens to interact with the government and presentation, and self-disclosure of individu-
improves the services that governments offer als. They have become a part of our routines
their citizens. It is already making a positive and are widely accepted by digital citizens.
impact on the government, citizens, business, Although there are several social network
and society. A noticeable impact is paperless sites such as Google, Twitter, Myspace, and
1.4 Standards 5
LinkedIn, Facebook is the most popular. The (i) Telecommunications Standards Advisory
amount of sharing and cooperation that occurs Council of Canada (TSACC)
in online communities is the key advantage. Different countries and regions often have their
own standards.
Other applications of computer networks include Of particular importance are ITU and IEEE
manufacturing, digital games, digital library, elec- standards. ITU is a branch of the United Nations.
tronic health, mobile banking, online religion, It allocates spectrum for global and satellite
smart grid, smart agriculture, and smart cities. communications. It develops technical standards
that ensure that network products seamlessly
interconnect.
1.4 Standards IEEE is perhaps the largest technical profes-
sional organization. It publishes technical infor-
Standards play an important role in engineering in mation in the form of papers, sponsors
general and computer networks in particular. conferences, and develops standards. IEEE 802 is
Without standards, vendors will manufacture prod- a family of IEEE standards dealing with LANs
ucts that will not interoperate with products from and MANs. IEEE 802.3 is for Ethernet, which
other vendors. Standards take years to develop and transmits data over both copper and fiber cables.
ratify; it is a gradual process. They are created by IEEE 803.11 is for the standard for wireless LAN
bringing together experience and expertise of (also known Wi-Fi). It is perhaps the most well-
stakeholders on specific issues. For a specification known member of the IEEE 802 family for home
to become a standard, it must be well-understood users.
and thoroughly tested, have interoperable imple- Besides IEEE, the Internet Engineering Task
mentations, and enjoy public support. Force (IETF) (established by the IAB, Internet
Activities Board) published a series of docu-
ments known as Requests for Comments (RFCs).
A standard is a thoroughly tested specifi- The RFCs are numbered sequentially in chrono-
cation that has been approved by a stan- logical order. They are submitted by experts and
dards organization. may later become standards. An RFC usually
progresses through three stages: proposed stan-
dard, draft standard, and Internet standard.
Simple Network Management Protocol (SNMP)
There are several organizations that develop is a typical example of an RFC that went through
standards: the procedure.
(a) International Standards Organization (ISO)
(b) Institute of Electrical and Electronics Engi- Summary
neers (IEEE) 1. A computer network consists of a set of digi-
(c) International Telecommunications Union tal devices using common protocols to com-
(ITU) municate over connecting transmission media.
(d) Internet Engineering Task Force (IETF) 2. Computer networks are usually classified as
(e) European Telecommunications Standards local area networks (LANs), metropolitan
Institute (ETSI) area networks (MANs), and wide area net-
(f) American National Standard Institute works (WANs).
(ANSI) 3. Early computer networks include ARPANET,
(g) National Institute of Standards and Technol- X.25, and Ethernet.
ogy (NIST) 4. Computer networks support an enormous
(h) Japanese Telecommunications Technology number of applications and services such as
Committee (TTC) ecommerce, ehealth, online education, online
6 1 Introduction
Christine Comaford-Lynch
Informaon Source
Source Channel
Encoder Encoder
Channel
Informaon
Desnaon
Source Channel
Decoder Decoder
Source decoder: On the receiving side of the dig- cable, and optical fiber cable. The unguided media
ital communication system, the decoder con- consists of radio waves, microwaves, and infrared.
verts the bits to waveforms.
Channel encoder: The channel encoder is where
the bits are converted into signal waveforms. 2.2.1 Guided Media
Channel decoder: The channel decoder converts
the received waveform back to bits. The guided transmission media is also known as
Channel: The information from the source gets the wired transmission media or bound transmis-
to the destination passing through a commu- sion media. This type of transmission media con-
nication channel. There are different types of sists of cables that are tangible or have physical
communication channels as discussed in existence and are limited geographically in a phys-
Sect. 2.2. ical way. Twisted pair cable, optical fiber cable,
and coaxial cables are some of the popular guided
transmission media in use today. Each of them has
2.2 Transmission Media its own characteristics like physical appearance,
transmission speed, cost, and effect of noise.
The communication channel is referred to as the
transmission media. The transmission media pro- • Twisted pair cable: There are two types of
vides a physical connection between the trans- twisted pair cables—unshielded and shielded
mitter and the receiver. pair cables.
Transmission media in computer networks is the physical media that allow communication to
take place from the source location to the destination location.
There are several examples of these media as shown –– Unshielded twisted pair (UTP): It has the
in Fig. 2.2. They are classified into two categories capability to block interference. It does this
such as guided media and unguided media. The without depending on a physical shield.
guided media consists of twisted pair cable, coaxial The unshielded twisted pair is used for
2.2 Transmission Media 9
telephone applications. The advantages of modes, namely, broadband mode and baseband
the unshielded twisted pair are that it is mode. In the broadband mode, the cable band-
easy to install, has high-speed capacity, and width is split into separate ranges, while in the
costs less. The disadvantages of the UTP baseband mode, the cable bandwidth is dedi-
are that it only operates more efficiently for cated. Coaxial cables are widely used by cable
short transmissions due to attenuation, can and analog televisions. The advantages of the
be affected by external interference, and coaxial cables are that they are easy to install
has lower performance and capacity when and expand, have better noise immunity, are
compared to shielded twisted pair (STP). less expensive, and have high bandwidth. The
–– Shielded twisted pair (STP): The STP is a major disadvantage of the coaxial cable is that
cable that has a special jacket that blocks once there is a single cable failure the entire
external interference. It is used in fast data network can be disrupted.
rate Ethernet and in data and voice chan-
nels of telephone lines. The advantages are
that it is faster compared to other cables, 2.2.2 Unguided Media
has the ability to eliminate crosstalk, and
has better performance at a higher data rate The unguided media is also known as wireless
when compared to UTP. The disadvantages transmission media or unbound transmission
are that it is bulky, costs more, and is diffi- media. Data in this case are transmitted without
cult to install and manufacture when com- using cables and are not limited geographically
pared to other types of cables. in a physical way. In the twenty-first century,
• Optical fiber cable: This type of cable is used wireless communication has become very popu-
for the transmission of large volumes of data. lar. Wireless LANs are being installed in college
The concept used is that of light through a core campuses as well as offices. Radio wave, micro-
made up of plastic or glass. In this case, a less wave, and infrared are some of the popular
dense plastic or glass covering surrounds the unbound transmission media.
core. The advantages are that it is light in
weight, has less signal attenuation, has • Radio waves: Radio waves can easily pene-
increased bandwidth and capacity, has electro- trate buildings, and they can be generated eas-
magnetic interference immunity, and has resis- ily. The alignment of the sending and receiving
tance to corrosive materials. The disadvantages antennas is not necessary in this case. The fre-
are that it is fragile, is difficulty to install and quency range for radio waves is from 3 KHz to
maintain, operates only in a unidirectional way 1 GHz. In their transmission of information
without additional fiber for bidirectional com- from the source location to the destination
munication, and is more expensive. location, cordless phones and FM and AM
• Coaxial cable: This type of cable has an outer radios use radio waves.
plastic that covers two parallel conductors hav- • Microwaves: In the case of microwaves, the
ing a separate insulated protection that covers sending and receiving antennas must be prop-
each side. Information is transmitted in two erly aligned because it uses the line of sight
10 2 Digital Communications
transmission technology. The signal travel dis- lost depends on frequency and distance.
tance is directly proportional to the height of Radiations and physical characteristics of
the antenna. The frequency range for micro- media contribute to attenuation.
waves is from 1 GHz to 300 GHz. Microwaves • Number of receivers: Each attachment intro-
are used for television distribution and mobile duces some attenuation and distortion, limit-
phone communication mainly. ing distance and/or data rate.
• Infrared waves: Infrared waves cannot pene- • Cost: There are many variables that can influ-
trate through obstacles such as buildings. ence the cost of implementing a specific type
Interference between systems is there pre- of media. The cost of installation, new infra-
vented. They are only used for very short dis- structure versus reusing existing infrastruc-
tance communications. The frequency range ture, lower transmission rate affecting
for infrared waves is from 300 GHz to productivity, and cost maintenance and sup-
400 THz. This kind of technology is used in port are some of the key costs to be considered
printers, TV remotes, keyboards, and wireless in making any decision.
mouse. • Transmission impairments: Limit the distance
a signal can travel.
It should be noted that different media have • Interference: Competing signals in overlap-
different properties. Therefore, to choose the best ping frequency bands can distort or wipe out a
transmission media for any application, the fol- signal.
lowing factors must be considered. • Noise absorption: It refers to the susceptibil-
ity of the media to external electrical noise
• Bandwidth: This refers to the data-carrying that can cause distortion of data signal.
capacity of a channel or medium. Lower • Ease of installation and maintenance: The
bandwidth communication channels support complexity of the installation and mainte-
lower data rates, while higher bandwidth nance of any transmission media will deter-
communication channels support higher data mine how viable it will be in considering that
rates. media for any computer network transmission
• Delay: Delay consideration of any medium is application.
very important in the transmitting and receiv-
ing of information from the source location to
the destination location. Transmission delay 2.3 Encoding
refers to the time it takes to send the bits of
data onto the media and is given by L/R, where In digital communications, information that is
L is the amount of data and R is the rate. carried through the transmission media is con-
Propagation delay refers to the time it takes verted into a format that the communication sys-
for a bit, once on the media, to reach the tem can understand and process. The encoding
destination. process helps to code the data such that the com-
• Radiation: This means the consideration of puter network and the media system can process
the leakage of the signal from the medium due the information accordingly.
The process of converting data or a given sequence of alphabets, characters, and symbols into a
specified format for the secured transmission is called encoding.
to undesirable electrical characteristics of the The transmission processing needs that require
medium. encoded information include application data
• Attenuation: It refers to loss of energy as sig- processing. For example, the conversion of files,
nal propagates outward. The amount of energy data storage and data compression or decompres-
2.3 Encoding 11
Polar Bipolar
sion, data transmission, and data program compi- encoding techniques, the Polar and the Bipolar,
lation and execution must be done before the are used. In the Polar encoding, you have
information is transmitted to the appropriate Nonreturn to Zero (NRZ), Return to Zero (RZ),
communication channel. and Bi-phase. Within NRZ you have Nonreturn
Encoding can be categorized in two ways such to Zero-Level (NRZ-L) and Nonreturn to Zero-
as: Inverted (NRZ-I). Within Bi-phase, you have the
Manchester and the Differential Manchester. As
• Converting analog information to digital for the Bipolar encoding techniques, you have
information for electronics systems. Alternate Mark Inversion (AMI), Bipolar 8-Zero
• In the case of computer networking technol- Substitution (B8ZS), and High-Density Bipolar 3
ogy, the encoding process is applied to the (HDB3).
conversion of a specific code, such as num-
bers, letters, and symbols to equivalent data Nonreturn to Zero (NRZ)
information. In the NRZ encoding, it has 0 for low-voltage
level and 1 for high-voltage level. The character-
istic of the NRZ encoding is that the voltage level
Data Encoding remains constant during bit interval. It does not
The process of encoding data involves using dif- allow the indication of the start or end of a bit
ferent shapes of current or voltage levels repre- while at the same time maintaining the same volt-
senting 1s and 0s of the digital information that age level as long as the value of the bit previously
has been encoded on the transmission media and currently is the same. Fig. 2.4 indicates how
computer network link. NRZ does its own encoding. As stated earlier,
there are two types of NRZ encoding techniques,
Encoding Techniques and they are NRZ-L and NRZ-I.
There are different types of encoding techniques.
The most common types are as represented in NRZ-L
Fig. 2.3 depending on the type of data conver- This is almost the same as the NRZ, only that
sion. In the encoding of digital signals, two major there is a change in the polarity of the first bit of
12 2 Digital Communications
Fig. 2.5 NZR-L,
NZR-I, Bi-phase
Manchester, and
Differential Manchester.
(Source: https://www.
tutorialspoint.com/
digital_communication/
digital_communication_
data_encoding_
techniques.htm)
the signal input as shown in Fig. 2.5. When the ulation rate is also doubled. The clock is taken
incoming signal changes from 0 to 1 or from 1 to from the signal itself. The bandwidth required for
0, the signal changes its polarity. this coding is greater.
There are two types of Bi-phase encoding.
NRZ-I
In this case, there is no transition at the beginning • Bi-phase Manchester
of the bit interval when there is 0 at the incoming • Differential Manchester
signal. However, there is a transition at the begin-
ning of the bit interval when there is 1 at the
incoming signal as shown in Fig. 2.5. Bi-phase Manchester
Generally, the results of encoding process of In the Bi-phase Manchester encoding, the transi-
the NRZ have a disadvantage in that the synchro- tion is done at the middle of the bit interval as
nization of the transmitter clock with the receiver shown in Fig. 2.5. The transition for the resultant
clock gets completely disturbed, especially when pulse is from high to low in the middle of the
there is a string of 1s and 0s. Therefore, it is interval, for the input bit 1, while the transition is
advisable to have a separate clock line for this from low to high for the input bit 0.
type of encoding process.
Differential Manchester
Bi-phase Encoding In the Differential Manchester encoding, the
The Bi-phase encoding process initially checks transition takes place in the middle of the bit
the signal level twice for every bit time and in the interval. As shown in Fig. 2.5, if no transition
middle as shown in Fig. 2.5. Hence, the clock rate takes place at the beginning of the bit interval,
is double the data transfer rate, and thus the mod- then the input bit is 1. If transition takes place
2.3 Encoding 13
at the beginning of the bit interval, then the when eight consecutive 0s take place in the bit
input bit is 0. stream and the signals are known as violations as
shown in Fig. 2.6. The violation signal that takes
RZ Encoding place is based on the polarity of the last binary 1
The return to zero encoding is done as the signal before the 8 0s and will match this polarity.
returns to zero between each pulse. It happens no Therefore, the receiving end looking for an alter-
matter if a number of consecutive 0s or 1s occur nate polarity to the binary 1 will discover the
in the signal. It is a self-clocking signal. same polarity and will thus determine that there
has been a string of 8 0s. The polarity is set to be
Bipolar Encoding the same as the previous positive bit.
There are three types of bipolar encoding,
namely, Alternate Mark Inversion (AMI), Bipolar HDB3
8-Zero Substitution (B8ZS), and High-Density The HDB3 as shown in Fig. 2.6 uses four zeros
Bipolar 3 (HDB3). rather than eight as in the case of the B8ZS. A
violation takes place after the four zeros.
AMI Synchronization is made possible and data
This type of bipolar encoding system as shown in retrieval more accurate by the use of violations in
Fig. 2.6 represents neutral (zero) voltage as the signal that give it extra “edges.”
binary 0, and the alternating positive and negative
voltages are represented as binary 1.
2.3.1 Summary of Digital Signal
B8ZS Encoding Formats
The B8ZS has a problem with synchronization
being lost when there is a stream of binary 0s Nonreturn to Zero-Level (NRZ-L): 0 = high
being sent; otherwise, it works very similar as the level, 1 = low level
AMI by changing poles for each binary 1. It is a Nonreturn to Zero-Inverted (NRZ-I): 0 = no tran-
common technique used in the USA to avoid the sition at beginning of interval (one bit time), 1
synchronization problem of long strings of binary = transition at beginning of interval
0s. With the artificial signal changes it makes, Bipolar-AMI: 0 = no line signal, 1 = positive or
this problem seems to be fixed. It takes place negative level, alternating for successive ones
14 2 Digital Communications
Multiplexing is the process in which multiple data streams, coming from different sources, are
combined and transmitted over a single data channel or data transmission media.
ends with a special bit pattern called a flag byte There are two basic forms of multiplexing in dig-
[01111110] in bit stuffing. Whenever the sender ital communication systems or in a computer net-
data link layer encounters five consecutive ones work system. They are time division multiplexing
in the data stream, it automatically stuffs a 0 bit (TDM) and frequency division multiplexing
into the outgoing stream. When the receiver sees (FDM). Single channel is divided into non-over-
five consecutive incoming ones followed by a 0 lapped time slots in a TDM. Data streams from
bit, it automatically destuffs the 0 bit before send- different sources are divided into units with the
ing the data to the network layer. same size and interleaved successively into the
time slots. In an FDM system, data streams are
Example 2.2 As an example of bit stuffing, if carried simultaneously on the same transmission
the bit input stream is as follows: medium by allocating to each of them a different
2.6 Switching 15
frequency band within the bandwidth of the sin- until the connection is terminated. The circuit
gle channel. switching has the advantage of being a dedicated
Multiplexing is done by a device called multi- channel once it is established. The disadvantages
plexer (MUX). It is placed at the transmitting end are that there is always a long wait before con-
of the communication link. At the receiving end, nection is established at least up to 10 secs and
the composite signal is separated by a device could be more for long-distance or international
called demultiplexer (DEMUX). Demultiplexer calls. Because of the dedicated channel, it is more
performs the reverse process of multiplexing and expensive than the other types of switching
routes the separated signals to their correspond- methods.
ing receivers or destinations. The multiplexing
and demultiplexing technique in a digital com- Packet Switching
munication system or in a computer network sys- Packet switching has two types, namely, virtual
tem is shown in Fig. 2.7. circuit and datagram. In the packet switching
methods, the information is broken into small
parts, called packets. Each packet is tagged with
2.6 Switching appropriate source and destination addresses.
Since packets have a strictly defined maximum
There are multiple parts in which information length, they can be stored in main memory
can be transmitted from the source location to the instead of disk; therefore, access delay and cost
destination location in any computer network. As are minimized. The transmission speeds, between
the information travels through various commu- nodes, are also optimized. With current technol-
nication channels, it can be switched to various ogy, packets are generally accepted onto the net-
parts of the communication channel. In digital work on a first-come, first-served basis. If the
communication systems, there are four types of network becomes overloaded, packets are
switching methods. They are circuit switching, delayed or discarded.
packet switching, message switching, and cell Packet switching has the advantage that it is
switching. cost-effective because switching devices do not
need massive amount of secondary storage. It
Circuit Switching also offers improved delay characteristics,
Circuit switching is a method that directly con- because there are no long messages in the queue
nects the transmitter and the receiver in an unbro- as the maximum packet size is fixed. If there are
ken path. As an example, in telephone switching busy or disabled links, the packet can be rerouted
equipment, a path is established that connects the if there is any problem. In packet switching,
caller’s telephone to the receiver’s telephone by many network users can share the same channel
making a physical connection. Once the path is at the same time. By making optimal use of link
established, the path is completely dedicated bandwidth, packet switching can maximize link
16 2 Digital Communications
efficiency. The disadvantage of packet switching is ideal for an integrated environment and is
is that the protocols for packet switching are typi- found within cell-based networks. Cell switching
cally more complex. It can add some initial costs can handle both digital voice and data signals.
in implementation. If packet is lost, sender needs Some of the key advantages of the cell switch-
to retransmit the data. Another disadvantage is ing include scalability, high performance,
that packet-switched systems still cannot deliver dynamic bandwidth, and common LAN/WAN
the same quality as dedicated circuits in applica- architecture multimedia support. High perfor-
tions requiring very little delay—like voice con- mance is achieved because this technology uses
versations or moving images. hardware switches. Cell switching uses virtual
circuit rather than physical circuit; therefore it is
Message Switching not necessary to reserve network resources for a
In the case of message switching, there is no particular connection. Also, once a virtual circuit
need to establish a dedicated path between two is established, switching time is minimized,
stations quite unlike the circuit switching. The which ensures higher network throughputs. The
destination address is attached to the message cell has a fixed length of 53 bytes out of which 48
when a message is sent from a station. The mes- bytes are reserved for payloads and 5 bytes act as
sage is then transmitted through the network, in header. The header contains payload-type infor-
its entirety, from node to node. Each node mation, virtual circuit identifiers, and header
receives the entire message, stores it in its error check.
entirety on disk, and then transmits the message Cell switching has features of circuit switch-
to the next node. This type of network is called ing, as it is a connection-oriented service where
a store-and-forward network. A message switch- each connection during its set-up phase creates a
ing node is typically a g eneral-purpose com- virtual circuit. A connection-oriented service is a
puter. The device needs sufficient secondary technique used to transport data at the session
storage capacity to store the incoming mes- layer. It requires that a session connection be
sages, which could be long. A time delay is established between the information source loca-
introduced using this type of scheme due to tion and the information destination location,
store-and-forward time, plus the time required similar to a phone call. This method is normally
to find the next node in the transmission path. considered to be more reliable than a connection-
Some of the key advantages of the message less service, although not all connection-oriented
switching are that the channel efficiency can be protocols are considered reliable. A connection-
greater compared to circuit-switched systems oriented service can be a circuit-switched con-
because more devices are sharing the channel. nection or a virtual circuit connection in a
The traffic congestion can be reduced, because packet-switched network. For the latter, traffic
messages may be temporarily stored in route. flows are identified by a connection identifier,
The message priorities can be established due to typically a small integer of 10 to 24 bits. This is
store-and-forward technique, and the message used instead of listing the destination and source
broadcasting can be achieved with the use of addresses. Cell switching has a major disadvan-
broadcast address appended in the message. The tage, and that is the fact that it is an unreliable,
disadvantages include the fact that the message connection-oriented packet-switched data com-
switching is not compatible with interactive munications protocol.
applications. The store-and-forward devices are
expensive because they must have large disks to Summary
hold potentially long messages.
1. Digital communications is also known as data
Cell Switching transmission and is referred to as the transfer
In cell switching, there are similarities with of a digital bit stream (data) from source loca-
packet switching, except that the switching does tion to destination location over a communi-
not necessarily occur on packet boundaries. This cation channel.
2.6 Switching 17
2. The encoding process helps to code the data 2.6 Converting analog information to digital
such that the computer network and the media information for electronics systems is one
system can process the information of the ways computer network encoding
accordingly. can be done.
3. In the encoding of digital signals, two major (a) True (b) False
encoding techniques, the Polar and the Bipolar 2.7 Byte stuffing cannot be referred to as char-
are used. acter stuffing in computer networks.
4. In computer networks, each frame begins and (a) True (b) False
ends with a special bit pattern called a flag 2.8 In circuit switching, the long wait before
byte [01111110]. connection is established is at least up to:
5. Byte stuffing is referred to as character stuff- (a) 5 secs (b) 10 secs (c) 15 secs (d)
ing in computer networks. The ASCII charac- 20 secs
ters are used as framing delimiters (e.g., DLE 2.9 In the case of message switching, there is
STX and DLE ETX) where DLE is data link no need to establish a dedicated path
escape, STX is the start of text, and ETX is between two stations quite unlike the cir-
the end of text. cuit switching.
6. Multiplexing is the process in which multiple (a) True (b) False
data streams, coming from different sources,
2.10 Common LAN/WAN architecture multi-
are combined and transmitted over a single media support is not one of the advantages
data channel or data stream. of cell switching.
7. In digital communication systems, there are (a) True (b) False
four types of switching methods. They are cir-
cuit switching, packet switching, message Answer: 2.1 a, 2.2 b, 2.3 a, 2.4 b, 2.5 d, 2.6 a, 2.7
switching, and cell switching. b, 2.8 b, 2.9 a, 2.10 b
2.1 Digital communications can also be 2.1 Name at least five examples of a transmis-
referred to as: sion media.
(a) Data transmission (b) Analog 2.2 Name five of the different shapes and forms
transmission (c) Digital bit stream that communication data can be represented.
2.2 The communication channel is also referred 2.3 What factors must you consider in choos-
to as: the transmission media. ing the best transmission media for any
(a) Communication transmission (b) application? Briefly discuss each identified
Transmission media (c) Social media factor.
2.3 Computer bus is an example of a transmis- 2.4 Name and discuss the two different types of
sion media? transmission media.
(a) True (b) False 2.5 What is encoding? What are the two ways
2.4 Radio wave is not one shape or form of a encoding can be categorized?
digital data? 2.6 Describe the Polar and Bipolar encoding
(a) True (b) False techniques.
2.5 Limiting the distance a signal can travel can 2.7 Consider the binary sequence 0100101. Draw
be known as: the waveforms for the following formats.
(a) Noise absorption (b) (a) Unipolar NRZ signal format
Interference (c) Attenuation (d) (b) Bipolar RZ signal format
Transmission impairment (c) AMI (Alternate Mark Inversion) RZ
signaling format
18 2 Digital Communications
Diane Helbig
Abstract
3.1 Introduction
The International Standards Organization The computer network models have the function
(ISO) created the Open Systems of sending information from a sender to a receiver
Interconnection (OSI) model, which covers and making sure the desired information reaches
all aspects of network communication stan- its destination without any disruption. The entire
dards. The entire data communication relies data communication relies on two computer net-
on two computer network models called the work models called the Open Systems
Open Systems Interconnection (OSI) and the Interconnection (OSI) and the Transmission
Transmission Control Protocol/Internet Control Protocol/Internet Protocol (TCP/IP)
Protocol (TCP/IP) models. We cover in this models.
chapter the OSI model, the TCP/IP models, In this chapter, we will discuss the OSI
and all the different layers associated with model that was developed in 1983 by the
the models. We cover also the comparisons International Standards Organization (ISO).
between the OSI and the IEEE Layer models, The OSI model allows you to know the differ-
the functionalities of their different layers, ent functionalities in network communications.
and how they relate to each other. We will also cover the TCP/IP models and all
the different layers associated with the model.
Keywords The TCP/IP model is slightly different from
the OSI model, and those differences will be
Open Systems Interconnection (OSI) · discussed. This chapter will discuss different
Transmission Control Protocol/Internet networking applications—the internetworking
Protocol (TCP/IP) model · IEEE Layer system devices and Signaling Systems No. 7
models · Internet Control Message Protocol (SS7). Their various application areas will be
(ICMP) · Signaling System No. 7 (SS7) explored. Finally, we will focus on the com-
parisons between OSI and the IEEE Layer
models, the functionalities of their different called entities. Entities in the same layer in differ-
layers, and how they relate to each other. ent machines are called peer entities. In OSI
models, layers can offer connection-oriented or
connectionless services. Connection-oriented
3.2 OSI Model services are like telephone system. Connectionless
services are like postal system.
The International Standards Organization (ISO) Each service has an associated quality of ser-
which is a worldwide multinational body was vice (e.g., reliable or unreliable). Quality of ser-
established in 1947. Its major task was to work vice (QoS) refers to any technology that manages
on international standards agreements. The ISO data traffic to reduce latency, jitter on the net-
created the Open Systems Interconnection (OSI) work, and packet loss. There has to be some level
model which covers all aspects of network com- of predictability in the network, and QoS assures
munication standards. The OSI model first came that in any network. Enterprise networks need to
into existence in the late 1970s. The OSI model provide predictable and measurable services as
consists of seven layers as shown in Fig. 3.1. applications such as voice, video, and delay-
These layers are: sensitive data traverse the network. QoS is also
the description or measurement of the overall
1. The physical layer performance of a service, such as a telephony,
2. The data link layer computer network, and cloud.
3. The network layer
4. The transport layer
5. The session layer 3.2.1 The Physical Layer
6. The presentation layer
7. The application layer The function of the physical layer is to transmit
individual bits from one computer to another. It
Layers 1–4 relate to communications technol- also makes sure as a matter of concern with the
ogy, while layers 5–7 relate to user applications. transmission of unstructured bit stream over the
In the OSI model, each layer provides services to physical medium that the electrical, functional,
layer above and “consumes” services provided mechanical, and procedural characteristics access
by layer below. Active elements in a layer are the physical medium. The physical layer regu-
lates the transmission of a stream of bits over a
physical medium. It defines how the cable is
attached to the network adapter and what trans-
mission technique is used to send data over the
cable. It deals with issues like:
vides reliable transfer of information across the design issue is routing of data within the subnet.
physical link. It makes sure that the frames it Routing can be based on static tables (rarely
sends have the necessary synchronization, flow changed), determined at the start of each session,
control, and error control. This layer takes the or highly dynamic: individually determined for
“raw” transmission facility provided by the phys- each packet, reflecting the current network load.
ical layer (Layer 1) and uses it to provide a reli- Too many packets in the subnet simultaneously
able, error-free transmission service. It does this can form bottlenecks; this is dealt with by conges-
by breaking the data stream up into frames, typi- tion control procedures in the network layer.
cally of thousands of bytes in length. Where nec- Accounting for subnet use is also typically the
essary, special acknowledgment frames can be responsibility of the network layer. When a packet
sent back by the receiving data link entity to indi- travels from one network to another, address con-
cate successful receipt of each frame. version may be necessary. The address conversion
The physical layer (Layer 1) transmits a con- is performed by the network layer. In broadcast
tinuous sequence of bits, and so Layer 2 must cre- networks (e.g., many LANs), the routing problem
ate and recognize frame boundaries. This is is very straightforward, and hence Layer 3 will be
typically done by the insertion of special bit pat- very simple, or even nonexistent.
terns. Channel errors can completely destroy a
frame, and hence retransmission may be neces-
sary. This, in turn, leads to the possibility of dupli- 3.2.4 The Transport Layer
cate frames being received. Data link protocols
deal with issues such as channel errors using the The transport layer is responsible for the delivery
idea of duplication. A data link protocol may offer of a message from one process to another. It pro-
several different “service classes” to the network vides a reliable, transparent transfer of data
layer, each with a different quality and cost. The between end points. It also provides end-to-end
data link layer must also regulate traffic flow to flow control and error recovery. The basic func-
prevent “swamping” of a slow receiver. In a duplex tion of the transport layer is to take data from the
channel, there may be competition between data session layer (Layer 5), split it up into smaller
and acknowledgment frames; one solution is units if necessary, and pass these units on to the
known as piggybacking, where acknowledgment network layer. It is then also responsible for
information is attached to data frames. ensuring that all the pieces are received correctly
and reassembled in the correct order.
Typically the transport layer will create a dis-
3.2.3 The Network Layer tinct network layer connection for each transport
connection requested by the session layer.
The network layer is responsible for the delivery However, depending on the data load and the
of packets from the original source to the final capacity of a single session channel: multiple
destination. This layer is also responsible for pro- network connections might be used to support a
viding upper layers with independence from the single high-bandwidth session connection, or one
data transmission and switching technologies high-bandwidth network connection might be
used to connect to the systems. It is responsible used to support several session connections. The
for establishing, maintaining, and terminating transport layer also determines what type of ser-
connections. The network layer controls the sub- vice to provide to the session layer and, ulti-
net. A subnet, also called a subnetwork, is a logi- mately, to the network users, for example, an
cal subdivision of an IP network. The practice of error-free, point-to-point channel, guaranteeing
dividing a network into two or more networks is data is delivered in the correct order (the most
called subnetting. Computers that belong to a common type of service), transport of isolated
subnet are addressed with an identical most sig- messages with no guarantee of correct ordering,
nificant bit-group in their IP addresses. The key or message broadcast to multiple destinations.
22 3 Network Models
Transport is the first true end-to-end layer, i.e., variety of protocols to meet specific user needs.
the transport protocol communicates between As an example, network virtual terminal used by
end parties and not to any of the intermediaries. “networked screen editors” and other networked
applications need to handle many different termi-
nal types. In application layer, software exists to
3.2.5 Session Layer map the functions of the virtual terminal onto the
real terminal. Examples include OSI virtual local
The session layer provides the control structure area networks (VLAN), Trunking Protocol
for communication between applications. It (VTP), and Internet telnet. Another example is
establishes, manages, and terminates connections file transfer where different file systems have dif-
(sessions) between cooperating applications. It ferent file naming conventions and internal record
makes it possible for applications on different structures. Such a protocol must convert files to a
computers to establish, use, and end a session. An “standard” representation. Examples include OSI
example is in the provision of a control structure file transfer, access and management (FTAM),
in the file transfer and remote login on different and Internet ftp. In electronic mail, examples of
computer applications. It establishes dialog con- electronic mail protocols are OSI X.400 and
trol and regulates which side transmits, plus Internet mail. In directory service, examples
when and how long it transmits. It performs token include OSI X.500.
management and synchronization.
Layer 4 Transport
Layer
Internet
Layer 3
Layer
Network Interface
Layer 2
Layer
Physical
Layer 1
Layer
A pplicaon Applicaon
Messages or
Streams
Transport Transport
(host-to-host) (host-to-host)
Datagrams
(UDP) or
Segments(TCP)
Internet Internet
IP Packets
Network Network
Interface Interface
Network Frames
Network Hardware
mechanisms used to forward the packets from a the Internet and higher layers to identify the
computer through one or more routers to a final device and to provide internetwork routing.
destination. The IP protocol that is used in this • Host-to-host communication: It determines
layer is the most significant part of the entire the path through which the data is to be
TCP/IP suite. The other protocols are the Address transmitted.
Resolution Protocol (ARP) and the Internet • Data encapsulation and formatting: An IP pro-
Control Message Protocol (ICMP). IPv6 is tocol accepts the data from the transport layer
another new protocol of the Internet layer replac- protocol. It ensures that the data is sent and
ing IPv4 protocol. received securely. It encapsulates the data into
The responsibilities of the IP protocol are as message known as IP datagram.
follows: • Fragmentation and reassembly: The limit
imposed on the size of the IP datagram by data
• IP addressing: With this protocol, the logical link layer protocol is known as maximum
host addresses known as IP addresses are transmission unit (MTU). If the size of IP
implemented. The IP addresses are used by datagram is greater than the MTU unit, then
3.3 TCP/IP Model 25
the IP protocol splits the datagram into smaller An ICMP protocol mainly uses two terms:
units so that they can travel over the local net-
work. Fragmentation can be done by the • ICMP test: This is used to test whether the
sender or intermediate router. At the receiver destination is reachable or not.
side, all the fragments are reassembled to form • ICMP reply: It is used to check whether the
an original message. destination device is responding or not.
• Routing: When IP datagram is sent over the
same local network such as local area network It should be noted that the core responsibility of
(LAN), metropolitan area network (MAN), the ICMP protocol is to report the problems, not
and wide area network (WAN), it is known as correct them. The responsibility of the correction
direct delivery. When source and destination lies with the sender. ICMP can send the messages
are on the distant network, then the IP data- only to the source, but not to the intermediate
gram is sent indirectly. This can be accom- routers because the IP datagram carries the
plished by routing the IP datagram through addresses of the source and destination but not of
various devices such as routers. the address of the router that it is passed to.
