Computer Networks: Topics To Be Covered
Computer Networks: Topics To Be Covered
Computer Networks: Topics To Be Covered
Topics to be covered
Unit I Basics of Networks
Network Components and categories types
of Connections Topologies Layers Physical
Links Hybrid Multiple Access Techniques
Medium Access CSMA Ethernet Token Ring
FDDI Wireless LAN
1
Types of Networks:
LANs (Local Area Networks)
networks usually confined to a geographic area, such as a
single building or a college campus.
LANs can be small, linking as few as three computers, but
often link hundreds of computers used by thousands of
people.
3
Categories of Network
Network can be divided in to two main categories:
Peer-to-peer.
there are no dedicated servers or hierarchy among the computers.
All of the computers are equal and therefore known as peers.
Normally each computer serves as Client/Server and there is no
one assigned to be an administrator responsible for the entire
network.
Server based.
The client/server network is the most efficient way to provide:
an
implementation
of
Ethernet Cables
When we reference Cables in Networking we are generally referring to
RJ45 Ethernet Networking Cables;
These Cables are often referred to by the Standard that they adhere to i.e.
Category 5 (Cat 5) or Category 6 (Cat 6).
The Cables are further distinguished with regard to they way in which they
are wired;
Straight-Through (Patch)
Crossover
Due to the widespread use of Auto-Sensing LAN Ports we see very little
occasions where a Crossover Cable is actually required now.
Generally speaking Crossover Cables are just used when networking two
PCs directly together, or when daisy-chaining Network Hubs.
For all other instances Patch Cables are generally used.
Client Adapters
There are numerous types of Network Interface Cards or Client
Adapters and they are usually identified by their Type and Connection
Technology;
Every Network Interface Card (NIC) has a unique MAC address
pointing to its Manufacturer.
10
Hub
Hubs tie the Network together.
A Network can be extended by daisy-chaining one Hub to
another.
Hubs by default echo all traffic to all Ports, so when a Packet of
data arrives at one Port, it is copied to the other Ports so that all
segments of the Network can see all Packets.
Switch
Switches differ from Hubs in that they track MAC Addresses on
both sides of the Network and do not echo any traffic that does
not need to be echoed.
Broadcast messages are not filtered via Switches, and these are
continued to be echoed to all Ports, but otherwise the Switch is
intelligently filtering to ensure that only traffic destined for a
particular MAC Address on a Particular Port, gets to that device.
11
Access Point
12
Router -
Class A: 10.x.x.x
Class B: 172.16.x.x 172.31.x.x
Class C: 192.168.x.x
13
Modem
The name Modem derives from the functionality of the Device
in that it is Modem in essence a Modulator/Demodulator.
It is essentially a Communications Device that converts one
form of a signal to another that is suitable for transmission
over a Phone Line.
Typically Digital Data from a PC is converted to Analogue Data
which is sent via the Phone Line and then from converted back
from this Analogue Data to Digital Data again on the next PC.
Modem Routers
A Modem Router is in fact a . . . Router + Access Point + Network
Switch + Modem + NAT device
Topologies
15
I. Bus Topology
This structure is very popular for local
area networks. In this structure or
topology, a single network cable runs in
the building or campus
and all nodes are
linked along with this communication
line with two endpoints called the bus or backbone as
show figure.
By this type of topology, if one node goes faulty all nodes may be
affected as all nodes share the same cable for the sending and
receiving of information.
The cabling cost of bus systems is the least of all the different
topologies. Each end of the cable is terminated using a special
terminator.
Advantages:
Reliable in very small networks as well as easy to use and understand.
Requires least amount of cable to connect the computers (nodes)
together and therefore is less expensive than other cabling
arrangements.
It's easy to extend, Two cables can be easily joined with a connector,
making a longer cable for more computers to join the network.
A repeater can also be used to extend a bus configuration
16
Disadvantages:
Heavy network traffic can slow a bus considerably because any
computer can transmit at any time. But networks do not coordinate
when information is sent. Computer interrupting each other can use
a lot of bandwidth.
Each connection between two cables weakens the electrical signal.
The bus configuration can be difficult to find and can cause the
whole networks to stop functioning.
17
Information travels around the ring from one node to the next.
Each packet of data sent to the ring is prefixed by the address of
the station to which it is being sent.
When a packet of data arrives, the node checks to see if the
packet address is the same as its own, if it is, it grabs the data in
the packet. If the packet does not belong to it, it sends the
packet to the next node in the ring.
Faulty nodes can be isolated from the ring. When the workstation
is powered on, it connects itself to the ring. When power is off, it
disconnects itself from the ring and allows the information to
bypass the node.
