Documente Academic
Documente Profesional
Documente Cultură
It consists of the
following layers://Application Layer that includes FTP(transferring files),
HTTP(accessing web pages), SMTP(for email service), MIME(for facilitating
file transfer such as image, video etc), SNMP(simple network management
protocol for managing the internet), TELNET(for accessing a remote
computer), BGP(for updating the routing table fro external routers),
DNS(getting ip addresses from domain name)//Host-to-Host (Transport
Layer): TCP, UDP//Internet Layer: IPv4, IPv6, ICMP(Internet control message
protocol, responsible for status control and report), OSPF(opens shortest
path first responsible for updating routing tables interior routing table),
RSVP(resource reservation protocol providing quality of service)//(Not a
part of TCP)Network Access Layer: Ethernet, Frame relay, ATM, Wi-FI, PPP,
SLIP//Network Access Layer is split into Data link layer and Physical
Layer//Protocols such as ICMP, OSPF, RSVP directly carried by IP//ARP(used
to discover mac address from Ip address)/RARP between Internet Layer and
Network Access Layer. Application Layer Handles communications
between applications and processes. Host-To-Host Layer//End to end
transfer of data//Flow and error control between process
communications//Connection between processes
Internet Layer//Routing of data packets. Network Access Layer//Media
Access Control//Physical transmission of signals//Error control and flow
control on a link by link basis. TCP//Destination Port Number//Sequence
Number//Acknowledgment Number//Window Size for Flow
Control//Checksum. IP//Destination Address//Options//Service
Request//Payload Type//Lifetime of packet. Ethernet Frame: (802.3 Header,
802.2 header, IP header, TCP header, Application layer header, Application
layer payload, 802.3 trailer). This frame is transmitted over Ethernet by
physical layer. IP version 4: IP is the widely used network layer protocol that
is responsible for routing packet from source to destination. IP provides a
datagram (connectionless) service, i.e., a best effort service that does not
guarantee the delivery of packets. IP does not provide any error or flow
control hence we need TCP protocol. IP supports various options including
source routing, route recording, and timestamp recording.IP supports
fragmentation and reassembly of packets to meet the maximum packet size
requirements on various networks. IPv4 Packet Header: (Version (4 or 6),
Header Length (header length could vary depending on the options), Diffserv
(DiffServ is Differential Services, a class-based mechanism to provide QoS on
IP networks. Traffic is classified into classes. Routers then handle various
class traffic differently) and ECN (ECN is Explicit Congestion Notification that
allows for notification of congestion. When a router detects congestion, it
sets the ECN bit to inform the source to slow down), Total Length (length of
the entire IP packet (including data) in octets), Identification (used for
identifying packets especially useful during fragmentation and reassembly),
flags (more flag, dont fragment flag and reserved), fragment offset (in (64
bits multiple) to indicate how the fragments can be joined to get the original
datagram) , time to live(Life time of a packet. Prevent packets from looping
endlessly. Typically represents hop count), protocol (code to identify the
protocol of the payload (e.g. TCP =6)), header checksum (16 bit checksum for
error detection in the header), source address, destination address, options
(security, source routing, route recording, time stamping) and payload.). Max
length of IP packet = 65,535 Octets or bytes
Five classes of IP addresses (now becoming obsolete given Classless Inter
Domain Routing (CIDR)). Class A (0 +7N + 24 H)(1-126). Class B (10 +14N +
16H)(128-191). Class C (110 +21N + 8H)(192-223). Class D (11110 + 19) // for
multicasting. Class E (111110 + 18) // Reserved. Subnet and subnet masks:
Subnets partition large organizational network address spaces into smaller
groups, with each subnet (group of addresses) having the same network
prefix. This leads to better utilization of addresses, as well as single entry in
the routing table. In the previous classful scheme, host portion of address
partitioned into subnet number and host number, with subnet masks used to
interpret the IP addresses- identifying host bits and subnet bits.Currently
with CIDR, a variable length subnet masking (VLSM) scheme used and
denoted by /N notation. This scheme allows for efficient use of IPv4
addresses, and aggregation of prefixes to enable fewer entries in the routing
tables.