The responsibilities of the Address Resolution IPv6 Protocol: A New Internet Protocol
Protocol (ARP) are as follows: The IPv6 is the new Internet protocol that
replaced the old IPv4 protocol. It has been a
• It is the network layer protocol which is used backbone of the networks generally and Internet
to find the physical address from the IP at large. IPv6 is a total replacement in making
address. The two terms that are associated more IP addresses available. IPv6 addresses are
with the ARP Protocol are: 128 bits in length. The addresses are assigned to
–– ARP request: When a sender wants to know individual interfaces on nodes, not to the nodes
the physical address of the device, it broad- themselves. A single interface may have multiple
casts the ARP request to the network. unique unicast addresses. Any of the unicast
–– ARP reply: Every device attached to the addresses associated with a node’s interface may
network will accept the ARP request and be used to uniquely identify that node. There are
process the request, but only the recipient some fundamental changes to the protocol that
recognizes the IP address and sends back must be considered in security policy. Changing
its physical address in the form of ARP to IPv6 reduces the risks of cybercrime within the
reply. The recipient adds the physical network.
address both to its cache memory and to the
datagram header.
3.3.4 Transport Layer
The responsibilities of the Internet Control
Message Protocol (ICMP) are as follows: The transport layer is where the Transmission
Control Protocol (TCP) is active and is concerned
• It is a mechanism used by the hosts or routers with host-to-host communications. It is respon-
to send notifications regarding datagram prob- sible for the reliability, flow control, and correc-
lems back to the sender. tion of data which is being sent over the network.
• A datagram travels from router-to-router until The language settings and packed size are agreed.
it reaches its destination. If a router is unable The packets are also checked to confirm safe
to route the data because of some unusual con- delivery through acknowledgment. User
ditions such as disabled links, a device is on Datagram Protocol (UDP) is an alternative to
fire, or network congestion, then the ICMP TCP where packets are just sent without acknowl-
protocol is used to inform the sender that the edgment. The two protocols used in the transport
datagram is undeliverable. layer are TCP and UDP.
26 3 Network Models
Transmission Control Protocol (TCP) • Source port address: It is the address of the
It provides full transport layer services to appli- application program that has created the
cations. It creates a virtual circuit (VC) between message.
the sender and receiver, and it is active for the • Destination port address: It is the address of
duration of the transmission. A virtual circuit is the application program that receives the
a means of transporting data over a packet- message.
switched computer network in such a way that • Total length: It defines the total number of
it appears as though there is a dedicated physi- bytes of the user datagram in bytes.
cal layer link between the source and destina- • Checksum: It is a 16-bit field used in error
tion end systems of this data. The term VC is detection.
synonymous with virtual connection and virtual
channel. TCP is a reliable protocol as it detects UDP does not specify which packet is lost. It
the error and retransmits the damaged frames. contains only checksum which is the 16-bit field
It therefore ensures all the segments must be used for error checking of the header and data. It
received and acknowledged before the trans- does not contain any ID of a data segment.
mission is considered complete and virtual cir-
cuit discarded. At the sending end, TCP divides
the whole message into smaller units known as 3.3.5 Application Layer
segments, and each segment contains a
sequence number which is required for reorder- In the application layer, all applications such as
ing the frames to form an original message. At web browsers and email clients take place. The
the receiving end, the TCP collects all the seg- requests are also made in the application layer to
ments and reorders them based on sequence web servers, and emails are originated. Once
numbers. these requests are made, they are then passed on
to the transport layer. The application layer is the
User Datagram Protocol (UDP) topmost layer in the TCP/IP model. It is respon-
The UDP provides connectionless service and sible for handling high-level protocols and issues
end-to-end delivery of transmission. It is an of representation. The user is allowed to interact
unreliable protocol as it discovers the errors but with the application in this layer. When one
not specify the error. The UDP discovers the application layer protocol wants to communicate
error, and the ICMP protocol reports the error to with another application layer, it forwards its data
the sender that user datagram has been to the transport layer. It is important to note that
damaged. not every application can be placed inside the
UDP consists of the following fields as shown application layer with the exception of those who
in Fig. 3.4: interact with the communication system. As an
An internetworking device is a widely-used term for any hardware within networks that
connect different network resources.
• Simple network management protocol All devices have separately installed scope fea-
(SNMP). This is the framework used for man- tures, per network requirements and scenarios.
aging the devices on the Internet by using the Networking and internetworking devices are
TCP/IP protocol suite. divided into seven types: hubs, bridges, switches,
• Simple mail transfer protocol (SMTP). The routers, gateways, brouters, and repeaters.
TCP/IP protocol that supports the email is
known as a simple mail transfer protocol. This
protocol is used to send the data to another 3.4.1 Repeaters
email address.
• Domain name system (DNS). An IP address Repeaters as shown in Fig. 3.5 operate at the
is used to identify the connection of a host to physical layer. Their job is to regenerate the sig-
the Internet uniquely. However, users prefer nal over the same network before the signal
to use the names instead of addresses. becomes too weak or corrupted so as to extend
Therefore, the system that maps the name to the length to which the signal can be transmitted
the address is known as domain name over the same network. The important point to
system. be noted about repeaters is that they do not
• Terminal network (TELNET). It establishes amplify the signal. When the signal becomes
the connection between the local computer weak, they copy the signal bit by bit and regen-
and remote computer in such a way that the erate it at the original strength. It is a two-port
local terminal appears to be a terminal at the device.
remote system.
• File transfer protocol (FTP). It is a standard
Internet protocol used for transmitting the 3.4.2 Hubs
A hub is an electronic device that implements a network.
files from one computer to another When computers are connected to a hub as shown
computer. in Fig. 3.6, they can communicate as if they are
28 3 Network Models
0100001
1000010
B
C
Hub Hub
attached to a network. A hub is a multiport • Passive hub: The passive hubs collect wiring
repeater. It is normally used to create connections from nodes and power supply from active hub.
between stations in a physical start topology. A These passive hubs relay signals onto the net-
network hub has no routing tables or intelligence work without cleaning and boosting them and
on where to send information, and all network cannot be used to extend the distance between
data are broadcasted across each connection. nodes like the active hubs.
There are two types of hubs—the active hub and
the passive hub.
3.4.3 Bridges
• Active hub: The active hubs have their own
power supply and can clean, boost, and A bridge as shown in Fig. 3.7 operates at the data
relay the signal along with the network. link layer (Layer 2). A bridge is a repeater, which
These active hubs can serve as both as a adds on the functionality of filtering content by
repeater and as a wiring center. They are reading the MAC addresses of source and desti-
also used to extend the maximum distance nation. It is also used for interconnecting two
between nodes. LANs working on the same protocol. It has a
3.4 Application I: Internetworking Devices 29
Router
Switch1
Switch2
Hub
Hub
Bridge
single input and single output port, thus making it 3.4.4 Switches
a two-port device. The following types of bridges
are common. Switches as shown in Fig. 3.7 are multiport
bridges with buffers and designs that can boost
• Transparent bridges: These are the bridges in their efficiencies (large numbers of ports imply
which the stations are completely unaware of less traffic) and performances. Switches are data
the bridge’s existence, i.e., whether or not a link layer devices. The switches can perform
bridge is added or deleted from the network, error checking before forwarding data that make
reconfiguration of the stations is unneces- them very efficient as they do not forward pack-
sary. These bridges make use of two pro- ets that have errors and forward good packets
cesses, i.e., bridge forwarding and bridge selectively to correct ports only. That means that
learning. switches divide collision domains of hosts, but
• Source routing bridges: In these bridges, rout- broadcast domains remain the same.
ing operation is performed by source station,
and the frame specifies which route to follow.
The host can discover frame by sending a spe- 3.4.5 Routers
cial frame called discovery frame, which
spreads through the entire network using all Routers as shown in Figs. 3.7 and 3.8 are devices
possible paths to destination. like switches that route data packets based on
• Translational bridge: The translational bridge their IP addresses. Routers are mainly network
converts the data format of one networking to layer devices. Routers normally connect LANs
another, for example, converting token ring to and WANs together and have a dynamically
Ethernet and vice versa. updating routing tables based on which they
30 3 Network Models
Bus
Router
Router
Ring
Ring
Router
Router
Bus
Ring
Mulmedia PC Fax
Gatekeeper Phone
Mulmedia PC IP
Network PSTN
VoIP
Gateway
Modem
IP Phone
IP Phone
Mulmedia PC
BROUTER
LAN 1 LAN 2
used to set up most of the world’s public switched Service control points (SCPs): These are data-
telephone network (PSTN) telephone calls. The bases that provide information necessary for
SS7 primarily sets up and tears down telephone advanced call-processing capabilities.
calls, but other uses include number translation,
prepaid billing mechanisms, local number porta-
bility, short message service (SMS), and a variety 3.5.1 SS7 Signaling Link Types
of mass market services.
The SS7 takes a digital approach to signaling. Figure 3.12 shows the signaling link types for the
With the new approach comes great functionality SS7 system. These types of links range from A to
and better service. It can meet the present and F links.
future requirements for information transfer for
inter-processor transactions, and it has to provide Link A: This is an access link that connects an
a reliable means of information transfer in cor- SSP or SCP to an STP.
rect sequence and without loss or duplication. Link B: This is a bridge link that connects an STP
The SS7 is an out-of-band signaling. The mes- to another STP.
sages are exchanged over 56K or 64K bidirec- Link C: It is a cross link that connects two “mated
tional signaling links. It supports services pair” STP. It is done to improve reliability.
requiring database systems. The SS7 signaling Link D: This is a diagonal link similarly to the B
systems allow for an improved control over link.
fraudulent network usage. Link E: It is an extended link that connects an
There are three types of signaling points as SSP to an extra STP in the event that the A
shown in Fig. 3.11. They are service switching link cannot reach one.
point (SSP), signal transfer point (STP), and ser- Link F: It is a fully associated link that connects
vice control point (SCP). SSPs.
Voice Trunks
D B A
C C C
D B A
D B A
STP STP STP SCP
A E A
A E A
SSP SSP
F
Transport
4
Signaling Network Functions
3 Network
• SS7 data link layer: layer 1—This is the same message signal unit (MSU) that carries the
as the physical layer in the OSI model. It has signaling information, (2) the link station
two bidirectional transmission paths for sig- signal unit (LSSU) that carries the link status
naling. It also has two data channels running information, and (3) the fill-in signal unit
in opposite directions at the same data rate (FISU), which fills in the idle time.
which is usually 56K to 64K. • SS7 network functions: layer 3—This layer
• SS7 signal link layer: layer 2—This layer is does the message handling functions such as
responsible for signal unit alignment and message routing function that is used at
delimitation. It does error detection and cor- each signaling point to determine the outgo-
rection using a preventive cyclic retransmis- ing link. It does the message discrimination
sion method. It is also responsible for flow function which determines if a received
control within the system. There are three message is destined for a particular point. It
types of SS7 signaling units. They are (1) the also does the message distribution function
34 3 Network Models
which delivers received message to the cor- seven layers. These layers are the physical,
rect user part. data link, network, transport, session, presenta-
• In the traffic management functions, it is used tion, and application layers. These OSI model
to control the message routing. This includes layers have been described in Section 3.2 of
modification of the message routing to desti- this book.
nation points or to continue normal routing. It The physical layer physically transmits sig-
is used for control signaling traffic by avoid- nals across a communication medium. The data
ing irregularities in the message. It is also used link layer transforms a stream of raw bits (0s and
flow control. 1s) from the physical layer into an error-free data
• In the link management functions, it is used to frame for the network layer. The network layer
restore the availability of a link set, monitor controls the operation of a packet transmitted
the status of signaling link, and also correct from one network to another, such as how to
out-of-service links. It can provision new sig- route a packet. The transport layer splits data
naling links, and it automatically configures/ from the session layer into smaller packets for
reconfigures signaling links. delivery on the network layer and ensures that the
• SS7 signaling connection control part (SCCP): packets arrive correctly at the other end. The ses-
layer 4—This layer is responsible for services sion layer establishes and manages sessions, con-
that are connected oriented, connectionless, versions, or dialogs between two computers. The
and peer-to-peer communication which presentation layer manages the syntax and
includes the establishment of connection, the semantics of the information transmitted between
starting of data transfer, and the releases of the two computers. The application layer, the highest
connections. layer, contains a variety of commonly used proto-
cols, such as file transfer, virtual terminal, and
email. The ISO/OSI model requires that the func-
3.6 OSI Model and the IEEE tion of each layer define the international stan-
Model dardized network protocols.
In the IEEE LAN model, there are four layers.
Figure 3.14 shows the OSI model and the IEEE They are the physical, medium access, logical
model. In 1983, the International Standards link, and the higher-level protocols. The physical
Organization (ISO) developed a network model layer is responsible for transmitting and receiv-
called Open Systems Interconnection (OSI) ing bits across the various types of media. The
reference model, which defined a framework of performance functions needed to control access
computer communications. The OSI model has to the physical medium are done by the media
access control layer. The layer responsible for the 11. To avoid network traffic congestion, a large
common interface to the higher software layers is network is usually broken into small network
the logical link control layer. Both the OSI and segments. The breaking of a network into
the IEEE are governed by the IEEE 802 reference smaller network segments is called subnet-
models. The Institute of Electrical and Electronics ting, and it makes it easier for internetwork-
Engineers (IEEE) developed a set of LAN stan- ing using appropriate devices.
dards, known as IEEE Project 802, which the 12. Networking and internetworking devices are
ISO accepted as international standards. The divided into seven categories: hubs, bridges,
IEEE LAN standards addressed only the lowest switches, routers, gateways, brouters, and
two layers, the physical and data link layers, of repeaters.
the ISO/OSI model. 13. The Signaling System No. 7 (SS7) is a data
communications network standard intended
Summary to be used as a control and management net-
work for telecommunication networks.
1. The computer network models have the func- 14. There are three types of signaling points
tion of sending information from a sender to which are service switching point (SSP), sig-
a receiver and making sure the desired infor- nal transfer point (STP), and service control
mation reaches its destination without any point (SCP).
disruption. 15. The SS7 model includes signaling data link
2. The OSI model consists of seven layers layer, signaling link control layer, signaling
which are physical layer, data link layer, net- network functions, connection control layer,
work layer, transport layer, session layer, and signaling connection control part (SCCP)
presentation layer, and application layer. layer.
3. The physical layer transmits individual bits 16. In the IEEE LAN model, there are four lay-
from one computer to another. ers. They are the physical, medium access,
4. The data link layer transmits frames from logical link, and the higher-level protocols.
one computer to another.
5. The network layer is responsible for the
delivery of packets from the original source Review Questions
to the final destination.
6. The transport layer is responsible for the 3.1 How many layers does the OSI model
delivery of a message from one process to have?
another. (a) 2
7. The session layer provides the control struc- (b) 7
ture for communication between (c) 5
applications. (d) Less than 7
8. The presentation layer provides indepen- 3.2 In the OSI model, layers 1–4 relate to com-
dence to the application processes from dif- munications technology.
ferences in data representation (syntax). It is (a) True
concerned with the representation of data to (b) False
be transmitted, for example, providing a 3.3 In the OSI model, layers 5–7 do not relate
standard encoding for data. to user applications.
9. The application layer provides access to the (a) True
OSI environment for users and also provides (b) False
distributed information services. 3.4 In the TCP/IP model, the network interface
10. The TCP/IP model has five layers which are layer is responsible for the specification of
physical layer, network layer, Internet layer, how to organize data into frames over a
transport layer, and application layer. network.
36 3 Network Models
Michele Jennae
Abstract
nected within limited geographical areas such as a
building or a campus. A typical LAN is shown in
A local area network (LAN) connects per- Fig. 4.1. Its origin could be traced to the introduc-
sonal computers, workstations, printers, serv- tion of the IBM terminal equipment in 1974. A
ers, and other devices. There are different LAN connects personal computers, workstations,
topologies (bus, ring, star, tree, etc.), transmis- printers, servers, and other devices. It is governed
sion medium, and medium access control by IEEE 802 standards that define the layers which
(MAC) that are included in the architectures in most cases are the data link and physical layers.
of a LAN. This chapter covers LANs and the Characteristically, LANs use packet broadcasting.
different types of LANs. The advantages and This is a term that refers to transmissions that are
disadvantages of the different topologies of available to large audiences. The costs are rela-
LAN are covered. All of the operational access tively low and the speeds are high.
A local area network connects computers within a limited geographical areas and are almost
always belong to one organization.
methodologies including the controlled access The LAN architectures include different topolo-
devices are also discussed. gies (bus, ring, star, tree, etc.), transmission
medium, and medium access control (MAC). The
Keywords applications of LAN include personal computer
LANs, backbone LANs (interconnect low-speed
Local area network (LAN) · IEEE 802 local LANs), high-speed office networks, back
standards · Carrier Sense Multiple Access end networks (interconnecting large systems),
with Collision Avoidance (CSMA/CA) · and storage area networks (network handling
Medium access control (MAC) storage needs). LANs use different access tech-
niques that include random access and controlled
access protocols.
4.1 Introduction This chapter covers LANs and the different
types of LANs. The advantages and disadvan-
Local area network (LAN) is typically a group of tages of the different topologies of LAN are cov-
data communication networks or a group of com- ered. All of the operational access methodologies
puters and other necessary devices that are con-
Printer
Workstation
Desktop
Workstation Workstation
Server
Desktop Desktop
Workstation
including the controlled access devices are also A star topology does have its own limitations,
discussed. but there are effective ways of working around
them. In reality, you can only connect to so many
systems to the same star network before you begin
4.2 Types of LANs to run into physical limitations, such as cable
length or the number of ports available on the
Local area network (LAN) has many topologies. hardware used for the network. The star topology
The common types of LAN topologies are star, handles this by being easily extended into multi-
token ring, bus, and tree. ple stars with a central core in the middle.
In a star topology, computers are not con-
nected to one another but are all connected to a
4.2.1 Star LAN Topology central hub or switch. When a computer sends
data to the other computers on the network, it is
A star topology is a network that is designed to sent along the cable to a central hub or switch,
look very similar to a star with a central core and which then determines which port it needs to
many devices connected directly to that core as send the data through for it to reach the proper
shown in Fig. 4.2. The systems in a star topology destination. Characteristics of a star topology are
do not connect to each other but instead pass as follows:
messages to the central core and in turn passes
the message to either all other systems (or • A star topology is scalable.
devices) or the specific destination system (or • All cables run to a central connection point.
devices) depending on the network design. This • If one cable breaks or fails, only the computer
topology works well for many smaller networks that is connected to that cable is unable to use
and works around many of the detriments associ- the network.
ated with bus or ring topologies. You can see the • Because there is so much cabling used to con-
general design of this topology in Fig. 4.2. nect individual computers to a central point,
4.2 Types of LANs 39
nodes have to wait longer for the bus to be 4.2.3 Token Ring Topology
clear.
In a token ring topology, the nodes are connected
Advantages in a ring as shown in Fig. 4.4, and data travels in
one direction using a control signal called a
• The bus LAN topology is the simplest and “token.”
cheapest to install and extend.
• It is well suited for temporary networks with Advantages
not many nodes.
• It is very flexible as nodes can be attached or • The token ring topology is not greatly affected
detached without disturbing the rest of the by adding further nodes or heavy network
network. traffic as only the node with the “token” can
• In the bus topology, failure of one node does transmit data, so there are no data collisions.
not affect the rest of the bus network. • It is relatively cheap to install and expand.
• It is simpler than a ring topology to trouble-
shoot if there is a cable failure because sec-
tions can be isolated and tested Disadvantages
independently.
• The token ring topology is slower than a star
topology under normal load.
Disadvantages • In the token ring topology, if the cable fails
anywhere in the ring, then the whole network
• In the bus topology, if the bus cable fails, then will fail.
the whole network will fail. • The token cannot be passed around the ring
• The performance of the network slows down any longer in its operation if any node fails,
rapidly with more nodes or heavy network which then results in the whole network
traffic. failing.
• The bus cable has a limited length and must be • It is the hardest topology to troubleshoot
terminated properly at both ends to prevent because it can be hard to track down where in
reflected signals. the ring the failure has occurred.
• It is slower than a ring network as data cannot • The token ring is harder to modify or expand
be transmitted while the bus is in use by other because to add or remove a node, you must
nodes. shut down the network temporarily.
• In the token ring topology operation, in order • It is more difficult to configure and wire than
for the nodes to communicate with each other, other topologies.
they must all be switched on. • In a tree topology, the entire segment goes
down if the backbone line breaks.
The ability to access data at random is called random access. It is the ability to access an
arbitrary element of a sequence in equal time or any datum from a population of addressable
elements roughly as easily and efficiently as any other, no matter how many elements may be in
the set.
Sense Multiple Access with Collision Avoidance may be regarded as the father of multiple access
(CSMA/CA). No station is superior to another protocols. The ALOHA protocol is a suitable
station, and none is assigned control over another protocol for satellite and terrestrial radio
in random access or contention methods. In addi- transmissions.
tion, no station permits, or does not permit, There are two types of ALOHA protocols,
another station to send. At each instance, a station namely, slotted and unslotted ALOHA. In the
that has data to send uses a procedure defined by slotted ALOHA, all frames have the same size,
the protocol to make a decision on whether or not and the time is divided into equal size slots (time
to send. The decision also depends on the avail- to transmit 1 frame). The nodes start to transmit
ability of the medium (idle or busy). and only slot beginning nodes are synchronized.
However, if two or more nodes are transmitted in
the slot, all nodes will detect collision.
4.3.1 ALOHA Operationally, when a node obtains fresh frame,
it transmits it in the next slot. However, if there is
The ALOHA protocol was developed in the no collision, the node can send the new frame in
early 1970s at the University of Hawaii to con- the next slot. Otherwise, if there is collision, the
nect computers situated on different Hawaiian node retransmits the frame in each subsequent
Islands. The computers of the ALOHA network slot with a probability p until success is achieved.
transmit on the same radio channel whenever The ALOHA has a single active node that can
they have a packet to transmit. In fact, ALOHA continuously transmit at full rate of the channel.
4.3 Random Access 43
It is highly decentralized and slots are normally Therefore, choosing optimum p as n -> infin-
synchronized. However, in ALOHA systems, ity = 1/(2e) = .18
collisions are experienced and slots are wasted.
There are idle slots and nodes that may be able to
detect collision in less than the time to transmit 4.3.2 CSMA
the packet. The clock is synchronized.
In the case of the unslotted Aloha, also called Carrier Sense Multiple Access (CSMA) is a car-
Pure ALOHA, it is simpler than the slotted rier sensing protocol mechanism used in random
ALOHA, and there is no synchronization. The access schemes. It is used to find out if the system
packet needs transmission which means the channel is busy, then it waits and proceeds to
packet can be sent without awaiting for the begin- transmit when it is free. If there should be colli-
ning of the slot. There is always the tendency for sion detected during the transmission of informa-
collision probability to increase, which means tion, it will wait and retransmit the information
that the packet sent at t0 will collide with other frame later when the channel is free. The CSMA
packets sent in t0−1, and t0+1. technique relies on the sender sensing the state of
the transmission channel and basing its actions
Example 4.1 on this. It can therefore only be effectively used
Suppose you have N stations that have packets to in channels which have short propagation delays,
send. Each slot transmits with a probability of p. since for channels with long delays such as satel-
What is the maximum probability of achieving a lite channels, the sensed data will be consider-
successful (S) transmission? ably out of date. There are three types of CSMA
protocols: 1-persistent CSMA, non-persistent
Solution: CSMA, and p-persistent CSMA protocols.
distribution, then the throughput S is given by domly before it tries again. When there is colli-
Eq. 4.1. It is also assumed in this calculation that sion, it will wait a random time and then restart
all users can sense the transmission of all other the process again. The non-persistent CSMA pro-
users. The channel can be assumed to be over- tocol uses these two steps:
loaded if the throughput S is greater than load G,
and if the throughput S is less than the load G, it (i) The first step is when the channel is “sensed.”
is underloaded. If it is found to be idle, the packet is transmit-
ted immediately.
Ge G e 1 G
S (4.1) (ii) In the second step, if the channel is “sensed”
G eG busy, the packet transmission is rescheduled
using the retransmission distribution. At the
where e−G is the probability of a single trans- end of the delay period, the protocol moves
mission during a slot time. to step (i).
Whether it is a slotted channel or unslotted
channel, Eq. 4.1 holds. The assumption here is
that for the slotted channels, the slot time will be P-persistent CSMA
much shorter than the packet time. The p-persistent CSMA protocol when compared
with 1-persistent CSMA and non-persistent
Example 4.3 CSMA protocols takes a moderate approach
A slotted ALOHA channel has an average 20% between them. It tells you the value of the prob-
of the slots idle. ability p of the transmission after detecting that
the channel is idle. The station first checks if the
(a) What is the offered traffic G? channel is idle and then transmits a frame with
(b) What is the throughput? the probability p if it is idle. However, with a
(c) Is the channel overloaded or underloaded? probability of q=1-p, it will wait for the next slot
and then try again with a probability of p. If the
channel sensed it is busy, it will wait until the
Solution: next slot and then try again. When there is colli-
sion, it will wait for a random time and then
restart the process. In general, at the heavier load,
(a) Probability of a single transmission during a decreasing p would reduce the number of colli-
slot time is e−G. sions. At the lighter load, increasing p would
20% = e−G avoid the delay and improve the utilization. The
0.2 = e−G value of p can be dynamically adjusted based on
This implies that G = −1.61. the traffic load of the network.
(b) S = G * e−G
= 1.61 * e−(1.61)
= 1.61*0.2 4.3.3 CSMA/CD
= 0.32
(c) For slotted ALOHA, S is maximum at G = 1. In the other CSMA systems, once transmission
commences, it is completed even if a collision
In this case, G = 1.61 and S = 0.32. This means occurs on the first bit. Bandwidth is therefore
that it is beyond G = 1; hence, it is overloaded. wasted with such operation. The Carrier Sense
Multiple Access with Collision Detection
Non-persistent CSMA (CSMA/CD) is a way to solve the bandwidth
In the non-persistent CSMA, if the channel is waste problem. With the CSMA/CD protocol, a
sensed idle, it will transmit the entire packet. user monitors the line even when it commences
However, if it is sensed busy, it will wait ran- transmission and stops once a collision is
4.3 Random Access 45
detected. After that, the user waits a random time ing the minimum size of the frame, it will be
before sensing the line again. 15 Mbps × 40 μs = 600 bits or 75 bytes.
Collisions are detected in a short time in the
CSMA/CD. Collision occurs when two stations Ethernet
listen for network traffic, and when they hear The Ethernet is a network access method that origi-
nothing, they transmit simultaneously resulting nated from the University of Hawaii and later
in damaging either transmissions or collision. In adopted by Xerox Corporation. It is also called a
this case, the colliding transmissions are aborted media access method. It is governed by the IEEE
reducing channel wastage. In collision detection 802.3 standard starting from the early 1980s.
mode, measuring signal strengths and comparing Ethernet is the most pervasive network access
transmitted and received signals are easy in wired method in use today. It is the most commonly
LANs. In the wireless LANs which are covered implemented media access method in LANs.
in Chap. 10, it is difficult if the receiver shuts off Ethernet was the first network to provide CSMA/
while transmitting. Collision detection enables CD. It was developed in 1976 by Xerox Palo Alto
stations to detect collisions, so they know when Research Center (PARC) in cooperation with DEC
they must transmit. CSMD/CD is used by and Intel corporations. Ethernet as shown in Fig. 4.6
Ethernet LANs. The CSMA/CD was introduced is a fast and reliable network solution. It is one of
by Xerox early in the 1970s. It is governed by the most widely implemented LAN standards. It
IEEE 802.3 standard developed in 1985. The sta- can provide speeds in the range of 10 Mbps to 10
tions access the medium randomly. In addition, Gbps. It is used with a bus or star topology.
they contest for time on the medium. The different types of Ethernet LANs are:
It is also not always possible for a sender to
effectively sense the line during its transmission • 10Base-T
since the strength of the transmitted signal may –– It operates at 10 Mbps and governed by
be so strong as to swamp any signal returned IEEE 802.3 standard.
back. Often CSMA/CD algorithms require that • Fast Ethernet (100Base-T)
each user which detects a collision transmit a –– It operates at 100 Mbps and uses twisted
short jamming signal to immediately inform all pair cables.
other users that a collision has occurred on the • Gigabit Ethernet
line. The transmission channel for the CDMA/ –– It operates at 1 Gbps and uses fiber-optic
CD may be slotted or unslotted irrespective of the cable.
variations in the protocols. • 10 Gbps Ethernet
–– This is the latest development of Ethernet
Example 4.4 models. It uses fiber-optic cable and is
A networking system using CSMA/CD has a band- developed to meet the increasing band-
width of 15 Mbps. Suppose the maximum propaga- width needs of LAN demands.
tion time including the delays in the devices and • Wireless Ethernet
ignoring the time needed to send a jamming signal
is 20 μs, what is minimum size of the frame? –– It operates at 2.4 Gbps and is governed by
the IEEE 802.11 standard.
Solution:
Let Tp = 20 μs and let the size of the band- 4.3.4 CSMA/CA
width = 15 Mbps.
Therefore, the transmission time for the frame In Carrier Sense Multiple Access with Collision
is Tfr = 2 × Tp = 40 μs. This implies that a station Avoidance (CSMA/CA), if the station finds the
needs to transmit in the worst-case scenario for a channel busy, it does not restart the timer of the
period of 40 μs to detect the collision. In calculat- contention window; it stops the timer and restarts
46 4 Local Area Networks
it when the channel becomes idle. Similar to 4.4.1 Token Ring-Based Access
CSMA, instead of sending packets, control
frames are exchanged. The sender sends an RTS A frame, called a token, travels around the ring
= request to send, the receiver sends a CTS = and stops at each node as shown in Fig. 4.4. If the
clear to send frame, actual DATA = actual packet node wants to transmit data, it adds that data and
is sent, sender transmits the data, and receiver the addressing information to the frame. The
responds with an ACK = acknowledgement advantage of using this method is that there are
frame, ensuring reliable transmission. As part ofno collisions of data packets. When there is a
the advantages of the CSMA/CA, small control single ring, all the devices on the network share a
frames lessen the cost of collisions (when data is
single cable, and the data travels in one direction
large), and RTS and CTS frames provide “vir- only as shown in Fig. 4.4. When there are dual
tual” carrier sense which protects against hiddenrings, two rings allow data to be sent in both
terminal collisions (where terminal A cannot heardirections. This helps to create redundancy (fault
terminal B). However, as part of the disadvan- tolerance), meaning that in the event of a failure
tages of the CSMA/CA, it is not as efficient as of one ring, data will still be transmitted on the
CSMA/CD. It is used by 802.11 wireless LANs. other ring. The token ring-based access technique
is governed by the IEEE 802.5 standard.
Cambridge Ring that was developed at the
4.4 Controlled Access University of Cambridge is an example of a token
ring.
There are two main access control techniques The token-based controlled access is used in
that exit for computers to communicate with each ring network topologies (token ring) as shown in
other over the network. They are token ring- Fig. 4.4. In this case, each computer in the net-
based access and token bus-based access. work can only transmit its data if it has the token.
4.4 Controlled Access 47
only, and when there are dual rings, two contention window; it stops the timer and
rings allow data to be sent in both restarts it when the channel becomes idle.
directions. (a) True
12. Ethernet is the most pervasive network
(b) False
access method in use today. It is the most 4.7 The Carrier Sense Multiple Access/
commonly implemented media access Collision Detection (CSMA/CD) is not the
method in LANs. part of the control access protocol that is
13. The token-based controlled access is used in usually used in a bus topology.
a ring network topologies (token ring). (a) True
14. The token bus was created by IBM to con- (b) False
nect their terminals to IBM mainframes. 4.8 Ethernet can provide speeds in the range of:
(a) 1 Mbps to 10 Gbps
(b) 5 Mbps to 10 Gbps
Review Questions (c) 15 Mbps to 10 Gbps
(d) 10 Mbps to 10 Gbps
4.1 Local area network (LAN) is typically a 4.9 Token bus networks are seen as somewhat
group of data communication networks or a unreliable and difficult to expand and
group of computers and other necessary upgrade.
devices that are connected within the same (a) True
location/space. (b) False
(a) True 4.10 In a star topology,
(b) False (a) Computers are not connected to one
4.2 Examples of the random access protocols another but are all not connected to a cen-
include the following: tral hub or switch.
(a) ALOHA (b) Computers are connected to one
(b) Carrier Sense Multiple Access another but are all connected to a central
(CSMA) hub or switch.
(c) Carrier Sense Multiple Access/ (c) Computers are not connected to one
Collision Detection (CSMA/CD) another but are all connected to a central
(d) Carrier Sense Multiple Access with hub or switch.
Collision Avoidance (CSMA/CA) (d) Computers are connected to one
(e) All of the above another but are all not connected to a cen-
4.3 ALOHA is not highly decentralized and tral hub or switch.
slots are not normally synchronized.
(a) True Answer: 4.1 a, 4.2 e, 4.3 b, 4.4 d, 4.5 c, 4.6 a, 4.7
(b) False b, 4.8 d, 4.9 a, 4.10 c
4.4 In CSMA protocol, the following:
(a) 1-persistent CSMA
(b) Non-persistent CSMA Problems
(c) p-persistent CSMA
(d) All of the above 4.1 (a) What do you understand by random
4.5 CSMA/CD is governed by access relative to a LAN? (b) Describe
(a) IEEE 802.2 standard briefly random access in a LAN.
(b) IEEE 802.4 standard 4.2 Suppose you have three stations that have
(c) IEEE 802.3 standard packets to send. Each slot transmits with a
(d) IEEE 802.1 standard probability of .25. What is the maximum
4.6 In CSMA/CA, if the station finds the chan- probability of achieving a successful (S)
nel busy, it does not restart the timer of the transmission?
4.4 Controlled Access 49
4.3 Describe briefly Carrier Sense Multiple 4.13 Mention the characteristics of a star
Access (CSMA) protocol in a random topology.
access LAN. 4.14 What are the advantages of a star
4.4 A networking system using CSMA/CD topology?
has a bandwidth of 30 Mbps. Suppose the 4.15 What are the disadvantages of a star
maximum propagation time including the topology?
delays in the devices and ignoring the 4.16 What are the advantages of the bus LAN
time needed to send a jamming signal is topology?
40 μs, what is minimum size of the 4.17 What are the disadvantages of the bus LAN
frame? topology?
4.5 Describe briefly Carrier Sense Multiple 4.18 What are the advantages of the token ring
Access with Collision Avoidance (CSMA/ topology?
CA). 4.19 What are the disadvantages of the bus LAN
4.6 What is a token ring? topology?
4.7 Describe briefly the different types of 4.20 What are the advantages of the LAN tree
Ethernet LAN. topology?
4.8 Mention some of the characteristics of a 4.21 What are the disadvantages of the LAN tree
star topology in a LAN. topology?
4.9 What are the characteristics of a LAN? 4.22 A slotted ALOHA channel has an average
4.10 Why is Ethernet the most popular LAN? 20% of the slots idle.
(Include the answer in the next) (a) What is the offered traffic G?
