Professional Documents
Culture Documents
Exam
Exam
Alternate topology: Extended Star - links individual stars together, by linking the
centers (hubs/switches); also known as snowflake topology.
○ Advantage:
- Very scalable, easy to add another node.
○ Disadvantage:
- Single point failure due to the usage of a hub/switch
///////457
Collision in a LAN
O coliziune are loc atunci cand 2 statii incearca sa transmita in acelasi timp. Relevant pentru
retele CSMA/CD. Collision detected if cable signal greater than single station signal; station
detecting collision will generate a burst jam signal (jabber control).
Se produce un overlap al frame-urilor; problema ce se poate rezolva prin FDM (Frequency
Domain Multiplexing); transmisiile pot fi corupte.
Collision domain – given by the set of stations sensing collision when simultaneous
transmissions; for 10Mbps standard it is allowed a number of 516 bits onto the shared
medium. For higher speeds (i.e. Ethernet at 100Mbps) is kept the same minimum length,
obtained by splitting the collision domain; use of hubs or switches instead of repeaters.
Fiber Distributed Data Interface - FDDI token topology :uses optical fibers/UTP cable for
short distance
Communication Protocols s
Addressing modes
● Unicast address: data sent to one machine or person (usually an address
refers to a single system)
● Broadcast address: sent to all machines or users (may address all entities
within a domain)
● Multicast: sent to some machines or a group of users (may address a subset
of entities within a domain
For generality, endpoints of UDP are called protocol ports or just ports.
Each UDP data transmission identifies the internet address and port number
of the destination and the source of the message.
UDP header is very simple: Port numbers, Message length, and it also
includes a checksum to verify that no error occurs in the data (otional).
Internetworking s
IPv4
IP services: (primitive)
- Send: Transmits the data unit
- Deliver: notifies the destination about the upcoming data unit.
Adresses
Class A : 1.x.x.x - 126.x.x.x
Class B : 128.x.x.x - 191.x.x.x
Class C : 192.x.x.x - 223.x.x.x
Class D: Contain multicast addresses for group users.
First decimal field is between 224 and 239;
Class E: Reserved for research and future developments.
First decimal field between 240 and 255.
ICMP role: ICMP provides a means for transferring messages from routers and other
hosts to a host. In essence, ICMP provides feedback about problems in the
communication environment.
Time to live field: Its purpose is to stop a packet from being sent for an endless
amount of time. This would happen if the network is a closed circle.
Campul TTL este decrementat la fiecare trecere printr-un router. Intrucat nu putem
cunoaste exact traseul pe care un pachet il va avea, putem folosi campul TTL cu o
anumita valoare pentru a impiedica pachetul sa ramane “blocat” intr-un loop
nesfarsit.
IP
ADRESA DE IPV4, IN IPV6. O adr IPv6 cu 96 de leading zero la inceput este interpretata
ca o adr IPv4.
● tunneling: from IPv4 to IPv4, the router encapsulates the IPv4 into an IPv6 by
adding a header, then a second router converts it from IPv6 to IPv4
● NAT (Network Address Translation) protocol translation: IPv6 packet, the device
changes it into IPv4 and vice-versa
I Pv6
Necessity : IPv6 provides a number of functional enhancements over the existing
IP, designed to accommodate the higher speeds of today’s networks and the mix of
data streams, including graphic and video, that are becoming more prevalent. But
the driving force behind the development of the new protocol was the need for more
addresses. The current IP uses a 32-bit address to specify a source or destination.
With the explosive growth of the Internet and of private networks attached to the
Internet, this address length became insufficient to accommodate all systems
needing addresses.
IPv6 Header has a fixed length of 40 octets, consisting of the following fields:
• Version (4 bits): Internet protocol version number; the value is 6.
• DS/ECN (8 bits): Available for use by originating nodes and/or forwarding
routers for differentiated services and congestion functions, as described for
the IPv4 DS/ECN field.
• Flow Label (20 bits): May be used by a host to label those packets for which it is
requesting special handling by routers within a network; discussed subsequently.
• Payload Length (16 bits): Length of the remainder of the IPv6 packet following
the header, in octets. In other words, this is the total length of all of the
extension headers plus the transport-level PDU.
