Computer Networking Module Prasad D
Computer Networking Module Prasad D
Technology faculty
Prepared by:-
Mr Dharnasi Prasad
ECTS :- 5
DTU
October,2015
Debre Tabor
1
Chapter -1: Introduction to Computer Network and internet
1.1 Introduction :
The public Internet is a world-wide computer network, i.e., a network that interconnects millions of
computing devices throughout the world. Most of these computing devices are traditional desktop PCs,
workstations, and so called "servers" that store and transmit information such as WWW pages and e-mail
messages. Increasingly, non-traditional computing devices such as Web TVs, mobile computers, pagers and
toasters are being connected to the Internet. (Toasters are not the only rather unusual devices to have been
In the Internet jargon, all of these devices are called hosts or end systems. The Internet applications, with which
many of us are familiar, such as the WWW and e-mail, are network application programs that run on such end
systems.
The Internet, the Web, and associated applications have emerged as dominant features of the business and
personal world, opening up many opportunities and challenges for managers. In addition to exploiting the Internet
and the Web to reach customers, suppliers, and partners, enterprises have formed intranets and extranets to
isolate their proprietary information free from unwanted access.
Briefly, an intranet uses Internet and Web technology in an isolated facility internal to an enterprise; an extranet
extends a company’s intranet out onto the Internet to allow selected customers, suppliers, and mobile workers to
access the company’s private data and applications.
A common form of internet is a collection of LANs connected by a WAN. A collection of interconnected
networks is called an internetwork or internet.
The public Internet (i.e., the global network of networks discussed above) is the network that one typically refers
to as the Internet. There are also many private networks, such as certain corporate and government networks,
whose hosts are not accessible from (i.e., they cannot exchange messages with) hosts outside of that private
network. These private networks are often referred to as intranets, as they often use the same "internet technology"
(e.g., the same types of host, routers, links, protocols, and standards) as the public Internet.
2
Subnets, networks, and internetworks are often confused. Subnet makes the most sense in the context of a wide
area network, where it refers to the collection of routers and communication lines owned by the network operator.
As an analogy, the telephone system consists of telephone switching offices connected to one another by high-
speed lines, and to houses and businesses by low-speed lines. These lines and equipment, owned and managed by
the telephone company, form the subnet of the telephone system. The telephones themselves (the hosts in this
analogy) are not part of the subnet. The combination of a subnet and its hosts forms a network. In the case of a
LAN, the cable and the hosts form the network. There really is no subnet.
IEEE 802: The IEEE (Institute of Electrical and Electronics Engineers) 802 LAN/MAN Standards Committee
develops local area network standards and metropolitan area network standards. The most widely used standards
are for the Ethernet family, wireless LAN, bridging, and virtual bridged LANs. An individual working group
provides the focus for each area.
Wireless LANs are becoming increasingly common in small offices and homes, where installing Ethernet is
considered too much trouble, as well as in older office buildings, company cafeterias, conference rooms, and other
places. There is a standard for wireless LANs, called IEEE 802.11, which most systems implement and which is
becoming very widespread. A common slang name for it is Wi-Fi.
Wireless internet is just one of the services that Wifi optionally supports.it is a wireless communication standard
used between computer devices to share files and resources. Wifi signal can’t travel along distance without loss of
integrity( used for LAN).
The main computer acts as a server with a wireless network interface card(NIC). The wireless NIC features a
small antenna that broadcasts and receives wifi signals.
LANs come in a number of different configurations. The most common are switched LANs and wireless LANs.
The most common switched LAN is a switched Ethernet LAN, which may consist of a single switch with a
number of attached devices, or a number of interconnected switches. Two other prominent examples are ATM
LANs, which simply use an ATM network in a local area, and Fibre Channel.
Wireless LANs use a variety of wireless transmission technologies and organizations.
