Professional Documents
Culture Documents
Getting Connected: Larry L. Peterson and Bruce S. Davie
Getting Connected: Larry L. Peterson and Bruce S. Davie
Getting Connected: Larry L. Peterson and Bruce S. Davie
Chapter 2
Getting Connected
Chapter 2
Problems
In Chapter 1 we saw networks consists of links
interconnecting nodes. How to connect two
nodes together?
We also introduced the concept of cloud
abstractions to represent a network without
revealing its internal complexities. How to
connect a host to a cloud?
Chapter 2
Chapter Outline
Perspectives on Connecting nodes
Encoding
Framing
Error Detection
Reliable Transmission
Ethernet and Multiple Access Networks
Wireless Networks
Chapter 2
Chapter Goal
Exploring different communication medium over
which we can send data
Understanding the issue of encoding bits onto
transmission medium so that they can be
understood by the receiving end
Discussing the matter of delineating the
sequence of bits transmitted over the link into
complete messages that can be delivered to the
end node
Discussing different technique to detect
transmission errors and take the appropriate
action
Chapter 2
Chapter 2
Perspectives on Connecting
Chapter 2
Chapter 2
Links
All practical links rely on some sort of electromagnetic
radiation propagating through a medium or, in some
cases, through free space
One way to characterize links, then, is by the medium
they use
Chapter 2
Links
Chapter 2
Links
Electromagnetic spectrum
10
Chapter 2
Links
11
Chapter 2
Encoding
12
Chapter 2
Encoding
Baseline wander
13
Chapter 2
Encoding
Problem with NRZ
Clock recovery
14
Chapter 2
Encoding
NRZI
15
Chapter 2
Encoding
Manchester encoding
16
Chapter 2
Encoding
17
Chapter 2
Encoding
18
Chapter 2
Encoding
4B/5B encoding
19
Chapter 2
Framing
We are focusing on packet-switched networks,
which means that blocks of data (called frames
at this level), not bit streams, are exchanged
between nodes.
It is the network adaptor that enables the nodes
to exchange frames.
Chapter 2
Framing
Chapter 2
Framing
Byte-oriented Protocols
Used in DECNet
22
Chapter 2
Framing
BISYNC sentinel approach
23
Chapter 2
Framing
24
Chapter 2
Framing
01111110
25
Chapter 2
Framing
26
Chapter 2
Framing
Byte-counting approach
DDCMP
count : how many bytes are contained in the
frame body
If count is corrupted
Framing error
27
Chapter 2
Framing
28
Chapter 2
Framing
Bit-oriented Protocol
29
Chapter 2
Framing
HDLC Protocol
30
Chapter 2
Framing
HDLC Protocol
5 consecutive 1s
31
Chapter 2
Error Detection
Because of electrical interference and thermal noises
Detecting Error
Correction Error
Two approaches when the recipient detects an
error
Chapter 2
Error Detection
Common technique for detecting transmission
error
Other approaches
33
Chapter 2
Error Detection
Identical No error
Differ Error
Poor Scheme ???
34
Chapter 2
Error Detection
Receiver
m
35
Chapter 2
Two-dimensional parity
36
Chapter 2
Two-dimensional parity
37
Chapter 2
Two-dimensional parity
38
Chapter 2
Chapter 2
40
Chapter 2
41
Chapter 2
Chapter 2
43
Chapter 2
44
Chapter 2
Chapter 2
46
Chapter 2
47
Chapter 2
48
Chapter 2
Let P(x) represent what the sender sent and P(x) + E(x) is the
received string. A 1 in E(x) represents that in the corresponding
position in P(x) the message the bit is flipped.
If there is a single bit error then E(x) = xi, where i determines the
bit in error. If C(x) contains two or more terms it will never divide
E(x), so all single bit errors will be detected.
49
Chapter 2
50
Chapter 2
CRC-8 = x8+x2+x+1
CRC-10 = x10+x9+x5+x4+x+1
CRC-12 = x12+x11+x3+x2+x+1
CRC-16 = x16+x15+x2+1
CRC-CCITT = x16+x12+x5+1
CRC-32 =
x32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x5+x4+x2+x+1
51
Chapter 2
Reliable Transmission
Chapter 2
Reliable Transmission
53
Chapter 2
Reliable Transmission
If the sender does not receive an
acknowledgment after a reasonable amount of
time, then it retransmits the original frame.
The action of waiting a reasonable amount of
time is called a timeout.
The general strategy of using
acknowledgements and timeouts to implement
reliable delivery is sometimes called Automatic
Repeat reQuest (ARQ).
54
Chapter 2
55
Chapter 2
Chapter 2
The sender times out and retransmits the original frame, but the
receiver will think that it is the next frame since it has correctly
received and acknowledged the first frame
As a result, duplicate copies of frames will be delivered
57
Chapter 2
Chapter 2
Bits per frame Time per frame = 1024 8 0.045 = 182 Kbps
Or about one-eighth of the links capacity
59
Chapter 2
60
Chapter 2
61
Chapter 2
62
Chapter 2
WHY?
63
Chapter 2
64
Chapter 2
65
Chapter 2
Accept it
Now the receiver needs to decide whether or not to send an ACK
66
Let SeqNumToAck
Chapter 2
67
Chapter 2
LAF = 9
Chapter 2
The longer it takes to notice that a packet loss has occurred, the
more severe the problem becomes
69
Receiver sends NAK for frame 6 when frame 7 arrive (in the previous
example)
Additional Acknowledgement
Chapter 2
Selective Acknowledgement
70
Chapter 2
Delay Bandwidth
71
Chapter 2
Finite size
72
Chapter 2
Is this sufficient?
