telecommunication and computer networks

Upload: am

Post on 21-Feb-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/24/2019 Telecommunication and Computer Networks

    1/292

    Telecommunication and Computer Networks

    Edition 7.0

    Pieter Kritzinger

    July 2001

    Department of Computer ScienceUniversity of Cape Town

  • 7/24/2019 Telecommunication and Computer Networks

    2/292

  • 7/24/2019 Telecommunication and Computer Networks

    3/292

  • 7/24/2019 Telecommunication and Computer Networks

    4/292

    iii

    ForewordMan has always had a desire to exchange information amongst fellow man. Not so long ago, people gatheredon the town square to gossip about the affairs of the town and its inhabitants. The Internet has now turnedthe World into one big Electronic Town Square. As in the early days, the value of the information thusdisseminated should be taken with a grain of salt, or at least should be veried before taken seriously.Amazingly some individuals seem to forget this age old wisdom.

    This version 7.0 constitutes a major rewrite of the previous version and as the new title indicates, reectsthe merging of telephone and computer and other networks into a single telecommunication network whichwould carry video, data and voice.

    No single person can invent the knowledge reected in these pages and so the content is compiled frommany articles, textbooks and my own work. There are many good textbooks on the topic and the one which

    comes closest to covering the material in these notes is Understanding Data Communications and Networksby W.A. Shay and published by the PWS Publishing Company (ISBN 0-534-20244-6). Another good text,albeit somewhat academic in nature, is the Third edition of Computer Networks by Andrew Tanenbaum(ISBN 0-13-394248-1). The one I would recommend you to buy (as of July 9, 2001) is Computer Networksand Internets (Second Edition) by Douglas E Comer, published by Prentice-Hall International, ISBN 0-13-084222-2.

    As with all elds of Computer Science there is a great deal of theoretical work associated with computernetworks and their protocols. Here I think in particular of concepts such as formal specication methods,stochastic modelling and models such as Petrinets and Process Algebras to model concurrent systems. Inthis book we have been able to cover only a tiny fraction of this and then only in the later chapters.

    The subject matter of (tele-)communications has not only become vast but much more signicant in theworld of computing than it was a mere decade ago. Recognition of this is the introduction of the C in theprevious IT of Information Technology to turn it into Information and Communication Technology . No textcan expect to cover all of it unless one wants to leave the reader with a feeling of knowing nothing abouteverything. If the reader discovers that his or her favourite network topic is therefore not even mentioned:that is inevitable.

    This seventh edition of Telecommunication and Computer Networks has four parts. Part I is intended to laythe foundation for a course in the subject and as such could serve as reading material for a few introductorylectures the subject. Part II covers the fundamentals of data communication. It introduces the engineer-ing concepts required to understand both electrical and optical data channels and their properties. Part IIIconcerns the basic protocols required in any network. Starting with the Data Link layer it also considers

    Packet Switching and Media Access Control (MAC) techniques used by the common local networks. Thematerial covered to this point are required reading for a good undergraduate course in computer networks.The last part covers advanced topics such as network security, wireless networks, network management andnetwork middleware topics such as CORBA. This part contains sufcient material for a second course intelecommunications and computer networks.

    Many generations of students have worked on these notes: The latest is Andy Shearman who was responsiblefor the chapters on Security, Wireless Communication and Network Middleware. Thank you Andy.

    Any constructive critique about the content of these notes will always be most welcome.

    Pieter Kritzinger Cape Town July 2001

  • 7/24/2019 Telecommunication and Computer Networks

    5/292

    iv

  • 7/24/2019 Telecommunication and Computer Networks

    6/292

    Contents

    I Overview of Telecommunication and Computer Networks 3

    1 Basic Concepts 5

    1.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    1.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    1.3 Evolution of Computer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    1.4 Electrical Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    1.5 Optical Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    1.6 A Matter of Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    1.7 Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

    1.7.1 Physical layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141.7.2 Data link layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    1.7.3 Network layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    1.7.4 Transport layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    1.7.5 Session layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    1.7.6 Presentation layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    1.7.7 Application layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    1.7.8 Conclusion - Standards and ISO . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    1.8 International Standards Bodies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    1.9 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    II Transmission Fundamentals 21

    2 Electrical Signals 23

    2.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    2.2 Fourier Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    2.3 Transmission Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    v

  • 7/24/2019 Telecommunication and Computer Networks

    7/292

    vi CONTENTS

    2.3.1 Twisted pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    2.3.2 Coaxial cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    2.4 Channel Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    2.4.1 Attenuation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    2.4.2 Noise Distortion and Shannons Law . . . . . . . . . . . . . . . . . . . . . . . . . 29

    2.4.3 Delay distortion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    2.4.4 Electrical noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    2.4.5 Bandwidth limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    2.5 Data encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    2.5.1 Digital Data, Digital Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    2.5.2 Digital Data, Analog Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    2.5.3 Analog Data, Digital Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

    2.6 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    3 Optical Signals 43

    3.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

    3.2 Optic Fibres . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443.3 Method of Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    3.4 Optical Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    3.4.1 Multimode and single-mode bres . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    3.4.2 Optical Signal Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    3.5 Signal Loss in Optic Fibre . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

    3.6 Advantages and Disadvantages of Optical Fibres . . . . . . . . . . . . . . . . . . . . . . . 48

    3.7 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

    4 Wireless Communication 51

    4.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

    4.2 Frequency Spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

    4.3 Radio Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

    4.4 Terrestial Microwave Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

    4.5 Satellite Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

    4.6 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

  • 7/24/2019 Telecommunication and Computer Networks

    8/292

    CONTENTS vii

    5 Channels and Their Properties 57

    5.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

    5.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585.3 Simplex, Half-duplex and Full-Duplex Communication . . . . . . . . . . . . . . . . . . . . 58

