IPG III DC Full Slides

Embed Size (px)

Citation preview

  • 8/3/2019 IPG III DC Full Slides

    1/188

    DATA

    COMMUNICAT

    ION

    Introduction Components

    Protocols

    Standards Topology

  • 8/3/2019 IPG III DC Full Slides

    2/188

  • 8/3/2019 IPG III DC Full Slides

    3/188

    What is Computer Network ?

    A computer network allows sharing of resources andinformation among devices connected to the network.

    The Advanced Research Projects Agency (ARPA) funded thedesign of the "Advanced Research Projects Agency Network"

    (ARPANET) for the United States Department of Defense.

    It was the first operational computer network in the world.

    Network is categorized as PAN (within the personal network

    like cells, PDAs, pagers etc. of one person), LAN (within building/plant/campus), MAN (covering an area size of acity) and WAN (Spanning states/countries/whole world),INTERNET (network of networks).

  • 8/3/2019 IPG III DC Full Slides

    4/188

    COMPONENTS

    Message Info./data to be communicated.Eg. Text, Numbers, Pictures, Sound, Video,or combination of these

    Sender/Transmitter

    Receiver

    Medium Path

    Protocol Set of rules that governs datacommunication. Agreement between

    communicating devices.

  • 8/3/2019 IPG III DC Full Slides

    5/188

    a ta C o m m u n ica tio n S y ste mC o m p o n e n ts

  • 8/3/2019 IPG III DC Full Slides

    6/188

    Data transmission occurs betweentransmitter and receiver over some

    transmission medium.

    Transmission media is classified as:

    1.guided - the waves are guided along aphysical path; examples of guided mediaare twisted pair, coaxial cable, andoptical fiber.

    2.unguided - provide a means for

    transmitting electromagnetic waves butdo not guide them; eg. propagationthrough air, vacuum, and sea water.

    3.

    In both cases, communication is in the form

  • 8/3/2019 IPG III DC Full Slides

    7/188

    Network Criteria

  • 8/3/2019 IPG III DC Full Slides

    8/188

    Performance

    Depends on:1.Number of users In peak load

    periods performance decreases, butnetwork responding to load ismeasure of performance.

    2.Type of transmission medium Faster medium like fibre optics

    cabling.3.Hardware High speed computer withlarge storage,

    4.Software Well defined softwares at

    sender, receiver and intermediate

  • 8/3/2019 IPG III DC Full Slides

    9/188

    Reliability

    1.Frequency of failure

    2.

    3.Recovery time of a network afterfailure

    4.

    5.Catastrophe - fire, earthquake,theft.

  • 8/3/2019 IPG III DC Full Slides

    10/188

    Security

    Unauthorized Access Protectionis needed at different levels likeidentification codes and passwords

    at lowest levels to encryptiontechniques at higher level.

    Viruses Illicitly introduced codethat damages the system.

  • 8/3/2019 IPG III DC Full Slides

    11/188

    PROTOCOLS

    Protocol defines:

    1.What is to be communicated

    2.How is it to be communicated

    3.When is to be communicated

    4.

    Key elements of protocols areSyntax, Semantics and Timing.

  • 8/3/2019 IPG III DC Full Slides

    12/188

    Syntax Structure/format of data meaningorder in which they are presented.

    Example, a simple protocol expect first 8 bits

    of data to be the address of the sender, thesecond 8 bits to be the address of the receiver,and the rest of the stream to be the messageitself.

    Semantics - refers to the meaning of eachsection of bits. How is a particular pattern tobe interpreted, and what action is to be takenbased on that interpretation?

    Example, an address identify the route to betaken or the final destination of the message?

    Timing - refers to two characteristics: whendata should be sent and how fast they can be

    sent.

  • 8/3/2019 IPG III DC Full Slides

    13/188

    STANDARDS

    Standards are essential in:1.creating and maintaining an open andcompetitive market for equipmentmanufacturers and in

    2.guaranteeing national and internationalinteroperability of data andtelecommunications technology andprocesses.

    Standards provide guidelines tomanufacturers, vendors, governmentagencies, and other service providers toensure the kind of interconnectivitynecessary in today's marketplace and in

  • 8/3/2019 IPG III DC Full Slides

    14/188

    Categories of Datacommunication standards

  • 8/3/2019 IPG III DC Full Slides

    15/188

    De facto - by fact. Standards thathave not been approved by an

    organized body but have beenadopted as standards throughwidespread use are de factostandards. They are establishedoriginally by manufacturers whoseek to define the functionality of anew product or technology.

    De jure - by law or by regulation. Those standards that have beenlegislated by an officiallyrecognized body are de jure

  • 8/3/2019 IPG III DC Full Slides

    16/188

    Standards CreationCommittees

    International Organization forStandardization (ISO).

    International Telecommunication Union-

    Telecommunication Standards Sector(ITU-T).

    American National Standards Institute(ANSI).

    Institute of Electrical and ElectronicsEngineers (IEEE).

    Electronic Industries Association (EIA).

    Telcordia

  • 8/3/2019 IPG III DC Full Slides

    17/188

  • 8/3/2019 IPG III DC Full Slides

    18/188

    Line Configuration

    Refers to the way two or morecommunication devices attach to alink.

    Two configurations:

    1.Point to point

    2.Multipoint

  • 8/3/2019 IPG III DC Full Slides

    19/188

    Point to Point

    Provides dedicated link between twodevices.

    Entire capacity of channel is reservedfor the transmission.

    Wires/cables/microwave or satellite

    links are used to connect.

    Eg. Remote control and TV control

    system.

  • 8/3/2019 IPG III DC Full Slides

    20/188

    - -o in t to P o in t Lin e C o n fig u ra tio n

  • 8/3/2019 IPG III DC Full Slides

    21/188

    - -o in t to P o in t Lin e C o n fig u ra tio n

  • 8/3/2019 IPG III DC Full Slides

    22/188

    - -o in t to P o in t Lin e C o n fig u ra tio n

  • 8/3/2019 IPG III DC Full Slides

    23/188

  • 8/3/2019 IPG III DC Full Slides

    24/188

    u ltip o in t Lin e C o n fig u ra tio n

  • 8/3/2019 IPG III DC Full Slides

    25/188

    TOPOLOGY

    Refers to the way a network is laidout physically or logically.

    It is the geometric representation ofthe relationship of all the links andlinking devices (nodes) to eachother.

    Two or more devices connect to alinkand two or more links forms a

    topology.

  • 8/3/2019 IPG III DC Full Slides

    26/188

    CATEGORIES OFTOPOLOGY

  • 8/3/2019 IPG III DC Full Slides

    27/188

    MESH TOPOLOGY

    Every device has a dedicated point-to-point link to every other device.

    dedicated means that the link carriestraffic only between the twodevices it connects.

  • 8/3/2019 IPG III DC Full Slides

    28/188

    e sh To p o lo g y

  • 8/3/2019 IPG III DC Full Slides

    29/188

    Advantages The use of dedicated links guarantees that each

    connection can carry its own data load, thuseliminating the traffic problems that can occurwhen links must be shared by multiple devices.

    Robust. If one link becomes unusable, it does notincapacitate the entire system.

    Privacy or security. When every message travelsalong a dedicated line, only the intended recipient

    sees it. Physical boundaries prevent other usersfrom gaining access to messages.

    Point-to-point links make fault identification andfault isolation easy. Traffic can be routed to avoid

    links with suspected problems. This facility enablesthe network manager to discover the precise

  • 8/3/2019 IPG III DC Full Slides

    30/188

    Limitations

    The amount of cabling and

    the number of I/O portsrequired. Every device mustbe connected to every otherdevice, installation andreconnection are difficult.

    The sheer bulk of the wiring canbe greater than the availablespace (in walls, ceilings, or

    floors) can accommodate.

    The hardware required toconnect each link (I/O portsand cable) is expensive.

    USE

    Connection oftelephoneregionaloffices inwhich each

    regional officeneeds to beconnected toevery otherregionaloffice.

  • 8/3/2019 IPG III DC Full Slides

    31/188

    Star Topology Each device has a dedicated point-to-point

    link only to a central controller, called ahub.

    The devices are not directly linked to oneanother.

    Unlike a mesh topology, a star topologydoes not allow direct traffic betweendevices.

    The controller acts as an exchange: If one

    device wants to send data to another, itsends the data to the controller, which

  • 8/3/2019 IPG III DC Full Slides

    32/188

    ta r To p o lo g y

  • 8/3/2019 IPG III DC Full Slides

    33/188

    Advantages Less expensive than a mesh topology.

