Title: COM 360
1COM 360
2Chapter 2
3Network Technologies
- Point-to-Point Links
- Carrier Sense Multiple Access ( CSMA) (for
example the Ethernet) - Token Rings (for example IEEE 802.5 and FDDI )
- Wireless (for which 802.11 is the emerging
standard)
4Problems
- Connecting computers is a first step.
- There are additional problems to solve before
they can exchange packets - Encoding bits into the transmission medium
- Framing the bits so they can be understood
- Error detection
- Reliable delivery, in spite of occasional errors
- Media access control
5Hardware Building Blocks
- Networks are constructed from nodes and links
- Nodes are general purpose computers such as
workstations, multiprocessors or PCs as well as
special purpose switches, routers. - Memory finite must be managed
- Network Adapter (NIC) and its device driver
- Links implemented on physical media, such as
twisted pair, coaxial cable, optical fiber
6Nodes
Example workstation architecture
7Links
- Physical media are used to propagate signals as
electromagnetic waves, traveling at the speed of
light. - Properties of EM waves
- Frequency- or oscillations, measured in hertz
- Wavelength distance between adjacent maxima and
minima, measured in meters
8Electromagnetic Waves
- Wavelength speed / frequency
- Voice grade phone lines carry waves ranging from
300 Hz to 3300 Hz - Voice-grade example 300Hz in copper wire
- Wavelength Speed in Copper/ Frequency
- 2/3 x 3 x 108 /300
- 667 x 103 meters
-
9Electromagnetic Spectrum
10Links
- A link is a physical medium carrying signals in
the form of electromagnetic waves. - Binary data is encoded in the signal.
- Lower layer is concerned with modulation, varying
the frequency, amplitude or phase of the signal - Upper layer is concerned with encoding the data
11Link Attributes
- Another link attribute is how many bit streams
can be encoded on it, at a given time. - One bit stream- connected nodes share access
- Point-to-point often two bit streams at once
- Full duplex - two directions simultaneously
- Half duplex one direction at a time
- Simplex one direction
12Cables
- Type of cable depends on technology
- Coaxial ( thick and thin) within buildings
- Category 5 ( CAT 5) twisted pair, thicker gauge
than telephone wire - Fiber plastic or most often glass, more
expensive, but used to connect buildings, and
transmits light instead of electrical waves.
13Local Link Cables
14Leased Lines
- To connect nodes on opposite sides of the
country, or at great distances, you must lease a
dedicated line from the telephone company. - DS1, DS3, T1, and T3 are relatively old
technologies, defined for copper - STS-N links are for optical fiber (Synchronous
Transport Signal), also called OC-N for Optical
Carrier - Originally designed for voice, today can carry
data, voice and video
15Common Bandwidths
16Last-Mile links
- Leased lines range in price from 1000/month to
dont ask - Last mile links span the last mile from the
network service provider to the home or office. - Conventional modem- POTS (plain old telephone
service) - ISDN (Integrated Services Digital Network)
uses CODEC ( coder/decoder) to encode analog to
digital signal - xDSL (Digital Subscriber Line)
- Cable modem- uses cable television (CATV)
infrastructure, available to 95 of US households
17Common Available Services
18xDSL
- Collection of technologies, able to transmit data
at high speeds over standard twisted pair lines - ASDL ( Asymmetric Digital Subscriber Line)-
different speeds in different directions
(upstream and downstream) called local loop - VDSL- (Very high rate Digital Subscriber Line)-
runs over shorter distances fiber to
neighborhood
19ADSL
downstream
upstream
ADSL connects the subscriber to the central
office via the local loop.
20VDSL
VDSL connects the subscriber to the optical
network that reaches the neighborhood.
21Shannons Theorem
- Shannons theorem gives an upper bound to the
capacity of a link, in terms of bits per second. - C B log2 (1S/N)
- where C is channel capacity, B is Bandwidth, S
is signal power, N is noise and S/N is the signal
to noise ratio expressed in decibels, related as - dB 10 x log10 (S/N)
22Shannons TheoremExample
- dB ratio pf 30 dB
- S/N 1000
- Bandwidth 3000Hz
- C B x log2 ( 1S/N)
- C 3000 x log2 (1001)
- C 30 Kbps
- roughly the limit of a 28.8 modem
- How are 56 Kbps modems possible? See p. 76
23CATV
- A subset of CATV channels are made available for
transmitting digital data - A single CATV channel has a bandwidth of 6 MHz
- Like ADSL, CATV is asymmetric with downstream
rates much greater than upstream - 40 Mbps downstream ( 100 Mbps max)
- 20 Mbps upstream ( roughly half as much)
- Unlike DSL, bandwidth is shared among all
subscribers in a neighborhood.
24Network Adaptor
Signals travel between signaling components. Bits
flow between adaptors. Network interface cards
are called NICs.
25Network Adaptors
- Nearly all the functions in this chapter are
implemented in the network adaptor (NIC) - framing, error detection and the media access
protocol. - The exceptions are the point-to-point automatic
repeat-request schemes(ARQ), which are
implemented at the lowest level protocol running
on the host.
26Block Diagram of a Network Adaptor
27Interrupts
- The host only pays attention to the network
device when the adaptor interrupts the host, (for
example, when a frame has been transmitted or one
arrives). - A procedure is invoked by the operating system,
and an interrupt handler is invoked to take the
appropriate action. - While servicing this interrupt, the OS disables
other interrupts.
