Professional Documents
Culture Documents
Unit 6 Process To Process Delivery
Unit 6 Process To Process Delivery
User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet Protocol
suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless protocol. So,
there is no need to establish connection prior to data transfer.
Though Transmission Control Protocol (TCP) is the dominant transport layer protocol used with most
of Internet services; provides assured delivery, reliability and much more but all these services cost
us with additional overhead and latency. Here, UDP comes into picture. For the realtime services
like computer gaming, voice or video communication, live conferences; we need UDP. Since high
performance is needed, UDP permits packets to be dropped instead of processing delayed packets.
There is no error checking in UDP, so it also save bandwidth.
User Datagram Protocol (UDP) is more efficient in terms of both latency and bandwidth.
UDP Header –
UDP header is 8-bytes fixed and simple header, while for TCP it may vary from 20 bytes to 60
bytes. First 8 Bytes contains all necessary header information and remaining part consist of data.
UDP port number fields are each 16 bits long, therefore range for port numbers defined from 0 to
65535; port number 0 is reserved. Port numbers help to distinguish different user requests or
process.
1. Source Port : Source Port is 2 Byte long field used to identify port number of source.
2. Destination Port : It is 2 Byte long field, used to identify the port of destined packet.
3. Length : Length is the length of UDP including header and the data. It is 16-bits field.
4. Checksum : Checksum is 2 Bytes long field. It is the 16-bit one’s complement of the one’s
complement sum of the UDP header, pseudo header of information from the IP header and the
data, padded with zero octets at the end (if necessary) to make a multiple of two octets.
Notes – Unlike TCP, Checksum calculation is not mandatory in UDP. No Error control or flow control
is provided by UDP. Hence UDP depends on IP and ICMP for error reporting.
TCP provides reliable communication with something called Positive Acknowledgement with Re-
transmission(PAR). The Protocol Data Unit(PDU) of the transport layer is called segment. Now a
device using PAR resend the data unit until it receives an acknowledgement. If the data unit
received at the receiver’s end is damaged(It checks the data with checksum functionality of the
transport layer that is used for Error Detection), then receiver discards the segment. So the sender
has to resend the data unit for which positive acknowledgement is not received. You can realize
from above mechanism that three segments are exchanged between sender(client) and
receiver(server) for a reliable TCP connection to get established. Let us delve how this mechanism
works :
● Step 1 (SYN) : In the first step, client wants to establish a connection with server, so it sends a
segment with SYN(Synchronize Sequence Number) which informs server that client is likely to
start communication and with what sequence number it starts segments with
● Step 2 (SYN + ACK): Server responds to the client request with SYN-ACK signal bits set.
Acknowledgement(ACK) signifies the response of segment it received and SYN signifies with
what sequence number it is likely to start the segments with
● Step 3 (ACK) : In the final part client acknowledges the response of server and they both
establish a reliable connection with which they will start eh actual data transfer
The steps 1, 2 establish the connection parameter (sequence number) for one direction and it is
acknowledged. The steps 2, 3 establish the connection parameter (sequence number) for the other
direction and it is acknowledged. With these, a full-duplex communication is established.
Note – Initial sequence numbers are randomly selected while establishing connections between
client and server.
2. TCP is a full duplex protocol so both sender and receiver require a window for receiving
messages from one another.
● Sequence number (Seq=2000): contains the random initial sequence number which
generated at receiver side.
● Syn flag (Syn=1): request sender to synchronize its sequence number with the above
provided sequence number.
● Maximum segment size (MSS=500 B): sender tells its maximum segment size, so that
receiver sends datagram which won’t require any fragmentation. MSS field is present
inside Option field in TCP header.
Since MSS < MSS , both parties agree for minimum MSS i.e., 500 B to avoid
receiver sender
3. Sender makes the final reply for connection establishment in following way:
● Sequence number (Seq=522): since sequence number = 521 in 1 step and SYN flag
st
consumes one sequence number hence, next sequence number will be 522.