4.11 Describe the token passing scheme in token (b) What is the throughput?
ring. (c) Is the channel overloaded or
4.12 What are the limitations of star LAN? underloaded?
The Internet
5
The Internet is a testament to a connected system that works – it’s a global network where
any computer can reach another, and easily transfer information across.
John Collison
Abstract Keywords
This chapter discusses the Internet, which is Internet protocol · Internet protocol · TCP/IP
a global system of interconnected computer protocols · Emailing · File transfer · Remote
networks that use the Internet protocol suite login · Web browsing
to link devices worldwide. The Internet is a
widespread information infrastructure, which
is often called the information superhighway. 5.1 Introduction
Typically, the Internet uses TCP/IP protocols
in combination with other devices such as The Internet is a global system of interconnected
routers, switches, modem, and firewalls. computer networks that use the Internet protocol
TCT/IP provides users with services such as suite to link devices worldwide. It may also be
emailing, file transfer, remote login, and web regarded as a network of networks consisting of
browsing. The Internet has made a tremen- private, public, academic, business, and govern-
dously impact on our culture, commerce, ment networks. The Internet is a combination of
education, and government. It’s applications networks, including the ARPANET, NSFnet,
include Internet telephony, Internet radio, regional networks such as NYsernet, local net-
The Internet is a global network (or wide area network) comprising several
interconnected autonomous networks.
The Internet today is a widespread information rules known as protocols. A protocol is roughly a
infrastructure, which is often called the informa- set of rules for communication. The core technol-
tion superhighway. Any computer connected to the ogy supporting the Internet is called Transmission
Internet is regarded as a host. Internet service pro- Control Protocol/Internet Protocol, or TCP/IP.
viders (ISPs) provide the end system access to the TCP/IP was developed by Vinton Cerf (the father
Internet. The ease of access provided by the of the Internet) along with his colleague Robert
Internet has shrunk our world, opened interna- Kahn. Typically, the Internet uses TCP/IP proto-
tional borders, and allowed people to share infor- cols in combination with other devices such as
mation in an unprecedented way. Businesses of routers, switches, modem, and firewalls. Using
every size and kind, education systems, govern- OSI terminology, TCP is a layer 4 protocol, while
ments, and organizations embrace the Internet as a IP is a layer 3 protocol. All computers connected
means of sharing information and resources, con- to the Internet run IP software; most of them also
ducting commerce, and engaging socially. run TCP software.
In this chapter, we first introduce TCP/IP pro- As shown in Fig. 5.1, TCP/IP is a layered set
tocols and IP addresses. We consider some spe- of protocols. Internet applications generally use
cific Internet applications and services. We four layers: application layer, transport layer,
discuss important issues facing the Internet: pri- Internet layer, and network layer.
vacy, security, and safety. We finally cover the
next-generation Internet (IPv6) and Internet2, • Application layer: This is where the end users
which is the future of Internet. interact with the Internet. Application pro-
grams that use the Internet reside here. Appli-
cation programs implementing TCT/IP
5.2 Protocol Suite provide users with services such as emailing,
file transfer, remote login, and web browsing.
The popularity of the Internet gained momentum • Transport layer: This layer provides end-to-
with the advent of the World Wide Web in 1991. end services that are independent of the struc-
The next technological step was when mobile ture of user data. In the Internet, there are two
devices were able to connect to the Internet. Like transport protocols: TCP and UDP. TCP
LANs, the Internet is a packet-switching network. (Transmission Control Protocol) is connection
The data or information is divided into packets with oriented, and each session begins with a con-
headers containing source and destination addresses. nection setup procedure (the so-called three-
way handshake). It provides services needed
5.2.1 TCP/IP Protocols by many applications. TCP breaks data into
packets or provides segmentation of long mes-
All computers connected to the Internet do not sages. It is also responsible for performing
speak the same language, but if they are going to congestion control. UDP (User Datagram Pro-
be networked, they must share a common set of tocol) provides connectionless services. Since
Fig. 5.1 Internet
protocol architecture.
(Source: “Transmission
Control Protocol – TCP,”
https://www.wallarm.
com/what/
transmission-control-
protocol-tcp)
5.2 Protocol Suite 53
the overhead of establishing a connection is header is 20 bytes long and with options can be
eliminated, data can be transmitted faster significantly longer. The header format is shown
using UDP. However, there is no flow control in Fig. 5.2 and explained as follows.
and no negative acknowledgment of damaged
packets. • Version (4 bits): This is always 4 for IPv4.
• Internet layer: This layer is responsible for • IHL (4 bits): The Internet Header Length
addressing and routing of data. It breaks up (IHL) field specifies the length of the header,
large messages and reassembles them at the in 32-bit words. The minimum value for this
destination. It creates a data unit called a data- field is 5 (indicating a length of 5 × 32 bits =
gram. The Internet protocol (IP) moves data- 20 bytes), while the maximum value is 15
grams from one host to another using various words (15 × 32 bits = 60 bytes).
routing techniques and routers. It is an unreli- • DSCP (6 bits): Differentiated Services Code
able, connectionless protocol. IP contains four Point (DSCP) is the type of service. New tech-
supporting protocols: ARP, RARP, ICMP, and nologies such as VOIP are emerging that
IGMP. Address resolution protocol (ARP) is require real-time data streaming and therefore
responsible for determining the address of make use of the DSCP field.
each device on the network from its IP address. • ECN (2bits): Explicit Congestion Notification
• Network layer: This is the lowest component field allows end-to-end notification of network
layer of the Internet protocols. As TCP/IP is congestion without dropping packets.
designed to be hardware independent, TCP/IP • Total length (16 bits): This field defines the
may be implemented on top of virtually any entire packet size in bytes, including header
hardware networking technology. Protocols at and data. The minimum size is 20 bytes
this layer manage the specific physical medium. (header without data), and the maximum is
65,535 bytes.
TCP/IP is an agreed upon standard for com- • Identification (16 bits): This field is used for
puter communication over the Internet. The pro- uniquely identifying the group of fragments of
tocols are implemented in software that runs on a single IP datagram.
each node. The Internet Protocol (IP) can be • Flags (3 bits): A 3-bit field is used to control
regarded as the common thread that holds the or identify fragments.
entire Internet together. It is responsible for mov- • Fragment offset (13 bits): The fragment offset
ing datagrams from one host to another, using field is measured in units of 8-byte blocks. It is
various techniques (or “routing” algorithms). 13 bits long and specifies the offset of a par-
An IP packet/datagram consists of a header ticular fragment relative to the beginning of
followed by data (or payload). At a minimum, the the original unfragmented IP datagram. The
first fragment has an offset of zero. This allows Table 5.1 Internet domains
a maximum offset of (213 – 1) × 8 = 65,528 Domain Meaning
bytes, which would exceed the maximum IP com Commercial institution
packet length of 65,535 bytes with the header cdu Educational institution
length included (65,528 + 20 = 65,548 bytes). gov Government
int International organizations
• Time To Live (TTL) (8 bits): This field (speci-
mil US military
fied in seconds) helps prevent datagrams from
net Network service provider
wandering on the Internet. When the TTL org Nonprofit organization
field hits zero, the router discards the packet. tv Television channel
• Protocol (8 bits): This field defines the proto- ca Canada
col used in the data portion of the IP packet. uk United Kingdom
• Header Checksum (16 bits): This field repre- us USA
sents a value that is calculated using an algo-
rithm covering all the fields in header. This
field is used to check the integrity of an IP • African Network Information Center
datagram. (AfriNIC) for Africa
• Source address (32 bits): This field specifies • American Registry for Internet Numbers
the IP address of the sender of the packet. (ARIN) for North America
• Destination address (32 bits): This field speci- • Asia-Pacific Network Information Centre
fies the IP of the intended receiver of the (APNIC) for Asia and the Pacific region
packet. • Latin American and Caribbean Internet
• Options: The options (variable length) field is Addresses Registry (LACNIC) for Latin
not often used. This field represents a list of America and the Caribbean region
options that are active for a particular IP data- • Réseaux IP Européens–Network Coordina-
gram. Options include security, record route, tion Centre (RIPE NCC) for Europe, the Mid-
and time stamp. If the option values are not a dle East, and Central Asia
multiple of 32 bits, 0s are added or padded to
ensure this field contains a multiple of 32 bits. Currently, the IPv4 protocol identifies each
node through a 4-byte address. IP addresses are
usually written as a sequence of four numbers
5.2.2 IP Address separated by three dots such as NNN.NNN.HHH.
HHH, where N stands for octets that identify net-
For IP to work, every computer must have its own work and H denotes octets that specify the host.
number to identify itself. This number is called This is known as dotted decimal notation. Each
the IP address. We all know that computers like number can be between 0 and 255 except the last
to work with numbers, and humans prefer names. number which must be between 1 and 254.
With this in mind, the designers of the Internet Typical IP addresses are 127.0.1.53 and
have set up a system to give names to computers 182.30.9.22. Let us break down the IP address
on the Internet. A domain name system (DNS) “182.30.9.22” in Table 5.2. Table 5.3 presents
server is a computer somewhere that can change some IP addresses and their DNS (domain name
a hostname into an IP address and vice versa. system) names.
Domain names usually end with names in There are five classes of available IP ranges:
Table 5.1. In the DNS naming of computers, class A, class B, class C, class D, and class
there is a hierarchy of names as illustrated in E. Each class allows for a range of valid IP
Fig. 5.3. addresses, as shown in Table 5.4.
To avoid addressing conflicts, IP addresses are Table 5.5 provides a list of valid and invalid IP
assigned by the five regional Internet registries addresses.
(RIRs) as shown in Fig. 5.4:
Fig. 5.3 DNS hierarchy. (Source: McDysan, 2000, p. 173)
Fig. 5.4 The five regional internet registries. (Source: “Regional Internet registry,” Wikipedia, the free encyclopedia, https://
en.wikipedia.org/wiki/Regional_Internet_registry)
Table 5.5 Examples of valid and invalid IP addresses 5.2.3 Internet Services
IP number Valid?
2.3.4.5.6 No Application programs implementing TCT/IP pro-
6.6.6.6 Yes vides users with services such as emailing, file
11.32.4.0 No transfer, remote login, and web browsing.
5.300.24.50 No
255.255.255.255 Yes
• Electronic mail: Email (or computer-mediated
125.284.40 No
132.108.111.86 Yes
communication) is perhaps the most prevalent
application of the Internet. It allows people to
write back and forth without worrying about
As the number of computers on a network the cost. It uses a store-and-forward model to
grows, network traffic grows, decreasing network exchange messages. SMTP (simple mail
performance. In such a situation, you would transfer service) allows a user to send mes-
divide the network into different subnetworks sages to users on other computers. Emailing is
and minimize the traffic across the different sub- fast, convenient, and free.
networks. To divide a given network address into • File transfer: FTP (file transfer protocol)
two or more subnets, you use subnet masks. Class allows a user to transfer files to and from com-
A, B, and C networks have default masks, also puters that are connected to the Internet. FTP
known as natural masks, as follows: is used to copy or transfer files in real time
Class A: 255.0.0.0 from one system to another across the net-
Class B: 255.255.0.0 work. It is interactive; the FTP application
Class C: 255.255.255.0 accepts commands from the user and responds
The subnet mask is used by the TCP/IP protocol to each. Security is handled by requiring the
to determine whether a host is on the local subnet user to specify a user name and password for
or on a remote network. An IP address on a class the other computer.
A network that has not been subnetted would • Remote login: TELNET (network terminal
have an address/mask pair: 8.20.15.5 255.0.0.0. protocol for remote login) allows a user to
In order to see how the mask helps you identify access or log on to and use other computers
the network and node parts of the address, con- that are connected to the Internet regardless of
vert the address and mask to binary numbers. their location. It allows you to enter com-
8.20.15.5 = mands into a remote computer just as if you
00001000.00010100.00001111.00000101 are entering commands at your own
255.0.0.0 = 11111111.00000000.00000000.0000 computer.
0000 • World Wide Web (WWW): The WWW (or the
From this, any address bits which have corre- web) incorporates all of the Internet services.
sponding mask bits set to 1 represent the network The current foundation on which the WWW
ID. Any address bits that have corresponding functions is the programming language called
mask bits set to 0 represent the node ID. HTML (HyperText Markup Language). The
Hypertext Transfer Protocol (HTTP) is a
8.20.15.5 = 00001000.00010100.00001111.00000101
255.0.0.0 = 11111111.00000000.00000000.00000000
-----------------------------------
net id | host id
netid = 00001000 = 8
hostid = 00010100.00001111.00000101 = 20.15.5
5.3 Internet Applications 57
TCP/IP protocol that is used to access a WWW address) to a physical address like an Ethernet
or HTML documents or pages. A Web page is address (also named a MAC address). ARP
created by typing HTML tags. The eXtensible was defined by RFC 826 in 1982 as a critical
Markup Language (XML) is for structuring function in the Internet protocol suite.
web-based documents. It allows storing and
exchanging data across different applications
and operating systems. It complements 5.3 Internet Applications
HTML, which focuses on how to display
documents. Potentialities offered by the Internet make possi-
ble the development of a huge number of applica-
In addition to these services, we also have the fol- tions and services. The Internet has made a
lowing standard application protocols as part of tremendously impact on our culture, commerce,
the TCP/IP protocol suite: education, and government. It’s applications
include Internet telephony, Internet radio, Internet
• DNS (domain name system): This translates a television, manufacturing, social networking,
human name to an IP address (forward DNS) entertainment, gamification, education,
or an IP address to a domain name (reverse e-commerce, stock trading, digital libraries, geo-
DNS). DNS allows users to work with much graphic information systems, and government.
more simple symbolic names. The address is We will consider some of these applications.
obtained by looking it up in the DNS, a dis-
tributed database containing name-address
mappings for each Internet domain name. For 5.3.1 VOIP
example, 198.137.240.91 is the IP address for
www.whitehouse.gov BIND (Berkeley Inter- Voice over Internet Protocol (VOIP) or Internet
net Name Domain) is by far the most widely telephony is one of the most prominent telecom-
used DNS software on the Internet. munication services based on the Internet
• RTP (Real-Time Protocol): This is a real-time Protocol (IP). It is a technology that allows com-
transport protocol for multiple applications munication of voice over the public Internet,
such as voice over IP, Internet radio, Internet rather than via the public switched telephone net-
TV, videoconferencing, and other multimedia work (PSTN). It enables the real-time transmis-
applications. It defines a standardized packet sion of voice signals as packetized data over “IP
format for delivering audio and video over the networks” that employ the Transmission Control
Internet. The RTP is a simple protocol that Protocol (TCP), Real-Time Transport Protocol
runs on top of UDP and therefore has “best (RTP), User Datagram Protocol (UDP), and
effort” delivery. It is specified by IETF in RFC Internet Protocol (IP) suite.
3550 and RFC 3551.
Voice over IP is a phone service over the public Internet.
• RTCP (Real-time Transport Control Proto-
col): This is primarily used for collecting data This technology converts analog voice signals
on the efficiency and quality of the connec- into digital packets of information. These
tion. The RTCP messages travel on the same packets are transmitted over the Internet,
route as RTP and report information such as allowing for conversations to take place any-
latency, jitter, and packet loss. where in the world. A typical VoIP configura-
• ARP (Address Resolution Protocol): This fig- tion is shown in Fig. 5.5. A VOIP network
ures out the unique address of devices on the consists of a switched LAN infrastructure
network from their IP addresses. It is used for with WAN links between its main campuses.
mapping a network address (e.g., an IPv4 Perhaps the most important component in a
58 5 The Internet
VOIP system is the gateway. The task of a transmission (loss of service during outages).
gateway is to sit at the border of two different Providers of VOIP services, such as Skype,
types of network and help them communi- Google Talk, Facebook Messenger, and
cate. It is responsible for translating the infor- WhatsApp, offer the benefit of free calls.
mation into a format that each network can These service providers see VOIP technology
understand. The network generally requires at as a means of reducing their cost of offering
least one C. VoIP “gateways” provide the existing voice-based services and new multi-
bridge between the local PSTN and the IP media services. They have designed voice
network for both the originating and terminat- calls with the quality of the call not an issue.
ing sides of a call. To support standard tele- QoS (quality of service) is important for
phony signaling, the gateways must employ a IP-based multimedia services. The signal
common protocol such as the H.323 or a pro- quality of the VoIP system depends on several
prietary protocol. H.323 is an ITU recom- factors such as delay, jitter, packet loss, net-
mendation for multimedia communication working conditions, coding processes, and
over LANs. This standard is for point-to-point error correction schemes. The quality of VoIP
communications as well as multipoint confer- can be significantly improved by using proper
ences. It includes many protocols that provide codec.
call setup, call forwarding, management, and Although VOIP promises inclusion, innova-
authorization as well as the transmission of tion, and growth, it also brings some challenges.
data, voice, and video over a telephone call. VoIP is not easy to secure due its interconnection
The IEFT has defined the Session Initiation to the PSTN. Unlike PSTN, there is no central
Protocol (SIP) which operates at the applica- entity responsible for the design, implementa-
tion layer and provides services such as call tion, and monitoring of the voice services. VOIP
forwarding and signaling. The majority of the lacks quality of service. Noisy lines and delays
VoIP deployments use RTP (real-time proto- tend to frustrate users.
col) for actual media transport since voice
conversation is a real-time activity and no lag
can be tolerated. 5.3.2 Social Networking
There are two major reasons for using
VOIP: lower cost and increased functionality. Social networks constitute the greatest global
VoIP has become a key enabling technology information platform on the Internet today. They
for multimedia communication on the IP net- have become an indispensable part of our daily
work. It is being deployed rapidly. Major dis- lives as people spend more time socializing on
advantages are latency and unreliable the Internet.
5.3 Internet Applications 59
schedule, course catalog, financial aid, pay- MOOCs are offered in many areas such engi-
ment, transcript, and award of certification. neering, computer science, finance, business,
• Electronic lectures: Online education consists education, health sciences, criminal justice,
of virtual lectures, virtual tutorials, and virtual cybersecurity, IT, psychology, archeology, legal
exams. It provides learning and education in studies, and nursing. The main requirement is a
the form of online courses through the Internet computer system and Internet connectivity
and multimedia technology. Electronic lec- (cable, wireless, DSL, etc.).
tures used in distance education can be syn- Traditional education is facing a lot of chal-
chronous lectures or asynchronous lectures. lenges—becoming more expensive, shortage of
They are used in presenting materials and can professors, cut in funding, busy classrooms,
be transmitted through the Internet, cable, or course shortages, limited infrastructures, etc.
satellite. Online education can solve some of these issues.
• Digital library: Students need access to digital It is scalable and less expensive. It allows stu-
libraries to obtain information. The resources dents to work on the course anywhere there is
that the digital libraries should provide include Internet connection. There is no discrimination
e-books, e-courses, e-journals, databases, and among students on the basis of race, sex, religion,
interlibrary loan services. and nationality.
barriers to time or distance, easier and more con- tication scheme, and encryption. More about
venient to run a business, and increase of profits. security will be discussed in Chap. 11.
Other benefits include around-the-clock avail-
ability, easy and convenient accessibility, speed
of access, wider selection of products and ser- 5.3.5 Government
vices, and international reach.
Common applications related to e-commerce The Internet is the mainstay of modern political
include online shopping, online banking, pay- life. It is making significant changes in all levels
ment systems, electronic air tickets, hotel reser- of government—federal, state, and local. Digital
vation, tourism, and teleconferencing. For government (or networked government) refers to
example, the banking industry has persuaded the use of information technologies such as the
consumers to adopt ATMs, telephone or home Internet and mobile computing to support gov-
banking, and now online banking. The demand ernment operations and provide government ser-
for online banking (also known as electronic vices. Digital government, also known as
banking or Internet banking) has increased e-government, is a global phenomenon whereby
worldwide. Online banking allows customers to public servants leverage information and com-
conduct their banking transactions over the munication technology (ICT) to better serve their
Internet. It supports online bill payment, elec- constituents. ICT applications to government ser-
tronic funds transfer, online shopping, and check- vices can be divided into three broad categories:
book transactions. It also facilitates e-society and providing access to information, transaction ser-
e-commerce particularly online shopping and vices, and citizen participation. The ICT includes
online sales. Today online banking is a global the Internet (and associated technologies such as
phenomenon. It will continue to facilitate email, the WWW, and social networking) and
e-commerce and serve as a strong catalyst for communication technologies such as mobile
economic development. computing, cell phones, and global positioning
To start an online business, one must find a systems.
niche product that consumers cannot easily find
The digital government seeks to enable people to access government information and
services anywhere, anytime, on any device.
in traditional stores. Basic elements required to Contemporary democracy is being facilitated and
run a business online are e-commerce software, a empowered by the Internet. It has influenced
payment processing service, and a merchant voting and induced social changes, unrest,
account. The e-commerce software enables one uprisings, and revolutions all over the world.
to build and maintain websites and associated It will make government to be more account-
databases that contain products and prices. Most able and enable citizens to exercise freedom
online purchases are paid by credit cards, smart of speech. It also helps to engage people in the
cards, electronic cash, or through a third-party democratic process and to get the younger
such as PayPal. The merchant account refers to generations involved in politics. It also enables
the business account into which the money from the government to inform, involve, connect,
credit card purchases is deposited. In the USA, and mobilize citizens through the Internet.
delivery companies such as UPS and FedEx pro- Demand for accurate election process has led
vide door-to-door services to consumers. governments worldwide to adopt electronic vot-
The security risks involved in e-commerce ing. This is the next stage in the evolution of
have been a major concern. E-commerce pro- democracy and part of the digital government ini-
vides security defenses such as firewalls, authen- tiatives. Electronic voting (EV) systems are being
62 5 The Internet
Software for computer surveillance includes intended users. These can prevent the user
spyware and adware, which reside on your com- from accessing email, websites, online
puter and work like electronic spies. accounts, or other services.
• Social engineering attacks: A cybercriminal
attempts to trick users to disclose sensitive
5.4.2 Security information. A social engineer aims to con-
vince a user through impersonation to disclose
Although the Internet brings immeasurable secrets such as passwords, card numbers, or
opportunities, it also brings new risks. Because of social security number.
its fast, cheap, and anonymous character, the • Man-in-the-middle attack: This is a cyberat-
Internet has become a place for various attacks tack where a malicious attacker secretly
and criminal activities. By nature, cyberspace or inserts him/herself into a conversation between
the Internet is difficult to secure. Intruders exploit two parties who believe they are directly com-
the vulnerabilities to steal information and money municating with each other. A common exam-
and perpetrate crimes. The crimes include child ple of man-in-the-middle attacks is
pornography, banking and financial fraud, and eavesdropping. The goal of such an attack is to
intellectual property violations. They may also steal personal information.
include accessing government and defense confi-
dential information, tampering with commer- Cybersecurity involves reducing the risk of
cially sensitive data, and targeting supply chains. cyberattacks. It involves the collection of tools,
IPv6 is the next generation protocol designed to solve IPv4 address depletion problem.
People are looking toward IPv6, with its 2128 pos- • Hop limit (8 bits): Replaces the time to live
sible addresses, as the solution. IPv6 is field of IPv4. This value is decremented by
designed to support a global public Internet one at each intermediate node visited by the
and has an address space of 128 bits, allowing packet. The packet is discarded when the
for more than 340 undecillion (10^36) unique counter reaches 0. This field is used to stop
IPv6 addresses (340,282,366,920,938,463,46 packet from looping in the network infinitely.
3,374,607,431,768,211,456 to be exact!). All • Source address (128 bits): The IPv6 address
future Internet growth will be over IPv6. of the sending node.
The main features of IPv6 include: • Destination address (128 bits): The IPv6
address of the destination node(s).
66 5 The Internet
For more details, please see RFC 2460–IPv6 see no compelling need for it. An important step
Specification. has been made by the US government regarding
IPv6 addresses are 128 bits in length and are the transition to IPv6 for all governmental web-
made up of hexadecimal characters. They are sites in the USA by the end of 2012. Companies
expressed as a series of 8 4-character hexadeci- like Comcast, AT&T, and Time Warner Cable
mal numbers, which represent 16 bits each (for a made the transition to IPv6. Facebook is an
total of 128 bits). For examples the IPv6 addresses example of an organization which ran out of RFC
are: 1918 addresses and has implemented an IPv6
2001:E10:C41:49:00C5:281F:44A8:80BD solution.
1201:DB8:85A3:0:0:8A2E:370:2134 IPv6 adoption has been slow because IPv6 is
2601:2C3:8580:7A10:25B5:5F03:0000:441C not generally compatible with IPv4 networks. As
We notice that these addresses are large and not a result, a number of transition technologies use
easy to work with. One or more consecutive tunneling to facilitate cross network compatibil-
groups of zero value may be replaced with a sin- ity. To perform transition from IPv4 to IPv6, tun-
gle empty group using two consecutive colons neling is used as a transition strategy, as shown in
(::). Thus, the second address can be further Fig. 5.7. Tunneling is used to connect two IPv6
simplified: nodes using IPv4 network. It encapsulates pack-
2001:DB8:85A3::8A2E:370:2134 ets of one protocol onto another. It is expected
IPv6 addresses are classified into three types that IPv4 and IPv6 will coexist for a while and
as unicast addressing, anycast addressing, and that IPv6 tunnels play a key role in the transient
multicast addressing. A unicast (one-to-one) phase.
address identifies a single network interface. An
anycast (one-to-nearest) address is assigned to a
group of interfaces, usually belonging to differ- 5.5.2 Internet2
ent nodes. Almost any unicast address can be
employed as an anycast address. A multicast The current, original Internet (now referred to as
(one-to-many) address is also used by multiple Internet1) was not designed to handle applica-
hosts. IPv6 does not implement broadcast tions such as online education, e-commerce, and
addressing; it is replaced by multicast addressing. interactive multimedia. Applications such as vid-
DNS is still used in IPv6 (Fig. 5.6). eoconferencing, uncompressed HDTV, gigabit
IPv6 has experienced a slow deployment and data set sharing, weather forecasting, satellite
is still perceived as experimental by some. Many imaging, telemedicine, and remote vision require
organizations and Internet stakeholders are not high bandwidth and real-time response. The defi-
enthusiastic in implementing IPv6 because they ciencies in Internet1 (such as congestion and reli-
Fig. 5.7 Tunneling
ability, limited IP addresses, limited bandwidth) network will not solve all the problems of
have frustrated millions of users. As a result, Internet1. Internet2 is still evolving. It has part-
Internet2 was created in 1996 by the research and ners in Europe, Africa, Asia, and Middle East
education community to serve its advanced net- with the goal of connecting research communi-
working needs and meet its bandwidth-intensive ties around the globe. For more information on
requirements. The idea of Internet2 was initiated Internet2, see http://www.internet2.edu.
by 34 US universities collaborating with govern-
ment and industry. Internet2 now “serves more Summary
than 90,000 community anchor institutions, 305 1. The Internet is a global “network of networks”
U.S. universities, 70 government agencies, 42 of autonomous networks that support commu-
regional and state education networks, 84 leading nication and collaboration among users. It is
corporations working with our community and based on TCP/IP protocol suite.
more than 65 national research and education 2. A protocol is a set of rules and procedures fol-
networking partners representing more than 100 lowed by two or more computers in
countries.” communicating.
was created to serve Internet’s advanced net- 5.10. Internet2 is designed to solve the following
working needs and meet its bandwidth- problems except:
intensive requirements. (a) Limited IP addresses (b) Limited
bandwidth (c) Congestion and reli-
Review Questions ability (d) Connecting regional and
5.1. Which of the following switching methods global communities
is used by the Internet? Answer: 5.1 a, 5.2 d, 5.3 c, 5.4 c, 5.5 a, 5.6 a, 5.7
(a) Packet switching (b) Circuit switch- b, 5.8 d, 5.9 d, 5.10 d
ing (c) Cable switching (d) Trans-
mission switching Problems
5.2. Internet supports message exchange 5.1. Write about two individuals who played
between users through a mechanism called: key roles in the development of the
(a) Gateway (b) Interfaces (c) Lay- Internet.
ers (d) Protocols 5.2. Describe the responsibilities of the four
5.3. Which protocol provides a connectionless layers in the Internet protocol stack.
service? 5.3. Why is Internet regarded as a “network of
(a) IP (b) TCP (c) UDP networks”?
5.4. APNIC is responsible for allocating IP 5.4. What is the major difference between TCP
addresses for: and UDP?
(a) Africa (b) America (c) Asia and the 5.5. Explain fields IHL, DSCP, ECN, and TTL
Pacific region (d) Latin America and of an IP header format.
the Caribbean region (e) Europe, 5.6. Convert the following IP addresses in
Middle East, and Central Asia binary to decimal.
5.5. Which of the following is not true? (a) 10000010 01110101 00110011 1
(a) The Internet is a specific piece of hard- 1110001
ware and software. (b) 11111110 01010101 00000000 1
(b) The Internet is not the same 1001100
everywhere. 5.7. What is the class of each of the following
(c) The Internet is not restricted to educa- IP addresses?
tional, noncommercial uses. (a) 244.35.36.1
(d) The Internet is a medium for communi- (b) 87.100.5.105
cating with others. (c) 232.46.55.111
(e) The Internet is flexible in cost. (d) 190.205.0.10
5.6. Only classes A, B, and C of IP addresses 5.8. Specify which class each of the following
are commonly used. IP addresses belongs.
(a) True (b) False (a) 10000010 01110101 00110011 1
5.7. The IP address 152.116.24.100 belongs to: 1110001
(a) Class A (b) Class B (c) Class C (d) (b) 11100010 01110000 00100010 1
Class D (e) Class E 0000001
5.8. The most popular Internet service for com- (c) 01000011 00001010 10011001 1
mercial purposes is: 0001110
(a) Email (b) Telnet (c) FTP (d) (d) 11010011 00001000 11000011 0
WWW 0010100
5.9. IPv6 does not support the following 5.9. Discuss three Internet services.
addressing. 5.10. Discuss the following protocols: RTP,
(a) Unicast addressing (b) Anycast RTCP, and ARP.
addressing (c) Multicast address- 5.11. What is VOIP? What are its major
ing (d) Broadcast addressing benefits?
5.5 Future Internet 69
5 .12. What is a VOIP gateway responsible for? 5.22. Discuss the following fields of IPv6 header
5.13. What are the major services online educa- format: flow label, payload length, and
tion must provide? next header.
5.14. What is Massive Online Open Course
5.23. Discuss the three types of IPv6 addresses.
(MOOC)? 5.24. Discuss IPv6.
5.15. What is e-commerce? What advantages
5.25. Simplify the following IPv6 addresses:
does it have over traditional commerce? (a) 0000:0000:0000:0000:349A:2651:000
5.16. Discuss online banking. 0:CB12
5.17. In what ways has the Internet impacted (b) 6127:0000:0000:0000:9010:0024:FA1
modern political life? 1:DE28
5.18. Explain the concept of open government. (c) 0023:0000:0000:72FC:0000:0000:390
5.19. Discuss IPSec. 0:AD41
5.20. Discuss three cyberattacks or threats. 5.26. What is Internet2? Who will benefit from
5.21. What are the built-in advantages of IPv6 it?
over IPv4?
Intranets and Extranets
6
Major power and telephone grids have long been controlled by computer networks, but
now similar systems are embedded in such mundane objects as electric meters, alarm
clocks, home refrigerators and thermostats, video cameras, bathroom scales, and
Christmas-tree lights – all of which are, or soon will be, accessible remotely.
Charles C. Mann
Abstract
intranets). The earliest intranets came into being
during the 1990s. The term “intranet” was coined
This chapter cover intranets and extranets as toward the end of 1995. Since 1997, more than
two of the growing applications of the Internet. nine out of ten major companies have imple-
An intranet is a closed or restricted network, mented their intranet. The new era of the extranet
only used by those in the company that owns or the third wave of the universal Internet came
it. It uses the same kinds of links, routers, and into being.
protocols as the public Internet, but it is only An intranet is simply a closed or restricted
accessible within the company. An extranet is network, only used by those in the company that
an extension of an intranet. It is the part of the owns it. It uses the same kinds of links, routers,
intranet that outsiders can use. Through and protocols as the public Internet, but it is only
extranets, a company can make only a portion accessible within the company. Campus and cor-
of its intranet accessible to external parties. porate networks are good examples. An intranet
Both intranets and extranets are applied in should be closed to the general public and require
sales, database access, human resources, cus- a login for authorized users.
tomer service, health service, financial ser- Extranets come into the picture because it is
vices, and manufacturing. prudent to extend this efficiency to the outside
world. Through extranets, a company can make
Keywords only a portion of its intranet accessible to exter-
nal parties. For example, a corporate intranet may
Intranets · Extranets · Internet dedicate a number of servers for vendors and
other outsiders. A campus extranet would allow
parents of college students to log in and pay
6.1 Introduction tuition and look at other information. But it
would not give outsiders access to the actual
The Internet is flourishing and Internet connec- intranet. Extranets are still closed to the general
tivity is growing at an exponential rate. A funda- public and require some type of authentication.
mental concept of Intranet, the so-called second The Internet, intranet, and extranet will revolu-
wave, was introduced. Medium- and large-sized tionize how business people, lawyers, educators,
companies use internet features internally (called etc. conduct their businesses and communicate.
Table 6.1 Comparing the characteristics of the Internet, intranet, and extranet
Internet Intranet Extranet
Access Public Public Semi-private
Users Everyone Employees of specific organization Employees of related organizations
Information Fragmented Proprietary Information only for trusted partners
Source: Askelson, 1998
The excitement created by the Internet (a public • E-mail: Communicate within the business,
network) has been transferred to an application share information, and provide feedback.
called intranets. These are private company net- • Directory: Intranets offer a centralized
work, whose users are often the company’s location for hosting vital business
employees. “Intranet” means “internal” or information.
“within,” so an intranet is an internal or private • File sharing: Enable employees to do their
network that can only be accessed within the con- jobs in an increasingly globalized, digital
fines of a company, university, or organization. workplace by connecting employees across
An intranet is connected to the Internet organizations and helping them to thrive.
through one or more firewalls. Components of an Provides job posting and opportunities.
intranet include servers, networks, and web • Collaboration: Enable collaboration and pro-
browsers. An intranet uses HTML to create docu- vide tools that can support employees to work
ments and TCP/IP to transmit data across the net- together irrespective of their department or
work. A typical intranet is shown in Fig. 6.1. location.
• Searches: Provide search engines and directo- limited basis without granting access to the com-
ries for companies handling massive quanti- pany’s entire network. The term “extranet” refers
ties of text documents, e.g., insurance and to an extranet providing various levels of acces-
banking companies. sibility to outsiders. As typically shown in
• Management: Integrate with electronic com- Fig. 6.2, an extranet is basically an intranet that
merce Internet-based sales and process orders, provides password-protected partial access to
e.g., Amazon.com. selected parts of the intranet to authorized outsid-
ers or external users such customers, partners,
The need for intranets has been driven by the and contractors.
