Upload
irah
View
221
Download
0
Embed Size (px)
Citation preview
7/27/2019 Fund. of Data
1/251
7/27/2019 Fund. of Data
2/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 2 For Internal Circulation Only
Introductions!Introductions!
Participant IntroductionsParticipant Introductions
NameName
Position/ Function, Location (city)Position/ Function, Location (city)
How long with RelianceHow long with Reliance InfocommInfocomm
How long in the Telecom IndustryHow long in the Telecom Industry
Expectations from this courseExpectations from this course
InstructorInstructors Introductions Introduction
7/27/2019 Fund. of Data
3/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 3 For Internal Circulation Only
Course LogisticsCourse LogisticsCourse Logistics
PowerPoint PresentationPowerPoint Presentation
Follow along with the trainerFollow along with the trainer
Student GuideStudent Guide
Student NotesStudent Notes
Support informationSupport information
LogisticsLogisticsLogistics
Breaks, LunchBreaks, Lunch Toilet, WaterToilet, Water
Mobile phones, InternetMobile phones, Internet
7/27/2019 Fund. of Data
4/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 4 For Internal Circulation Only
Points to remember!Points to remember!
Far End (remote to the Instruc tor)Far End (remote to the Instructor)
Keep mike off unless Q&A sessionKeep mike off unless Q&A session
Keep NetKeep Net--meeting ONmeeting ON
Post offline questions on ChatPost offline questions on Chat
Report discomfort immediatelyReport discomfort immediately
Near End (local to the Instructor)Near End (local to the Instructor)
Give first chance to far endGive first chance to far end
Both EndsBoth Ends
Keep courseware ready for referenceKeep courseware ready for reference
Raise hand, identify yourself, ask questionRaise hand, identify yourself, ask question
Keep mobi les off/ silentKeep mobi les off/ silent
Avoid leaving/ jo in ing the class in betweenAvoid leaving/ jo in ing the class in between
Stick to break timingsStick to break timings
ASK QUESTIONSASK QUESTIONS
7/27/2019 Fund. of Data
5/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 5 For Internal Circulation Only
CONTENTSCONTENTSCONTENTSData networks OSI Model, LAN, WAN, MAN
Physical Layer, PDH, SDH, LMDS
Data Layer, Ethernet, ATM, PPP
Network Layer, Connection oriented, Connection less
Data Communication devices Repeater, Hub
Bridge, Switch, Spanning Tree Protocol, VLan
Routers, Router Architecture
Internet Protocol IP Suite, TCP/IP, UDP, ICMP
IPv4 Addressing, Sub-netting, IPv6
Routing Distance Vector, RIP
Link State, OSPF, Area
Autonomous Systems, IGP, BGP
MPLS Traffic Engineering, Class of Service, Service Level Assurance
FEC, LSP, Label Stacking, LDP, Tunnels
Data Applications & Reliance Data Network VPN, Multicasting, VoIP
RDN, ADN, DCN
7/27/2019 Fund. of Data
6/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 6 For Internal Circulation Only
Any Questions?Any Questions?Any Questions?
Are we supposed to knowAre we supposed to know .. to start this course?.. to start this course?
Yes, butYes, but ....
Are we gett ing handsAre we gett ing hands--on exercises?on exercises? Yes/ NoYes/ No
Will there be a test at the end?Will there be a test at the end?
No! There will be test at regular intervals and also at the endNo! There will be test at regular intervals and also at the end
Please ask any question that comes to your mindPlease ask any question that comes to your mind
Raise your hand!Raise your hand!
Ask on a break.Ask on a break.
The only dumb question isThe only dumb question is
the one that isthe one that is notnot asked!asked!
7/27/2019 Fund. of Data
7/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 7 For Internal Circulation Only
Module 1Module 1
Voice Vs Data NetworksVoice Vs Data Networks
Module Objectives
After completion of this module you will be able to understand
Comparison between conventional circuit switched and Data Networks
Why voice over Data Networks is the need of the hour
The current Scenario
Evolution of Data Networks
7/27/2019 Fund. of Data
8/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 8 For Internal Circulation Only
History of Data NetworkingHistory of Data NetworkingHistory of Data Networking
1. Sharing Resources
2. Interoperability
3. The Internet
Server
Collaboration among DEC, Intel Corporation, and Xerox Corporation at the Palo Alto Research Center(PARC). The results of this research included Ethernet and the Xerox Network Systems (XNS)protocol.
LANs allowed many computer systems to be interconnected, using a minimum of wiring and requiringlittle configuration.
The Internet was born in 1969 as a group of interconnected Honeywell computers located at fourdifferent universities and financed by the U.S. government's Department of Advanced ResearchProjects Agency (DARPA). This network, which grew quickly and came to be called ARPANET,interconnected the rapidly growing computing resources of the scientific, academic, andgovernmental communities.
In 1973, the Transmission Control Protocol (TCP) became a standard protocol for the ARPANET. By1980, TCP, the Internet Protocol (IP), and the other protocols of the TCP/IP protocol suite hadbecome the required standard for connection to ARPANET; the name of the network changed tothe Internet.
In 1982, TCP/IP was incorporated into a popular version of the UNIX operating system (BSD UNIX,after the center of its development, U.C. Berkeley). TCP/IP hosts evolved into gateways (later to be
called routers) to provide interconnectivity between different TCP/IP hosts over wide area network(WAN) links.
Standard networking applications, such as Telnet and File Transfer Protocol (FTP), allowed users onone machine to remotely control the resources of host systems anywhere in the Internet. All ofthese developments set the stage for the explosion in the development of local area networks(LANs), which came soon
7/27/2019 Fund. of Data
9/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 9 For Internal Circulation Only
DATA visDATA vis----vis VOICEvis VOICE
VOICE COMMUNICATION
Fault tolerant
Delay sensitive
Circuit oriented
Fixed Bandwidth
Access
Switch Switch Access
Data and Voice communication have several similarities but are different in a few ways:
1. Voice communication is tolerance of minor failures and noise, as the transmitting andreceiving parties are human being (highly intelligent as compared to machines that
communicate). Data communication needs to be Fault sensitive as the M/cs cant make mucherror correction.
2. Voice Communication on the other hand is Delay sensitive. Human being feel veryuncomfortable if there is variable delay in transmitting successive parts of the speech. Humansenses are used to hearing only in the way they hear to direct voice. Machines however haveno such inhibitions and that reconstruct a communicated information from various parts of thesame.
3. From the above points one would intuitively realise that Voice communication is best suited toCircuit switching and Data to Packet switching. One a circuit is established between the twoparties there would be no variation in transmission delays. The only delay is that of electricalsignal traveling over the circuit, which is in negligible. No fault correction mechanism isimplemented. But in case of Data, information in sent in packets with suitable error detectingcodes and transmitted along with several other packets. Different packets could be of differentsizes, thereby producing differential delays in receiving subsequent packets for a node. Butthats not the problem.
4. Lastly for Voice, we are all bound by the 64 kbps bandwidth, even during silences. While inData communication the bandwidth for each channel can be set differently depending on theneed of the parties.
7/27/2019 Fund. of Data
10/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 10 For Internal Circulation Only
DATA visDATA vis----vis VOICEvis VOICE
DATA COMMUNICATION
Fault sensitive
Delay tolerant
Packet oriented
Variable Packet size/ Bandwidth
RR
R
R
R
Data and Voice communication have several similarities but are different in a few ways:
1. Voice communication is tolerance of minor failures and noise, as the transmitting andreceiving parties are human being (highly intelligent as compared to machines that
communicate). Data communication needs to be Fault sensitive as the M/cs cant make mucherror correction.
2. Voice Communication on the other hand is Delay sensitive. Human being feel veryuncomfortable if there is variable delay in transmitting successive parts of the speech. Humansenses are used to hearing only in the way they hear to direct voice. Machines however haveno such inhibitions and that reconstruct a communicated information from various parts of thesame.
3. From the above points one would intuitively realise that Voice communication is best suited toCircuit switching and Data to Packet switching. One a circuit is established between the twoparties there would be no variation in transmission delays. The only delay is that of electricalsignal traveling over the circuit, which is in negligible. No fault correction mechanism isimplemented. But in case of Data, information in sent in packets with suitable error detectingcodes and transmitted along with several other packets. Different packets could be of differentsizes, thereby producing differential delays in receiving subsequent packets for a node. Butthats not the problem.
4. Lastly for Voice, we are all bound by the 64 kbps bandwidth, even during silences. While inData communication the bandwidth for each channel can be set differently depending on theneed of the parties.
7/27/2019 Fund. of Data
11/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 11 For Internal Circulation Only
Circuit Switching
What is circuit switching?
It is a dedicated end-to-end pathfor your particular voice channeland no other voice traffictransmits on this dedicated pathfor the duration of your call.