    5.4 Asynchronous and Synchronous Transmission . . . . . . . . . . . . . . . . . . . . . . . . . 58

    5.5 Multiplexing Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

    5.5.1 Synchronous Time Division Multiplexing . . . . . . . . . . . . . . . . . . . . . . . 61

    5.5.2 Statistical Time Division Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . 62

    5.5.3 Wavelength Division Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

    5.5.4 Combining WDM and STDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

    5.6 Digital Subscriber Line (DSL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

    5.7 Switching Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    5.7.1 Circuit Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    5.7.2 Packet Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

    5.7.3 Cell Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

    5.8 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

    6 Physical Data Communication Interfaces, Standards and Errors 71

    6.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716.2 Electrical Signal Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

    6.2.1 Serial Analog Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

    6.2.2 Serial Digital Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

    6.3 Optical Signal Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

    6.3.1 Synchronisation and SONET/SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

    6.3.2 The relationship between SONET and SDH . . . . . . . . . . . . . . . . . . . . . . 79

    6.4 Transmission Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

    6.4.1 Sources of Transmission Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

    6.4.2 Error Rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

    6.4.3 Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

    6.4.4 Hamming Distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

    6.4.5 Parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

    6.4.6 Error-Correcting Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

    6.4.7 Block check characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

    6.4.8 Cyclic Redundancy Coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

    6.5 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

  • 7/24/2019 Telecommunication and Computer Networks

    9/292

    viii CONTENTS

    7 Data Link Protocols 91

    7.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

    7.2 Principles of Protocol Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

    7.2.1 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

    7.2.2 Flow Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

    7.2.3 Sequence Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

    7.2.4 Piggybacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

    7.2.5 Sliding Window Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

    7.2.6 Pipelining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

    7.2.7 Positive Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

    7.3 Synchronous Data Link Control (SDLC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

    7.3.1 Flag eld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

    7.3.2 Address eld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

    7.3.3 Control eld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

    7.3.4 Acknowledgement and Retransmission. . . . . . . . . . . . . . . . . . . . . . . . . 105

    7.3.5 Supervisory Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

    7.3.6 Nonsequenced format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

    7.4 The Data Link Layer on the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1077.4.1 Serial Line IP (SLIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

    7.4.2 Point-to-Point Protocol (PPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

    7.5 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

    III Network Protocols 111

    8 Local Area Networks 113

    8.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1138.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

    8.3 Classication of LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

    8.3.1 Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

    8.3.2 Common Bus Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

    8.3.3 Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    8.3.4 Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    8.3.5 Media Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

    8.4 Random Access Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

  • 7/24/2019 Telecommunication and Computer Networks

    10/292

    CONTENTS ix

    8.4.1 1-persistent CSMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

    8.4.2 Nonpersistent CSMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

    8.4.3 CSMA/CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

    8.4.4 CSMA/CA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

    8.4.5 IEEE LAN Classication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

    8.5 Logical Link Control (IEEE 802.2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    8.6 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

    8.6.1 Ethernet Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

    8.6.2 Fast Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

    8.7 Deterministic or Token Passing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

    8.7.1 Token Ring (IEEE 802.5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

    8.7.2 Ring Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

    8.7.3 Token Ring Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

    8.7.4 Token Passing Bus (IEEE 802.4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

    8.8 Wireless LAN (IEEE 802.11) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

    8.9 Network Interconnection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

    8.10 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136

    9 Wide Area Networks 137

    9.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

    9.2 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

    9.3 Datagram Service, Virtual Circuit Service . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

    9.4 Internal Structure of the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

    9.5 Routing Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

    9.6 Congestion Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

    9.6.1 Preallocation of Buffers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1469.6.2 Discarding Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

    9.6.3 Choke Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

    9.7 Flow control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

    9.8 Deadlock Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

    9.9 Frame Relay Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

    9.9.1 Circuit Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

    9.9.2 Committed Information Rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

    9.9.3 Local Managment Interface (LMI) . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

  • 7/24/2019 Telecommunication and Computer Networks

    11/292

    x CONTENTS

    9.10 Asynchronous Transfer Mode (ATM) Networks . . . . . . . . . . . . . . . . . . . . . . . . 155

    9.10.1 Quality of Service (QoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

    9.10.2 ATM Cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1589.10.3 ATM Service Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

    9.10.4 Real-Time Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

    9.11 The X.25 Packet Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

    9.12 Internet Network Layer Protocol (IP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

    9.13 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

    IV Advanced Topics 173

    10 Advanced Network Technologies 175

    10.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

    10.2 Fibre Distributed Data Interchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

    10.2.1 FDDI Layered Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

    10.2.2 MAC Functional Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

    10.2.3 FDDI Frame and Token Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

    10.2.4 Data Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

    10.2.5 Physical Layer (PHY and PMD) Operation . . . . . . . . . . . . . . . . . . . . . . 180

    10.2.6 Timed Token Rotation (TTR) Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 182

    10.2.7 Ring Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

    10.2.8 Data Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

    10.2.9 FDDI Token Timing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

    10.2.10 Token Rotation Time Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . 186

    10.3 Distributed Queue Dual Bus (DQDB) Networks . . . . . . . . . . . . . . . . . . . . . . . . 187

    10.3.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

    10.3.2 DQDB Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

    10.3.3 DQDB Virtual Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

    10.3.4 DQDB Medium Access Control (MAC) Algorithm . . . . . . . . . . . . . . . . . . 191

    10.3.5 Performance of DQDB Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

    10.3.6 Advantages of DQDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

    10.3.7 Disadvantages of DQDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

    10.3.8 Protocol Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

    10.3.9 The Future of DQDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

    10.4 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

  • 7/24/2019 Telecommunication and Computer Networks

    12/292

    CONTENTS xi

    11 Network Security 197

    11.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

    11 .2 In t roduc t ion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

    11.3 Access Control and Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

    11.3.1 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

    11.4 Conventional Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

    11.4.1 Introduction and Historical Overview . . . . . . . . . . . . . . . . . . . . . . . . . 201

    11.4.2 DES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

    11.5 Public Key Crpytography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

    11.5.1 Dife Hellmen Key Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20711.5.2 RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

