Documente Academic
Documente Profesional
Documente Cultură
In this way there is no guarantee when data will reach, how many
retransmission data will reach, after how many drop will happen
There is only one guarantee whenever the communication will happen it
will be perfect.
Real Time Service:
Voice and Video are real time service, Stored Voice and stored video is
called as data, not service.
The voice from your mouth reaching ears till that time it is real
time.
The video from camera up to screen on that time it is real time.
Real time voice and video have very crucial things is a “ Quality
of experience”
IP World:
IP world is work on same frequency voice, video and data will work on
same frequency, Voice, Video and Data will flow in packet form.
Voice Service:
Voice is real time service, Voice is a delay sensitive (service)
communication. Voice is a low latency communication.
When I speak from my mouth I create analogue waive. My IP phone is a
digital phone he does not understand analogue signals. It has to convert
analogue to digital voice. Which means it has to convert in to binary. My
IP phone is a digital phone it will take voice samples digitized it
packetized it and send voice packet on the wire and other end my IP
phone will received packetized voice it will remove digitized voice and
join it and convert in to analogue and push it into ear.
In this way in voice communication voice flow in packet form on the
wire.
The voice packet size is very small 8Kbytes to 64Kbytes.
If any of these voice packets which are flowing on wire, if any one are
dropped, User experience does not get a hit (impact).
Video Service:
Video is a drop sensitive communication.
In today world cameras that we used are SD and HD video quality.
If you have SD camera your computer conferencing kit will generate
2.5Mb of file and if you using HD camera then you have create 8.5 Mb
files. This is H323 standard. This is a part 10 of H323. This is impact
standard.
Such a large file we can’t be send on a wire at one shot. So in videos
communication your video conferencing kit will break these large files in
to small-2 segment. It will deliver these segment on wire one after the
other.
Here I would rather than segment I will used word called as frame.
Because I am talking perspective of video conferencing kit.
So now what is the most important in video conferencing
(communication).
Sequencing of video frame.
In video communication to controlled the sequencing of video
frame.
1/100000 video frame drop is allowed.
Video conferencing software when it breaks the segment in the small -2
frames the same time where it breaking, create three type of frames, I,
B and P frames.
So when you many time watching video you suddenly see “Glitch”. You
find skip in the video. Skip is the happing of the glitch. Glitch is seen
where the B Frame is dropped. If videos have nothing to show so my
software is skip it.
Whenever you see a video, it stop suddenly after one second when the
video was stop, it will start. It means I Frame is dropped
It is very important to I Frame come to before B frame or we have I
Frame for their B Frame.
When P Frame dropped nothing happened.
Consolidation:
In converge architecture voice, video and data will flow in packet form.
They will flow on the same time in the same wire.
If voice, video and data these three services are going too simultaneously
on the same wire. Every service has different quality requirement
Voice says I can’t accept delay, video says I will not allowed drop and
data says I’m in sensitive.
When I am going to run these services on these medium, then we need to
have intelligence device. It need to classification and prioritization of
service.
Every device have to capabilities to classify the packet. Are the three
services are running in packet form so every device should able to
classified which packet is voice and which one is data and which is the
video packet. After classification it should have to capabilities of
prioritization. Which means providing quality as require by services.
Video says I don’t like drop then make sure you are not dropping video
packet. Voice packet say I don’t like delay then you have to prioritize
voice packet over any other packet.
If you running voice video and data three services simultaneously on
same medium a lot of intelligent is required.
Every device should be intelligent to classify and prioritized the
packet.
Classification and prioritization is called as quality of service and
quality of service is which mean quality as required by service, this
is only possible in IP enable network.
And hence converge architecture should be IP enable.
Scenario:
Voice, Video and data when these three services will come on the wire,
Always voice is delay sensitive. If quality of service is enable on my
device then it will send first voice packet and then after video and last
one is data.
Characteristics:
1. MAN/WAN should be capable of providing high to moderate
bandwidth connectivity limiting factor is cost.
Capacity Planning:
Example in bank perspective: Capacity planning is depends on our
services.
2- Cost of deploying MAN/WAN will be high, where links are leased
from service provider. CPEs on which links terminate can be leased or
own buy the owner of premises.
3- Owner of premises is owner of MAN/WAN. Where links are leased
from service provider.
4- Size of your city is size of your MAN. Municipal Corporation defines
your boundaries.
5- Services of your network defines architecture of your network. Next
generation MAN/WAN should be capable of providing voice, videos and
data triple play services over single converged infrastructure.
On MAN/WAN quality of services is more relevant, Quality of services
gets activated only when is bandwidth crunch. On LAN normally we
have high bandwidth available on cheap cost. Hence QOS is not so
important, but on MAN and WAN because circuit cost is very high and
we usually take laser capacity hence QOS which is in classification and
prioritization very important on MAN/and WAN.