28Direct Memory Access vs. Programmed I/O
- There are two ways to transfer the bytes from the
frame between the adaptor and host memory - Direct Memory Access (DMA)- the NIC directly
reads/writes to the hosts memory without CPU
involvement, using a pair of buffer descriptor
lists. - Programmed I/O (PIO)- network adaptor (NIC)
copies message into its own buffer, until CPU can
copy it into the host memory.
29Programmed I/O
30Memory Bottleneck
- Host memory is often a limiting factor in network
performance. - I/O bus speed corresponds to its peak bandwidth
(bus width x clock speed). - Real limitation is the size of the data block
being transferred ( See p. 145) - Memory/CPU bandwidth is same as bandwidth of I/O
bus. - Must be aware of limits memory puts on network
31Memory Bandwidth on Modern PC
32Wireless Links
- AMPS- Advance Mobile Phone System- standard for
cellular phones - PCS- Personal communication Services digital
cellular services in US and Canada - GSM- Global System for Mobile Communication in
the rest of the world. - They use a system of towers to transmit signals
and are moving toward ringing the globe with
satellites.
33Local Wireless Links
- Radio and infrared portions of the spectrum can
be used over short distances. - Technology- limited to in-building environments
- Radio bands at 5.2 GHz and 17 GHz are allocated
to HIPPERLAN in Europe and 2.4 GHz for use with
the IEEE 802.11 standard, which supports data
rates up to 54 Mbps. - Bluetooth radio, operates in the 2.45 GHz band
- Used for all devices, printers, PDAs, phones
- Networks of these devices are called piconets
34Bit Rates and Baud Rates
- Rate at which the signal changes is called the
baud rate. - When one bit is transmitted on a signal, the bit
rate and baud rate may be equal. - Often multiple bits are encoded onto a signal,
where for example with 4 bits per signal, the
baud rate may be 4 times the bit rate
35Encoding
- First step in turning nodes and links into usable
building blocks is to understand how to connect
them so that bits can be transmitted. - Next encode binary data that the source want to
send into signals that the links can carry and
then decode the data back into the corresponding
data at the receiving end. - The high and low signals correspond to 2
different voltages on a copper based system or 2
different power levels on an optical link.
36NRZ Encoding
- NRZ non-return to zero, maps the data value 1
to the high signal and 0 to the low signal - A sequence of several consecutive 1s means that
the signal stays high for a prolonged period of
time. - Two fundamental problems
- Baseline wander makes it difficult to detect a
significant change in the signal - Clock recovery needs frequent changes from high
to low to be enabled - Sender and receiver clock must be precisely
synchronized.
37NRZ Encoding
38NRZI Encoding
- NRZI non-return to zero inverted, addresses the
previous problem, by having the sender make a
transition from the current signal to encode a 1
and stay at current signal to encode a 0. (
Solves the problem of consecutive 1s, but not
0s)
39Manchester Encoding
- Merges the clock with the signal by transmitting
the exclusiveOR of the NRZ encoded data. - Results in 0 being encoded as a low-to-high
transition and 1 encoded as a high-to-low
transition. Because both 0s and 1 result in a
transition, the clock can be recovered at the
receiver. - Problem doubles the rate at which transitions
are made on the link, which gives receiver half
the time to detect them.
40Encoding Strategies
414B/5B Encoding
- Attempts to address the inefficiency of
Manchester encoding. - It inserts extra bits into the bit stream to
break up long sequences of 0s and 1s - Every 4 bits of data are encoded in a 5 bit code
- (See table 4B/5B encoding on p. 79)
42Packets and Frames
- Packet is generic'' term that refers to a
small block of data. - Each hardware technology uses a different
packet format. - Frame or hardware frame denotes a packet of a
specific format used on a specific hardware
technology.
43Framing
- Blocks of data (frames), not bit streams, are
exchanged between nodes. - The network adapter (NIC) enables the nodes to
exchange frames. - Recognizing what set of bits constitutes a frame,
and where the frame begins and ends, is the
challenge faced by the network adapter.
44Frame Format
- Need to define a standard format for data to
indicate the beginning and end of the frame - Header and trailer used to frame'' the data
(SOH and EOT) - Can choose two unused data values for framing
for example, if data is limited to printable
ASCII characters, you can use - start of header'' (soh)
- end of text'' (eot)
45Frame Format
- Framing in Practice
- Incurs extra overhead - soh and eot take time
to transmit, but carry no data - Accommodates transmission problems
- Missing eot indicates sending computer crashed
- Missing soh indicates receiving computer
missed beginning of message - Bad frame is discarded
46Framing
- Suppose A wishes to transmit a frame to B
- It tells adapter to transmit a frame from the
nodes memory - A sequence of bits is sent over the link
- The adapter on B then collects the sequence of
bits arriving on the link and deposits them in
Bs memory.
47Framing
Bits flow between adaptors, frames between hosts
48Framing
- There are several approaches to the framing
problem - Byte-Oriented Protocol (PPP)
- Sentinel Approach (frame start and end)
- Byte counting
- Bit Oriented Approach (HDLC)
- Clock-based framing (SONET)
49Byte-Oriented protocols
- One of the oldest approaches to framing is to
view each frame as a collection of bytes
(characters) rather than bits. - BISYNC (Binary Synchronous Communication)
protocol is a byte-oriented approach developed by
IBM in 1960s - DDCMP ( Digital Data communication Message
Protocol) was used in Digital Equipments DECNET. - These are examples of the sentinel approach and
the byte counting approach.
50Sentinel Approach
- A packet is a sequence of labeled fields.
