Professional Documents
Culture Documents
Character Characters
in data sent
Soh Esc x
Eot Esc y
esc Esc z
Implementing Byte Stuffing
Sender must scan and perform mapping before any
data is sent
Sender replaces characters
Receiver looks for a combination of ‘esc’ followed by a
x, y or z
Replaces combination by appropriate single characters
Receiver is sure that soh and eot are frame delimiters
Transmission Errors
Interference can introduce unwanted electric
currents in wires
Interference can cause
The receiver to misinterpret the data
The receiver to lose the data sent by sender
The receiver to detect data, although sender did
not send any data
Termed transmission errors
The problem of lost ,changed or spuriously
appearing data
Parity
Even or odd
Sender and receiver must agree in which form to use
Even parity – the total number of 1 bits (including parity bit)
must be even
EX : parity bit for 0100101 is 1
Parity bit for 0101101 is 0
Odd parity – total number of 1 bits (including parity bit) must
be odd
EX : parity bit for 0100101 is 0
Receivers computation of parity must agree to sender’s
Else receiver reports parity error
Parity Checking
Parity check – mechanism requires the sender to
compute an additional bit, called parity bit
RS-232 circuits uses parity check to ensure that
each character arrives intact
Attach parity bit to each character before sending
Receiver removes the parity bit and performs the
same operation as the sender
Verifies the result with the value of the parity bit
If one of the bits is damaged, receiver reports
error
Error Detection
Parity cannot detect error involving an even
number of bits
EX : Two 0 bits changed to 1
Two 1 bits changed to 0
One 0 bit changed to 1 and vice versa
Parity is preserved even with errors
Alternative mechanisms used depending on :
The size of the additional information
The computational complexity of the algorithm
The number of bit errors that can be detected
Checksums
Checksum : sender treats the data as a sequence
of binary integers and computes their sum
Carry bits, if any, are added into the final sum
Advantages : size and ease of computation and
cost of transmission
Disadvantages : cannot detect all common errors
Cyclic Redundancy Checks (CRC)
CRC hardware uses
A shift register
An exclusive or (xor) unit
To compute a CRC
Values in shift registers initialized to 0
Bits of message shifted once at a time
One bit of message applied at input
All shift register perform shift operation
Schemes
Thinnet
10Base-T
Topology Paradox
Network technology can use a variety of
wiring schemes
Technology determines logical topology
Wiring scheme determines the physical
topology
Physical topology can be different can be
different from logical topology
Ex: A twisted pair Ethernet forms a star but
functions like a bus
NIC and Wiring Schemes
Network interface supports
multiple wiring schemes
A single Ethernet NIC has
three connectors
Can use only one wiring
scheme at a time
Wiring can be changed
without changing NIC
Other Network Technologies
Different technologies accommodate a variety of wiring
scheme
Ex: The original Local Talk uses transceivers like thicknet
Uses point-to-point connection between pairs of transceivers
Although Local Talk is a bus technology it sometimes uses
hub technology
LAN Design
Distance limitation is a fundamental point
LANs use a shared communication media
CSMA/CD or Token passing is used to guarantee fair
access to medium
LAN is designed with a fixed maximum cable length
to minimize delays
An electrical signal gradually becomes weaker as it
travels along a copper wire
This puts a limitation on the maximum length of the
wire allowed
Fiber Optic Extensions
LAN extension mechanisms insert additional hardware
components that can relay signals across longer distances
Ex: Optical fibers and a pair of fiber modems
Fiber has low density and high bandwidth
Provides a connection between a computer and a distant
Ethernet
Inserted between the network interface on a computer and a
remote transceiver
Repeaters
An analog electronic device that continuously monitors
signals on each cable
Used to extend LAN
Connects two Ethernet cables called segments
When it senses a signal on one cable, it transmits an
amplified copy on another
A repeater can double the effective length
Any pair of computers on the extended LAN can
communicate
Repeater
Repeaters(Cont.)
