CN Module-I
CN Module-I
Network Software
In the early stages of computer network development, hardware predominated over software
considerations. This approach is no longer effective. Presently, network software is heavily
structured. Most networks are set up as a stack of layers or levels, with each layer building on
top of the one below it. This makes them easier to organize. From network to network, the
number of levels, the name of each layer, the contents of each layer, and the job of each layer
are all different.
The job of each layer is to provide certain services to the layers above it while keeping those
layers from knowing the particulars of how the services are delivered.
Layer n on one machine has a conversation with layer n on another machine. The rules and
conventions that these two machines follow are called the layer n protocol. A protocol is
essentially an agreement between communicative parties on how communication should
proceed. Peers are the entities that make up the matching layers on various machines. The
protocols are used by the peers to communicate with one another.
There is no straight transfer of data from layer n on one machine to layer n on another
machine.
Each layer instead sends control and data information to the layer below it, all the way down
to the lowest layer. The physical medium that transmission actually takes place is below layer
1. Actual communication is shown by straight lines, and virtual communication is shown by
dashed lines. An interface exists between each pair of neighboring layers. The interface
specifies which primitive operations and services are made available to the upper layer by the
lower layer. Each layer has an own set of functions. Interfaces that are clean and unambiguous
also make it easier to replace one layer with an entirely different protocol or implementation.
A network architecture is a collection of layers and protocols.
Each process may include some information known as a header that is exclusively intended
for its peer. This data is not transmitted to the layer above. Control information like as
addresses, sequence numbers, sizes, and times are included in the header. An application
process at layer 5 generates a message, M, which is sent to layer 4 for transmission. Layer 4
adds a header to the message and forwards the result to Layer 3. In many networks, there is
no limit on the size of messages sent using the layer 4 protocol. However, the layer 3 protocol
almost always has a limit. So, layer 3 has to separate the received messages into smaller
pieces called packets and add a layer 3 header to each packet. M is split into two parts, M1
and M2, which will be sent separately in this case. Layer 3 selects which of the lines to use for
sending data and sends the packets to Layer 2. Layer 2 gives each piece both header and a
trailer, and then sends the whole thing to Layer 1 to be sent physically. At the recipient
machine, the message moves from one layer to the next, and as it goes up, headers are
stripped off. Below layer n, none of the headers are sent up to layer n.
Design Issues for the Layers
Reliability is a design issue of constructing a network that functions accurately in spite of
having a collection of unreliable components. Consider the packet traverse in the network. It
is possible that some of these bits may be received in an inverted state due to noise, hardware
defects, software errors, and so forth. How do we manage to locate and rectify these errors?
One approach to identifying errors in received data involves the use of error detection codes.
If information is received wrongly, it can be sent again until it is received correctly. Error
correction is possible with stronger codes by adding redundant information.
There are often more than one way for transferring data from one place to another, and in a
big network, some links or routers may not work. The decision should be made immediately
by the network. We call this subject "routing."
Due to the large number of computers comprising the network, every layer must incorporate
a means of detecting the senders and receivers associated with a specific message. This
process is called as addressing. It is a fact that some communication channels will
not maintain the sequence of messages transmitted through them, requiring the
implementation of message numbering solutions. Differences in the maximum message size
that can be transmitted across networks are another example. As a consequence,
mechanisms are developed to disassemble, transmit, and subsequently reassemble
messages. The collective term for this subject is internetworking.
How can a quick sender avoid sending too much data at once to a slow receiver? It is common
to employ feedback from the recipient to the sender. We refer to this topic as flow control.
Oversubscriptions can occur when an excessive number of computers attempt to transmit an
excessive amount of traffic, surpassing the network's capacity to deliver. The term used for
this condition is called as congestion.
The final design consideration is the network's protection against various types of threats.
One of such risk relates to the eavesdropping of communications. Confidentiality-preserving
mechanisms serve as protection against this danger. The implementation of authentication
mechanisms serves to prevent attempts at fraud identities. Additional integrity mechanisms
serve to prevent modifications made to messages.