An extranet works like an intranet, but also provides controlled access to authorized
customers, vendors, partners, or others outside the organization.
push of technology standards and the pull of As an extended Internet, extranet is a private
organizational need to communicate across geo- business network of several cooperating organi-
graphic barriers. Described as “mini-Internets,” zations located outside the corporate firewall. An
intranets are transforming the way government extranet depends on the existing Internet infra-
and organizations function. They provide a low- structure such as servers, e-mail clients, and web
cost alternative to distributing paper copies of browsers. Extranet users can benefit from SMTP,
documents. HTTP, and MTML like Internet users, but can
Advantages of intranets include the following: only have access to the extranet if they are given
(1) It offers workplace productivity; (2) it allows username and password. Thus, extranets are
communication within the company; (3) it often constructed using the Internet with security
enables companies to share out information to features that restrict access to authorized indi-
employees according to their need or require- viduals. A firewall is used to limit access to a
ments; (4) it saves time and money and increases company’s intranet. The extranet is regarded as
work efficiency since there is no need to maintain the key technology, which can enable develop-
physical documents such as procedure manual, ment of the third wave of electronic commerce
requisition forms, and Internet phone list; (5) it sites.
allows users to access multiple applications and Extranets are commonly used to:
tools from one place, often using a single login;
(6) it is designed to save companies money • Training: Provide online training programs or
through network efficiency, productivity, and other educational material to employees and
mobility; (7) it promotes common corporate cul- resellers.
ture; and (8) it publishes important company’s • Sharing: Share product catalogs and news-
announcements. groups and post jobs.
Disadvantages of intranets include the follow- • Backbone network: Provide an economical
ing: (1) management has no control over specific backbone for enterprise networks.
information, (2) security is a major issue, and (3) • Maintenance: Maintain closer contact with
the cost of implementing and maintaining employees, customers, and suppliers. Maintain
intranets is very high. and enhance existing customer relationship.
Murray Hill), and Microsoft (in Redmond). Other organization. There are different types of portals.
companies with extranets include FedEx, Shell, Intranet web portals provide links to all internal
Cisco, McDonnell Douglas, and Courtyard content providers. Information portals present a
Marriott. Many extranets serve the purpose of uniformed look for access through system login.
showing demos and examples. Surveys, feedback Knowledge portals provide information catalog
forms, FAQs, statistical data, and other forms of and a knowledge repository.
improving an organization’s infrastructure are Advantages of extranets include (1) exchang-
popular among extranets. ing large volumes of data, (2) sharing product
Different types of extranets may be needed catalogs exclusively with trade partners, (3) col-
for different applications. For example, an laborating with other companies and developing
extranet may be needed for high-volume trans- training programs with them, (4) providing ser-
actions or videoconferencing. A retailer extranet vices to other companies, (5) enabling e-business
offers an extranet to supply authorized chain or business-to-business e-commerce, and (6) pro-
partners to facilitate processes such as invoice moting more efficient customer and supplier
payment and reverse logistics. An employee relationships.
extranet allows employees to submit any con- Disadvantages of extranets include the follow-
cerns or recommendations they have without ing: (1) extranets can be expensive to implement
their manager seeing it. since it involves hardware, software, and
Closely associated with intranets and extranets employee training costs; (2) security of extranets
are portals. A portal is a door leading to informa- is a major concern when hosting valuable or pro-
tion areas in an intranet and the Internet. The por- prietary information as well as commercial trans-
tal is an information gateway that adds to the actions such as electronic funds transfer. Security,
unity and consistency that intranets provide an at the network and host levels, becomes critical
6.4 Key Technologies 75
within an extranet. This is why managing access tions are scalable, i.e., they can start small and
control, which involves defining user access priv- grow.
ileges, managing passwords, user IDs, and Three key developments are necessary for
authentication schemes, is at the heart of every implementing intranets and extranets. First,
extranet. there must be the acceptance of widely used
The benefits of extranets (communications, standards for communication across networks.
collaboration, and coordination) far outweigh the Second, there must be the development of com-
initial deployment headaches. A typical applica- pression and decompression techniques to trans-
tion of extranets would be in the data center mit large amounts of data over networks. The
where all of the servers are located. This can be image compression and decompression technol-
easily implemented by creating a virtual private ogy in the form of Joint Photographic Experts
network (VPN) for each department. Many orga- Group (JPEG) compression are a key in imaging
nizations with mature intranets are now con- applications. Third, secure public communica-
nected to the Internet and operate the two tion is a major concern when hosting valuable or
networks as if the components were a single net- proprietary information (extranet), a vital asset.
work, without borders. The advent of extranets is It is not necessary if information is restricted to
revolutionizing supply chain management.. a private network (intranet). Security takes on a
new dimension with extranets since companies
must protect internal systems from unwanted
6.4 Key Technologies visitors.
These core requirements of extranets make
Intranets and extranets are constructed with the them to be open, portable, and interoperable with
same three basic components: computer net- different industry standards across multiple
work or networks, client software, and server platforms.
software. They are related as shown in Fig. 6.3. Both intranets and extranets use web technol-
They are no longer luxuries. They provide infor- ogy. The five key elements that make web tech-
mation in a cost-effective way. Their applica- nology possible and cost-effective include as
Fig. 6.3 Relationship
between the Internet,
Intranet, and Extranet.
(Source: “Difference
between Internet and
Extranet,” November
2020, https://www.
geeksforgeeks.org/
difference-between-
internet-and-extranet/)
76 6 Intranets and Extranets
Steve Jobs
ple devices to communicate with each other. and VPN sites is a through a security device such
Second, it is “virtual” because it is a connection as a firewall.
that has the appearance of a dedicated line but VPN uses tunneling and encryption to do the
occurs over a shared public network. The VPN following:
uses virtual connections, i.e., temporary connec-
tions that have no physical presence. The VPN • It provides privacy by hiding your Internet
creates the illusion of a completely private activity from your Internet service provider
network. Third, it is “private,” meaning that it is (ISP). The ISP cannot see your data because it
only used by the enterprise and is inaccessible to is encrypted.
others. It is also private in the sense that the rout- • It allows one to avoid censorship by govern-
ing and addressing scheme within the network is ment, ISP, company, etc.
totally independent of the routing and addressing • It protects one against hackers when using a
plans of all other networks. It guarantees privacy public Wi-Fi. VPN protects your data using
within the organization and provides limited encryption.
access to only authorized users.
A VPN is designed to create an encrypted tun- A VPN can be used to interconnect two similar
nel between you and your provider. It provides a networks over a dissimilar middle network. It
secure, encrypted tunnel to transmit the data can also be used to securely connect geographi-
between the remote user and the company net- cally separated offices of an organization. VPN
work. It consists of special hardware augmented technology can be used to supplement or replace
with software designed to provide VPN frame relay or leased lines. Most enterprises
functions. supplement their WANs with VPNs.
A virtual private network is a private network running over a public network like the
Internet.
A VPN is designed to provide wide area connec- This chapter covers the main characteristics of
tivity to a company located in multiple sites. It VPN, different types of VPNs, various applica-
secures one’s computer’s Internet connection and tions of VPNs, and the benefits and challenges of
ensures that all of the information one is sending VPNs. The chapter concludes with a summary of
and receiving is encrypted and secured from pry- the items covered in the chapter.
ing eyes. The connectivity between the Internet
7.2 VPN Characteristics 81
7.2 VPN Characteristics Internet. Once you are connected to the VPN,
it is difficult for anyone else to spy on your
VPN characteristics are crucial in selecting an web-browsing activities. Suppose you live in
optimal solution for a given application. VPNs Texas and your VPN provider is based in
have the following characteristics. New York, your traffic will look like you are
connecting from New York. The problem with
Deployment: VPNs can be either remote access that is that if you search for “pizza delivery,”
VPN or site-to-site VPN. Remote access you will get shops that deliver in New York.
VPNs enable employers, business partners, Safety: To ensure safety, VPN users must use
suppliers, and customers to connect to enter- authentication methods to gain access to the
prise network from home or remote location. VPN. Standard network requirements like
Site-to-site VPNs are used to connect branch confidentiality, integrity, and authentication
offices, and they generally supplement or are ensured by the VPN. Confidentiality
replace leased lines or frame relay. Such VPNs ensures that measures are taken to prevent
link two dispersed networks as they might be sensitive information from reaching the wrong
linked by a leased line or a WAN circuit. people. Data secrecy is important especially
Tunneling: Tunneling is a characteristic of all for privacy-sensitive data such as user per-
VPNs. If the data being tunneled gets sonal information and meter readings. Data
encrypted, you have a VPN, as illustrated in integrity means information is authentic and
Fig. 7.2. Some VPN protocols bear the term complete. This assures that data, devices, and
“tunneling,” such as Microsoft’s Point-to- processes are free from tampering. Data
Point Tunneling (Protocol PPTP), to be dis- should be free from injection, deletion, or cor-
cussed shortly. Although tunneling can happen ruption. When integrity is targeted, nonrepu-
at virtually any layer, the two common types diation is also affected. Authenticity ensures
of tunneling are at Layer 2 and Layer 3. Layer that the identity of an individual user or sys-
3 provides the underlying structure to set a tem is the identity claimed. This usually
VPN connection at the application layer. involves using username and password to vali-
Modern mobile devices are powered with date the identity of the user. It may also take
Layer 3 tunneling protocol, such as IPSec, to the form of what you have such as a driver’s
be discussed shortly. license, an RSA token, or a smart card.
Security: This is the main reason why organiza- Topology: Traditional VPNs are characterized by
tions have used VPNs for years. Security is a point-to-point topology. One can create a
one of the key requirements for business suc- VPN by establishing a virtual point-to-point
cess. It ensures that sensitive data can be connection through the use of dedicated con-
transported over the network. The justification nections. This point-to-point topology is a
for using it instead of a private network is due major limitation of traditional VPN because
to cost and feasibility. It may be too expensive they cannot connect broadcast domains. This
to have a private network. One can simply limitation is overcome by a variant of VPN
think of a VPN as a secure tunnel between known as Virtual Private LAN Service
your PC and destinations you visit on the (VPLS).
Fig. 7.2 Tunneling
forming a virtual private
network connection
82 7 Virtual Private Networks
exist on the web, ready to be shared among (like the Internet) work like a private network
users. Cloud computing provides three basic and encrypt the data.
architectures to take care of the needs of dif-
ferent users: IaaS (Infrastructure as a
Service), PaaS (Platform as a Service), and 7.4 Applications
SaaS (Software as a Service). Most of the
organizations with VPN would like to reduce The application scope of VPN is increasing day
the operational cost, implementation cost, by day as the organizations are creating private
and overhead associated with their VPN. The networks through public Internet instead of
data protection and confidentiality of sensi- leased line. VPN enables a corporate network to
tive information in cloud environment are stretch around the globe and provide corporate
assured by deploying encryption, which can information, no matter where it is stored, in sec-
be achieved by setting up VPN services in onds. It offers voice over IP, streaming video,
cloud. instant messaging, and crowd computing. It is all
Unicast VPN: This basically uses Layer 3 multi- done at Internet service prices.
protocol label switching (MPLS) as the encap- VPN technologies play a vital role in various
sulating protocol. The ingress provider edge areas such as education, businesses, retail,
router attaches an MPLS label to a packet it finance, manufacturing, government, and mili-
receives from the custom. This label is used in tary organizations. For example, in modern digi-
forwarding the packet to the egress provider tal educational system, the cost-effectiveness and
edge router, where it is decapsulated and security for online exam and remote teaching-
passed to the attached customer. This is also learning can be ensured by VPN. VPN services
called MPLS-VPN (RFC 2547), and it can have been offered in various forms over the years.
secure wireless mesh networks, the dual Such services include ecommerce, social net-
deployment of both technologies. Enterprise working, and mobile networks.
networks are increasingly adopting
MPLS-VPN technology to connect geographi- Ecommerce: As VPN provides low-cost, secure
cally disparate locations. However, the any-to- connections, it becomes a popular technology
any direct connectivity model of this for electronic commerce (ecommerce), which
technology is causing rapid increase in the plays an important role in modern business
routing tables in the service provider’s world. Business-to-business (B2B) and
routers. business-to-consumer (B2C) are the two com-
Multicast VPN: The growth of one-to-many mon types of ecommerce realization. B2B
applications in corporate networks has led to type of ecommerce holds the bigger portion.
the demand for VPNs to support multicast Banks like Chase Manhattan Bank and First
applications. In a multicast VPN (or MVPN), Chicago National Bank have replaced their
customer multicast traffic is encapsulated at leased line networks with VPNs. Ecommerce
an ingress provider edge router. The traffic is allows electronic payment as a financial
delivered to one or more egress provider edge exchange online.
routers. Virtual private social networks (VPSNs): Social
Other types of VPN include peer-to-peer VPN, networking sites (SNSs) are Internet-based
Layer 2 VPN, and IPSec VPN. Commercially applications that allow users to share informa-
available VPNs include Private Internet tion with a global audience. The biggest SNS,
Access VPN (with monthly charge of $6.95), Facebook, has more than 500 million users.
NordVPN ($11.95 per month), VPN Unlimited The concept of VPSNs is analogous to the
($5.99 per month), IPVanish VPN ($5.99 per concept of virtual private networks (VPNs)
month), and ExpressVPN ($8.32 per month). applied to traditional computer networks.
Generally, all VPNs make a public network VPSN could also store the real information in
84 7 Virtual Private Networks
an encrypted way and decrypt them when core routers that serve as endpoints of the
necessary. VPN.
Mobile VPN: A virtual private mobile network 2. Complexity: A problem with VPN is deciding
(or mobile VPN) uses the physical infrastruc- how many VPN channels are required. The
ture comprising a mobile wireless network as greater the number of channels, the more
a platform to offer mobility as a service. complex a VPN becomes. The number of end-
Central to this network is a controller that points per VPN is growing, and the communi-
accepts MVPN-related requests, such as cre- cation pattern between endpoints is becoming
ation and manipulation, and interacts with the increasingly complex and hard to predict. As a
infrastructure to fulfill them. result, users are demanding dependable,
A VPN app is recommended for your mobile dynamic connectivity between endpoints. For
device to protect all your mobile communica- a large number of VPN endpoints, a tree struc-
tions. Most VPN services offer apps on both ture scales better than point-to-point paths
Android and iOS, saving you the trouble of between VPN endpoint pairs.
configuring your phone’s VPN’s settings 3. Incompatibility: The VPN solutions and prod-
yourself. ucts that are offered by various vendors can
Optical VPNs are the next step in the evolution of have incompatibility issues and create com-
VPNs. It leverages the cost efficiency of opti- plexity especially if these devices are not
cal networks. designed to work together. Several VPN
implementations have not achieved full
interoperability with each other.
7.5 Benefits and Challenges 4. Administration: The administration of VPNs
require dedicated, skilled network administra-
We now weigh the pros and cons of VPNs. While tors who know how a VPN works and are
the benefits of VPNs are many, their disadvan- responsible for ongoing maintenance and
tages are just as numerous. If used properly, a management (such as monitoring, reporting,
VPN is a technology with great opportunity for trouble shooting, etc.) of the network. The
businesses of all sizes. It is cheaper than leased main concern for most enterprises is to find
lines. It protects you from prying eyes. It prevents such competent network administrators who
users on the Wi-Fi hot spot or any network from are usually expensive.
intercepting your traffic in a man-in-the-middle 5. Quality of service (QoS): This ensures that all
attack. Journalists and activists use VPN services applications can coexist and function at
to circumvent government censorship. VPNs are acceptable levels of performance. Many time-
often used by journalists or people living in coun- sensitive applications need guarantees to
tries with restrictive policies on the use of the function correctly. The VPN requires a certain
Internet. quality of service (QoS), which is minimum
The challenges typically facing VPN include guaranteed bandwidth for the connections
the following: between VPN sites.
6. Malicious attacks: Due to the vital role that
1. Cost: There are hidden costs for deploying VPNs play in corporate and governmental
VPNs. For example, implementing encryp- communication systems nowadays, they have
tion algorithms on a VPN is computer inten- been targeted for attacks. The private link sup-
sive and expensive. The cost of the network plied by a VPN can open a virtual backdoor to
consists of the cost of running it (e.g., paying attackers. There are simple means of inter-
the administrators), the cost of renting the cepting data passing through a network. Wi-Fi
VPN channels or links over which the VPN spoofing and Firesheep are two easy ways of
tunnels are established, and the cost of the hacking.
7.6 VPN Standards 85
7.6 VPN Standards • RFC 5251, Layer 1 VPN Basic Mode, July
2008
For all this interconnectivity to work, there must • RFC 5252, OSPF-Based Layer 1 VPN Auto-
be cooperation among vendors. The two largest Discovery, July 2008
groups are the Internet Engineering Task Force • RFC 5253, Applicability Statement for Layer
(www.ietf.org) and the Institute of Electrical and 1 VPN (L1VPN) Basic Mode, July 2008
Electronics Engineers (www.IEEE.org). Each • RFC 5265, Mobile IPv4 Traversal across
group has its own way of doing business and pub- IPsec-Based VPN Gateways, June 2008
lishes its recommendations and standards. The
IPSec suite of protocols was developed by IETF
as part of IPv6. It is the security standard for the Summary
Internet, intranets, and VPNs. IPSec enables end-
to-
end security so that information sent to or 1. The VPN secures the private network using
from a computer can be secure. encryption to ensure that only authorized
Standards for VPN are yet to mature, but VPN users can access the network and that the data
Requests for Comments (RFCs) include the cannot be intercepted.
following: 2. The two common types of VPNs are site-to-
site and remote access.
• RFC 2637, PPTP, July 1999 3. A VPN uses a public network (the Internet)
• RFC 2685, VPNs Identifier, September 1999 for private communications and applies
• RFC 2735, NHRP Support for VPNs, encryption to ensure privacy.
December 1999 4. VPNs are characterized by their deployment
• RFC 2764, A Framework for IP Based VPNs, (as remote access or site-to-site), tunneling,
February 2000 security, safety, topology, encryption, and
• RFC 2917, A Core MPLS IP VPN Architecture. protocols.
September 2000 5. Types of VPNs include access VPN,
• RFC 3809, Generic Requirements for intranet/extranet VPN, cloud VPN, unicast
PPVPN. June 2004 VPN, and multicast VPN.
• RFC 3931, L2TPv3, March 2005 6. Applications of VPNs include ecommerce,
• RFC 4026, PPVPN Terminology, March 2005 social networks, mobile VPN, and optical
• RFC 4031, Service Requirements for Layer 3 VPN.
PPVPNs, April 2005 7. Benefits of VPN include being cheaper than
• RFC 4093, Problem Statement: Mobile IPv4 leased lines, protects from prying eyes, and
Traversal of VPN Gateways, August 2005 prevents being intercepted.
• RFC 4110, A Framework for Layer 3 PPVPNs, 8. Challenges include costs, complexity as the
July 2005 number of channels increases, incompatibility
• RFC 4111, Security Framework for PPVPNs, of products due to no standards, expensive
July 2005 administrative cost, and possibility of mali-
• RFC 4176, Framework for L3 VPN Operations cious attacks.
and Management, October 2005
• RFC 4265, Definition of Textual Conventions
for VPN Management, November 2005 Review Questions
• RFC 4364, BGP/MPLS IP VPNs, February
2006 7.1 Should a VPN be regarded as a:
• RFC 4365, Applicability Statement for BGP/ (a) LAN (b) MAN (c) WAN
MPLS IP VPNs, February 2006 7.2 VPN is a private network built on top of
• RFC 4381, Analysis of the Security of BGP/ another existing private network.
MPLS IP VPNs, February 2006 (a) True (b) False
86 7 Virtual Private Networks
Steve Jobs
Tel. Comp.
[Video on Demand
Others T.V.
1
Internet AFE Data
M POTS
XDSL SPLITTER
Telecommute, edu.,
ads., info., games,
electronic mail, etc.] U
AFE n
Broadcast AFE XDSL
X XDSL
Exiting Telephone
ACCESS MODULE
Line
Data
Others
To POTS Phone
SWITCH PC
(Voice)
Fig. 8.1 Basic xDSL system application block diagram. (Source: Cajetan, et al. 2008, p. 166)
downstream data rate is from 1.5 to 8 Mbps while ISDN signal from ADSL data frequencies
the upstream data rate is from 16 to 768 Kbps. DSLAM. The ADSL requirements include phone
This means that its data flows faster in one direc- line activated by whichever phone company you
tion than the other. The data transmission has subscribe to for your ADSL service, filter to sep-
faster downstream to the subscriber than arate the phone signal from the internet signal,
upstream. It is digital because no type of com- ADSL modem, and subscription with an ISP sup-
munication is transferred in an analog method. porting ADSL.
All data is purely digital and only at the end when
it is modulated to be carried over the line. It is
called a subscriber line because the data is car- 8.2.1 ADSL Operation
ried over a single twisted-pair copper loop to the
subscriber premises. ADSL exploits the unused analog bandwidth
The ADSL and ADSL Lite Models and con- available in the wires. It works by using a fre-
nectivity to TELCO CO and the Internet are quency splitter device to split a traditional
shown in Fig. 8.2, while the ADSL System Model voice telephone line into two frequencies as
is shown in Fig. 8.3. The various components of shown in Fig. 8.4. The regular phone uses
these models include the ADSL modem at the approximately about 4 kHz. The remaining fre-
customer premises (ATU-R), the modem of the quency is used for the ADSL upstream from
central office (ATU-C), DSL Access Multiplexer 25.875 KHz to 138 KHz and the downstream
(DSLAM), and the splitter which is an electronic from 138 KHz to 110 KHz frequencies. Prior
low pass filter that separates the analog voice or to the existence of DSL technology, these fre-
8.2 ADSL
Fig. 8.2 ADSL and ADSL Lite models and connectivity to TELCO CO and the Internet. (Source: Cajetan, et al. 2008,
p. 168)
8.2 ADSL 91
Splitter
Network SM TE
Access ATU-C ATU-R
Node
SM TE
Phone(s)
POTS
Network
Fig. 8.3 ADSL System Model. (Source: Cajetan, et al. 2008, p. 168)
quencies were unused with the exception of the There are two competing and incompatible stan-
phone frequency of about 4 KHz. dards for modulating the ADSL signal. They are:
CAP is an encoding method that divides the sig- 8.2.5 Factors That Affect Speed
nals into two distinct bands. They are:
• The number and type of joints in the wire
• The upstream data channel (to the service pro- • The distance from the local exchange
vider), which is carried in the band between • The type and thickness of wires used
25 and 160 kHz • The proximity of the wires to radio
• The downstream data channel (to the user), transmitters
which is carried in the band from 200 kHz to • The proximity of the wire to other wires carry-
1.1MHz ing ADSL and other non-voice signals
attenuation at high frequencies. This limits the (PBXs) over a campus using HDSL line drivers
length of the T-1 to 1 km which is about 3200 ft. with built-in CSU/DSU (channel service unit/
A repeater is needed to boost the signals for lon- data service unit) functionality as shown in
ger distance which increases the cost of using Fig. 8.5.
T-1 lines. HDSL can be used to connect to campus net-
HDSL uses 2B1Q encoding technology which works and phone equipment at T1 speeds without
is less susceptible to attenuation. It has a data rate the need for costly fiber-optic cabling. The line
of 1.544 Mbps and up to 2 Mbps without a drivers or line terminals for HDSL operations
repeater up to a distance of 3.86 km which is generally support a variety of data interfaces,
about 12000 ft. The HDSL was the first deriva- including 10BaseT, G.703, and V.35 connections.
tive of an xDSL to use a higher frequency spec- They are configurable for N x 64 Kbps transmis-
trum of copper twisted-pair cables. sion speeds and sometimes include bridge or
router functionality for framing of Point-to-Point
Protocol (PPP), Internet Protocol (IP), High-level
8.3.1 HDSL Operation Data Link Control (HDLC), and other protocols.
They can be used for LAN-LAN connections and
HDSL operates symmetrically because both its for connecting local area networks (LANs) to
downstream and upstream data rates are the same frame relay networks or the Internet as shown in
about 1.544 Mbps. It can also operate in different Figs. 8.1 and 8.5. Because HDSL requires a
formats such as: repeater only at both ends of the line, not at every
1800 meters (6000 feet), as required by conven-
(i) In full-duplex 2.048-Mbps transmission tional T1 line, it makes HDSL easier to maintain
European (E1 speed) over three uncondi- and provision than conventional T-carrier span
tioned twisted-pair lines. designs.
(ii) In full-duplex 1.544-Mbps transmission
American (T1 speed) over unconditioned,
unshielded twisted-pair cables. In this case, 8.3.2 Different Varieties of HDSL
the twisted-pair phone lines have two pairs
of wires (four wires) within the line. In full- There are different types of HDSL such as
duplex, it operates with 784-Kbps transmis- e.SHDSL and G.SHDSL. e.SHDSL is the Ethernet
sion taking place over each pair of wires. version of HDSL which is over Copper, offering
This is normally called the dual-duplex symmetrical bandwidth at more than 100 Mbps
HDSL, and it is the most common over multiple bonded copper pairs without repeat-
configuration. ers. The G.SHDSL which can also be called
(iii) In full-duplex 668-Kbps transmission over a G.991.2 is an international standard for symmetric
single unconditioned, unshielded copper DSL developed by the ITU. Its main function is to
twisted-pair phone line. send and receive high-speed symmetrical data
streams over a single pair of copper wires at rates
HDSL can be used for connections between between 192 kbps and 2.31 Mbps. The G.SHDSL
points of presence (POPs), private data networks, was developed to incorporate the features of other
and other services. It can operate for a carrier ser- DSL technologies, such as ADSL and SDSL, and
vice area (CSA) from the telecommunication transport T1, E1, ISDN, ATM, and IP signals. This
company’s central office (CO) for a maximum is the first DSL technology to be developed from
distance of about 3700 meters. Different types of the ground up as an international standard. The
devices can be connected to the HDSL in its standard for G.SHDSL was ratified by the
operation like routers, bridges, and telephone International Telecommunication Union (ITU) in
equipment such as private branch exchanges February 2001.
94 8 Digital Subscriber Line
Fig. 8.5 HDSL
operational diagram
HDSL and ADSL are the different variants of the The Rate Adaptive Digital Subscriber Line
xDSL. High-bit-rate Digital Subscriber Line (RADSL) is one of the derivatives of the xDSLs
(HDSL) permits transmission up to 12 Kft from technology that can enable telephone companies
the central Digital Subscriber Line Access to simultaneously transmit up to 400 channels
Multiplexer (DSLAM) or from the Central Office of digital television programming, traditional
(CO). It supports telecommunication transport voice services, and high-speed Internet access
application and cellular base station connectivity. using existing copper infrastructure as shown in
It has a downstream and upstream rate of about Fig. 8.6 from branch sites 1, 2, and 3. RADSL
1.544 Mbps. In the case of the ADSL, the down- supports downstream data rates of up to approx-
stream is from 1.5 to 8 Mbps, while the upstream imately 8 Mbit/s and upstream data rates of up
is from 16 to 768 Kbps. The ADSL supports inter- to approximately 1 Mbit/s. It can coexist with
active multimedia, Internet access, remote office the plain old telephone service (POTS) voice on
LAN residential and small office/home office the same line.
(SOHO) applications, and video-on-demand. The Because RADSL seeks for the fastest rate dur-
maximum bandwidth for HDSL transmissions is ing its operation, it allows for rate adaptation
less than the maximum bandwidth for ADSL. while the connection is in operation. It should be
HDSL is not widely implemented at the customer noted also that rate adaptation while the connec-
premises level, which uses the more popular tion is in operation is one of the options in
ADSL or G.Lite for providing customers with ADSL2, ADSL2+, and VDSL2, under the name
high-speed Internet access. seamless rate adaptation (SRA).
8.6 VDSL 95
Fig. 8.7 IDSL
operational diagram.
(Source: https://www.
networxsecurity.org/
members-area/
glossary/i/isdn.html)
take our civilization into the next millennium. a maximum downstream speed data rate of 8
These applications allow us to increase the speed Mbps and 1 Mbps as the upstream speed data
at which we communicate and learn. The key rate.
applications for the VDSL systems are: • Due to the extremely high speeds supported
by VDSL, it is seen as a good future technol-
• Internet/intranet applications ogy for the use of applications that need a high
• Video-on-demand bandwidth compared to ADSL.
• Telemedicine • VDSL is faster than ADSL.
• Videoconferencing • While VDSL supports high-definition tele-
• Distance learning vision (HDTV), ADSL does not support
• Electronic publishing HDTV.
• Electronic commerce • VDSL allows adjustable bandwidths while
ADSL cannot.
Many of these applications will require more • VDSL has more trouble with damping com-
bandwidth than IDSL and even ADSL can sup- pared to ADSL.
ply. VDSL has been developed to enhance our • VDSL is not very suitable for homes that are
ability to communicate using multimedia at high much further away from the telephone
bandwidths. exchange compared to ADSL.
• VDSL is not widely distributed as compared
to ADSL which is more widely distributed.
8.6.1 Differences Between VDSL
and ADSL
Summary
The key differences between VDSL and ADSL
are as follows: 1. Digital Subscriber Line (DSL) is part of the
access technology network that is supposed
• The major difference between VDSL and to fulfill the very fast data rate demands in a
ADSL technologies is speed. VDSL can reach very growing market.
speeds up to 52 Mbps for the downstream 2. DSL being a high-speed data technology is
speed data rate and 16 Mbps for the upstream also referred to as a broadband telecommuni-
speed data rate. With ADSL, you can achieve cation system.
8.6 VDSL 97
3. ADSL is called asymmetric because the 6. The G.SHDSL is the first DSL technology to
downstream data rate is from 1.5 to 8 be developed from the ground up as an inter-
Mbps while the upstream data rate is from national standard.
16 to 768 Kbps which means that its data 7. The maximum bandwidth for HDSL trans-
flows faster in one direction than the missions is less than the maximum band-
other. width for ADSL.
4. The high-bit-rate Digital Subscriber Line 8. Because RADSL seeks for the fastest rate
(HDSL) is an alternative to the T-1 line with during its operation, it allows for rate adapta-
1.544 Mbps for both its downstream and tion while the connection is in operation.
upstream data rates. 9. The only one possible technology in the
5. HDSL operates symmetrically because both Digital Subscriber Line approach that allows
its downstream and upstream data rates are use of existing ISDN card technology for
the same about 1.544 Mbps. data-only use is the IDSL.
98 8 Digital Subscriber Line
8.5. Briefly describe the CAP modulation 8.12. What are the differences between HDSL
system. and ADSL?
8.6. Briefly describe the DMT modulation 8.13. Describe briefly the RADSL.
system. 8.14. What are the differences between RADSL
8.7. What are the advantages of ADSL? and ADSL? Describe briefly.
8.8. What are the disadvantages of ADSL? 8.15. What is IDSL? Describe briefly.
8.9. What are the factors that affect the speed of 8.16. What are the different applications of a
ADSL systems? VDSL?
8.10. What is a HDSL? Describe briefly. 8.17. What are the key differences between
8.11. Describe briefly the different types of HDSL. VDSL and ADSL?
Optical Networks
9
Success isn’t about how much money you make; it’s about the difference you make in
people’s lives.
Michelle Obama
Abstract
increasing demand for bandwidth is driven pri-
marily by IP traffic from video services, telemed-
The chapter focuses on optical networks. icine, social networking, and mobile phones. The
Optics is the branch of physics that deals with volume of data traffic transported across commu-
light. An optical network is an efficient and nication networks has grown rapidly and
promising infrastructure for handling the exceeded the volume of voice traffic.
explosively growing IP traffic, increasing Communication has become multimedia involv-
users’ demand in terms of bandwidth. It con- ing voice, video, data, and images. This has
nects devices using optical fibers and uses driven the development of high-capacity optical
light waves to carry information in various networks. Optical network is an efficient and
types of communications networks. These promising infrastructure for handling the explo-
impressive advantages of fiber optics over sively growing IP traffic, increasing users’
electrical media have made optical fiber to demand in terms of bandwidth, and to their
replace copper (twisted pair and coaxial cable requirements in terms of quality of service (QoS).
systems) for fast transmission of enormous Since its invention in the early 1970s, the demand
amounts of information. The properties make for and deployment of optical fiber have grown
fiber optics attractive to government bodies, drastically.
banks, and others with security concerns. Optics is the branch of physics that deals with
light. It is gaining attention in various areas due
Keywords to its usefulness in military, medicine, industry,
space explorations, and telecommunications.
Optics · Optical networks · Optical fibers · Optical fiber has become the dominant transport
Fast transmission · High bandwidth medium in communication systems due to its
inherent advantages in capacity, reliability, cost,
and scalability. Optical networking will be the
9.1 Introduction key in making the new world of communications
possible. Optical networks (or photonic net-
Today, the Internet is expected to meet the grow- works) are high-capacity communications net-
ing demand of fast information exchange and work based on optical technologies and
bandwidth-intensive networking services. The components. These networks are being equipped
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 101
M. N. O. Sadiku, C. M. Akujuobi, Fundamentals of Computer Networks,
https://doi.org/10.1007/978-3-031-09417-0_9
102 9 Optical Networks
with ultra-long-reach technology and fiber-optic optical fiber are important for communication
lines that can carry information thousands of networks. Then it discusses some of the main
kilometers before any signal regeneration is optical components. It covers various optical net-
required. works: WDM-based networks, passive optical
Optical networks are classified according to networks, SONET, all-optical networks, and
the size of the area they cover: free-space optics. It provides some applications
of optical networks.
• A local area network (LAN) links two or
more points within a small area such within a
building or campus, e.g., free-space optics. 9.2 Why Optical Fiber?
• A metropolitan area network (MAN) covers a
larger area such as a city, e.g., metro optical Originally, communications network used copper
networks. to transfer information. In the mid-1970s, it was
• A wide area network (WAN) extends over a recognized that the existing copper technology
larger area such as a nation or continent, e.g., would be unsuitable for future communication
optical Internet and SONET/SDH. networks due to some inherent problems in cop-
• An access network is a network that provides per wire: (1) its bandwidth is limited due to phys-
high-speed Internet connectivity to homes. It ical constraint; (2) it is susceptible to radio,
is the “last mile” of a telecom network con- electrical, and crosstalk interference which can
necting the telecom Central Office with end garble data transmission; (3) its electromagnetic
users. Access networks have different features emissions compromise security; and (4) its reli-
and requirements than LANs, MANs, and ability is reduced in the presence of a harsh envi-
WANs, e.g., Digital Subscriber Line (xDSL) ronment. It was clear that light waves could have
and fiber to the x (FTTx). much higher bit rates than copper without cross-
talk. Thus, fiber is regarded as the way of the
An alternative classification used by the tele- future.
phone industry refers to LANs as access net- Optical networks are high-capacity communi-
works, MANs as metro networks, and WANs as cations networks based on optical technologies
transport networks. Sometimes WANs are and components that provide routing, grooming,
regarded as the core network (or the backbone and restoration at the wavelength level as well as
infrastructure), while MANs and LANs are called wavelength-based services. Several factors are
edge networks. driving the need for optical networks and making
An optical communication uses light waves to optical fiber the medium of choice. Fiber optical
carry information in various types of cables have the following advantages over copper
communications networks. An optical network cables.
connects devices using optical fibers.
