Sei sulla pagina 1di 82

7/17/2017

EI6701 INDUSTRIAL DATA NETWORKS

Unit - I

DATA NETWORK AND


FUNDAMENTALS

Basics of Networks

1
7/17/2017

Network
Principle

A network is a set of devices (often referred to as nodes)


connected by communication links.

A node can be a computer, printer, or any other device


capable of sending and/or receiving data generated by other
nodes on the network.

Network
Uses of network Applications of network

Act as an interface Marketing and sales


Manage data transfer Financial services
Sharing resources Manufacturing
Security Directory services
Reliability Information services
Electronic messaging
Cable television
Cellular telephone

2
7/17/2017

Network Criteria

A network must be able to meet a certain number of criteria.

The most important of these are

Performance
reliability and
security

Network Criteria
Performance

Performance can be measured in many ways, including


transit time and response time.

Transit time - amount of time required for a message to travel


from one device to another.

Response time - elapsed time between an inquiry and a


response

Depends on a number of factors, including the number of


users, the type of transmission medium, the capabilities of the
connected hardware, and the efficiency of the software.
6

3
7/17/2017

Network Criteria
Reliability

Network reliability is measured by the frequency of failure, the


time it takes a link to recover from a failure, and the network's
robustness in a catastrophe.

Security

Network security issues include protecting data from


unauthorized access, protecting data from damage and
development, and implementing policies and procedures for
recovery from breaches and data losses.

Configuration of Network
Three types of configuration

Line configuration
Point to Point configuration
Multipoint or Multidrop configuration

4
7/17/2017

Configuration of Network
Line configuration

Refers to the way two or more communications devices attach


to a link.

A link is the physical communication pathway that transfers


from one device to another.

Configuration of Network
Point to Point configuration

A point-to-point connection provides a dedicated link between


two devices.

The entire capacity of the link is reserved for transmission


between those two devices.

Eg: PC to Printer

Point to Point Configuration

Behrouz Forouzan 10

5
7/17/2017

Configuration of Network
Multipoint or Multidrop configuration

A multipoint (also called multidrop) connection is one in which


more than two specific devices share a single link.

Eg: Data exchange between the file server and many


computers.

Multipoint or Multidrop

Behrouz Forouzan 11

Data flow
Transmission Mode

Used to define the direction of signal flow between two linked


devices.

Communication between two devices can be

simplex
half-duplex
full-duplex

12

6
7/17/2017

Simplex
In simplex mode, the communication is unidirectional, as on a
one-way street. Only one of the two devices on a link can
transmit; the other can only receive.

Eg: Keyboards and traditional monitors are examples of


simplex devices. The keyboard can only introduce input; the
monitor can only accept output.

The simplex mode can use the entire capacity of the channel
to send data in one direction.

Behrouz Forouzan Simplex 13

Half Duplex
In half-duplex mode, each station can both transmit and
receive, but not at the same time.
When one device is sending, the other can only receive, and
vice versa.
The half-duplex mode is like a one-lane road with traffic
allowed in both directions.
When cars are traveling in one direction, cars going the other
way must wait.
Eg: Walkie - Talkie

Behrouz Forouzan Half duplex 14

7
7/17/2017

Full Duplex
In full-duplex mode(also called duplex), both stations can
transmit and receive simultaneously.

It is like a two-way street with traffic flowing in both directions


at the same time.

Eg: Telephone network

Behrouz Forouzan Full duplex 15

Physical Topology & Classification


Physical Topology
Physical topology refers to the way in which a network is laid
out physically. Two or more devices connect to a link; two or
more links form a topology.

It is the geometric representation of the relationship of all


the links and linking devices (usually called nodes) to one
another.
Classification of Topology
There are four basic topologies possible: mesh, star, bus,
and ring.

Behrouz Forouzan Classification of Topology 16

8
7/17/2017

Mesh Topology
In a mesh topology, every device has a dedicated point-to-
point link to every other device.

The term dedicated means that the link carries traffic only
between the two devices it connects.

In mesh topology, we need n(n -1)/2 duplex-mode links.

Example of a mesh topology is the connection of telephone


regional offices in which each regional office needs to be
connected to every other regional office.

17

Mesh Topology

A fully connected mesh topology (five devices)

Behrouz Forouzan 18

9
7/17/2017

Mesh Topology

Advantages Disadvantages
Mesh topology is robust It is expensive to install

It has privacy or security Installation and reconfiguration


are difficult
Point to point links make fault It uses a lot of cabling or wiring
identification and fault isolation can be greater than available
easy space that can accomodate
Traffic can be routed to avoid
links with suspected problems

19

Star Topology
In a star topology, each device has a dedicated point-to-point
link only to a central controller, usually called a hub.

The devices are not directly linked to one another.