● Acknowledgement Number (Ack no.=2001): since sender is acknowledging SYN=1
packet from the receiver with sequence number 2000 so, the next sequence number
expected is 2001.
● ACK flag (ACK=1): tells that acknowledgement number field contains the next sequence
expected by sender.
Since the connection establishment phase of TCP makes use of 3 packets, it is also known as 3-way
Handshaking (SYN, SYN + ACK, ACK).
Quality of Service
Quality-of-Service (QoS) refers to traffic control mechanisms that seek to either differentiate
performance based on application or network-operator requirements or provide predictable or
guaranteed performance to applications, sessions or traffic aggregates. Basic phenomenon for QoS
means in terms of packet delay and losses of various kinds.
Need for QoS –
● Video and audio conferencing require bounded delay and loss rate.
● Video and audio streaming requires bounded packet loss rate, it may not be so sensitive to
delay.
● Time-critical applications (real-time control) in which bounded delay is considered to be an
important factor.
● Valuable applications should be provided better services than less valuable applications.
QoS Specification –
QoS requirements can be specified as:
1. Delay
2. Delay Variation(Jitter)
3. Throughput
4. Error Rate
There are two types of QoS Solutions:
1. Stateless Solutions –
Routers maintain no fine grained state about traffic, one positive factor of it is that it is scalable
and robust. But it has weak services as there is no guarantee about kind of delay or
performance in a particular application which we have to encounter.
2. Stateful Solutions –
Routers maintain per flow state as flow is very important in providing the Quality-of-Service i.e.
providing powerful services such as guaranteed services and high resource utilization, provides
protection and is much less scalable and robust.
The basic rate interface (BRl) specifies a digital pipe consisting two B channels of 64 Kbps
each and one D channel of 16 Kbps. This equals a speed of 144 Kbps. In addition, the BRl
service itself requires an operating overhead of 48 Kbps. Therefore a digital pipe of 192 Kbps is
required.
2. Primary Rate Interface (PRI) –
Primary Rate Interface service consists of a D channel and either 23 or 30 B channels
depending on the country you are in. PRI is not supported on the iSeries. A digital pipe with 23
B channels and one 64 Kbps D channel is present in the usual Primary Rate Interface (PRI).
Twenty-three B channels of 64 Kbps each and one D channel of 64 Kbps equals 1.536 Mbps.
The PRI service uses 8 Kbps of overhead also. Therefore PRI requires a digital pipe of 1.544
Mbps.
3. Broadband-ISDN (B-ISDN) –
Narrowband ISDN has been designed to operate over the current communications
infrastructure, which is heavily dependent on the copper cable however B-ISDN relies mainly
on the evolution of fiber optics. According to CCITT B-ISDN is best described as ‘a service
requiring transmission channels capable of supporting rates greater than the primary rate.
ISDN Services:
ISDN provides a fully integrated digital service to users. These services fall into 3 categories- bearer
services, teleservices and supplementary services.
1. Bearer Services –
Transfer of information (voice, data and video) between users without the network manipulating
the content of that information is provided by the bearer network. There is no need for the
network to process the information and therefore does not change the content. Bearer services
belong to the first three layers of the OSI model. They are well defined in the ISDN standard.
They can be provided using circuit-switched, packet-switched, frame-switched, or cell-switched
networks.
2. Teleservices –
In this the network may change or process the contents of the data. These services
corresponds to layers 4-7 of the OSI model. Teleservices relay on the facilities of the bearer
services and are designed to accommodate complex user needs. The user need not to be
aware of the details of the process. Teleservices include telephony, teletex, telefax, videotex,
telex and teleconferencing. Though the ISDN defines these services by name yet they have not
yet become standards.
3. Supplementary Service –
Additional functionality to the bearer services and teleservices are provided by supplementary
services. Reverse charging, call waiting, and message handling are examples of
supplementary services which are all familiar with today’s telephone company services.
Principle of ISDN:
The ISDN works based on the standards defined by ITU-T (formerly CCITT). The
Telecommunication Standardization Sector (ITU-T) coordinates standards for telecommunications
on behalf of the International Telecommunication Union (ITU) and is based in Geneva, Switzerland.