An optical network is a type of communication network that uses optical fiber cables as
the primary communication medium.
a very high capacity for carrying information ably over the last few years and will continue
because of the tremendous bandwidth avail- to fall. So is the cost of related components
able at optical frequencies (of the order of such as optical transmitters and receivers.
40 THz). Because of this, optical networks • Restoration capability: As network planners
can be regarded as telecommunications net- use more network elements to increase fiber
work of high capacity. capacity, a fiber cut can have massive implica-
• High transmission rate: Fiber-optic transmits tions. By performing restoration in the optical
at speeds much higher than copper wire. layer rather than the electrical layer, optical
Although the current Gbps network is regarded networks can perform protection switching
as a milestone compared with the existing faster and more economically.
Mbps networks, it is only a small fraction of • Wavelength services: One of the great
the possible rates with fiber-optic technology. revenue- generating aspects of optical net-
Fiber is capable of transmitting 3 TV episodes works is the ability to resell bandwidth rather
in 1 s and will be able to transmit the equiva- than fiber. By maximizing capacity available
lent of an entire 24-volume encyclopedia in on a fiber, service providers can improve rev-
1 s. enue by selling wavelengths, regardless of
• Attenuation: It provides low attenuation and is the data rate required. To customers, this ser-
therefore capable of transmitting over a long vice provides the same bandwidth as a dedi-
distance (up to 80 km) without the need of cated fiber.
repeaters. This allows one to extend networks
to campuses of large size or a city and its These impressive advantages of fiber optics over
suburbs. electrical media have made optical fiber to
• Electromagnetic immunity: Fiber is a dielec- replace copper (twisted pair and coaxial cable
tric material. Therefore, it neither radiates nor systems) for fast transmission of enormous
is affected by electromagnetic interference amounts of information from one point to another.
(EMI), lightning strikes, or surges. The bene- These properties make fiber optics attractive to
fits of such immunity include the elimination government bodies, banks, and others with secu-
of ground loops, signal distortion, and cross- rity concerns.
talk in hostile environments. However, optical fiber has its drawbacks.
• Security: Telecommunication companies need First, electrical-to-optical conversion at the send-
secure, reliable systems to transfer informa- ing end and optical-to-electrical conversion at the
tion between buildings and around the world. receiving end is costly. Second, optical fiber suf-
It is more secure from malicious interception fers the same fate as any wired medium—cable
because the dielectric nature of optical fiber must be buried along the right of way. Third, spe-
makes it not easy to tap a fiber-optic cable cial installation and repair techniques are
without interrupting communication. required. Fourth, optical cable can only be used
Accessing the fiber requires intervention that on the ground; it cannot work with mobile com-
is easily detectable by security surveillance. munication. Fifth, optical fiber is fragile and vul-
Fiber-optic systems are easy to monitor. Fiber- nerable to damage; you cannot twist or bend the
optic cables are virtually unaffected by atmo- cable. It is subject to frequent damage due mostly
spheric conditions. As the basic fiber is made to fiber cuts.
of glass, it will not corrode or be affected by
most chemicals. It can be buried directly in
most kinds of soil or exposed to corrosive 9.3 Major Optical Components
atmosphere without significant concern.
• Cost: Glass fibers are made from silica sand, As shown in Fig. 9.1, the three main components
which is more readily available than copper. of an optical network are optical transmitter,
The cost of optical fibers has fallen consider- fiber-optic cable, and an optical receiver. Other
104 9 Optical Networks
An optical fiber is a very thin dielectric guide which carries signals in the form of light.
Optical fiber usually consists of a cylindrical converts data to a modulated optical signal, while
core or filament of silica surrounded by cylin- the receiver converts a modulated optical signal
drical cladding, also of silica, with a lower to data. The most commonly used optical trans-
refractive index, as shown in Fig. 9.2. A single mitter is LEDs (light-emitting diodes) and laser
fiber can transmit many separate signals simul- diodes. A common optical receiver is photodetec-
taneously at different wavelengths of light. This tor, which is the key part of an optical receiver.
technique is known as wavelength-division mul- 3. Optical amplifiers: The optical fibers
tiplexing (WDM). Since light beams do not can transmit light waves more than 100 km with-
interfere with each other, a single strand of out amplification, much farther than how long
fiber-optic cable can carry optical signals on copper wires can transmit electronic signals.
multiple wavelengths simultaneously. There are When the signal must span a longer distance, an
three types of fiber-optic cables: single mode optical amplifier is used to multiply the strength
fiber, multimode fiber, and multimode graded of the optical signal. Optical amplifiers are
index fiber. inserted in the line to compensate for fiber attenu-
ation and therefore to increase the reach of trans-
mission systems. The amplification is often
achieved using erbium-doped fiber amplifiers
(EDFA), which can easily amplify many different
Example 9.1
signals all at once.
The amount of fiber deployment by a tele- 4. Optical switches: Electronic switch-
com or city is often measured in sheath ing is limited by its processing speed. Fiber-optic
miles. Sheath miles is the total length of cables carry signals from node to node, with opti-
fiber cables, where each route in a network cal switches directing them to their destination.
comprises many fiber cables. This switch opens and closes to direct the incom-
For example, a 10-mile-long route using ing and outgoing signals to the right place. When
three fiber cables is said to have 10 route a signal arrives at its destination, it must be sepa-
miles and 30 sheath (cable) miles. Each rated from the rest of the optical channels (or
cable contains many fibers. If each cable lightpaths). An optical network can be either
has 10 fibers, the same route is said to have switched or broadcast network. In switched net-
300 fiber miles. works, optical switches are used to route the opti-
cal signal. In broadcast optical networks, the
9.3 Major Optical Components 105
Fig. 9.2 A fiber-optic cable. (Source: “What is the fiber optic cable?” https://www.quora.com/
What-is-the-fiber-optic-cable)
transmitted optical signals are received by all the (a) Time-division multiplexing (TDM)
nodes. Broadcast optical networks are much sim- separates signals by interleaving bits, one after
pler to implement. another.
5. Optical routers: These direct each (b) Wavelength-division multiplexing
incoming optical signal to an appropriate outgo- (WDM) multiplexes a number of signals onto a
ing fiber just like electronic routers. Optical rout- single optical fiber by using different wave-
ers in a packet-switched network make use of an lengths (i.e., colors).
optical label that is coded with the routing infor- (c) Frequency-division multiplexing
mation such as the destination address. This label (FDM) separates signals by modulating the data
helps to transport packets across the core network onto different carrier frequencies.
in an all-optical fashion. This means that an IP The implementation of FDM in the optical
packet is never converted into the electric domain domain requires multiple transmitters operating
until the packet arrives at an edge router. at different wavelengths. Therefore, optical FDM
6. Optical add/drop multiplexers is known as wavelength-division multiplexing
(OADMs): These are devices that are used to add (WDM). Currently, WDM is preferred to TDM
or remove single wavelengths from a fiber with- technique due to the complexity of the hardware
out disturbing the transmission of other signals. required for TDM. Figure 9.3 shows TDM and
In other words, an OADM is a device that enables WDM.
a number of wavelength channels to be dropped The multiplexer multiplexes the wavelength
or added locally. channels. The demultiplexers separate the optical
7. Optical splitter: An optical splitter is channels and distribute them to separate optical
a passive component that is used in the optical receivers. A multiplexer combines multiple opti-
network system to achieve the optical coupling, cal signals, while a demultiplexer separates sig-
branching, and distributing. It is a device with nals having different carrier wavelengths.
multiple import or output terminals. Generally, Typically, wavelength multiplexing is performed
we use M x N to indicate a splitter with M import at the central office, while wavelength demulti-
and N output numbers. The splitter is the key plexing is provided at the customer’s house.
technology that allows the access network to be 9. Wavelength-division multiplexer:
electrically passive and is used in FTTH passive The technology of using multiple optical signals
optical network. on the same fiber is called wavelength-division
8. Multiplexer/demultiplexer: These multiplexing (WDM). A WDM optical network
are also called mux/demux. Multiplexing is nec- divides the vast transmission bandwidth available
essary because it is more economical to transmit on a fiber into several different smaller capacity
data at higher rates over a single fiber than it is to “channels.” In WDM signals, we are interested in
transmit at lower rates over multiple fibers. As the wavelength λ or frequency f of the signals,
data rates get higher and higher, it becomes which are related by the equation
harder for electronics to process data. There are c f
three common multiplexing techniques:
106 9 Optical Networks
Fig. 9.3 Two
multiplexing techniques:
(a) TDM, (b) WDM.
(Source: “Optical
networks,” in G. Pujolle
(ed.), Management,
Control and Evolution of
IP Networks. Newport
Beach, CA: ISTE Ltd.,
Chapter 26, 2007,
p. 599)
f = c / = 3 108 / 0.8 10 -6 subnetwork consists of OXCs built by the same
vendor. An OXC can serve as an optical add/
= 375 10 12
= 375 THz drop multiplexer (OADM), i.e., it can terminate
the signal on a number of wavelengths and
insert new signals into these wavelengths.
9.5 Passive Optical Networks 107
Other components of an optical network will take place. The dream of optical Internet
include optical coupler, circulator, wavelength and many other large-scale telecom networks
converters, and transponder. Improvements in supporting future bandwidth demands could
these components have led to an increase in the only be made a reality with next-generation
capacity of optical networks. all-optical network.
With the advent of the optical amplifier and Most optical networks contain both active and
WDM technology (with hundreds of wavelengths passive optical elements. Active components can
per fiber), optics is playing a larger role in extend- be located at the central office, customer’s prem-
ing further to the edge of the network. The use of ises, in the repeaters, and in switches. Active ele-
wavelength-division multiplexing (WDM) allows ments require electrical power to perform their
aggregation of many channels (or wavelengths) functions.
onto a single fiber. It is the simplicity of this mul- There are two types of optical networks: active
tiplexing scheme which is the underlying reason optical networks and passive optical networks.
that WDM technology is a key technology in the Active optical networks use active components
development of optical networks. Point-to-point such as fiber amplifiers, while passive optical net-
WDM transmission is currently the dominant works (PON) use only passive components such
architecture for optical networks. This is the as optical filters and splitters. An active optical
wavelength/optical analog of present electrical system uses electrically powered switching
TDM-based networks. WDM is conceptually the equipment, such as a router or a switch aggrega-
same as frequency-division multiplexing (FDM), tor, to manage signal distribution and direct sig-
which is used in microwave radio and satellite nals to specific customers. In such a system, a
systems. WDM transmission is regarded as a best customer may have a dedicated fiber running to
candidate because it allows multiple optical sig- his or her house. The reliance of active optical
nals at different wavelengths to transmit simulta- networks on Ethernet technology makes interop-
neously along a single piece of optical fiber. erability among vendors easy. Because it requires
A WDM optical network consists of optical switches interconnected by fiber links, each
of which allows aggregation of many channels onto a single fiber.
WDM network may offer data transparency in A PON is physically based on a tree topology,
which the network may carry signals of arbi- where a single central office is communicating
trary format. As time progresses IP over WDM with multiple geographically dispersed end users.
108 9 Optical Networks
The optical fiber and splitters are the truly “pas- test access, and high vulnerability to breakdown
sive” building blocks of the PON, with no electri- in the feeder line.
cal powering required. Powered equipment is
required only at the source and receiving ends of
Example 9.3
the signal. As shown in Fig. 9.4, multiple users
can be connected to a network element called the WDM-PON is proving to be the most
optical network unit (ONU), which in turn con- promising long-term, scalable solution for
nects to a central office (CO) interface called an delivering high bandwidth to the end user.
optical line terminal (OLT) through an optical The key feature of PON operation is wave
fiber. The OLT is located at the CO, while ONUs division multiplexing (WDM), used to sep-
can be located at the end user site. arate data streams based on the wavelength
The three popular PON alternatives are broad- (color) of the laser light. A PON based on
band PON (BPON), Ethernet PON (EPON), and WDM technology is shown in Fig. 9.5. The
gigabit PON (GPON). We will consider only EPON following different access networks can be
here. The widespread use of Ethernet makes it an obtained depending on the penetration of
attractive alternative transport technology for access the optical fiber in these networks.
networks. Instead of connecting one fiber from each
user to the CO, the IEEE 802.3ah Task Force First Solution
Mile (FFM) developed the Ethernet passive optical The term FTTx refers to “fiber to the x,”
network (EPON), where only optical cable is where x could refer to one of several
required between the CO and a set of 16 or 32 users. popular deployment scenarios.
Thus, EPON is an extension of the IEEE 802.3 FTTH (fiber to the home) is a passive opti-
Ethernet LAN standard to fiber-optic access net- cal network which is deployed all the
works. EPON takes advantage of inexpensive and way to the final subscriber.
ubiquitous Ethernet equipment. This way fiber FTTB (fiber to the business) is a passive
replaces copper (and DSL) in the access line, and optical network which is deployed all
enormous bandwidth is made available to users the way to the business/industrial center
with connections to the backbone networks. Thus, for providing information.
PONs are widely deployed in the first/last mile of FTTCab (fiber to the cabinet) architecture
today’s operational access networks. The simplified uses the optical fiber until an electric
cabling infrastructure (with no active elements and cabinet located at approximately one
less that can go wrong) has made PON an ideal and kilometer from the final client.
efficient for home Internet, college campuses, busi- FTTCurb (fiber to the curb) architecture
ness environments, and voice and video applica- increases the penetration of optical fiber in
tions. A typical PON deployment would involve a access networks. FTTCurb network
maximum reach of 20 km with a split of up to 64 makes it possible to serve a dozen clients.
and transmission speed of 1 Gbps. FTTEx (fiber to the exchange) delivers
Advantages of PONs include efficient use of enough necessary bandwidth for the
power, simplified infrastructure and ease of new wideband services. The architec-
upgrade, efficient use of infrastructure, and ease ture serves roughly a thousand lines.
of maintenance. Disadvantages include distance,
9.6 SONET 109
Fig. 9.5 Passive optical network based on WDM. (Source: “Fiber optic solutions,” http://www.fiber-optic-solutions.
com/overcome-challenges-wdm-pon-fttx.html)
networks are SONET (synchronous optical net- An international version of SONET is the syn-
work) and the essentially similar SDH (synchro- chronous digital hierarchy (SDH). Voice traffic is
nous digital hierarchy) network. The second carried on these fiber links using SONET (syn-
generation of optical networks appeared in the chronous optical network)/SDH (synchronous
1980s. In these networks, routing, switching, and digital hierarchy).
intelligence are carried out in the optical domain Three primary needs have driven the develop-
since electronics processing becomes more diffi- ment of SONET. First, there was the critical need
cult at higher data rates. SONET in North to move multiplexing standards beyond the DS3
America and SDH in Europe and Japan are the (44.7 Mbps) level. Second, there was the need to
standard designs for fiber-optic networks. We enable cost-effective access to relatively small
consider just SONET in this section. amounts of traffic with the gross payload of an
SONET is a fiber optics-based network for optical transmission. Third, SONET has been
use by telephone companies. It provides an motivated by data communication needs such as
110 9 Optical Networks
LAN traffic, video, graphics, and multimedia. Synchronous optical networking (SONET)
SONET provides the infrastructure over which and synchronous digital hierarchy (SDH) have
broadband-integrated services can the deployed. evolved as the most commonly used protocols for
SONET is not a service but a transport inter- optical networks. One of the main features of a
face that enables a communication network to SONET/SDH rings is that they are self-healing,
carry various types of services. SONET is also meaning that a ring can automatically recover
not a communications network in the same sense when a fiber link fails. A typical SONET system
as LAN, MAN, or WAN. It is rather an underly- is shown in Fig. 9.6.
ing distribution channel over which communica- In North America, SONET is fast becoming
tions optical networks can all operate. SONET the de facto standard for high-speed broadband
then provides the basis for the optical infrastruc- communications used by corporations, phone
ture that will be necessary to meet the communi- companies, universities, and others. Although the
cations of the decade and beyond. SONET/SDH framing structure is widely used in
A synchronous signal comprises a set of bytes voice transmission in optical networks, it is cum-
organized into a frame structure. In SONET, the bersome for high-speed links. The optical trans-
basic unit of transport is called the synchronous port network (OTN) protocol was developed by
transport signal level 1 (STS-1) frame, which has the International Telecommunication Union as a
a bit rate of 51.84 Mbps and repeats every 125 μs, successor. It was designed to transport data
i.e., 8000 SONET frames are generated per sec- packet traffic such as IP and Ethernet over fiber
ond. An STS-1 frame structure is generally pre- optics in general and SONET/SDH in particular.
sented in the characteristic matrix shape in which
every element represents a byte. Besides the
STS-1, which serves as the basic building block, 9.7 All-Optical Networking
there are higher rate SONET signals (STS-N). An
STS-N channel rate is obtained by synchronously Current networks combine optical networking
mutiplexing N STS-1 inputs (i.e., byte interleav- and electronic networking. WDM plays a major
ing N STS-1 signal together). Standards already role in optical networking and is currently the
define rates from STS-1 (51.84 Mbps) to STS-48 main mechanism for realizing all-optical net-
(2.48832 Gbps), as shown in Table 9.1, where works (AONs), also called transparent networks.
An all-optical network (AON) has the user-network interfaces that are optical and data
is carried from its source to its destination in optical form, without the need for optical-to-
electrical conversion.
optical carrier level N (OC-N) is the optical AONs are attractive because they promise very
equivalent of an STS-N electrical signal. high rates, flexible switching, and broad applica-
tion support. All-optical WDM networks are fast
Table 9.1 SONET signal hierarchy becoming the natural choice for future backbone
networks with huge capacities. The requirement
Electrical signal Optical signal Data rate (Mbps)
STS-1 OC-1 51.84
of optical communication supporting large scal-
STS-3 OC-3 155.52 able networks in the future led to the concept of
STS-9 OC-9 466.56 all-optical networks.
STS-12 OC-12 622.08 The original goal of the all-optical network was
STS-18 OC-18 933.12 based on keeping the data signals entirely in the opti-
STS-24 OC-24 1244.16 cal domain from source to destination. This elimi-
STS-36 OC-36 1866.24 nates the so-called electronic bottleneck, to allow
STS-48 OC-48 2488.32 arbitrary signal formats, bitrates, and protocols to be
9.8 Free-Space Optics 111
Fig. 9.6 A typical SONET system. (Source: “SONET: Synchronous optical network,” https://pt.slideshare.net/hamza-
sajjad9081/sonet-synchronous-optical-networking)
transported. An important aspect in AONs is trans- WDM. This is not possible using any fixed
parency. This means that the data flows through the wireless/RF technology existing today. Second,
network without being interpreted in switches or FSO technology requires no FCC licensing or
routers. This also implies that any type of traffic municipal license approvals and thus obviates
could be simply passed through the network. the need to buy expensive spectrum. This dis-
Transparency brings advantages of security and ease tinguishes it clearly from fixed wireless tech-
in network upgrades. AONs could use WDM or nologies. Third, FSO is essentially the same as
TDM, but WDM optical network is more common. that for fiber-optic transmission, and it uses
They can be applied to LAN, MAN, and WAN. lasers or LEDs. The only difference is the
medium; the signal is sent through air or free
space. Light travels through air faster than it
9.8 Free-Space Optics does through glass or optical fiber. So one may
regard FSO as optical communications at the
Radio and fiber are dual technologies: radio pro- speed of light. Figure 9.7 shows a typical free-
vides mobility to the end user but has severe space optical system.
bandwidth limitations; fiber has severely limited FSO’s greatest success so far has come from
pervasiveness but brings enormous bandwidth the LAN/campus connectivity market. It can
potential. Free-space optics (FSO), also known also solve the “last mile” problem of connect-
as fiber-free or fiberless photonics, refers to the ing to fiber infrastructure in metropolitan areas.
transmission of modulated light pulses through It operates in a completely unregulated fre-
free space (air or the atmosphere). Laser beams quency spectrum (range of THz), implying that
are generally used, although non-lasing sources FSO is not likely to interfere with other trans-
such as light-emitting diodes (LEDs) or missions. FSO is fairly difficult to intercept
IR-emitting diodes (IREDs) will serve the same because its beams are invisible, narrow, and
purpose. FSO can be the best wireless solution very directional (aimed at a particular antenna).
where fiber optical cable is not available, high It offers a cost-effective, quick, and available
bandwidth (anywhere from 1 Mbps up to infrastructure that is not only easily deployed
1.25 Gbps) is required, and line-of-sight can be (within days), redeployed, and easy to manage
obtained to a target within a couple of miles. but can also offer a multitude of options—dis-
FSO is an optical technology and not a wire- tance, speed, topology, and installations. It is
less technology for three basic reasons. First, now a viable choice for connecting LAN,
FSO enables optical transmission at speeds of WAN, and MAN and carrying voice, video,
up to 2.5 Gbps and in the future 10 Gbps using and data at the speed of light.
112 9 Optical Networks
4. Major components of optical networks 9.2. The light source used in fiber-optic com-
include optical fiber cables, optical transmit- munication is:
ter, optical receiver, optical amplifiers, opti- (a) LEDs and lasers (b) Xenon
cal switches, optical routers, optical add/ lights (c) Incandescent
drop multipliers, optical splitters, multi- 9.3. Which of these components is not used in
plexer/demultiplexer, and optical optical networks?
crossconnects. (a) Amplifier (b) Router (c)
5. A WDM (wavelength-division multiplexing) Multiplexer (d) RFID
optical network consists of optical switches 9.4. Which of these optical networks is not a
interconnected by fiber links, each of which PON?
allows aggregation of many channels onto a (a) Narrowband PON (NPON) (b)
single fiber. WDM is the technology of com- Broadband PON (BPON) (c) Ethernet
bining multiple wavelengths onto the same PON (EPON) (d) Gigabit PON (GPON)
optical fiber. 9.5. These components are passive:
6. A passive optical network (PON) is a net- (a) Amplifier (b) Switches (c)
work that adopts a point-to-multipoint archi- Splitters (d) Optical fiber
tecture and uses passive elements such as 9.6. Which of these networks is used for pro-
optical fiber and splitters, with no electrical viding information to the industrial
powering required. center?
7. SONET (synchronous optical network) is an (a) FTTH (b) FTTB (c) FTTCab
ANSI standard that defines a high-speed dig- (d) FTTCurb
ital hierarchy for optical fiber. It is intended 9.7. In SONET, the rate for STS-1 level of elec-
to provide a common international rate struc- trical signaling is:
ture and eliminate the different transmission (a) 2488.320 Mbps (b) 622.080 Mbps
schemes and rates of nations. (c) 155.52 Mbps (d) 51.84 Mbps
8. Free-space optical (FSO) communications is 9.8. Which of these is not an application of
a technology that can provide high-speed, fiber optical networks?
cost-effective, and fast wireless networks (a) Web browsing (b) Visualization
that transmit at the speed of light. (c) Conferencing (d) Satellite services
9. An all-optical network (AON) has the user- 9.9. SDH was developed by:
network interfaces that are optical, and data (a) ANSI (b) OSI (c) ITU (d)
is carried from its source to its destination in IEEE
optical form, without the need for optical-to- 9.10. Free-space optics (FSO) is a wireless
electrical conversion. technology.
10. Common applications of optical networks
(a) True (b) False
include web browsing, graphics, and visual-
ization, multimedia conferencing, broadband Answer: 9.1 (b), 9.2 (a), 9.3 (d), 9.4 (a), 9.5 (c,
services to the home, business, and undersea d), 9.6 (b), 9.7 (d), 9.8 (d), 9.9 (c), 9.10 (b)
networks.
Problems
Review Questions
9.1. What led to the development of optical
9.1. Which of the following is not an advantage networks?
of using fiber optical cable? 9.2. What are the problems with copper wire
(a) High-speed capability (b) High that optical fiber is meant to solve?
attenuation (c) Low signal distor- 9.3. What is an access network?
tion (d) Low power requirement (e) 9.4. Mention the advantages of optical
Low material usage networks.
114 9 Optical Networks
9.5. What are the drawbacks of using optical 9.14. What are the major advantages and disad-
fiber? vantages of PON?
9.6. Explain the following terms in your own 9.15. Explain the difference between FTTH and
words: optical amplifiers, optical switches, FTTB.
and optical routers. 9.16. Describe the needs that led to the develop-
9.7. Describe multiplexer/demultiplexer. ment of SONET
9.8. Assume that an optical fiber transmits at 9.17. Describe SONET.
the speed of 2 × 108 m/s. Calculate the 9.18. Do some research on SDH.
wavelength at the operating frequency of 9.19. What is an all-optical network (AON)?
50 THz. Why is it important?
9.9. Describe WDM. Why does it play a major 9.20. Describe what transparency means in an
role in the development of optical networks? AON.
9.10.
What are the functions of optical 9.21. What is free-space optics FSO?
crossconnects? 9.22. Why is FSO regarded as an optical tech-
9.11. Describe EPON. nology and not a wireless technology?
9.12. Do some research on BPON and GPON. 9.23. Mention some of the applications of high-
9.13. What are the common applications of PON? speed optical networks.
Wireless Networks
10
Don’t just learn, experience.
Don’t just read, absorb.
Don’t just change, transform.
Don’t just relate, advocate.
Don’t just promise, prove.
Don’t just criticize, encourage.
Don’t just think, ponder.
Don’t just take, give.
Don’t just see, feel.
Don’t just dream, do.
Don’t just hear, listen.
Don’t just talk, act.
Don’t just tell, show.
Don’t just exist, live.
Roy T. Bennett
Abstract Keywords
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 115
M. N. O. Sadiku, C. M. Akujuobi, Fundamentals of Computer Networks,
https://doi.org/10.1007/978-3-031-09417-0_10
116 10 Wireless Networks
Wireless communication (or communication and also create mobility for devices connected to
using radio waves) was invented by an Italian physi- the network.
cist, Guglielmo Marconi, in 1895. Since then, the There are several types of wireless networks.
worldwide growth of the wireless communications The following seven are the most popular:
industry has been phenomenal. The evolution of the
wireless communication has radically changed the • Wireless local area network (WLAN): This
nature and socialization of human communications. links two or more devices over a short dis-
The wireless communication revolution is bringing tance using a wireless means. Computers are
fundamental changes to data networking. It is the often connected to networks using wireless
fastest growing field in the telecommunication link such as WLANs.
industry. Wireless networking plays an important • Wireless metropolitan area network (WMAN):
role in civil and military applications. It is invading This wirelessly connects several wireless LANs.
our lives through the increasing use of smartphones • Wireless wide area network (WWAN): It cov-
and portable computers. It is common today to see ers large areas such as neighboring towns and
people everywhere and at anytime use mobile tele- cities.
communications devices, such as cellular/mobile • Wireless personal area network (WPAN):
phones, personal digital assistants (PDAs), or This interconnects devices in a short span,
laptop. generally within a person’s reach.
Portable mobile devices, such as smart- • Cellular network: This is a network distrib-
phones, that allow instantaneous high-speed uted that employs a large number of low-
information access have radically changed our power wireless transmitters to create the cells,
way of life. Wireless networks are networks that which are base stations transmitting over
enable one or more devices to communicate small geographic areas.
without physical connections, without using • Satellite network: This uses satellites to pro-
wires or cables. They offer mobility and utilize vide instant global connectivity and commu-
radio waves or microwaves to maintain commu- nications from anywhere to anywhere.
nication. Thus, the basis of wireless systems is • Wireless sensor network (WSN): This usually
electromagnetic or radio waves. (The physical consists of a large number (hundreds or thou-
laws that make radio possible are known as sands) of sensor nodes deployed over a geo-
Maxwell’s equations, identified by James Clerk graphical region.
Maxwell in 1864.) This wireless connectivity
takes place at the physical layer of the network. Only these wireless networks will be covered
When you use a wireless network, you trade in this chapter. While WLAN, WMAN, and
wired connectivity for connectivity delivered WPAN are basically data networks, cellular net-
via a radio signal. work is for voice. The relationship between these
Wireless networking avoids the costly process wireless networks is shown in Fig. 10.1. Other
of using cables to connect devices in a building. wireless networks include wireless PBXs, wire-
Wireless networks offer many advantages when less USB, WiMobile, HIPERLAN (in Europe),
it comes to difficult-to-wire areas or trying to and ad hoc networks.
communicate across a street or river. Wireless This chapter provides a brief overview of
technology is an effective option compared to wireless communication networks. It begins with
Ethernet for sharing printers, scanners, and high- the basic fundamentals of wireless networks.
speed Internet connections. Wireless networks Then it considers wireless local area networks
help save the cost and time of installation of cable (WLAN): the IEEE 802.11 standard. It covers
10.2 Fundamentals of Wireless Networks 117
wireless metropolitan area networks (WMAN), dards, satellite services, and more. Every one of
wireless wide area network (WWAN), and wire- the wireless technologies has its own set of con-
less personal area network (WPAN). It explains straints and limitations. Most wireless technolo-
cellular network and satellite networks. It consid- gies operate on common principles and are
ers wireless sensor network (WSN). Finally, the subject to common performance criteria and con-
chapter concludes with the advantages and disad- straints. For example, a wireless network con-
vantages of wireless networks. tains base station gateways, access points, and
wireless bridging relays. This section covers dif-
ferent aspects of wireless communication net-
10.2 Fundamentals of Wireless works such as topology, electromagnetic
Networks interference, and the security measures that need
to be taken to ensure a secure network.
There is a wide variety of wireless technologies Topology: The topology of a wireless network is
in use today: Wi-Fi, Bluetooth, ZigBee, NFC, the way network components (such as devices,
WiMAX, LTE, HSPA, EV-DO, earlier 3G stan- routers, and gateways) are arranged.
Topology shows how wireless devices connect each other when there is no physical
connection.
118 10 Wireless Networks
There are different wireless technologies use a VPN since VPNs encrypt connections at the
designed for different topologies and use cases. sending and receiving ends.
The three common wireless topologies are star, Electromagnetic interference: Unlike wired net-
mesh, and cluster tree. works, wireless networks are subject to electro-
1. Star: In this topology, individual magnetic interference (EMI) caused by other
wireless devices communicate directly with a networks or devices nearby and can degrade the
central “hub,” and devices communicate only network.
with the hub. The distance between the device Since devices can interfere with each other,
and the hub is limited to 30–100 meters. The star every nation needs regulations that define the fre-
topology is also called point-to-point link. All quency ranges and transmission power for each
packets between devices must go through hub, technology that is permitted. There are two types
and for this reason the hub may become of electromagnetic interference: (1) conducted
bottlenecked. interference and (2) radiated interference.
2. Mesh: The computing devices in a
mesh topology can communicate with other
devices or nodes in the network. A message can Example 10.1
“hop” from node to node until it reaches the des-
tination. This capability is called multi-hopping. Which wireless topology is right for you?
When any node in a network can communicate
with any other node, this is a multipoint- to- Solution
multipoint network (also known as an ad hoc or
mesh network). You choose the one whose characteris-
3. Cluster tree: This topology is a tics best fit the main requirements of your
hybrid of star and mesh topologies. Wireless application. A star topology is good for
devices in a star (point-to-point) topology are relatively simple applications where inter-
clustered around routers or repeaters that com- ruptions in communications would not pre-
municate with each other and the gateway in a vent you from achieving desired results. A
mesh (point-to-multipoint) topology. mesh topology is best if data reliability is
Security: Security is an umbrella term encom- crucial and you want to guard against data
passing the characteristics of authentication, loss or signal degradation. A cluster tree
integrity, privacy, and nonrepudiation. Although may be used if you plan to apply different
no computer network is completely secure, wired topologies to different parts of the network.
networks are generally more secure than wireless No single topology works best in every
networks because wireless signals travel through application.
the air and can easily be intercepted or eaves-
dropped. Wireless networks are vulnerable to
security attacks in various protocol layers. While Conducted emissions are currents that are carried
the security problems associated with wireless by metallic paths. Radiated electromagnetic
networking are serious, there are steps you can interference consists essentially of the common
take to protect yourself. Encrypt the wireless traf- mode noise, differential mode noise, and mixed
fic passing between your wireless access point mode noise signals. Radiated interference is a
device and your computers. Change your admin- major issue in most wireless networks.
istrator password to one that is long. Be careful
what you do online; someone could be monitor- Implementation: The task of implementing a wire-
ing your activity. If possible, for public access, less network generally involves three steps:
10.3 Wireless Local Area Network 119
1. Establish the user requirements. Consider lisions. It has been promoted as the global
what the user wants to achieve with the WLAN standard.
network. • Radio NIC: Wireless network interface cards
2. Establish the technical requirements: what (NIC) are special network cards installed
attributes does the network need to possess within wireless-enabled computers. NIC pro-
in order to meet the requirements of the vides the interface between the computer
user. device and wireless network infrastructure. It
3. Evaluate the available technologies, and operates within the computer device and pro-
see how they rank against the technical vides wireless connectivity. It is also known as
requirements. a radio card, which implements the IEEE
It is needless to say that no single wireless tech- 802.11 standard. It picks up signals from the
nology can meet all requirements for customers access point and converts them to signals the
in all environments. A number of wireless prod- computer can understand. For computers, the
ucts can be mixed to build networks optimized NIC is usually network interface card that is
for a given situation. installed in an expansion slot.
• Access points: An access point (or base sta-
tion) in WLAN is a station that mainly trans-
10.3 Wireless Local Area Network mits and receives data. This requires that
antennas are built into most access points. The
Wireless LAN is perhaps the most commercially access point connects users to the network and
significant and most well developed of all wire- can also connect the WLAN to a wired net-
less networks. Wireless LANs do not require work. It has a limited range within which it
cable as the traditional Ethernet-wired LANs. can maintain a wireless connection with
WLANs are designed to provide wireless access devices on the network. Performance usually
within a range of 100 meters. Thus, they are used suffers as distance from access point increases
mostly in homes, offices, schools, or laboratories. beyond the limits of a range of 50–90 meters.