Circuit Switching
Advantages
Highly reliable
Excellent voice quality (QoS)
Disadvantages
Dedicated Circuit
Wasted Capacity
High cost of ownership
7/27/2019 Fund. of Data
12/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 12 For Internal Circulation Only
Packet SwitchingPacket Switching
What is Packet Switching?
Packet switching can be defined aseither connection oriented or
connectionless environmentIn packet switching, the sendingsystem converts the data into smallindividual chunks called as packetseach having its own destinationaddress.
At the receiving side the address isidentified and the packets arereassembled to form the original data
Advantages
Reduces network load
Simultaneous data reception form
more than two computers possible
Disadvantages
Not suitable for voice transmissiondue to packet loss and packet delay
7/27/2019 Fund. of Data
13/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 13 For Internal Circulation Only
Module 2
Networking Models & Protocols
Module Objectives
After completion of this module you will be able to understand
The Need for Standards
OSI - ORGANISATION FOR STANDARDISATION
The OSI & TCP/IP reference Model
The Seven OSI reference model Layers
Introduction to Protocols on different Layers
Summary
7/27/2019 Fund. of Data
14/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 14 For Internal Circulation Only
HistoryHistory-- The Network ModelThe Network Model
Need For Standardization
Different vendors, different
Hardware, software.-No Compatibility
ISO Starts working on aCommon NetworkingStandard/language for
interoperability
1984-The OSI Model Approved-enables internetworking irrespesctive
Of manufacturer/OS
The Developmentof the OSI Model
ForInternetworking
7/27/2019 Fund. of Data
15/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 15 For Internal Circulation Only
Open System Interconnection - OSIOpen System InterconnectionOpen System Interconnection -- OSIOSI
Communication function is partitioned into logical hierarchy oflayers.
There are seven layers. Each function is distinctly implemented in one layer.
The OSI model divides the tasks of computer communications into a series of seven layers, with thelowest layer providing an interface to the physical medium and the highest layer providing an interfaceto the user application.
Each layer communicates with the immediately higher and lower layers by placing information inheaders added to the data. These headers often contain fields called service access points (SAPs),which act like mailboxes where a communication program can leave information for a program runningat a higher or lower layer.
The application, presentation, and session layers format the data for presentation to the userapplication and establish a communication session between the local and remote applications.
The transport layer typically guarantees the reliability of the transmissions between two end stationsby providing facilities for disassembly, assembly, error checking, sequencing, and retransmission. Thislayer also often provides a way to identify the application thatgenerated the message, using a specialSAP (called a socket in TCP/IP).
The network layer provides addresses for the sending and receiving stations that allow routing of themessage over a network composed of various physical networks.
The data link layer provides addresses for the sending and receiving stations that allow delivery fromone station to the next station on the same physical network. The data link trailer usually includes someform of checksum (an arithmetic sum used to verify data integrity).
The physical layer converts the bits of data hi each frame into electrical or optical signals, dependingon the physical medium, and sends it through the medium.
7/27/2019 Fund. of Data
16/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 16 For Internal Circulation Only
OSI - A Layered Network Model
The OSI reference model divides the problem of moving
information between computers over a network medium intoSEVEN smaller and more manageable problems .
This separation into smaller more manageable functions is knownas layering.
The OSI Reference Model is composed of seven layers, eachspecifying particular network functions.
The process of breaking up the functions or tasks of networkinginto layers reduces complexity.
Each layer provides a service to the layer above it in the protocolspecification.
Each layer communicates with the same layers software or
hardware on other computers.
7/27/2019 Fund. of Data
17/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 17 For Internal Circulation Only
A Layered Network Model
The lower 4 layers (transport, network, data link and physical Layers 4, 3, 2, and 1) are concerned with the flow of data from endto end through the network.
The upper four layers of the OSI model (application, presentationand sessionLayers 7, 6 and 5) are orientated more towardservices to the applications.
Data is Encapsulated with the necessary protocol information as itmoves down the layers before network transit.
7/27/2019 Fund. of Data
18/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 18 For Internal Circulation Only
OSI 7 Layer ConceptOSI 7 Layer ConceptOSI 7 Layer Concept
A layer undertakes the function assigned to it in association with its peer.
Peer-to-peer communication is defined by a protocol. Protocol is a set ofrules.
Upper layers request for service and lower layers provide service.
Service from
lower layer
Protocol
Service to
higher layer
Data
DataHeader
DataHeader
DataHeader
Header contains the communication to peer entity.
Every layer thus adds its own header. This is called encapsulation
7/27/2019 Fund. of Data
19/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 19 For Internal Circulation Only
Encapsulation/DecapsulationEncapsulation/Decapsulation
7/27/2019 Fund. of Data
20/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 20 For Internal Circulation Only
Functions of LayersFunctions of Layers
7/27/2019 Fund. of Data
21/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 21 For Internal Circulation Only
Open System Interconnection - OSIOpen System InterconnectionOpen System Interconnection -- OSIOSI
Physical
Data Link
Network
Transport
Session
Presentation
Application
Ph
DL
Network
Ph
DL
Network
Physical
Data Link
Network
Transport
Session
Presentation
Application
Ph
DL DL
Ph
Network Node(Router)
Network Node(Router)
End System End System
Media Media Media
Computer Computer
Router Router
Important to note at this point that while the two end systems need all the 7 layers to communicate thein-between elements (Network Elements/ Routers) need to use upto Layer three. The Lower threelayers therefore are also called NETWORK LAYERSwhile the upper four are called APPLICATIONLAYERS.
Also note the Physical layer or Data/Link Layer protocol is applicable from one Node to another and not
all across the network.
7/27/2019 Fund. of Data
22/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 22 For Internal Circulation Only
Figure 3-3
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
An Exchange Using the OSI Model
H
H
H
H
T
H
H
H
TH
H
H
encapsulation
decapsulation
7/27/2019 Fund. of Data
23/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 23 For Internal Circulation Only
OSI Physical LayerOSIOSI Physical LayerPhysical Layer
7/27/2019 Fund. of Data
24/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 24 For Internal Circulation Only
Physical LayerPhysical Layer
Physical Layer deals with the issues such as:
"Electrical/Optical interface to the physical medium
"Electrical, mechanical, procedural, and functionalspecifications for activating, maintaining and deactivating
the physical link between communicating network systems.
"Voltage levels, timings of voltage changes, physical data rates, maximumtransmission distances, and physical connectors.
Protocol functioning at this layer:
"RS-232,RS-449,V3.5,ISDN,xDSL
"Ethernet (Fast/GigE)"T1/E1, T3/E3"SONET/SDH/PDHHubs/Repeaters/MUX/DACS function at this level.
7/27/2019 Fund. of Data
25/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 25 For Internal Circulation Only
Physical Layer: TopologiesPhysical Layer: TopologiesPhysical Layer: Topologies
RR
R
R
R
Connection: Simplex/ Duplex, Half/ Full Duplex
Topology: Ring, Star, Bus
7/27/2019 Fund. of Data
26/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 26 For Internal Circulation Only
E1(G.703/G.704) Multiplexing HierarchyE1(G.703/G.704) Multiplexing HierarchyE1(G.703/G.704) Multiplexing Hierarchy
1890155,520STM1
302402,488,320STM16
1209609,953,280STM64
7560622,080STM4
63051,840STM0Synchronous DigitalHierarchy
48034,448E3
302,048E1
164DS0Plesiochronous DigitalHierarchy
Equivalent Telephone
lines
Bandwidth
(Kbps)
Digital LevelStandard
Basic Payload E1-32 Timeslots
E1-channelized/unchannelized
European std.s Synchronous Digital Hierarchy (SDH) and its North Americancounterpart SONET proposes a transport system with highly synchronised networkelements and OFC as the physical media. Thereby the concept of bit-interleaving isreplaced by a Byte interleaved system. Also the bandwidths are defined upto much
higher range making it suitable for modern data & broadband communication.
SDH/ SONET defines to types of packaging one for the electrical network calledSynchronous Transmission Module/ System (STM-n/ STS-n) and another for theoptical network called Transport Unit (TU-n)/ Optical Carrier (OC-n).
STM-n has now been defined from STM-1 (63 E1s) to STM-256 (16128 E1s).Proposal for STM-1024 is under examination for standardising. That would take us toan amazing 160 Gbps.
Technically there is no difference between SDH and SONET. Some terms differ andsome details in Overhead definitions defer but that doesnt come in the way of makingthese to standards compatible to each other.