Connection-Oriented Versus Connectionless Service
Connection-oriented and connectionless services are the two forms of services that layers can
provide to the layers above them. The telephone system serves as the example for
connection-oriented service. To speak with someone, you pick up the phone, dial the number,
speak with them, and then hang up. Similarly, to use a connection-oriented network service,
the service user first establishes a connection, then uses it, and then releases it. In the
majority of instances, the order of transmission is maintained to ensure that the bits are
received in the same sequence as they were originally transmitted. The connectionless service
is designed based on the conceptual framework of the postal system. Every individual
message, in the form of a letter, contains the whole destination address. These messages are
then directed through the intermediate nodes within the system, irrespective of subsequent
messages. Each type of service can be further classified based on its level of reliability. Certain
services can be considered reliable due to their ability to maintain data without any loss.
Typically, the establishment of a reliable service requires the integration of a mechanism
wherein the recipient acknowledges the receipt of every message, so providing assurance to
the sender of its successful delivery. The process of being acknowledged involves additional
costs and time delays, which are often considered reasonable, while occasionally considered
undesirable.
File transfer is a common scenario where a reliable connection-oriented service is suitable.
The file owner wants to be sure that everything comes in the exact same sequence that it was
sent in.
Two slight variations of reliable connection-oriented services are byte streams and message
sequences.
The message boundaries are maintained in the former version. Two 1024-byte messages
never arrive as a single 2048-byte message when they are transmitted; instead, they arrive as
two separate 1024-byte messages. In the latter case, there are no message boundaries and
the connection is just a stream of bytes. It is impossible to determine if 2048 bytes were sent
as two 1024-byte messages or as a single 2048-byte message when they reach the recipient.
The acknowledgement-induced transit delays are unacceptably long for some
applications.For instance, a few incorrect pixels during a video conference won't affect the
transmission; however, it will irritate the viewer if the image jerks as the flow stops and begins
to rectify faults. Not every application needs to be connected. A method for sending a single
message with a good chance of arriving but no guarantee is all that is required. Datagram
service is a common term for connectionless services that are unreliable (i.e., not
acknowledged).In certain cases, it is not desirable to connect in order to transmit a single
message, but reliability is crucial. For these applications, the acknowledged datagram service
can be offered. It functions similarly to obtaining a return receipt for a registered letter sent.
The sender is certain that the letter was delivered to the appropriate recipient and wasn't
misplaced when the receipt is returned. Particularly in real-time applications like multimedia,
the inevitable delays in delivering reliable service would not be acceptable. These factors lead
to the coexistence of reliable and unreliable communication.
OSI reference mode
The ISO proposed this concept as a first step towards international standardisation of layer
protocols.
The ISO OSI (Open Systems Interconnection) Reference Model connects open-communication
systems.
Physical Layer: Raw bits are sent via a communication channel by the physical layer. What
electrical impulses indicate 1 and 0, and how long do bits last? Can two-way transmission
occur simultaneously? How is the initial connection made and broken when both sides are
done? Number and purpose of network connector pins. Mechanical, electrical, and timing
connections and the physical transmission medium underlying the physical layer are the main
design issues.
Data link Layer: Its primary responsibility is to provide error-free information transfer. In
order to complete this task, the transmitter must divide the input data into data frames and
deliver the frames one after the other sequentially. The receiver sends back an
acknowledgement frame to verify that each frame was received correctly, indicating that the
service is reliable. How to prevent a fast transmitter from drowning a slow receiver with data
is another problem that occurs at the data link layer. In the data link layer, broadcast networks
also face the problem of controlling access to the shared channel. This issue is addressed by
the medium access control sublayer, a unique sublayer of the data link layer.
The internet layer specifies an official packet format and protocol known as IP (Internet Protocol), as
well as a companion protocol known as ICMP (Internet Control Message Protocol), which helps in its
operation.
The internet layer's job is to get IP packets to where they need to go. Clearly, packet routing is a
significant issue here.