WLANs are based on IEEE 802.11 standards, • Routers: Routers are devices that literally
which are marketed under the Wi-Fi brand name. route data around the network. A router trans-
Users of wireless LANs operate a number of fers packets between networks. The router
devices, such as PCs, laptops, and PDAs. examines an arriving data and uses routing
Wireless LAN components include: tables to determine the best path for the data to
reach its destination. Routers use the software-
• Wi-Fi hot spots: Wi-Fi hot spots are available configured network address to make
at many public places such as hotels, hospi- decisions.
tals, and Starbucks coffee shops as wireless • Repeaters: A repeater simply regenerates a
Internet access technology. When you are network signal to extend the range of the
away from home or office, you can connect existing network infrastructure. It receives
your laptops to the hot spots. Wi-Fi is errone- radio signals from an access point or another
ously regarded as “wireless fidelity,” but this repeater; it retransmits the packets.
is not true. Wi-Fi is the name given by the • Print server. A print server is used to connect
Wi-Fi Alliance to the IEEE 803.11 WLAN printers to a network. This device allows
standard. It provides wireless access to com- everyone to use the same printer and saves
puting devices (such as laptop and tablet) cost.
using radio waves. It uses carrier sense multi- • Firewalls: A firewall is a device, either hard-
ple access (CSMA) to avoid transmission col- ware or software based, that controls access to
120 10 Wireless Networks
a company’s network. A firewall does not per- These devices are used to create wireless LANs.
form differently on a wireless network that it A typical wireless LAN is shown in Fig. 10.2.
does on a wired network. It is simply a device
that separates two networks from each other. It
is designed to protect data and resources from 10.4 Wireless Metropolitan Area
outside threat. For this reason, firewalls are Network
typically placed at entry/exit points of a net-
work so that it can deny or permit certain types A metropolitan area network (MAN) is a com-
of network traffic. munication network that spreads over one or
• Antennas: An antenna converts electrical sig- more neighboring cities. WMANs can connect
nals to radio waves. A wireless network usu- LANs or WLANs without any cables by using
ally requires focused antennas (e.g., dish microwave, radio wireless communication, or
antenna) that can send a beam in a specific infrared laser which transmits data wirelessly. A
direction. For some applications, standard wireless metropolitan area network (WMAN) is
dipole antennas are sufficient. Nearly all also known as a wireless local loop (WLL).
access points, routers, and repeaters come WMAN is a new technology that will supplement
with their own antennas. Smart or adaptive well-known wired technologies such as synchro-
antennas are capable of rejecting interference nous optical network/synchronous digital hierar-
and compensating for the multipath effects chy (SONET/SDH) and Gigabit Ethernet. It
caused by signals reflecting off buildings and provides services to metropolitan or regional
other structures. The performance require- areas, either urban or rural, within a radius of
ments of future wireless systems cannot be 50 km.
met without the use of smart antennas.
10.4 Wireless Metropolitan Area Network 121
A wireless MAN is intended to provide services over a geographical region of the size
of a metropolitan area, approximately 50 kilometers or 30 miles
or moving users making broadband available
Standard WMANs are based on IEEE 802.16 anywhere.
which is often called WiMAX (Worldwide WiMAX devices typically operate in the
Interoperability for Microwave Access). WiMAX 2.5 GHz, 3.5 GHz, and 5.7 GHz frequency bands.
connects wireless LANs to form a WMAN with- A WiMAX link can transfer data at up to
out the need for expensive cabling. WiMAX is 70 Mbps. WiMAX employs time division multi-
similar to Wi-Fi, but provides service to users ple access (TDMA), which divides access to a
within a 30-mile radius. It can provide wireless given channel into multiple time slots. Each node
access to the Internet through a service that cov- transmits only in its assigned slot, thereby avoid-
ers an entire metropolitan area. WLAN is gener- ing collisions. An example of WiMax is shown in
ally owned and operated by a single organization, Fig. 10.3.
whereas a WMAN is usually used by individuals, Mobile WiMAX is based on using orthogonal
organizations, and the public. Conceptually, frequency-division multiple access (OFDMA) as
WMANs can be used to connect WLANs/ the physical layer technology to support multiple
WPANs and provide access to data, voice, video, users in a scalable manner. WiMAX is profoundly
and multimedia services. WiMax is an interna- changing the landscape of wireless broadband
tional standard that provides a means of wire- due to the variety of fundamentally different
lessly connecting homes and businesses in metro design options. It provides last mile connectivity
area to the core communication networks. It can to a backbone network such as the Internet.
deliver triple play services (i.e., voice, video, and Scalability is a main challenge in such a network
data) over microwave RF spectrum to stationary that covers a relatively large area.
122 10 Wireless Networks
Another WMAN is IEEE 802.20 or mobile Wireless personal area networks (WPANs) are
broadband wireless access (MBWA), which based on the IEEE 802.15 standards and include
enables worldwide deployment of affordable, the Bluetooth (IEEE 802.15.1), ZigBee (IEEE
ubiquitous, always-on, and interoperable 802.15.4), and ultra-wideband (UWB) (IEEE
multi-vendor MBWA networks. It is optimized 802.15.3) technologies. They permit communi-
for high-speed IP-based wireless data cation in a very short range, of about 10 meters.
services. A WPAN requires little or no infrastructure and is
characterized by low power demands and a low
bit rate. It facilitates communications among
10.5 Wireless Wide Area Network personal devices such as cellular phones, per-
sonal digital assistants (PDAs), pagers, personal
Wireless wide area networks (WWAN) cover a stereos, pocket video games, and notebook com-
wide area and extend beyond 50 kilometers and puters. It allows these devices to communicate
typically use licensed frequencies. These types of and interoperate with one another in a small
networks can be maintained over large areas, range. A typical WPAN is shown in Fig. 10.4.
such as cities or countries. There are mainly two WPAN operates in the license-free radio
available WWAN technologies: cellular tele- frequency band of 2.4 GHz (2400–
phony and satellites. These will be discussed 2483.5 MHz), with ranges up to 10 m and data
fully in later sections. Other WWANs include rates up to 1 Mbps. It ties together closely
Cellular Digital Packet Data (CDPD), Global related objects, a function that is fundamen-
System for Mobile Communications (GSM), and tally different from the objective of a wireless
Mobitex. WWAN technologies even offer Global LAN. Thus, WPAN must coexist with other
Positioning System (GPS) that can locate a radio technologies, like WLAN, that operate
device anywhere in the world. the same frequency band.
WPAN is different from wireless LAN. First,
WPANs target primarily the vast consumer mar-
10.6 Wireless Personal Area ket and are used for ease of connectivity of per-
Networks sonal wearable or handheld devices. Second,
WPAN is optimized for low complexity, low
This is a small-scale wireless network that con- power, and low cost. It does not require access
nects a few devices in a single room. point like WLAN. Third, WPAN’s close range
throughput of 1 Mbps does not compare with the lem with PAN is security. Since transferring of
11 Mbps the IEEE 802.11 WLAN offers. It has data across devices has become simple, a lot of
small coverage, typically about 10 m, and con- work on encryption needs to be done.
nects only a limited number of devices.
WPAN and Bluetooth have been used inter-
changeably in many technical articles. Although 10.7 Cellular Technologies
the two technologies are similar, they should not
be confused. Bluetooth is a far-field radio tech- Perhaps no single development has done more
nology that is being promoted by the Bluetooth for wireless technologies than cellular communi-
special interest group (SIP) with over 75 mem- cations. It is one of the fastest growing and most
bers. Bluetooth technology is for short-range, demanding telecommunication applications.
low-cost radio links between PCs, mobile phones, Areas of coverage are divided into small hexago-
and other electronic devices. It provides a 10 m nal radio coverage units known as cells.
A cell in the cellular network is the basic geographical unit in which the mobile users are
located.
personal bubble that supports simultaneous trans- A cellular communications system employs a
mission of both data and voice for multiple large number of low-power wireless transmitters
devices. to create the cells, which are base stations trans-
Some interesting applications of PAN include: mitting over small geographic areas that are rep-
resented as hexagons. Figure 10.5 illustrates
• Transfer of information between all the communication coverage by spatial division to
electronic devices a gadget-hungry person cells with base stations. Each cell size varies
may carry. Such devices include pagers, cel- depending on the landscape and tele-density.
lular phones, personal digital assistants Those stick towers one sees on hilltops with tri-
(PDAs), identification badges, and smart angular structures at the top are cellular telephone
cards. sites. Each site typically covers an area of 15
• Exchange of business cards by just shaking miles across, depending on the local terrain. The
hands. The electronic card is transferred auto- cell sites are spaced over the area to provide a
matically from one card device via the body to slightly overlapping blanket of coverage. The
the other person’s card device. channel is made of two frequencies: one fre-
• Office and domestic automation at home or at quency (the forward link) for transmitting infor-
the office. One is able to control lighting, heat- mation to the base station and the other frequency
ing, and even locks with a gentle touch. These (the reverse link) to receive from the base station.
devices and appliances are programmed to A typical cellular network is shown in Fig. 10.6.
communicate with each other with little or no
human intervention.
• Telemedicine with intelligent sensors moni- 10.7.1 Fundamental Features
toring specific physiological signals such as
EEG, ECG, and GSR and performing data Besides the idea of cells, the essential features of
acquisition. Such a collection of wearable cellular systems include cell splitting, frequency
medical sensors can communicate using PAN. reuse, handover, capacity, spectral efficiency,
mobility, and roaming:
Other potential applications include sensor and
automation needs, interactive toys, and location • Cell splitting: As a service area becomes full
tracking for smart tags and badges. A major prob- of users, the single area is split into smaller
124 10 Wireless Networks
Fig. 10.5 Cellular
communication
coverage by spatial
division to cells with
base stations. (Source:
“Cellular
communication network
technologies.” https://
www.tnuda.org.il/en/
physics-radiation/
radio-frequency-rf-
radiation/
cellular-communication-
network-technologies)
ones. This way, urban regions with heavy traf- the ability to reuse the same frequency many
fic can be split into as many areas as necessary times.Cellular wireless networks can reuse
to provide acceptable service, while large cell radio channels in non-adjacent cells. Several
can be used to cover remote rural regions. Cell frequency reuse patterns are in use in the cel-
splitting increases the capacity of the system. lular industry, each with its advantages and
Frequency reuse is the ability to reuse the same frequency (channel) several times.
• Frequency reuse: This is the core concept that disadvantages. Each cell is assigned three fre-
defines the cellular system. The cellular tele- quency groups. For example, the same fre-
phone industry is faced with a dilemma: ser- quencies are reused in cell designated 1, and
vices are growing rapidly, and users are adjacent locations do not reuse the same fre-
demanding more sophisticated call-handling quencies. A cluster is a group of cells; fre-
features, but the amount of the electromag- quency reuse does not apply to clusters.
netic (EM) spectrum allocation for cellular • Handoff: This is another fundamental feature
service is fixed. This dilemma is overcome by of the cellular technology. When a call is in
10.7 Cellular Technologies 125
progress and the switch from one cell to one access point to another access point in a
another becomes necessary, a handoff takes neighboring cell.
place. Handoff is important because as a • Capacity: This is the number of subscribers
mobile user travels from one cell to another that can use the cellular system. Capacity
during a call, as adjacent cells do not use the expansion is required because cellular sys-
same radio channels, a call must be either tems must serve more subscribers. It takes
dropped or transferred from one channel to place through frequency reuse, cell splitting,
another. Dropping the call is not acceptable. planning, and redesigning of the system.
Handoff was created to solve the problem. A • Spectral efficiency: This is a performance mea-
number of algorithms are used to generate and sure of the efficient use of the frequency spec-
process a handoff request and eventual hand- trum. It is the most desirable feature of a
off order.The need for handoff is determined mobile communication system. It produces a
by the quality of the signal, whether it is weak measure of how efficiently space, frequency,
or strong. A handoff threshold is predefined. and time are utilized. A cellular network (or
When the received signal level is weak and mobile network) is a network distributed over
reaches the threshold, the system provides a land areas called cells, with each served by at
stronger channel from an adjacent cell. This least one fixed-location transceiver, known as a
handoff process continues as the mobile base station. The key challenge in mobile com-
Handing off is the process of transferring the mobile unit that has a call from a voice
channel to another voice channel without interfering with the call.
moves from one cell to another as long as the munications is handing off user communica-
mobile is in the coverage area. tions from one local coverage area to the next.
Mobility: Mobility is one of the main benefits
of wireless networks. It implies that a mobile
Mobility enables the user to move around from one cell to another while
maintainng the same call without service interruption.
user has the freedom to change location without 10.7.2 Cellular Network
losing connection.
• This is made possible by the built-in handoff A typical cellular network consists of the follow-
mechanism that assigns a new frequency when ing three major hardware components:
the mobile moves to another cell. Due to sev-
eral cellular operators within the same region • Cell site (base stations): The cell site acts as
using different equipment and a subscriber is the user-to-MTSO interface. It consists of a
only registered with one operator, some form transmitter and two receivers per channel, an
of agreement is necessary to provide services antenna, a controller, and data links to the cel-
to subscribers. lular office. Up to 12 channels can operate
• Roaming: This is the process whereby a within a cell depending on the coverage area.
mobile moves out of its own territory and • Mobile Telephone Switching Office (MTSO):
establishes a call from another territory. Cell- This is the physical provider of connections
to-cell roaming takes place when a wireless between the base stations and the local
client moves away from communicating with exchange carrier. MTSO is also known as
126 10 Wireless Networks
mobile switching center (MSC) or digital may be regarded as an extension of the cellu-
multiplex switch-mobile telephone exchange lar network to the 1900 MHz band.
(DMS-MTX) depending on the manufacturer. • Cellular generations: Different cellular gen-
It manages and controls cell site equipment erations have been developed since early
and connections. It supports multiple-access 1980s. First generation, 1G, was analog tele-
technologies such as AMPS, TDMA, CDMA, communications standard introduced in the
and CDPD. As a mobile moves from one cell 1970s for voice communications with a data
to another, it must continually send messages rate up to 2.4 kps. It used FM and FDMA and
to the MTSO to verify its location. a bandwidth of 30 kHz. The major problems
• Cellular (mobile) handset: This provides the with 1G are poor voice quality, poor battery
interface between the user and the cellular quality, and large phone size. There was no
system. It is essentially a transceiver with an worldwide standard. The second generation,
antenna and is capable of tuning to all chan- 2G, was based on digital technology and net-
nels (666 frequencies) within a service area. It work infrastructure GSM (Global System for
also has a handset and a number assignment Mobile Communications), enabling text mes-
module (NAM), which is a unique address sages, and with a data speed of up to 64 Kbps.
given to each cellular phone. The digital cellular systems conform to at
• Global System for Mobile Communications least three standards: GSM for Europe and
(GSM): The GSM network is divided into international applications, one for the USA,
three major systems: the switching system, the and JDC for Japan. The third generation, 3G,
base station system, and the operation and was introduced in year 2000, with a data speed
support system. Its architecture was designed of up to 2 Mbps.
to handle international roaming. GSM is the
most common standard and is used for a • The cellular systems use TDMA, CDMA,
majority of cell phones. Since 1991, mobile CSMA, and FDMA. It introduced high-speed
radio has been dominated by the GSM system. Internet access. It used technologies such as
GSM has become the most dominant system W-CDMA and HSPA (high-speed packet
used in the world. access). It provided IP connectivity for real-
• Personal communications service (PCS): The time and non-real-time services. The develop-
GSM (Global System for Mobile ment of 3G was mainly driven by demand for
Communications) digital network has per- data services over the Internet. The fourth
vaded Europe and Asia. A comparable tech- generation, 4G, may be regarded as the exten-
nology known as personal communication sion of 3G but with a faster Internet connec-
systems (PCS) is making inroads in the tion, more bandwidth, and a lower latency. It
USA. PCS is a relatively new concept that will is capable of providing much higher data rates
expand the horizon of wireless communica- and any kind of service at anytime, anywhere.
tions beyond the limitations of current cellular The expected rates will be in the range of 1Gb
systems to provide users with the means to in the WLAN environment and 100 Mb in cel-
communicate with anyone, anywhere, any- lular networks. G4 technologies, such as
time. It refers to digital wireless communica- WiMAX and LTE (Long-Term Evolution),
tions and services operating at broadband claim to be about five times faster than 3G ser-
(1900 MHz) or narrow-band (900 MHz) fre- vices. 5G or 5th generation wireless systems
quencies. Its goal is to provide integrated move us beyond networks design for mobile
communications (such as voice, data, and devices alone toward systems that connect dif-
video) between nomadic subscribers irrespec- ferent types of devices operating at high
tive of time, location, and mobility patterns. It speeds. The 5G wireless technology is a mul-
promises near-universal access to mobile tele- tipurpose wireless network for mobile, fixed,
phony, messaging, paging, and data transfer. It and enterprise wireless applications. 5G will
10.8 Satellite Networks 127
Fig. 10.7 Generations of cellular networks (Source: A. Nash, “Introduction about previous generations of mobile
networks,” https://mobiletrans.wondershare.com/5g/g-generations.html)
be a new mobile revolution as it is expected to satellite communication has the following merits
provide gigabit-per-second data rates anytime, over terrestrial communications:
anywhere. In a 5G wireless network, every
mobile phone will have an IPv6 address • Coverage: Satellites can cover a much large
depending on the location and network being geographical area than the traditional ground-
used. Although 5G technology promises a based system. They have the unique ability to
plethora of new applications, the technology cover the globe.
is still in development stage. Figure 10.7 • High bandwidth: A Ka band (27–40 GHz) can
shows generations of wireless network. deliver throughput of gigabits per second rate.
• Low cost: A satellite communications system
is relatively inexpensive because there are no
10.8 Satellite Networks cable-laying costs and one satellite covers a
Satellite (spacecraft) communications system consists of two parts, the space and
ground segments, and is designed to implement go-anywhere-call-anywhere-from-
anywhere concept.
Of course, satellites systems do have some • Middle earth orbit (MEO) satellites: They
disadvantages. These include propagation delay, orbit the earth at 5000–12,000 km. Although
dependency on a remote facility, and attenuation the lower orbit reduces propagation delay to
due to atmospheric particles (e.g., rain, snow) only 60–140 milliseconds round trip, it
which can be severe at high frequencies. takes 12 MEO satellites to cover most of the
planet. MEO systems represent a compro-
mise between LEO and GEO systems, bal-
10.8.1 Type of Satellites ancing the advantages and disadvantages of
each.
There were only 150 satellites in orbit by • Low earth orbit (LEO) satellites: They circle
September 1997. Currently there are over 2218 the earth at 500–3000 km. For example, the
artificial satellites orbiting the earth. With this Echo satellite circled the earth every 90 min.
increasing trend in the number of satellites, there To provide global coverage may require as
is a need to categorize them according to the many as 200 LEO satellites. Latency in a LEO
height of their orbit and “footprint” or coverage system is comparable with terrestrial fiber
on the earth’s surface. They are classified as optics, usually less than 30 millisecond round
follows: trip. LEO satellites are suitable for
PCS. However, LEO systems have a shorter
• Geostationary earth orbit (GEO) satellites: life space of 5–8 years (compared with
They are launched into a geostationary or 12–15 years for GEO systems) due to the
geosynchronous orbit, which is 35,786 km increased amount of radiation in low earth
above the equator. (Raising a satellite to such orbit. An example is OrbComm designed by
an attitude, however, required a rocket, so Orbital Corporation and consists of 36 satel-
that the achievement of a GEO satellite did lites, each weighing 85 pounds.
not take place until 1963.) A satellite is said
to be in geostationary orbit when the space A typical satellite network is shown in
satellite is matched to the rotation of the Fig. 10.8. The evolution from GEO to MEO and
earth at the equator. A GEO satellite can LEO satellites has resulted in a variety of global
cover nearly one-third of the earth’s surface, satellite systems. Several attractive services that
i.e., it takes three GEO satellites to provide can be offered by utilizing satellite technology
global coverage. Due to their large coverage, include (1) personal communication service
GEO satellites are ideal for broadcasting and (PCS) in a global scale, (2) digital audio broad-
international communications. Examples of casting (DAB), (3) environmental data collection
GEO satellite constellations are Spaceway and distribution, (4) remote sensing/earth obser-
designed by Boeing Satellite Systems and vation, and (5) several military applications and
Astrolink by Lockheed Martin. There are at satellite radio. Examples of satellite systems
least three major objections to GEO satel- include Iridium, Globalstar, GPS, and ICO. The
lites. First, there is a relatively long propaga- most popular is GPS (Global Positioning
tion delay (or latency) between the instant a System), which is a US-owned utility that pro-
signal is transmitted and when it returns to vides users with positioning, navigation, and tim-
earth (about 240 milliseconds). Second, there ing services. This system consists of 24
is a lack of coverage at far northern and satellites.
southern latitudes. U nfortunately, many of Every nation of the world has the right to
the European capitals, including London, access the satellite orbit, and no nation has a per-
Paris, Berlin, Warsaw, and Moscow, are north manent right or priority to use any particular orbit
of this latitude. Third, both the mobile unit location. Satellite services are classified into 17
and the satellite of a GEO system require a categories: fixed, intersatellite, mobile, land
high transmit power. mobile, maritime mobile, aeronautical mobile,
10.8 Satellite Networks 129
broadcasting, earth exploration, space research, to the earth (the downlink). Hence the satellite
meteorological, space operation, amateur, radio- must typically have a receiver antenna, a receiver,
determination, radio navigation, maritime radio a transmitter antenna, a transmitter, some mecha-
navigation, and standard frequency and time sig- nism for connecting the uplink with the down-
nal. The International Telecommunication Union link, and a power source to run the electronic
(ITU) is responsible for allocating frequencies to system. These components are explained as
satellite services. The Ku band (12–18 GHz) is follows:
presently used for broadcasting services and also
for certain fixed satellite services. The C band • Transmitters: The amount of power required
(4–8 GHz) is exclusively for fixed satellite ser- by a satellite transmitter to send out depends
vices, and no broadcasting is allowed. The L on whether it is GEO or LEO satellite. The
band (1–2 GHz) is employed by mobile satellite GEO satellite is about 100 times away as the
services and navigation systems. LEO satellite. Thus, GEO would need 10,000
times as much power as LEO satellite.
Fortunately, other parameters can be adjusted
10.8.2 Satellite Components to reduce this amount of power.
• Antennas: The antennas dominate the appear-
Every satellite communication involves the trans- ance of a communication satellite. The antenna
mission of information from a ground station to design is one of the more difficult and chal-
the satellite (the uplink), followed by a retrans- lenging parts of a communication satellite
mission of the information from the satellite back project. The antenna geometry is constrained
130 10 Wireless Networks
physically by the design and the satellite Transponders: These are the devices each satel-
topology. lite must carry. They receive radio signals at one
Power generation: The satellite must generate frequency, amplify them, and convert them to
Fig. 10.9 A typical wireless sensor network. (Source: Yu and Park, 2020)
Fig. 10.10 A typical WBAN. (Source: “PhD in wireless body area networks.” http://phdinfo.org/PhD_in_
WirelessBodyAreaNetwork.html)
there may be both sensing and non-sensing nodes specific application. Applications of WSNs typi-
in a WSN; i.e., all sensors are nodes but not all cally involve some kind of monitoring, tracking,
nodes are sensors. A sensor has four operating or controlling. Network topologies in a WSN
modes: transmission, reception, idle listening, may range from star to a full mesh topology. The
and sleep. Collision occurs when two or more way the sensors are connected determines
nodes transmit at the same time. A sensor node is whether the sensors can be safely, securely, and
designed to use an operating system (OS). cost-effectively deployed in the typical harsh
TinyOS (developed at UC Berkeley) is perhaps industrial environments. One of the objectives of
the first operating system specifically designed WSNs is to minimize the running cost, and there-
for WSNs. Most WSNs are application specific fore star and tree topologies are used because
and are designed to meet the challenges for that they do not require any routing table to send the
132 10 Wireless Networks
risk due to eavesdropping. Although encryp- 5. Wireless PAN is a near-field intrabody com-
tion techniques and password protection can munication. It is a wireless connection
be used for security, some of the encryption between PCs, peripherals, and portables that
techniques can be easily compromised. will let the devices share information without
• Limited bandwidth: Wireless networks have having to make a physical connection.
limited bandwidth. For example, they cannot 6. A cellular network is based on dividing a geo-
support video teleconferencing. The maxi- graphic area into cells, with each cell having
mum speed of IEEE 802.11n standard net- its own transmitter-receiver (antenna) under
work is 600 Mbps, which is only almost half the control of a base station. It operates on the
the speed of a wired network. principles of cell, frequency reuse, and
• Limited range: The typical range of a medium- handoff.
range wireless network is up to around 7. Satellite networks are used when global cov-
100 meters. This may be good enough for a erage is needed. Each satellite is equipped
home or a small office, but insufficient for with various transponders consisting of a
larger structures. transceiver and an antenna.
• Interference: Wireless networks are subject to 8. A wireless sensor network (WSN) consists of
jamming, electromagnetic interference, and a large number of sensor nodes deployed over
fluctuations in available bandwidth. Wired a geographical region with the sensor nodes
LANs offer superior performance. monitoring physical or environmental
• Cost: Wireless components often cost more conditions.
than the equivalent wired Ethernet products.
For example, wireless access points may cost
three or four times as much as Ethernet cable Review Questions
adapters.
10.1 Which of these networks is not wireless?
(a) Ethernet (b) IEEE 801.11 (c) Cellular net-
Summary work (d) Satellite
10.2 Which of the following networks covers the
1. Wireless network is the technology that pro- widest range?
vides seamless access to information any- (a) WLAN (b) WMAN (c) WWAN (d)
where, anyplace, and anytime without wires WPAN
or cables. 10.3 Which of the following networks covers a
2. Wireless LAN allows laptops, PCs, and users home or building?
to link through radio waves or infrared links, (a) Wi-Fi (b) WiMAX (b) 3G and 4G (d)
eliminating the need for restrictive cables. Satellite
Wi-Fi is a matured and popular standard for 10.4 The following are needed in a typical wire-
WLAN due to its use in hot spots (hotel, air- less LAN except:
port, etc.). (a) Antenna (b) Base station (c) Router (d)
3. A wireless MAN is a new technology that Gateway
provides services to metropolitan or regional 10.5 Which of the following is not a characteris-
areas within a radius of 50 km. WiMAX is a tic of a cellular network?
standard WMAN based on IEEE 802.16 and (a) High bandwidth (b) Mobility (c)
can provide wireless access to the Internet Frequency reuse (d) Cell splitting
through a service that covers an entire metro- 10.6 Which of these is not a cellular technology:
politan area. (a) GSM (b) PCS (c) G4 (d) GEO
4. Wireless WAN covers a wide area and extends 10.7. Which of the following bands is not used
beyond 50 kilometers. There are mainly two for satellite communication?
available WWAN technologies: cellular tele- (a) MF (b) Ku (c) L (d) C
phony and satellites.
10.10 Advantages and Disadvantages 135
Abstract
transmitted or stored in these computer networks.
Therefore network security is very much needed
Network security is very much needed by by users and more so by businesses. In this chap-
users and more so by businesses. The study of ter, the important aspects of network security are
this very topic is important to learning how discussed. The chapter characterizes what mal-
security is implemented and maintained in any ware, firewall, encryption, digital signatures,
network system. This chapter covers the intrusion detection and prevention, and cyberse-
important aspects of network security. It also curity issues are and how they relate to network
characterizes what malware, firewall, encryp- security.
tion, digital signatures, intrusion detection and
prevention, and cybersecurity issues are and
how they relate to network security. 11.2 Malware
Malware can be defined as software whose intent is nothing but to be malicious to
systems such as computer system networks.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 137
M. N. O. Sadiku, C. M. Akujuobi, Fundamentals of Computer Networks,
https://doi.org/10.1007/978-3-031-09417-0_11
138 11 Network Security
owner or user on any activity that is being per- ware that attempts to destroy and erase all that
formed with the network hardware. you have in the network and locks down the
computer network. The worse is that it
demands some ransom to be paid by the owner
11.2.1 The Function of a Malware less it goes on the destroying and erasing
mode hence the name ransomware. It is also
There are different types of malware, and each called scareware.
one has its own functional characteristics that
help to distinguish what kind of malware it is,
especially in the way the malware proceeds to 11.2.2 Malware Removal Solutions
cause damage to the network. Some of the com-
mon types of the malware are as follows: Malwares are characteristically different. They
therefore require different ways of removing
• Trojans: The Trojan malware makes you them once they have infected the network.
believe that it is the real software in the system However, installing and using anti-malware soft-
network. It has a discrete behavior and the ten- ware is one of the best ways to take care of mal-
dency to make it possible for other malwares wares. These anti-malwares are also called
to make their way into the system network. antivirus software. The other way that can be
• Spyware: Just as the name sounds, the spy- used in the removal of malwares that have
ware hides inside the system network spying infected the network is to carefully avoid suspi-
on all the activities going on in the system’s cious emails, websites, and links. Some of the
network. A few examples of such activities the anti-malware removal software tools are:
spyware can monitor and spy on are when you
enter your login and credit card information • TotalAv: This anti-malware protects all net-
and the websites you go to in the Internet. work system devices such as Windows, Mac,
• Virus: Viruses can take the form of an execut- Android, and iOS. It protects against malware,
able file. In its characteristic mode, it attaches adware, and spyware.
itself to a clean file and then proceeds to infect • Scanguard: This is a malware-destroying soft-
and damage the rest of the clean files in the ware. It scans and removes viruses, spyware,
system network. Viruses have the functional and malware.
capability to spread very fast and cause lots of • Norton: The Norton anti-malware removes
damage if not completely corrupting or delet- malware, spyware, and adware, blocks phish-
ing files they find within reach. ing websites, and provides Internet security
• Worms: Worms have the ability to infect the and web protection.
entire networks both locally and across the • PC Protect: It protects against all threats includ-
Internet. The worms infect each networked ing optimizing PCs and provides web security.
system consecutively. • Malwarebytes: It is an anti-malware software
• Botnets: When you have networks of infected tool that removes malware, spyware, and
computer and they work together in a control- adware, provides web protection, and has
ling manner by an attacker, they are called VPN Internet security.
botnets or botnet malwares. • McAfee: This anti-malware removes malware,
• Adware: This is the kind of malicious mal- spyware, and adware, provides web protec-
ware that keeps on popping up all kinds of tion, and has VPN Internet security.
annoying advertisements on the screen and • Avira: The Avira anti-malware software tool
makes the security of system network terrible removes malware, spyware, and adware,
to manage. It is very harmful and does slow blocks phishing websites, has VPN Internet
work using the system network. security, and provides firewall and web pro-
• Ransomware: This is a very dangerous mal- tection including browser management.
11.3 Firewall 139
• BullGuard: The BullGuard anti-malware soft- operates by monitoring the fields in the header of
ware tool removes malware, spyware, and each packet. When it is combined with circuit
adware, blocks phishing websites, has VPN and application gateways, it becomes what can be
Internet security, and provides firewall and called a dynamic packet filtering process. The
web protection including browser circuit gateway monitors the Transmission
management. Control Protocol (TCP) handshaking between
• Avast: The Avast anti-malware software tool packets to determine whether a requested session
has the capability to instantly identify harmful is legitimate while the application level gateway
threats. It speeds up overall performance. It is implemented through a proxy server, which
deletes redundant files and secures Internet acts as an intermediary between a client and a
connection. server. The packet filter is used to filter incoming
• Bitdefender: The Bitdefender anti-malware or outgoing interfaces such as ingress filtering of
software tool removes malware, spyware, and spoofed Internet Protocol (IP) addresses and
adware, blocks phishing websites, has VPN egress filtering. It permits or denies certain ser-
Internet security, and provides firewall and vices and requires intimate knowledge of the
web protection including browser TCP and the User Datagram Protocol (UDP) port
management. utilization on a number of operating systems.
Figure 11.2 shows the strategic positioning of a
firewall between the local area network (LAN)
11.3 Firewall and the wide area network (WAN). This helps to
Any network security system that has the capability of monitoring both incoming and
outgoing network traffic based on a well-defined security rules and uses information to
determine whether to block or allow a specific traffic to the network system is known as a
firewall security system.
11.3.1 The Firewall Protection prevent unwanted information from the LAN to
the WAN providing the much needed network
The illustration of how a firewall can protect an security for WAN.
organization from unwanted traffic from an
Internet network system is shown in Fig. 11.1.
The packet filter is one of the firewall mecha- 11.3.2 Benefits of Having a Firewall
nisms that are used to protect the network of an
organization. It is placed in the router that con- The following are some of the benefits of having
nects the organization’s network to the Internet. It a firewall for network security.
Fig. 11.1 An illustration of a firewall using packet filter that protects the organization’s network against unwanted traf-
fic from the Internet
140 11 Network Security
Fig. 11.2 An
illustration of a firewall
between LAN and WAN
• It offers a central point of contact for informa- • It cannot protect against attacks that do not go
tion delivery service to customers. through the firewall.
• It is the perfect point to audit or log Internet
usage.
• A firewall is a logical place to deploy a network 11.4 Encryption
address translator (NAT) that can help alleviate
Encryption is the mechanism used to ensure that the content of the information from point
A (source) to point B (destination) still retains its original content and integrity.
the address space shortage and eliminate the There are several methods by which encryption
need to renumber when an organization can be implemented. Generally as an example,
changes Internet service providers (ISPs). the sender and the receiver must both have a copy
• If an organization does not have a firewall, of the encryption key, and it is kept secret. The
each host system on the private network is sender uses the key to produce encrypted infor-
exposed to attacks from other hosts on the mation that is transmitted across the network.
Internet. The receiver uses the key to decode the encrypted
• In general, firewalls offer a convenient point information. That is, the encrypt function used by
where Internet network security can be moni- the sender takes two arguments, namely, a key, K,
tored and alarms generated. and the information to be encrypted, I. The func-
tion produces an encrypted, E, version of the
information I, as shown in Eq. 11.1.
11.3.3 The Limitations of a Firewall
E encrypt K ,I (11.1)
The limitations of a firewall are as follows:
The decrypt function reverses the mapping to
• It cannot protect against data-driven attacks. A produce the original information I as shown in
data-driven attack occurs when seemingly Eq. 11.2.
harmless data is mailed or copied to an inter-
I decrypt K ,E (11.2)
nal host and is executed to launch an attack.
• It cannot protect against the transfer of virus-
infected software or files. Equation 11.3 shows the decrypted version of the
• It cannot protect against the types of threats encrypted information I:
posed by traitors or unwitting users.