The various principles of ISDN as per ITU-T recommendation are:
● To support switched and non-switched applications
● To support voice and non-voice applications
● Reliance on 64-kbps connections
● Intelligence in the network
● Layered protocol architecture
● Variety of configurations
1. STS Multiplexer:
● Performs multiplexing of signals
● Converts electrical signal to optical signal
2. STS Demultiplexer:
● Performs demultiplexing of signals
● Converts optical signal to electrical signal
3. Regenerator:
It is a repeater that takes an optical signal and regenerates (increases the strength) it.
4. Add/Drop Multiplexer:
It allows you to add signals coming from different sources into a given path or remove a signal.
Why is SONET used?
SONET is used to convert electrical signal into optical signal so that it can travel longer distances.
SONET Connections:
● Section: Portion of network connecting two neighbouring devices.
● Line: Portion of network connecting two neighbouring multiplexers.
● Path: End-to-end portion of the network.
SONET Layers:
802.11 − This pertains to wireless LANs and provides 1 - or 2-Mbps transmission in the
2.4-GHz band using either frequency-hopping spread spectrum (FHSS) or direct-
sequence spread spectrum (DSSS).
● Frame Control(FC) –
It is 2 bytes long field which defines type of frame and some control information. Various fields
present in FC are:
1. Version:
It is a 2 bit long field which indicates the current protocol version which is fixed to be 0 for
now.
2. Type:
It is a 2 bit long field which determines the function of frame i.e management(00),
control(01) or data(10). The value 11 is reserved.
3. Subtype:
It is a 4 bit long field which indicates sub-type of the frame like 0000 for association
request, 1000 for beacon.
4. To DS:
It is a 1 bit long field which when set indicates that destination frame is for DS(distribution
system).
5. From DS:
It is a 1 bit long field which when set indicates frame coming from DS.
6. More frag (More fragments):
It is 1 bit long field which when set to 1 means frame is followed by other fragments.
7. Retry:
It is 1 bit long field, if the current frame is a retransmission of an earlier frame, this bit is set
to 1.
8. Power Mgmt (Power management):
It is 1 bit long field which indicates the mode of a station after successful transmission of a
frame. Set to 1 the field indicates that the station goes into power-save mode. If the field is
set to 0, the station stays active.
9. More data:
It is 1 bit long field which is used to indicates a receiver that a sender has more data to
send than the current frame. This can be used by an access point to indicate to a station in
power-save mode that more packets are buffered or it can be used by a station to indicate
to an access point after being polled that more polling is necessary as the station has
more data ready to transmit.
10. WEP:
It is 1 bit long field which indicates that the standard security mechanism of 802.11 is
applied.
11. Order:
It is 1 bit long field, if this bit is set to 1 the received frames must be processed in strict
order.
● Duration/ID –
It is 4 bytes long field which contains the value indicating the period of time in which the
medium is occupied(in µs).
● Address 1 to 4 –
These are 6 bytes long fields which contain standard IEEE 802 MAC addresses (48 bit each).
The meaning of each address depends on the DS bits in the frame control field.
● SC (Sequence control) –
It is 16 bits long field which consists of 2 sub-fields, i.e., Sequence number (12 bits) and
Fragment number (4 bits). Since acknowledgement mechanism frames may be duplicated
hence, a sequence number is used to filter duplicate frames.
● Data –
It is a variable length field which contain information specific to individual frames which is
transferred transparently from a sender to the receiver(s).
● CRC (Cyclic redundancy check) –
It is 4 bytes long field which contains a 32 bit CRC error detection sequence to ensure error
free frame.
Cellular Networks
● Cellular Network is formed of some cells, cell covers a geographical region, has a base
station analogous to 802.11 AP.
● It helps mobile users attach to the network and there is an air-interface of physical and link
layer protocol between mobile and base station.
● All these base stations are connected to Mobile Switching Center which connects cells to
wide area net, manages call setup and handles mobility.