Transport Layer: In the TCP/IP model, the layer above the internet layer is now commonly referred
to as the transport layer. It is intended to allow peer entities on the source and destination hosts to
converse in the same way that the OSI transport layer does. Here, two end-to-end transport
protocols are defined. TCP (Transmission Control Protocol) is a reliable connection-oriented protocol
that allows a byte stream from one machine to be sent without error to any other machine on the
internet. It divides the incoming byte stream into discrete messages and forwards them to the
internet layer. The receiving TCP process at the destination reassembles the received messages into
the output stream. TCP also handles flow management to ensure that a fast sender does not
overwhelm a slow receiver with messages that it cannot handle. UDP, the second protocol in this
layer, is an unreliable, connectionless protocol designed for applications that do not require TCP's
sequencing or flow control. Applications where speed is more critical than accuracy, such as
transmitting speech or video.
Application Layer: There are no session or presentation levels in the TCP/IP architecture. The
application layer stands above the transport layer. All of the higher-level protocols are included in it.
The first ones were electronic mail (SMTP), file transfer (FTP), and virtual terminal (TELNET). The
Domain Name System (DNS), which maps host names to their network addresses, HTTP, which
retrieves pages from the World Wide Web, and RTP, which transfers real-time media like audio and
video, are a few of the most important ones that we will examine.
One potential weakness of the system was that the destruction of several critical toll offices could
result in its fragmentation into numerous isolated islands. To address this challenge ARPANET was
designed. The subnet would be made up of 56-kbps transmission lines connecting minicomputers
known as Interface
The software was divided into a host and subnet parts. The subnet software comprised the IMP-IMP
protocol, the source IMP to destination IMP protocol, and the IMP end of the host-IMP connection,
all of which were intended to increase reliability. In addition to the subnet, application software and
the host-host protocol were required externally.
Message Processors or IMPs. Each IMP would be linked to at least two additional IMPs for maximum
reliability. Messages in a subnet may be automatically diverted along different paths even if some
lines and IMPs were destroyed. Each network node was to be made up of an IMP and a host in the
same room, linked by a short wire. A host could send up to 8063-bit messages to its IMP, which
would then divide them into packets of no more than 1008 bits and forward them independently
towards the destination. The subnet was the first electronic store and forward packet-switching
network since each packet was received in its entirety before being forwarded. The ARPANET
protocols that were in use at the time were not designed to run across several networks. The
discovery of the TCP/IP model and protocols was the result of additional research on protocols
motivated by this observation. TCP/IP was created specifically to manage internetwork
communication, which became important as more and more networks were connected to the
ARPANET.
Cat 5 cables replaced previous Category 3 cables with a similar cable that has more twists per metre
but utilises the same connector. More twists result in reduced crosstalk and higher signal quality
over longer distances, making the cables more suitable for high-speed computer connection.
Coaxial cable: It can cover farther at faster rates than unshielded twisted pairs because it has
stronger shielding and a wider bandwidth. In general, two types of coaxial cable are utilised. If the
purpose of the cable is for digital transmission, 50-ohm cable is frequently utilised. Cable television
and analogue transmission are two common uses for 75 ohm cable. A coaxial cable is made up of a
strong copper wire core that is surrounded by an insulating layer. A cylindrical conductor, commonly
in the form of a tightly woven braided mesh, surrounds the insulator. The outside conductor is
protected by a plastic sheath.
The bandwidth is determined by the cable's quality and length. Modern cables have bandwidths of
many GHz. Cable television and metropolitan area networks continue to depend heavily on coax.
Fiber Optics: Fibre optics are used in network backbones, high-speed LANs, and high-speed Internet
access like FttH (Fibre to the Home).The light source, transmission medium, and detector are the
three main components of an optical transmission system. A light pulse represents a 1 bit, whereas
the absence of light represents a 0 bit. The transmission medium is a glass fibre that is extremely
thin. When light strikes the detector, it generates an electrical pulse. By connecting a light source to
one end of an optical fibre and a detector to the other, we can make a one-way data transfer system
that takes an electrical signal, changes it into light pulses, sends them, and then changes the output
back to an electrical signal at the receiving end.
The path of a light ray changes when it goes from one material to another, like silica to air. Here we
see a light ray incident on the boundary at an angle α1 emerging at an angle β1. The amount of
refraction depends on the properties of the two media.