• Next Header (8 bits): Identifies the type of header immediately following the
IPv6 header; this will either be an IPv6 extension header or a higher-layer
header, such as TCP or UDP.
• Hop Limit (8 bits): The remaining number of allowable hops for this packet.The
hop limit is set to some desired maximum value by the source and decremented
by 1 by each node that forwards the packet.The packet is discarded if Hop Limit
is decremented to zero. This is a simplification over the processing required for
the Time to Live field of IPv4.The consensus was that the extra effort in accounting
for time intervals in IPv4 added no significant value to the protocol. In fact,
IPv4 routers, as a general rule, treat the Time to Live field as a hop limit field.
• Source Address (128 bits): The address of the originator of the packet.
Address structure
IPv6 addresses are 128 bits in length. Addresses are assigned to individual
interfaces on nodes, not to the nodes themselves.8 A single interface may have
multiple unique unicast addresses. Any of the unicast addresses associated with a
node’s interface may be used to uniquely identify that node.
Mail s
MIME (Multipart Internet Mail Extensions, 752)
Role: MIME is an extension to the RFC 822 framework that is intended to address
some of the problems and limitations of the use of SMTP and RFC 822 for electronic
mail. The other major component of the MIME specification, in addition to content
type specification, is a definition of transfer encodings for message bodies. The
objective is to provide reliable delivery across the largest range of environments.
Header extensions
There are some additional lines in
the MIME message headers:
- MIME version: identifies the
version
- Content type: identifies what
the message contains
- Content transfer encoding: unique identifier
- Content description: how the content is packed for transmission
- Content ID: the type of the message
Extensions
It allows the inclusion of separate components (multimedia) in a single email
message. The sending program identifies the components so the receiving program
can automatically extract it.
Separator line gives information about the specific encoding.
For the text type of body, no special software is required to get the full meaning of
the text, aside from support of the indicated character set
The multipart type indicates that the body contains multiple, independent
parts.
- SMTP cannot transmit executable files or other binary objects
- SMTP cannot transmit text data that includes national language characters
because these are represented by 8-bit codes with values of 128 decimal or
higher, and SMTP is limited to 7-bit ASCII.
- SMTP servers may reject mail messages over a certain size.
- SMTP gateways do not use a consistent set of mappings-> translation
problems.
- Some SMTP implementations do not adhere completely to the SMTP
standards. Common problems include: Deletion, addition, or reordering of
carriage return; Removal of trailing
whitespace (tab and space
characters); Conversion of tab
characters into multiple space
characters
WWW
& HTTP
s
HTTP (Hypertext Transfer protocol)
- Underlying protocol of the World Wide Web.
- Not a protocol for transferring hypertext; rather it is a protocol for transmitting
information with the efficiency necessary for making hypertext jumps.
- HTTP specifies commands and client-server interaction.
- The data transferred by the protocol can be plaintext, hypertext, audio,
images, or any Internet-accessible information.
- Usually between Web browser (client) and Web server.
- To provide reliability, HTTP makes use of TCP. Nevertheless, HTTP is a
“stateless” protocol: Each transaction is treated independently. Accordingly, a
typical implementation will create a new TCP connection between client and
server for each transaction and then terminate the connection as soon as the
transaction completes
- Client/Server model: – client: browser that requests, receives, “displays”
WWW objects; – server: WWW server daemon, sends objects in response to
client requests.
Functionality:
– client initiates TCP connection (creates socket) to server, port 80;
– server accepts TCP connection from client;
– HTTP messages (application-layer protocol messages) exchanged between
browser (HTTP client) and WWW server (HTTP server);
– TCP connection closed. HTTP is “stateless”: server maintains no information about
past client requests.
The client opens a TCP connection that is end-to-end between the client
and the server. The client then issues an HTTP request. The request consists of a
specific command, referred to as a method, an address [referred to as a Uniform
Resource Locator (URL)], and a MIME-like message containing request parameters,
information about the client, and perhaps some additional content information. When
the server receives the request, it attempts to perform the requested action and then
returns an HTTP response. The response includes status information, a
success/error code, and a MIME-like message containing information about the
server, information about the response itself, and possible body content. The TCP
connection is then closed.