    Each device needs only one link and one I/O port toconnect it to any number of others. This makes iteasy to install and reconfigure.

    Less cabling needs to be housed, and additions,moves, and deletions involve only one connection:between that device and the hub.

    Robustness. If one link fails, only that link is affected.All other links remain active.

    As long as the hub is working, it can be used to

    monitor link problems and bypass defective links.Therefore easy fault identification and fault

  • 8/3/2019 IPG III DC Full Slides

    34/188

    Limitations

    Dependency of the whole topology on onesingle point, the hub. If the hub goesdown, the whole system is dead.

    It requires far less cable than a mesh, each

    node must be linked to a central hub. Somore cabling is required in a star.

    USE: The star topology is used in local-area

    networks (LANs). High-speed LANs oftenuse a star topology with a central hub.

  • 8/3/2019 IPG III DC Full Slides

    35/188

    Tree Topology

    Variation of Star topology.

    Here a central hub (should alwaysbe active)is the main controller andbelow it are different secondaryhubs (active/passive) controlling

    different workstations.

    Eg: Cable TV technology

  • 8/3/2019 IPG III DC Full Slides

    36/188

    Bus Topology

    It is multipoint. One long cable acts as

    a backbone to link all the devices in anetwork.

    Nodes are connected to the bus cable by

    drop lines and taps.

    A drop line is a connection running betweenthe device and the main cable. A tap is a

    connector.

    As a signal travels along the backbone,some of its energy is transformed into

    heat. So it becomes weaker and weaker

  • 8/3/2019 IPG III DC Full Slides

    37/188

    u s To p o lo g y

  • 8/3/2019 IPG III DC Full Slides

    38/188

    Advantages

    Ease of installation - Backbone cablecan be laid along the most efficientpath, then connected to the nodes bydrop lines of various lengths.

    Uses less cabling than mesh or startopologies.

    Example - four network devices in thesame room require four lengths of

    cable reaching all the way to the hub.In a bus, this redundancy iseliminated. Only the backbone cablestretches through the entire facility.

  • 8/3/2019 IPG III DC Full Slides

    39/188

    Disadvantages

    Difficult reconnection and fault isolation. A bus isdesigned to be optimally efficient at installation,therefore difficult to add new devices.

    Signal reflection at the taps can cause degradationin quality. This degradation can be controlled by

    limiting the number and spacing of devicesconnected to a given length of cable.

    A fault or break in the bus cable stops alltransmission, even between devices on the sameside of the problem.

    USE:

    Ethernet LANs use a bus topology

  • 8/3/2019 IPG III DC Full Slides

    40/188

    Ring Topology

    Each device has a dedicated point-to-pointconnection with only the two devices oneither side of it.

    A signal is passed along the ring in onedirection, from device to device, until itreaches its destination.

    Each device in the ring has a repeater.When a device receives a signal intendedfor another device, its repeater

    regenerates the bits and passes themalon

  • 8/3/2019 IPG III DC Full Slides

    41/188

  • 8/3/2019 IPG III DC Full Slides

    42/188

    Advantages

    Easy to install and reconfigure.Each device is linked to only itsimmediate neighbors (eitherphysically or logically). To add ordelete a device requires changingonly two connections.

    Fault isolation is simplified. In aring, a signal is circulating at all times.If one device does not receive a signalwithin a specified period, it can issue

    an alarm. The alarm alerts the

  • 8/3/2019 IPG III DC Full Slides

    43/188

    Limitations

    A break in the ring (such as adisabled station) can disable theentire network.

    USE:

    Was prevalent when IBM introducedits local-area network Token Ring.

    Today, the need for higher-speedLANs has made this topology less

    popular.

    A t k b h b id

  • 8/3/2019 IPG III DC Full Slides

    44/188

    yb rid To p o lo g yA network can be hybrid

    Transmission mode defines the

  • 8/3/2019 IPG III DC Full Slides

    45/188

    Transmission mode defines thedirection of signal flow between two

    linked devices.

  • 8/3/2019 IPG III DC Full Slides

    46/188

    Simplex

    Communication is unidirectional one way.

    One can transmit only and one can

    receive only.

    Eg. Keyboards, Monitor etc.

  • 8/3/2019 IPG III DC Full Slides

    47/188

    S im p le x

    H lf D l

  • 8/3/2019 IPG III DC Full Slides

    48/188

    Half-Duplex

    Each station can both transmit aswell as receive, but not at the sametime (when one device sends otherreceive and vice-versa).

    Eg. Walkie-Talkie

  • 8/3/2019 IPG III DC Full Slides

    49/188

    -a lf D u p le x

    F ll D l

  • 8/3/2019 IPG III DC Full Slides

    50/188

    Full-Duplex

    Also called Duplex.

    Both stations can transmit andreceive simultaneously.

    Eg. Telephone network

  • 8/3/2019 IPG III DC Full Slides

    51/188

    -u ll D u p le x

  • 8/3/2019 IPG III DC Full Slides

    52/188

  • 8/3/2019 IPG III DC Full Slides

    53/188

    LAN

    Links devices in a singleoffice/building/ campus in span offew kms.

    LANs allow resources to be shared

    between PCs and workstations. Uses only one type of transmission

    medium.

    Common LAN topologies are Bus,

    Ring and Star.

    Have data in range 4 to 16 Mbps, butincreasing to 100 Mbps +.

  • 8/3/2019 IPG III DC Full Slides

    54/188

    o ca l A re a N e tw o rk

  • 8/3/2019 IPG III DC Full Slides

    55/188

    o ca l A re a N e tw o rk

  • 8/3/2019 IPG III DC Full Slides

    56/188

    MAN

    Designed to extend over entire city.

    Can be single network or aconnection of LANs.

    Eg. An organization use MAN toconnect LANs at their variousoffices located in the city.

  • 8/3/2019 IPG III DC Full Slides

    57/188

    e tro p o lita n A re a N e tw o rk

  • 8/3/2019 IPG III DC Full Slides

    58/188

    WAN

    Provides long distance transmissionof data, voice, image, video overlarge geographical areas.

    Wholly owned and used by a singlecompany and so called called

    Enterprise Network.

    id e A re a N e tw o rk

  • 8/3/2019 IPG III DC Full Slides

    59/188

  • 8/3/2019 IPG III DC Full Slides

    60/188

    INTERNETWORKS or Internet

    Individual networks are joined bydevices like routers and gateways.

  • 8/3/2019 IPG III DC Full Slides

    61/188

    n te rn e tw o rk( )nternet

  • 8/3/2019 IPG III DC Full Slides

    62/188

    SIGNALS

    A signal is any time-varying or spatial-varying quantity.

    Analog (continuous) and digital(discrete)

    Periodic signals (completes a pattern

    within a measurable time frame,called a period and repeats thepattern over identical intervals.Completeness of one full pattern is

    called a cycle) and Aperiodic

  • 8/3/2019 IPG III DC Full Slides

    63/188

    ransformation of Informationo Signals

  • 8/3/2019 IPG III DC Full Slides

    64/188

    Frequency is No. of cycles per second. F = 1/T

    Bandwidth is the range of frequencies the signaloccupies. B = fH fL

    Amplitude is the instantaneous height of thesignal

    Phase is the shift of wave along the time axis.

    Bit rate (bits/sec) and Bit Interval (duration ofone bit) are used to describe a digital signal.

  • 8/3/2019 IPG III DC Full Slides

    65/188

    Communications tasks Transmission system utilization Interfacing Signal generation Synchronization Exchange management Security Error detection and correction Flow control Addressing Routing

    Recovery Message formatting Network management

    Transmission system

  • 8/3/2019 IPG III DC Full Slides

    66/188

    yutilization

    The need to make efficient use oftransmission facilities shared amongof communicating devices.

    Techniques (multiplexing) are used toallocate the total capacity of atransmission medium among anumber of users.

    Congestion control techniques to assurethat the system is not overwhelmedby excessive demand for transmissionservices.

    To communicate a device must interface with the

  • 8/3/2019 IPG III DC Full Slides

    67/188

    To communicate, a device must interface with thetransmission system.

    Once an interface is established, signal generation isrequired for communication.

    The properties of the signal, such as form and

    intensity, must be such that they are: -(1) capable of being propagated through the

    transmission system, and(2) interpretable as data at the receiver.

    The signals be generated to conform to therequirements of the transmission system andreceiver and there must be some form ofsynchronization between transmitter and receiver.