When the angle of incidence is above a certain critical angle, the light is bent back into the silica and
doesn't get out into the air. So, a light ray that hits the fibre at or above the critical angle gets stuck
inside it and can travel for many kilometres with almost no loss. The glass core through which light
propagates is located in the centre. To keep all of the light in the core, the core is surrounded by a
glass cladding with a lower index of refraction than the core. The cladding is then protected by a thin
plastic jacket. Fibres are normally bundled together and protected by an outer sheath.
Comparison of Fiber Optics and Copper Wire:
Fibre offers a lot of benefits. It can tolerate significantly larger bandwidths than copper, to start.
Because there isn't much loss, repeaters are only needed every 50 km on long lines, compared to
every 5 km for copper. This saves a lot of money. Fibre is also better because it doesn't get damaged
by power spikes, electromagnetic interference, or power outages. It is important for harsh factory
environments that it is not affected by chemicals in the air that erode away at metal. Copper is a lot
heavier than fibre. It costs considerably less to install. Fibres are hard to tap and never allow light
through. Because of these features, fibre is very safe from individuals who might try to tap. Finally,
fibre interfaces cost more than electrical interfaces.
Wireless Transmission
Twisted pair, coax, and fibre optics are useless to mobile users. They require data without being
bound to terrestrial communication infrastructure. Wireless communication is the solution for these
consumers. In some cases, wireless has advantages over fixed equipment. If running fibre to a
building is difficult because of the geography (mountains, jungles, etc.), wireless may be preferable.
Electromagnetic Spectrum: Electrons generate electromagnetic waves that can travel over space.
These waves were predicted in 1865 by British physicist James Clerk Maxwell and first observed in
1887 by German scientist Heinrich Hertz. The frequency, f, of a wave is measured in hertz (Hz) and
is defined as the number of oscillations per second. The wavelength is defined as the distance
between two successive maxima (or minima). When an appropriate-sized antenna is connected to
an electrical circuit, electromagnetic waves can be broadcast efficiently and received by a receiver
located some distance away. This idea drives all wireless communication.
In a vacuum, all electromagnetic waves, regardless of frequency, travel at the same speed. This is
commonly referred to as the speed of light. The fundamental relation between f, λ, and c (in a
vacuum) is λf = c
100-MHz waves, for example, are around 3 metres long, 1000-MHz waves are roughly 0.3 metres
long, and 0.1-meter waves have a frequency of 3000 MHz. By changing the waves' amplitude,
frequency, or phase, information can be sent through radio waves, microwaves, infrared light, and
visible light. Due to their higher frequencies, ultraviolet light, X-rays, and gamma rays would be even
more ideal; however, they are hazardous to living organisms, difficult to generate and modulate, and
do not transmit effectively through buildings.
Radio Transmission: Radio frequency (RF) waves are often used for communication both indoors
and outdoors because they are simple to produce, can travel great distances, and can easily
penetrate walls.
Additionally, because radio waves are omnidirectional—that is, they can travel in any direction
from their source—physical alignment between the transmitter and receiver is not necessary. The
characteristics of radio waves vary with frequency. Radio waves can easily go through obstructions
at low frequencies. Radio waves at high frequencies typically bounce off obstacles and go in
straight lines. As the distance from the source increases, the RF signal's energy abruptly decreases.
We refer to this attenuation as "path loss." Rain also absorbs radio signals at high frequencies.
Radio waves in the VLF, LF, and MF bands follow the earth. These bands allow radio waves to
readily pass through buildings. Ground waves are absorbed by the earth in the HF and VHF
frequencies. However, waves that reach the ionosphere, a layer of charged particles that circles
Earth at a height of 100 to 500 km, are refracted and returned to the earth.
Microwave Transmission: Because these waves travel in roughly straight lines, they can be narrowly
directed. Using a parabolic antenna to concentrate all of the energy into a narrow beam. Both the
transmitting and receiving antennas must be precisely aligned. Multiple transmitters lined up in a
row can communicate with multiple receivers in a row without interfering, as long as specific
minimum spacing restrictions are followed. Since microwaves move in a straight line, the earth will
obstruct the path if the towers are too far apart. Repeaters are therefore occasionally required. The
maximum distance between towers increases with height.