- Above each field is a number indicating the
number of bits in the field. - Packets are transmitted beginning with the
leftmost field. The beginning of the frame is the
SYN (synchronization) character. - Data is contained between sentinel characters
STX (start of text) and ETX (end of text). - The header begins with a SOH (start of header)
field. - It ends with a CRC (cyclic redundancy check)
field.
51BISYNC Frame Format
52Framing problem
- ETX character may appear in the data.
- BISYNC overcomes this by using byte-stuffing or
character-stuffing by preceding the ETX character
with an escape character or DLE (data link
escape (similar to \n or \t in programming) - CRC (cyclic redundancy check) is used to detect
transmission errors.
53Point-To-Point Connection
- The first computer communication systems were
connected by communication channels that
connected exactly two computers. - Called a mesh or point-to-point network
- Had three useful properties
- 1. Each connection was independent and different
hardware could be used. (bandwidth, modems, etc.
did not have to be the same) - Allow for greater flexibility.
- 2. The connected computers have exclusive access
and could decide how to send data across the
connection. The can determine the frame format
and size, error detection mechanism, etc. - 3. Since only two computers share the channel it
is private and secure.
54Disadvantages of Point-To-Point
- 1. Number of wires grows as the number of
computers increases - 2. The total number of connections exceeds the
number of computers being connected. - The number of connections needed is proportional
to the square of the number of computers, since
the new computer must have a connection to each
of the existing computers. So to add the Nth
computer requires N-1 new connections.
55Disadvantages of Point-To-Point
- For N computers
- Connections (N2 - N)
- 2
56Point-to-Point Protocol
- Point-to-Point Protocol (PPP) is run over dialup
modem links and is similar to BISYNC. - Flag denotes the start-of-text character, address
and control fields contain default values. - The protocol is the high level protocol, such as
IP or IPX. - Payload size is usually 1500 bytes.
- Checksum field is either 2 or 4 bytes long.
57PPP Frame Format
58PPP Framing
- PPP framing is unusual in that several of the
field sizes are negotiable rather than fixed. - The negotiation is conducted by the LCP (Link
Control Protocol) Protocol. - PPP and LCP work in tandem
- LCP sends control messages encapsulated in PPP
frames denoted by an LCP identifier - Changes PPs frame format based on the
information contained in the control messages. - LCP also establishes a link between the peers
when both sides detect the carrier signal.
59Byte-Counting Approach
- The alternative to detecting the end of a file
with a sentinel value is to include the number of
items in the file at its beginning. - This is true in framing- the number of bytes in a
frame can be included in the header. - DDCMP protocol uses this approach and the COUNT
field specifies the number of bytes in the
frames body.
60DDCMP Frame Format
61Framing Errors
- A transmission error could corrupt the COUNT
field and the end of the frame would be
incorrectly detected. - A similar problem exists with the ETX field being
corrupt. - This is called a framing error.
- The receiver waits for the next SYN character to
collect data for the next frame. - A framing error may cause back-to-back frames to
be incorrectly received.
62Bit-Oriented Protocols
- Bit-oriented protocols are not concerned with
byte boundaries. It views the frame as a
collection of bits. - Synchronous Data Link Control ( SDLC), developed
by IBM is a bit-oriented protocol, later
standardized as the High Level Data Link Control
(HDLC). - Uses bit sequence 01111110 to denote beginning
and end of a frame. - It is also transmitted when the link is idle.
63HDLC Frame Format
64Data Stuffing
- Networks usually insert extra bits or bytes to
change data for transmission and this is called
Data Stuffing - Bit stuffing and byte stuffing are two
techniques for inserting extra data to encode
reserved bytes - Byte stuffing translates each reserved byte
into two unreserved bytes
65Byte Stuffing
- Can use esc as prefix, followed by x for soh,
y for eot and z for esc
66Byte Stuffing
- Sender translates each reserved byte into the
appropriate encoding pair of bytes - Receiver interprets pairs of bytes and stores
encoded byte in buffer - Data still framed by soh and eot
67Bit Stuffing
- Anytime 5 consecutive 1s are transmitted, the
sender inserts a 0 before sending the next bit.
On the receiving side. - When the receiver detects 5 consecutive 1s, it
assumes the next 0 was stuffed and removes it. - If the next bit is a 1, either this is the end of
frame marker or an error has occurred. - Size of the frame is dependent on the data being
sent in the frame payload.
68Clock-Based Framing
- Third approach to framing is the Synchronous
Optical Network (SONET) standard, called
clock-based framing. - SONET was proposed by Bell Communications
Research (Bellcore) for digital transmission over
an optical fiber. - Addresses the framing and encoding problems as
well as multiplexing low speed links onto a high
speed link. - More complex protocol
69SONET Framing
- SONET Frame has special information that
indicates where the frame starts and ends. - No bit stuffing is used
- How does receiver know where the frame starts and
ends? - Frame consists of 9 rows of 90 bytes each.
- First 3 bytes of each row are overhead.
- First two bytes of frame contain special bit
pattern - Use of overhead bytes is complex
70SONET STS-1 Frame
First two bytes of the frame contain a special
bit pattern that indicates the start of the frame
71STS-1 Multiplexing
Three STS-1 frames are multiplexed onto one STS-3
frame.
72SONET Frames Out of Phase
73Error Detection
- Bit errors occur in frames due to electrical
interference or thermal noise. - Detecting errors is one part of the problem
correcting errors is the other. - What happens when an error is detected?