    The receiver must be able to determine when a signal

    h i f i i

  • 8/3/2019 IPG III DC Full Slides

    68/188

    There are requirements for communicationbetween two parties under the termexchange management.

    If data are to be exchanged in both

    directions over a period of time, the twoparties must cooperate.

    For data processing devices, more will be

    needed than simply establishing aconnection. Like: -

    1.whether both devices may transmitsimultaneously or must take turns,

    2.the amount of data to be sent at one time,

    3.the format of the data, and

    4.what to do if certain contingencies, such as

  • 8/3/2019 IPG III DC Full Slides

    69/188

    In all communications systems, there is a potential forerror; transmitted signals are distorted to someextent before reaching their destination.

    Error detection and correction are required where

    errors cannot be tolerated usually with dataprocessing systems.

    Flow control is required to assure that the source

    does not overwhelm the destination by sendingdata faster than they can be processed andabsorbed.

    Addressing -The transmission system must assure

    that the destination system, and only that system,receives the data.

    Routing - transmission system may itself be a

  • 8/3/2019 IPG III DC Full Slides

    70/188

    Recovery is a concept distinct from that of errorcorrection by Recovery techniques. The objective iseither to be able to resume activity at the point ofinterruption or at least to restore the state of thesystems involved to the condition prior to thebeginning of the exchange.

    Message formatting has to do with an agreement

    between two parties as to the form of the data to beexchanged or transmitted. Example, both sidesmust use the same binary code for characters.

    Data communications facility is a complex system that

    cannot create or run itself. Network managementcapabilities are needed to: -

    1. configure the system,

    2. monitor its status,

    3. react to failures and overloads, and

    4. plan intelligently for future growth.

    Key Elements of Internet

  • 8/3/2019 IPG III DC Full Slides

    71/188

    Key Elements of Internet Hosts: End systems like PCs, Workstations, servers, mainframes

    etc.

    Routers: Connects the networks. Each router attaches to two ormore networks.

    Hosts breaks the data to be sent into a sequence of packets calledIP Datagram/ packets .

    Each packet includes a numeric address of destination host calledIP Address (address is carried in an IP packet).

    Hosts are sometimes grouped together in a LAN. Individual hostsand LANs are connected to an ISP (Internet Service

    Provider) through a POP (Point of Presence) which is afacility where customer can connect to ISP network.

    Connection is made in a series of steps starting with theCustomer Premises Equipments (CPE). CPE is thecommunication equipment located onsite within the host, Eg.

    Modem. Network Access Point (NAP) - Facility that provide

    infrastructure to move data between connected networks. It isone of the several major internet interconnection points thatserve to tie several ISPs together.

    NAPs are owned by NSPs (Network Service Providers). An NSPcan also be ISP but not always.

    Frame: group of bits containing data, addresses & control info.

    Flow Control and

  • 8/3/2019 IPG III DC Full Slides

    72/188

    Flow Control andCongestion

    When sender is sending at higher speedthan receiver can receive.

    Occurs in error free as well as error pronetransmission.

    Flow control throttles the sender in

    sending no faster than receiver canhandle. Requires feedback mechanism to make

    aware sender if receiver is keeping upwith it or not.

    Flow control prevents congestion. Flow control is avoiding sending data

    faster. Congestion control is avoiding congestion

    within the subnet.

  • 8/3/2019 IPG III DC Full Slides

    73/188

    Congestion occurs when users ofnetwork collectively demand moreresources than network has tooffer.

    Congestion can be solved by goodrouting and buffer management.

    Controlling the flow of packets in thenetwork is flow control.

    NEED FOR PROTOCOL

  • 8/3/2019 IPG III DC Full Slides

    74/188

    ARCHITECTURE When computers, terminals, and/or other dataprocessing devices exchange data, there

    must be a data path between the two eitherdirectly or via a communication network.

    Typical tasks to be performed are: -

    1.The source system must either activate thedirect data communication path or informthe communication network of the identityof the desired destination system.

    2.The source system must ascertain that the

    destination system is prepared to receivedata.

    3.The file transfer application on the sourcesystem must ascertain that the filemanagement program on the destinationsystem is prepared to accept and store thefile for this particular user.

    Architecture for file

  • 8/3/2019 IPG III DC Full Slides

    75/188

    Architecture for filetransfer

  • 8/3/2019 IPG III DC Full Slides

    76/188

    Communications involve threeagents: applications, computers,

    and networks.

    Communication task is divided into

    three relatively independent layers:

    1.Network access layer

    2.Transport layer

    3.Application layer

    NETWORK ACCESS LAYER

  • 8/3/2019 IPG III DC Full Slides

    77/188

    NETWORK ACCESS LAYER Concerned with the exchange of data between a

    computer and the network to which it is attached. The sending computer provide the network with the

    address of the destination computer.

    The sending computer may invoke certain services,such as priority, that might be provided by thenetwork.

    The specific software used depends on1. the type of network to be used;

    2. different standards have been developed for circuitswitching, packet switching, local area networks,and others.

    TRANSPORT LAYER

  • 8/3/2019 IPG III DC Full Slides

    78/188

    TRANSPORT LAYER

    All of the data arrive at the destinationapplication and in the same order inwhich they were sent.

    Mechanisms for providing reliabilityindependent of the nature of the

    applications.

    APPLICATION LAYER

    Contains the logic needed to supportthe various user applications like filetransfer, a separate module is neededthat is peculiar to that application.

    Example

  • 8/3/2019 IPG III DC Full Slides

    79/188

    Example Computer A, wishes to send a message to another

    application, associated with computer B.

    The application at A hands the message over to its

    transport layer with instructions to send it to SAP oncomputer B.

    The transport layer hands the message over to the

    network access layer, which instructs the networkto send the message to computer B.

    Network need not be told the identity of the

    destination service access point. All that it needs toknow is that the data are intended for computer B.

    To control this operation, control information, as well

    Th di li ti t bl k f d t d

  • 8/3/2019 IPG III DC Full Slides

    80/188

    The sending application generates a block of data andpasses this to the transport layer.

    The transport layer break this block into two smaller piecesto make it more manageable.

    To each of these pieces the transport layer appends a

    transport header, containing protocol control information.

    The combination of data from the next higher layer and

    control information is known as a protocol data unit(PDU).

    The header in each transport PDU contains controlinformation to be used by the peer transport protocol atcomputer B.

    Header include:

    Next the transport layer hand each protocol

  • 8/3/2019 IPG III DC Full Slides

    81/188

    Next the transport layer hand each protocoldata unit over to the network layer, withinstructions to transmit it to the

    destination computer.

    Network access protocol must present thedata to the network with a request for

    transmission.

    Network access protocol appends a networkaccess header to the data it receives fromthe transport layer, creating a networkaccess PDU.

    Header includes:

    1.Destination computer address.

    TCP/IP Protocol

  • 8/3/2019 IPG III DC Full Slides

    82/188

    TCP/IP ProtocolArchitecture

    TCPI-IP protocol suit is a result of protocol research anddevelopment conducted on the experimental packet-switched network, ARPANET (Advanced Research ProjectsAgency Network), funded by the Defense AdvancedResearch Projects Agency (DARPA).

    It consists of a large collection of protocols that have been

    issued as Internet standards by the Internet ArchitectureBoard (IAB).

    Communication task for TCPIIP into five relativelyindependent layers:

    1. Application layer

    2. Host-to-host, or transport layer

    3. Internet layer

    4. Network access layer

    PHYSICAL LAYER

  • 8/3/2019 IPG III DC Full Slides

    83/188

    PHYSICAL LAYER

    It covers the physical interface betweena data transmission device (e.g.,workstation, computer) and a

    transmission medium or network.

    This layer is concerned with specifying:-

    1.the characteristics of the transmissionmedium,

    2.the nature of the signals,

    NETWORK l

  • 8/3/2019 IPG III DC Full Slides

    84/188

    NETWORK access layer It is concerned with the exchange of

    data between an end system and thenetwork to which it is attached.

    Provide the network with the address of thedestination computer, invoke certainservices, such as priority.

    Specific software used at this layer dependson the type of network to be used;

    different standards have been developedfor circuit-switching, packet-switching(e.g., X.25), local area networks (e.g.,

    Ethernet), and others.

    INTERNET LAYER

  • 8/3/2019 IPG III DC Full Slides

    85/188

    INTERNET LAYER

    In cases where two devices are attached to differentnetworks, procedures are needed to allow data totraverse multiple interconnected networks. This isthe function of the internet layer.

