DC Lec1
DC Lec1
DC Lec1
Lecture 1
Network review
• Transmission media
• Digital Transmission
• Analog Transmission
• Multiplexing
• Error Detection Co
• Error Correction
Example
Communication between a workstation and a server
2
the effectiveness of a data communications system
depends on four fundamental characteristics:
delivery, accuracy, timeliness, and jitter.
• Delivery. The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
• Accuracy. The system must deliver the data accurately. Data that have been
altered in transmission and left uncorrected are unusable.
• Timeliness. The system must deliver data in a timely manner. Data delivered late
are useless. In the case of video and audio, timely delivery means delivering data
as they are produced, in the same order that they are produced, and without
significant delay. This kind of delivery is called real-time transmission.
• Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are
sent every 3D ms. If some of the packets arrive with 3D-ms delay and others with
4D-ms delay, an uneven quality in the video is the result.
A data communications system has five
components
• Half-Duplex: In half-duplex mode, each station can both transmit and receive, but not at the
same time.
A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security.
Performance is often evaluated by two networking metrics: throughput and delay. We often need more
throughput and less delay
Reliability: network reliability is measured by the frequency of failure, the time it takes a link to recover
from a failure.
Network security issues include protecting data from unauthorized access, protecting data from
damage and development, and implementing policies and procedures for recovery from breaches and
data losses.
6
TYPE OF CONNECTIONS
A network is two or more devices connected through links. There are two possible types of
connections: point-to-point and multipoint.
Point-to-Point Conection: provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-to-
point connections use an actual length of wire or cable to connect the two ends.
Multipoint connection: is one in which more than two specific devices share a single link. In
a multipoint environment, the capacity of the channel is shared, either spatially or temporally.
If several devices can use the link simultaneously, it is a spatially shared connection. If users
must take turns, it is a timeshared connection.
6
Network Types
Local Area Networks (LANs)
Packet Switched
Frame Relay
Wireless Networks
6
Networking Devices
Equipment that connects directly to a network segment is referred to as a device.
End-user devices include computers, printers, scanners, and other devices that
provide services directly to the user.
Network devices include all the devices that connect the end-user devices together
to allow them to communicate.
Each individual NIC carries a unique code, called a Media Access Control (MAC)
address.
The OSI Reference Model
OSI Model Layer Description
Provides for common representation of the data transferred between application layer
6 - Presentation
services.
5 - Session Provides services to the presentation layer and to manage data exchange.
Defines services to segment, transfer, and reassemble the data for individual
4 - Transport
communications.
3 - Network Provides services to exchange the individual pieces of data over the network.
2 - Data Link Describes methods for exchanging data frames over a common media.
1 - Physical Describes the means to activate, maintain, and de-activate physical connections.
The TCP/IP Reference Model
TCP/IP Model
Description
Layer
Application Represents data to the user, plus encoding and dialog control.
Network Access Controls the hardware devices and media that make up the network.
Data Encapsulation
Encapsulation is the process where protocols add
Protocol Data Units their information to the data.
• At each stage of the process, a PDU has a
different name to reflect its new functions.
• There is no universal naming convention for PDUs,
in this course, the PDUs are named according to
the protocols of the TCP/IP suite.
• PDUs passing down the stack are as follows:
1. Data (Data Stream)
2. Segment
3. Packet
4. Frame
5. Bits (Bit Stream)
Reference Models
The Benefits of Using a Layered Model
Complex concepts such as how a network
operates can be difficult to explain and
understand. For this reason, a layered
model is used.
Two layered models describe network
operations:
• Open System Interconnection (OSI)
Reference Model
• TCP/IP Reference Model
Ethernet Frames
Ethernet Encapsulation
• Ethernet operates in the
data link layer and the
physical layer.
• It is a family of networking
technologies defined in the
IEEE 802.2 and 802.3
standards.
Ethernet Frames
Data Link Sublayers
The 802 LAN/MAN standards, including Ethernet,
use two separate sublayers of the data link layer to
operate:
• LLC Sublayer: (IEEE 802.2) Places information in the
frame to identify which network layer protocol is used
for the frame.
• MAC Sublayer: (IEEE 802.3, 802.11, or 802.15)
Responsible for data encapsulation and media access
control, and provides data link layer addressing.