- Two basic approaches
- Notify the sender that message is corrupt so the
sender can retransmit it ( most often used in
every day applications) - Use an error-correcting code to reconstruct the
correct message
74Transmission Errors
- External electromagnetic signals can cause
incorrect delivery of data - Data can be received incorrectly
- Data can be lost
- Unwanted data can be generated
- Any of these problems are called transmission
errors
75Error Detection
- Detecting Transmission Errors basic idea is to
add redundant information to a frame that can
determine if errors have been introduced. - Two-dimensional parity based on a simple parity
bit added to balance the number of 1s - Checksums code created based on addition
- Cyclic Redundancy Check (CRC) based on a
complex mathematical algorithm and used in nearly
all link level protocols.
76Parity
- Parity refers to the number of bits set to 1
in the data item - Even parity - an even number of bits are 1
- Odd parity - an odd number of bits are 1
- A parity bit is an extra bit transmitted with
a data item,chose to give the resulting bits even
or odd parity - Even parity - data 10010001, parity bit 1
- Odd parity - data 10010111, parity bit 0
77Parity and Error Detection
- If noise or other interference introduces an
error, one of the bits in the data will be
changed from a 1 to a 0 or from a 0 to a 1 - Parity of resulting bits will be wrong
- Original data and parity 100100011 (even
parity) - Incorrect data 101100011 (odd number of 1s)
- Transmitter and receiver agree on which parity
to use - Receiver detects error in data with incorrect
parity
78Limitations of Parity Checking
- Parity can only detect errors that change an
odd number of bits - Original data and parity 100100011 (even
parity) - Incorrect data 101100111 (even parity!)
- Parity usually used to catch one-bit errors
79Two-Dimensional Parity
- Two-dimensional parity involves adding on extra
bit to balance the number of 1s in each byte
(making the total either even or odd). - Two-dimensional parity does a similar calculation
for each bit position across all the bytes in the
frame, resulting in adding an extra parity byte
for the frame as well as an additional parity bit
for each byte. - Two-dimensional parity catches all the one, two
and 3 bit errors and most 4 bit errors.
80Two-Dimensional Parity
81Probability and Error Detection
- All error detection methods are approximate
and aim at a low probability of accepting
corrupted data. - Parity can detect a single bit error, but not all
possible errors, especially where two bits ( or
an even number of bits) are changed. - Many alternative schemes exist
- Detect multi-bit errors
- Correct errors through redundant information
- Checksum and CRC are two widely used techniques
82Internet Checksum Algorithm
- Simple idea add up all the words that are to be
transmitted and then transmit the sum, called the
checksum, with the data. - The receiver performs the same calculation and
compares it to the checksum received. If they do
not match, an error has occurred. - Does not detect all errors
- Algorithm is easy to implement ( See p. 94)
83Checksum
- Sum of data in message treated as array of
integers - Can be 8-,16- or 32-bit integers
- Typically use 1s-complement arithmetic
- Example -16-bit checksum with 1's complement
arithmetic
84Advantages of Checksum
- Fastest implementations of 16-bit checksum
use 32-bit arithmetic and add carries in at end - Easy to do - uses only addition
- Small size of checksum means cost of
- transmitting it is small.
- Ease of computation to create and verify
checksum.
85Checksum Limitations
- Does not detect all common errors (like
reversed bits)
86Cyclic Redundancy Check (CRC)
- CRC uses powerful mathematics ( finite fields) to
give strong protection against common bit errors
in messages that are thousands of bytes long.
87Detecting Errors with Cyclic Redundancy Checks
- Consider data in message as coefficients of
- a polynomial
- Divide that coefficient set by a known
- polynomial
- Transmit remainder as CRC
- Good error detection properties
- Easy to implement in hardware
88CRC Hardware
- The hardware used to computer a CRC is a shift
register, which act like a tunnel through which
bits move in a single file from right to left. - The shift register holds a fixed number of
bits so when a new bit moves in, another bit
moves out. - The output gives the value of the leftmost
bit. - When a bit changes, the output changes.
- The shift register has two operations
initialize and shift. - Initialize sets all bits to zero
- Shift moves all bits one position to the
left.
89CRC Hardware
90CRC Hardware
- CRC Hardware consists of 3 shift registers
connected with X-Or units. - Output from the leftmost unit goes to 3 places
simultaneously - the - 3 X-Or units.
- To compute the CRC values in all registers are
initialized and the bits are shifted one at a
time. - One bit of the message is applied to the input
unit and all three registers perform a shift.
This repeats for each bit of the message.
91CRC Calculation using Shift Registers
92CRC Computation
- After an entire message has been input, the shift
registers contain the 16 bit CRC for the message.
93CRC Computation
- A CRC can compute more errors that a simple
checksum because - An input bit is shifted through 3 registers
- The hardware uses feedback so that the effect
from a single bit cycles through the shift
registers more than once. - Mathematically a CRC uses a polynomial to divide
the message - P(X) x 16 X 12 X 5 1
94Example CRC
- A message is treated as a long binary
polynomial, P. - Before transmitting, the data link layer divides
P, - by a fixed polynomial function G(x), resulting
in a - whole quotient Q and a remainder R/G. The
- remainder is appended to the message and
- transmitted.
- It is checked by the receiver to see if R agrees
with the locally generated value for R. (See
Tanenbaum p.208-210 for analysis) -
95Example CRC
- Frame P 1101011011
- Generating function G(x) 10011
- Message after appending 4 zero bits
11010110110000 - Divide P by G to get remainder R
- 1100001010 with R
1110 - 10011 11010110110000
-
- Transmitted frame with remainder R appended
11010110111110
96Accuracy of CRC
- CRC actually adds 8, 16, 24, or 32 bits to the
message. - This method detects up to 99.969 of errors with
CRC-8 and nearly 99.9 with CRC-16 or CRC-24.