One additional step Convert global uniqueness bit to local uniqueness bit 0010-cd-ff-ee-23-67-b8 02-10-cd-ff-ee-23-67-b8. IP Security (IPSec): A suite
of Layer 3 protocols that provide security to IP packets. Consists of
Authentication Header (AH) to verify that the data came from the right
source and was not modified. Encapsulating Security Payload (ESP) for
encrypting data. Internet Key Exchange (IKE) that allows communicators to
negotiate on choice of the authentication method, encryption method, and
key parameters used for secure communications. Transitioning from IPv4 to
IPv6: Dual Stack: Both IPv4 and IPv6 protocol stacks are present. Upgraded
nodes use IPv4 while communicating with IPv4 nodes only. Map IPv4 address
to IPv6 address. Tunneling mechanism whereby IPv6 packet sent inside an
IPv4 packet in networks supporting IPv4 only.
12. The need for a Transport layer: The network layer (IP) sends packets of
data to their correct destinations with best effort. Packets may get lost in
transit, therefore, network layer is not adequate for most applications to
work correctly. The maximum packet size in IP is 65,536 bytes, what happens
if the application wants to send a file of size 5,000,000 bytes? Need to break
files into smaller blocks at the sender end and re-assemble these blocks into
the file at the receiving end. Port addressing-Distinguish between
applications on computers. Transport Layer Services: Providing end-to-end
reliable delivery of data by taking data from the source application and
delivering it to the destination application. Multiplexing application layer
data over a single transport connection. Providing end-to-end flow control.
Recovering from crash. Ensuring ordered delivery of data. Providing
mechanisms to address applications. Segmenting application data. Transport
Layer Protocol Types: Connection oriented TCP (Reliable transfer of data,
Flow control, ordered delivery, High Overhead) Connectionless UDP (Best
Effort Service, Reliable delivery not guaranteed, No flow control or
sequencing of packets, Low Overhead Service) TCP Functions Reliability:
TCP recovers from network damage to dat. Basic mechanism (Receiver sends
a positive acknowledgment (ACK) if all goes well. If the ACK is not received
within a timeout interval, the sender retransmits the data). Datagrams may
also get duplicated (Sequence numbers help identify these duplicates).
Multiplexing: TCP supports multiplexing by carrying multiple application
layer messages to the same destination application over a single TCP
connection, which occurs over a specific TCP port. A network address and
port address together is called a socket. A pair of sockets uniquely identifies
each connection. Standard Ports: 80-web (http), 25: email (smtp), 443: SSL
(https), 445: microsoft-ds (smb), 20-ftp data, 21-ftp, 23-telnet to access a
remote computer, 53-domain name service DNS. TCP Sliding Window
Control: Flow control is the regulation by the receiver of the amount of data
the sender may send. Creates a sliding window at the sender. Packets that
have received permission for transmission are within the window. Window
slides as receiver acknowledges packets or modifies window size. TCP
Functions Connection Establishment: Before communication starts, sender
and receiver negotiate a set of sequence numbers to use in TCP, Called 3-way
handshake. Sequence numbers are core part of TCP. It is not a good idea to
reuse the same sequence numbers in succession. Creates problems in
detecting duplicates. Transmission Control Protocol (TCP) Header: source
port, destination port, sequence no (sequence number of the first byte
carried in the data), Ack no (valid if ACK flag is set. It is the sequence number
of the next byte that the receiver expects next. ACK 1079 implies that all data
till byte number 1078 have been received correctly), data offset (Size of the
header, indicates the starting position of data), reserved (Not used. Should
be set to 0), flags (URG, ACK, PSH flag when set pushes data in the buffer,
RST set to reset connection, SYN used to set 3 way handshake, FIN no more
data from sender), window (indicates the number of bytes that can be
received by the receiving side. Used in flow control), checksum (used for
error checking of header and data), urgent pointer (points to urgent data
when the URG flag is set), options (optional). User Datagram Protocol (UDP):
Defined in RFC 768 (1980). Many applications do not need TCP, e.g when
applications send very small amounts of data (DNS), Prefer speed to
reliability (voice). In these cases, if we can avoid TCP, we eliminate the
overhead of keeping track of sequence numbers, window sizes etc. it is a low
overhead protocol. UDP Header: Source port, destination port, Length,
stream and send it to the internet router. A filter built in the DSLAM unit can
separate voice and send it to phone switch. Combines voice and data signal
and sends it on the DSL line on the opposite direction. Located close to
customer or at the central office of Phone Company). ADSL channel config:
FDM is used to create sub channels bands between upstream and
downstream. In this case, a single bit stream is split into multiple parallel bit
streams and each portion is carried in a separate frequency band. Echo
cancellation is a signal processing technique that allows transmission of
digital signals in both directions on a single transmission line simultaneously.