    11.6 Encryptions Place in a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

    11.6.1 End-to-End Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

    11.6.2 Link Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

    11.7 Digital Signiatures & Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

    11.7.1 Cryptographic Checksums . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

    11.7.2 Digital Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21411.8 Network Based Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

    11.8.1 TCP/IP Connection Set-up Primer . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

    11.8.2 The SYN Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

    11.8.3 ICMP Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

    11.8.4 Simple Attackers : Smurf and Fraggle . . . . . . . . . . . . . . . . . . . . . . . . . 219

    11.8.5 Coordinated and Distributed Network Based Attacks . . . . . . . . . . . . . . . . . 220

    11.8.6 Countering DDOS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

    11.9 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

    11.9.1 What Constitutes a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

    11.9.2 Different Congurations of a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . 228

    11.9.3 Dual-Homed Gateway Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

    11.9.4 Screened Host Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

    11.9.5 Screened Subnet Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

    11.9.6 Summary of Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

    11.10 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

  • 7/24/2019 Telecommunication and Computer Networks

    13/292

    xii CONTENTS

    12 Cellular Networks 233

    12.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

    12 .2 In t roduc t ion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

    12.3 Cellular Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

    12.3.1 Frequency Reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

    12.3.2 Overview of the Air Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

    12.3.3 Roaming Mobile Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

    12.4 How a Call is Made . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

    12.5 GSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

    12.5.1 Radio Information and Channel Types . . . . . . . . . . . . . . . . . . . . . . . . . 241

    12.5.2 Channel Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

    12.6 3G Networks Mobile Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

    12.6.1 General Packet Radio Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

    12.6.2 Roaming in a GPRS Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

    12.6.3 Data Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246

    12.7 Universal Mobile Transmission System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246

    12.7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

    12.8 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

    13 Network Middleware 253

    13.1 Objectives of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

    13 .2 In t roduc t ion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

    13.2.1 Design Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

    13.3 Common Object Request Broker Architecture (CORBA) . . . . . . . . . . . . . . . . . . . 254

    13.4 The Object Request Broker (ORB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256

    13.5 Distributed Component Object Model (DCOM) . . . . . . . . . . . . . . . . . . . . . . . . 25913.6 Java Distributed Computing - RMI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

    13.6.1 Java Distributed Object Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

    13.6.2 RMI Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

    13.6.3 Marshalling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

    13.7 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264

  • 7/24/2019 Telecommunication and Computer Networks

    14/292

    List of Figures

    1.1 Mainframe computer ca. 1970 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    1.2 One typical conguration of a terminal-oriented network. . . . . . . . . . . . . . . . . . . . 7

    1.3 A typical conguration of a terminal-oriented network using Statistical Multiplexers. . . . . 81.4 A typical conguration of a terminal-oriented network using a FEP. . . . . . . . . . . . . . 8

    1.5 Examples of analog and digital signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    1.6 Manchester encoding of the byte 1111 0000. . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    1.7 The ISO OSI Reference Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    1.8 Layers, protocols, and interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    1.9 TCP/IP protocol suite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    2.1 Schematic of a conducting coil rotating at speed

    radians per second through a eld of magnetic ux, generating a current in the conductor as it does so . . . . . . . . . . . . . . . 24

    2.2 Illustrating phase differences in a sinusoidal signal . . . . . . . . . . . . . . . . . . . . . . 25

    2.3 Shielded twisted-pair line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    2.4 A typical coaxial cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    2.5 Sources of attenuation and distortion of a digital signal . . . . . . . . . . . . . . . . . . . . 30

    2.6 A binary signal and its Fourier components. . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    2.7 Two binary signals: with double the capacity (number of bits per second) of . . . 33

    2.8 Illustrating the effect of bandwidth on a digital signal . . . . . . . . . . . . . . . . . . . . . 352.9 Some digital encoding techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

    2.10 A binary signal (a) amplitude modulated (PAM) (b) frequency modulated (MFSK) (c) phasemodulated (PSK) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    2.11 Illustrating pulse code modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

    2.12 A transmitted byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    3.1 The Optical Telegraph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

    3.2 Components of an optical bre cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    3.3 Multimode and single-mode optical bres . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    xiii

  • 7/24/2019 Telecommunication and Computer Networks

    15/292

    xiv LIST OF FIGURES

    4.1 Satellite communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

    5.1 Simplex, Half-duplex and Full-duplex Communication . . . . . . . . . . . . . . . . . . . . 58

    5.2 Asynchronous and Synchronous Transmissions . . . . . . . . . . . . . . . . . . . . . . . . 59

    5.3 Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

    5.4 Synchronous Time Division Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

    5.5 Statistical Time Division Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

    5.6 Wavelength Division Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

    5.7 Asymmetric Digital Subscriber Line (ASDL) technology using FDM only . . . . . . . . . . 64

    5.8 Asymmetric Digital Subscriber Line (ASDL) technology using Echo-suppression . . . . . . 65

    5.9 Circuit switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    5.10 Conceptual view of packet switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