HTML
- Evolved from Standard Generalized Markup Language (SGML), specialized
for hypertext and adapted to the Web.
- specifies how documents are to be formatted: Major structure of document,
Formatting instructions, Hypermedia links, Additional information about
document contents.
- Two parts to document: Head contains details about the document, Body
contains information/content.
- Page is represented in ASCII text with embedded HTML tags formatting
instructions. Tags have format <TAGNAME>. End of formatted section is
</TAGNAME>. Commands inside the tags: directives.
- Evolution. HTML 1.0 – one way, e.g. users could only call up pages, hard to
send back information -> Inclusion of forms, containing boxes or buttons,
allowing users for info filling or make choices and sending info back to the
page’s owner. Form enclosed between <FORM> and </FORM> tags. One
standard to handle forms’ data: Common Gateway Interface (CGI). Example:
CGI programs (scripts) allow interface between a database and the Web.
Data Link Control s
Flow Control: Flow control is a technique for assuring that a transmitting entity does not
overwhelm a receiving entity with data. The receiving entity typically allocates a databuffer of
some maximum length for a transfer.When data are received, the receiver must do a certain
amount of processing before passing the data to the higher-level software. In the absence of
flow control, the receiver’s buffer may fill up and overflow while it is processing old data.
● transmission time: time taken for a station to emit all bits into medium
● propagation time: time taken for a bit to traverse the link, from source to
destination stations
Propagation time >> transmission time (high data transmission speed or long distance) the
line is under-utilized
Sliding Windows (199)
The essence of the problem described so far is that only one frame at a time
can be in transit. In situations where the bit length of the link is greater than the
frame length serious inefficiencies result. Efficiency can be greatly improved by
allowing multiple frames to be in transit at the same time.
Error Detection
Error Control (203): error detection + correction. Two types of errors: lost frames +
damages frames
Automatic Repeat Request (ARQ):
- Stop-and-wait ARQ
- Go-back-N ARQ
Flag Fields : Delimit frame at both ends, used for frame sequence synchronization;
receiver hunts for flag sequence to synchronize; Normal pattern: 01111110 (six ones
between zeros).
Address Field : Usually 8 bits long, indicating the secondary station having
transmission or to receive frame. Not useful for point-to-point links. Usually 8 bits
enough for addressing 255 secondary stations, even 127 when 7 bits used. Address
field may be extended to multiples of 7 bits, using an ‘a priori’ rule: LSB of each octet
indicates that it is the last octet (if 1) in the string, or not (if 0); Special address for all
stations: all ones (11111111) is broadcast address.
Control Field : HDLC defines three types of frames, with different control formats :
Information (I-frame): data to be transmitted to user (next layer up), Flow and error
control piggybacked on information frames; Supervisory (S-frame): control for ARQ
when piggyback not used; Unnumbered (U-frame): supplementary link control, if
needed.
Structura: Flag(8 biti) + Address (8 biti) + Control (8 sau 16) + Information (variabil) +
FCS (16 sau 32) + Flag (8).
Medium Access Control s
CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance)
Used in wireless networks, where the device does not know when collision
happens. The method is similar to CSMA/CD; the device that wants to transmit data
listens to see if there are any current transmissions happening, if so, it will wait a
short period of time until it rechecks. If there is nothing sensed, the device waits for a
short amount of time before sending the data, there are two cases possible:
1. the receiver gets the data and sends an acknowledgement bit back to the
sender
2. the sender does not receive the acknowledgement, meaning that the
transmission was unsuccessful, so it retries.
This technique is mostly used in half-duplex systems, where the data can be sent in
both directions, but not at the same time.
Fiber Distributed Data Interface (FDDI) is a set of ISO standards for data transmission in
LANs (Local Area Network) using fiber optic cables as the physical medium. On shorter
distances, UTP cabling is used.
Token-type topology, which means that it uses the Token Ring MAC algorithm.
Each station acts as a repeater that sends the data further until it reaches the destination. The
topology consists of two rings with opposite flow direction, one of the rings is the main ring
and the other one is for backup.
