Professional Documents
Culture Documents
|
|
Source
1. Computer Networks, Andrew S.
Tanenbaum
2. www.cisco.com
3. www.novell.com
4. www.rad.com
5. www.3com.com
|
INTRODUCTION
| ë
Communications
Information can be distributed very quickly, such as
email and video conferencing.
avingoney
Resources such as information, software, and
hardware can be shared.
|
C
ë
Email
Chat
Web sites
Sharing of documents and pictures
Accessing a centralized database of information
Mobile workers
| ë
C
ubnet
Carries messages from host to host. It is made up
of telecommunication lines (i.e. circuits, channels,
trunks) and switching elements (i.e. IMPs, routers).
Hosts
End user machines or computers.
| ë CH
C
R otocolHieachies
Networks are organized as layers to reduce design
complexity. Each layer offers O O to the higher
layers. Between adjacent layers is an .
O ± connection oriented and
connectionless.
± defines which O and services
the lower layer will offer to the upper layer.
|
ëC
Aeneits
Interconnection of different systems (open)
Not limited to a single vendor solution
ëegativespect
Systems might be less secure
Systems might be less stable
|
ëC
Flow control
Frame format
IEEE LAN standards
Bridges
Switches (multi-port bridges)
|
ëC
Internetworking
Routing algorithms
Internet Protocol (IP) addressing
Routers
|
ëC
Main topics:
@
|
ëC
ession aye
a) Allows users on different machines to establish
O OOO between them.
2
b) One of the services is managing dialogue
control.
c) Token management.
d) Synchronization.
|
ëC
|
ëC
|
C
R eminologies
O ± active elements in each layer (e.g.
process, intelligent I/O chip).
O ± entities in the same layer on
different machines.
± Layer N.
O ± Layer N + 1.
OO
O ± places where layer N + 1
can access services offered by layer N.
|
C
Connection-ientedandConnectionless
± before data is sent, the
service from the sending computer must establish
a connection with the receiving computer.
eviceimitives
ð O ± entity wants the service to do some
work
± entity is to be informed about an event
ð OO ± entity responds to an event
± entity is to be informed about its request
Sending Computer Receiving Computer
nalogAandwidth
Measurement is in Hertz (Hz) or cycles/sec.
igitalAandwidth
Measurement is in bits per second (bps).
Q: Is 100MHz = 100Mbps?
Q: Is 100Mbps = 100MBps?
Hello
| AH Hello
PH AH Hello
SH PH AH Hello
TH SH PH AH Hello
NH TH SH PH AH Hello
DH NH TH SH PH AH Hello DT
Bits
|
|
1. Signals
Fourier analysis
Maximum data rate of a channel
2. Transmission Media
Guided and Unguided
3. Analog Transmission
Modulation
Modems
RS-232, RS-422
4. Digital Transmission
Encoding schemes
Repeaters and hubs
5. Transmission and Switching
R Multiplexing (FDM and TDM)
Circuit vs. packet switching
|
ë
R ouienalysis
a) All signals can be represented mathematically.
b) A periodic function can be constructed by adding
a number of sine and cosine functions.
K ± where f = 1/T
O ± integer multiples of the fundamental
frequency
± number of signal level changes per second
Q: Is baud and data rate different terms?
R
Q: Is 1 baud equal to 1bps?
|
ë
aximumataateoaChannel
Nyquist
Maximum data rate = 2 log2 (bits/sec)
H = line bandwidth
V = a signal with V discrete levels
Example:
A noiseless 3kHz channel cannot transmit binary (2
level) signals at a rate faster than 6000bps
2() log2 6000bps
logAV = (1 / ln A) ln V
R
|
ë
Shannon
Maximum data rate (bits/sec) = log2(1+ PS/PN)
H = line bandwidth
PS = signal strength in watts
PN = noise strength in watts
Example:
A 3kHz channel with a noise ratio of 30dB
(PS/PN = 1000) cannot transmit at a rate faster
than 30,000bps
() log2(1001) 30,000bps
ë
R uided
Data is sent via a wire or optical cable.
Twisted Pair
Two copper wires are twisted together to reduce
the effect of crosstalk noise. (e.g. Cat5, UTP, STP)
Baseband Coaxial Cable
A 50-ohm cable used for digital transmission. Used
in 10Base2 and 10Base5.
Broadband Coaxial Cable
A 75-ohm cable used for analog transmission such
R as Cable TV.
| ë
ë
R
* Fiber optic cables are difficult to tap (higher security)
and are normally used for backbone cabling.
| ë
ë
nguided
Data is sent through the air.
Line-of-sight
Transmitter and receiver must ³see´ each other,
such as a terrestrial microwave system.
Communication Satellites
A big microwave repeater in the sky. Data is
broadcasted, and can be ³pirated.´
Radio
Term used to include all frequency bands, such as
R
FM, UHF, and VHF television.
| ë ë
ë
R odulation
Modulating a sine wave carrier to convey data.
Amplitude Modulation (AM)
Amplitude is increased/decreased while frequency
remains constant.
ë
odems
A device that accepts digital signals and outputs a
modulated carrier wave, and vice versa.
It is used to interconnect the digital computer to the
analog telephone network.
R
| ë ë
ë
-and
-
Two well known physical layer standards.
RS-232
20 kbps
Cables up to 15 meters
Unbalanced transmission (common ground)
RS-422
2 Mbps at 60 meters
1 Mbps at 100 meters
Balanced transmission (a pair of wires for Tx, Rx)
R
|
ë
ë
R ncoding
chemes
Converting logical data into electrical signals
suitable for transmission.
Manchester
Mid bit transition for clock synchronization and
data
Logic 0 = high to low transition
Logic 1 = low to high transition
ë
epeatesandHubs
These are physical layer devices.
Repeaters
Restores the strength of an attenuated signal.
Used to increase the transmission distance.
Does not filter data traffic.
Hubs
Multi-port repeater.
Interconnects several computers.
Does not filter data traffic.
R
|
R
hotestath
&()* %(&)*
& %
(+)+*
(')*
(')*
'()*
'
A±E ± D± F
A ± E ± F is the answer.
|
ë
H
looding
Packet to IMP C
Packet IMP Packet to IMP D
B Packet to IMP E
|
ë
Format
xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
where x is either 0 or 1
Example 1:
11111111. 11111111.00000000.00000000
255.255.0.0
Example 2:
11111111. 11111111.10000000.00000000
255.255.192.0
|
ë
Example 3:
IP address of computer 180.100.7.2
Mask 255.255.192.0
Network address 180.100.0.0
|
ë
Mask
Invalid
255.1.0.0
255.0.255.0
255.255.64.0
200.255.0.0
|
ë
Subnets
The Internet is running out of IP address. One solution
is to subnet a network address.
This is done by borrowing host bits to be used as
network bits.
Example:
Class B mask 255.255.0.0
Borrowing 1 bit gives a subnet mask of 255.255.128.0
Borrowing 2 bits gives a subnet mask of 255.255.192.0
Borrowing 3 bits gives a subnet mask of 255.255.224.0
Borrowing 4 bits gives a subnet mask of 255.255.240.0
|
ë
Example:
Given an IP address of 180.200.0.0, subnet by
borrowing 4 bits.
Subnet mask = 255.255.240.0
The 4 bits borrowed are value 128, 64, 32, 16. This will
create 16 sub networks, where the first and last will be
unusable.
Sub network address:
180.200.0.0
180.200.16.0
180.200.32.0
180.200.48.0
180.200.64.0
etc«
|
ë
180.200.16.1 to 180.200.31.254
180.200.31.255
|
,-$--$-$- -$$$-