6- Administrator control on LAN will be centralized. But on MAN/
WAN administrator control should be distributed but on MAN if the
services is not mission critical then can be centralized also.
Communication Technology:
Technology facilitates communication.
It does not communicate on your behalf.
Somebody has to use technology to communicate.
Technology will not communicate on its own.
GSM is a voice communication technology when we dial a GSM
number, it knows how to search for this number, whenever on this earth
under which ever cell site this phone is connected. It will search for this
phone and create a voice communication channel. But it will not pull
your voice from your mouth and push it into the ear. Somebody has to
use technology to communicate, in voice communication user directly
uses technology to communicate
There are two parts of technology:
Layer 1 Hardware: Anything that is in physical or physical in nature
used between two communicating devices to form a communication
channel is called as hardware. Things is like cable, wire, connecters,
pinout voltages, signal, boosting devices etc.
Layer 2: Software: logical, protocol that will drive communication over
the hardware.
Ethernet and Serial technology:
ON 100% LAN we use Ethernet technology.
Mostly on MAN and WAN we use serial technology.
Ethernet Technology:
LAN characteristics meet to Ethernet technology.
Ethernet technology is capable of providing high bandwidth, high
speed and high capacity communication.
Because:
Ethernet = 10 Mbps
Fast Ethernet = 100 Mbps
Gigabit Ethernet = 1000 Mbps (1Gbps)
10 Gigabit Ethernet = 10 Gbps
100 Gigabit Ethernet = 100 Gbps
Cost of deploying LAN should be cheap- It is very cheap because
if we want to create a network for 24 people, we have just spend
5000 of money.
Ethernet Medium for communication:
1-Electrical Medium (Copper Medium)
2-Optical Medium (Fiber Cable)
3-Wirelessly Medium
Ethernet have capabilities to cover area easily, first we will deploy
LAN in area of 2 KM, and we can used thick wire.
Thin wire, thick wire both cable are belongs to coaxial cable. These are
RG series cable. It provides 10 mbps speed. Used in bus topology and
devices are repeater and bridges.
Thick 10B5 > 10 mbps is based on 500 meter.
Thin 10B2 > 10 mbps is based on 200 meter.
Twisted pair cable are used in star topology. It provides 10, 100, 1000
and 10000 mbps speed. Used devices is Hub, Switch and Router.
10BT > Ethernet or 10 mbps is based on twisted pair.
100BT> Fast Ethernet or 100 mbps is based on twisted pair.
1000BT> Gigabit Ethernet or 1000 mbps is based on twisted.
10000BT>10 Gigabit Ethernet or 10000 mbps is based on twisted pair.
Ethernet Technology:
Ethernet Technology work on CSMA/CD fundamental
Standard - IEEE 802.3
Protocol - ARPA (on Cisco device)
CSMA/CD - Carrier sense multiple access/ collision
detection.
Ethernet technology innovated by funding of DIX
DIX - Digital, Intel, Xerox,
Innovation LAB -Paulo Aulto
CSMA
Two or more computers or communicating devices can get connected
over same medium.
All computers can communicate whenever they feel like. As if they are
in a democratic world.
But before a computer communicates it has to sense the medium.
If medium is available and not used by others, then computer can put its
frame on wire.
For that instance it is owner of the entire medium, at that instance no
other computer can talk.
When one computer talk, all other computer will listen, only that
computer will reply for whom the frame was sent.
Because when computer put frames on the wire it will apply SMAC and
DMAC to the data.
On receiving frame computers will check the DMAC, if it is meant for
them they will accept it or else discard it.
When two computer will sense the medium at the same time and found
medium is available and put their frame on wire. These frames on wire
will get converted in to electrical signals.
When two computer electrical signal on wire put at the same time, it will
get collided.
Electrical signal is form of energy that cannot be created and destroyed.
But after colliding it will distorted.
Distorted signal will not vanish off but after colliding it will resonate
back. It will be received by all the computer.
On receiving this collided signals layer 2 software will converted into
frame. And check CRC code it will not match because it’s collided
frame.
So layer two software will discard it as considering collided frames.
Collision detection from layer 1 perspective:
When two computers sense medium at the same time and found medium
is available and put their frame on wire.
These frame on wire will get converted in to electrical signals.
When two computer electrical signal on wire put at the same time, it will
get collided.
Electric signals is form of energy that cannot be created or destroyed.
But after colliding it will distorted.
Distorted signal will not vanish off but after colliding it will resonate
back. It will be received by the all computer.
Computer that was sending signal will suddenly realise whatever he is
sending is getting corrupted. It will immediately back off.
Computer that detected collision first now start pumping jamming
pattern.