    The internet protocol (IP) is used at this layer toprovide the routing function across multiplenetworks.

    This protocol is implemented in the end systems andin routers.

    A router is a processor that connects two networks

    and whose primary function is to relay data from

    one network to the other on its route from thesource to the destination end s stem.

    HOST-TO-HOST LAYER/

  • 8/3/2019 IPG III DC Full Slides

    86/188

    HOST TO HOST LAYER/TRANSPORT LAYER

    Data be exchanged reliably and

    All of the data arrive at thedestination application and

    Data arrive in the same order inwhich they were sent.

    APPLICATION LAYER

  • 8/3/2019 IPG III DC Full Slides

    87/188

    APPLICATION LAYER

    It contains the logic needed tosupport the various userapplications.

    Eg. file transfer, a separate module isneeded that is peculiar to that

    application.

    TCP/IP Protocol

  • 8/3/2019 IPG III DC Full Slides

    88/188

    /architecture model

    TCP/IP Protocol

  • 8/3/2019 IPG III DC Full Slides

    89/188

    /Architecture

    TCPI-IP protocol suit is a result of protocol research anddevelopment conducted on the experimental packet-switched network, ARPANET (Advanced Research ProjectsAgency Network), funded by the Defense AdvancedResearch Projects Agency (DARPA).

    It consists of a large collection of protocols that have been

    issued as Internet standards by the Internet ArchitectureBoard (IAB).

    Communication task for TCPIIP into five relativelyindependent layers:

    1. Application layer

    2. Host-to-host, or transport layer

    3. Internet layer

    4. Network access layer

    PHYSICAL LAYER

  • 8/3/2019 IPG III DC Full Slides

    90/188

    PHYSICAL LAYER

    It covers the physical interface betweena data transmission device (e.g.,workstation, computer) and a

    transmission medium or network.

    This layer is concerned with specifying:-

    1.the characteristics of the transmissionmedium,

    2.the nature of the signals,

    NETWORK access layer

  • 8/3/2019 IPG III DC Full Slides

    91/188

    NETWORK access layer It is concerned with the exchange of

    data between an end system and thenetwork to which it is attached.

    Provide the network with the address of thedestination computer, invoke certainservices, such as priority.

    Specific software used at this layer dependson the type of network to be used;

    different standards have been developedfor circuit-switching, packet-switching(e.g., X.25), local area networks (e.g.,

    Ethernet), and others.

    INTERNET LAYER

  • 8/3/2019 IPG III DC Full Slides

    92/188

    INTERNET LAYER

    In cases where two devices are attached to differentnetworks, procedures are needed to allow data totraverse multiple interconnected networks. This isthe function of the internet layer.

    The internet protocol (IP) is used at this layer toprovide the routing function across multiplenetworks.

    This protocol is implemented in the end systems and

    in routers.

    A router is a processor that connects two networks

    and whose primary function is to relay data from

    one network to the other on its route from thesource to the destination end s stem.

    HOST-TO-HOST LAYER/

  • 8/3/2019 IPG III DC Full Slides

    93/188

    TRANSPORT LAYER

    Data be exchanged reliably and

    All of the data arrive at thedestination application and

    Data arrive in the same order inwhich they were sent.

    APPLICATION LAYER

  • 8/3/2019 IPG III DC Full Slides

    94/188

    APPLICATION LAYER

    It contains the logic needed tosupport the various userapplications.

    Eg. file transfer, a separate module isneeded that is peculiar to that

    application.

    TCP/IP Protocol

  • 8/3/2019 IPG III DC Full Slides

    95/188

    architecture model

    OSI (Open Systems

  • 8/3/2019 IPG III DC Full Slides

    96/188

    p yInterconnection ) Model

    Developed by the International Organization forStandardization (ISO) as a model for acomputer communications architecture andas a framework for developing protocolstandards.

    It consists of seven layers:1.Application

    2.Presentation

    3.Session

    4.Transport5.Network

    6.Data Link

    7.Physical

    Seven layers of the OSI

  • 8/3/2019 IPG III DC Full Slides

    97/188

    ymodel

    Interaction between layers in the OSImodel

  • 8/3/2019 IPG III DC Full Slides

    98/188

    model

    Peer-to-Peer Processes

  • 8/3/2019 IPG III DC Full Slides

    99/188

    Device A sends a stream of bits to device B (throughintermediate nodes).

    At the higher layers, communication move down

    through the layers on device A, over to device B,and then back up through the layers.

    Each layer in the sending device adds its owninformation to the message it receives from thelayer just above it and passes the whole package tothe layer just below it.

    At the receiving machine, the message is unwrapped

    layer by layer, with each process receiving andremoving the data meant for it.

    Exam le, la er 2 removes the data meant for it, then

  • 8/3/2019 IPG III DC Full Slides

    100/188

    Organization of the Layers

  • 8/3/2019 IPG III DC Full Slides

    101/188

    g y The seven layers belongs to three subgroups.

    NETWORK SUPPORT LAYERS:

    Layers I, 2, and 3-physical, data link, and network-are thenetwork support layers.

    Deal with the physical aspects of moving data from one device toanother (such as electrical specifications, physical connections,

    physical addressing, and transport timing and reliability).

    USER SUPPORT LAYERS

    Layers 5, 6, and 7-session, presentation, and application are theuser support layers;

    TRANSPORT LAYER

    Layer 4, the transport layer, links the two subgroups and ensuresthat what the lower layers have transmitted is in a form thatthe upper layers can use.

    The upper OSI layers are almost always implemented in software;lower la ers are a combination of hardware and software

    OSI MODEL

  • 8/3/2019 IPG III DC Full Slides

    102/188

    OSI MODEL

    A packet (header and data) at level 7 isl t d i k t t l l 6 Th

  • 8/3/2019 IPG III DC Full Slides

    103/188

    encapsulated in a packet at level 6. Thewhole packet at level 6 is encapsulated ina packet at level 5, and so on.

    Data portion of a packet at level N - 1carries the whole packet (data and headerand maybe trailer) from level N.

    The concept is called encapsulation; level N- 1 is not aware of which part of theencapsulated packet is data and which

    part is the header or trailer.

    For level N - 1, the whole packet comingfrom level N is treated as one integral

    unit.

    PHYSICAL LAYER

  • 8/3/2019 IPG III DC Full Slides

    104/188

    PHYSICAL LAYER

    Coordinates the functions required tocarry a bit stream over a physicalmedium.

    Deals with the mechanical andelectrical specifications of theinterface and transmission

    medium. Defines the procedures and functions

    that physical devices and interfaceshave to perform for transmission to

    Movements ofindividual bits from one hop (node) to

  • 8/3/2019 IPG III DC Full Slides

    105/188

    individual bits from one hop (node) tothe next.

  • 8/3/2019 IPG III DC Full Slides

    106/188

    Physical layer defines the characteristics ofthe interface between the devices and the

    transmission medium.

    Representation of bits. The physical layerdata consists of a stream of bits

    (sequence of Os or 1s) with nointerpretation. Bits must be encoded intosignals--electrical or optical. The physicallayer defines the type of encoding (howOs and I s are changed to signals).

    Data rate.The transmission rate-thenumber of bits sent each second-is alsodefined by the physical layer. The physicallayer defines the duration of a bit, whichis how lon it lasts.

    Synchronization of bits The sender

  • 8/3/2019 IPG III DC Full Slides

    107/188

    Synchronization of bits.The senderand receiver not only must use the

    same bit rate but also must besynchronized at the bit level. Thesender and the receiver clocks mustbe synchronized.

    Line configuration.The physical layeris concerned with the connection ofdevices to the media. In a point-to-point configuration, two devices areconnected through a dedicated link. In

    a multipoint configuration a link is

    Physical topology The physical

  • 8/3/2019 IPG III DC Full Slides

    108/188

    Physical topology. The physicaltopology defines how devices are

    connected to make a network.Devices can be connected by usinga mesh topology, a star topology, aring topology , a bus topology or a

    hybrid topology.

    Transmission mode.The physical

    layer also defines the direction oftransmission between two devices:simplex, half-duplex, or full-duplex.

    Data Link Layer

  • 8/3/2019 IPG III DC Full Slides

    109/188

    The data linklayertransformsthe

    physicallayer, arawtransmissi

    on facility,to areliablelink.

    Framing. The data link layer divides the stream ofbits received from the network layer into manageable

  • 8/3/2019 IPG III DC Full Slides

    110/188

    y gdata units called frames.