    6.1 RS-232C/V.24 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

    6.2 RS-232C Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

    6.3 Sending and Receiving over an RS-232 Connection . . . . . . . . . . . . . . . . . . . . . . 73

    6.4 Signal lines used in the X21 serial digital interface . . . . . . . . . . . . . . . . . . . . . . 74

    6.5 X21 protocol state transition graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

    6.6 SONET conguration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

    6.7 An STS-1 SONET frame. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

    6.8 Mapping basic signals onto an STS-N channel. . . . . . . . . . . . . . . . . . . . . . . . . 80

    6.9 Error burst examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

    6.10 Example of block sum parity checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

    7.1 Conceptual model of Layer 2, 3 and 4 protocols . . . . . . . . . . . . . . . . . . . . . . . . 93

    7.2 The Alternating Bit (AB) protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

    7.3 A sliding window of size 1, with a 3-bit sequence number. Part (a) initially (b) after the rstframe has been sent (c) after the rst frame has been received (d) after the rst acknowl-edgement has been received page 85 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

    7.4 Pipelined ARQ protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

    7.5 The SDLC frame format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

    7.6 An example of bit stufng . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

    7.7 Three formats for the basic SDLC control eld . . . . . . . . . . . . . . . . . . . . . . . . 105

    7.8 The PPP full frame format for unnumbered mode operation . . . . . . . . . . . . . . . . . . 109

    8.1 LAN Bus topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

  • 7/24/2019 Telecommunication and Computer Networks

    16/292

    LIST OF FIGURES xv

    8.2 LAN Star topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    8.3 Ring topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

    8.4 Correspondence between IEEE 802 layers and the OSI model . . . . . . . . . . . . . . . . . 120

    8.5 (a) Position of LLC and (b) Protocol formats . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    8.6 Ethernet 10BASE5 topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

    8.7 CSMA/CD frame format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

    8.8 CSMA/CD MAC process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

    8.9 Popular networking conguration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

    8.10 Ethernet states: contention, transmission, or idle. . . . . . . . . . . . . . . . . . . . . . . . 125

    8.11 Token-Ring frame format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

    8.12 Token-Ring medium access algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

    8.13 Token-Ring frame format and content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

    8.14 Token bus network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

    8.15 Wireless LAN communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

    9.1 One directional Virtual Circuits showing the order on which they are set up . . . . . . . . . 141

    9.2 NODE tables corresponding to the Virtual Circuits set up Fig. 9.1 . . . . . . . . . . . . . . 142

    9.3 Congestion in the Service Provider network. . . . . . . . . . . . . . . . . . . . . . . . . . . 145

    9.4 Congestion in a NODE can be reduced by putting an upper bound on the number of buffersqueued on an output line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

    9.5 Store-and-forward lockup: (a) direct, (b) indirect. . . . . . . . . . . . . . . . . . . . . . . . 149

    9.6 Message re-assembly lockup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

    9.7 Packet Level (top) and Frame Relay (bottom) PDU formats . . . . . . . . . . . . . . . . . . 151

    9.8 Packet and Frame Relay processing ow diagrams. . . . . . . . . . . . . . . . . . . . . . . 153

    9.9 Illustrating Committed Information Rate (CIR) and discard eligibility of frames . . . . . . . 154

    9.10 The ATM principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

    9.11 ATM connection paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

    9.12 ATM call establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157

    9.13 ATM cell format at (a) User-Service Provider interface and (b) internal to the network . . . . 158

    9.14 The DTE-DCE X.25 ITU-T interface standard for Wide Area packet switched networks. . . 162

    9.15 X.25 CALL REQUEST packet format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

    9.16 Sequence diagram of X.25 call establishment, data transfer and call clearing phases . . . . . 163

    9.17 X.25 Control packet format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165

    9.18 X.25 data packet format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

    9.19 The IP (Internet Protocol) header format . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

  • 7/24/2019 Telecommunication and Computer Networks

    17/292

    xvi LIST OF FIGURES

    9.20 Source and destination address formats in the IP header . . . . . . . . . . . . . . . . . . . . 169

    9.21 Virtual circuit conguration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

    10.1 FDDI relationship to OSI model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

    10.2 Typical FDDI topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

    10.3 FDDI Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

    10.4 The FDDI Timed Token protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

    10.5 FDDI token rotation timing diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

    10.6 DQDB architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

    10.7 Open (top) and Closed (bottom) DQDB architecture . . . . . . . . . . . . . . . . . . . . . . 189

    10.8 DQDB slot format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18910.9 State diagram of the DQDB MAC Protocol without BWB . . . . . . . . . . . . . . . . . . . 191

    10.10Logical states of a DQDB station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

    11.1 Access matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

    11.2 Entering a password for a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

    11.3 Verifying a password for a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

    11.4 The encryption decryption mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

    11.5 The Engima machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

    11.6 Diagramatic view of a rotor machine such as engima . . . . . . . . . . . . . . . . . . . . . 204

    11.7 DES encryption mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

    11.8 DES operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

    11.9 End-to-end encryption at the application layer . . . . . . . . . . . . . . . . . . . . . . . . . 211

    11.10End-to-end encryption at the transport layer . . . . . . . . . . . . . . . . . . . . . . . . . . 211

    11.11Link encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

    11.12Cryptographic checksum in use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

    11.13Using public key encryption for digital signatures . . . . . . . . . . . . . . . . . . . . . . . 215

    11.143way handshake process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

    11.15Smurf reector type attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220

    11.16A DDOS ready network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

    11.17Ingress lterning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

    11.18A rewall resides between external networks and internal networks . . . . . . . . . . . . . . 226

    11.19A dual homed rewall with a proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

    11.20A screened subnet rewall, notice the two routers and the subnet between . . . . . . . . . . 230