When computer receive jamming pattern then all computer will back off.
Collision Avoidance:
On multi-access medium
If there are multiple communicating pairs, wanting to send multiple
segments.
It will never so happen that on acquiring the medium and computer will
put all their frames at one shot,
For every segment that computer has to send,
First it will have to sense the medium and push one frame at a time and
release the medium.
For next frame it will again have to sense the medium, if medium
available acquire it and put the next frame, in this way computer will
never push all its segments at one go.
If there are multiple communicating pair with multiple segment to be
delivered, then to deliver these segment they will keep binding to acquire
medium and keep colliding again and again.
So just detecting collision once will not help.
There has to be some collision avoidance mechanism.
How collision avoided: After collision computer will enter integral wait
state, computer calculate wait state on their own and it has nothing to do
with neighbours wait state. These wait state in micro sec and mile sec.
They are in multiple off 51.2 micro sec. As these wait state are integral,
computer can increase and reduce their wait state depending on collision,
Say for example: if computer receive more than 5 collision in a sec,
there are too many communicating devices wanting to communicate.
So as a good citizen it will increase its wait state there by providing more
time to other communicating devices to finish of their communication.
If lesser collision of happening the computer can also reduce its wait
state. When computer are waiting they cannot talk but can listen.
In our example after collision computer will enter respective wait state,
after collision first opportunity will be provided to DDD, its wait state
expire in 51.2 micro sec, for next 51.2 micro sec it is alone
communicator on the entire medium will sensing and pushing segment
one by one. After next 51.2 micro sec AAA and CCC will also come out
of their wait state and now all three computer will communicate on
medium,
Computer collision will seldom occur, but if it reoccurs then computer
will follow same process and back off. Even BBB will back off and all
computer will enter in new wait state. If collision does not occur then
after 153.6 micro sec democracy returns and all computer can
communicate at their wish.
In this way by interring in two wait state and providing other computer
more time to finish of communication, computer try to avoid further
collision.
In wire LAN collision detection and collision avoidance both are happen.
But in wireless communication will happen on 802.3 standard.
Wireless use RTS and CTS for their communication and in wireless
LAN CSMA/CA will happen, collision detection will not happen.
CSMA/CD and CA will happen in wire LAN.
CSMA/CA will happen on only wireless LAN.
In this way it is IP upper layer protocol stacks that is responsible for end
to end error free successful communication.
It is IP that is correct data, technology does not correct.
Punch Statement:
It is IP that is communicating on behalf of user using the technology
below.
Reverse Gear:
My Ethernet technology is ready for communication, but technology
does not communicates on its own, somebody has to use technology to
communicate.
IP upper layer protocol stacks (software) that drive communication over
the hardware (over the technology).
We have to define which IP upper layer protocol stacks will
communicate.
We will go in network card properties and select TCP/IP,
Once we select TCP/IP which means IP upper layer protocol stacks will
work on this network card.
Now it will ask for IP address, like technology does identify computer
with their MAC address.
Same like in IP upper layer protocol stacks identify computer with their
IP address. So we have to give IP address to network card.
We gives IP address to network card not on network card.
Once you allotted IP address to network card, it will create mapping of
IP address and MAC address and keep it in ARP table.
Layer 3 address is called as logical address,
Layer 2 address is called as physical address.
There are many types of table such as ARP table, Host table, Routing
table……. Etc
Final Flow:
User sitting on computer will say FTP 10.0.0.4 put ASH.JPG. Its means
user wants to send file to 10.0.0.4, and file name is ASH.JPG.
FTP will fetch 700 MB file from hard disk.
But it can’t be send 700 MB file at one shot.
Some software will make it small-small segment, some software will
mark it and some software will take segment one by one apply CRC
code.
IP upper layer protocol stacks will say to technology, go and deliver it to
10.0.0.4 .
Technology will say I can’t go because technology identify computer
with their MAC address not IP address.
IP upper layer protocol stacks identify computer with their IP address.
So now technology will ask for MAC address,
So in this scenario IP upper layer protocol stacks will take help of ARP
table.
ARP table is not IP upper layer protocol stacks tool, it is associated tool
of IP upper layer protocol stacks.
ARP tool maintain ARP table, computer will go in his ARP table and ask
what MAC address of 10.0.0.4.
Initially every computer keep mapping of their MAC address and IP
address in their ARP table.
So in this scenario it will say I have not MAC address of 10.0.0.4
So now computer will send ARP broadcast.
ARP broadcast means- Send IP request for MAC
So now all the computer will receive broadcast frame but only 10.0.0.4
will reply with their MAC address DDD.
Now computer will update in his ARP table with DDD, and again ask to
technology to deliver it.
Ping
Ping is a tool or application of IP upper layer protocol stacks that
is created to get network layer / IP layer / layer 3 status.