So, generally Ethernet is the most popular LAN and is present in most large companies and universities. One
might say that Ethernet has been to local area networking what the Internet has been to global networking:
3
powerful computers called servers. employees clients, with which they access remote server data
Make discussions on the following terms: e-commerce, e-marketing, Visa card, scratch card, credit card.
Hubs are simple network devices, and their simplicity is reflected in their low cost. Small hubs with four or five
ports
4
Computers connect to a hub via a length of twisted-pair cabling. Both hubs and switches are used in Ethernet
networks.
The basic function of a hub is to take data from one of the connected devices and forward it to all the other ports
on the hub. The method of sending data to all systems regardless of the intended recipient is referred to as
broadcasting.
This is due to hubs works only physical layer, data transmission channel.
Hubs/repeaters retransmit the packets they receive by amplifies the signal.
1.4 Switches :
Switches are far more efficient than hubs and are far more desirable for today’s network environments.
As discussed earlier in the chapter, a hub forwards data to all ports. Rather than forwarding data to all the
connected ports, a switch forwards data only to the port on which the destination system is connected. It looks at
the Media Access Control (MAC) addresses of the devices connected to it to determine the correct port. A MAC
address is a unique number that is stamped into every NIC. By forwarding data only to the system to which the
data is addressed, the switch decreases the amount of traffic on each network link dramatically.
Switches/bridges work on data link or MAC layer. Today, network switches have largely replaced bridges.
Routers are network layer devices that connect dissimilar LANS on same protocol. Can build large complex
networks with complex traffic routing.
Computer networks allow people and machines to communicate, using a number of services: distributed database,
Web, file transfer, remote login, email, news, talk, remote processing, resource sharing (file servers, printers, and
modems), network time, name service.
5
1.5 Network infrastructure
In side computers (Ethernet card, modem + software) in special network devices (bridges, routers,
concentrators, s witches)
supports transport of data between computers where distributed applications reside
Before the deep explanation of network protocol suites, connections, services, lets overview the external
connections between components.
Figure 1.2 Typical network components
Distributed applications are programs running on interconnected computers; a web server, a remote login server,
an e-mail exchanger are examples. This is the visible part of what people call “the Internet”.
The network infrastructure is the collection of systems which are required for the interconnection of computers
running the distributed applications.
A wide area network, or WAN, spans a large geographical area, often a country or continent. It contains a
collection of machines intended for running user (i.e., application) programs. We will follow traditional usage and
call these machines hosts. The hosts are connected by a communication subnet, or just subnet for short. The hosts
are owned by the customers (e.g., people's personal computers), whereas the communication subnet is typically
owned and operated by a telephone company or ISP (Internet service provider). The job of the subnet is to carry
messages from host to host, just as the telephone system carries words from speaker to listener. Separation of the
pure communication aspects of the network (the subnet) from the application aspects (the hosts), greatly simplifies
the complete network design.
In most wide area networks, the subnet consists of two distinct components: transmission lines and switching
elements. Transmission lines move bits between machines. They can be made of copper wire, optical fiber, or
even radio links. Switching elements are specialized computers that connect three or more transmission lines.
When data arrive on an incoming line, the switching element must choose an outgoing line on which to forward
them. These switching computers have been called by various names in the past; the name router is now most
commonly used.
In the model, shown in Figure 1.3, each host is frequently connected to a LAN on which a router is present,
although in some cases a host can be connected directly to a router. The collection of communication lines and
routers (but not the hosts) form the subnet.
Figure 1.3.Relation between hosts on LANs and the subnet, and routers.
6
In the simplest gigabit Ethernet configuration, illustrated in Fig(a) two computers are directly connected to each
other. The more common case, however, is having a switch or a hub connected to multiple computers and possibly
additional switches or hubs, as shown in Fig(b). In both configurations each individual Ethernet cable has exactly
two devices on it, no more and no fewer.
Thus, all fast Ethernet systems use hubs and switches. Normally, Hubs are cheaper than switches.
When using topological (Star, Bus, Ring) arrangements, the hub is the active central element of the star topology
(also sometimes called a concentrator).