7/27/2019 Fund. of Data
27/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 27 For Internal Circulation Only
Standards: Electrical Media & TransceiversStandards: Electrical Media & TransceiversStandards: Electrical Media & Transceivers
CO-AXIAL THINNET:
0.25 Cables for 10MB, 185m
RG-58/ U - Solid Copper CoreRG-58 A/U - Stranded Copper CoreRG-58 C/U - Mil spec. for RG58 A/URG-59 - Broadband transmission (TV)RG-62 - ArcNetNetwork Cable
CO-AXIAL THICKNET:
0.5 Cables for 10MB, 500m
RG-12
SHIELDED TWISTED PAIR:Cables up to 100m
Cat 2 - 4 Mbps, Cat 3 - 10 MbpsCat 4 - 16 Mbps, Cat5 - 100 Mbps
RS232C:
One to One Full Duplex communicationCommon mode connection.Baud Rate upto 19.2 kB
RS422:
One to One Full Duplex communication.Differential mode connection.Baud Rate upto 10 MB
RS485:
Multi-drop Half Duplex communication.Differential mode connection.Baud rate upto 10 MB.
BANDWIDTH-DISTANCE PRODUCT:
The product of bandwidth (thereby the baud-rate) & the distance between transmitter & receiver isgenerally constant for any particular type of cable.
So while the type of cable determines the bandwidth-distance product, for any cable the bandwidth isinversely proportional to the distance.
While bandwidth determines speed, distance gives coverage, thereby these two are very important forany network design.
7/27/2019 Fund. of Data
28/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 28 For Internal Circulation Only
Ethernet LANs are referred to as
10Base5, Thick coaxial cable ethernet 10 Mb, baseband, 500 meters
10Base2, Thin coaxial cable ethernet 10 Mb, baseband, 200 meters
10Base-T, Twisted pair ethernet 10 Mb, baseband, 100 meters
Fast ethernets
100Base-Tx,2 twisted pair (CAT 5) 100 Mb, 100 meters
100Base-FX, 2 optical fibres 100 Mb, 2000 meters
100Base-T4, 4 CAT3 pairs 100 Mb, 100 meters
Gigabit ethernets
1000Base-SX, 2 multimode fibres 1 Gb, 550 meters
1000Base-LX, 2 multi/mono fibres 1 Gb, 550/5000 meters
1000Base-CX, STP 1Gb, 25 meter
Ethernet (802.3) The MediaEthernet (802.3) The Media
802.3 Now encompasses
Original 802.3: 10BASE-T 10BASE-5 10BASE-2 10BROAD-36
802.3u Fast Ethernet: 100BASE-TX 100BASE-FX 100BASE-T4
802.3x: Flow Control 802.3z Gigabit Ethernet: 1000BASE-SX / -LX / -CX
802.3ab Copper Gigabit Ethernet: 1000BASE-T
802.3ac Frame Tagging for VLAN support
802.3ad Link Aggregation
802.3ae 10 Gigabit Ethernet: Completion by March 2002
802.3af DTE Power via MDI: Completion by Sept 2001
7/27/2019 Fund. of Data
29/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 29 For Internal Circulation Only
Business Customer
Application
Base Station
Micro Cell FeedingApplication
Terminal Station
Radio To The Building(RTTB) Application
3.5 GHz3.5 GHz
10.5 GHz10.5 GHz
26 GHz26 GHz
Microwave systems
LMDS-10.5GHZUBR-2.4GHZWIFI- 2.4 GHZWIMAX- 3.4GHZ
Standard: ETSI EN 301 021 (TM4)
Frequency Band: 10.15- 10.65 GHz
FDD Separation: 350 MHz
Range: 10KmReceiver Sensitivity: -87dbm @ BER 10-9
Emitted Power:
Terminal Station: 15 dbm
Base Station: 15 dBm(per carrier)
RFU: 27 dBm
Antenna Characteristics:
Terminal Station 80, 25 dBi
Base Station 900, 15. dBi, 4 sectors600, 18 dBi
7/27/2019 Fund. of Data
30/251
7/27/2019 Fund. of Data
31/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 31 For Internal Circulation Only
SS for Peer-to-PeerCommunications in Ad Hoc Network
WLAN (IEEE: 802.11)WLAN (IEEE: 802.11)WLAN (IEEE: 802.11)
BS Provides Campus-Wide Coverage
WLANs can be used either to replace wired LANs, or as an extension of the wired LAN infrastructure.The basic topology of an 802.11 network is shown in Figure 1. A Basic Service Set (BSS) consists oftwo or more wireless nodes, or stations (STAs), which have recognized each other and haveestablished communications. In the most basic form, stations communicate directly with each other ona peer-to-peer level sharing a given cell coverage area. This type of network is often formed on a
temporary basis, and is commonly referred to as an ad hoc network, or Independent Basic Service Set(IBSS).
In most instances, the BSS contains an Access Point (AP). The main function of an AP is to form abridge between wireless and wired LANs. The AP is analogous to abasestationused in cellular phonenetworks. When an AP is present, stations do not communicate on a peer-to-peer basis. Allcommunications between stations or between a station and a wired network client go through the AP.APs are not mobile, and form part of the wired network infrastructure. A BSS in this configuration issaid to be operating in the infrastructure mode.
The Extended Service Set (ESS) shown in Figure 2 consists of a series of overlapping BSSs (eachcontaining an AP) connected together by means of a Distribution System (DS). Although the DS couldbe any type of network, it is almost invariably an Ethernet LAN. Mobile nodes can roam between APsand seamless campus-wide coverage is possible.
Radio Technology
IEEE 802.11 provides for two variations of the PHY. These include two (2) RF technologies namelyDirect Sequence Spread Spectrum (DSSS), and Frequency Hopped Spread Spectrum (FHSS). TheDSSS and FHSS PHY options were designed specifically to conform to FCC regulations (FCC 15.247)for operation in the 2.4 GHz ISM band, which has worldwide allocation for unlicensed operation.
Region Allocated Spectrum
US 2.4000 2.4835 GHz, Europe 2.4000 2.4835 GHz, J apan 2.471 - 2.497 GHz, France 2.4465 -2.4835 GHz, Spain 2.445 - 2.475 GHz
7/27/2019 Fund. of Data
32/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 32 For Internal Circulation Only
Wireless LAN Layer 1 for 802.11Wireless LAN Layer 1 for 802.11
802.11g
OFDM
802.11b
HR-DSSS
802.11a
OFDM
802.11
DSSS
802.11
FHSS
802.11
Infrared
802.3802.3802.3802.3802.3802.3
MAC
subla
yer
Datalinklayer
Upperlayers
Logical link control
7/27/2019 Fund. of Data
33/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 33 For Internal Circulation Only
Wireless LAN (IEEEWireless LAN (IEEE--802.16)802.16)
IEEE 802.16 (2001)
Air Interface for Fixed Broadband Wireless Access System MAC andPHY Specifications for 10 66 GHZ (LoS)
Single Carrier
IEEE 802.16a (January 2003)
Amendment to 802.16 for 2 11 GHz (NLoS)
IEEE 802.16d (Jul y 2004)
Combines both IEEE 802.16 and 802.16a
IEEE 802.16e (November 2005)
Amendment to 802.16-2004 Modifications for limited mobility (60Kmph)
Evolution of the 802.16 standard
RCOM is presently (2007) deploying WiMAX (2004) for static use
7/27/2019 Fund. of Data
34/251
7/27/2019 Fund. of Data
35/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 35 For Internal Circulation Only
Data Link LayerData Link LayerData Link Layer
33H, 96H =00110011(oP=1)10010110(oP=1)
001100111100101101..oP=1? Yes..oP=1? Yes
Communication OK. 33H, 96H
The Data layer Protocol lays down such simple guidelines like what would bethe size of frame, how to detect start of frame or end of frame, how to detect
a transmission failure (Parity, CRC, etc.) and so on.
In simple words its about how to get your bits transmitted meaningfully.
Data/ Link layer makes networking possible within a limited physical area,called Local Area Network (LAN).
Parity bit: One bit that gives the value of (even/ odd) parity of the attached payload.
CHECK-SUM: Sum of values of all the data bytes.
PACKET: Collection of Data bytes, parity, check-sum, packet size, header/ footer,
etc.
SOT, EOT: Header & Footer of a Packet given by pre-defined signature bytes.
CRC: Cyclic Redundancy Check - a code attached to each packet for error checking.
7/27/2019 Fund. of Data
36/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 36 For Internal Circulation Only
Data Link LayerData Link Layer
Data Link Layer deals with such matters
"Framing
"Error Detection
"Flow Control
Addressing
Contention Resolution/Media Access Control
Divided into two sub layers, MAC and LLC
Protocols listed at this layer:
"Ethernet, ATM, Frame-Relay, PPPSwitches function at this layer.