Ping sends ICMP echo packet to get the network layer status.
Ping is also used for fallowing
- To check connectivity
- To calculate latency ( Delay )
- To verify link quality ( Drops )
Result of PING may not be relevant for real time packets used over QOS
enabled path.
For QOS enabled path we can used IP packets with different size and
TOS (type of service) marking (184 for voice packet, 136 for videos
packet).
Local Host Address : Local host address is universal loop back address,
127.0.0.1 used by software developers
Local host address range 127.0.0.0 to 127.255.255.255
Reserved for NTP 127.127.7.1 (Network Time Protocol) used for time
synchronization
IP Flow :
Switch:
Operation No 1.
Operation No 2.
If sender and receiver are on the same port switch will discard the
frame,
Switch, switches between the ports not within the port.
If destination MAC is not known in MAC table, switch will create
multiple copy of frame and forward it to all other port.
Switch create multiple copy of frame in two scenario,
If it receives broadcast frame
If destination MAC in not known in MAC table.
If sender and receiver are on different ports, switch will bridge the
information to relevant port only not to all other port.
Switch allows simultaneous communication between multiple
communications pairs connected on different ports.
Switch work exactly as CSMA/CD rule, it will sense the port
before putting the frame on wire, It will check the CRC code on
receiving frame and so on.
But help of hardware it over comes the flow of CSMA/CD , that
says only one computer can talk at a time and everybody else will
listen.
Every port of switch has its own dedicated bandwidth, Switch is a
dedicated bandwidth device,
Every port of hub shared the same bandwidth, and Hub is a shared
bandwidth device.
IP communication is 2 types of communication, TCP and UDP
TCP is connection oriented communication (Guarantee delivery)
UDP is connection less communication (Non guarantee delivery)
TCP provides guarantee communication with help of ACK, if
ACK is not received within stipulated time, Sender will retransmit
if sender does not receive ACK after 3 successive retransmission,
then after session will be terminated.
Every port of switch in member of same broadcast domain, switch
is a single broadcast domain.
MTU :
Beat Serial technology or Ethernet technology there is a maximum
size of frame that can be put on the wire is called as MTU.
I want to send 700 MB file over network, Computer will break it
into the small-small segment and then add
DATA,SMAC,DMAC,SIP,DIP and CRC so one frame will get
created.
The maximum time to deliver entire 700 MB file is depends on
MTU.
Ideal MTU size = 1500 Bytes
Ethernet/Serial Technology some time( on transmission line ) =
1518 to 1519 bytes
Jumbo and Baby Jumbo frame size = 1564 to 1599 Bytes
If medium is 1GB or above 9004 to 9006 bytes.
MTU: MTU is every things else excluding Ethernet header.
CSMA/CD always check CRC code for each frame, in that case if
CSMA/CD will check CRC code for all frame then it will take
more processing power and will take more time to check all the
frame.
In that case if two computer put their frame on the wire, and these
frame are get collided, if the size of frame is 1500 bytes but after
colliding it may become three different size of frame.
Such as 1160 bytes, 1800 bytes and 40 bytes.
Type of collision frame:
RUNT < 64 bytes ( minimum size of frame where we can
feed Ethernet header is 64 bytes, if the size of frame is less
than 64 bytes is called as RUNT frame.
Layer 2 software will check size of frame and discard it as
considering RUNT frame.
You have application that creates jumbo frames that you should buy
switch that support jumbo frame, allow you to change its port MTU
using following command.
int f 0/1
IP MTU 1599
Uplink Port :
Uplink Port is High bandwidth Port.
Uplink port are high bandwidth port created for up linking
purpose. Up link to other switches and server.
We are used UP link port where some other server or some other
switch or network work with high load.
If a server or computer is connected to the uplink port or 1 GB or above
port that is created to 9004 to 9006 bytes size of frame. When frame will
come to ideal port which support 1500 bytes frame, it will discard it as
considered Giants frame.
So when frame comes higher MTU port to Lower MTU port
Punch Statement-
At layer 3- If destination network is not reachable computer
will discard the frame
At layer 2- If destination MAC add is not reachable, it will
send ARP broadcast, learn MAC address and there send of
you.
By default computers can communicate within same
subnet, if you want to get away from your network and
communicate with computers in other network, then you
have to take help of Gateway device.
Gateway device will help you get away from your network
and help you communicate with computers in other
network.
Consolidation:
10.10.10.10 /24
IP address is a 4 Octate, 4 Byte, 32 bit decimal address.
Stub router is a router with single exit point, on stub router instead of
writing individual static route we should use default route.
To default route command is
Ip route 0.0.0.0 0.0.0.0 10.0.0.1
RIP V1 RIP V2