Each station (node) is connected to the hub by two lines (transmit and receive).The hub acts as a repeater: When a
single station transmits, the hub repeats the signal on the outgoing line to each station. Each adapter on each node
has a direct, point-to-point connection to the hub. This connection consists of two pairs of twisted-pair cooper
wire, one for transmitting and the other for receiving. At each end of the connection there is a connector that
resembles the RJ-45 connector used for ordinary telephones.
As we explained before a given company’s data are stored on powerful computers called servers, which are
system administered machines; let for given company, rather than day to day attendance by manual papers, a
7
finger print of each employee, status of each employee, is first registered in the server, then on every morning
some body is pressed on the touch area provided, give identification codes if any. Make for his work presence.
Let another example, File server can also be used for storing students (they can access course materials, submit
assignments, post forums, etc.) by logging their account), teachers can deliver communications, materials, tests to
students easily and receive students information easily by log in the server, access.
A client program running on one end system requests and receives information from a server running on another
end system. Since a client typically runs on one computer and the server runs on another computer, client-server
Internet applications are, by definition, distributed applications. The client and the server interact with each other
by communicating (i.e., sending each other message) over the Internet.
Figure 1.3 clients –server model of communication
In a client-server environment, a service is formally specified by a set of primitives (operations) available to a user
process to access the service. These primitives tell the service to perform some action or report on an action taken
by a peer entity. If the protocol stack is located in the operating system, as it often is, the primitives are normally
system calls. These calls cause a trap to kernel mode, which then turns control of the machine over to the
operating system to send the necessary packets.
The set of primitives available depends on the nature of the service being provided. The primitives for connection-
oriented service are different from those of connectionless service. See later in chapter 3
Figure 1.4 five service primitives for implementing a simple connection-oriented service
These primitives might be used as follows. First, the server executes LISTEN to indicate that it is prepared to
accept incoming connections. A common way to implement LISTEN is to make it a blocking system call. After
executing the primitive, the server process is blocked until a request for connection appears.
Next, the client process executes CONNECT to establish a connection with the server. The CONNECT call needs
to specify who to connect to, so it might have a parameter giving the server's address. The operating system then
typically sends a packet to the peer asking it to connect, as shown by figure below. The client process is suspended
until there is a response. When the packet arrives at the server, it is processed by the operating system there. When
the system sees that the packet is requesting a connection, it checks to see if there is a listener. If so, it does two
things: unblocks the listener and sends back an acknowledgement. The arrival of this acknowledgement then
releases the client. At this point the client and server are both running and they have a connection established. It is
important to note that the acknowledgement is generated by the protocol code itself, not in response to a user-level
primitive. If a connection request arrives and there is no listener, the result is undefined. In some systems the
packet may be queued for a short time in anticipation of a LISTEN.
8
Figure 1.5 Packets sent in a simple client-server interaction on a connection-oriented network
9
Chapter -2 Internet protocol Architecture
Understand protocols, standards, layers
Understand services in each network layers
Understand host to host and process to process communications
Understand meaning of each protocols (HTTP, HTTPS, SMTP, FTP, DNS, IP)
One function of Internet protocols is to mask differences in the technology used by the networks that makeup the
Internet. The campus networks’ local area net-work technology differs from the wide area network technology
used in the regional and national backbone networks, and there are many different local area network standards.
As an example of a computer network protocol with which you are probably familiar, consider what happens
when you make a request to a WWW server, i.e., when you type in the URL of a WWW page into your web
browser. The scenario is illustrated in the right half of Figure 1.2-1. First, your computer will send a so-called
"connection request" message to the WWW server and wait for a reply. The WWW server will eventually receive
your connection request message and return a "connection reply" message. Knowing that it is now OK to request
the WWW document, your computer then sends the name of the WWW page it wants to fetch from that WWW
server in a "get" message. Finally, the WWW server returns the contents of the WWW document to your
computer.