    12.1 Cellular concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

  • 7/24/2019 Telecommunication and Computer Networks

    18/292

    LIST OF FIGURES xvii

    12.2 Cellular network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

    12.3 Frequency reuse concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

    12.4 Handoff scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

    12.5 Catering for high speed trafc with umbrella cells . . . . . . . . . . . . . . . . . . . . . . . 239

    12.6 Timing diagram for a mobile handset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

    12.7 GSM schematic showing interfaces between functional entities . . . . . . . . . . . . . . . . 240

    12.8 GSM TDMA frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

    12.9 Logical architecture of a GPRS network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

    12.10Distiction of RAs and LAs in a GPRS network . . . . . . . . . . . . . . . . . . . . . . . . 245

    12.11GPRS functional state model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

    12.12UMTS elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

    12.13UTRAN connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

    12.14UTRAN connection with new core network (CN) . . . . . . . . . . . . . . . . . . . . . . . 248

    12.15Spreading of channels in a CDMA type access system . . . . . . . . . . . . . . . . . . . . . 249

    13.1 Organisation of a distributed system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

    13.2 OMG reference model architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

    13.3 A request being sent through the ORB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256

    13.4 The object request broker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

    13.5 The overall DCOM architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

    13.6 How DCOM works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

    13.7 RMI stubs and skeletons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

    13.8 Expanded view of RMI architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

  • 7/24/2019 Telecommunication and Computer Networks

    19/292

    xviii LIST OF FIGURES

  • 7/24/2019 Telecommunication and Computer Networks

    20/292

    List of Tables

    4.1 Electro magnetic spectrum and its uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

    6.1 Typical payloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

    6.2 Transmission speeds of SONET and SDH. . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

    6.3 The Hamming code explained . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

    6.4 The Hamming code bit positions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

    6.5 Calculation of the polynomial code checksum. . . . . . . . . . . . . . . . . . . . . . . . . . 87

    8.1 IEEE 802.3 networks with 512 bit slot times, 96 bit gap times and jam signals lasting 32 48 bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

    8.2 Token ring control frames. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

    9.1 Summary of the major differences between Virtual Circuit and Datagram service. . . . . . . 140

    9.2 LAN and WAN characteristics compared . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

    9.3 X.25 PDU format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162

    10.1 FDDI Frame and Token format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

    10.2 FDDI 4B/5B codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

    11.1 Different methods of arbiter working . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

    1

  • 7/24/2019 Telecommunication and Computer Networks

    21/292

    2 LIST OF TABLES

  • 7/24/2019 Telecommunication and Computer Networks

    22/292

    Part I

    Overview of Telecommunication andComputer Networks

    3

  • 7/24/2019 Telecommunication and Computer Networks

    23/292

  • 7/24/2019 Telecommunication and Computer Networks

    24/292

    Chapter 1

    Basic Concepts

    1.1 Objectives of this Chapter

    There is a great deal to know about telephone and computer networks, or more correctly telecommunicationnetworks sin ce with the advent of the digital age and cellular networks, the distinction is getting increasinglyfuzzy.

    1. We start off by explaining the origins of computr networks and why the telephone network has alwaysplayed a role in computer networks from the very start.

    2. Without understanding the difference between analog and digital signals, one will never comprehend

    why networks are playing such an increasingly important role in the world of computing, so weexplain those fundamentals. In some countries of the world, this is the sort of information that istaught in the 13th grade at school. Maybe it is better than learning Shakespeare, but I doubt it.

    3. Computers, like humans need rules when communicating. These are called protocols as we shallexplain.

    4. The software that makes communication between computers possible is some of the most complicatedthat can be written. In order to understand how it works, we divide it into layers which group thefunctions; hence network architecture.

    5. Since computers communicate across continents and national boundaries, we need international or-

    ganisations to make and approve the rules or protocols. There are many as we describe in the last partof this chapter.

    A reader who understands everything discussed in this chapter will be very aware of how much there stillis to learn in telecommunication and computer networks, but will have a clear understanding of the veryfundamental concepts.

    5

  • 7/24/2019 Telecommunication and Computer Networks

    25/292

    6 CHAPTER 1. BASIC CONCEPTS

    1.2 Introduction

    A decade or two we associated the word communication with the use of the telephone or radio. Whilethose applications remain we nowadays think almost exclusively of the Internet and probably wireless,cellular telephones. It has become so pervasive that we simply take it for granted. One of the greatestimpacts that networking has had on society is to bring together vast sources of information, be they humanminds or computer systems: the emergence of a global village is changing the way society interacts anddoes business.

    An understanding of the principles behind computer networks is therefore something that every studentshould have. Communication and Information Technology is advancing at an exponential rate, and we areliving in an exciting age where we are shaping the future of this technology. This introduction seeks toprovide the student with the core concepts behind communication networks.

    1.3 Evolution of Computer Networks

    The evolution of computer networks is best traced by following the development of computing resourcesused by large organisations. The earliest commercially available computers were characterized by expen-sive hardware and relatively primitive software. Typically, an organisation would purchase a single computerwhich would then be centrally located in a large air-conditioned room. It would consist of a central process-ing unit with a limited quantity of primary memory, some secondary disc storage, a printer, a punch-cardreader and an operator console. Something looking somewhat like that in Fig. 1.1.

    Figure 1.1: Mainframe computer ca. 1970

    Users normally prepared their data off-line on a card punch located in a different room, and the computeroperator would then load and run the prepared programs sequentially.