In essence, a transmitter must subtract the echo of its own transmission
from the incoming signal to recover the signal sent by the other side. When
echo cancellation is used, the entire frequency band for the upstream
channel overlaps the lower portion of the downstream channel. This has two
advantages compared to the use of distinct frequency bands for upstream
and downstream: the higher the frequency, the greater the attenuation, and
echo cancellation design is more flexible for changing upstream capacity. The
disadvantage of the use of echo cancellation is the need for echo cancellation
logic on both ends of the line. Discrete Multitoned Modulation (DMT): Used
to create sub channels in the downstream frequency band. Use multiple
carrier signals at different frequencies to create 4KHZ subchannels. Based on
orthogonal frequency division multiplexing. Discrete multitone (DMT) uses
multiple carrier signals at different frequencies, sending some of the bits on
each channel. The available transmission band (upstream or downstream) is
divided into a number of 4-kHz subchannels. On initialization, the DMT
modem sends out test signals on each subchannel to determine the signalto-noise ratio (SNR). The modem then assigns more bits to channels with
better signal transmission qualities and less bits to channels with poorer
signal transmission qualities. Stallings DCC8e Figure 8.18 illustrates this
process. Each subchannel can carry a data rate of from 0 to 60 kbps. The
figure shows a typical situation in which there is increasing attenuation and
hence decreasing signal-to-noise ratio at higher frequencies. As a result, the
higher-frequency subchannels carry less of the load. Present ADSL/DMT
designs employ 256 downstream subchannels. In theory, with each 4-kHz
subchannel carrying 60 kbps, it would be possible to transmit at a rate of
15.36 Mbps. In practice, transmission impairments prevent attainment of
this data rate. Current implementations operate at from 1.5 to 9 Mbps,
depending on line distance and quality. Access Technology: Cable Modems:
Access service provided by cable companies. Residual bandwidth on either
side of TV signals used for data service without disturbing TV signal.
Symmetrical or asymmetrical. In case of asymmetrical, upstream data rate
can be as high as 10 Mbps, while downstream can be as high as 30 Mbps.
Downstream digital data placed on 6 Mhz TV channels. Shared Medium, data
rate determined by the number of active users attached to Access Node.
Data over Cable Service Interface Specifications (DOCSIS) 3.0 is a standard
that defines the interface requirements for operations and communication
support for data over cable. Uses TDMA for media access. Uses QAM for
modulating carrier signal. Cable Modem Network Components: Cable
Modem provides access to data signal over Cable TV system. Connects to
computer via an Ethernet interface. QAM, QPSK used for upstream data.
Headend Transmitter transmits TV signals and data signals on the cable.
Cable Modem Termination System (CMTS) offers similar functionality as
DSLAM, i.e., aggregating data traffic from multiple channels and sending it to
the router for transmission over Internet. Splitter separates TV signal from
data signal. At the head end there are servers for accounting and logging,
DHCP, and assigning IP address. What are some benefits of partitioning the
48-bit MAC addresses into 2 parts, with one part identifying the
manufacturer of the NIC? We can track the manufacturer and the location
details from the MAC address. Each combination of MAC address along with
manufacture ID is unique and hence we can avoid the duplicating issues. As
manufacturer information is globally embedded and maintained in MAC itself
it helps to reduce the overhead of costs. It avoids conflicts between interface
address and physical address as OUI is unique for each and every
manufacturer.