A protocol architecture is the layered structure of hardware and soft-ware that supports the exchange of data
between systems and supports distributed applications, such as electronic mail and file transfer.
TCP/IP is an Internet-based concept and is the framework for developing a complete range of computer
communications standards. Virtually all computer vendors now provide support for this architecture. Another
well-known architecture is the Open Systems Interconnection (OSI) reference model.
OSI is a standardized architecture that is often used to describe communications functions but that is now rarely
implemented.
Also referred to as the TCP/IP protocol suite, it consists of large collection of protocols that have been issued as
Internet standards by the Internet Activities Board.
Designers developing a network architecture based on concepts of; Layering, protocols, standards.
The two important network architectures (standards) are the OSI reference model and the TCP/IP reference model.
10
2.3 Layering
Use abstractions to hide complexity, abstractions naturally lead to layering, each layer provides some functionality
Services refer to communications between layers within the same process, and protocols refer to communications
between processes.
11
Application layer: The application layer is responsible for supporting network applications. Networking
applications have application-layer protocols that define the format and order of the messages exchanged between
processes, as well as the actions taken on the transmission or receipt of a message. The application layer includes
many protocols, including HTTP to support the Web, SMTP to support electronic mail, and FTP to support file
transfer.
Transport layer: The transport layer is responsible for transporting application-layer messages between the client
and server sides of an application. In the Internet there are two transport protocols, TCP and UDP, either of which
can transport application-layer messages. When a developer creates a new application (web browsing, network
based applications) for the Internet, one of the first decisions that the developer must make is whether to use UDP
or TCP. Each of these protocols offers a different service model to the invoking applications.
User Datagram Protocol (UDP) as an alternative to TCP in Transport layer
No order control or error correction and recovery
No segmentation/reassembly of data into smaller packets
Only small individual messages can be sent
Used for fast low-overhead purposes
Application level can retry or drop as it thinks fit
E.g. DNS, VOIP
Network layer: The network layer is responsible for routing datagrams from one host to another. The Internet's
network layer has two principle components. First it has a protocol that defines the fields in the IP datagram as
well as how the end systems and routers act on these fields. This protocol is the celebrated IP protocol. There is
only one IP protocol, and all Internet components that have a network layer must run the IP protocol.
The Internet's network layer also contains routing protocols that determine the routes that datagrams take between
sources and destinations.
The Internet transport layer protocols (TCP and UDP) in a source host passes a transport layer segment and a
destination address to the IP layer, just as you give the postal service a letter with a destination address. The IP
layer then provides the service of routing the segment to its destination. When the packet arrives at the destination,
IP passes the segment to the transport layer within the destination.
Link layer (Data Link): The network layer routes a packet through a series of packet switches (i.e., routers)
between the source and destination. To move a packet from one node (host or packet switch) to the next node in
the route, the network layer must rely on the services of the link layer. In particular, at each node IP passes the
datagram to the link layer, which delivers the datagram to the next node along the route. At this next node, the link
layer passes the IP datagram to the network layer.
12
Physical layer: While the job of the link layer is to move entire frames from one network element to an adjacent
network element, the job of the physical layer is to move the individual bits within the frame from one node to the
next.
The protocols in this layer are again link dependent, and further depend on the actual transmission medium of the
link (e.g., twisted-pair copper wire, single mode fiber optics). For example, Ethernet has many physical layer
protocols: one for twisted-pair copper wire, another for coaxial cable, another for fiber, etc. In each case, a bit is
moved across the link in a different way.
The whole network layers are not implemented in all network entities or devices. Routers and bridges do not
implement all of the layers in the protocol stack; they typically only implement the bottom layers. As shown in
Figure 1.7-5, bridges implement layers 1 and 2; routers implement layers 1 through 3.
Once the packets have been formatted they are sent out of the computer and through the net-work’s web of links
and switches. Switches receive packets coming in on one link and send them out on the next link in the path to
their destination. When the packet arrives at a switch, the switch scans the destination address and determines
which link the packet should transit next. The Internet packet switches or ‘routers’ are special computers that have
been provided with connections to a number of links and programmed to carry out the switching functions.