    As computer hardware became faster and its operating software advanced, fast secondary storage largemagnetic drums and later magnetic disks and multi-programming operating systems came into existence.This made it possible to timeshare the central processing unit between a number of active programs, thereby

  • 7/24/2019 Telecommunication and Computer Networks

    26/292

    1.3 Evolution of Computer Networks 7

    allowing several users to run their programs interactively and to access stored data simultaneously via theirown individual terminal. The terminals were normally electromechanical teletypewriters (TTYs) similar tothose already in use at the time in international telex networks. They were designed, therefore, to transmitand receive one cahracter at a time over long distances in serial (or sequential) mode.

    The computers then became known as multi-access systems providing on-line access to stored programs anddata. Initially, the terminals were all located in close proximity to the main computer complex with a simpleserial line connection between the computer and the terminal.

    Users increasingly found it useful though to have a computer terminal on their desk. Within a building oron a campus that posed no problem. However, over longer distances the expense became important and,above all, communication (of voice at rst, but now data as well) was the monopoly of a central publicorganisation: Telkom!

    Technically there was the additional issue that telephone networks carried analogue signals (explained in thenext section) and computers used binary or digital signals. Hence modems were invented to carry computercommunications nationally over wide geographical areas. An operational computer system typical at thattime is shown in Fig. 1.2 where the letters PSTN stand for Public Switched Telephone Network .

    T

    CENTRAL COMPUTER

    = Terminal = Modem

    PSTN

    T

    T

    Figure 1.2: One typical conguration of a terminal-oriented network.

    The use of a switched (switched in that connections could be changed from time to time to connect twoindividual users, the computer and the terminal in this instance) telephone network as the basic data commu-nication medium meant that the communication line costs could no longer be regarded as insignicant and,indeed, soon constituted a substantial proportion of the system operating costs. To minimize these costs,therefore, devices such as statistical multiplexers and cluster controllers were introduced. Essentially, theseallowed a single communication line, often on permanent lease from the telecommunications authorities, tobe shared between a number of simultaneous users all located, for example, at the same remote site. Anexample of such a system is shown diagrammatically in Fig. 1.3.

    In addition, the increasing level of usage of computers soon gave rise to systems of hundreds of computers

    a modem or modulator-demodulator

    is used to convert the digital signals of a computer into equivalent analogue signals. Theseconcepts are explored later in this chapter

  • 7/24/2019 Telecommunication and Computer Networks

    27/292

    8 CHAPTER 1. BASIC CONCEPTS

    T

    CENTRAL COMPUTER

    = Terminal = Modem

    PSTN

    Stat.MUX

    Stat.MUX

    T

    T

    T T

    T

    T

    T

    T

    TT

    Stat.MUX

    Stat.MUX

    Figure 1.3: A typical conguration of a terminal-oriented network using Statistical Multiplexers.

    within an organisation. The effect of this was that the central computer could no longer cope with theprocessing over heads associated with servicing the various communication lines in addition to its normalprocessing functions. Consequently a special device, called a Front End Processor (FEP) was introducedfor the job of controlling the communication lines. Such a system is shown diagrammatically in Fig. 1.4.

    T

    T

    T T

    T T

    T T

    T T

    T

    FEP PSTN

    CC

    CC

    = Terminal = Modem CC = Cluster controller

    Figure 1.4: A typical conguration of a terminal-oriented network using a FEP.

    The structures shown in Figs 1.3 and 1.4 were particularly prevalent in organizations normally holding largeamounts of data at a central site, such as the major clearing banks and airlines.

    In many other organisations, it is not necessary and in fact desirable not to hold all the data centrally, andhence it became common place for organisations to have a number of autonomous computer systems locatedat different geographical locations. Typically, these systems provided a local computing function, but therewas often a requirement for them to communicate with each other to share resources and data. In sucha network, the internal message units used may be long. This can result in a signicant delay between amessage entering the network and the time it leaves the network (known as the response time ), due to longmessages waiting upon each other at the various resources along the way.

  • 7/24/2019 Telecommunication and Computer Networks

    28/292

    1.4 Electrical Signals 9

    It then became economically feasible for TelCos to provide a separate, autonomous computer commu-nication network . Such communication networks that carry mostly computer data normally operate usingsmaller units of data known as a data packet . It is therefore commonly referred to as a Packet Switched Network. Increasingly the term IP network is also used for reasons that will become clear only muchlater. Also, since the interconnected computers are normally geographically widespread, such a network isalso called a Wide Area Network (WAN) . .

    The next obvious development was that computers of different manufacturers (IBM, SUN Microsystems,Microsoft, etc) with their different architectures and applications need to communicate with one another.The need for open (for everybody to see)interface standards became all important. This was the status at thebeginning of the 1980s since being overtaken by the event of the Internet in the middle of the last decade.

    What was to become the Internet, was rst proposed in 1967 in the United States of America as an experi-mental computer network. For a number of years before 1967, DARPA, the (Defense) Advanced ResearchProjects Agency of the United States Department of Defense had been funding the growth and development

    of many multiclass timeshared computer systems at a number of university and industrial research centresacross the United States. By 1967, many of these had shown themselves to be valuable computing resourcesand it was recognized that the Department of Defense as well as the scientic community could benetgreatly if there were to be made available a communication service providing remote access from any termi-nal to all of these systems. In early 1969 a contract was awarded for the implementation of the ARPANETto Bolt, Beranek and Newman (BBN) an engineering rm based in Massachusetts.