97Another CRC Example
See text. Pp. 94-95
98Error Correction or Error Detection?
- When error is detected, frame is discarded and
resent, using bandwidth and causing latency,
waiting for its arrival. - Error correction requires additional bit to be
sent with every frame. - Correction is useful when
- 1) errors are probable or
- 2) the cost of retransmission is too high
99Reliable Transportation
- A data link level protocol that wants to deliver
frames reliably must recover from discarded (
lost) frames. - Acknowledgements - (ack) is a small control frame
that a protocol sends back to report that it has
received the frame. If the sender does not
receive a frame in a reasonable amount of time,
it retransmits. - Timeouts -waiting a reasonable mount of time is
called a timeout
100Automatic Repeat Request
- Using acknowledgements and timeout to implement
reliable delivery is called automatic repeat
request (ARQ). - The simplest ARQ scheme is the Stop and Wait
algorithm.
101Stop and Wait
- After transmitting one frame the sender waits for
an ACK before transmitting the next frame. - If it does not arrive in a reasonable time, the
sender retransmits the original frame.
102Stop and Wait Algorithm
a) Arrives
c)ACK lost
b) Frame lost
d) Timeout too soon
103Duplicate Frames
- If a frame is late arriving another frame might
be retransmitted, resulting in duplicate frames. - To correct this, a header usually contains a
sequence number (0,1), which is used for
alternate frames. - When sender retransmits frame 0, the receiver can
see that it is a second copy of frame 0, not
frame 1.
104Timeline for Stop and Wait
105Sliding Window Protocol
- Allows sender to transmit multiple packets
before receiving an acknowledgment - Number of packets that can be sent is defined
by the protocol and called the window - As acknowledgments arrive from the receiver,
the window is moved along the data packets hence
sliding window'' - Sliding window protocol can increase throughput
dramatically
106Sliding Window Protocol
- Sliding window algorithm allows the transmission
of a frame at about the same time as the ACK
arrives. - Sender assigns a sequence number (SeqNum) to each
frame and maintains 3 variables - Send window size (SWS) - of unacknowledged
frames that sender can transmit - Last acknowledgement received (LAR)
- Last frame sent (LFS)
- LFS - LAR lt SWS
107Sliding Window
108Timeline for Sliding Window
109Sliding Window
- When ACK arrives, the sender moves LAR to the
right, allowing the sender to transmit another
frame. - Sender buffers up to SWS (send window size)
frames (in case they need to be retransmitted). - It also associates a timer with each frame it
transmits, so it can retransmit if an ACK is not
received in time. - LAR Last Acknowledgement Received
- LFS Last Frame Sent
- See pp. 105-115 for details and for interactive
demo see - http//www2.rad.com/networks/2004/sliding_window/d
emo.html
110Sliding Window on Sender
111Sliding window
- The receiver maintains 3 variables
- The receive window size ( RWS) the upper bound
on the number of out of order frames that the
receiver can accept. - The sequence number of the largest acceptable
frame (LAF)
112Sliding Window on Receiver
113Sliding Window Algorithm
- When frame with sequence number SeqNum arrives,
the receiver does the following - If SeqNum lt LFR or SeqNum gtLAF then frame is
outside the window and is discarded. - If LFR lt SeqNum lt LAF, then it is accepted.
- SeqNumToAck is largest not yet acknowledged
- Receiver acknowledges receipt of SeqNumToAck and
sets LFR SeqNumToAck - LAFLFR RWS
114Comparison of Sliding Window and Stop Wait
115Frame Order and Flow Control
- Sliding Window can be used for
- To reliably deliver frames on an unreliable link
- To preserve the order in which the frames are
transmitted, using the sequence numbers - To support flow control- a feedback mechanism by
which the receiver is able to throttle the sender
to keep it from overrunning the sender.
116Concurrent Logical Channels
- ARPANET Data Link protocol, or concurrent logical
channels, is an alternative to sliding window
protocol and can keep pipe full while using the
simple stop and wait protocol. - It multiplexes several logical channels onto a
single point-to-point link and runs the stop and
wait protocol on each.
117Ethernet (802.3)
- The Ethernet is the most successful local area
networking technology. - 1973- Developed at Xerox Park by Bob Metcalfe and
David Boggs, it is a general form of the Carrier
Sense Multiple Access with Collision Detection
(CSMA/CD) technology. - Based on Aloha, early packet network developed at
the University of Hawaii to support communication
across the islands.
118Bob Metcalfe
- Developed the Ethernet with David Boggs
- 1979 Founded 3COM Corporation, which makes
wirelesss access points - Founded Infoworld
- Authored numerous books and articles
- Recipient of many awards including the National
Medal of Technology (2005) and induction into the
National Inventors Hall of Fame for his
contributions to the welfare of mankind. - Spoke at the CCSCE Conference at SJC, October,
2007 ETHERNET IS THE ANSWER WHAT IS THE
QUESTION?
119Ethernet (802.3)
- Digital Equipment Corporation (DEC), Intel and
Xerox joined to form the 10 Mbps Ethernet
standard in 1978. - This standard formed the basis of the IEEE
standard 802.3 - It has recently been extended to include a 100
Mbps version, called Fast Ethernet and a 1000
Mbps version called Gigabit Ethernet.