Microwaves, unlike lower-frequency radio waves, do not travel well through buildings. Furthermore,
even if the beam is well concentrated at the transmitter, there is still some divergence in space. Some
waves may be refracted off low-lying air layers and thus arrive slightly later than direct waves. When
the delayed waves come out of phase with the direct wave, the signal is cancelled. This is known as
multipath fading, and it is frequently a major issue. Microwave transmission is used for like long-
distance phones, cell phones, and TV distribution. It's better than fibre in many ways. The main one
is that you don't need to lay down wires. Every 50 km, buy a small piece of land and put a radio tower
on it. The microwave is also not too expensive. Burying 50 km of fibre cable through a busy city or
up over a mountain might cost more than putting up two simple towers with antennas on each one.
Infrared Transmission: Infrared waves are often used for short-range contact. Infrared is used for
contact between TV, VCR, and stereo remote controls. They are cheap, easy to make, and good at
pointing in the right direction, but they can't go through solid things, which is a big problem. On the
other hand, it's a good thing that infrared waves don't easily pass through concrete walls. It means
that an infrared system in one room of a building won't affect a similar system in rooms or buildings
next door. For example, you can't use your remote to control your neighbour’s TV. An infrared
system does not need a licence from the government to work. Radio systems, on the other hand,
need a licence to work outside of the ISM bands.
Light Transmission: Free-space optics, also known as unguided optical signalling, has been used for
a very long time. Lasers on the roofs of two buildings can be used to join their LANs, which is a more
modern use. Laser-based optical signalling can only go in one direction, so each end needs its own
laser and photo detector. This plan has a very wide bandwidth for a very low price. It is also pretty
safe because it is hard to tap a narrow laser beam. It is also relatively simple to set up and does not
necessitate an FCC licence.
The laser's advantage, an extremely narrow beam, but also its disadvantage here. Aiming a laser
beam 1 mm broad at a 500-meter-away target the size of a pin head necessitates precision. Wind
and temperature variations can cause the beam to distort, and laser beams cannot penetrate rain or
severe fog, even on sunny days.
Switching-Circuit switching
The phone system is made up of two main parts: the outside plant, which includes the local loops
and trunks because they are not inside the switching offices and the inside plant, which includes the
switches that are inside the switching offices. There are two types of switching that are used by
networks today: packet switching and circuit switching. When you make a phone call, the telephone
system's switching equipment searches for a physical path from your phone to the receiver's phone.
This is referred to as circuit switching.
A carrier switching office is represented by each of the six rectangles. Each office has three incoming
and three outgoing telephone lines. A physical connection is formed between the line on which the
call came in and one of the output lines when a call travels through a switching office. Once a call is
set up, there is a fixed path between both ends that will stay open until the call is over. There can be
up to 10 seconds between when the phone stops dialling and when it starts to ring. This can be longer
for foreign or long-distance calls. During this time, the phone system is looking for a path to connect.
The one and only delay after setup is the electromagnetic signal propagation time, roughly 5 ms per
1000 kilometres. The established path prevents congestion—once the call is made, you never get
busy signals. Full bandwidth is reserved from sender to receiver. Data that follows the same path
cannot arrive out of order.
Switching: Packet Switching
Packets are sent as soon as they are available using this method. There is no need to plan ahead of
time for a particular route. Routers must use store-and-forward transmission to transmit each packet
on its own path to the destination. With packet switching there is no fixed path, thus distinct packets
can travel various routes, depending on network conditions at the time they are transmitted, and
they may arrive out of order.
Packet-switching networks place a tight upper limit on the size of packets. The first packet of a long
message can be forwarded before the second one has fully arrived. However, the store-and-forward
delay of accumulating a packet in the router’s memory before it is sent on to the next router exceeds
that of circuit switching. Because no bandwidth is reserved with packet switching, packets may have
to wait to be forwarded. If multiple packets are sent at the same time, this causes queuing delay and
congestion. If a circuit is dedicated for a certain user but there is no traffic, the bandwidth is wasted.
It can't be used for anything else. Because packet switching does not waste bandwidth, it is more
efficient from a system viewpoint. Circuit switching is less tolerant of errors than packet switching.
All circuits that are utilising a failed switch are terminated, preventing the transmission of any further
traffic on any of them. Packet switching facilitates the bypassing of dead switches for packets.