There are three station types:
1. Dual Attachment Station, which is connected only to the two ring cables
2. Dual Attachment Concentrator, which is connected both to the rings and to the
twisted pair cable that links the Single Attachment Station
3. Single Attachment Station, which connects the end devices
The encoding of the data is done using 4B5B symbols (4B are encoded into 5B) for clock
synchronization between the source and the destination. This encoding ensures at least two
transitions per block of bits, avoiding a sequence of 00000 which would bring issues to the
clock synchronization. For twisted pair cables, the encoding is dome using MLT-3 encoding.
● header
○ preamble, for synchronization
○ start delimiter, signals the beginning of the frame
○ frame control, whether we transmit a data/control frame
○ destination address
○ source address
● data
● trailer
○ frame check
○ end delimiter, signals the end of the frame
○ frame status
Communication Channels s
Classification:
1. type of link
○ point-to-point
○ point-multipoint
○ broadcast
2. information transfer sense:
○ simplex
○ half-duplex
○ full-duplex
3. maximum channel transmission speed
4. type of transmission
○ baseband: one channel/bandwidth
○ broadband: independent channels/bandwidth
DE CE TRANSMISIA E LA 64 KBPS
Bandwith of the voice signal: 4kHz => Sample rate: 8kHz, or one sample every 125 μsec. Nr
of bits for quantification: 8=>Needed data rate: 8bits/sample*8000samples/sec=64kbps. T1
frame format: has a format of 193bits, transmitted at 125μsec each. 193=24*8 data bits+1
framing (control bit)=>gross data rate: 1.544Mbps.
● synchronous:
It can be used when the total achievable data rate of the medium is much larger than data
rate of signal. Multiple signals are carried on a single transmission path by interleaving in
time slots, which can happen at bit, byte or larger levels. This allows for multiple sources to
send their data without leading to interferences.
The process of time division multiplexing is the following: a set of signals arrive at the
multiplexer that must forward them onto the same transmission medium. The data coming is
briefly buffered with 1 bit or character, this transmission is done synchronously since the
buffers are fast enough to not add delays. The data is then organized into frames that
contain time slots (one or more slots are dedicated to each frame).
Each user has full bandwidth access for its allocated time slot.
● total allocated bandwidth is much larger than the one required by a single signal
● more signals carried simultaneously
● analog/digital input -> analog conversion -> multiplexed into analog
● used in broadcast television
● Cross-talk possibility since all signals are transmitted simultaneously
Switching Techniques
s
Circuit Switching
Physical path between communicating parts, achieved using circuit switching
–switches (relays)-in the networks nodes. Three phase communication: -circuit
establishment (setup), establish a (optimum) path between parts; both parts agree
communication; -effective data transmission (signal transfer), on this route; -circuit
release (disconnection); initiative of one part. Drawbacks: -not efficient due to
existence of the first phase (it will exist even if there’s no data transfer); -need for
covering bandwidth allocation; -important amount of cabling; -no buffers in switches
for transmission equalization. Today use of digital PBX (Private Branch Exchange).
Message Switching
Data transfer using messages (independent data units, with diff. lengths but
similar structures). Types: control and data (embedding control). Need for
addressing (source & destination of message). Communications nodes are not
physical switches, but computing systems (with memory and processing units).
Philosophy is: message store & forward. Not more dedicated communications path;
established in an optimum way (cost, network status) by nodes (using routing
tables). Advantages: -improvement in efficiency (path multiplexing); -introduces
message priority; -equilibrated transmissions. Drawbacks: -messages are too long,
memory waste and difficult error recovery.
Packet Switching
Combines the advantages of previous methods. The packet has similar
message structure but a lower length, up to 1000 octets. Two methods: -use of
datagrams (close to message switching)-more speedy and flexible method; -use or
not of transmission acknowledgments (ACK); -use of virtual circuits (close to circuit
switching)-use of the three phases (connection request, data transfer, disconnect) for
a logical connection activation; use of special control packets for that. Also
embedding of control information (piggybacking). A logical connection may be
implemented with more different physical connections.