120Ethernet (802.3)
- The Ethernet is a multiple-access network meaning
that a set of nodes send and receive frames over
a shared link. - The carrier sense means that the nodes can
distinguish between a busy and idle link. - Collision detect means that a node listens as
it transmits and can detect when a transmitting
frame has interfered (collided) with a frame
transmitted by another node. - When a collision occurs, both nodes back off,
wait a random amount of time and then attempt to
send again.
121Physical Properties
- An Ethernet is typically implemented on coaxial
cables of up to 500 meters. - (On older versions, called thick-net or 10Base5,
a transceiver connected hosts to the cable and
then to the network adapter or NIC card.) - Newer versions, 10Base2, connect directly through
the NIC, where all the logic is contained. - 10BaseT, for twisted pair, uses Cat 5 cable and
is limited to 100meter. - Base refers to the baseband system.
122Ethernet Transceiver and Adapter
123Thick Ethernet Wiring
- Uses thick coax cable
- AUI cable (or transceiver or drop cable
connects from NIC to transceiver - AUI cable carries digital signal from NIC to
transceiver - Transceiver generates analog signal on coax
- Wires in AUI cable carry digital signals, power
and other control signals
124Ethernet Wiring
- Uses thin coax that is cheaper and easier
to install than thick Ethernet coax - Transceiver electronics built into NIC NIC
connects directly to network medium - Coax cable uses BNC connector
125Ethernet Wiring
- Coax runs directly to back of each connected
computer - T connector attaches directly to NIC
Useful when many computers are located close
to each other May be unreliable - any
disconnection disrupts entire net
126Twisted Pair Ethernet
- Variously called 10Base-T, twisted pair or TP
Ethernet - Replaces AUI cable with twisted pair cable
- Replaces thick coax with hub
127Physical Properties
- Multiple Ethernet segments are joined by
repeaters, which forward a digital signal. - No more than 4 repeaters may be connected to any
pair of hosts, limiting an Ethernet to a maximum
of 2500 meters. - An Ethernet can support a maximum of 1024 hosts.
- Any signal placed on the Ethernet is broadcast to
all hosts. - Terminators are attached to the end of each
segment to absorb the signal. - The Ethernet uses Manchester encoding.
128Ethernet repeaters
Repeater
Host
129Ethernet Hubs
The common 10BaseT configuration is to have
several point-to-point segments connected to a
hub or switch. This is also true for 100Mbps
Ethernet, but not for Gigabit Ethernet.
130HUBS
131Access Protocol
- On an Ethernet, all hosts are competing for
access to the same shared link. - The media access control (MAC) algorithm controls
access to the link. - It is implemented in hardware on the network
adapter.
132Network Adapter Cards (NIC)
- CPU can't process data at network speeds
- Computer systems use special purpose hardware
for network connection - Typically a separate card in the backplane
- Network adapter card or network interface card
(NIC) - Connector at back of computer then accepts
cable to physical network
133Network Interface Hardware
134NIC Cards
The sockets for the NIC cards are usually
located near the back of the cabinet and a
network cable attaches to the end of the NIC.
135NIC Cards and Wiring
NICS can provide all three connection technologies
136Ethernet Frame Format
- Taken from the Digital-Intel-Xerox Ethernet
Standard - Each Ethernet frame is defined by the following
format where the preamble allows the receiver to
synchronize with the signal. - Both source and destination hosts are identified
by addresses - Packet type identifies the protocol
- Each packet can contain up to 1500 bytes of data
(46bytes minimum) - 32-bit CRC for error detection
137Addresses
- Each host on an Ethernet has a unique Ethernet
address. - Technically the address belongs to the adaptor,
not to the host and is usually burned into the
NIC card ROM. - Each NIC card has a unique prefix and makes sure
it assigns unique addresses - Addresses can be assigned statically, dynamically
or can be configurable and assigned by the
network administrator
138Assigning Addresses
139Addressing Scheme Comparison
Addressing Scheme Advantages
Disadvantages
140Address Types
- Each frame on an Ethernet is received by every
connected adaptor. - Each adaptor recognizes the frames addressed to
it and passes those frames to it host. These are
unicast addresses. - A broadcast address, consisting of all 1s, is
recognized by all NIC cards. - A multicast address, with first bit set to 1, is
recognized by a subset of NIC cards. - Running in promiscuous mode, means that a NIC
card will pass all messages to its host.
141Ethernet Address Summary
- An Ethernet adaptor receives all frames and
accepts - Frames addressed to its own address
- Frames addresses to the broadcast address
- Frames addressed to a multicast address, if it is
part of that subset - All frames if it is in promiscuous mode
142Transmitter Algorithm
- Receiver side is simple.
- Sender side implements Ethernet protocol.
- When NIC has frame to send and the line is busy,
it waits for the line to become idle. - Because there is no centralized control, two (or
more) adaptors may send at once, causing a
collision. When a collision is detected, a
jamming sequence is sent to stop transmission. - The adaptors wait a random amount of time before
trying again. - Each time there is a collision, the delay
interval doubles called exponential backoff.
143Worst Case Scenario
144Success of the Ethernet
- Extremely easy to administer, no switches to
fail, no routing or configuration tables - Easy to add additional hosts
- It is inexpensive, since cables are relatively
cheap. - Most new LAN switching technology is based on the
Ethernet
145Token Rings (802.5, FDDI, RPR)
- Token Rings are the other significant class of
shared media networks. - IBM Token Ring, was the original followed by
the IEEE 802.5 standard, which was nearly
identical, and finally the newer FDDI (Fiber
Distributed Data Interface) Standard, which is
declining in use. - Resilient Packet Ring or RPR (802.17) is nearly
standardized.