The software in the routers and the users’ computers implement ‘protocols, ’ the rules that determine the format of
the packets and the actions taken by the routers and networked computers.
13
IP is implemented in all of the end systems and the routers. It acts as a relay to move a block of data from one
host, through one or more routers, to another host. TCP is implemented only in the end systems; it keeps track of
the blocks of data to assure that all are delivered reliably to the appropriate application.
For successful communication, every entity in the overall system must have a unique address. Each process with a
host must have an address that is unique within the host; this allows the host-to-host protocol (TCP) to deliver data
to the proper process. These latter addresses are known as ports.
Suppose that a process, associated with port 3 at host A, wishes to send a message to another process, associated
with port 2 at host B. The process at A hands the message down to TCP with instructions to send it to host B, port
2. TCP hands the message down to IP with instructions to send it to host B. Note that IP need not be told the
identity of the destination port. All it needs
to know is that the data are intended for host B. Next, IP hands the message down to the network access layer
(e.g., Ethernet logic) with instructions to send it to router J (the first hop on the way to B).
To control this operation, control information as well as user data must be transmitted as; Let us say that the
sending process (Application) generates a block of data and passes this to TCP. TCP may break this block into
smaller pieces to make it more manageable. To each of these pieces, TCP appends control information known as
the TCP header, forming a TCP segment. The control information is to be used by the peer TCP protocol entity at
host B. Examples of items in this header include:
Destination port: When the TCP entity at B receives the segment, it must know to who the data are to be delivered.
Sequence number: TCP numbers the segments that it sends to a particular destination port sequentially, so that if
they arrive out of order, the TCP entity at B can reorder them.
14
2.6 Aspects of TCP Service
Transfers a stream of bytes (interpreted by application)
Connection-oriented
o set up connection before communicating
o tear down connection when done
In-order delivery of data: if A sends M1 followed by M2 to B, B never receives M2 before M1
Reliable
o data delivered at most once
o exactly once if no catastrophic failures
Flow control - sender will not overwhelm receiver; receiver’s TCP is able to control the size of the
segment dispatched by the sender’s TCP.
TCP connection teardown (4 steps) (either client or server can initiate connection teardown)
TCP receivers use acknowledgments (ACKs) to confirm the receipt of data to the sender
Acknowledgment can be added (“piggybacked”) to a data segment that carries data in the opposite direction
ACK information is included in the TCP header
Acknowledgements are used for flow control, error control, and congestion control
TCP divides the data stream into segments for transmission:
15
Source and Destination are 16-bit TCP port numbers (IP addresses are implied by the IP header)
Let us first consider host addresses. In Internet applications, the destination host is specified by its . In
addition to knowing the address of the end system to which a message is destined, a sending application must also
specify information that will allow the receiving end system to direct the message to the appropriate on
that system. A serves this purpose in the Internet. Popular application-layer protocols
have been assigned specific port numbers. For example, a Web server process (which uses the HTTP protocol) is
identified by port number 80. A mail server (using the SMTP) protocol is identified by port number 25.
TCP uses sequence numbers to keep track of transmitted and acknowledged data
Each transmitted byte of payload data is associated with a sequence number
Sequence numbers count bytes and not segments
Sequence number of first byte in payload is written in SeqNo field
Sequence numbers wrap when they reach 232-1
The sequence number of the first sequence number (Initial sequence number) is negotiated during connection
setup
Bit (left to right) Meaning if bit when set to 1
URG Urgent pointer field is valid
ACK Acknowledgment field is valid
PSH This segment requests a push- (generally not
used)
RST Reset the connection
SYN Synchronize sequence numbers
FIN Sender has reached end of its byte stream
Window - how much data the sender is willing to accept (flow control)
Urgent pointer - specifies the position in the segment where urgent data ends
Checksum - used to verify the integrity of the segment
• addition (1’s complement sum) of segment contents
• Segment header
• Segment data…
• sender puts checksum value into TCP checksum field
• compute checksum of received segment
• check if computed checksum equals checksum field value:
• NO - error detected
• YES - no error detected.