Hardwire media s
MODALITATI DE CABLARE
Twisted pair
Consists of two metallic copper wires, twisted after a given step. Twisted pairs are of the
following kinds: STP (Shielded Twisted Pair), presenting protective shield for each pair and
a global shield (metal braid) for whole cable; reduces interference but increased
Weight; FTP (Foiled Twisted Pair), or S
cTP (Screened TP), providing an unique
global shield; UTP (Unshielded Twisted Pair) , being the non-shielded variant, only the
separate pair insulation
CABLUL UTP
Most common medium; used in: -Telephone network (Between house and local exchange
(subscriber loop), Within a company’s buildings, To private branch exchange (PBX)); -For
local area networks (LAN) (Ethernet at 10Mbps or 100Mbps).
Advantages: cheap, easy to work with (to install on walls).
Problems: susceptible to EM interference and noise, need for amplification (order of
kilometers), near end crosstalk.
Categories: Cat 1 - Telecommunication, the cables for the analogue telephony; Cat 2 (Low
Speed Data), the cables for analogue and early digital telephony, offering data transmission
services at low speeds; Cat 3 (High Speed Data) defines cables used for LANs up to
10-16Mbps; the usual voice grade; Cat 4 (Low Loss, High Performance Data) defines cables
with higher performances, used at communication speeds of tens of Mbps (20Mbps); Cat 5
(Low Loss, Extended frequency, High Performance Data), are used in today’s networks
working at hundreds of Mbps; Commonly pre-installed in new office buildings. Future
cables, categories 6 and 7, will operate at speeds of 200, respectively 600Mbps; low
attenuation and higher noise immunity.
-------------
Light propagation modes through the optical fiber are:
1. step-index multimode, which is best suited for short distances due to the
fact that the signal can spread out in time, limiting the rate at which the
data can be correctly transmitted. This spreading is caused by the
cylinder through which the light passes (it absorbs the rays that form
shallow angles with the sides of the tube)
2. graded-index multimode, where the refraction index decreases from the
core center to the edges; this does not allow the light to be absorbed by
the edges, but refracted back in a curved shape
3. single mode, where the diameter of the tube is considerably minimized,
providing a direct path for the ray of light to pass through. This method is
used for long distance transmissions since the information can be passed
through more reliably. Used in telephone and television.
Specific problems
WLAN - Wireless Local Area Network - a LAN without the cables.
The applications include LAN extension, cross building interconnection (connecting LANs
from different buildings without the need for cabling), nomadic access (between a LAN and a
mobile device that has an antenna) and ad-hoc networks (peer-to-peer networks).
Spread Spectrum is a type of transmission technology used by WLANs . The main principle
behind it is that closely-placed cells will use different center frequencies within the same
band in order to avoid interferences.
The sender sends the data on a set of carrier frequencies, while the receiver checks all of
these frequencies. There are two methods for doing so:
1. Frequency Hopping (FHSS): the signal is sent over a set of random carrier
frequencies, hoping from one frequency to another at split-second intervals. The
receiver picks up the data signal by hopping along. This method is easy to
implement and provides a good resistance to noise due to the fact that only the
receiver and sender know the order in which the hops take place. The only
downside is the limited throughput, of 2.4GHz.
2. Direct Sequence (DSSS): this method uses chipping encoding (each data bit is
encoded into multiple bits by applying the XOR function over the original
information and a random set of bits. ). The signal carrier remains the same ,
while the data signal is spread over a wider range of frequencies, providing a
larger throughput of up to 3 times higher than FHSS. This method is however less
resistant to noise.
Sketch (low) 110010101 Manchester differential
BIT STUFFING
Se da sirul de biti 0010 1111 1011 1111 0; folosind tehnica bit stuffing sa se determine
fluxul de biti de iesire.