146Token Ring
- Token ring Network consists of a set of nodes
connected in a ring. - Data flows in a particular direction around the
ring so that each node receives a packet from its
upstream neighbor and forwards it to its
downstream neighbor. - Similar to Ethernet in that it involves an
algorithm which controls when a node can
transmit, and all nodes see all frames. - Sending a message differs from that of the
Ethernet.
147Token Ring Network
148Implementing a Token Ring
149Tokens
- Access to the network is controlled by a token.
- A token is a special sequence of bits, which
circulates around the ring. - Each node receives the token, and when it has the
token, that node may send a packet and then
forward the token to the next node in a
round-robin fashion. - This is fair, since each node gets a turn to send.
150Physical Properties
- Any link or node failure makes the whole network
useless. - When relay is open, the station is included in
the ring if the relay closes, the ring bypasses
the node. - Several relays are packed into a single
multi-station access unit ( MSAU) required by
IBM token ring. - Data rate is 4 or 16 Mbps and uses Manchester
differential encoding - Twisted pair is required for IBM and not
specified for 802.5
151Relay on Token Ring
b) Relay closed-host bypassed
a) Relay open host active
152Multimedia Access Unit
Used only in electrical rings to compensate for
node failure.
153Token Ring Media Access Control
- Network adapter contains a receiver, transmitter,
and one or more bits of data storage. - When no node is sending, the token circulates.
- A sending station, seizes the token and sends
data. Token holding time (THT) is the time the
node can hold the token. Default THT 10ms. - 802.5 also supports a strict priority scheme
- Sending node can reinsert token immediately
following its frame (early) or after the frame
circles the ring and is removed (delayed) release.
154Token Release
a) early
b) delayed
155Token Ring Maintenance
- Token rings have a station designated as the
monitor. - Procedures are defined to elect a monitor when
the ring is first connected or when the monitor
fails. - Monitor must make sure there is always a toke in
the ring and that there is sufficient delay. - It also checks for corrupted or orphaned frames.
- It also checks for dead stations.
156Token Ring Frame Format
- Uses differential encoding codes in start and end
delimiters. - Access control byte includes the frame priority
- Frame control byte identifies the higher-level
protocol - Like Ethernet, addresses are 48 bytes long
- Includes a 32- bit CRC and A and C bits for
reliable delivery
157FDDI
- Fiber Distributed Data Interface (FDDI) is
similar to 802.5 and IBM token ring. - Significant differences are that it runs on
fiber, not copper and makes use of some newer
innovations - It is usually a dual ring where each ring
transmits in the opposite direction. - The second ring is only used if the primary ring
fails and there is a loop back toform a
complete ring. - Instead of a monitor all nodes participate
equally in maintaining the ring.
158Dual Fiber Ring
a) Normal operation
b) Failure of primary ring
159Physical Properties
- FDDI network consists of a dual ring- two rings
that transmit data in opposite directions. The
second ring is only used if the primary ring
fails. - Nodes attach to the ring with a single cable
called single attachment stations (SAS). A
concentrator attaches several SASs to the ring. - FDDI is a 100 Mbps network and is limited to 500
hosts. - FDDI uses 4B/5B encoding
- Token holding algorithms are more complex than
802.5
160FDDI Frame Format
- Similar to 802.5 with these exceptions
- Uses 4B/5B encoding instead of Manchester
- Has a bit in the header to distinguish
synchronous from asynchronous traffic - Lacks the access control bits present in 802.5
161Resilient Packet Ring (RPR)
- Relatively recent technology IEEE (802.17)
- Resiliency- the ability to recover quickly from a
link or node failure was its key design goal. - Other goals were bandwidth efficiency and Quality
of Service (QoS) support. - Like FDDI it uses 2 rings, but unlike FDDI , both
are used for normal service. - Uses buffer insertion instead of a token.
- Used in MANs but metro Ethernet is coming
162Wireless
- Wireless is the rapidly evolving technology for
connecting communication devices - Bluetooth
- Wi-Fi -802.11
- Wi-MAX 802.16
- and 3G cellular wireless
- They differ in how much bandwidth they can
provide, how far apart nodes can be and which
part of the electromagnetic spectrum they use.
163Wireless Technologies
164Wireless
- The most widely used wireless links are
asymmetric the two endpoints are different
kinds of nodes - One endpoint acts as a base station and has no
mobility and is wired to the Internet or other
network. - The client not is often mobile and relies on its
link to the base station to communicate with
other nodes.
165(No Transcript)
166Wireless
- Notice that wireless naturally supports point to
multipoint communications becaues radiio waves
sent out by one device can be simultaneously
received by many devices - However communication between client nodes is
routed through the base node
167Example Wireless Network
168Levels of Mobility
- No mobility- when a receiver must be in a fixed
location to receive a directional transmission
from a base station (true of the initial WiMAX) - Mobility within the range of a base as in the
case of Bluetooth - Mobility between bases as is the case with cell
phones and Wi-Fi
169Mesh or Ad hoc Network
- A wireless mesh is an alternative topology
- Nodes are peers ( there is no base station)
- Messages are forwarded through a chian of peers
as long as each peer is within range of the
preceeding node. - This allows a wireless portion of a network to
extend beyond the limited range of a single radio.
170(No Transcript)
171Bluetooth
- Bluetooth provides very short range communication
between mobile phones, PDAs, notebook computers
and other peripheral devices. - It is a convenient alternative to connecting with
a wire. - It has a range of only 10 m and operates at 2.45
GHz - Because devices usually blong to an individual or
group it is often called a PAN ( personal area
network) - Network connects up to 7 devices to a master and
is called a piconet.