    Simultaneously DARPA funded the research which resulted in a set of network standards that specify thedetails of how computers communicate, as well as a set of conventions for interconnecting networks androuting trafc. These are now known as the Transmission Control Protocol/Internet Protocol or TCP/IPwhich can be used to communicate across networks which represent a wide variety of underlying network technologies. What started as ARPANET is now known as the Internet, literally a network that (Inter-)connects many worldwide networks. The evolution has however not ended and is been fueled further bythe popularity of wireless, cellular communication. In order for the Internet to reach the very edge of thenetwork the last bastion of traditional voice transmission has to be broken: In other words, transmittingvoice over data (or IP) networks, including the wireless link.

    Now that we now a little about their evolution, we shall start from scratch to understand the exciting worldof telecommunication networks.

    1.4 Electrical Signals

    Signals to represent data, voice conversations or video transmissions are either electromagnetic radio waves,electrical signals owing in a conductor or optical (light) signals. Optical signals are being used more andmore but we shall discuss those later.

    An electrical signal is transmitted along a conductor by varying some electrical property such as voltage orcurrent which could either be an analog or digital signal as illustrated in Figure 1.5.

    Electrical signals can be either analog or digital as illustrated in Fig. 1.5. Digital signals are also calledbinary signals. An analog signal is continues in time whereas digital signals take on discrete values andchanges instantaneously from one voltage or current value to the other in time. The number of signal levelsare always

    for

    . Originally

    but as technology improves it is normal for more thantwo levels to be represented. In practice the way in which the binary data are represented or coded by the

    A general term for the Telecommunication Company Monopolies which alas exist in too many countries still.

  • 7/24/2019 Telecommunication and Computer Networks

    29/292

    10 CHAPTER 1. BASIC CONCEPTS

    1 cycle

    C u r r e n t o r v o

    l t a g e

    C u r r e n t o r v o

    l t a g e

    time

    time

    time time

    C u r r e n t o r v o

    l t a g e

    C u r r e n t o r v o

    l t a g e

    Analogue SignalsDigital Signals

    Figure 1.5: Examples of analog and digital signals

    digital signal is all but simple. One method commonly used is known as Manchester Encoding illustrated inFigure 1.6.

    Since analog signals vary continuously in time they can be represented by mathematical formulae and ma-nipulated accordingly. Analogue signals do not have to be cyclical in that they repeat themselves after axed time called the period. If they are, the number of complete cycles per second (also called Hertz)is the inverse of the period and is called the frequency , usually denoted by the symbol . Thus cycles/second, or seconds. The signals with periodic wave forms are the most useful to us intelecommunication since can modulate them to carry digital signals as we shall see in Chapter 2.

    Analog signals not only represent current owing in a copper conductor, but most importantly may beelectro magnetic waves travelling through space in which case we call them radio waves . Depending ontheir frequency, radio waves can travel around the world, which means that everyone can receive them.Although this is exactly what radio waves were originally intended for, it is simultaneously a problem if toomany parties want to use the limited frequency spectrum.

    When the frequency of the electro magnetic waves is very high we refer to them as microwaves which havethe advantage (for the intended purpose) that they are easily attenuated by obstacles like buildings in theirway (the same effect that chickens in a microwave experience) and are only really reliable when they aretransmitted to a receiver which is in direct line of sight. With this property it is possible to re-use the

  • 7/24/2019 Telecommunication and Computer Networks

    30/292

    1.5 Optical Signals 11

    1 0 0 01 1 1 0 1 0 0 01 1 1 0

    Manchester encoded signalUnencoded binary signal

    Figure 1.6: Manchester encoding of the byte 1111 0000.

    scarce frequencies in geographically separated areas. If we transmit the microwave signals at low powerin addition, we can divide a geographical area into cells where the transmissions do not interfere witheach other provided the frequencies in adjacent cells are different. This is the way that a GSM (cell phone)

    network works. We shall return to all these concepts in later chapters.

    1.5 Optical Signals

    Telecommunication Networks also use optical bre to transport data encoded as ON/OFF pulses of light.Depending on the type of bre, a transmitter at one end of the bre uses a light emitting diode (LED) or Laser to send pulses of light down the bre. A receiver at the other end uses a light detector such as a Photo Intrinsic Diode (PIN) or Avalanche Photo Diode (APD) to detect the pulses.

    The number of bits per second (Bps) that can be transmitted along an optical bre is virtually unlimitedsince it is theoretically possible to send several beams (called modes ) of light of different frequencies downa bre, each carrying typically 2 GBps . We will return to optical signals and the associated standards inChapter 3.

    1.6 A Matter of Protocol

    Now that we understand a little about the signals travelling between two communicating parties in a telecom-munications network, we turn to the rules of communication or protocols which are needed for the partiesto exchange information without error.

    Essentially, a computer network consists of one or more computer talking with each other. The rules that govern the exchange of information , and the exact structure of that information are known as a protocol . Asan introduction to the idea of a protocol, we consider an analogy from everyday life namely, a telephoneconversation between two people living in different cities in different countries. As we all know the processis something like the following:

    First of all, the caller picks up the telephone receiver. If a dialing tone is heard, he will select the numberof the callee on the buttons of his telephone. The called number constitutes the address of the callee. If nodialing tone is heard, the caller would normally discontinue his attempts to place the call.

    Once the call goes through, the remote instrument either rings and is answered or not. The callee could alsobe using the device. Should the callee answer the ringing telephone, a verbal handshake typically occurs.Note that in this case it is a name , rather than a number , that identies the caller and callee to each other.

    A Gigabit is

    bits

  • 7/24/2019 Telecommunication and Computer Networks

    31/292

    12 CHAPTER 1. BASIC CONCEPTS

    Now that the connection has been established, the two parties conduct a conversation. Certain conventionsalso apply in this case. Two people do not (normally that is!) talk simultaneously; if they did, a process of re-synchronization would need to occur. If one person speaks too quickly, the other may ask him to slowdown.