7/27/2019 Fund. of Data
37/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 37 For Internal Circulation Only
Layer 2 EncapsulationLayer 2 Encapsulation
7/27/2019 Fund. of Data
38/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 38 For Internal Circulation Only
Data networks - layer 2 Protocols
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Network
Wide Area NetworkLocal Area Network
Point To Point WANs Point To Multipoint WANs
Protocol-Ethernet
Protocol-HDLC,PPP,MEN- Ethernet
Protocol-ATM, Frame Relay
7/27/2019 Fund. of Data
39/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 39 For Internal Circulation Only
Figure 2-16
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Local Area Network
7/27/2019 Fund. of Data
40/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 40 For Internal Circulation Only
Figure 2-17
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Metropolitan Area Network
7/27/2019 Fund. of Data
41/251
7/27/2019 Fund. of Data
42/251
7/27/2019 Fund. of Data
43/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 43 For Internal Circulation Only
Ethernet: MAC AddressEthernet: MAC AddressEthernet: MAC Address
MAC Address Format
Ethernet MAC addresses are 48 bits in length. The IEEE assigns the first 24 bits to organizations requestingthem, typically, equipment vendors. Vendors are then responsible for placing a unique value in the remaining 24
bits, yielding a globally unique MAC address for every physical interface.
Unicast Address:
A Unicastaddress is simply a MAC address with the Multicast bit set to zero. Unicast addresses must be uniquewithin the network.
Broadcast address:
A Broadcast address at the MAC level is simply an address of all 1's. In hexadecimal notation this would beexpressed as FF-FF-FF-FF-FF-FF.
Multicast Address:
If the Multicast bit is set to 1 then the MAC address represents a multicast destination. There are severalreserved multicast addresses that are used by well known protocols.
There are several bits within the MAC address that have special meanings:
The least significant bit (LSB) of the first byte is the Multicast bit. AP11002-01 15- - - If it is set to 1,the MAC address is a multicast address.
If the Multicast bit is 1, then the most significant bit (MSB) of the third byte is either:
0 representing the Internet Multicast Address, or1 which is assigned by IANA for other uses
7/27/2019 Fund. of Data
44/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 44 For Internal Circulation Only
Metro Ethernet: OverviewMetro Ethernet: OverviewMetro Ethernet: Overview
A. Primaril y Point to Point Links
B. Can be Switch or Router
C. WAN links (e.g. SONET/ SDH)
D. Various Service types (P2P, MP2MP, P2MP), BW from 1 Mbps to 1 Gbps
E. Various protection technique for Network Resilience
F. QoS both End-to-End and Node-to-Node
A. Links are primarily point-to-point and can be any speed of Ethernet.
B. Nodes can be either switches or routers, depending on their location in the MEN,the nature of the services being provisioned, and the level of service resilience(network protection). Nodes are meshed to whatever degree necessary to provide the
desired connectivity, services, and protection.
C. WAN links connectMENs together across large distances.
D. Ethernet services can be topologically classified into point-to-point (as shown inthis illustration), multipoint-to-multipoint, or point-to-multipoint. Services are thenfurther classified according to the bandwidth provisioned and used. This bandwidthusage can be exclusive or shared across multiple users. Bandwidth is provisioned ondemand from 1 Mbps to 1Gbps, in increments as fine as 1 Mbps.
E. Varying degrees of service resilience are obtained by implementing a combinationof network protection techniques. Protection can be end-to-end (as shown in thisillustration) or node-to-node.
F. Quality of Service (QoS) is realized using a combination of various techniques toprovide both hard and soft bandwidth and packet-loss guarantees. QoS can beend-to-end (as shown in this illustration) or node-to-node. From an enterprise end-customer perspective, QoS is visible as a technical/operational Service LevelSpecification (SLS), which is underwritten by a commercial Service Level Agreement(SLA).
7/27/2019 Fund. of Data
45/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 45 For Internal Circulation Only
Frame Relay HistoryFrame Relay History
Before frame relay era, large organizations were interconnected by:
X.25 Leased Lines
Long network processing time Point to point
connectivity
Low bandwidth (max. 64kbps) Expensive, there is no
Charge per traffic bandwidth sharing
Required mult iple port
routers
Fixed price
As the 1980s came to close a new demands from the wide area networkswitching began to appear:
Growth in high speed, high speed throughput application.
Sophistication of the end user devices, equipment with processingability.
This new wide area switching technology required high speed, lowdelay, portsharing and bandwidth sharing on a virtual circuit basis.
These characteristics implemented in Frame Relay make Frame Relay idealsolution for the burst traffic sources found in LAN-WAN internetworking.
Frame Relay is a high-speed communication technology, which enables tosend information over the WAN by dividing the information into frames andpackets.
Frame Relay is not a single physical connection between two end points, but
a logical path is defined within the network.No Bandwidth is allocated to thepath until actual data needs to be transmitted. Then, the Bandwidth within thenetwork is allocated on a packet-by-packet basis, This logical path called VC(Virtual Circuit).
7/27/2019 Fund. of Data
46/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 46 For Internal Circulation Only
X.25 VS. Frame RelayX.25 VS. Frame Relay
7/27/2019 Fund. of Data
47/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 47 For Internal Circulation Only
Frame Relay Network (cont.)Frame Relay Network (cont.)
User Node
Router
User Node
Router
User Node
Router
User Node
Router
FR
switch
NetworkNode
FR
switch
FR
switch
NNINetwork to Network Interface
UNIUser to Network Interface
Network nodes (FR switches)User nodes (usually routers)
Switched Virtual Circui ts
Switched virtual circuits (SVCs) are temporary connections used in situationsrequiring only sporadic data transfer between DTE devices across the FrameRelay network. A communication session across an SVC consists of the
following four operational states:Call setupThe virtual circuit between two Frame Relay DTE devices isestablished.
Data transferData is transmitted between the DTE devices over the virtualcircuit.
IdleThe connection between DTE devices is still active, but no data istransferred. If an SVC remains in an idle state for a defined period of time,the call can be terminated.
Call terminationThe virtual circuit between DTE devices is terminated.
Permanent Virtual Circui ts
Permanent virtual circuits (PVCs) are permanently established connectionsthat are used for frequent and consistent data transfers between DTEdevices across the Frame Relay network. Communication across a PVCdoes not require the call setup and termination states that are used withSVCs. PVCs always operate in one of the following two operational states:
7/27/2019 Fund. of Data
48/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 48 For Internal Circulation Only
Frame Relay Packet StructureFrame Relay Packet Structure
Frame Relay Header: 2 bytes of FR address and control
Information Field: Users data
FCS: 32 bits of Cyclic Redundancy Check (CRC)
Flag : 2 identical bytes made of 6 ones and 2 zeros.
Data transferData is transmitted between the DTE devices over the virtualcircuit.
IdleThe connection between DTE devices is active, but no data istransferred. Unlike SVCs, PVCs will not be terminated under anycircumstances when in an idle state.
DTE devices can begin transferring data whenever they are ready becausethe circuit is permanently established.
Differences with X.25
Less robust
Assumes more reliable medium =>
No retransmission of lost data
No windowing
Error control handled by higher layers
Higher performance and transmission efficiency
7/27/2019 Fund. of Data
49/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 49 For Internal Circulation Only
Frame Relay: FormatFrame Relay: Format
FlagsFCSDataAddressFlags
8 16 Variable 16 8
Flags: Delimits the beginning and end of the frame. The value of this field is always the same and isrepresented either as the hexadecimal number 7E or as the binarynumber 01111110.
Address: Contains the following information:
DLCIThe 10-bit DLCI is the essence of the Frame Relay header. This value represents the virtualconnection between the DTE device and the switch.
Extended Address (EA)The EA is used to indicate whether the byte in which the EA value is 1 is thelast addressing field. If the value is 1, then the current byte is determined to be the last DLCI octet.
C/RThe C/R is the bit that follows the most significant DLCI byte in the Address field. The C/R bit isnot currently defined.
Congestion ControlThis consists of the 3 bits that control the Frame Relay congestion-notification
mechanisms. These are the FECN, BECN, and DE bits, which are the last 3 bits in the Address field.
Data:Contains encapsulated upper-layer data. Each frame in this variable-length field includes a user dataor payload field that will vary in length up to 16,000 octets.
Frame Check Sequence: Ensures the integrity of transmitted data.
Switched Virtual Circuits
Switched virtual circuits (SVCs) are temporary connections used in situations requiring only sporadicdata transfer between DTE devices across the Frame Relay network. A communication session acrossan SVC consists of the following four operational states:
Call setupThe virtual circuit between two Frame Relay DTE devices is established.
Data transferData is transmitted between the DTE devices over the virtual circuit.
IdleThe connection between DTE devices is still active, but no data is transferred. If an SVC remainsin an idle state for a defined period of time, the call can be terminated.
Call terminationThe virtual circuit between DTE devices is terminated.
Permanent Virtual Circuits
Permanent virtual circuits (PVCs) are permanently established connections that are used for frequentand consistent data transfers between DTE devices across the Frame Relay network. Communicationacross a PVC does not require the call setup and termination states that are used with SVCs. PVCsalways operate in one of the following two operational states:
Data transferData is transmitted between the DTE devices over the virtual circuit.
IdleThe connection between DTE devices is active, but no data is transferred. Unlike SVCs, PVCswill not be terminated under any circumstances when in an idle state.