• It creates a single point of failure. I decrypt K ,encrypt K ,I (11.3)
11.4 Encryption 141
Example 11.1 Using additive cipher, let the is called the private key, and it must be kept
alpha numeric assignments be a = 1 to z = 26. Let secret, while the other, called the public key, is
the key (K) = 14 and the information (I) to be made public along with name of the user so that
encrypted (E) be “hello.” Therefore, let: everyone knows the value of the key as shown in
Fig. 11.4. The mathematical relationship as
Plaintext: Encryption: Cipher text:
h → 08 (08 + 14) mod 25 22 → V shown in Eqs. 11.4 and 11.5 of the encryption
Plaintext: Encryption: Cipher text: function has the property that the information
e → 05 (05 + 14) mod 25 19 → S encrypted with the public key cannot be easily
Plaintext: Encryption: Cipher text: decrypted except with the private key and the
l → 12 (12 + 14) mod 25 01 → A information encrypted with the private key can-
Plaintext: Encryption: Cipher text:
not be decrypted except with the public key.
l → 12 (12 + 14) mod 25 01 → A
Plaintext: Encryption: Cipher text:
The relationships between the encryption and
o → 15 (15 + 14) mod 25 04 → D the decryption as with the two keys can be
expressed mathematically as follows. Let I
The cipher text is therefore “VSAAD.” denote the information, pub-ul denote the 1’s
public key, and prv-ul denote the use 1’s private
key as shown in Eqs. 11.4 and 11.5, respectively.
11.4.1 Public Key Encryption Therefore,
Transmitted
cipher text
Plaintext
Plaintext Decryption
Encryption Output
Input algorithm
algorithm
(e.g., DES) (Reverse of
encryption)
Mellisa’s Joe’s
key public
-key
John’s Ken’s key
key Carol’s
Carol’s private key
public key
Transmitted
Plaintext Plaintext
Encryption Decryption algorithm Output
Input algorithm (Reverse of encryption algorithm)
(a)
(e.g., DES) Encryption
Carol’s
public-key
ring
Melisa’s Key Ken’s
key
John’s
Joe’s key Joe’s
private key public key
Transmitted
cipher text
noted that no other recipient can decrypt the decryption. Its primary benefit is that it allows
information because it is only Carol that knows people who have no preexisting security arrange-
Carol’s private key. The same process is what all ment to exchange information securely. The need
of the other participants will follow in their com- for sender and receiver both sharing the secret
munication processes using their public and pri- keys through some secure channel is eliminated.
vate keys as shown in Fig. 11.4a, b, encryption All of the communications involve only public
and authentication processes, respectively. keys, and no private key is ever transmitted or
shared. Some of the examples of public key cryp-
tosystems were invented by Ron Rivest, Adi
11.4.2 Types of Encryptions Shamir, and Leonard Adleman, named (RSA); by
Diffie and Hellman, named Diffie-Hellman; by
There are basically three types of encryptions: David Kravitz, named the Digital Signature
transparent encryption, semi-transparent encryp- Algorithm (DSA); and by Taher Elgamal, named
tion, and manual encryption. In the transparent Elgamal. In addition, we have the Pretty Good
type, encryption is performed at low-level during Privacy (PGA) which is fairly popular and inex-
all operations permanently. It is difficult to imple- pensive. As a result of the fact that the conven-
ment correctly and generally it does not work tional cryptography was once the only available
well with networking. It is easy to use and most means for relaying secret information, the
secure. expense of secure channels and key distribution
In the semi-transparent encryption also known relegated its use only to those who could afford it,
as “on-the-fly encryption,” it does not operate such as governments and large banks. Public key
permanently; however, it is before or after access. encryption is the technological revolution that
It has the potential capability to cause degrada- provides strong cryptography to the public.
tion of the computer’s efficiency. When the data
to be encrypted are too great, it can possibly
cause a loss of data. 11.4.4 Digital Certificates and Digital
In the case of the manual encryption, the pro- Signatures
cess is completely initiated by the user. It demands
the user’s active participation. Even though there A digital certificate is a unique identifier assigned
is element of risk involved, it is reliable. to a user by a certification authority to verify the
identity of the user. A certification authority ven-
dor becomes the private company that certifies
11.4.3 Encryptions and Decryptions the user whether the person is who the individual
claims to be. They work together with the credit
In the symmetric/private key encryption case, a card verification companies or other financial
single number key is used to encode and decode institutions in order to verify the identity of the
the data. The sender and receiver both must know certificate’s requesters. The digital certificate
the key. The Data Encryption Standard (DES) is received by the user includes a copy of its public
the most widely used standard for symmetric key. This digital certificate’s owner makes its
encryption. This is because each sender and public key available to anyone wanting to send
receiver would require a different key. This type encrypted documents to the certificate’s owner.
of encryption is basically used by government The two main functions of the digital signa-
entities. It is rarely used for e-commerce transac- ture are to identify the signer and the formal
tions over the Internet. It requires a secure way to approval of the document to be transmitted.
get the key to both parties. Asymmetric encryption is used to create digital
In the asymmetric/public key encryption case, signatures. It is used on the Internet to authenti-
there is no secret in encryption; there is secret in cate both users and vendors. Digital signature is
144 11 Network Security
an encrypted attachment added to the electronic The key size of DES is 56 bit which is compara-
message to verify the sender’s identity. Instead of tively smaller than AES which has 128-,192-, or
encrypting information using someone else’s 256-bit secret key. The rounds in DES include
public key, you encrypt it with your private key. Expansion Permutation, Xor, S-box, P-box, Xor,
If the information can be decrypted with your and Swap. On the other hand, rounds in AES
public key, then it must have originated with you. include SubBytes, ShiftRows, MixColumns, and
AddRoundKeys. DES is less secure than AES
because of the small key size. The AES is com-
11.4.5 Encryption Standards paratively faster than DES.
the plaintext is divided into two halves. The DES Intrusions can happen in different ways like a sys-
form of standard takes input as 64-bit plain text tem being infected with malwares like worms and
and 56-bit key to produce 64-bit ciphertext. spywares, attackers gaining unauthorized access to
There are differences between the DES and systems from the Internet, and authorized users of
the AES standards. The basic difference between systems who misuse their privileges or attempt to
the two is that the block in DES is divided into gain additional privileges for which they are not
two halves before further processing, whereas in authorized. Although many intrusions are mali-
AES, the entire block is processed to obtain cious in nature, many others are not; for example,
ciphertext. The DES algorithm works on the a person might mistype the address of a computer
Feistel Cipher principle, and the AES algorithm and accidentally attempt to connect to a different
works on substitution and permutation principle. system without authorization.
Intrusion detection is the process of monitoring the events occurring in a computer system or
network and analyzing them for signs of possible intrusions (incidents).
Intrusion detection system (IDS) is software that automates the intrusion detection process. The
primary responsibility of IDS is to detect unwanted and malicious activities.
Intrusion prevention system (IPS) is software that has all the capabilities of an intrusion
detection system and can also attempt to stop possible incidents.
11.5 Intrusion Detection and Prevention Systems 145
• They help to identify problems with security The following should be the steps under the “set-
policies. up at the central detection point” part:
• They help to document existing threats.
• They identify possible incidents, logging infor- • Install OPNET 14.0 at the central detection
mation about them, attempting to stop them, point (i.e., software on a computer).
and reporting them to security administrators. • Replicate the actual network in OPNET 14.0
• They help deter individuals from violating at the central detection point with reference to
security policies. Fig. 11.5 or the actual implementation scheme
• They help to identify possible incidents, log- for the IDS.
ging information about them, attempting to • Install a receiver to receive the packet arrival
stop them, and reporting them to security rate data, etc. from the network (i.e., at the end
administrators. of the multi-resolution techniques).
• They are known to serve as one of the cost- • Furnish the replica of the actual network
effective ways to block malicious traffic. developed in OPNET with the packet arrival
• They help to detect and contain worm and rate data, etc. of all the IDSP nodes.
virus threats, to serve as a network monitoring • Carry out all the steps discussed under the
point, to assist in compliance requirements, simulation studies above.
and to act as a network sanitizing agent.
Figure 11.5 shows the overview of the imple-
mentation scheme for the automated IDS technique.
11.5.2 Implementation of IDS Only two IDSC nodes can be efficiently imple-
Technique mented for this sample network. Each IDSC node is
linked to four IDSP nodes for detection. Please note
Implementation of this IDS technique involves that LAN 1 does not form part of the IDS nodes
two major parts: “set-up inside the network” and because it is not linked directly to any of the chosen
“set-up at the central detection point.” The fol- central IDS nodes. All security data from the IDSC
lowing should be the steps under the “set-up and IDSP nodes will be directly transmitted to the
inside the network” part: central detection point for analysis. This is done
using the multi-resolution techniques.
• Group all the nodes in the network into vari-
ous IDS circles (i.e., each IDS circle consists
of one central IDS or IDSC and all the periph- 11.6 Cybersecurity
eral IDSs or IDSPs linked to it).
The technological process by which computers, networks, programs, and data can be protected
from unauthorized access or attacks that are aimed to collect information or cause harm
maliciously is known as cybersecurity or information technology security.
Cybersecurity is the practice of defending electronic systems, data, mobile devices, computers,
networks, and servers from malicious attacks.
146 11 Network Security
Internet
Central detection
Firewall point
Central router
LAN 1
LAN 2
(IDSP1) LAN 6
LAN 4 (IDSP4 &
(IDSC) IDSP1)
LAN 9
(IDSP4)
LAN 3
(IDSP2)
LAN 8
(IDSC)
LAN 5
(IDSP3)
LAN 7
(IDSP2)
LAN 10
(IDSP3)
Abstract Keywords
The IoT could be defined as a network of -Internet enabled devices, machines, objects, and
people which work together autonomously by gathering surrounding data, performing
analysis on it, and providing valuable information to the IoT stakeholders along with
accomplishing a specific task or function.
IoT could also be defined as a network of sensors and actuators embedded into physical
objects which has the ability to connect to the Internet and gather and exchange data with
other objects/things, people, machines, and systems in the network.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 149
M. N. O. Sadiku, C. M. Akujuobi, Fundamentals of Computer Networks,
https://doi.org/10.1007/978-3-031-09417-0_12
150 12 Emerging Technologies
Fig. 12.1 The Gartner hype cycle for emerging technologies, 2017. (Source: https://www.gartner.com/smarterwith-
gartner/top-trends-in-the-gartner-hype-cycle-for-emerging-technologies-2017/)
These “things” or “devices” are capable of • 2011: IPV6 launched, one of the enabling
autonomously gathering data and information technologies for identifying billions of smart
from their surroundings, which can be used in things, and Gartner included Internet of
accomplishing a specific task. Recently, IoT has Things in the hype cycle of emerging tech-
gained rapid momentum and is being explored in nologies (reached the peak of cycle around
every field, such as commerce, government, aca- 2014)
demia, and industrial applications. The advance- • 2014–Present: Big companies started to take
ments in the Internet technologies and connected IoT initiatives: Cisco, IBM, Amazon, etc.
smart objects have contributed in making IoT a • 2014–Present: Commercial hardware plat-
widely pervasive concept. IoT applications and forms for IoT (e.g., Arduino) and IoT software
services have tremendously changed our lives platforms (e.g., IBM Watson), IoT (using
and will continue to do so in the future. However, blockchains), Amazon AWS IoT, Azure IoT
there are many challenges associated with IoT, Suite, etc.
such as:
• Limited resources (e.g., power, storage, etc.) 12.1.2 Evolution of Internet of Things
• Scalability
• Heterogeneity The evolution of IoT started with the following
• Security ideas and technologies:
• Privacy
• Concept of IoT gained momentum with
Many researchers and industry players are advancements in wireless technologies and
addressing these challenges with significant Radio-Frequency Identification (RFID)
research and innovative initiatives for contin- technology.
ued success of IoT. Cloud computing is one of • Public Internet and World Wide Web-enabled
the most important enabling infrastructures for machines to talk to each other.
IoT. • Number of connected devices increasing at an
exponential rate.
• Launch of IPV6—unique identification of
12.1.1 History of Internet of Things things in virtual space.
• IoT architectures: three basic layers—object/
• 1982: An Internet-connected coke machine perception layer, middleware layer(s), and
was built at Carnegie Mellon University for application layer as shown in Fig. 12.3.
inventory management and query the coldness • Recently, smart devices developed and
of coke. deployed in the industry such as NEST (smart
• Early 1990s: Research and publications in thermostat, light bulbs) and connected home
ubiquitous computing by Mark Weiser’s con- appliances (refrigerator, cameras, etc.).
cept of connected home appliances by Reza • With cloud computing capabilities, IoT plat-
Raji. forms were introduced by major cloud ser-
• Late 1990s: Device-to-device communication vices providers (e.g., Amazon, IBM, Google,
first introduced by Bill Joy. etc.).
• 1999: Kevin Ashton, founder of Auto-ID • Internet of Everything (IoE) by CISCO: net-
Center at MIT, first coined the term Internet of worked connection of people, process, data,
Things and identified Radio-Frequency and things.
Identification (RFID) technology as the foun- • Network of things (NoT) by NIST: model is
dation of IoT. based on four fundamentals at the heart of
• 2008–2009: The number of connected devices IoT—sensing, computing, communication,
surpassed the human population. and actuation.
152 12 Emerging Technologies
Fig. 12.3 The IoT architecture. (a) Three-layer. (b) Middle-ware based. (c) SOA based (d) Five-layer
According to Gartner hype cycle for emerging 12.1.3 Examples of Various Internet
technologies as of July 2017 as shown in of Things
Fig. 12.1, IoT platforms will move toward the
peak of the cycle and are expected to reach the IoT is applied in various areas of life such as
plateau within the next 2–5 years. Influenced by shown in Fig. 12.4:
these predictions and advancements in the IoT
arena, numerous IoT applications and services • Transportation and Logistics
are being developed and deployed in different Sensors enabled traffic management,
sectors, such as: mobile ticketing, smart parking, and inven-
tory and supply chain management.
• Industry • Healthcare
• Government Smart medical devices, remote patient
• Education monitoring, and ambient assisted living for
• Transportation elderly and chronic disease patients.
12.1 Internet of Things 153
Fig. 12.4 IoT
application domains.
(Source: Bhatt, Smriti,
Farhan Patwa, and Ravi
Sandhu. “An Access
Control Framework for
Cloud-Enabled Wearable
Internet of Things.” In
3rd International
Conference on
Collaboration and
Internet Computing
(CIC), pp. 530–538.
IEEE, 2017)
perform actions without the manual assistance • Leveraging of the virtually unlimited resources
of humans. The lightweight M2M is the indus- for IoT
try open protocol from the Open Mobile • Providing secure bidirectional communica-
Alliance built to provide a means to remotely tion: device-to-cloud and cloud-to-device
perform service enablement and application • Managing IoT security
management for “Internet of Things” embed- • Data storage
ded devices and connected appliances. • Analysis
• Cloud Computing and Big Data Analytics • Visualization (through application domains as
• Cloud computing and big data analytics were shown in Fig. 12.4)
initiated by information technology (IT) com-
munity. Both are very important in many of
the enabling technologies such as in building 12.2 Big Data
energy management analysis. The cloud com-
puting has its own advantages because of its The term big data refers to the collection of an
virtualized resources, parallel processing, immense amount of data that is collected every
security, and data service integration with second of every minute of every hour of every
scalable data storage. day. The collection of such data is always a con-
• Smartphones and Mobile Computing tinuous process. The amount of such data is
• Smartphones are cell phones that allow the hard to store and hard to analyze. In addition to
user to do more than calling on the phone or the analysis of the data, there is the need to uti-
sending text messages. Smartphones can be lize the data in order to improve systems and
used to browse the Internet and run software operational functions. We will explore what big
programs like a computer. They use touch data is and how it came to be as well as how big
screens to allow users to interact with them. data can be applied to different concepts in the
Mobile computing is a “human-computer next section.
interaction” that transports data, voice, and
video over a network via a mobile device.
These mobile devices can be connected to a 12.2.1 What Is Big Data?
local area network (LAN), and they can also
Big data is the collection of data from a multitude of sources from anything done digitally.
take advantage of Wi-Fi or wireless technol- The collection of data has grown exponentially
ogy by connecting through a wireless local over the years. In 2003, 5 exabyte of data were
area network (WLAN). created by people in a year. It is hard to imagine
• Others: Cloudlets, Fog Computing, Edge that that size of data can now be created within
Computing, and Dew Computing 2 days. In 2012, the digital world expanded to
2.72 zettabytes of data. The sheer amount of data
• Cloudlets, fog computing, edge computing, that are created every day is mind-boggling. The
and dew computing are computing models human face of big data is a global project that
proposed to provide some features that cloud centers on the creation of real-time data collec-
computing cannot provide. They share one tion and analysis of large data. This media project
common feature: they all perform computing deduces many statistics such as Facebook having
tasks at devices that are closer to users. They 955 million active monthly accounts with 70 lan-
can be called post-cloud computing models. guages being used. Approximately 140 billion
photos are uploaded on a monthly basis by just
In the cloud-enabled IoT platforms, the following Facebook. When it comes to sites like YouTube,
benefits can be expected: you will find that for every 60 s, 48 h of video are
12.2 Big Data 155
uploaded and 4 billion views take place every amount of data created has outgrown traditional
day. Data can also be extracted from sending an storage and analysis techniques.
email to a friend and other digital sources that we
have at our disposal today and that will be made
available in the future. As an example, a sensor in 12.2.2 The Evolution of Big Data
the Fitbit Blaze has the ability to keep track of the
numbers of steps taken in a day, the sleeping pat- Data have always been collected on people and
tern of the individual and what hours that person what they are doing. However with big data,
gets the most productive sleep, how many times everything down to the most miniscule compo-
the person wakes during the night, the amount of nent can be analyzed and used to maximize the
water the person drinks, and many other features outcome of a person’s experience or even a com-
that can be of use to the user. pany’s profits. The concept of big data has been
Internet of Things is a term and concept that was introduced in 1999, and the basic concept is
that everything can be interconnected, communicate, and function with limited interference
from people.
Self-driving cars, printers that can order their developing over the last 100 years.
own toner, and vehicles that can call ahead to let
others know you will be late are all ideas of IoT, • In 1997, Michael Lesk publishes a paper titled
and some have been implemented, while others “How Much Information Is There in the
are still work in progress and will be combatted World?” where he theorizes about the exis-
in the future. All of these innovations are made tence of 12,000 petabytes. In addition to this,
possible due to big data. The collection of data he also points out that at this early stage of the
has grown exponentially over the last 10 years web’s development, it was increasing 10-fold
and will continue to grow for the foreseeable every year. This was also the year that Google
future. While all of this is good, there are several made its debut.
drawbacks to big data. Some of these drawbacks • In 1999, the term big data comes into play,
are as shown in Fig. 12.5: thanks to an article published in a magazine
titled “Visually Exploring Gigabyte Datasets
• Variety in Real Time” by the Association of Computing
• Velocity Machinery. In the article, the problem of stor-
• Volume age was again brought up. This was also the
first time that the term “Internet of Things”
There are a variety of different fields that uti- was used. RFID pioneer Kevin Ashton used
lize big data to assist in the careful analysis to the term for a presentation that was given to
gain insight and depths to help solve real-life Procter and Gamble.
problems. Variety is what makes big data even • In 2000, Peter Lyman and Hal Varian made the
bigger. Big data is collected from a variety of dif- first attempt to determine exactly how much
ferent sources and it comes in three different data was in the world and the rate that it grew.
types. Those types are known as structured, semi- They were able to conclude that “The world’s
structured, and unstructured. total yearly production of print, film, optical
Velocity is something that is not only required and magnetic content would require roughly
for big data but for processes in general. The goal 1.5 billion gigabytes of storage. This is the
is to process the data as it is streamed in order to equivalent of 250 megabytes per person for
maximize the value for a given organization. The each man, woman and child on Earth.”
volume aspect has exceeded previous amounts of • In 2001, Doug Laney defined the three charac-
bytes so new levels have had to be created. The teristics of big data in his paper “3D Data
156 12 Emerging Technologies
Management: Controlling Data Volume, ing device to access digital data than a
Velocity and Variety.” This was also the first home or office computer. Also 88% of busi-
time that the term “software as a service” was nesses made big data analytics their first
used. This term was important because it was priority.
a fundamental concept in today’s cloud-based
applications.
• In 2005, Web 2.0 was announced which meant 12.3 Smart Cities
that instead of content provided by services
providers, user-generated content was on the The term “smart cities” may be defined differ-
rise. Hadoop was also created about the same ently by many people depending on what they
time. perceive to be what makes them comfortable
• In 2007 the concept of big data was brought to based on technology enhancements. The term has
the masses through an article by Marr. exploded in the last decade as new technologies
• In 2008, 9.57 zettabytes of information were and devices have made it possible to integrate
processed on servers around the world. and facilitate urban living in ways we never
• In 2010, Eric Schmidt of Google speaks on imagined.
Smart cities are cities that have efficient data-driven infrastructures that use technologies to
enhance the functions of the cities while at the same time increasing the quality of live.
how the amount of data being created in In building a bridge to a smart city, you have
2 days currently is what was created from the to make sure that everything including all ser-
beginning of the human race until 2003. vices, all data, and all devices can be seamlessly
• In 2011, McKinsey’s report stated that by connected. Every smart city starts with its net-
2018 there would be a shortage of professional work. It must be noted that fast-growing cities
data scientists and that issues concerning pri- across the world are faced with proactively solv-
vacy, security, and intellectual property had to ing future challenges. As access to broadband
be fixed before the full potential of big data network and high-speed gigabit fiber rises, there
could be achieved. are increasing opportunities to develop the next-
• In 2014, it was reported that more people generation applications for smart urban plan-
were using their phone or any other travel- ning. Not only can these advanced technology
12.3 Smart Cities 157
solutions predict future obstacles, they enable A typical example of the key elements that
new ways for citizens to engage with make up a smart and connected city could also be
government. seen pictorially in Fig. 12.7. It starts with identi-
Designing a smart city is a monumental task. fying the enabling technologies and finding
To have a real smart city, the following elements which districts the technologies will be deployed
must be present as part of the city and as depicted and the possible outcomes. These outcomes
in Fig. 12.6. could include improvement in safety, enhance-
ment of mobility, enhancement of upward climb-
• Improved city efficiency ing of the ladders of opportunities, and how all
• Smarter digital infrastructure these address the effects on the change on
• Healthcare services climate.
• Citizen engagement and digital citizen A second example, as depicted by James
services Staubes of Symmetry Electronics, is shown in
• Smart energy Fig. 12.8 demonstrating the future farms, small
• Smart transport and smart. In the smart farm, you have the survey
• Public safety and resiliency drones, fleet of agribots, farming data, texting
• Leadership and vision cows, and smart tractors.
• eGovernance
• Smart, big, and visualized data Survey drones: It has aerial drones that survey the
• Citizen satisfaction fields, mapping weeds, yield, and soil varia-
• Improving quality of life of the citizenry tions. This enables precise application of
• Economic vitality inputs, mapping spread of pernicious weed
• Sustainability blackgrass resulting to substantial increase in
• Relying on data and leveraging technology, wheat yields.
especially information communication tech- Fleet of agribots: These are a herd of specialized
nologies throughout the city. agribots that tend to crops, weeding, fertiliz-
ing, and harvesting. The robots are capable of
Governance
Living Economy
Human Environment
Capital
DATA
Fig. 12.7 Example of the elements that make a smart and connected city
microdot application of fertilizer thereby infection increasing herd survival and increas-
reducing the fertilizer cost substantially. ing milk yields.
Farming data: The farm generates vast quantities Smart tractors: Using GPS-controlled steering
of rich and varied data. They are stored in the and optimized route planning, soil erosion
cloud. The data can be used as digital evidence can be reduced saving fuel costs
thereby reducing the time spent completing substantially.
grant applications or carrying out farm inspec-
tions saving on average substantial amount
per farm per year. 12.3.1 Traditional and Smart Cities
Texting cows: Sensors attached to livestock are
allowing the monitoring of animal health and There are differences between traditional cities
well-being. They can send texts to alert farm- and smart cities. In the traditional cities, you have
ers when a cow goes into labor or develops the following:
12.3 Smart Cities 159
• High utility bills and inefficient use of • Difficult communication challenges, espe-
resources cially in emergencies
• Unsolved theft and crime • “Band-Aid” repairs to infrastructure
• Limited records/information
160 12 Emerging Technologies
In the case of smart cities, you have the following: based on blockchain will solve the problem of
single point of failure and provide trusted protec-
• Reduced cost of utilities due to optimization tion against distributed denial of service (DDoS)
• Increased safety and tools for law attacks that use vulnerable IoT devices as bot-
enforcement nets. It makes sense to discuss how the IoT can be
• Data storage/increased communication protected in the industry because numerous data
resources originate from the IoT devices. Therefore, the
• Emergency alert systems starting point of data protection in the industry
• Infrastructure that communicates should be with the devices producing these data.
The blockchain is a distributed computing
platform and secure by design and has a Byzantine
12.3.2 How to Become a Smart City fault tolerance that can be programmed to trans-
fer and store or share any item of value in a pro-
A city is not classified as a “smart city” without cess known as a transaction. Other features of
adequate preparation that will enable it have the blockchain are:
key elements of a smart city. The preparation has
to be abided by the following guidelines: • The consensus process achieved through proof
of work algorithm
• Identifying key citizen centric issues to • Proof of stake algorithm
resolve. • The delegated proof of stake algorithm
Blockchain is a cryptographically secured system with a distributed ledger that allows for the
secure transfer of data between parties.
• Developing a plan with key partners and As shown in Fig. 12.9, information is sent
stakeholders. from the device to the cloud where the data is
• Finding solutions that address multiple issues. processed using analytics and then sent back to
• Collecting and using data to improve technol- the IoT devices. Each block in a blockchain is
ogies benefiting citizens. linked using cryptographic technology. The prop-
• Collaboration is essential: utilizing university erties of blockchain can be leveraged to develop
research, creating public-private-industry a secure model for the IoT as well as data man-
partnerships, and cultivating citizen participa- agement in the industry.
tion and buy-in.
concepts and features can be developed. A com- tionalities of medical blockchain like parallel
prehensive discussion on the potential of block- computing, data management, identity manage-
chain for medical research, healthcare ment, and data sharing in a trusted, verifiable, and
management, and drug counterfeiting has been anonymous way.
implemented.
Blockchain has the potentials and economic
benefits of solving the problem of scale in the 12.4.2 Customized Blockchain
healthcare industry. The sensitivity that medical Applications
data are expected to have can be guaranteed by
the privacy and transparency that can be offered There is still an important need for a customized
by using blockchain technology. The application blockchain for deployment in the IoT-enabled
of efficient key management scheme can be application architectural IoT environment as
implemented as a mechanism for enhancing the shown in Fig. 12.9.
privacy of data in the medical blockchain. The
problem in medical data management can be Software and Hardware Tools
solved using blockchain for the provision of Internet of Things devices applicable to the field
secure and scalable data exchange. Traditional of medicine can be securely managed using
blockchain architectures have been reworked and blockchain. In this section, we present how the
improved and can be used to support the func- medical Internet of Things can be managed using
162 12 Emerging Technologies
The access control contract, judge contracts, and This kind of computing is very useful in the
register contracts are necessary for distributed sense that you pay only for the cloud services that
and reliable access control for the Internet of you use. It helps in running your business or
Things in the field of medicine where sensitive research infrastructure efficiently and helps in
medical data need to be secured. operating costs savings.
BLOCKCHAIN
BAPP BROWSER
Web UI
ethereum
Web 3
A SC
BI
Android App
Web3j
SMART
CONTRACT
Fig. 12.11 Diagram for the blockchain IoT security. (Source: https://www.mdpi.com/1424-8220/22/4/1411/htm)
164 12 Emerging Technologies
12.5.1 Different Types of Cloud helps optimize your existing compliance, secu-
Computing rity, and infrastructure.
web browser on their PC, phone, or tablet. SaaS computing service has opened favorable opportu-
uses Openbravo, SuiteCRM, and Acquia in its nities that have made organizations turn to it for
operations. Openbravo is enterprise resource their computing service needs. Some of these
planning (ERP) software. SuiteCRM is a cus- possible reasons are as follows:
tomer relationship management (CRM) applica-
tion. In the case of Acquia, it enables the hosting Security
of the Drupal content management system on the In cloud computing, security is tighter as a result
Amazon Elastic Compute Cloud (EC2) cloud of the broad set of policies, technologies, and
service to create a digital foundation for deliver- controls. Many of the cloud providers offer the
ing web content. highest security protection to their organizations,
thereby protecting data, apps, and infrastructure
I nfrastructure as a Service (IaaS) from potential threats.
IaaS is the most basic category of cloud comput-
ing services. In the case of IaaS, IT infrastructure Global Scale
is rented such as servers and virtual machines The benefits of cloud computing services include
(VMs), storage, networks, and operating systems the ability to scale elastically. The cloud delivers
from a cloud provider on a pay-as-you-go basis. the right amount of IT resources such as comput-
The IaaS uses CloudStack, OpenStack, and ing power when needed, storage, the right band-
Eucalyptus for its operations. CloudStack sup- width when it is needed, and from the right
ports VMware’s vSphere and Xen virtualization geographic location.
and offers a management server with a web dash-
board. OpenStack offers modular architecture Cost
that provides a component-based way to build The capital expenses of buying hardware and
clouds. Eucalyptus, an elastic utility computing software and setting up and running on-site data
architecture, is used for linking programs to use- centers like the racks of servers and the round-
ful systems. the-clock electricity for power and cooling are all
eliminated by cloud computing using the IT
Serverless Computing experts managing the infrastructure.
Serverless computing focuses on building appli-
cation functionality without spending time con- Performance
tinually managing the servers and infrastructure The biggest cloud computing services run on a
required to do so. It overlaps with PaaS. The worldwide network of secure data centers,
cloud provider handles the setup, capacity plan- which are regularly upgraded to the latest gen-
ning, and server management for you. Serverless eration of fast and efficient computing hard-
architectures are highly scalable and event- ware. This offers several benefits over a single
driven, only using resources when a specific corporate data center, including reduced net-
function or trigger occurs. work latency for applications and greater econo-
mies of scale.
Fog computing or fog networking, also known as fogging, is an architecture that uses edge
devices to carry out a substantial amount of computation, storage, and communication locally and
.
is routed over the Internet backbone
Fog computing can also be defined as the process of extending cloud computing and the
various services associated with it to the edge of the network.
The function of the fog computing is to extend reality (AR/VR). With the computing and storage
the cloud computing to be closer to the things that capabilities introduced by fog computing, future
produce and act on IoT data. In industry, fog com- FogMNW like 5G will be enabled to adopt new
puting is also called edge computing. It has the techniques. Examples of such new techniques are
capability to compute and provide storage, appli- wireless big data that can be stored in nodes and
cation services, and data to end users. The fog intelligent algorithms like deep learning; all
nodes also known as devices can be put with a net- could be supported.
work connection anywhere on the top of a power
pole, on a factory floor, on an oil rig, in a vehicle,
and even along a railway track. The switches, 12.7 Edge Computing
embedded servers, routers, video surveillance
cameras, and industrial controllers are some exam-
ples of fog nodes. The fact that IoT data are ana- The emergence of edge computing was as a result
lyzed close to where they are collected helps to of the computational needs of mobile computing,
minimize latency. It not only keeps sensitive data Internet of Things (IoT), and smart home—smart
inside the network but also offloads gigabytes of light, smart TV, etc., and robot vacuum. Connecting
the network traffic from the core network. directly to cloud may not just be enough. There
The combination of communication and com- has to be some augmented reality (AR). This
puting resources has made it possible for fog com- emerging technology called edge computing offers
puting-enabled mobile communication networks manifold performance improvements for applica-
(FogMNW) to be enabled to achieve much higher tions with low latency and high bandwidth require-
capacity than conventional communication net- ments. The edge computing uses three levels of
12.8 Emerging 5G Networks 167
architecture to accomplish its computing tasks. reliable machine learning, the tendency now
The first level is the unmodified cloud infrastruc- exists in departing from cloud-based and central
ture. The second level is the dispersed elements training and inference toward a novel system
called cloudlets with state cached from the first called edge machine learning. In this edge sys-
level, and the third level is the mobile device or tem, training data are unevenly distributed over a
IoT device. Fig. 12.13 shows the application archi- large number of edge devices such as network
tectural diagram of the edge computing structure, base stations and mobile stations including cam-
while Fig. 12.14 shows the illustration of the edge eras, phones, drones, and vehicles. The edge
computing devices, nodes, and cloud. devices have access to a tiny fraction of the data
The edge computing idea has gained wide and training, and inferences are carried out
popularity to the extent that several standardiza- collectively.
tion organizations such as Institute of Electrical
and Electronic Engineers (IEEE) and the
European Telecommunication Standard Institute 12.8 Emerging 5G Networks
(ETSI) are now proposing establishing architec-
tural 5G Working Group and architectural frame- There has been a complete evolution of mobile
work called Multi-access Edge Computing networks from 1G network to now emerging 5G
(MEC), for third-party application service pro- network. The 5G network is an end-to-end eco-
viders (ASPs), respectively. system to enable a fully mobile and connected
Because of edge computing and the interest, society. It provides at least a 10-fold improve-
it has generated in distributed, low latency, and ment in user experience compared to 4G in terms
168 12 Emerging Technologies
of peak data rates and minimal latency. It sup- The 5G design is expected to accomplish the
ports multi-tenancy and network resource slicing following:
models. The 5G is designed to be a sustainable
and scalable technology. As shown in Fig. 12.15, • Connect to everyone
the 5G networks are expected to not just be an • Connect to objects
evolution from 4G but a full new mobile system. • Be environmentally friendly
12.8 Emerging 5G Networks 169
Fig. 12.14 Illustration of edge computing devices, nodes, and cloud. (Source: https://img.alicdn.com/tfs/
TB1QdC2KhjaK1RjSZKzXXXVwXXa-3302-1854.png)
who offer an autopilot mode that allows drivers been more alert, this accident could have been
to take a quick break, checking in with you peri- prevented. The 5G networks are to be equipped
odically to ensure safe parameters. Autonomous with the responsiveness and the speed needed to
vehicles have come a long way but are still in the ensure fatalities like these are avoided.
experimental stage. 4G networks do not offer the
speed and responsiveness needed to fully operate Health Care/E-Health
self-driving vehicles. An autonomous car oper- In healthcare, using a 5G network means more
ated by Uber killed a pedestrian in Arizona. The efficient, reliable, and accessible way to treat
question might arise, “How did a self-driving car patients. The 5G network will help improve the
kill a pedestrian?” way we receive and give healthcare significantly.
As seen in Fig. 12.17, the operating car was a Doctors will implement real-time remote moni-
Volvo XC90 sport utility vehicle outfitted with a toring to track patients in real time allowing them
sensor system and was in autonomous mode to more effectively treat the patient. File trans-
when it struck a pedestrian. There was a human mission will also be another benefit. MRI files
safety driver at the wheel, and the vehicle was must be sent to a specialist for review. We forget
going about 40 mph when it struck the pedestrian how big these files are and sometimes can take up
who was walking her bicycle across the street. to 23 h to transmit them on a 4G network. Longer
Camera recordings from both the interior and transmission times mean a longer wait for treat-
exterior of the car show the moments leading to ment. This also means practitioners can see fewer
the tragedy but clearly show the safety driver was patients in the same amount of time.
distracted looking down and her hands were not The 5G high-speed network will quickly and
hovering the steering wheel. Had the safety driver reliably transport huge data files of medical
imagery. It is also a more effective way to trans- Because of these promises being able to attend
late to patients who speak other languages a sold-out concert from the comfort of your liv-
through video conferencing. Artificial intelli- ing room, touring homes, virtual surgery, and the
gence will be able to detect potential diagnosis in experience to visualize products in more different
5G networks. The faster a patient can be diag- settings will be possible.
nosed, the faster that patient can be cared for.