Unlike a mesh topology, a star topology does not allow direct


traffic between devices.

The controller acts as an exchange:

If one device wants to send data to another, it sends the data


to the controller, which then relays the data to the other
connected device

20

10
7/17/2017

Star Topology

A star topology connecting four stations

Behrouz Forouzan 21

Star Topology

Advantages Disadvantages
Less expensive and It is robust If the centralized point fails
entire network fails.
Less cabling is involved since dependency of the whole
addition and deletion moves topology on one single point,
involve only one connection the hub. If the hub goes down,
(between device and hub) the whole system is dead.
Centralized monitoring and
management are possible.

22

11
7/17/2017

Bus Topology
A bus topology, on the other hand, is multipoint. One long
cable acts as a backbone to link all the devices in a network.

Nodes are connected to the bus cable by drop lines and taps.
A drop line is a connection running between the device and
the main cable.

A tap is a connector that either splices into the main cable or


punctures the sheathing of a cable to create a contact with the
metallic core.

23

Bus Topology

A bus topology connecting three stations

Behrouz Forouzan 24

12
7/17/2017

Bus Topology

Advantages Disadvantages
Ease of installation and reliable Difficult reconfiguration and
fault isolation
Use of cable is economical A fault or break in the bus
cable stops all transmission
Bus is easy to extend Network can slow down in
heavy traffic
Media is inexpensive and easy Cable break can affect many
to work with. users.

25

Ring Topology
In a ring topology, each device has a dedicated point-to-point
connection with only the two devices on either side of it.

A signal is passed along the ring in one direction, from device


to device, until it reaches its destination.

Each device in the ring incorporates a repeater. When a


device receives a signal intended for another device.

The repeater regenerates the bits and passes them along

26

13
7/17/2017

Ring Topology

A ring topology connecting six stations

Behrouz Forouzan 27

Ring Topology

Advantages Disadvantages
Easy to install and reconfigure Unidirectional traffic

Each device is linked only its Failure of one computer can


immediate neighbors. impact the rest of the network
Provides equal access for all Network configuration disrupts
computers operation.
Performance is even despite
many users

28

14
7/17/2017

Hybrid Topology
A network can be hybrid.

For example, we can have a main star topology with each


branch connecting several stations in a bus topology.

29

Hybrid Topology

A hybrid topology: a star backbone with three bus networks

Behrouz Forouzan 30

15
7/17/2017

Consideration When Choosing a Topology

Cost

Length of cable needed

Future growth

Cable type

31

Categories of Network

LAN Local Area Network


WAN Wide Area Network
MAN Metropolitan Area Network

32

16
7/17/2017

Local Area Network (LAN)

A local area network (LAN) is usually privately owned and


links the devices in a single office, building, or campus.

Depending on the needs of an organization and the type of


technology used,

LAN can be as simple as two PCs and a printer in someone's


home office; or it can extend throughout a company and
include audio and video peripherals.

Currently, LAN size is limited to a few kilometers.

33

Local Area Network (LAN)

An isolated IAN connecting 12 computers to a hub in a closet

Behrouz Forouzan 34

17
7/17/2017

Wide Area Network (WAN)

Wide area network (WAN) provides long-distance


transmission of data, image, audio, and video information
over large geographic areas that may comprise a country, a
continent, or even the whole world.

A WAN can be as complex as the backbones that connect the


Internet or as simple as a dial-up line that connects a home
computer to the Internet.

The switched WAN connects the end systems, which usually


comprise a router (internetworking connecting device) that
connects to another LAN or WAN.

35

Wide Area Network (WAN)

WANs: a switched WAN and a point-to-point WAN

Behrouz Forouzan 36

18
7/17/2017

Metropolitan Area Network (MAN)


A metropolitan area network (MAN) is a network with a size
between a LAN and a WAN. It normally covers the area inside
a town or a city.

It is designed for customers who need a high-speed


connectivity, normally to the Internet, and have endpoints
spread over a city or part of city.

A good example of a MAN is the part of the telephone


company network that can provide a high-speed DSL line to
the customer.

Another example is the cable TV network that originally was


designed for cable TV, but today can also be used for high-
speed data connection to the Internet. 37

Metropolitan Area Network (MAN)

A heterogeneous network made off our WANs and two LANs

Behrouz Forouzan 38

19
7/17/2017

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


39

Network Hierarchy
Principle

To reduce their design and complexity, most networks are


organized as s series of layers or levels.

Protocol is an agreement between the communicating parties


on how communication is to proceed.

The entities comprising the corresponding layers on different


machines are called peers.

Set of layers and protocols are called network architecture.

40

20
7/17/2017

Network Hierarchy

Behrouz Forouzan 41

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


42

21
7/17/2017

Network Switching
Network consists of a set of interconnected nodes among
which information are transmitted from source node to
destination node through different routes which is controlled
by switching mechanism.