    Physical addressing. If frames are to be distributed todifferent systems on the network, the data link layeradds a header to the frame to define the sender and/orreceiver of the frame. If the frame is intended for asystem outside the senders network, the receiveraddress is the address of the device that connects thenetwork to the next one.

    Flow control.

    Error control.The data link layer adds reliability to thephysical layer by adding mechanisms to detect andretransmit damaged or lost frames. It also uses amechanism to recognize duplicate frames. Error controlis normally achieved through a trailer added to the endof the frame.

    Network LayerTh k l i ibl f h

  • 8/3/2019 IPG III DC Full Slides

    111/188

    The network layer is responsible for the source-to-destination delivery of a packet across multiple networks(links).

    Whereas the data link layer oversees the delivery of thepacket between two systems on the same network(links), the network layer ensures that each packet getsfrom its point of origin to its final destination.

    If two systems are connected to the same link, there is noneed for a network layer.

    If the two systems are attached to different networks (links)with connecting devices between the networks (links),there is a need for the network layer to accomplishsource-to-destination delivery.

    RESPONSIBILITIES OF THE NETWORK

  • 8/3/2019 IPG III DC Full Slides

    112/188

    LAYER Logical addressing.The physical addressing

    implemented by the data link layer handles theaddressing problem locally. If a packet passes thenetwork boundary, logical addressing system helpdistinguish the source and destination systems.

    The network layer adds a header to the packet coming fromthe upper layer that includes the logical addresses of thesender and receiver.

    Routing. When independent networks or links are

    connected to create intemetworks (network of networks)or a large network, the connecting devices (calledrouters or switches) route or switch the packets to theirfinal destination.

    Transport Layer

  • 8/3/2019 IPG III DC Full Slides

    113/188

    Transport Layer Responsible for process-to-process delivery of the

    entire message. A process is an applicationprogram running on a host.

    Network layer oversees source-to-destination

    delivery of individual packets, it does notrecognize any relationship between thosepackets. It treats each one independently, aseach belonged to a separate message,whether or not it does.

    The transport layer, ensures that the wholemessage arrives intact and in order, overseeingboth error control and flow control at the

    source-to-destination level.

    Transport layer is responsible for thedelivery of a message from one

  • 8/3/2019 IPG III DC Full Slides

    114/188

    delivery of a message from oneprocess to another.

    Responsibilities of the transport layer

  • 8/3/2019 IPG III DC Full Slides

    115/188

    Service-point addressing. Computers run severalprograms at the same time. So the source-to-destination

    delivery means delivery not only from one computer tothe next but also from a specific process (runningprogram) on one computer to a specific process (runningprogram) on the other.

    The network layer gets each packet to the correctcomputer; the transport layer gets the entire message tothe correct process on that computer.

    Segmentation and reassembly. A message is dividedinto transmittable segments, with each segmentcontaining a sequence number. These numbers enablethe transport layer to reassemble the message correctlyupon arriving at the destination and to identify andreplace packets that were lost in transmission.

    Connection control.The transport layer can be eitherconnectionless or connection-oriented

  • 8/3/2019 IPG III DC Full Slides

    116/188

    connectionless or connection oriented.

    A connectionless transport layer treats each segment as anindependent packet and delivers it to the transport layer

    at the destination machine.

    A connection-oriented transport layer makes a connectionwith the transport layer at the destination machine firstbefore delivering the packets. After all the data aretransferred, the connection is terminated.

    Flow control. Like the data link layer, the transport layer isresponsible for flow control.

    Error control. Like the data link layer, the transport layeris responsible for error control.

    The sending transport layer makes sure that the entiremessage arrives at the receiving transport layer withouterror (damage, loss, or duplication). Error correction isusuall achieved throu h retransmission.

  • 8/3/2019 IPG III DC Full Slides

    117/188

    Session Layer

    The session layer is the network dialogcontroller.

    It establishes, maintains, and synchronizesthe interaction among communicatingsystems.

  • 8/3/2019 IPG III DC Full Slides

    118/188

    Dialog control.The session layer allows

    two systems to enter into a dialog. It allows the communication between two

    processes to take place in either half-duplex (one way at a time) or full-duplex

    (two ways at a time) mode.

    Synchronization. The session layer

    allows a process to add checkpoints, orsynchronization points, to a stream ofdata.

    Presentation Layer

  • 8/3/2019 IPG III DC Full Slides

    119/188

    The presentation layer is concerned

    with the syntax and semantics ofthe information exchangedbetween two systems.

    Responsible for translation,compression, and encryption.

    Translation.The processes (running programs)in two systems are exchanging information in

  • 8/3/2019 IPG III DC Full Slides

    120/188

    in two systems are exchanging information inthe form of character strings, numbers, and soon.

    The information must be changed to bit streamsbefore being transmitted.

    Different computers use different encodingsystems, the presentation layer is responsiblefor interoperability between these differentencoding methods.

    The presentation layer at the sender changes theinformation from its sender-dependent formatinto a common format. The presentation layerat the receiving machine changes the common

    format into its receiver-dependent format.

    Encryption.To carry sensitive information, a systemmust be able to ensure privacy.

  • 8/3/2019 IPG III DC Full Slides

    121/188

    p y

    Encryption means that the sender transforms theoriginal information to another form and sends theresulting message out over the network.

    Decryption reverses the original process to transform

    the message back to its original form.

    Compression. Data compression reduces the numberof bits contained in the information.

    Data compression becomes important in thetransmission of multimedia such as text, audio, andvideo.

    Application Layer

  • 8/3/2019 IPG III DC Full Slides

    122/188

    Application Layer

    The application layer enables the user, whetherhuman or software, to access the network.

    It provides user interfaces and support for

    services such as electronic mail, remote fileaccess and transfer, shared databasemanagement, and other types of distributedinformation services.

    Responsible for providing services to the user

    Services provided by theli ti l

  • 8/3/2019 IPG III DC Full Slides

    123/188

    application layer Network virtual terminal. A network virtual

    terminal is a software version of a physicalterminal, and it allows a user to log on to aremote host.

    The user's computer talks to the softwareterminal which, in turn, talks to the host, andvice versa.

    The remote host believes it is communicatingwith one of its own terminals and allows theuser to log on.

    File transfer, access, and management.This

  • 8/3/2019 IPG III DC Full Slides

    124/188

    , , gapplication allows a user

    1. to access files in a remote host,2. to retrieve files from a remote computer for use inthe local computer, and

    3. to manage or control files in a remote computerlocally.

    Mail services.This application provides thebasis for e-mail forwarding and storage.

    Directory services.This application providesdistributed database sources and access forglobal information about various objects andservices.

    Summary of OSI layers functions

  • 8/3/2019 IPG III DC Full Slides

    125/188

    Layers of the TCPIIP and OSI architectures

  • 8/3/2019 IPG III DC Full Slides

    126/188

  • 8/3/2019 IPG III DC Full Slides

    127/188

    Advantages of standards

    1. Assures that there will be a large market for a particular piece of

    Equipment or software.2. Encourages mass production and, the use of large-scale-

    integration (LSI) or very-large-scale-integration (VLSI)Techniques, resulting in lower costs.

    3. A standard allows products from multiple vendors to

    communicate, giving the Purchaser more flexibility inequipment selection and use.

    Disadvantages :

    A standard tends to freeze the technology. By the time a standardis developed, Subjected to review and compromise, and

    promulgated, more efficient Techniques are possible. There are multiple standards for the same thing which gives rise

    to multiple conflicting of Standards.

    Service Primitives

  • 8/3/2019 IPG III DC Full Slides

    128/188

    Services between adjacent layers inOSI model are expressed inprimitives and parameters.

    Primitive specifies function to beperformed

    Parameters are used to pass dataand control information.

    Service Primitives Types Request: issued by service user to invoke some service

  • 8/3/2019 IPG III DC Full Slides

    129/188

    Request: issued by service user to invoke some serviceand pass parameters to specify fully the requestedservice.

    Indication: Issued by service provider either to 1. Indicate that a procedure has been invoked by

    the peer service user on the connection and to provide the

    associated parameters, or 2. notify the service user of a provider-initiated

    action

    Response: Issued by service user to acknowledge or

    complete some procedure previously invoked by anindication of that user.

    Confirm: Issued by service provider to acknowledge orcomplete some procedure previously invoked by a

    request by the service user.

    SWITCHING NETWORK Switching nodes provide facility that will move data

  • 8/3/2019 IPG III DC Full Slides

    130/188

    Switching nodes provide facility that will move datafrom node to node until they reach destination.