16
Options - various options like Maximum segment size
When a TCP receiver wants to acknowledge data, it
writes a sequence number in the AckNo field, and
sets the ACK flag
An acknowledgment confirms receipt for all unacknowledged data that has a smaller sequence number than given
in the AckNo field
Example: AckNo=5 confirms delivery for 1,2,3,4 (but not 5)
window size
AckNo
(win)
32 bits 16 bits
1 2 3 4 5 6 7 8 9 10 11
1 2 3 4 5 6 7 8 9 10 11
Transmit Byte 6
1 2 3 4 5 6 7 8 9 10 11
AckNo = 5, Win = 4
is received
1 2 3 4 5 6 7 8 9 10 11
17
Sliding Window: “Window Opens”
Acknowledgement is received that enlarges the window to the right (AckNo = 5, Win=6):
1 2 3 4 5 6 7 8 9 10 11
AckNo = 5, Win = 6
is received
1 2 3 4 5 6 7 8 9 10 11
N.B A receiver opens a window when TCP buffer empties (meaning that data is delivered to the
application).
1 2 3 4 5 6 7 8 9 10 11
AckNo = 5, Win = 3
is received
1 2 3 4 5 6 7 8 9 10 11
Chapter Exercises
1) Explain where the TCP/IP network layers exist? In web browsing, in network driver? In operating
system? How about MAC (media access control), the physical address)?
2) Explain the following terms; Segment, packet, frame?
3) Discuss in which layer of TCP/IP model is security message transmission implemented? Blocking of
unwanted file contents implemented?
4) Explain why shrinking a window size is not recommended?
5) Explain the layered differences between P2P(peer to peer) and server based networking
6) Define what encapsulation is and what is de capsulation mean?
18
CHAPTER -3 WIRED AND WIRELESS NETWORKING
Understand the difference between wired and wireless connections
Clarify the network layers that differentiate between the two
Understand mobile networking techniques
The transport-layer protocol that performs all of these functions is TCP; reliable, connection oriented. The
transport layer make sure the whole message, involves some method of flow control & error control (error
detection and error correction). Which are absent at the network layer.
The transport and data link layers usually chose different strategies to place their CRCs or checksums. Transport
layer protocols usually place their CRCs or checksums in the segment header. Data link layer protocols sometimes
place their CRC in the frame header, but often in a trailer at the end of the frame. Easy to compute it while
transmitting the frame and insert it at the end of the transmission.
Data link and physical layers multiple performs the remaining services.
The biggest difference between the network layer and the data link layer is that the data link layer is in charge of
data delivery between adjacent systems (directly connected systems one hop away), while the network layer
delivers data to systems that are not directly connected to the source.
Data link layer protocols that are used to transport IP packets from network layers to hosts or routers that are
directly connected by a point-to-point link. This link can be a dedicated physical cable, a leased line through the
telephone network or a dial-up connection with modems on the two communicating hosts by the intermediate of
physical layer.
The LL (Link layer) protocol will have to ensure relatively reliable delivery of packets; it has immediate
knowledge of dropped frames and thus can respond faster than higher-level protocols.
The Physical Layer would be represented by the propagation medium (cables, wireless, and so on, and the
associated components like repeaters, amplifiers, etc.)
19
A dialup connection links one to the Internet via a phone line. This is normally slower than the broadband
connection.
Dial-up services use your phone line and a modem. Your modem makes a phone call to the internet service
provider's (ISP) modems to connect, so you cannot talk on the phone while the internet is connected. Dial-up also
requires you to connect every time you want to use it.
Broadband connects you to the internet through several transmission technologies such as;
Digital Subscriber Line (DSL) -DSL is a wire line transmission technology that transmits data faster over
traditional copper telephone lines already installed in surrounding. It is a family of technologies that
provide Internet access by transmitting digital data over the wires of a local telephone networks.