DTE devices can begin transferring data whenever they are ready because the circuit is permanentlyestablished. Differences with X.25
Less robust, Assumes more reliable medium =>
No retransmission of lost data, No windowing, Error control handled by higher layers
Higher performance and transmission efficiency
7/27/2019 Fund. of Data
50/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 50 For Internal Circulation Only
Leaky Bucket Algorithm (cont.)Leaky Bucket Algorithm (cont.)
Bc+BeBc
Each VC has several parameters needed to be configured:
CIR (Committed Information Rate)
CIR is the "worst-case" throughput that the frame relay network
provider attempts to guarantyCIR bandwidth is guaranteed. In overload situations,transmission will occur over a reasonable time span (usuallyover a span of seconds)
Transmission is monitored using "leaky bucket algorithm."
Bc (Burst Committed)
Value which indicated how many bits can be transmitted at acertain time interval and the system obligate to transmit them.
Be (Burst Exceeded)
The amount of bits which were transmitted over the Bc at thedefined time interval.
Tc (Time Committed)
The time interval
7/27/2019 Fund. of Data
51/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 51 For Internal Circulation Only
Frame RelayFrame Relay
BS
TS
TS
FRAD
FRADFR
switch
FRAD
m*DLCI's
max(m)=200
n*DLCI'smax(n)=30
FrameRelayNetwork
DLCI 101
DLCI 102
FR
switch
Rdn n/w
FR USERS
Congestion Notification Mechanism is helping us to avoid a situation where a node reaches acertain point which it cant deliver data any more due to a sever congestions. In Frame Relaythere are several ways to avoid congestions:
Explicit Congestion Notification
Discard Eligibility
Discard Eligibility
Due to the use of the CIR which is an obligation for the quality of service to thecustomer, in case of a problem any frame which is send through the network abovethe CIR can be discarded. And will not effect the guarantied Quality of Service.
Frame Relay benefits over alternative technologies:
Lower cost of ownership
Well-established and widely adopted standards that allow open architecture andplug-and-play service implementation.
Low overhead, combined with high reliability.
Network scalability, flexibility and disaster recovery.
Interworking with other new services and applications, such ATM.
7/27/2019 Fund. of Data
52/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 52 For Internal Circulation Only
DLCIDLCI--SUBNET MAPPINGSUBNET MAPPING
10.20.30.0192.20.30.0
10.20.31.0
7/27/2019 Fund. of Data
53/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 53 For Internal Circulation Only
ATM: Desire for IntegratedATM: Desire for Integrated
ServicesServices
Economies of integration: voice, data, video
Minimize delays and delay variation
FDDIIntegratedNetwork
PBX
Data
Voice
Video
FDDI
PBX
Data
Voice
Video
7/27/2019 Fund. of Data
54/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 54 For Internal Circulation Only
ATM BasicsATM Basics
Traditional voice/video technology: Time Division Multiplexing (TDM)
Fixed time slots give isochronicity
Traditional data technology: Packet / Frame Switching (PSDN)
Variable-size data units give flexibility and efficiencyATM technology: Cell switching
Small, fixed-size cells
Combined benefits of TDM and PSDN
Voice Video Data
Cells
ATMNetwork
Header
5 Octets
Payload
48 Octets
53
Octets
VCI: Virtual Channel Id PTI: Payload Type Indicator
VPI: Virtual Path Id CLP: Cell Loss Priority
UNI: User Network Interface HEC: Header Error Check
GFC: Generic Flow Control (undefined )
Al lows fo r 256 VPs and 65,536 VCs
Byte1
2
3
45
GFC VPI
VPI VCI
VCI
VCI PTI CLP
HEC
8 7 6 5 4 3 2 1 Bits
- Octets sent in
increasing order
(start at Octet 1)
- Within the Octet,
the MSB (8) is sent
first
Byte1
2
34
5
VPI
VPI VCI
VCIVCI PTI CLP
HEC
8 7 6 5 4 3 2 1 Bits
VCI: Virtual Channel Id PTI: Payload Type Indicator
VPI: Virtual Path Id CLP: Cell LossPriority
NNI: Network Network Interface
Allows for 4,096 VPs and 65,536 VCs
No GFC Field
More VPI bits for trunking
7/27/2019 Fund. of Data
55/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 55 For Internal Circulation Only
ATM FEATURESOne technology for voice, data, video and multimedia
Bandwidth on demand as needed
Scalable as needs dictate
Quality of Service (QoS) is well defined
Management Systems and services pre-built into ATM
Hardware based switching instead of complicated routing and softwareschemes
ATM is connection oriented protocol and makes use of
one of the two connection types
PVC Permanent Virtual Circuit
SVC Switched Virtual Circuit
There is a logical mapping of connections in the network
The connection is built into a routing table and in each of the switchesinvolved with the connection from end to end
The switches needs to lookup a table for the incoming port and channel andthen determine the mapping
7/27/2019 Fund. of Data
56/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 56 For Internal Circulation Only
ATM Sub layersATM Sub layers
Physical Layer
Transfers cells from one interface to another viacommunication channel
Supports both optical and electricalcommunication channelLAN data rates suppor ted are from 25 to 622Mbpsfor copper & Fiber
WAN data rates supports the data rates ofSONET/SDH
ATM Layer
Performs cell multiplexing/de-multiplexing andswitching
Provides virtual connection between end points
Manage cell headers
AAL ATM Adaptation Layer
AAL1(A) - Suppor ts connec tion oriented constantbit rate data
AAL2(B) - Suppor ts connec tion oriented vari able
bit rate dataAAL3/AAL4(C) -Supports connec tion or iented andconnection less data
AAL5(D)- Suppor ts bursty data which use highlevel protocol for error control
7/27/2019 Fund. of Data
57/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 57 For Internal Circulation Only
t
BitRate
Average NaturalInformation Rate
Maximum Natural Information Rate
Bandwidth Wasted
Loss of Quality
(Bandwidth potential lost)
ATM Adoption Layer (AAL)ATM Adoption Layer (AAL)
TCP/IP, SMDSCBR, Voice, VideoVBR, Voice, VideoCBR, Voice, VideoExample
Connection-lessConnectionoriented
Connectionoriented
Connection orientedConnection
VariableVariableVariableConstantBit rate
Not RequiredNot RequiredRequiredRequiredTUNING
5, 3/45, 3/421TYPE
Class DClass CClass BClass AAAL
Higher Layers
ATM Adaptation
Layer
ATM Layer
Phy
Higher Layers
ATM Adaptation
Layer
ATM Layer
Phy
ATM Endpo int ATM Endpo int
ATM Network Interfaces
ATM
Switching
ATM
Switching
ATM Layer
Phy Phy
ATM Layer
Phy Phy
Peer Layer Communication
7/27/2019 Fund. of Data
58/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 58 For Internal Circulation Only
Physical Layer (Fiber)
Virtual Path (VP)
Virtual Channel (VC)
Network A
Network B
ATM: Virtual Path & ChannelATM: Virtual Path & Channel
Virtual Channel
>Assigned at call-setup time
>Has only local significance>May be used for multi-component services e.g. video telephony with separatevoice and video VCI streams
Virtual Path
>Carry a bundles of Virtual Channels
>Virtual Path service from Carriers allows reconfiguration of virtual channelswithout service order changes to the Carrier
7/27/2019 Fund. of Data
59/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 59 For Internal Circulation Only
Virtual Paths and Virtual ChannelsVirtual Paths and Virtual Channels
VCI1
VCI2
VCI3
VCI4
VC Switch
VCI 1
VCI 2
VP Switch
VCI 1
VCI 2
GFC VPI
VPI VCI
VCI
VCI PTI C
HEC
Empty cell s ind icated by VPI/VCI = 0NNI : 4,096 VPs and 65,536 VCsUNI : 256 VPs and 65,536 VCs
VPI 1
VPI1'
VCI 3
VPI3'
VPI2'
VPI 3VPI 3
VPI3'
VPI3'VPI4'
VCI 4
VPI 5VCI 1
VCI 2
VPI 4
VPI 4
7/27/2019 Fund. of Data
60/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 60 For Internal Circulation Only
ATM Frame FormatATM Frame Format
GFC Generic Flow Control Controls the flow of data across the UNI
permitting multiple ATM devices to be attached to the same network interface
VPI Virtual Path Identifier Part of the network address used to identifygrouping of channels
VCI Virtual Channel Identifier Pointer that identifies the virtual channel the
system is using on a virtual path
PT Payload Type Indicates the type of information contained in the cell
CLP Cell Loss Payload Specifies whether or not to discard the cell in thepresence of congestion
HEC Header Error Control Provides error correction for single bit errors anderror detection for multiple bit errors in the cell.
7/27/2019 Fund. of Data
61/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 61 For Internal Circulation Only
Sample ATM Network LayoutSample ATM Network Layout
7/27/2019 Fund. of Data
62/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 62 For Internal Circulation Only
HDLC/PPPHDLC/PPP
High Level Data Link Control
Popularly used as a point to point WAN encapsulation protocol for
dedicated links and circuit switched type of connections.