    They are connected in some topology. End devices wishing to communicate are called

    stations.

    Collection of nodes is called communication network.

    Some nodes have sole task of connecting to othernodes (internal switching of data).

    Some nodes have one or more stations attached.

    Network is not fully connected usually.

    To enhance reliability it is desirable to have more than

    one possible path. Switched networks are classified as:

    1. Circuit Switched

    2. Packet switched.

  • 8/3/2019 IPG III DC Full Slides

    131/188

    CIRCUIT

    SWITCHING

    CIRCUIT SWITCHINGD di t d i ti th b t t

  • 8/3/2019 IPG III DC Full Slides

    132/188

    Dedicated communication path between twostations.

    Path is a connected sequence of links betweennetwork nodes.

    On each physical link, a logical channel isdedicated to the connection.

    Communication involves three phases:

    1. Circuit establishment

    2.Data transfer

    3. Circuit disconnect

    Examples : Public Telephone Network, PrivateBranch Exchange (PBX)

    Circuit Establishment Before any signals can be transmitted, an end-to-end

    (station-to-station) circuit must be established.

  • 8/3/2019 IPG III DC Full Slides

    133/188

    (station to station) circuit must be established.

    Example: station A sends a request to node 4 requesting aconnection to station E.

    The link from A to 4 is a dedicated line, so that part of theconnection already exists.

    Node 4 must find the next leg in a route leading to node 6.Based on routing information and measures ofavailability node 4 selects the link to node 5, allocates a

    free channel on that link and sends a messagerequesting connection to E.

    Dedicated path has been established from A through 4 to 5.

    Number of stations may attach to 4, it must be able toestablish internal paths from multiple stations to multiplenodes.

    Node 5 dedicates a channel to node 6 and internally tiesthat channel to the channel from node 4.

    Node 6 completes the connection to E. In completing theconnection, a test is made to determine if E is busy or isprepared to accept the connection.

    Data transfer

    Information can now be transmitted from A through the

  • 8/3/2019 IPG III DC Full Slides

    134/188

    gnetwork to E.

    The data may be analog or digital, depending on the nature

    of the network.

    As the carriers evolve to fully integrated digital networks,the use of digital (binary) transmission for both voice anddata is becoming the dominant method.

    The path is A-4 link, internal switching through 4,4-5

    channel, internal switching through 5, 5-6 channel, andinternal switching through 6, 6 -E link. Generally, theconnection is full-duplex (FDX).

    Circuit disconnect

    After some period of data transfer, the connection isterminated by the action of one of the two stations.

    Signals must be propagated to nodes 4, 5, and 6 todeallocate the dedicated resources.

    LIMITATIONS

  • 8/3/2019 IPG III DC Full Slides

    135/188

    Connection path is established before data transmissionbegins. Thus,

    1. channel capacity must be reserved between each pair ofnodes in the path, and

    2. each node must have available internal switching capacityto handle the requested connection.

    The switches must have the intelligence to make theseallocations and to devise a route through the network.

    Channel capacity is dedicated for the duration of aconnection, even if no data are being transferred.

    For a voice connection, utilization may be rather high, but itstill does not approach 100 percent.

    For a terminal-to-computer connection, the capacity may beidle during most of the time of the connection.

    Performance: there is a delay priort i l t f f ll

  • 8/3/2019 IPG III DC Full Slides

    136/188

    to signal transfer for call

    establishment. But once the circuitis established, the network iseffectively transparent to the users.

    Information is transmitted at a fixeddata rate with no delay other thanthat required for propagationthrough the transmission links. Thedelay at each node is negligible.

    TechnologyLimitations:

  • 8/3/2019 IPG III DC Full Slides

    137/188

    1.Getting dedicated path itself is a

    problem.2.For end to end connection all

    intermediate nodes and links must

    be free.3.When any node/link is unavailable

    request gets a busy response.

    4. EconomicLimitations:Providing dedicated path is a costly

    affair

    Blocking

  • 8/3/2019 IPG III DC Full Slides

    138/188

    oc g Blocking occurs when network is

    unable to connect two stations asall possible paths are already inuse.

    Switches provide no intermediatestorage capacity.

    So blockage is possible on a circuit

    switch.

    Limited value addedf ti

  • 8/3/2019 IPG III DC Full Slides

    139/188

    function Line protocols which can regulate the

    traffic (flow control) are notavailable.

    Additional softwares and microcodemust be added to provide these

    value added functions.

    Constant data rate

  • 8/3/2019 IPG III DC Full Slides

    140/188

    Connection provides for transmissionat a constant data rate.

    Each of the two devices must

    transmit and receive at same andconstant data rate.

    Thus limits utility of network in

    interconnecting a variety of hostcomputers and terminals.

    Reordering not possible

  • 8/3/2019 IPG III DC Full Slides

    141/188

    When two or more packets aretransmitted, there is possibility thatthey reach destination in wrong

    order.

    Reordering of packets

    Examples Circuit switching was developed to handle voice traffic

  • 8/3/2019 IPG III DC Full Slides

    142/188

    Circuit switching was developed to handle voice trafficbut is now also used for data traffic.

    Public telephone networkis actually a collection ofnational networks interconnected to form theinternational service.

    Originally designed and implemented to serviceanalog telephone subscribers, the network nowhandles substantial data traffic via modem and isgradually being converted to a digital network.

    Private branch exchange (PBX), used tointerconnect telephones within a building or office.Circuit switching is also used in private networks-corporations or other large organizationsinterconnecting their various sites; these usuallyconsist of PBX system.

    Public telephone network Architectural components of a public telecommunications

  • 8/3/2019 IPG III DC Full Slides

    143/188

    network: -

    1. Subscribers:The devices that attach to the network. Mostsubscriber devices to public telecommunicationsnetworks are telephones, but the percentage of datatraffic increases year by year.

    2.

    3. Local loop: It is the link between the subscriber and the

    network, also called the subscriber loop. Almost all localloop connections used twisted-pair wire. The length of alocal loop is typically in a range from a few kilometersto a few tens of kilometers.

    4.

    5. Exchanges:The switching centers in the network. Aswitching center that directly supports subscribers isknown as an end office. An end office will support manythousands of subscribers in a localized area.

    6.

    Key requirements for voice traffic is that there must bevirtually no transmission delay and certainly novariation in delay

  • 8/3/2019 IPG III DC Full Slides

    144/188

    variation in delay.

    A constant signal transmission rate must bemaintained, as transmission and reception occur atthe same signal rate.

    These requirements are necessary to allow normalhuman conversation.

    Also the quality of the received signal must besufficiently high to provide, at a minimum,

    intelligibility. Circuit-switching technology has been driven by those

    applications that handle voice traffic.

    Public circuit-switchingnetwork.

  • 8/3/2019 IPG III DC Full Slides

    145/188

    Subscribers connectdirectly to an endoffice, whichswitches trafficb

  • 8/3/2019 IPG III DC Full Slides

    146/188

    betweensubscribers andbetween asubscriber andother exchanges.

    The other exchangesare responsible

    for routing andswitching trafficbetween endoffices.

    To connect two

    subscribersattached to thesame end office,a circuit is set upbetween.

    If two subscribers

    Digital Switch

    Provide a transparent (thatthere is a directconnection between

    Elements of a circuit-switch node

  • 8/3/2019 IPG III DC Full Slides

    147/188

    connection betweenattached pair of devices)signal path between any

    pair of attached devices.

    The connection must allowfull-duplex transmission.

    The network-interfaceelement represents thefunctions and hardwareneeded to connect digitaldevices, such as dataprocessing devices anddigital telephones, to the

    network.

    Analog telephones can also

    be attached if thenetwork interfacecontains the logic for

    converting to digital

    Functions of Control Unit

  • 8/3/2019 IPG III DC Full Slides

    148/188

    Establishes connections: done on demand-

    that is, at the request of an attached device.To establish the connection, the control unitmust handle and acknowledge the request,determine if the intended destination is free,and construct a path through the switch.

    Maintain the connection: The digital switch

    uses time-division principles, this may requireongoing manipulation of the switchingelements. The bits of the communication are

    transferred transparently (from the point ofview of the attached devices).

    Tear down the connection: either in response

    to a request from one of the parties or for its

    Circuit-switching device is blocking or non-blocking?

  • 8/3/2019 IPG III DC Full Slides

    149/188

    Blocking occurs when the network is unable to connect twostations because all possible paths between them are

    already in use.