A switched network consists of a series of interlinked nodes


called switches.

Classification of Switching 43

Circuit Switching
Creates a direct physical connection between two devices
such as computers or phones.

Three main activities

Circuit establishment
Data transfer
Circuit disconnect

44

22
7/17/2017

Classification of switching

Classification of Switching
Behrouz Forouzan 45

Circuit switching

Switched network

Behrouz Forouzan 46

23
7/17/2017

Classification of Circuit switching

Behrouz Forouzan 47

Time division switching

Time slot interchange (TSI)

Behrouz Forouzan 48

24
7/17/2017

Time division switching

Time division multiplexing (TDM)

Behrouz Forouzan 49

Space division switching


Cross bar switches connects n inputs to m outputs in a
grid using electronic micro switches (transistor) at each cross
point.

Ex: 1000 inputs to 10000 outputs requires a cross bar of


1,000,000 cross points.

Multistage switch - depends on the number of stage and


number of switches required in each stage.

Ex: Three first stage switches, 10 cross points (5x2) total = 30


cross points
Two second stage switches, a cross points (3x3) total = 18
cross points
Three third stage switches, 10 cross points (5x2) total = 30
50
cross points

25
7/17/2017

Space division switching

Multi-stage switches

Behrouz Forouzan 51

Packet switching
Data are transmitted is discrete units of potentially variable
length blocks called packets.

Two types

Datagram
Virtual circuit
Switched virtual circuit (SVC)
Permanent virtual circuit (PVC)

Three types of datagram packet switches


Store and forward
Fragment free
Cut through
52

26
7/17/2017

Packet switching

Classification of packet switching

Behrouz Forouzan 53

Packet switching

Datagram approach

Behrouz Forouzan 54

27
7/17/2017

Packet switching

Switched virtual circuit (SVC)


Behrouz Forouzan 55

Message switching
The message is sent to the nearest connected switching
node.
This node stores the message, checks for error, select best
route available and forwards the message to the next node

Advantages of message switching


Data conversion possible
Line efficiency is greater
Message priorities can be used
Even under heavy traffic, packets are accepted possibly
with a greater delay

56

28
7/17/2017

Message switching

Message switching

Behrouz Forouzan 57

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


58

29
7/17/2017

Open System Interconnection (OSI)


Principle

Established in 1947, the International Standards Organization


(ISO) is a multinational body dedicated to worldwide
agreement on international standards.

An ISO standard that covers all aspects of network


communications is the Open Systems Interconnection (OSI)
model.

An open system is a set of protocols that allows any two


different systems to communicate regardless of their
underlying architecture.

ISO is the organization and OSI is the model. 59

Open System Interconnection (OSI)


Principle

The purpose of the OSI model is to show how to facilitate


communication between different systems without requiring
changes to the logic of the underlying hardware and software.

The OSI model is not a protocol;

It is a model for understanding and designing a network


architecture that is flexible, robust, and interoperable.

60

30
7/17/2017

Open System Interconnection (OSI)

Seven Layers in the OSI Model


Behrouz Forouzan 61

Open System Interconnection (OSI)

The OSI model is a layered framework for the design of


network systems that allows communication between all types
of computer systems.

It consists of seven separate but related layers, each of which


defines a part of the process of moving information across a
network.

An understanding of the fundamentals of the OSI model


provides a solid basis for exploring data communications.

62

31
7/17/2017

Open System Interconnection (OSI)


The OSI model is composed of seven ordered layers: physical
(layer 1), data link (layer 2), network (layer 3), transport (layer
4), session (layer 5), presentation (layer 6), and application
(layer 7).

This communication is governed by an agreed-upon series of


rules and conventions called protocols.

The processes on each machine that communicate at a given


layer are called peer-to-peer processes.

Communication between machines is therefore a peer-to-peer


process using the protocols appropriate to a given layer.

63

Open System Interconnection (OSI)

The interaction between layers in the OSI model


Behrouz Forouzan 64

32
7/17/2017

Open System Interconnection (OSI)


Interface between Layers

The passing of the data and network information down


through the layers of the sending device and back up through
the layers of the receiving device is made possible by an
interface between each pair of adjacent layers.

Each interface defines the information and services a layer


must provide for the layer above it.

Well-defined interfaces and layer functions provide modularity


to a network. As long as a layer provides the expected
services to the layer above it, the specific implementation of
its functions can be modified or replaced without requiring
changes to the surrounding layers.
65

Open System Interconnection (OSI)


Organization of the Layers

The seven layers can be thought of as belonging to three


subgroups.

Layers 1, 2, and 3-physical, data link, and network-are the


network support layers;

They deal with the physical aspects of moving data from one
device to another (such as electrical specifications,
physical connections, physical addressing, and transport
timing and reliability).