Each repeater and segment
along the path increase delay
Ethernet standards limits that
no more than four repeaters
separate any pairs of stations
The connection can be
extended by using fiber
modems and Fiber Optic Intra
Repeater Link ( FOIRL)
Along with valid
transmissions, the repeaters
propagates a collision or
electrical interference
Bridges
An electronic device that connects and extends two LAN
segments
Handles complete frames and uses same network interface
as a conventional computer
Helps isolate problems by forwarding only complete and
correct frames
Any pair of computers can communicate on extended LAN
Bridge
Frame Filtering
A typical bridge consists of a
conventional computer with a CPU,
memory and two network interfaces
A bridge performs frame filtering
Does not forward a frame
unless necessary
Uses physical address to
determine whether to forward a frame
Called adaptive or learning bridges
because they learn the locations of
computers automatically
Uses source address to list computers
Bridged Networks
Bridged networks running for a long time restricts
frames to the fewest segments necessary
Propagation principle
In the steady state, a bridge forwards each frame only as
far as necessary
Permits communication on separate segments at
the same time(parallelism)
To optimize performance, a set of computers that
interact frequently should be attached to the same
segment
Bridging Between Buildings
An optical fiber and pair of fiber modems are used to extend
one of the connections between a bridge and a LAN segment
The use of a bridge has following advantages
Single fiber connection makes it less expensive
Individual computer can be added or removed without installing or
changing the wiring
Communication in buildings is independent
Bridges Across Longer Distances
Involves a long distance point-to-point connection and special
bridge hardware
Leased serial line used because it is less expensive
Leased satellite channel used for communication across an
arbitrary distance
Bridge hardware has
two main functions
Filtering frames
Buffering
Cycle Of Bridges
A bridge network can span many segments
Not all bridges allowed to broadcast frames
A cycle of bridges causes infinite number of frames
STS-1
SONET
frame
Local Subscriber Loop
Termed local loop or local subscriber line
Connection between the phone company Central
Office and individual subscriber residence
Uses analog signals
Most subscribers use a telephone to dial a
local service provider
Voice bandwidth and signal-to-noise ratio of
telephone lines limit the rate at which bits are
sent
ISDN
Integrated Services Digital Network
Provides digitized voice and data over local loop wiring
Uses twisted pair copper wiring
Offers three separate digital channels
B, B and D (2B + D)
The two B channels
Operate at 64 Kbps each
Carries digitized voice, data or compressed video
The D channel
Operates at 16 Kbps
Intended as a control channel
Manages or terminates a session
Both B channels bonded as a single channel
Asymmetric Digital Subscriber Line
ID - Identifier
Network Performance Characteristics
Delay
Specifies how long it takes for a bit of data to travel
across the network ( in seconds)
Propagation delay
Time a signal requires to travel across a wire or optical
fiber
Switching delay
Delay introduced by electronic devices in network
Access delay
Delays caused when waiting to access a shared media
Queuing delay
Occurs in packet switched WAN because it enqueues
packets
Network Performance Characteristics (Cont.)
Throughput
Measure of the rate at which data can be sent through a
network
Specified in bits per second, bps
Throughput is measure of capacity, not speed
Throughput and delay are related by
D = D0 / ( 1 – U)
D0 = idle network delay
U = current utilization between 0 and 1
D = Effective delay
Volume of data present on the network
Product of delay and throughput ( T * D )
Protocols
Protocol
A set of rules that specify the format of messages and the
appropriate action required for each message
Protocol software
The software that implements such rules
Application programs do not interact with network
hardware
Communication software is divided into multiple
protocols
Protocols are designed and developed in complete,
cooperative sets called suites or families
Protocol Design
Layering model
Describes one way a
communication
problem can be
divided into sub-
pieces called layers
ISO defined a 7-
layer model
The Seven Layers
Layer 1 : Physical
Corresponds to basic network hardware
Ex: RS 232
Layer 2: Data Link
Specifies how to organize data into frames and transmit
over a network
Ex: Frame format and CRC
Layer 3: Network
Specifies how addresses are assigned and how packets
are forwarded
Layer 4: Transport
Specifies how to handle details of reliable transfer
The Seven Layers (Cont.)
Layer 5: Session
Specifies how to establish a communication session with a
remote system
Ex: Security details
Layer 6: Presentation
Specifies how to represent data
Needed to translate from the representation on one
computer to another
Layer 7: Application
Specifies how one particular application uses the network
Ex: specifications for an application that transfers files
Stacks : Layered Software
When protocol
software sends or
receives data, each
module only
communicates with
the next highest
and lowest level
Incoming and
outgoing data
passes through
each layer
Stacks : Layered Software (Cont.)
Vendors use the word stack to refer to protocol
software
Software in the given layer on the sending
computer adds information to outgoing data
Software in the same layer on receiving computer
uses the additional information to process incoming
data
Stacks are
incompatible
Multiple, Nested Headers
Each layer places additional information in a
header before sending data to a lower layer
The header corresponding to the lowest-level
protocol occurs first
Scientific Basis for Layering
Layering principle
Layer N software on
the destination
computer must receive
the exact message
sent by layer N
software on the
sending computer
Whatever
transformation a
protocol applies
before sending a
frame must be
completely reversed
when the frame is
received
Techniques Protocols Use
Sequencing for Out-of-order Delivery
Connectionless networks often deliver packets
out of order
To handle this transfer protocol use sequencing
Each packet has a sequence number
Sequencing to Eliminate Duplicate Packets
Malfunctioning hardware causes packet
duplication
Ex: a transceiver using CSMA/CD
Sequencing solves the problem of duplication
Techniques Protocols Use (Cont.)
Retransmit ting Lost Packets
Protocols use positive acknowledgement with
retransmission
Protocol software uses a timer
Protocols bound the maximum number of retransmissions
Avoiding Replay Caused by Excessive Delay
Replay means that an old, delayed packet affects later
communication
A correct packet may be discarded as a duplicate
Protocols mark each session with a unique ID
Techniques Protocols Use (Cont.)
Flow Control to Prevent Data Overrun
Data overrun : A computer sends data faster than
the destination can absorb
Flow control techniques
4 – packet
Window
Stop-and-go
Sliding Window
Flow control
Techniques Protocols Use (Cont.)
Mechanisms to Avoid Net Congestion
Congestion : More packets arrive than can be send
The queue grows and the effective delay increases
Congestion collapse
Persistent congestion causes the entire network to become unusable
Protocols avoid congestion collapse by
Arranging for packet switches to inform senders when congestion
occurs
Use packet loss as as estimate of congestion
Congestion
prone network
Packet Switches