73
Chapter 2
Is this sufficient?
Depends on RWS
If RWS = 1, then sufficient
If RWS = SWS, then not good enough
74
Chapter 2
75
Chapter 2
Reliable
Preserve the order
Frame control
76
Chapter 2
Ethernet
77
Chapter 2
Ethernet
78
Chapter 2
Ethernet
This cable is similar to the type used for cable TV except that it
typically has an impedance of 50 ohms instead of cable TVs 75
ohms.
Chapter 2
Ethernet
80
Chapter 2
Ethernet
81
Chapter 2
Ethernet
Ethernet repeater
82
Chapter 2
Ethernet
Signal is propagated in both directions.
Repeaters forward the signal on all outgoing
segments.
Terminators attached to the end of each segment
absorb the signal.
83
Chapter 2
Ethernet
New Technologies in Ethernet
84
Chapter 2
Ethernet
New Technologies in Ethernet
85
Chapter 2
Ethernet
Ethernet Hub
86
Chapter 2
Frame format
CRC (32bit)
87
Chapter 2
Ethernet Frame
88
Chapter 2
Ethernet Addresses
89
Chapter 2
Ethernet Addresses
90
Chapter 2
Ethernet Addresses
91
Chapter 2
Ethernet Addresses
To summarize, an Ethernet adaptor receives all frames
and accepts
92
Chapter 2
93
Chapter 2
When this happens, the two (or more) frames are said to
be collide on the network.
94
Chapter 2
95
Chapter 2
They would have had to transmit longer, and thus send more
bits, before detecting the collision.
96
Chapter 2
Every Ethernet frame must be at least 512 bits (64 bytes) long.
97
Chapter 2
The farther apart two nodes are, the longer it takes for a
frame sent by one to reach the other, and the network is
vulnerable to collision during this time
98
Chapter 2
99
Chapter 2
Chapter 2
101
Chapter 2
102
Chapter 2
103
Chapter 2
Have fewer than 200 hosts connected to them which is far fewer
than the maximum of 1024.
Most Ethernets are far shorter than 2500m with a roundtrip delay of closer to 5 s than 51.2 s.
Ethernets are easy to administer and maintain.
Cable is cheap, and only other cost is the network adaptor on each host.
104
Chapter 2
Wireless Links
105
Chapter 2
Wireless Links
Chapter 2
Wireless Links
Devices that use license-exempt frequencies are still
subject to certain restrictions
For example, a cordless phone might have a range of about 100 feet.
107
Chapter 2
Wireless Links
The second restriction requires the use of Spread
Spectrum technique
Frequency hopping
Able to hop frequencies in sync with the transmitter to correctly receive the frame
108
Chapter 2
Wireless Links
109
Chapter 2
Wireless Links
110
Chapter 2
Wireless Links
How much bandwidth they provide
How far apart the communication nodes can be
Bluetooth
Wi-Fi (more formally known as 802.11)
WiMAX (802.16)
3G cellular wireless
111
Chapter 2
Wireless Links
112
Chapter 2
Wireless Links
Mostly widely used wireless links today are usually
asymmetric
One end-point usually has no mobility, but has wired connection to the
Internet (known as base station)
The node at the other end of the link is often mobile
113
Chapter 2
Wireless Links
Chapter 2
Wireless Links
Wireless communication supports point-to-multipoint
communication
Communication between non-base (client) nodes is
routed via the base station
Three levels of mobility for clients
115
Chapter 2
Wireless Links
Mesh or Ad-hoc network
Chapter 2
IEEE 802.11
117
Chapter 2
IEEE 802.11
118
Chapter 2
Chapter 2
120
Chapter 2
The Hidden Node Problem. Although A and C are hidden from each
other, their signals can collide at B. (Bs reach is not shown.)
121
Chapter 2
122
Chapter 2
Chapter 2
The RTS frame includes a field that indicates how long the sender
wants to hold the medium
- Length of the data frame to be transmitted
124
Chapter 2
Any node that sees the RTS frame but not the CTS
frame
125
Chapter 2
126
Chapter 2
127
Chapter 2
128
Chapter 2
Although two nodes can communicate directly with each other if they
are within reach of each other, the idea behind this configuration is
Chapter 2
This might happen, for example, because the signal from its current AP has
weakened due to the node moving away from it
Whenever a node acquires a new AP, the new AP notifies the old AP of the
change via the distribution system
130
Chapter 2
This is called active scanning since the node is actively searching for an
access point
Node Mobility
131
Chapter 2
Node Mobility
132
Chapter 2
6 bit Type field: indicates whether the frame is an RTS or CTS frame or being
used by the scanning algorithm
A pair of 1 bit fields : called ToDS and FromDS
Frame Format
133
Chapter 2
the original sender is not necessarily the same as the most recent
transmitting node
When one node is sending directly to another, both the DS bits are 0,
Addr1 identifies the target node, and Addr2 identifies the source node
134
Indicates that the message went from a wireless node onto the distribution
system, and then from the distribution system to another wireless node
Chapter 2
135
Chapter 2
Bluetooth
136
Chapter 2
Bluetooth
137
Chapter 2
Bluetooth
A Bluetooth Piconet
138
Chapter 2
ZigBee
139
Chapter 2
Summary
Encoding
Framing
Error Detecting
Reliability
Multiple Access Links
Ethernet
Wireless 802.11, Bluetooth
140