Cable Modem- Cable modem service enables cable operators to provide broadband using the same coaxial
cables that are used to deliver pictures and sound to your TV set.
Fiber - Fiber optic technology converts electrical signals carrying data to light and sends the light through
transparent glass fibers about the diameter of a human hair. Fiber transmits data at speeds far exceeding
current DSL or cable modem speeds, typically by tens or even hundreds of Mbps.
Wireless - Wireless broadband connects a home or business to the Internet use radio frequency bands
between the customer’s location and the service provider’s facility. Wireless broadband can be mobile or
fixed. Speeds are generally comparable to DSL and cable modem. An external antenna is usually required.
Wi-Fi networks use unlicensed devices and can be designed for private access within a home or business,
or be used for public Internet access at "hot spots" such as restaurants, coffee shops, hotels, airports,
convention centers, and city parks.
Satellite - Just as satellites orbiting the earth provide necessary links for telephone and television service,
they can also provide links for broadband. Satellite broadband is another form of wireless broadband, and
is also useful for serving remote or sparsely populated areas. Speeds may be slower than DSL and cable
modem, but they are about 10 times faster than the download speed with dial-up Internet access. Service
can be disrupted in extreme weather conditions.
From a physical layer perspective, a LAN can be organized in four different ways:
◙ A bus-shaped network where all hosts are attached to the same physical cable
◙ A ring-shaped where all hosts are attached to an upstream and a downstream node so that the entire
network forms a ring
◙ A star-shaped network where all hosts are attached to the same device
◙ A wireless network where all hosts can send and receive frames using radio signals
They are structured as shown in the figure below. The first bit of the address indicates whether the address
identifies a network adapter or a multicast group. The upper 24 bits are used to encode an Organization Unique
Identifier (OUI). This OUI identifies a block of addresses that has been allocated by the secretariat that is
responsible for the uniqueness of Ethernet addresses to a manufacturer. Once a manufacturer has received an OUI,
it can build and sell products with one of the 16 million addresses in this block
20
This 48 bit (6 octets) value is called LAN address is also called a physical address an Ethernet address, or a MAC
(media access control) address. It is imprinted on every nodes adapter.
The IEEE 802.11 working group to standardize a family of wireless network technologies produced several
wireless networking standards that use different frequency ranges and different physical layers.
We noted above that unlike the 802.3 Ethernet protocol, the wireless 802.11 MAC protocol does not implement
collision detection. It has CSMA/CA protocol, which is collision avoidance.
Wi-Fi (802.11b) is a very popular wireless networking technology. In practice, there are two main types of Wi-Fi
networks: independent/ad hoc networks;
Composed of a set of devices that communicate with each other, like when we need to connect computers
to Wi-Fi printer and with each other. Are self-organizing networks without any centralized control
21
network) that is connected to other networks such as the Internet, server, access points(AP), etc.
Most widely used
Wireless Access Points (APs) - a small device that bridges wireless traffic to your network.
22
4 ERROR CONTROL
4.1 Introduction of error control
Error control refers to mechanisms to detect and correct errors that occur in the transmission of frames. Detecting
and correcting the corruption of bits in a data-link-layer frame sent from one node to another. These services are at
transport layer as well.
For a given frame of bits, additional bits that constitute an error-detecting code are added by the transmitter. This
code is calculated as a function of the other transmitted bits. The receiver performs the same error-detecting
calculation on the data bits and compares this value with the value of the incoming error-detecting code. A
detected error occurs if and only if there is a mismatch.
Limitations of Parity check - What happens if the code word is subjected to 2-bit error
E.g. if 011 became 000 while transmission „According to parity scheme, no error is
detected but real error!
23
OPERATION: Consider the d-bit piece of data, D, that the sending node wants to send to the receiving node.