The most common implementation of this topology is token ring.
A break in the ring causes the entire network to fail. Individual
nodes can be isolated from the ring.
Advantages:
Ring networks offer high performance for a small number of workstations or
for larger networks where each station has a similar workload.
Ring networks can span longer distances than other types of networks.
Ring networks are easily extendable.
Unlike Bus topology, there is no signal loss in Ring topology because the
tokens are data packets that are re-generated at each node.
18
Disadvantages:
Advantages:
It is more reliable (if one connection fails, it does not affect others)
The center of a star network is a good place to diagnose network
faults and if one computer fails whole network is not disturbed.
Hub detects the fault and isolates the faulty computer.
It is easy to replace, install or remove hosts or other devices, the
problem can be easily detected-It is easier to modify or add a new
computer without disturbing the rest of the network by simply
running a new line from the computer to the central location and
plugging it to the hub.
Use of multiple cable types in a same network with a hub.
It has good performance
Disadvantages
It is expensive to install as it requires more cable, it costs more to
cable a star network because all network cables must be pulled to
one central point, requiring more cable length than other
networking topologies.
Central node dependency, if central hub fails, the whole network
fails to operate.
Many star networks require a device at the central point to
rebroadcast or switch the network traffic.
20
Disadvantages
The amount of cabling required is high.
A large number of I/O (input/output) ports are required.
V. Tree Topology
Disadvantages
Failure in the central hub brings the entire network to a halt.
More cabling is required when compared to the bus topology
because each node is connected to the central hub.
22
Network Components
A data communications system has five components
LAYERED TASKS
24
25
Data Link Layer - responsible for moving frames from one hop (node) to the next.
The data link layer transforms the physical layer, a raw transmission facility, to a reliable
link. It makes the physical layer appear error-free to the upper layer
Network Layer - responsible for the delivery of individual pkts from the source
to the destination.
Transport Layer - responsible for the delivery of a message from one process
to another.
The transport layer is responsible for process-to-process delivery of the entire
message.
A process is an application program running on a host.
Whereas the network layer oversees source-to-destination delivery of individual
packets, it does not recognize any relationship between those packets. It treats
each one independently, as though each piece belonged to a separate
message, whether or not it does.
The transport layer, on the other hand, ensures that the whole message arrives
intact and in order, overseeing both error control and flow control at the sourceto-destination level.
responsible
for
dialog
control
and
The services provided by the first three layers (physical, data link, and network)
are not sufficient for some processes.
The session layer is the network dialog controller. It establishes, maintains, and
synchronizes the interaction among communicating systems.
PHYSICAL LINKS
Guided Media
Guided media conduct signals from one device to another include Twistedpair cable, Coaxial Cable and Fiber-optic cable. A signal traveling along any of
these media is directed and contained by the physical limits of the medium.
Twisted-pair and coaxial cable use metallic (copper) conductors that accept
and transport signals in the form of electric current. Optical fiber is a glass
cable that accepts and transports signals in the form of light.
34
Interference and cross talk may affect both the wires and create
unwanted signals, if the two wires are parallel.
By twisting the pair, a balance is maintained. Suppose in one twist one
wire is closer to noise and the other is farther in the next twist the
reverse is true. Twisting makes it probable that both wires are equally
affected by external influences.
Twisted Pair Cable comes into two forms:
Unshielded
Shielded
35
Coaxial Cable
36
37
StepIndex
Single mode
Graded Index
Multimode
In the multiple mode, multiple light
beams from a source move through
the core in different paths
Single Mode
Single mode uses step-index fiber
and a highly focused source of light
that limits beams to a small range of
angles, all close to the horizontal.
The single mode fiber itself is
manufactured with a much smaller
diameter than that of multimedia
38
fiber.
Unguided media
Unguided media transport electromagnetic waves without
using a physical conductor. This type of communication is often
referred to as wireless communication.
Signals are normally broadcast through air and thus available
to anyone who has device capable of receiving them.
Unguided signals can travel from the source to destination in
several ways:
Ground propagation waves travel through lowest
portion on atmosphere.
Sky propagation High frequency waves radiate upward
into ionosphere and reflected back to earth.
Line-of-sight propagation Very high frequency signals
travel in a straight line
39
Radio Waves
Electromagnetic waves ranging in frequencies between 3 kHz and 1
GHz are normally called radio waves.
Properties
Radio waves are omni directional. When an antenna transmits radio
waves, they are propagated in all directions. This means that the
sending and receiving antennas do not have to be aligned.
A sending antenna sends waves that can be received by any receiving
antenna.
Radio waves, particularly those of low and medium frequencies, can
penetrate walls.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz
are called microwaves.