Figure 12.18 shows the general idea of 5G net- Smart Homes
works implemented in healthcare. Competitors such as Google and Amazon are
pushing for central hubs that control the activity
Virtual Ventures of your home with vocalized commands. 5G con-
Virtual reality (VR) offers customers a real life- nected homes offer:
like experience to play, learn, and communicate.
VR and augmented reality (AR) will be able to • Enhanced home entertainment
offer these lifelike experiences solely because the • Ability to control number amounts of con-
5G network supports these claims: nected devices
• Improvements to technology and services
• Reduced latency which implies better interac- • Ability to operate without getting up
tivity and expanded use cases
• Massive connectivity capacity With these new possibilities, it will allow for a
• High mobility new experience at home. Eventually, smart con-
• Consistent quality nected homes will be able to be operated from
• Anywhere use case outside of your home from the comfort of your
• Technology developed can support the infra- smartphone anywhere in the world. 5G networks
structure behind it (5G) make these possibilities possible.
12.9 Cybersecurity worms that may try to reach the user’s com-
puter or network over the Internet.
The act of getting information illegally or disturbing the passage of information using a
computer as the primary means of commission and theft is called cybercrime.
due to these emerging technologies, it has become The list of cybercrimes includes network intru-
almost impossible to secure our private informa- sions and the dissemination of computer viruses,
tion in a very effective manner due to increase in as well as computer-based variations of existing
cybercrimes. crimes such as identity theft, stalking, bullying,
and terrorism which has become a major issue for
people and nations. Other possible types of
12.9.1 Cybersecurity Techniques cybercrimes include the following:
In the cybersecurity world, the idea of user name • Denial of service (DOS) attacks—This takes
and password has been the first measures to pro- place when the attacker explicitly attempts to
tecting information. However, there are other deny service to the intended user. As part of
techniques such as the authentication of data, mal- the DOS is the case of spamming a computer
ware scanners, firewalls, and antivirus software. resource such as web server or memory until
the server overloads and crashes, causing it to
• Authentication of data—This is where the slow down to the extent that the user cannot
data sent are checked to make sure they are use the machine.
coming from a trusted and reliable source. • Probing—This is a type of hacking where the
Antivirus software is normally used in the attacker gains access to the system by know-
authentication process. ing the weak point in the system.
• Malware scanners—In this case, a malware • User to root (U2R) attack—This is where the
software is normally used to scan through attacker attempts to get the access rights from
all the information and documents that are the host and is able to gain root access to the
present in the system to make sure there are machine.
no malicious codes or harmful viruses • Remote to local (R2L) attack—This is where
present. the perpetrator sends particular packets to a
• Firewall—This is a piece of software program machine over a network in an attempt to gain
that helps to screen out hackers, viruses, and the local access of the network.
174 12 Emerging Technologies
Securing information and enterprise networks 1. Internet of Things (IoT) is the interconnec-
can be considered under two broad topics: intru- tion of smart objects or things. When inter-
sion detection systems (IDSs) and intrusion pre- connected to people, it becomes Internet of
vention systems (IPSs). It has been proven that People (IoP), and when interconnected to
the right combination of selected algorithms/ service, it becomes Internet of Service (IoS).
techniques under both topics always produces 2. The advancements in the Internet technolo-
better security for a given network. This approach gies and connected smart objects have con-
leads to using layers of physical, administrative, tributed in making IoT a widely pervasive
electronic, and encrypted systems to protect valu- computing.
able resources. 3. IoT is evolving with “anything” and “every-
Self-similarity properties of networks and thing” being connected to the Internet as well
auto-reclosing techniques used on long rural as becoming smarter with enabling of
power lines and multi-resolution techniques can technologies.
be used in the development of these IDSs. The 4. In IoT infrastructures and services, there are
need to use quantitative methods to detect intru- various enabling technologies and cloud-
sion is increasing due to the high false positive enabled platforms that help to make things
and false negative rates of existing IDSs and happen.
IPSs. Most information and network security 5. The term big data refers to the immense
techniques employed by the IDSs and IPSs amount of data that is collected every second
depend mainly on packet behavior for detection. of every minute of every hour of every day.
Both real-time and off-line IDS predictions are The collection of such data is always a con-
applied under the analysis and response stages. tinuous process. The amount of the data is
The basic IDS architecture involves both central- hard to store and hard to analyze.
ized and distributed/heterogeneous architecture 6. In building a bridge to a smart city, you have
to ensure effective detection. Proactive responses to make sure that everything including all
and corrective responses are also employed. The services, all data, and all devices can be
cybersecurity systems, which are made up of seamlessly connected. Every smart city starts
both IDS and IPS, are less expensive to imple- with its network.
ment compared to existing ones. 7. The current server-client model for the
Steganography is another information security Internet of things is not fit for the healthcare
technique used in cybersecurity-related issues. industry due to high risk associated with a
Biometric steganography is a feature that is used single point of failure. A distributed or peer-
to implement steganography in skin tone region to-peer model for the Internet of things based
of pictures. The method embeds secret data in the on blockchain will solve the problem of sin-
skin portion of images of people. Skin detection gle point of failure and provide trusted pro-
is then performed in cover images and secret data tection against distributed denial of service
embedding performed in discrete wavelet trans- (DDoS) attacks that use vulnerable IoT
form (DWT) domain because it gives a better devices as botnets.
performance. Images are the most popular cover 8. Blockchain has the potentials and economic
objects for steganography. This technique has benefits of solving the problem of scale in
special applications in the military arena. the healthcare industry. The sensitive that
12.9 Cybersecurity 175
medical data are expected to have can be 12.6 Some of the drawbacks of big data are:
guaranteed by the privacy and transparency (a) Variety and velocity
that can be offered by using blockchain (b) Velocity and volume
technology. (c) Variety, velocity, and volume
9. The different types are private, public, and (d) None of the above
hybrid cloud computing services. 12.7 The areas of services associated with cloud
10. The function of the fog computing is to
computing are:
extend the cloud computing to be closer to (a) Platform as a service (PaaS) and software as a
the things that produce and act on IoT data. service (SaaS).
11. The 5G network is an end-to-end ecosystem (b) Infrastructure as a service (IaaS) and
to enable a fully mobile and connected soci- serverless
ety. It provides at least a 10-fold improve- (c) Software as a service (SaaS) and infrastruc-
ment in user experience compared to 4G in ture as a service (IaaS)
terms of peak data rates and minimal latency. (d) Platform as a service (PaaS), software as a
12. In cybersecurity systems, using the right
service (SaaS), infrastructure as a service
combination of IDS- and IPS-selected algo- (IaaS), and serverless
rithms/techniques always produces better (e) None of the above
security for a given network. 12.8 Global scale is one of the advantages of
cloud computing.
(a) True
Review Questions (b) False
12.9 In millisecond response time, fog comput-
12.1 The advancements in the Internet technolo- ing runs IoT-enabled applications for real-
gies and connected smart objects have con- time control and analytics.
tributed in making IoT a widely pervasive (a) True
concept. (b) False
(a) True 12.10 The 5G is not designed to be a sustainable
(b) False and scalable technology.
12.2 Security is not one of the challenges associ- (a) True
ated with IoT. (b) False
(a) True
(b) False Answer: 12.1a, 12.2b, 12.3d, 12.4a, 12.5a, 12.6c,
12.3 The basic layers of IoT architectures are: 12.7d, 12.8a, 12.9a, 12.10b
(a) Object/perception layer and middleware
layer(s)
(b) Object/perception layer and application layer Problems
(c) Middleware layer(s) and application layer
(d) Object/perception layer, middleware layer(s), 12.1 What are some of the challenges associated
and application layer with IoT?
12.4 Connected smart homes are one of the 12.2. As IoT is evolving with “anything” and
examples of IoT. “everything” being connected to the Internet,
(a) True what other enabling technologies can support
(b) False it to make it smarter?
12.5 Blockchain is impacting numerous fields of 12.3 Big data is collected from a variety of differ-
endeavors such as medicine, manufacturing, ent sources, and it comes in three different
and supply chain to name a few with several types. What are those types?
use cases. 12.4 What is the definition of a smart city? What
(a) True are the elements that must be present as part of
(b) False a smart city?
176 12 Emerging Technologies
12.5 List and describe some of the smart tech- 12.12 What are the key benefits of the cloud
nologies you can find in a smart farm. computing?
12.6 What are the differences between the tradi- 12.13 (a) What is fog computing? (b) Under what
tional and smart cities? conditions are fog computing maximized and
12.7 What are the necessary preparations to mostly needed?
becoming a smart city? 12.14 What are some of the advantages of cloud
12.8. What is a blockchain? What other features computing?
does a blockchain have? 12.15 What are the differences between cloud
12.9 What are some of the blockchain technology computing and fog computing?
applications in the field of medicine? 12.16 What are some of the expected accom-
12.10 (a) What is cloud computing? (b) Name plishments of the 5G design?
and describe the different types of cloud 12.17 Name and describe briefly four of the
computing. cybersecurity techniques.
12.11 Name and describe the four service areas 12.18 Name and describe briefly at least four of
associated with cloud computing? the cybersecurity crimes.
Appendices
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2022 177
M. N. O. Sadiku, C. M. Akujuobi, Fundamentals of Computer Networks,
https://doi.org/10.1007/978-3-031-09417-0
178 Appendices
prioritized and handled when data bursts D channel. The total bit rate is 144 kbps.
exceed the committed information rate (CIR). Sometimes one or both of the channels are unused
• Scalability is the hallmark of FR. With ease so that we have a B + D interface instead of the
one can add more bandwidth via the CIR. 2B + D interface. The basic service serves the
• Frame relay network does not guarantee deliv- needs of most users (residential and
ery of data and does not acknowledge or commercial).
retransmit frames. The higher-capacity Primary Rate Interface
• Frames are delivered in sequence. (PRI) in North America has twenty-three 64 kbps
B channels and one 64 kbps D channel (i.e., 23B
Frame relay takes advantage of the recent + D). The total bit rate is 2.048 Mbps. The 23B +
advances in transmission medium, such as fiber D PRI interface uses T1 for the layer one physical
optics, used in WANs. Optical fiber offers signifi- transport.
cant advantages such as a substantially lower The BRI and PRI offerings of the standard
error rate than that obtained with copper wires. ISDN are collectively referred to as narrowband
Frame relay was developed on the assumption ISDN (NISDN). Thus NISDN provides services
that the transmission media is reliable and rela- which will be carried by channels based on
tively error-free. Therefore, frame relay makes 64 kbps up to 1.5 Mbps (or 2 Mbps for European
little attempt to detect errors and no attempt standard). The characteristics of NISDN are
whatsoever to correct them. Frame relay com- inadequate for many applications of interest and
bines the best features of time division multiplex- in meeting the perceived users’ needs for higher
ing (TDM) used in circuit switching and the speed, broader bandwidth, and more flexibility
statistical time division multiplexing (STDM) such as video distribution, HDTV, and HiFi ste-
used in X.25. It is still in use in some places reo. The needs are accommodated in broadband
today. ISDN (BISDN). Consequently, as far as data net-
works are concerned, real excitement of ISDN
ISDN and BISDN comes about when one considers the capabilities
For computer networks to be able to simultane- of BISDN.
ously carry voice, audio, and video in addition to BISDN is regarded as an all-purpose digital
data, the Integrated Service Digital Network network in that it will provide an integrated
(ISDN) and broadband ISDN or BISDN were access that will support a wide variety of applica-
proposed. ISDN is a digital end-to-end telecom- tions in a flexible and cost-effective manner.
munication wide area network (WAN). It is the Broadband services include high-speed transmis-
first network-based standard for simultaneous sion, video distribution, video telephony, video
integrated voice, data, and video signal transmis- conferencing, telefax, and TV distribution.
sion over a single pair of wires instead of the
separate pairs formerly needed for each service. TM
A
It enables a single point of access for data, voice, The transfer mode for BISDN must be able to
and video. Because it is a digital network, it is handle both narrowband and broadband rates,
able to transmit all forms of data, text, image handle both continuous and bursty traffic, satisfy
video, and digitized voice over a single network delay and/or loss sensitive quality requirements,
transparently. This is the feature that makes ISDN and meet unforeseen demands. Neither circuit
very attractive to users. mode nor packet mode is suitable for meeting all
ISDN is not itself a service but an interface to these requirements. Asynchronous transfer mode
existing and future services. Two interfaces dif- (ATM), which is something between these two
fering mainly in their carrying capacity are basic modes, has been selected as the target solution of
access and primary access. The Basic Rate BISDN. It is a specific packet-oriented transfer
Interface (BRI) consists of two full-duplex mode using an asynchronous time division multi-
64 kbps B channels and one full-duplex 16 kbps plexing technique.
Appendices 179
Fig. A.1 ATM cell structure in UNI and NNI formats. (Source: “SONET & SDH optical testing,” https://www.gl.com/
lightspeed1000-atm-analyzer.html)
180 Appendices
Queue Server
different data flows on the transport layer is the Queueing theory is applied in several disciplines
generalized multiprotocol label switching such as computer systems, traffic management,
(GMPLS). GMPLS is a set of traffic engineering operations, production, and manufacturing. It plays
and optical extensions to existing MPLS routing a significant role in modeling computer communi-
and signaling protocols. Its goal is cover both the cation networks. Since the mid-1960s, performance
routing and signaling portions of the control evaluation of computer communication systems is
plane. It extends MPLS to encompass time divi- usually made using queueing models.
sion, wavelength, and spatial switching. Although
MPLS was designed for packet services, GMPLS Kendall’s Notation
is designed to provide a single suite of protocols In view of the complexity of a data network, we
that would be applicable to all kinds of traffic. first examine the properties of a single queue.
The results from a single-queue model can be
extended to model a network of queues. A single
Appendix B: Queueing Theory queue is comprised of one or more servers and
customers waiting for service. As shown in Fig.
Reduced to its most basic form, a computer net- B.1, the queue is characterized by three
work consists of communication channels and quantities:
processors (or nodes). As packets flow from node
to node, queues begin to form at different nodes, • The input process
and they spend a lot of time waiting in queues. • The service mechanism
For high traffic intensity, the waiting or queueing • The queue discipline
time can be dominant so that the performance of
the network is dictated by the behavior of the The input process is expressed in terms of the
queues at the nodes. Analytical derivation of the probability distribution of the interarrival times
waiting time requires a knowledge of queueing of arriving customers. The service mechanism
theory. describes the statistical properties of the service
This appendix provides a brief introduction to process. The queue discipline is the rule used to
queueing theory. Queueing is simply waiting in determine how the customers waiting get served.
lines such as stopping at the toll booth, waiting in To avoid ambiguity in specifying these character-
line for a bank cashier, stopping at a traffic light, istics, a queue is usually described in terms of a
waiting to buy stamps at the post office, and so well-known shorthand notation devised by D. G.
on. A queue is the waiting line. Kendall. In Kendall’s notation, a queue is charac-
terized by six parameters as follows:
A queue consists of a line of people or A /B/C/K /m /z (B.1)
things waiting to be served and a service
where the letters denote:
center with one or more servers.For exam-
ple, there would be no need of queueing in
A: Arrival process, i.e., the interarrival time
a bank if there are infinite number of peo-
distribution
ple serving the customers. But that would
B: Service process, i.e., the service time
be very expensive and impractical.
distribution
C: Number of servers
Appendices 181
5
A(t)
4
1
D(t)
t
here. Suppose we keep track of arrival and depar- From Eqs. (B.3) and (B.4),
ture times of individual customers for a long time
Mean number of customers in the system
to. If to is large, the number of arrivals would
J N J (B.5)
approximately equal to the number of departures. =N= = a×
If this number is Na, then to to N a
Na
Arrival Rate = λ = (B.3) or
to
N = λT (B.6)
Let A(t) and D(t) be respectively the number of
arrivals and departures in the interval (0, to). Figure which is Little’s theorem.
B.2 shows A(t) and D(t). If we subtract the depar-
ture curve from the arrival curve at each time M/M/1 Queue
instant, we get the number of customers in the sys- Consider the M/M/1 queue shown in Fig. B.3.
tem at that moment. The hatched area in Fig. B.2 This is the simplest nontrivial queueing system.
represents the total time spent inside the system by It consists of a single-server system with infinite
all customers. If this is represented by J, queue size, Poisson arrival process with arrival
rate λ, and exponentially distributed service times
J
Mean time spent in system= T= (B.4) with service rate μ. The Poisson process has the
Na unique property that future increments are inde-
Appendices 183
pendent of the past history. The queue discipline is μp1. In order for stationary probability to exist,
is FCFS. the rate of leaving state 0 must equal the rate of
The probability of k arrivals in a time interval entering it. Thus
t is given by the Poisson distribution:
λ po = µ p1 (B.10)
(λt )
k
Thus
Our goal is to find pn and use it to find some per-
λ pn = µ pn +1 (B.14)
formance measures of interest.
Consider when the system is in state 0. Due to or
an arrival, the rate at which the process leaves
pn +1 = ρ pn , ρ =λ/µ (B.15)
state 0 for state 1 is λpo. Due to a departure, the
rate at which the process leaves state 1 for state 0 If we apply this repeatedly, we get
λ λ λ λ
0 1 n n+1
. . . n-1 . . .
2
µ µ µ µ
∑p n =1 (B.17)
n=0
and obtain
or
∞
p0 1 + ∑ρ n = 1 (B.18)
n =1 ρ
E (N ) = (B.24)
1− ρ
If ρ < 1, we get
Applying Little’s formula, we obtain the average
1
p0 =1 (B.19) response time or average delay as
1− ρ
E (N ) 1 ρ
or E (T ) = = (B.25)
λ λ 1− ρ
p0 = 1 − ρ (B.20)
From Eqs. (B.15) and (B.20), Or
pn = (1 − ρ ) ρ n , n = 1, 2, (B.21) 1
E (T ) = (B.26)
µ (1 − ρ )
which is a geometric distribution.
Having found pn, we are now prepared to obtain This is the mean value of the total time spent
some performance measures or measures of effec- in the system (i.e., queue and the server).
tiveness. These include utilization, throughput, the As shown in Fig. B.5, the average delay E(T)
average queue length, and the average service time. is the sum of the average waiting time E(W) and
The utilization U of the system is the fraction the average service time E(S), i.e.,
of time that the server is busy. In other words, U E (T ) = E (W ) + E ( S ) (B.27)
is the probability of the server being busy. Thus
∞ Equivalently, the average number of customers
U = ∑ pn = 1 − p0 = ρ E(N) in the system equals the sum of the average
n =1 of customers waiting E(Nq) in the queue and the
or average number of customers E(Ns) being served,
i.e.,
U=ρ (B.22)
E ( N ) = E ( Nq ) + E ( Ns )
(B.28)
The throughput R of the system is the rate at
1
which customers leave the queue after service, But the mean service E ( S ) = . Thus
i.e., the departure rate of the server. Thus µ
1 (B.29)
R = µ (1 − p0 ) = µρ = λ (B.23) E (W ) = E (T ) −
µ
or
This should be expected because the arrival
ρ
and departure rates are equal at steady state for E (W ) = (B.30)
the system to be stable. µ (1 − ρ )
Appendices 185
Fig. B.5 Little’s
formula applied to E(Ns )=λ
M/M/1 queue thrice E(S)
µ
λ E(Nq ) =λE(W)
E(N) = λE(T)
ρ2
E ( N q ) = λ E (W ) = (B.31) As an M/M/1 queue, we obtain mean
1− ρ arrival rate as
λ = 1customer / minute
Finally, since E(N) = λE(T), and the mean service rate as
1 1
E ( Ns ) = λ E ( S ) = λ
=ρ (B.32) E ( S ) = = 40 seconds / customer
µ m
40
Notice from Eqs. (B.25), (B.31), and (B.32) = minute / customer
60
that the Little’s theorem is applied three times.
This is also shown in Fig. B.5. Hence, the traffic intensity is
λ 2
ρ= = (1)( 40 / 60 ) =
µ 3
Example B.2 (a) The mean queue size is
( 2 / 3)
2
ρ2
Service at a bank may be modeled as an E N q = = = 1.333 customers
M/M/1 queue at which customers arrive 1− ρ 1− 2 / 3
according to Poisson process. Assume that
the mean arrival rate is 1 customer/minute (b) The mean waiting time is
and that the service times are exponentially r 2 / 3(4 / 6)
E [W ] = =
distributed with mean 40 seconds/cus- m (1 − r ) (1 − 2 / 3 )
tomer. (a) Find the average queue length. = 1.333 minutes
(b) How long does a customer have to wait
in line? (c) Determine the average queue (c) If the mean service time E(S) = 50
size and the waiting time in the queue if the seconds/customer = 50/60 minutes/cus-
service time is increased to 50 seconds/cus- tomer, then
tomer. (d) Calculate the probability that the
λ 5
number of customers in the system is 3. ρ= = (1)( 50 / 60 ) =
µ 6
186 Appendices
ρτ σ 2
E (T ) = E (W ) + τ = 1 + +τ
2 (1 − ρ ) τ 2 (B.35)
(5 / 6)
2
r2
E N q = =
1− r 1− 5 / 6
= 4.1667 customers and the mean number of customers in the system
r 5 / 6 (5 / 6) is
E [W ] = =
m (1 − r ) (1 − 5 / 6 ) E ( N ) = λ E (T ) = E ( N q ) + ρ (B.36)
= 4.1667 minutes
We expect the queue size and waiting or
time to increase if it takes longer time for
ρ2 σ 2
customers to be served. E (N ) = 1 + + ρ (B.37)
(d) For n = 3, using Eq. (B.21) 2 (1 − ρ ) τ 2
p3 = (1 − r ) r 3 = (1 − 2 / 3 )( 2 / 3 )
3
8 We may now obtain the mean waiting time for
= = 0.09877 the M/M/1 and M/D/1 queue models
81
as special cases of the M/G/1 model.
For the M/M/1 queue model, a special case of
the M/G/1 model, the service times follow an
ther Queueing Systems
O exponential distribution with mean τ = 1/μ and
Here we briefly consider the M/G/1 and M/D/1 variance σ2. That means,
queues. The most general queueing system with
H ( t ) = Prob [ X ≤ t ] = 1 − e − µ t (B.38)
single-server and Poisson arrivals is the M/G/1
queue. It is the simplest non-Markovian system.
We analyze it assuming that it is in the steady Hence,
state. An M/G/1 system assumes a FIFO service
σ2 =τ2 (B.39)
discipline, an infinite queue size, a Poisson input
process (with arrival rate λ), a general service Substituting this in Pollaczek-Khintchine for-
times (with arbitrary but known distribution, mula in Eq. (B.33) gives the mean waiting time
mean τ = 1/μ, and variance σ2), and one server. To as
derive the average waiting time of the M/G/1
ρτ
model requires some effort beyond the scope of E (W ) = (B.40)
this book. We mere state the result:
(1 − ρ )
ρτ 1
E ( W ) M / D /1 = = E ( W ) M / M /1 (B.42)
2 (1 − ρ ) 2 f ( t ) = λ e−λt
Hence E(t) = 1/λ.
Problems
(c) Let E(B) = average busy period and
E(I) = average idle period. From part
Example B.3
(a), E ( B)
pb = ρ =
E ( B) + E ( I )
In the M/G/1 system, prove that:
From part (b),
(a) Prob (the system is empty) = 1−ρ
E ( I ) = average length of time
(b) Average length of time between busy
periods = 1/λ between busy periods = 1 / l
(c) Average no. of customers served in a
busy period = 1 Hence
1− ρ E ( B)
ρ=
1
E ( B) +
where ρ = λ X and X is the mean λ
service time. Solving for E(B) yields
ρ X
Solution E ( B) = =
λ (1 − ρ ) 1 − ρ
(a) Let pb = Prob. that the system is busy. as required.
Then pb is the fraction of time that the The average no. of customers served in
server is busy. At steady state, a busy period is
Average length of busy period
Arrival rate = departure rate Nb =
Average service time
λ = pb µ
Hence
or E ( B) 1
Nb = =
λ X 1− ρ
pb = = ρ
µ
Alternatively, we recall that if t is the B.3 For an M/M/1 model, what effect will dou-
interarrival time, bling λ and μ have on E[N], E[Nq], and
E[W]?
188 Appendices
B.4 Customers arrive at a post office according will be no customers within that period, (b)
to a Poisson process with 20 customers/ exactly three customers will arrive in this
hour. There is only one clerk on duty. period, and (c) at least four customers will
Customers have exponential distribution of arrive. Assume this is a Poisson process.
service times with mean of 2 minutes. (a) B.8 At a telephone booth, the mean duration of
What is the average number of customers phone conversation is 4 minutes. If no
in the post office? (b) What is the probabil- more than 2-minute mean waiting time for
ity that an arriving customer finds the clerk the phone can be tolerated, what is the
idle? mean rate of the incoming traffic that the
B.5 An airline check-in counter at Philadelphia phone can support?
airport can be modeled as an M/M/1 queue. B.9 For an M/M/1 queue operating at fixed
Passengers arrive at the rate of 7.5 custom- ρ = 0.75, answer the following questions:
ers per hour, and the service takes 6 min- (a) Calculate the probability that an arriv-
utes on the average. (a) Find the probability ing customer finds the queue empty. (b)
that there are fewer than four passengers in What is the average number of messages
the system. (b) On the average, how long stored? (c) What is the average number of
does each passenger stay in the system? (c) messages in service? (d) Is there a single
On the average, how many passengers need time at which this average number is in
to wait? service?
B.6 An observation is made of a group of tele- B.10 At a toll booth, there is only one “bucket”
phone subscribers. During the 2-hour where each driver drops 25 cents. Assuming
observation, 40 calls are made with a total that cars arrive according to a Poisson
conversation time of 90 minutes. Calculate probability distribution at rate 2 cars per
the traffic intensity and call arrival rate minute and that each car takes a fixed time
assuming M/M/1 system. 15 seconds to service, find (a) the long-run
B.7 Customers arrive at a bank at the rate of 1/3 fraction of time that the system is busy, (b)
customer per minute. If X denotes the num- the average waiting time for each car, (c)
ber of customers to arrive in the next 9 min- the average number of waiting cars, and (d)
utes, calculate the probability that (a) there how much money is collected in 2 hours.
Bibliography1
Akujuobi, C. M. and M. N. O. Sadiku, Introduction to Broadband Communication Systems. Boca Raton, FL: Chapman
& Hall/CRC, 2008.
Alagesan, V. and Natarajan, B., Data collection in wireless sensor network through hybrid mac protocol. International
Journal of Advanced Science and Technology, January 2020.
Alomari, S., Putra, S., and Taghizadeh, A., A comprehensive study of wireless communication technology for the future
mobile devices. European Journal of Scientific Research, vol. 60, September 2011.
Askelson, K., Extranets: All part of the third wave. AICPA Infotech Update, July/August, 1998.
Black, U., Physical Layer Interfaces & Protocols. Los Alamitos, CA: IEEE Computer Society Press, 1996.
Bradford, N., The Art of Computer Networking. Upper Saddle River, NJ: Prentice Hall, 6th edition, 2007.
Cajetan, M. A., and M. N. O. Sadiku, Introduction to Broadband Communication System. Boca Raton, FL: Chapman
& Hall/CRC Press, 2008, p. 165.
Comer, D. E., Computer Networks and Internets. Upper Saddle River, NJ: Prentice Hall, 6th edition, 2011.
Comer, D. E., Internetworking with TCP/IP Volume 1: Principles Protocol, and Architecture and Internets. Upper
Saddle River, NJ: Prentice Hall, 5th edition, 2006.
Dally, W. J. and B. Towles, Principles and Practices of Interconnection Networks. San Francisco, CA: Morgan
Kaufmann, 2003.
Denise Grayson et al., Analysis of security threats to MPLS virtual private networks. International Journal of Critical
Infrastructure Protection, vol. 2, 2009, pp. 146–163.
Forouzan, B. A., Data Communications and Networking. New York: McGraw-Hill, 5th edition, 2013.
Forouzan, B. A., Local Area Networks. New York: McGraw-Hill, 2003.
Fowlet, D., Virtual Private Networks: Making the Right Connection. San Francisco, CA: Morgan Kaufmann Publishers,
1999.
Keiser, G., Local Area Networks. New York: McGraw-Hill, 2nd edition, 2002.
Kurose, J. F. and K. W. Ross, Computer Networking: A Top-down Approach. Boston, MA: Pearson Education, 6th edi-
tion, 2013.
McClain, G. R. (ed.), Handbook of Networking & Connectivity. Cambridge, MA: AP Professional, 1994.
McDysan, D., VPN Applications Guide: Real Solutions for Enterprise Networks. New York: John Wiley & Sons, 2000,
p. 173.
Miloszewski, N., How to install VoIP at home. October 2011, https://www.voipsupply.com/blog/voip-insider/
how-to-install-voip-at-home/
Newman, R. C., Broadband Communications. Upper Saddle River, NJ: Prentice Hall, 2002.
Phaltankar, K. M., Practical Guide for Implementing Secure Intranets and Extranets. Norwood, MA: Artech House,
2000.
Rajiv., Satellite Internet technology and applications. July 2022, https://www.rfpage.com/satellite-
internet-technology-and-applications/
Rizvi, S. A. M. and V. K. Sharma, An Introduction to Computer Networks. Oxford, UK: Alpha Science International,
2011.
This bibliography includes only books published on or after 1990. These are the best resources for learning more about
1
computer networks.
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2022 189
M. N. O. Sadiku, C. M. Akujuobi, Fundamentals of Computer Networks,
https://doi.org/10.1007/978-3-031-09417-0
190 Bibliography
A H
Asymmetric DSL (ADSL), 87–99 High bandwidth, 9, 21, 66, 67, 96, 98, 102, 108, 111,
112, 127, 134, 168
High-bit Data Rate DSL (HDSL), 87, 89, 92–94,
B 97–99
Bit/byte stuffing, 7, 14, 17, 18
Blockchain, 146, 151, 160–163, 175, 176
Bluetooth, 117, 122, 123, 133, 135, 153 I
IEEE Layer models, 19–20
IEEE 802 standards, 37
C Internet, 2–6, 22–25, 27, 30, 35, 36, 51–69, 71–76,
Carrier Sense Multiple Access with Collision Avoidance 79–85, 88–90, 92–96, 101, 102, 107,
(CSMA/CA), 41–42, 45–49 108, 112, 116, 119, 121, 126, 134, 138–140,
Cellular networks, 116, 117, 123–127, 134, 135, 143, 144, 147, 149, 151–154, 164, 165,
169, 170 173–176
Cloud computing, 62, 82, 83, 146, 151–154, 162–166, Internet Control Message Protocol
175, 176 (ICMP), 24–26
Computer networks, 1–6, 10, 11, 14, 15, 17–20, 26, 35, Internet of Things (IoT), 62, 146, 149–155, 160–162,
51, 75, 82, 83, 118, 137, 138, 147 168, 171, 174, 175
Cybersecurity, 60, 63, 64, 117, 137, 145–148, 173–176 Internet protocol (IP), 2, 19, 21–27, 29, 35, 36, 51–58,
64, 65, 67, 68, 72, 75, 76, 82, 83, 85, 93, 101,
105–107, 110, 126, 139, 147
D Intranets, 62, 71–77, 82, 85, 86, 89, 95, 96
Digital Subscriber Line (DSL), 60, 87–98, 102, 108 Intrusion detection, 137, 144–145, 174
Intrusion prevention, 174
ISDN DSL (IDSL), 87, 89, 95–99
E
Edge computing, ix, 154, 162, 166–169
Emailing, 52, 56, 67 L
Encoding techniques, 7, 11, 12, 17, 22 Local area network (LAN), 2, 5, 6, 16, 17, 23, 25, 30, 34,
Encryption, 22, 61, 64, 80, 82–86, 123, 133, 137, 35, 37–42, 45–49, 57, 76, 81, 85, 89, 94, 102,
140–144, 147, 148 108, 110, 111, 116, 119–120, 122, 134, 139,
Extranets, 62, 71–77, 82, 85, 86 140, 145, 154
F M
File transfer, 4, 22, 27, 34, 52, 56, 67 Malware, 63, 137–139, 144, 146–148, 173
Firewall, 52, 61, 63, 72, 73, 75, 76, 80, 119, 120, Medium access control (MAC), 28, 37, 43, 57
137–140, 147, 148, 173 Metropolitan area network (MAN), 2, 3, 6, 25, 85, 102,
5G technology, 127 110, 111, 116, 120–122, 134, 135
Fog computing, ix, 154, 162, 166–167, 175, 176 Multiplexing techniques, 7, 105, 106
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature 191
Switzerland AG 2022
M. N. O. Sadiku, C. M. Akujuobi, Fundamentals of Computer Networks,
https://doi.org/10.1007/978-3-031-09417-0
192 Index
N V
Network security, 63, 137–148, 174 Very High Data Rate DSL (VDSL), 87, 89, 95–99
Virtual private network (VPN), 55, 62, 74, 76, 79–86,
118, 138, 139
O VPN services, 83, 84
Open Systems Interconnection (OSI), 6, 19–23, 32–36,
52, 113
Optical fibers, 8, 9, 23, 101–108, 111–114 W
Optical networks, 84, 101–115, 120 Web browsing, 52, 56, 67, 81, 112, 113
Optics, 67, 101–103, 105, 107, 109–114, 128 Wide area network (WAN), 2, 3, 6, 16, 17, 25, 51, 57,
81, 85, 102, 110, 111, 116, 117, 122, 134,
139, 140
R Wi-Fi, 5, 6, 80, 84, 117, 119, 121, 134, 135, 147,
Rate Adaptive DSL (RADSL), 87, 89, 94–95, 97–99 148, 154
Remote login, 22, 52, 56, 67 Wireless networks, 2, 84, 113, 115–120, 122, 124–127,
130, 133–135
Wireless sensor network (WSN), 116, 117, 130–132,
S 134, 135
Signaling System No. 7 (SS7), 31, 35, 36
Switching mechanisms, 7
Z
ZigBee, 117, 122, 132, 153
T
TCP/IP protocols, 76, 82
Transmission Control Protocol/Internet Protocol (TCP/
IP) model, viii, 19, 22–27, 35, 36, 52–54
Transmission media, 2, 5, 7–11, 14, 17, 37