-HDLC is an ISO standard that encapsulates data on synchronous ,
Serial data links.
7/27/2019 Fund. of Data
63/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 63 For Internal Circulation Only
Point to Point ProtocolPoint to Point Protocol
The Point-to-Point Protocol (PPP) originally emerged as an
encapsulation protocol for transporting IP traffic over point-to-pointlinks.
PPP uses:
the High-Level Data Link Control (HDLC) protocol as a basis for
encapsulating datagrams.
An extensible LCP to establish, configure, and test the data link
connection.
A family of NCPs for establishing and configuring different network
layer protocols. PPP is designed to allow the simultaneous use of
multiple network layer protocols.
7/27/2019 Fund. of Data
64/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 64 For Internal Circulation Only
Point to Point ProtocolPoint to Point Protocol
PPP is capable of operating across any DTE/DCE interface. Examples:
Asynchronous serial Synchronous Serial
ISDN
HSSI (High Speed Serial Interface)
PPP uses Frame of International Organization for Standardization (ISO)
HDLC procedures 3309:1984/PDAD1 :
7/27/2019 Fund. of Data
65/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 65 For Internal Circulation Only
THE NETWORK LAYERTHE NETWORK LAYER
7/27/2019 Fund. of Data
66/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 66 For Internal Circulation Only
Network LayerNetwork Layer
Network Layer deals with:
"Routing packets from source to destination subnet addresses.
Logical Addressing
"Control communication and forwarding information between routers
"Mapping MAC addresses to there Network addresses
Protocol Functioning in this layer include
IP,ICMP,ARP,RARP,RIP,OSPF,BGP
Routers function at this level
7/27/2019 Fund. of Data
67/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 67 For Internal Circulation Only
Internet Protocol (IP)Internet Protocol (IP)
Used to route data from its source to destination
encapsulates or surrounds its payload
utilizes a header structure prefixed to the payload
individual packets are passed through the IP network on a best-effort basis
no guarantee of packet delivery
no guarantee of packet order
IP makes minimal demands on network
Routers make local forwarding decisions based upon the datagrams destination
address
Routers are not required to keep historical data on previous packet destination
paths
IP makes minimal demands on the network
7/27/2019 Fund. of Data
68/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 68 For Internal Circulation Only
IP: Frame FormatIP: Frame Format
Source Address
Destination Address
Type-of-service Total Length
Fragment Offset
Protocol
FlagsIdentification
Header ChecksumTime-to-live
Options (+padding)
Data (Variable)
IHLVersion
32 bits
VersionIndicates the version of IP currently used.
IP Header Length (IHL)Indicates the datagram header length in 32-bit words.
Type-of-ServiceSpecifies how an upper-layer protocol would like a current datagram to be handled,and assigns datagrams various levels of importance.
Total LengthSpecifies the length, in bytes, of the entire IP packet, including the data and header.IdentificationContains an integer that identifies the current datagram. This field is used to help piecetogether datagram fragments.
FlagsConsists of a 3-bit field of which the two low-order (least-significant) bits control fragmentation.The low-order bit specifies whether the packet can be fragmented. The middle bit specifies whether thepacket is the last fragment in a series of fragmented packets. The third or high-order bit is not used.
Fragment OffsetIndicates the position of the fragment's data relative to the beginning of the data inthe original datagram, which allows the destination IP process to properly reconstruct the originaldatagram.
Time-to-LiveMaintains a counter that gradually decrements down to zero, at which point thedatagram is discarded. This keeps packets from looping endlessly.
ProtocolIndicates which upper-layer protocol receives incoming packets after IP processing iscomplete.
Header ChecksumHelps ensure IP header integrity.
Source AddressSpecifies the sendingnode.
Destination AddressSpecifies the receiving node.
OptionsAllows IP to support various options, such as security.
DataContains upper-layer information.
7/27/2019 Fund. of Data
69/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 69 For Internal Circulation Only
The Transport LayerThe Transport Layer
7/27/2019 Fund. of Data
70/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 70 For Internal Circulation Only
Transport Layer
The Transport layer is basically responsible
For making sure that the data is delivered error-free and in the
proper sequence.
Other responsibilities are:
Segmentation
"Sequencing
Retransmission (Error Correction)
Acknowledgements
Windowing / End to End flow control for connection oriented and
connectionless applications (Flow Control)"Port addressing, identifying upper layer protocols
Main protocols functioning here are TCP and UDP
7/27/2019 Fund. of Data
71/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 71 For Internal Circulation Only
TCP OverviewTCP Overview
End-to-end protoco l that implements:
Reliability, sequencing, flow control and streaming
Bi-lateral duplex protoco l
Allowing only two parties on the same connection to share data
The same port number can be associated with a number of
distinctconnections by utilizing the source and destination
address fields
Low numbered ports are associated with defined services
Higher numbered ports are associated with dynamic
services
With stream data transfer, TCP delivers an unstructured stream of bytes identified by sequencenumbers. This service benefits applications because they do not have to chop data into blocks beforehanding it off to TCP. Instead, TCP groups bytes into segments and passes them to IP for delivery.
TCP offers reliability by providing connection-oriented, end-to-end reliable packet delivery through aninternetwork. It does this by sequencing bytes with a forwarding acknowledgment number that indicates
to the destination the next byte the source expects to receive. Bytes not acknowledged within aspecified time period are retransmitted. The reliability mechanism of TCP allows devices to deal withlost, delayed, duplicate, or misread packets. A time-out mechanism allows devices to detect lostpackets and request retransmission.
TCP offers efficient flow control, which means that, when sending acknowledgments back to thesource, the receiving TCP process indicates the highest sequence number it can receive withoutoverflowing its internal buffers. Full-duplex operation means that TCP processes can both send andreceive at the same time. Finally, TCP's multiplexing means that numerous simultaneous upper-layerconversations can be multiplexed over a single connection.
TCP Connection Establishment
To use reliable transport services, TCP hosts must establish a connection-oriented session with oneanother. Connection establishment is performed by using a "three-way handshake" mechanism.
A three-way handshake synchronizes both ends of a connection by allowing both sides to agree uponinitial sequence numbers. This mechanism also guarantees that both sides are ready to transmit dataand know that the other side is ready to transmit as well. This is necessary so that packets are nottransmitted or retransmitted during session establishment or after session termination.
7/27/2019 Fund. of Data
72/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 72 For Internal Circulation Only
TCP AdaptabilityTCP Adaptabili ty
TCP manages the reliable exchange of data
TCP utilizes a basic flow-control algorithm Increasing the data flow rate until the network signals saturation
Packet loss
TCP flow rate is reduced
When reliable transmission occurs
Data flow begins to increase again
If no reliable flow is established
Flow rate backs off until initial probe of single packet occurs
Entire flow control process starts again
Allows a highly, efficient network to be utilized
Positive Acknowledgment and Retransmission (PAR)
A simple transport protocol might implement a reliability-and-flow-control technique where the sourcesends one packet, starts a timer, and waits for an acknowledgment before sending a new packet. If theacknowledgment is not received before the timer expires, the source retransmits the packet. Such atechnique is called positive acknowledgment and retransmission (PAR).
By assigning each packet a sequence number, PAR enables hosts to track lost or duplicate packetscaused by network delays that result in premature retransmission. The sequence numbers are sentback in the acknowledgments so that the acknowledgments can be tracked.
PAR is an inefficient use of bandwidth, however, because a host must wait for an acknowledgmentbefore sending a new packet, and only one packet can be sent at a time.
TCP Sliding Window
A TCP sliding window provides more efficient use of network bandwidth than PAR because it enableshosts to send multiple bytes or packets before waiting for an acknowledgment.
In TCP, the receiver specifies the current window size in every packet. Because TCP provides a byte-stream connection, window sizes are expressed in bytes. This means that a window is the number of
data bytes that the sender is allowed to send before waiting for an acknowledgment. Initial windowsizes are indicated at connection setup, but might vary throughout the data transfer to provide flowcontrol. A window size of zero, for instance, means "Send no data."
In a TCP sliding-window operation, for example, the sender might have a sequence of bytes to send(numbered 1 to 10) to a receiver who has a window size of five. The sender then would place a windowaround the first five bytes and transmit them together. It would then wait for an acknowledgment.
7/27/2019 Fund. of Data
73/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 73 For Internal Circulation Only
TCP Data TransferTCP Data Transfer
7/27/2019 Fund. of Data
74/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 74 For Internal Circulation Only
TCP Frame FormatTCP Frame Format
Source Port Destination Port
Sequence Number
Acknowledgement Number
Data Offset Reserved Flags Window
Checksum Urgent Pointer
Options (+padding)
Data (Variable)
Source Port and Destination PortIdentifies points at which upper-layer sourceand destination processes receive TCP services.