66

33
7/17/2017

Open System Interconnection (OSI)


Organization of the Layers
Layers 5, 6, and 7-session, presentation, and application-can
be thought of as the user support layers;

They allow interoperability among unrelated software


systems.

Layer 4, the transport layer, links the two subgroups and


ensures that what the lower layers have transmitted is in a
form that the upper layers can use.

The upper OSI layers are almost always implemented in


software; lower layers are a combination of hardware and
software, except for the physical layer, which is mostly
hardware.
67

Open System Interconnection (OSI)

An exchange using the OSI model


Behrouz Forouzan 68

34
7/17/2017

Open System Interconnection (OSI)


Physical Layer

The physical layer coordinates the functions required to carry


a bit stream over a physical medium.

It deals with the mechanical and electrical specifications of the


interface and transmission medium.

It also defines the procedures and functions that physical


devices and interfaces have to perform for transmission to
Occur.

69

Open System Interconnection (OSI)

Physical Layer
Behrouz Forouzan 70

35
7/17/2017

Open System Interconnection (OSI)


Physical Layer
Defines the characteristics of the interface between the
devices and the transmission medium. It also defines the type
of transmission medium.

Representation of bits: The physical layer data consists of a


stream of bits (sequence of Os or 1s) with no interpretation.

To be transmitted, bits must be encoded into signals--


electrical or optical. The physical layer defines the type of
encoding (how Os and I s are changed to signals).

Data rate: The transmission rate-the number of bits sent each


second-is also defined by the physical layer. In other words,
the physical layer defines the duration of a bit, which is
how long it lasts. 71

Open System Interconnection (OSI)


Physical Layer
Synchronization of bits: The sender and receiver not only
must use the same bit rate but also must be synchronized at
the bit level. In other words, the sender and the receiver
clocks must be synchronized.

Line configuration: The physical layer is concerned with the


connection of devices to the media. In a point-to-point
configuration, two devices are connected through a dedicated
link. In a multipoint configuration, a link is shared among
several devices.

Physical topology: The physical topology defines how


devices are connected to make a network. Devices can be
connected by using a mesh or ring or bus or hybrid or star
topology. 72

36
7/17/2017

Open System Interconnection (OSI)


Physical Layer
Transmission mode: The physical layer also defines the
direction of transmission between two devices: simplex, half-
duplex, or full-duplex.

73

Open System Interconnection (OSI)


Data Link Layer

The data link layer transforms the physical layer, a raw


transmission facility, to a reliable link.

It makes the physical layer appear error-free to the upper


layer (network layer).

74

37
7/17/2017

Open System Interconnection (OSI)

Data Link Layer


Behrouz Forouzan 75

Open System Interconnection (OSI)

Hop-to-hop delivery
Behrouz Forouzan 76

38
7/17/2017

Open System Interconnection (OSI)


Data Link Layer

Framing: The data link layer divides the stream of bits


received from the network layer into manageable data units
called frames.

Physical addressing: If frames are to be distributed to


different systems on the network, the data link layer adds a
header to the frame to define the sender and/or receiver of
the frame.

Flow control: If the rate at which the data are absorbed by


the receiver is less than the rate at which data are produced
in the sender, the data link layer imposes a flow control
mechanism to avoid overwhelming the receiver.
77

Open System Interconnection (OSI)


Data Link Layer

Error control: The data link layer adds reliability to the


physical layer by adding mechanisms to detect and retransmit
damaged or lost frames.

It also uses a mechanism to recognize duplicate frames. Error


control is normally achieved through a trailer added to the
end of the frame.

Access control: When two or more devices are connected to


the same link, data link layer protocols are necessary to
determine which device has control over the link at any given
time.

78

39
7/17/2017

Open System Interconnection (OSI)


Network Layer
The network layer is responsible for the source-to-destination
delivery of a packet, possibly across multiple networks (links).

Whereas the data link layer oversees the delivery of the


packet between two systems on the same network (links), the
network layer ensures that each packet gets from its point of
origin to its final destination.

If two systems are connected to the same link, there is usually


no need for a network layer.

If the two systems are attached to different networks (links)


with connecting devices between the networks (links), there is
often a need for the network layer to accomplish source-to-
destination delivery. 79

Open System Interconnection (OSI)

Network layer
Behrouz Forouzan 80

40
7/17/2017

Open System Interconnection (OSI)

Source-to-destination delivery
Behrouz Forouzan 81

Open System Interconnection (OSI)


Network Layer
Logical addressing: The physical addressing implemented
by the data link layer handles the addressing problem locally.

The network layer adds a header to the packet coming from


the upper layer that, among other things, includes the logical
addresses of the sender and receiver.

Routing: When independent networks or links are connected


to create internetworks (network of networks) or a large
network.