    A blocking network is one in which such blocking is

    possible. A non-blocking network permits all stations tobe connected (in pairs) at once and grants all possible

    connection requests as long as the called party is free. When a network is supporting only voice traffic, a blocking

    configuration is generally acceptable, as it is expectedthat most phone calls are of short duration and thattherefore only a fraction of the telephones will beengaged at any time.

    When data processing devices are involved, these

    assumptions may be invalid. For example, for a data-entry application, a terminal may be continuously

    connected to a com uter for hours at a time

    Switching techniques internal to asingle

    circuit-switching node: SPACE-

  • 8/3/2019 IPG III DC Full Slides

    150/188

    DIVISION SWITCHING Space-division switching was originally developed

    for the analog environment and has been carriedover into the digital.

    The fundamental principles are the same,

    A space-division switch is one in which the signal

    paths are physically separate from one another(divided in space).

    Each connection requires the establishment of a

    physical path through the switch that is dedicatedsolely to the transfer of signals between the twoendpoints.

    Space-division switch

  • 8/3/2019 IPG III DC Full Slides

    151/188

    A simple crossbar matrix

    with 10 full-duplex I/Olines.

    The matrix has 10 inputs

    and 10 outputs; each

    station attaches to thematrix via one inputand one output line.

    Interconnection is

    possible between anytwo lines by enablingthe appropriatecrosspoint.

    A total of 100

    Limitations of crossbarswitch

  • 8/3/2019 IPG III DC Full Slides

    152/188

    switch

    The number of crosspoints grows withthe square of the number of attachedstations. This is costly for a largeswitch.

    The loss of a crosspoint preventsconnection between the two deviceswhose lines intersect at thatcrosspoint.

    The crosspoints are inefficientlyutilized; even when all of theattached devices are active, only a

    Multiple-stage Switches

  • 8/3/2019 IPG III DC Full Slides

    153/188

    Three-stage space-division switch

    ADVANTAGES

  • 8/3/2019 IPG III DC Full Slides

    154/188

    The number of crosspoints isreduced, increasing crossbarutilization. The total number of

    crosspoints for 10 stations isreduced from 100 to 48.

    There is more than one path throughthe network to connect twoendpoints, increasing reliability.

    LimitationsR i l t l

  • 8/3/2019 IPG III DC Full Slides

    155/188

    Requires a more complex control

    scheme.

    To establish a path in a single-stagenetwork, it is only necessary to enable

    a single gate. In a multistage network,a free path through the stages mustbe determined and the appropriategates enabled.

    It may be blocking. But a single-stagecrossbar matrix is nonblocking; thatis, a path is always available toconnect an input to an output.

    Time-division Switching All modern circuit switches use digital time-division

    techniques for establishing and maintaining

  • 8/3/2019 IPG III DC Full Slides

    156/188

    techniques for establishing and maintaining"circuits."

    Time-division switching involves the partitioning of alower-speed bit stream into pieces that share ahigher-speed stream with other bit streams.

    The individual pieces, or slots, are manipulated bycontrol logic to route data from input to output.

    TDM bus switching, and all digital switchingtechniques, are based on the use of synchronous

    time-division multiplexing (TDM).

    Synchronous TDM permits multiple low-speed bitstreams to share a high-speed line. A set of inputs issampled in turn. The samples are organized serially

    into slots (channels) to form a recurring frame ofslots, with the number of slots per frame equal tothe number of inputs. A slot may be a bit, a byte, orsome longer block.

    In synchronous TDM, the source and destination of thedata in each time slot are known. Hence, there is no

    need for address bits in each slot

    Each device attaches to the switchthrough a full-duplex line.

    These lines are connected throughcontrolled gates to a high-speed

  • 8/3/2019 IPG III DC Full Slides

    157/188

    g g pdigital bus.

    Each line is assigned a time slot forproviding input. For the durationof the slot, that line's gate isenabled, allowing a small burst ofdata onto the bus. For that sametime slot, one of the other linegates is enabled for output. Thus,

    during that time slot, data areswitched from the enabled inputline to the enabled output line.

    During successive time slots,different input/output pairings areenabled, allowing a number ofconnections to be carried over

    the shared bus. An attached device achieves full-

    duplex operation by transmittingduring one assigned time slot andreceiving during another.

    Advantages of CircuitSwitching

    Transparency: Sender and Receiver can use any

  • 8/3/2019 IPG III DC Full Slides

    158/188

    Transparency: Sender and Receiver can use anybit rate, format or framing method they

    want to. Carrier/trunks does not know orcare. This transparency allows voice, dataand fax to co-exist in one telephone system.

    Charging is based on distance and time and noton traffic.

    Reliability increases by the use of Multistageswitches.

    TDM Bus switching can accommodate lines ofvarying data rates.

    Once a circuit is established, it appears asdirect connection of two attached station, nospecial networking logic is needed at either

  • 8/3/2019 IPG III DC Full Slides

    159/188

    special networking logic is needed at eitherpoints.

    Delivery is guaranteed and sequential.

    Delays are small and constant.

    Communication takes place in real time i.e. canhandle real time traffic.

    Is not store and forward type of switching.

    (Switches provide no intermediate storagecapacity.)

  • 8/3/2019 IPG III DC Full Slides

    160/188

    MESSAGE

    SWITCHING

    MESSAGE SWITCHING Based on store and forward technology.

  • 8/3/2019 IPG III DC Full Slides

    161/188

    gy

    No dedicated physical path is established in advancebetween sender and receiver.

    When a node has a message block to send it is stored in thefirst switching office and then forwarded later to nextnode.

    Message hops from node to node.

    At each hop the entire message:1. Is received

    2. Is inspected for errors

    3. Temporarily stored in the secondary memory until a nextnode is available.

    Example User A sends a message to user B.

  • 8/3/2019 IPG III DC Full Slides

    162/188

    User A sends a message to user B. Links 1 and 2 are unavailable (either down or in

    use) for transmission. Message must be retransmitted through over

    links 3 and 4.

    Working:1.Message is transmitted from user A to the DTE

    (Data Terminal Equipment) at node 1 whereit is stored.

    2.When link 3 is free, message is read fromstorage at node 1 and is sent to node 3,where is stored.

    3.When link 4 is free, message is read fromstorage at node 3 and sent to node 2.

    4 Finally message is read from storage at node 2

    Message Switch

  • 8/3/2019 IPG III DC Full Slides

    163/188

    Is a specialized computer.

    Functions: -Accepts traffic from terminals and

    computers attached to it through dialup/leased telephone lines.

    Examines address in the header of themessage and switches (routes) thetraffic to receiving DTE.

    Can store the information due tostorage capability of switch.

    Do not support interactive (real time)

  • 8/3/2019 IPG III DC Full Slides

    164/188

    pptraffic. But message can be sent athigh speed by establishing priorityfor different types of traffic.

    High priority traffic is queued forshorter periods. This supportsinteractive (real time) traffic.

    Use tape files to perform back up of disk files. Operates with Master-slave Relationship.

    Switches perform Polling and selection to

  • 8/3/2019 IPG III DC Full Slides

    165/188

    Switches perform Polling and selection tomanage traffic coming into and going out.

    Example: User DTE A has data for user DTEB.

    1)Switches perform Polling and upon polling A

    2)Message is transmitted to the switch.3)Based on priority data are stored in one of

    several disk queues.

    4)Depending on overall traffic condition and

    message priority, switch dequeues themessage (message goes out of waitingqueue)

    5)Sends select command to C.

    6)At site C an acknowledgement is sent to switch.

    Advantages Queuing onto the disk provides a method of smooth traffic

  • 8/3/2019 IPG III DC Full Slides

    166/188

    Queuing onto the disk provides a method of smooth traffic(by queuing a low priority traffic during peak traffic

    periods).

    No real end to end path is created. This makes good use ofcommunication channels as no resources need to bereserved until the channels are available.

    Overcomes limitations of circuit switching in which linkefficiency was reduced due to non-storage capacity. Inmessage switching efficiency is increased as less numberof switches can serve more number of users.

    Supports interactive applications by using priority in

    queuing. Queuing method also smoothens traffic (flowcontrol) as we can queue up low priority traffic at peaktraffic period.

    Limitations

  • 8/3/2019 IPG III DC Full Slides

    167/188

    It is master-slave structure so if switches fails,entire network can be lost. It is only the

    switch where all network goes in and out.Note- To overcome this limitations many

    organizations provide a duplicate message

    switch, which can resume working if firstone fails.

    Due to arrangement of many message switchesthere is degradation of response time and

    decreased throughput.