● There is a certain radio spectrum that is allocated to base stations and to a particular region
and that now needs to be shared.
● There are 2 techniques for sharing mobile-to-base station radio spectrum are:
1. Combined FDMA/TDMA:
It divides the spectrum in frequency channels and divides each channel into time slots.
2. Code Division Multiple Access (CDMA):
It allows reuse of the same spectrum over all cells. Net capacity improvement. Two
frequency bands are used, one of which is for forward channel (cell-site to subscriber)
and one for reverse channel (sub to cell-site).
Cell Fundamentals –
In practice cells are of arbitrary shape(close to a circle) because it has the same power on all sides
and has same sensitivity on all sides, but putting up two three circles together may result in
interleaving gaps or may intersect each other so in order to solve this problem we can use
equilateral triangle, square or a regular hexagon in which hexagonal cell is close to a circle used for
a system design.
Co-channel reuse ratio is given by:
● Extending the coverage to the areas that are difficult to cover by a large cell.
● Increasing the capacity of the network for those areas that have a higher density of users.
● Increasing number of wireless devices and the communication between them.
Cellular Hierarchy –
1. Femtocells:
Smallest unit of the hierarchy, these cells need to cover only a few meters where all devices are
in the physical range of the users.
2. Picocells:
Size of these networks is in the range of a few tens of meters, e.g., WLANs.
3. Microcells:
Cover a range of hundreds of meters e.g. in urban areas to support PCS which is another kind
of mobile technology.
4. Macro cells:
Cover areas in the order of several kilometers, e.g., cover metropolitan areas.
5. Mega cells:
Cover nationwide areas with ranges of hundreds of kilometers, e.g., used with satellites.
Fixed Channel Allocation –
For a particular channel the frequency band which is associated is fixed.
Total number of channels is given by
Nc = W/B
Where,
W = Bandwidth of the available spectrum,
B = Bandwidth needed by each channels per cell,
Cc = Nc/N where N is the cluster size
Adjacent radio frequency bands are assigned to different cells. In analog each channel corresponds
to one user while in digital each RF channel carries several time slots or codes (TDMA/CDMA).
Simple to implement as traffic is uniform.
What is GSM?
GSM stands for Global System for Mobile Communication. It is a digital cellular
technology used for transmitting mobile voice and data services. Important facts about
the GSM are given below −
● The concept of GSM emerged from a cell-based mobile radio system at Bell
Laboratories in the early 1970s.
● GSM is the name of a standardization group established in 1982 to create a
common European mobile telephone standard.
● GSM is the most widely accepted standard in telecommunications and it is
implemented globally.
● GSM is a circuit-switched system that divides each 200 kHz channel into eight 25
kHz time-slots. GSM operates on the mobile communication bands 900 MHz and
1800 MHz in most parts of the world. In the US, GSM operates in the bands 850
MHz and 1900 MHz.
● GSM owns a market share of more than 70 percent of the world's digital cellular
subscribers.
● GSM makes use of narrowband Time Division Multiple Access (TDMA) technique
for transmitting signals.
● GSM was developed using digital technology. It has an ability to carry 64 kbps to
120 Mbps of data rates.
● Presently GSM supports more than one billion mobile subscribers in more than
210 countries throughout the world.
● GSM provides basic to advanced voice and data services including roaming
service. Roaming is the ability to use your GSM phone number in another GSM
network.
GSM digitizes and compresses data, then sends it down through a channel with two
other streams of user data, each in its own timeslot.
Why GSM?
Listed below are the features of GSM that account for its popularity and wide
acceptance.
● Improved spectrum efficiency
● International roaming
● Low-cost mobile sets and base stations (BSs)
● High-quality speech
● Compatibility with Integrated Services Digital Network (ISDN) and other
telephone company services
● Support for new services
GSM Architecture:
A GSM network comprises of many functional units. These functions and interfaces are
explained in this chapter. The GSM network can be broadly divided into −
● The Mobile Station (MS)
● The Base Station Subsystem (BSS)
● The Network Switching Subsystem (NSS)
● The Operation Support Subsystem (OSS)
Switch(config)#int fa0/0
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access Vlan 2
Also, switchport range can be assigned to required vlans.