Sequence NumberUsually specifies the number assigned to the first byte of datain the current message. In the connection-establishment phase, this field also can be
used to identify an initial sequence number to be used in an upcoming transmission.
Acknowledgment NumberContains the sequence number of the next byte of datathe sender of the packet expects to receive.
Data OffsetIndicates the number of 32-bit words in the TCP header.
ReservedRemains reserved for future use.
FlagsCarries a variety of control information, including the SYN and ACK bits usedfor connection establishment, and the FIN bit used for connection termination.
WindowSpecifies the size of the sender's receive window (that is, the buffer spaceavailable for incoming data).
ChecksumIndicates whether the header was damaged in transit.
Urgent PointerPoints to the first urgent data byte in the packet.
OptionsSpecifies various TCP options.
DataContains upper-layer information.
7/27/2019 Fund. of Data
75/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 75 For Internal Circulation Only
UDPUDP
Physical
Data Link
IP ICMP
UDP TCPApplication
UDP is a connectionless transport-layer protocol
UDP is basically an interface between IP andupper-layer processes.
UDP adds no reliability, flow-control, or error-recovery functions to IP.
UDP headers contain fewer bytes and consume lessnetwork overhead
UDP is useful in situations where the reliabilitymechanisms of TCP are not necessary, such as in caseswhere a higher-layer protocol might provide error andflow control.
UDP is the transport protocol for several well-known
application-layer protocols, including Network FileSystem (NFS), Simple Network Management Protocol(SNMP), Domain Name System (DNS), and Trivial File
Transfer Protocol (TFTP).
The User Datagram Protocol (UDP) is a connectionless transport-layer protocol(Layer 4) that belongs to the Internet protocol family. UDP is basically an interfacebetween IP and upper-layer processes. UDP protocol ports distinguish multipleapplications running on a single device from one another.
Unlike the TCP, UDP adds no reliability, flow-control, or error-recovery functions toIP. Because of UDP's simplicity, UDP headers contain fewer bytes and consume lessnetwork overhead than TCP.
UDP is useful in situations where the reliability mechanisms of TCP are notnecessary, such as in cases where a higher-layer protocol might provide error andflow control.
UDP is the transport protocol for several well-known application-layer protocols,including Network File System (NFS), Simple Network Management Protocol(SNMP), Domain Name System (DNS), and Trivial File Transfer Protocol (TFTP).
7/27/2019 Fund. of Data
76/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 76 For Internal Circulation Only
TCP/UDP Port NumbersTCP/UDP Port Numbers
Each internet application (FTP, HTTP, Telnet) relates to particular port in asession. Main internet application maintain well known port numbers, while mostport numbers are dynamically assigned.
7/27/2019 Fund. of Data
77/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 77 For Internal Circulation Only
TCP/UDP PORTSTCP/UDP PORTS
Port nos above 1024 are generally allocatedFor source port as port nos below 1024 haveBeen assigned for popular applications by IETF.Every application running in a PC will have aUnique source port while all similar applications(ex. http, telnet, ftp etc.) will have the sameDestination port.
7/27/2019 Fund. of Data
78/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 78 For Internal Circulation Only
TCP/UDP Port AddressesTCP/UDP Port Addresses
7/27/2019 Fund. of Data
79/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 79 For Internal Circulation Only
The Session LayerThe Session Layer
7/27/2019 Fund. of Data
80/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 80 For Internal Circulation Only
Session Layer
Protocols at this layer are necessary for
Establishing, maintaining and ending sessions between user
applications.
They are basically flow chart applications which guide the user into the
various functional/control aspects of an application.
7/27/2019 Fund. of Data
81/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 81 For Internal Circulation Only
The Presentation LayerThe Presentation Layer
7/27/2019 Fund. of Data
82/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 82 For Internal Circulation Only
Presentation Layer
The presentation layer ensures that
The communication passing through are in the appropriate form for therecipient.
Programs in the presentation layer address three aspects ofpresentation.
"Data formats for example ASCII or binary formats
"Compatibility with host operating system
"Encapsulation of the data into message envelopsfor transmissionthrough the network.
7/27/2019 Fund. of Data
83/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 83 For Internal Circulation Only
The Application LayerThe Application Layer
7/27/2019 Fund. of Data
84/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 84 For Internal Circulation Only
Application Layer
This layer is closest to the user providing network services to
application programs to ensure communication with other applicationprogram
The Application layer is NOT the application itself that is doing thecommunication; it is the service layer that provides these services.
"Makes sure that the other party is identified and can be reached.
"If appropriate, authenticates either the message sender or receiver orboth.
"Makes sure that necessary communication resources exist.
"Ensures agreement at both ends about error recovery procedures data
integrity, and privacy.
"Determines protocol and data syntax rules at the application level.
!It may be convenient to think of the Application layer
as the high level set-up services for the application
program.
7/27/2019 Fund. of Data
85/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 85 For Internal Circulation Only
The TCP/IP Protocol Suite
A set of standard data communication protocols also
known as the Internet Protocol suite used on the internet world wide.
The suite was originally developed for the US Department of Defense
Advanced Research Project Agency (DARPA)
TCP/IP is a layered protocol based on the DoD model where each layerbuilds upon the layer below it, adding new functionality.
7/27/2019 Fund. of Data
86/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 86 For Internal Circulation Only
TCP/IP Protocol Suite
TCP/IP is designed to use a client server model of
communication in which a client request is provided a service (such assending a web page) to by another a computer(server) in the network.
TCP/IP has only four layers i.e. when compared to the OSI referencemodel the upper four layers (4-7) is integrated into one and is called as
Application layer.
All the TCP/IP applications resides at this layer.
Lower layers (1-3) purely are concerned with sending and receiving
data using specific n/w hardware.
7/27/2019 Fund. of Data
87/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 87 For Internal Circulation Only
TCP/IP VS OSI MODELTCP/IP VS OSI MODEL
7/27/2019 Fund. of Data
88/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 88 For Internal Circulation Only
TCP/IP Protocol Suite
7/27/2019 Fund. of Data
89/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 89 For Internal Circulation Only
FTPFTP
File Transfer Protoco l
FTP is most widely used protocol for moving files reliably across networksof various platforms.
You need to logon to the FTP server with a password,
however publicly available files are easily accessed using anonymousFTP.
A user can use FTP commands from a prompt, or a graphical userinterface to download programs selected from a web page or an FTPserver.
Using FTP, one can also update (delete, rename,move and copy) files
at sever
To ensure reliability, FTP uses TCP at the transport layer
7/27/2019 Fund. of Data
90/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 90 For Internal Circulation Only
HTTPHTTP
Hyper Text Transfer Protocol
HTTP is the fundamental protocol used by the World Wide Web
It defines how messages and files are formatted and transmitted and
what actions web server and browser should take in response tovarious commands.
A web browser is a client program that uses HTTP to make requests of
web servers throughout the internet on behalf of the browser user.
A web browser use the Uniform Resource Locator (URL) to link files toother websites.
To ensure reliability HTTP uses TCP at the transport layer
7/27/2019 Fund. of Data
91/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 91 For Internal Circulation Only
SNMPSNMP
Simple Network Management Protoco l
Application layer protocol for managing complex networks
It allows a host (NMS) acting as an SNMP Manager to poll and
configure managed network devices SNMP agents
Agents routinely reports unsolicited events notifications to theirmanagers known as Traps.
Management Information Base (MIB) is a collection of managed objectsresiding in the agent.
SNMP uses UDP at the transport layer
7/27/2019 Fund. of Data
92/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 92 For Internal Circulation Only
SMTPSMTPSimple Mail Transfer Protocol
The host that is configured with
this protocol is called as theSMTP server.
The SMTP server hand les
outgoing mails
Whenever you send a piece
of e-mail, your email client
interacts with your SMTP
server to handle sending of
the mail
The SMTP server then
contacts other SMTP server
to actually deliver the mail
To ensure reliabili ty SMTP
use TCP at the transport layer
7/27/2019 Fund. of Data
93/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 93 For Internal Circulation Only
POP3POP3
Post Office Protoco l
It the most popular TCP/IP mail
access protocol
It implements the Off-Line access
model, allowing users to retrieve
mail from their SMTP server.
7/27/2019 Fund. of Data
94/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 94 For Internal Circulation Only
TELNETTELNET
TELNET
Telnet is the terminal emulation program that allows you
to remotely access someone elses computer across the network,
assuming they have given you permission
To start a telnet session the client must log in to a server by entering avalid username and password
After you get authenticated you will be presented a command promptwhere you can execute the commands, you feel as if you are on thesever console
To ensure reliability, Telnet uses TCP at the transport layer
7/27/2019 Fund. of Data
95/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 95 For Internal Circulation Only
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Module Summary
7/27/2019 Fund. of Data
96/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 96 For Internal Circulation Only
Module ReviewModule ReviewModule Review
1. Node to Node Communication is provided by Layer
2. Parity & CRC are .. layer tools.
3. .. layer takes care of end to end reliable delivery of data.