0010111110011111010; ( pentru fiecare 5 biti consecutivi de 1, se adauga un 0)
ADSL
Asymmetric Digital Subscriber Line. Link between subscriber and network (local loop); tens
of millions installed. -> need for exploiting the existing base of TP wired structure; initially
designed for voice-grade analog transmissions with 4kHz bandwidth, TP may carry data
using signals over a spectrum of more than 1MHz => use of modems for digital high rate data
transmissions, using currently installed twisted pair cable. ADSL initially designed for
video-on-demand, now appropriate for high-speed Internet access. Asymmetric because, from
the user point, there is greater capacity downstream (from service provider to customer) than
upstream. ADSL uses FDM for managing the 1MHz bandwidth: -Lowest 25kHz for voice
(Plain Old Telephone Service): 4kHz for voice, rest for guard, avoiding interference with
other channels; -Use echo cancellation or FDM to give (to allocate) two bands: one for
upstream , one for downstream; -Use FDM within each of two bands. Supports loop length in
the range of 5.5km.
ECHO CANCELLATION
Signal processing technique, allowing digital transmissions in both directions on a single line
simultaneously. The transmitter must subtract the echo of its own transmission from the
incoming signal, to recover the signal sent by the other side. Advantages: -more flexibility for
upstream bandwidth changes, simply extending the area of overlap -downstream bandwidth
in the good part of the spectrum => a lower attenuation.
Flooding
No network info required. Packet sent by node to every neighbour. Incoming packets
retransmitted on every link except incoming link. Eventually a number of copies will arrive at
destination. Each packet is uniquely numbered so duplicates can be discarded
Nodes can remember packets already forwarded to keep network load in bounds; Can include
a hop count in packets. Properties of Flooding: All possible routes are tried, Very robust, At
least one packet will have taken minimum hop count route, Can be used to set up virtual
circuit, All nodes are visited, Useful to distribute information (e.g. routing)
Random Routing
Node selects one outgoing path for retransmission of incoming packet; Selection can be
random; Can select outgoing path based on probability calculation; No network info needed;
Route is typically not least cost nor minimum hop
Adaptive Routing
Used by almost all packet switching networks; Routing decisions change as conditions on the
network change (Failure, Congestion), Requires info about network, Decisions more
complex, Tradeoff between quality of network info and overhead. Advantages: Improved
performance, Aid congestion control, Complex system, May not realize theoretical benefits
SUBNETMASK
Allow arbitrary complexity of internetworked LANs within organization. Insulate overall
internet from growth of network numbers and routing complexity. Site looks to rest of
internet like single network. Each LAN assigned subnet nr. Host portion of address
partitioned into subnet nr and host nr. Local routers route within subnetted network. Subnet
mask indicates which bits are subnet number (1s) and which are host number (0s)
Options Headers
Carry optional information, not necessary examined by all routers or hosts
Hop-by-Hop Options Header-> Consists of the following: Next header, Header extension
length, Options(type, length, data)
Fragmentation Header -> Fragmentation only allowed at source node, no fragmentation at
intermediate routers; Node must perform path discovery operation, to find the smallest MTU
(Maximum Transmission Unit) of intermediate networks, Source fragments IPv6 packets to
match MTU, Otherwise limits to 1280 octets, that must be supported by any network
Fragmentation Header Fields: Next Header – type of following header, Reserved,
Fragmentation offset – any fragment data is multiple of 64bits; this field indicates where in
the original packet this fragment’s payload belongs,Identification – identify the original
packet (now fragmented)
Routing Header-> List of one or more intermediate nodes to be visited :Next Header, Header
extension length – length of this header, Routing type – identifies a routing protocol header
variant, Segments left - number of nodes still to be visited, Destination Options H eader
−%1
H.323 is a standard for real-time audio and video conferencing among end systems on the
Internet; also covers how end systems on the Internet communicate with ordinary
circuit-switched telephone networks. It means: The products of Internet telephony and
videoconferencing that use H.323 should be able to interoperate and should be able to
communicate with ordinary telephones H.323 is an umbrella specification that includes: -A
specification for how endpoints negotiate audio/video encodings. -A specification for how
audio and video chunks are encapsulated and sent over the network; this is done by means of
RTP; -A specification for how endpoints communicate with their respective gatekeepers; - A
specification for how Internet phones communicate with ordinary phones. Components: End
points can be standalone devices or computer applications; Gateways permit communication
among H.323 endpoints and ordinary telephones; Gatekeepers provide address translation,
authorization, bandwidth management, and accounting for LAN terminals.
Difference between Stop and wait and Sliding Window