Switch(config)#int range fa0/0-2
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 2
By this, switchport fa0/0, fa0/1, fa0-2 will be assigned Vlan 2.
Example –
Switch(config)#int fa0/1
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 3
Switch(config)#int fa0/2
Switch(config-if)#switchport mode access
Switch(config-if) #switchport access Vlan 2
As seen, we have assigned Vlan 2 to fa0/0, fa0/2 and Vlan 3 to fa0/1.
Advantages –
● performance –The network traffic is full of broadcast and multicast. VLAN reduces
the need to send such traffic to unnecessary destination.e.g-If the traffic is
intended for 2 users but as 10 devices are present in the same broadcast domain
therefore all will receive the traffic i.e wastage of bandwidth but if we make VLANs,
then the broadcast or mulicast packet will go to the intended users only.
● formation of virtual groups – As there are different departments in every
organisation namely sales, finance etc., VLANs can be very useful in order to
group the devices logically according to their departments.
● security – In the same network, sensitive data can be broadcast which can be
accessed by the outsider but by creating VLAN, we can control broadcast
domains, set up firewalls, restrict access. Also, VLANs can be used to inform the
network manager of an intrusion. Hence, VLANs greatly enhance network security.
● Flexibility – VLAN provide flexibility to add, remove the number of host we want.
● Cost reduction – VLANs can be used to create broadcast domains which
eliminate the need for expensive routers.
● By using Vlan, the number of small size broadcast domain can be increased which
are easy to handle as compared to a bigger broadcast domain.
Virtual Private Network
VPN stands for "Virtual Private Network" and describes the opportunity to
establish a protected network connection when using public networks. VPNs
encrypt your internet traffic and disguise your online identity. This makes it more
difficult for third parties to track your activities online and steal data. The
encryption takes place in real time.
A VPN hides your IP address by letting the network redirect it through a specially configured
remote server run by a VPN host. This means that if you surf online with a VPN, the VPN server
becomes the source of your data. This means your Internet Service Provider (ISP) and other
third parties cannot see which websites you visit or what data you send and receive online. A
VPN works like a filter that turns all your data into "gibberish". Even if someone were to get
their hands on your data, it would be useless.
Secure encryption: To read the data, you need an encryption key . Without one, it would take
millions of years for a computer to decipher the code in the event of a brute force attack . With
the help of a VPN, your online activities are hidden even on public networks.
Disguising your whereabouts : VPN servers essentially act as your proxies on the internet.
Because the demographic location data comes from a server in another country, your actual
location cannot be determined. In addition, most VPN services do not store logs of your
activities. Some providers, on the other hand, record your behavior, but do not pass this
information on to third parties. This means that any potential record of your user behavior
remains permanently hidden.
Access to regional content: Regional web content is not always accessible from everywhere.
Services and websites often contain content that can only be accessed from certain parts of the
world. Standard connections use local servers in the country to determine your location. This
means that you cannot access content at home while traveling, and you cannot access
international content from home. With VPN location spoofing , you can switch to a server to
another country and effectively “change” your location.
Secure data transfer: If you work remotely, you may need to access important files on your
company’s network. For security reasons, this kind of information requires a secure connection.
To gain access to the network, a VPN connection is often required. VPN services connect to
private servers and use encryption methods to reduce the risk of data leakage.
Why should you use a VPN connection?
Your ISP usually sets up your connection when you connect to the internet. It tracks you via an
IP address. Your network traffic is routed through your ISP's servers, which can log and display
everything you do online.
Your ISP may seem trustworthy, but it may share your browsing history with advertisers, the
police or government, and/or other third parties. ISPs can also fall victim to attacks by cyber
criminals: If they are hacked, your personal and private data can be compromised.
This is especially important if you regularly connect to public Wi-Fi networks. You never know
who might be monitoring your internet traffic and what they might steal from you.