    Does not utilize communication lines efficientlycompared to other techniques.

    Message blocks can be very long so largestorage capacities must be available at each

  • 8/3/2019 IPG III DC Full Slides

    168/188

    g pnode to buffer.

    When long messages are in processing shorter

    message have to wait for long, thusstarvation of short messages.

    Note Hence is not used in LANs.

    Waiting delay at nodes.

    Data is stored so do not support real time(interactive) communication.

    Due to unequal message lengths equal

    distribution of traffic is not ossible

    By priority and queuing, certainportion of the network are busy and

  • 8/3/2019 IPG III DC Full Slides

    169/188

    portion of the network are busy and

    can cause blocking of thetraffic/certain messages.

    These low priority blockedmessages/traffic are stored andlater routed to sites when they arefree to accept.

  • 8/3/2019 IPG III DC Full Slides

    170/188

    PACKET

    SWITCHING

    Introduction Much of the time the line is idle in a circuit-switching

    approach.

  • 8/3/2019 IPG III DC Full Slides

    171/188

    approach.

    In a circuit-switching network, the connection providesfor transmission at constant data rate. Thus the twodevices that are connected must transmit andreceive at the same data rate as the other; thislimits the utility of the network in interconnecting a

    variety of host computers and terminals. Packet switching is similar to message switching.

    System accepts packets from an information source,stores them in buffer memory and forward to next

    packet switch where same store and forwardoperation occurs.

    In a packet-switched network, there is no resource

    reservation; resources are allocated on demand.

    WORKING Data are transmitted inshort packets.

  • 8/3/2019 IPG III DC Full Slides

    172/188

    A upper bound on packetlength is 1000 bytes.

    If a source has a longer

    message to send, themessage is broken upinto a series of packets.

    Each packet contains aportion (or all for ashort message) of theuser's data plus some

    Header contains the control information that includesthe information like source and destination addressand packet sequence etc. to route the packet

  • 8/3/2019 IPG III DC Full Slides

    173/188

    and packet sequence etc. to route the packetthrough the network and deliver it to the intended

    destination.

    Trailer is a checksum used for error control.

    At each node en route, the packet is received, storedbriefly, and passed on to the next node.

    There is acknowledgement scheme between adjacent

    packet switches so that packets can beretransmitted if not acknowledged (when lost intransit) or negatively acknowledged (when error isdetected).

    Example Consider a packet to be sent

    from station A to stationE.

  • 8/3/2019 IPG III DC Full Slides

    174/188

    The packet will include

    control information thatindicates that theintended destination is E.

    The packet is sent from A tonode 4. Node 4 stores the

    packet, determines thenext leg of the route (say5), and queues the packetto go out on that link (the4-5 link).

    When the link is available,the packet is transmittedto node 5, which willforward the packet tonode 6, and finally to E.

    ADVANTAGES Line efficiency is greater, as a single node-to-

    node link can be dynamically shared by manyk t ti Th k t d

  • 8/3/2019 IPG III DC Full Slides

    175/188

    packets over time. The packets are queued up

    and transmitted as rapidly as possible over the link.(In circuit switching, time on a node-to-node link ispreallocated then much of the time, such a link maybe idle because a portion of its time is dedicated toa connection which is idle.)

    A packet-switching network can perform data-rate

    conversion. Two stations of different data ratescan exchange packets because each connects to itsnode at its proper data rate.

    No Blocking: When traffic becomes heavy on a

    circuit-switching network, some calls are blocked;the network refuses to accept additional connectionrequests until the load on the network decreases.On a packet-switching network, packets are still

    accepted but delivery delay increases

    Packet SwitchingTechniques

  • 8/3/2019 IPG III DC Full Slides

    176/188

    Datagram Packet Switching

    Virtual Circuit Packet Switching

  • 8/3/2019 IPG III DC Full Slides

    177/188

    Datagram

    PacketSwitching

    DatagramPacket

    Each packet is treatedindependently, with noreference to packets thathave gone before.

  • 8/3/2019 IPG III DC Full Slides

    178/188

    Switching

    Station A has a three-packet message to sendto E. It transmits thepackets, 1-2-3, to node4.

    On each packet, node 4must make a routingdecision.

    Packet 1 arrives for deliveryto E. Node 4 forward thispacket to either node 5or node 7 as the nextstep in the route.

    But for packet 3, node 4 finds that its queue fornode 7 is now shorter and so queues packet 3for that node.

  • 8/3/2019 IPG III DC Full Slides

    179/188

    So the packets, each with the same destinationaddress, do not all follow the same route.

    Note:The destination address in the header of apacket in a datagram network remains thesame during the entire journey of the packet.

    Thus it is possible that packet 3 will beat packet2 to node 6.

    Also possible that the packets will be deliveredto E in a different sequence from the one inwhich they were sent.

    It is possible for a packet to bedestroyed in the network Example if

  • 8/3/2019 IPG III DC Full Slides

    180/188

    destroyed in the network. Example, if

    a packet switching node crashesmomentarily, all of its queued packetsmay be lost.

    If this happen node 6 has no way ofknowing that one of the packets in thesequence of packets has been lost.

    It is up to E to detect the loss of apacket and figure out how to recoverit.

    In this technique, each packet, treated independently, andso called as a datagram (unit of data).

  • 8/3/2019 IPG III DC Full Slides

    181/188

    Datagram switching is a connectionless network. It is

    implemented in the network layer.Note - A connectionless network goes directly from an idle

    connection (two DTEs are not logically connected to eachother) into a data transfer mode, followed directly by idleconnection.

    Thus no connection establishment phase and connectionrelease phase in datagram approach.

    It does not have network-wide acknowledgements, flow

    control, error recovery. But these services are providedon a link by link basis.

    Also called Dynamic Routing.

    RoutingTable There are no setup or

    teardown phases, soeach switch (or packetswitch) has a routingtable which is based

  • 8/3/2019 IPG III DC Full Slides

    182/188

    table which is basedon the destinationaddress.

    The routing tables are

    dynamic and are

    updated periodically. The destination

    addresses and thecorresponding

    forwarding outputports are recorded inthe tables.

    This is different from the

    table of a circuit Datagram packetswitching

    Circuit switching

  • 8/3/2019 IPG III DC Full Slides

    183/188

    A datagram network withfour switches (routers)

  • 8/3/2019 IPG III DC Full Slides

    184/188

    ADVANTAGES Call setup phase is avoided. If a station wishes to send

  • 8/3/2019 IPG III DC Full Slides

    185/188

    Call setup phase is avoided. If a station wishes to sendonly one or a few packets, datagram delivery will bequicker.

    Faster than Message Switching so can be used in LANsfor supporting interactive traffic.

    The efficiency of a datagram network is better than

    that of a circuit-switched network as the resourcesare allocated only when there are packets to betransferred.

    Flexible If congestion develops in one part of thenetwork, incoming datagrams will be routed tosome other part away from congestion.

    Reliable If few nodes fails, packets find alternativeroute bypassing damaged node.

  • 8/3/2019 IPG III DC Full Slides

    186/188

    Enables dynamic use of bandwidth and providehigh robust services.

    An upper limit is placed on packet size so that no

    user can monopolize any transmission linemore than a few 10s of microsec.

    In case of multipacket message, each node can

    forward any packet of the multipacket message assoon as the packet arrives, it does not have to wait

    for the next packet. This decreases delay andincreases throughput.

    Small switching nodes as compared to

    electromechanical or computerized switching nodes

    is Circuit Switchin

    LIMITATIONS Each independent datagram is routed independently, so

    processing for each datagrams at each node is longer

  • 8/3/2019 IPG III DC Full Slides

    187/188

    processing for each datagrams at each node is longer.Thus long message datagrams does not hold good.

    Congestion avoidance is difficult, as resources are not reserved

    in advance and hence necessary BW and routing capacity is notavailable to arriving packets.

    Dynamics of traffic patterns in network and lack of timelyknowledge about those patters makes itdifficult for WANs.

    Overhead bits in each packet.

    Greater delayin a datagram network than in a virtual-circuit

    network. Although there are no setup and teardown phases,each packet may experience a wait at a switch before it isforwarded. Not all packets in a message necessarily travelthrough the same switches, the delay is not uniform for the

    ackets of a messa e

    Delay in a datagramnetwork

  • 8/3/2019 IPG III DC Full Slides

    188/188

    The packet travelsthrough twoswitches.

    There are threetransmission

    times (3T),threepropagationdelays (slopes3't of the lines),and two waiting

    ti (W1 +