Properties
Disadvantage
If receivers are inside buildings, they cannot receive these
waves
Applications
Microwaves are used for unicast communication such as cellular
telephones, satellite networks, and wireless LANs.
Infrared
Electromagnetic waves with frequencies from 300 GHz to 400
THz are called infrared rays
Infrared waves, having high frequencies, cannot penetrate walls.
Applications
Infrared signals can be used for short-range communication in a
closed area using line-of-sight propagation.
Channel Access on links
Multiple Access Techniques
Various multiple access techniques are
Frequency Division Multiple Access(FDMA)
Time Division Multiple Access (TDMA)
Code Division Multiple Access(CDMA)
41
43
Medium Access
Some network topologies share a common medium with multiple
nodes.
At any one time, there may be a number of devices attempting to
send and receive data using the network media.
When two or more nodes are sending data at the same time, data
may be unusable due to collision.
There are rules that govern how these devices share the media to
solve the collision problem.
Here are two basic media access control methods for shared media:
Controlled - Each node has its own time to use the medium.
Network devices will take turns, in sequence, to access the medium.
One example is Token Ring.
Contention-based - All nodes compete for the use of the medium.
CSMA is usually implemented in conjunction with a method for
resolving the media contention. The two commonly used
methods are:
CSMA/CollisionDetection
CSMA/Collision Avoidance
44
. If the channel is clear when the backoff counter reaches zero, the node
transmits the packet. If the channel is not clear when the backoff counter
reaches zero, the backoff factor is set again, and the process starts.
45
Ethernet (802.3)
Ethernet Architecture
Ethernet architecture can be divided into two layers:
Physical layer: this layer takes care of following
functions.
47
The IEEE 802.3 standard defines a basic data frame format that is
required for all MAC implementations, plus additional optional
formats that are used to extend the protocols basic capability.
The basic data frame format contains the following seven fields
Preamble (PA):
It consists of 7 bytes. The PA is an alternating pattern of ones and zeros
that tells the receiving stations that a frame is coming, and that provides
a means to syncronize the frame-reception portion of receiving physical
layers with the incoming b bit stream.
Length/Type:
It consists of 4 bytes. This field indicates either the number of MAC-client data
bytes that are contained in the data field of the frame, or the frame type ID if the
frame is assembled using an optional format.
Data:
Introduction
Token Ring and IEEE802.5 are based on token passing MAC
protocol with ring topology.
They resolve the uncertainty by giving each station a turn on by
one.
Each node takes turns sending the data; each station may
transmit data during its turn.
The technique that coordinates this turn mechanism is called
Token passing; as a Token is passed in the network and the
station that gets the token can only transmit.
As one node transmits at a time, there is no chance of collision.
Stations are connected by point-to-point links using repeaters.
Mainly these links are of shielded twisted-pair cables.
The repeaters function in two basic modes:
Listen mode,
Transmit mode.
Priority System
Token Ring networks use a sophisticated priority system that permits
certain user-designated, high-priority stations to use the network more
frequently.
Token Ring frames have two fields that control priority:
the priority field and
the reservation field.
Only stations with a priority equal to or higher than the priority value
contained in a token can seize that token.
After the token is seized and changed to an information frame, only
stations with a priority value higher than that of the transmitting
station can reserve the token for the next pass around the network.
When the next token is generated, it includes the higher priority of the
reserving station. Stations that raise a token's priority level must
reinstate the previous priority after their transmission is complete.
Ring Maintenance
There are two error conditions that could cause the token ring to break
down.
One is the lost token in which case there is no token the ring, the other
is the busy token that circulates endlessly.
To overcome these problems, the IEEE 802 standard specifies that one
of the stations be designated as active monitor.
52
Access-control (1 byte):
Contains the Priority field (the most significant 3 bits) and
the Reservation field (the least significant 3 bits),
as well as a token bit (used to differentiate a token from a
data/command frame) and
a monitor bit (used by the active monitor to determine whether a
frame is circling the ring endlessly).
57
60
62
63
The claim frames in FDDI differ from those in 802.5 because they
contain the nodes bid for the TTRT, that is, the token rotation
time that the node needs so that the applications running on the
node can meet their timing constraints.
If this claim frame makes it all the way around the ring, then the
sender removes it, knowing that its TTRT bid was the lowest.
That node now holds the tokenthat is, it is responsible for
inserting a valid token on the ringand may proceed with the
normal token algorithm.
When a node receives a claim frame, it checks to see if the TTRT
bid in the frame is less than its own. If it is, then the node resets
its local definition of the TTRT to that contained in the claim
frame and forwards the frame to the next node.