The connecting devices (called routers or switches) route or


switch the packets to their final destination. One of the
functions of the network layer is to provide this mechanism.
82

41
7/17/2017

Open System Interconnection (OSI)


Transport Layer
It is responsible for process-to-process delivery of the entire
message.

A process is an application program running on a host.

Whereas the network layer oversees source-to-destination


delivery of individual packets, it does not recognize any
relationship between those packets.

It treats each one independently, as though each piece


belonged to a separate message, whether or not it does.

Ensures that the whole message arrives intact and in order,


overseeing both error control and flow control at the source-
83
to-destination level.

Open System Interconnection (OSI)

Transport layer
Behrouz Forouzan 84

42
7/17/2017

Open System Interconnection (OSI)

Transport layers
Behrouz Forouzan 85

Open System Interconnection (OSI)


Transport Layer
Service-point addressing: Computers often run several
programs at the same time.

For this reason, source-to-destination delivery means delivery


not only from one computer to the next but also from a
specific process (running program) on one computer to a
specific process (running program) on the other.

The transport layer gets the entire message to the correct


process on that computer.

Segmentation and reassembly. A message is divided into


transmittable segments, with each segment containing a
sequence number.
86

43
7/17/2017

Open System Interconnection (OSI)


Transport Layer
Connection control: The transport layer can be either
connectionless or connection oriented.

A connectionless transport layer treats each segment as an


independent packet and delivers it to the transport layer at the
destination machine.

Flow control: Like the data link layer, the transport layer is
responsible for flow control. Flow control at this layer is
performed end to end rather than across a single link.

Error control: Like the data link layer, the transport layer is
responsible for error control.

87

Open System Interconnection (OSI)


Session Layer

The services provided by the first three layers (physical, data


link, and network) are not sufficient for some processes.

The session layer is the network dialog controller.

It establishes, maintains, and synchronizes the interaction


among communicating systems.

88

44
7/17/2017

Open System Interconnection (OSI)

Session layer
Behrouz Forouzan 89

Open System Interconnection (OSI)


Session Layer

Dialog control: The session layer allows two systems to


enter into a dialog.

It allows the communication between two processes to take


place in either half-duplex (one way at a time) or full-duplex
(two ways at a time) mode.

Synchronization: The session layer allows a process to add


checkpoints, or synchronization points, to a stream of data.

90

45
7/17/2017

Open System Interconnection (OSI)


Session Layer

Example: If a system is sending a file of 2000 pages, it is


advisable to insert checkpoints after every 100 pages to
ensure that each 100-page unit is received and acknowledged
independently.

In this case, if a crash happens during the transmission of


page 523, the only pages that need to be resent after system
recovery are pages 501 to 523. Pages previous to 501 need
not be resent.

91

Open System Interconnection (OSI)


Presentation Layer

Presentation layer is concerned with the syntax and


semantics of the information exchanged between two
systems.

92

46
7/17/2017

Open System Interconnection (OSI)

Presentation layer
Behrouz Forouzan 93

Open System Interconnection (OSI)


Presentation Layer

Translation: The processes (running programs) in two


systems are usually exchanging information in the form of
character strings, numbers, and so on. The information must
be changed to bit streams before being transmitted.

Sender changes the information from its sender-dependent


format into a common format. The presentation layer at the
receiving machine changes the common format into its
receiver-dependent format.

94

47
7/17/2017

Open System Interconnection (OSI)


Presentation Layer

Encryption: To carry sensitive information, a system must be


able to ensure privacy.

Encryption means that the sender transforms the original


information to another form and sends the resulting message
out over the network.

95

Open System Interconnection (OSI)


Presentation Layer

Decryption: reverses the original process to transform the


message back to its original form.

Compression: Data compression reduces the number of bits


contained in the information.

Data compression becomes particularly important in the


transmission of multimedia such as text, audio, and video.

96

48
7/17/2017

Open System Interconnection (OSI)


Application Layer

It enables the user, whether human or software, to access the


network.

It provides user interfaces and support for services such as


electronic mail, remote file access and transfer, shared
database management, and other types of distributed
information services

97

Open System Interconnection (OSI)

Application layer
Behrouz Forouzan 98

49
7/17/2017

Open System Interconnection (OSI)


Application Layer

Network virtual terminal: A network virtual terminal is a


software version of a physical terminal, and it allows a user to
log on to a remote host.

To do so, the application creates a software emulation of a


terminal at the remote host.

File transfer, access, and management: This application


allows a user to access files in a remote host (to make
changes or read data), to retrieve files from a remote
computer for use in the local computer, and to manage or
control files in a remote computer locally.
99

Open System Interconnection (OSI)


Application Layer

Mail services: This application provides the basis for e-mail


forwarding and storage.