172Bluetooth piconet
173Wireless ( 802.11)
- Like Ethernet and Token Ring, 802.11 is designed
for use in a limited geographical area (homes,
office buildings, campuses). - Primary challenge is to mediated shared access
through space. - 802.11 supports additional features (time-bound
services, power management and security)
174Physical Properties
- 802.11 was designed to run over three different
media- two based on spread spectra and one based
on diffused infrared. - The radio based versions run at 11 and 54 Mbps.
- A chipping sequence spreads the signal over a
wide frequency using a random sequence and makes
the signal look like noise to any receiver that
does not know the sequence. - Infrared signals are diffused so the sender and
receiver do not need to be aimed at each other,
but must be within buildings.
1754-Bit Chipping Sequence
176Collision Avoidance
- The protocol is more complex than Ethernet, since
all nodes are not always within reach. - Consider 4 nodes A,B,C,D that are able to send
to a node to its immediate left or right,so B
can reach A and C but not D. - If A and C both send to B they collide, but are
unaware of each other and are called hidden nodes.
177Hidden node problem A C can collide at B
178Collision Avoidance
- Another related problem is the exposed node
problem. - Suppose B is sending to A and C is aware of this.
It is a mistake for C to think it cannot
transmit. - It is not a problem for C to transmit to D
because it will not interfere with As ability to
receive from C
179 Exposed node problem B can
transmit to A and C can transmit to D
180Collision Avoidance
- 802.11 addresses these two problems with a
Multiple Access Collision Avoidance algorithm.
(MACA) - Sender and receiver exchange control frames
before transmitting data - Sender sends a request to transmit (RTS) frame.
- Receiver relies with a clear to send (CTS) frame.
- Receiver also sends an ACK after successfully
receiving the frame. All nodes must wait for this
before trying to transmit. - CTS frames can collide and both must wait before
transmitting, similar to Ethernet backoff.
181Distribution System
- Since an advantage of a wireless system is that
nodes are free to move around, reachable nodes
may change over time. - Some nodes may roam and some, called Access
Points (AP) are connected to the network
infrastructure by a distribution system. - Distribution system runs at layer 2 of the ISO
architecture and does not depend on higher layers.
182Access Points connected to a Distribution Network
Each node associates itself with one access point.
183Communication Example
- For node A to communicate with node E
- A first sends a frame to its access point AP-1,
which forwards the frame across the distribution
system to AP-3, which finally transmits the frame
to E
184Selecting an AP
- Technique called scanning
- The node sends a Probe frame
- All APs within reach reply with a Probe Response
Frame - The nodes selects one of the access points and
sends that AP an Association Request Frame. - The AP replies with an Association Response Frame
- A node uses this when it joins the network and
when it becomes unhappy with current AP ( weak
signal, etc.)
185Active and Passive Scanning
- After a node has probed the network, it
associates itself with an Access Point. This is
called active scanning. - APs also periodically send a Beacon Frame that
advertise the capabilities of the Access Point,
including transmission rates. A node can change
to this point by sending an Association Request
Frame to the access Access Point . This is called
passive scanning.
186Node Mobility
187802.11 Frame Format
48 bit Source and Destination addresses ( addr1,
addr2) Two additional address fields depends on
the ToDS, From DS settings Control fields Type,
ToDS, FromDS Type fields indicates whether the
frame is RTS, CTS or data CRC for error detection
188802.11 Frame Format
189WiMAX (802.16)
- WiMAX stands for Worldwide Interoperability for
Microwave Access - It is a metropolitan area network(MAN) with a
range of 1-30 miles. - It odes not yet inclued mobility, but that will
be added as 802.16e - Its clients are multiplexers for a building and
to adapt to different frequencies it uses
different physical layer protocols.
190Cell Phone Technologies
- Frequency bands vary around the world
- Europe 900 and 1800 MHz bands
- North America 850 and 1900 MHz bands
- Cost is high to users because of licensed
spectrum - Incompatible cell phone standards
- Phones designed to carry voice now carry video,
and audio which require high bandwidth
191Cell Phone Technologies
- Relies on use of base stations that are part of a
wired network - Geographic area served by the base stations
antenna is called a cell - Cells overlap and a base station can serve more
than one cell using multiple antennae.
192Handoff
- As a phone begins to leave a cell, it moves into
an area of overlap with other cells - The current base station senses the weakening
signal and give control to whichever base station
is receiving the stronger signal from it. - If a phone is receiving a call, the call must be
transferred over to the new base station in what
is called a handoff.
193Cell Phone Generations
- 1G analog
- 2G digital -most of the current technology,
some are referred to as 2.5 G not quite third
generation, but more advanced. These are GSM-
Global System for Mobile Communications - 3G Based on CDMA (code division Multiple Access
- Satphones- class of phones that are not cellular,
but are satellite phones
194Summary
- Five key problems so that links can exchange
information - Encoding problem for physical links carrying
signals - The framing problem determines how to package
bits into frames - The error detection problem using CRC, parity,
and checksums - Problem of recovering lost frames discarded
because of errors - Problem of mediating access on shared media
(Ethernet, token ring and wireless)
195Further Reading
- Metcalfe, Robert. and Boggs, David, Ethernet
Distributed Packet Switching For Local Computer
Networks, Communications of the ACM,
19(7)395-403, July, 1976 - http//standards.ieee.org/ for status of IEEE
standards - See p. 145 for more complete list