4. RS232C and RS485 are layer standards.
5. .layer takes care of packet transfer between logical networks.
6. .layer takes care of forms, formats, fonts, etc.
7. .layers are broadly categorized as the Network LayersandLayers are categorized as Application Layersin OSI model.
8. Which layers take part in data communication in Networking Devices
We had see this page before: As information is passed through the network, the topfour layers are only required at the end-points. The bottom three (Physical, Data &Network) are required at every node that the information pass through. Nodes whichcan process upto Layer 3 (Network layer) information are called Routers.
Routers are essentially element that determine the Route to to taken for end-to-endinformation Transfer. This they do by creating and maintaining either a Static orDynamic Routing Table. Modern Routers are capable of maintaining several RoutingTables, some Static and some Dynamic.
7/27/2019 Fund. of Data
97/251
7/27/2019 Fund. of Data
98/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 98 For Internal Circulation Only
Bus TopologyBus Topology
The Ethernet started in a bus topology:
Main Cable
TerminationTermination
COLISSIONS IS A PROBLEM,ANS INFO TRANSMITTED BY ONE GOESTO ALL,THIS IS A COMMON BROADCAST DOMAIN,AND THE BUS HASTO BE TERNINATED OTHERWISE THERE WILL BE VOLATAGEREFLECTIOSN
this is called a common broadcast domain
7/27/2019 Fund. of Data
99/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page 99 For Internal Circulation Only
Bus TopologyBus Topology
The bus topology found out to have a lot of disadvantages:
Cut in the Coax cable can cause disconnecting several stations.
Fault in Coax cable can disturbed the service.
Incorrect / no termination
Fault in the ground
NoTermination
Termination
Termination
Termination
7/27/2019 Fund. of Data
100/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page100 For Internal Circulation Only
Star TopologyStar Topology
In order to over come the problem issued in a bus topology, star
topology was used for the Ethernet connection. If a single cable cut/fault only one node is disconnected.
Usage of a cheaper unshielded twisted pair cable than a coaxialcable.
The usage of the star topology introduced the bus in a boxequipmentwhich is known as an Hub.
SO THE HUB WAS DEVELOPED.THE MEDIA IS STILL SHARED BUTUNDER OUR CONTROL.ALL PORTS ARE PARALLEL,SO BREAK IN LINKWILL NOT RESULT IN ALL STATIONS OUTAGE.
7/27/2019 Fund. of Data
101/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page101 For Internal Circulation Only
L1 DevicesL1 DevicesL1 Devices
Repeater
Used in local area networks. It is a physical layer device thatregenerates the electrical signal.
Extend the distance between remote nodes
Increase the total number of nodes on a network.
Repeater amplifies the signal and removes any distortion.
Maximum 5 spans
Repeaters let you extend the distance between remote nodes and increase the totalnumber of nodes on a network. The physical layer defines the rules for the media(such as electrical or fiber optic cable) that interconnect network devices. Electricalsignals become weaker over distance (called attenuation) and may become distorted
by exposure to interference (EMI and RFI). The rules provided by the physical layerprotocol ensure that the signal remains strong enough for the most remote end nodesto exchange data.
A repeater amplifies the signal and removes any accumulated distortion. The onlypossible values for a digital signal are 0 or 1, so it is easy to restore it to its originalcondition. Because a repeater deals with signal reproduction, it is considered tooperate at the OSI physical layer.
Besides limiting the length of the segment, physical layer specifications also state themaximum number of nodes per segment for different media types. For instance, amaximum of 30 attachments are permitted on an 802.3 network using 10BASE2 (thin
Ethernet) coaxial cable.
Repeaters allow you to interconnect multiple segments of the same media type andthe same data link layer protocol. This interconnection increases the number of nodesallowed and extends the maximum distance permitted between the most distant endnodes in the network.
7/27/2019 Fund. of Data
102/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page102 For Internal Circulation Only
HubHubHub
Hubs provide both Physical layer and Repeaters function.
Hubs do not isolate collision domains , they extend them.This means a node may collide with any other node residing at anysegment in the LAN.
Segment A/ Accounts Department Segment B/ Sales Department
7/27/2019 Fund. of Data
103/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page103 For Internal Circulation Only
CSMA/CDCSMA/CD
Although Metclafe and his colleagues establish a
connection they had one major problem Collisions.Through out the years a protocol was added to theEthernet network in order to reduce the collisions.
This protocol called CSMA/CD (Carrier Sense MultipleAccess / Collision Detection).
The CSMA/CD describes the following scenario
Laptop computerWorkstation IBM Compatible
IBM CompatibleIBM laser printer
SO THE TERMINAL WILL FIRST ENSURE WETHER MEDIA IS FREE ORNOT TO AVOID COLLISIONS
to avoid collisions the csma/cd protocol is defined
7/27/2019 Fund. of Data
104/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page104 For Internal Circulation Only
CSMA/CDCSMA/CD
Node A prior the transmission to node B needs to listento the media
in order to check whether the media is free or not.
AB
C
A wants to t ransmit to BA listen to the Media is it free?The Media is free O.K to transmitThe Media is occupied wait a random period o f time and try again.
7/27/2019 Fund. of Data
105/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page105 For Internal Circulation Only
CSMA/CDCSMA/CD
CSMA/CD is not immune to collisions because at the same time
that A listensto the media C could have also been listeningto the media and both of them will transmit on the same time.
In a collision scenario the Ethernet system has a way to knowthat collision happened. Both node stopping their transmissionand back-offfor a random time period.
7/27/2019 Fund. of Data
106/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page106 For Internal Circulation Only
Full / Half DuplexFull / Half Duplex
Half Duplex Only one node may transmit on the line. Half duplex
is a must in shared media scenario (e.g hub).Full Duplex A station can receive and transmit on the same time,only in a none shared media environment.
7/27/2019 Fund. of Data
107/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page107 For Internal Circulation Only
L2 DevicesL2 DevicesL2 Devices
Bridge
Bridge is a layer 2 device.
It interconnects two LAN segments.
The two LANs can be of different technologies e.g. Ethernet, token ring.
A bridge is also used to segment a LAN so that messages meant for onesegment are not sent to other segments (Filtering capability).
Segmentation of a LAN can be done department wise in an organization.Security policy can be implemented.
Bridge can be self learning i.e they learn addresses of stations on differentsegments by looking at the frames that flow in a segment.
LAN 1 LAN 2
In telecommunication networks, a bridge is a product that connects a local area network (LAN) toanother local area network that uses the same protocol (for example, Ethernet or token ring).
You can envision a bridge as being a device that decides whethera message from you to someoneelse is going to the local area network in your building or to someone on the local area network in thebuilding across the street. A bridge examines each message on a LAN, "passing" those known to bewithin the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs).
In bridging networks, computer or node addresses have no specific relationship to location. For thisreason, messages are sent out to every address on the network and accepted only by the intendeddestination node. Bridges learn which addresses are on which network and develop a learning table sothat subsequent messages can be forwarded to the right network.
Bridging networks are generally always interconnected local area networks since broadcasting everymessage to all possible destinations would flood a larger network with unnecessary traffic. For thisreason, router networks such as the Internet use a scheme that assigns addresses to nodes so that amessage or packet can be forwarded only in one general directionrather than forwarded in alldirections.
A bridge works at the data-link level of a network, copying a data frame from one network to the next
along the communications path.
A bridge is sometimes combined with a router in a product called a brouter.
7/27/2019 Fund. of Data
108/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page108 For Internal Circulation Only
BRIDGE BasicsBRIDGE Basics
7/27/2019 Fund. of Data
109/251
COURSE TITLE 9/5/2007
RIC-Learning Center Page109 For Internal Circulation Only
BridgeBridgeBridge
Transparent bridges integrate LANs into a logical network by activelylistening to each frame on each network and forwarding those frames with
a destination on the remote LAN.
To interconnect physical networks, bridges perform four basic functions:
Listen
Learn
Filter
Forward
The bridge listens to all messages transmitted on the networks to which it is connected. A bridge learnsdevice addresses by building a forwarding table mapping the source address from each frame itreceives to the port on which it is received. A bridge filters traffic, ignoring frames with destinationaddresses mapped to the same port on which they are received. (The bridge can be configured toperform additional filtering based on various criteria.) Finally, a bridge forwards traffic to the appropriate
ports to allow data to reach its destination.
A transparent bridge examines the destination address of all messages transmitted on each network towhich it is connected. If the destination address is associated with the port on which it was received,the message is not forwarded to transmitting ports. If the destination address is known and is notassociated with the port on which it was received, the bridge forwards the frame to the port associatedwith the destination. For instance, in Figure 3-3, a message with the destination addressAA receivedon port 1 is i