Directory services: This application provides distributed


database sources and access for global information about
various objects and services.

100

50
7/17/2017

Open System Interconnection (OSI)

Summary of the layers


Behrouz Forouzan 101

Open System Interconnection (OSI)

Applications

File transfer access management


Mail service
Directory service
Network virtual function

102

51
7/17/2017

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


103

Data link protocol


It is set of specifications used to implement data link layers.

Two groups of data link


Asynchronous protocol treat each character in a bit
stream independently
Synchronous protocol Take the whole bit stream and chop
it into characters of equal size

Synchronous protocol types


Character oriented protocols (or byte oriented) a
transmission of frame or packet as succession of characters
usually composed of one byte
Bit-oriented protocols - transmission of frame or packet as
succession of individual bits
104

52
7/17/2017

HDLC
High level data link control (HDLC) is a bit oriented protocol
designed to support both half duplex and full duplex
communication over point to point and multipoint links.

Can be characterized by their station, configurations and


response models

Stations - Primary, secondary and combined

Configuration Unbalanced (master/slave), Symmetrical,


Balanced

105

HDLC
Modes of communication in HDLC
Normal response mode (NRM),
Asynchronous response mode (ARM) and
Synchronous balance mode (ABM)

HDLC frames
Information frame (I-frame)
Supervisory frame (S-frame)
Unnumbered frame (U-frame)

Frame fields - Beginning field, address field, information field,


frame check sequence (FCS) field and ending flag field

106

53
7/17/2017

HDLC frames

HDLC frames
Behrouz Forouzan 107

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


108

54
7/17/2017

Media access protocol


Two layers
Logical link control (LLC)
Medium access control (MAC)

Bit stuffing The flag doesnt appear inadvertently anywhere


else in the frame, HDLC uses a process called bit stuffing.

It is the process of adding one extra 0 whenever there are


five consecutive 1s in the data. So that receiver doesnt
mistake the data for a flag.

Sender wants to transmit bit sequence having more than five


consecutive 1s it inserts (stuffs) one redundant 0 after the fifth
1.
109

Media access protocol

MAC Sublayer
Godbole & Kahate, 2011 110

55
7/17/2017

Media access protocol

Behrouz Forouzan Bit stuffing 111

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


112

56
7/17/2017

Command/Response
Primary station sends commands
Secondary station sends responses
Combined station sends command and responses

Types of configuration - Unbalanced, Symmetrical and


Balanced

113

Command/Response

Functional diagram of Command/Response


Balraj 114

57
7/17/2017

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


115

Token Bus

Token Bus It is physical bus that operates as a logical ring


using tokens. Stations are logically organized into a ring.

Combines features of Ethernet and token ring.

Combines the physical configuration of the Ethernet and the


collision-free feature of token ring.

116

58
7/17/2017

Token Ring

Token Ring resolves this uncertainty by requiring that station


take turns sending data.

Each station may transmit only during its turn and may send
only one frame during each turn.

117

Token Passing

Token a simple place holder frame passed from station to


station around the ring.

A station may send data only when it has possession of


token.

Each station may transmit only during its turn and many send
only one frame during each frame and each turn.

The mechanism that coordinate this rotation is called token


passing.

118

59
7/17/2017

Token Ring

119

Token Ring

Token Ring networks: a) Using a single MAU


b) Using several MAUs connected to each other 120

60
7/17/2017

Token Passing

121

Token Passing

122

61
7/17/2017

Token Passing

123

Token Passing

124

62
7/17/2017

Token ring protocol


Three Types of frames

Data/Command

Token

Abort

125

Frame format for token ring protocol

126

63
7/17/2017

Frame format for token ring protocol

Start Delimiter (SD) - One byte long and to alert the


receiving station to the arrival of frame as well as to allow it to
synchronize its retrieval timing.

Access Control (AC) One byte long and include four


subfields such as

First three bits priority field


Fourth bit token bit (to indicate frame is data/command
frame or token or abort frame)
fifth bit monitor bit
Last three bits reservation field (Station wishing to reserve
access to the ring)
127

Frame format for token ring protocol

Frame Control (FC) One byte long and contain two fields
such as
First field one bit field (used to indicate the type of
information contained in protocol data unit (PDU))
Second field contains information used by the token ring
logic (eg) how to use information in AC field.

Destination Address (DA) - two to six byte DA field contains


the physical address of the frames next destination

Source Address (SA) - two to six byte SA field and contains


the physical address of the sending station
128

64
7/17/2017

Frame format for token ring protocol

Data data is allotted 4500 bytes and contains the PDU

Cyclic Redundancy Check (CRC) Four byte long and


contains the CRC-32 error detection sequence

End Delimiter(ED) the end of senders data and control


sequence

Frame Status (FS) Monitor to indicate that the frame has


already been round the ring. Tells the sender that the
receiving station has copied the frame. (This is not an
acknowledgement).