Ethernet Frames
MAC Sublayer
The MAC sublayer is responsible for data encapsulation and accessing the media.
Data Encapsulation
IEEE 802.3 data encapsulation includes the following:
1. Ethernet frame - This is the internal structure of the Ethernet frame.
2. Ethernet Addressing - The Ethernet frame includes both a source and destination MAC address to deliver
the Ethernet frame from Ethernet NIC to Ethernet NIC on the same LAN.
3. Ethernet Error detection - The Ethernet frame includes a frame check sequence (FCS) trailer used for error
detection.
Ethernet Frames
MAC Sublayer
Media Access
• The IEEE 802.3 MAC sublayer includes the
specifications for different Ethernet
communications standards over various types of
media including copper and fiber.
• Legacy Ethernet using a bus topology or hubs, is a
shared, half-duplex medium. Ethernet over a half-
duplex medium uses a contention-based access
method, carrier sense multiple access/collision
detection (CSMA/CD).
• Ethernet LANs of today use switches that operate
in full-duplex. Full-duplex communications with
Ethernet switches do not require access control
through CSMA/CD.
Ethernet Frames
Ethernet Frame Fields
• The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes. The preamble field
is not included when describing the size of the frame.
• Any frame less than 64 bytes in length is considered a “collision fragment” or “runt frame” and is
automatically discarded. Frames with more than 1500 bytes of data are considered “jumbo” or
“baby giant frames”.
• If the size of a transmitted frame is less than the minimum, or greater than the maximum, the
receiving device drops the frame. Dropped frames are likely to be the result of collisions or other
unwanted signals. They are considered invalid. Jumbo frames are usually supported by most Fast
Ethernet and Gigabit Ethernet switches and NICs.
the Transport Layer
The transport layer is:
• responsible for logical
communications between
applications running on different
hosts.
• The link between the application
layer and the lower layers that
are responsible for network
transmission.
Transportation of Data
Transport Layer Responsibilities
The transport layer has the following
responsibilities:
• Tracking individual conversations
• Segmenting data and reassembling
segments
• Adds header information
• Identify, separate, and manage multiple
conversations
• Uses segmentation and multiplexing to
enable different communication
conversations to be interleaved on the
same network
Transportation of Data
Transport Layer Protocols
• IP does not specify how the
delivery or transportation of the
packets takes place.
• Transport layer protocols specify
how to transfer messages between
hosts, and are responsible for
managing reliability requirements
of a conversation.
• The transport layer includes the
TCP and UDP protocols.
Transportation of Data
Transmission Control Protocol
TCP provides reliability and flow control.
TCP basic operations:
• Number and track data segments
transmitted to a specific host from a
specific application
• Acknowledge received data
• Retransmit any unacknowledged data
after a certain amount of time
• Sequence data that might arrive in
wrong order
• Send data at an efficient rate that is
acceptable by the receiver
Transportation of Data
User Datagram Protocol (UDP)
UDP provides the basic functions for
delivering datagrams between the
appropriate applications, with very
little overhead and data checking.
• UDP is a connectionless protocol.
• UDP is known as a best-effort
delivery protocol because there is
no acknowledgment that the
data is received at the
destination.
TCP Overview
TCP Features
• Establishes a Session - TCP is a connection-oriented protocol that negotiates and
establishes a permanent connection (or session) between source and destination devices
prior to forwarding any traffic.
• Ensures Reliable Delivery - For many reasons, it is possible for a segment to become
corrupted or lost completely, as it is transmitted over the network. TCP ensures that each
segment that is sent by the source arrives at the destination.
• Provides Same-Order Delivery - Because networks may provide multiple routes that can
have different transmission rates, data can arrive in the wrong order.
• Supports Flow Control - Network hosts have limited resources (i.e., memory and processing
power). When TCP is aware that these resources are overtaxed, it can request that the
sending application reduce the rate of data flow.
TCP Overview
TCP Header
TCP is a stateful protocol which
means it keeps track of the state of
the communication session.
Header Length A 4-bit field known as ʺdata offsetʺ that indicates the length of the TCP segment header.
UDP Header
Description
Field
Source Port A 16-bit field used to identify the source application by port number.
A 16-bit field used to identify the destination application by port
Destination Port
number.
Length A 16-bit field that indicates the length of the UDP datagram header.
A 16-bit field used for error checking of the datagram header and
Checksum
data.