The sender and receiver must first agree on r+1 bit pattern, known as a generator, which we will denote as G.
For a given piece of data, D, the sender will choose r additional bits, R, and append them to D such that the
resulting d+ r bit pattern is exactly divisible by G using modulo 2 arithmetic. The process of error checking with
CRC's is thus simple: the receiver divides the d+ r received bits by G. If the remainder is non-zero, the receiver
knows that an error has occurred; otherwise the data is accepted as being correct.
This calculation for the case of D= 101110, d = 6 and G = 1001, r=3. The nine bits transmitted in this case are
101110 011. You should check these calculations for yourself and also check that indeed D*2r = 101011 * G XOR
R.
24
4.4 Hamming code
for detecting as well as correcting error bits
The Hamming distance is the number of bits that have to be changed to get from one bit pattern to another.
Example: 10010101 & 10011001 have a hamming distance of 2. Is short to find hamming distance XOR the
two words , then count the number of 1’s in the result, it is hamming distance.
Suppose we wish to transmit blocks of data of length k bits. Instead of transmitting each block as k bits, we map
each k-bit sequence into a unique n-bit codeword.
25
26
Chapter 5 : wireless LANs and wired LANs
A local area network (LAN) is used to connect an end system to an edge router. As we will see in Chapter 5, there
are many different types of LAN technology. However, Ethernet technology is currently by far the most prevalent
access technology in enterprise networks. Ethernet operates 10 Mbps or 100Mbps (and now even at 1 Gbps). The
edge router is responsible for routing packets that have destinations outside of that LAN.
Mobile access networks use the radio spectrum to connect a mobile end system (e.g., a laptop PC or a PDA with a
wireless modem) to a base station, as shown in Figure 1.5-1. This base station, in turn, is connected to an edge
router of a data network.
Since a user may not maintain a fixed position in such environments, the mobile and wireless net-working support
allowing mobile users to communicate with other users (fixed or mobile) becomes crucial.
Mobile users do not necessarily need to use wireless interfaces and wireless interfaces do not necessarily support
mobility. A mobile user can simply connect to fixed networks using wired interfaces as he or she moves.
Therefore, mobile and wireless systems are not the same even though there is considerable overlap.
Mobile and wireless networks are also experiencing significant progress in the form of wireless local area
networks (WLANs), satellite-based networks, Wireless Local Loops (WLL), mobile Inter-net Protocol (IP), and
wireless Asynchronous
Transfer Mode (ATM) networks. A comparison is shown in Table 2. One emerging wireless technology is
Bluetooth (www.bluetooth.net), which provides low-cost and short-range radio links for wireless connectivity
among computers, printers, and scanners.
Currently, many different wireless access technologies exist that are not interoperable. Designing and building
27
network and business applications for each technology would be a nightmare for developers. This problem,
combined with redesigning all Web sites to support downloading by mobile users is even more difficult. Even if
all of this can be achieved, the information content still has to be adapted for transmission over wireless links and
is an effort to solve these problems: it allows development of applications that are independent of the underlying
wireless access technology. WAP also adapts the existing Web site contents for transmission over wireless links
and display on mobile devices.
WAP specifications have been developed by the WAP Forum (www.wapforum.org), a consortium of leading
wireless companies. The main contribution is the interoperability of different wireless networks, devices and
applications using a common set of application and network protocols. The protocol architecture is similar to that
of the Web, such as the use of Wireless Markup Language (WML, a cousin of HTML) optimized for mobile
devices.
The architecture of WAP is shown in Figure 3, where a gateway acts as a proxy server to a mobile client and
translates requests from WAP protocol stacks to protocol stacks employed by the information server on the other
side.
Encoders translate the con-tent coming from the server into compact formats to reduce the size of data over the
wireless network.
This infrastructure ensures mobile users can access a wide variety of contents and applications and also allows
application developers to build content services and applications that can run on a large base of mobile terminals.
To support this configuration, the WAP forum defines several layers of protocols as presented in Table 4 below.
28