129

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


130

65
7/17/2017

What is CSMA/CD?

Multiple users have unregulated access to a single line, there


is a danger of signals overlapping and destroying each other.

Such overlaps turn the signals into unusable noises called


collisions.

As traffic increase on a multiple access link, so do collisions

LAN needs mechanism to minimize the number of collisions


that occur and maximize the number of frames delivered
successfully.

Mechanism used in an Ethernet is called CSMA with CD.


131

CSMA/CD

CSMA/CD Carrier sense multiple access with collision


detection

It reduced the chances of collision.

CSMA system working station wishing to transmit must first


listen for existing traffic on the line.

Device listens by checking for a voltage is detected, the line is


considered idle.

CSMA cuts down on the number of collisions but doesnt


eliminate them. Collisions still occur.
132

66
7/17/2017

CSMA/CD

Final step is addition of collision detection (CD).

During data transmission, the station checks the line for the
that indicates collision.

If collision is detected, the station quits the transmission and


waits a predetermined amount of time for the line to clear,
then send its data again.

133

Format of MAC frame in CSMA/CD

134

67
7/17/2017

CSMA/CD

Preamble seven bytes (56 bits) alerts the receiving


system to the coming frame and enable it to synchronize its
input timing.

Start Frame Delimiter (SFD) - beginning of the frame. Tells


the receiver that everything that follows is data, starting with
address.

Destination Address (DA) - six byte and contains


the physical address of the packets next destination

Source Address (SA) - six byte and contains


the physical address of the last device to forward the packet.
135

CSMA/CD

Length/Type of PDU Indicates the number of bytes in the


coming PDU (Protocol Data Unit).

Frame (PDU) Four fields


DSAP Destination Service Access Point
SSAP - Source Service Access Point
Control field
Information field

SSAP and DSAP to identify protocol stacks on receiving and


sending machines.

CRC contains the error detection information


136

68
7/17/2017

CSMA/CD

Advantages

Fairly simple to implement


It detect collision within a short time
It request node for transmission before sending any
frame
More efficient than a simple CSMA
CSMA/CD is beneficial, because it avoid from a wasteful
transmission

137

CSMA/CD

Disadvantages

Not much efficient to detect a collision


It cant reduce the possibility of collision between two
nodes
Inappropriate for large networks
limited to 2500 meters , after this distance collision cant
detected
It cant eliminate the collision permanently

138

69
7/17/2017

CSMA/CD

Applications

shared media Ethernet variants (10BASE5, 10BASE2)


supported for backwards compatibility and for half-
duplex connections
twisted-pair Ethernet which used repeater hubs

139

SYLLABUS

Networks hierarchy and switching Open System


Interconnection model of ISO - Data link control protocol -
Media access protocol - Command / response - Token
passing - CSMA/CD, TCP/IP

Unit I DATA NETWORK AND FUNDAMENTALS


140

70
7/17/2017

TCP/IP
TCP/IP was developed before the OSI model.

TCP Transmission Control Protocol IP Internet Protocol

The layers in the TCP/IP protocol doesnt match exactly with


those models in OSI model.

TCP/IP protocol is made up of five layers Physical, Data


link, Network, Transport and Application

At Transport layer, TCP/IP defines two protocols Transmission


Control Protocol (TCP) and User Datagram Protocol (UDP).

At the network layer, the main protocol defined by TCP/IP is


the Internetworking Protocol (IP). 141

TCP/IP
Original TCP/IP protocol suite was defined as having four
layers: host-to-network, internet, transport, and application

Host-to-network layer is equivalent to the combination of the


physical and data link layers.

Internet layer is equivalent to the network layer

Application layer is roughly doing the job of the session,


presentation,

Application layers with the transport layer in TCP/IP taking


care of part of the duties of the session layer.

142

71
7/17/2017

TCP/IP

First four layers provide physical standards, network


interfaces, internetworking, and transport functions that
correspond to the first four layers of the OSI model

Three top most layers in the OSI model, however, are


represented in TCP/IP by a single layer called the application
layer.

143

TCP / IP model

TCP/IP and OSI model


Behrouz Forouzan 144

72
7/17/2017

TCP / IP model

Relationship of layers and addresses in TCP/IP


Behrouz Forouzan 145

TCP / IP model

Physical address, also known as the link address, is the


address of a node as defined by its LAN or WAN.

Logical addresses (IP address) are necessary for universal


communications that are independent of underlying physical
networks.

In the TCP/IP architecture, the label assigned to a process is


called a port address. A port address in TCP/IP is 16 bits in
length.

Some applications have user-friendly addresses that are


designed for that specific address. Eg. URL, email address
146

73
7/17/2017

TCP / IP model

Addresses in TCP/IP
Behrouz Forouzan 147

TCP / IP model

TCP/IP Model
Behrouz Forouzan 148

74
7/17/2017

Internet Protocol (IP)


Unreliable and connectionless datagram. (Eg. Delivery
service in post office)

Packets in the IP layer called datagrams. Consists of two


parts (header and data 65536 bytes)

Version defines the version number of IP (IPV4 with binary


value of 0100).

Header Length (HLEN) Defines the length of header in


multiples of 4 bytes.

Service type Defines how the datagram can be handled.


Includes the bits that define priority of datagram.
Total Length Defines the total length of IP datagram
149

Internet Protocol (IP)

IP datagram
Behrouz Forouzan 150

75
7/17/2017

Internet Protocol (IP)

IP datagram
Behrouz Forouzan 151

Internet Protocol (IP)

Identification Used in fragmentation. A datagram passing


through different networks may be divided into fragments to
match the network frame size.

Flag Bits in the flags deal with fragmentation

Fragmentation offset shows the offset of data in original


datagram

Time to live defines the number of hops a datagram can


travel before it is discarded.

152

76
7/17/2017

Internet Protocol (IP)

Protocol defines which upper layer protocol data are


encapsulated in the datagram (TCP, UDP, IP)

Header Checksum Check the integrity of header, not the


rest of the packet.

Source Address Identifies the original source of datagram

Destination Address - Identifies the final destination of


datagram

Option Gives more functionality of the datagram. Control


routine management and alignment.
153

User Datagram Protocol (UDP)

Simpler of the standard TCP/IP protocol

It is an end to end transport level protocol that adds only port


addresses, check sum, error control and length information to
the data from upper layer.

Packet produced by the UDP is called UDP datagram.

154

77
7/17/2017

User Datagram Protocol (UDP)

UDP
Behrouz Forouzan 155

User Datagram Protocol (UDP)

Source Port Address (16 bit) address of the application


program that has created the message.

Destination Port Address (16 bit) - address of the application


program that will receive the message.

Total length (16 bit) Defines the total length of the user
datagram in bytes.

Checksum 26 bit field used in error detection.

156

78
7/17/2017

Transmission Control Protocol (TCP)


TCP is responsible for reliable delivery of the entire stream of
bits contained in the message originally generated by the
sending application.

It divides long transmissions into smaller data units and


packages each into a frame called segment.

Each segment includes a sequencing number with an


acknowledgement id.

Segments are carried across network links inside of IP


datagrams.

At receiving end TCP collects each datagrams as it comes in


based on sequence number. 157

Transmission Control Protocol (TCP)

TCP
Behrouz Forouzan 158

79
7/17/2017

Transmission Control Protocol (TCP)


Source Point Address defines the application program in
source computer.

Destination Point Address defines the application program


in destination computer.

Sequence number shows the position of data in original


data stream.

Acknowledgement number used to acknowledge the


receipt of data from other communicating device (32 bits
ACK).

Header Length (HLEN) number of 32 bits (4 bytes) words


in TCP header. 159

Transmission Control Protocol (TCP)


Reserved 6 bits field is reserved for future use.

Control Each bit of the 6 bit control field functions


individually and independently.

URG (Urgent bit) Sets validates urgent pointer field


ACK Sets validates Acknowledgement field
PSH to inform the sender that higher through out is
needed
RST Reset the connection when there is confirm in the
sequence number
SYN Used for sequence number synchronization
EIN bit Used in connection termination

160

80
7/17/2017

Transmission Control Protocol (TCP)


Windows Size (16 bit field) defines the size of sliding
window.

Urgent Pointer - value is valid only if URG bit in control field


is set. It defines the end of urgent data and start of normal
data.

Options and Padding - used to convey additional


information to the receiver or for alignment purposes.

161

Applications of TCP/IP
The TCP/IP protocol stack comes with lots of options that can
be applied within the RTOS environment.

File Transfer Protocol (FTP, data and control), which is used in


sending large files

Simple Mail Transfer Protocol (SMTP): Relies on exchange of


commands and can also send huge files across various
machines

Internet Message Access Protocol (IMAP); also a protocol for


retrieving e-mail messages

Post Office Protocol; a protocol for e-mail message retrieval


that uses TCP to exchange commands and data 162

81
7/17/2017

Comparison of OSI and TCP/IP Model


Similarities

Both are based on concept of stack of dependent protocols.


Functionality of layers is similar.

Dissimilarities

OSI model makes a clear distinction between the terms


services.
The protocols in OSI are better hidden than in TCP/IP.
OSI has 7 layers compared to 5 layers of TCP/IP.
OSI supports connectionless and connection oriented comm.
in transport layer.
TCP supports connectionless comm. in network and transport
layer 163

82

Potrebbero piacerti anche