    If the line should fade of if there is noise on the line, messages like I did not hear your last words orWould you please repeat the last sentence? would ensure that the information passing between the twoparties remains error-free.

    Should an abrupt cut-off occur, we know from experience that a frustrating situation of deadlock mightoccur, when both people try simultaneously to call each other. There are no rules in this case which is anerror in the specication of the (human) protocol.

    At the conclusion of their conversation the caller and callee go through similar conventions for terminatingtheir call and would eventually put their respective telephone receivers down, thereby not only ending theirconversation, but also breaking the physical (electrical) communication link.

    When two processes in separate computers communicate with each other, similar conventions for:

    addressing

    call establishment and call termination

    error checking

    information recovery

    and ow control

    must be decided upon.

    Once again, the rules and conventions used in a session of communication are known as a protocol. Thespecication of a protocol also includes a specication of the format and content of the messages beingpassed. As computers are dumb, deterministic machines, they require a far more elaborate and exact protocolthan in the case of a conversation conducted in natural language between two human beings.

    The telephone analogy also reveals another basic concept important in the study of computer communi-cation. This is the fact that there are a number of stages to the conversation between communicatingcomputer processes:

    call-establishment phase

    data (information) transfer phase

    call-clearing phase

    idle phase

    1.7 Network Architecture

    Computers have different architectures understand different languages, store data in different formats, andcommunicate at different rates. Consequently there is much incompatibility, and communication is difcult.In fact, how do computers manage to communicate at all ?? They communicate the same way that the

  • 7/24/2019 Telecommunication and Computer Networks

    32/292

    1.7 Network Architecture 13

    people in our analogy do. In the analogy, there are rules which apply at the physical level (number called,dialling tone, engaged signal, etc) and rules which apply at, shall we say logical level between the humansthemselves. The same is true for computers.

    As long ago as 1976 the International Standards Organisation (ISO) recognised the need for some stan-dardisation of computer network interfaces. It was apparent even at that early stage, that for the reasonsmentioned already, it would be expedient to describe the architecture of the network software in layers inorder to facilitate the interconnection of unlike systems. In other words, to provide an open system that anyother system could connect to. ISO thus set out to standardise the Open System Interconnection Reference Model , or OSI model for short, intended as a reference architecture for network design. This model isillustrated in Fig. 1.7.

    Data Link

    Presentation

    Application

    Session

    Transport

    Network

    Physical

    Data Link

    Presentation

    Application

    Session

    Transport

    Network

    Physical bytes

    frames

    packets

    message

    message

    message

    message

    Physical Medium

    Host A Host B

    Figure 1.7: The ISO OSI Reference Model.

    Between each pair of adjacent layers in the OSI model there is an interface. The interface denes whichservices the lower layer offers to the upper one. When network designers decide how many layers to includein a network and what each one should do, one of the most important considerations is having clearly denedinterfaces between the layers. Having clearly dened interfaces, in turn, requires that each layer performs aspecic collection of well understood functions . In addition to minimizing the amount of information thatmust be passed between layers, clear cut interfaces also make it simpler to replace the implementation of onelayer with a completely different one (e.g., when all the telephone lines are replaced by satellite channels),because all that is required of the new implementation is that it offers exactly the same set of services to thenext layer higher up as the old implementation did.

    The set of layers and protocols is called the network architecture. The specication of the architecture mustcontain enough information to allow an implementor to write the program for each layer so that the programwill correctly obey the appropriate protocol. Neither the details of the implementation nor the specication

  • 7/24/2019 Telecommunication and Computer Networks

    33/292

    14 CHAPTER 1. BASIC CONCEPTS

    of the interfaces are part of the architecture.

    When describing the operation of any of the protocol layers, it is important from the outset to discriminate

    between:1. the services provided by the layer

    2. the protocol (i.e., logical operation of the layer)

    3. the services used by that layer

    This is important because only then can the function of each layer be dened in the context of the otherlayers. This also has the effects that a person implementing one protocol layer needs only to have a knowl-edge of the services the layer is to provide to the layer above, the internal operation (protocol) of the layer,and the services that are provided by the layer below to transfer the appropriate items of information, calledProtocol Data Units or PDUs associated with the protocol to the corresponding layer in a remote computer.

    Equally, the specication of each protocol layer comprises two sets of documents:

    1. service denition document

    2. protocol specication document .

    The service denition document contains a specication of the services provided by that layer to the layerabove it that is the user services . These are in the form of a dened set of service primitives . These serviceprimitives are similar to procedure calls in a high level language, each with an associated set of service parameters . These primitives are invoked to and from the layer through service access points (SAPs) (seenin gure 1.8 e.g.. a request, indication, response and conrm primitive. As will be seen in later chapters, it isthrough the service primitives that the layer above achieves the transfer of information to the correspondentlayer in a remote system.

    We need to clarify the rather cryptic notations N, N+1 and N-1, seen in Fig. 1.8. A layer in the OSI modelis generally as the (N)-layer. The layer above it (if one exists) is designated as the (N+1)-layer, similarlythe one below it is the (N-1)-layer. The peer process abstraction is crucial to all network design. Withoutthis technique, it would be impossible to partition the design of the complete network into several smaller,manageable, design problems, namely the design of the individual layers.

    It was not intended that there should be a single standard protocol associated with each layer. Rather a setof standards is associated with each layer, each offering different levels of functionality. In each of the

    following sections we briey discuss each layer of the architecture

    1.7.1 Physical layer

    The physical layer is concerned with transmitting raw bits over a communication channel. The design issueshave to do with making sure that when one side sends a bit, it is received by the other side as a bit, not asa

    bit. Typical questions here are how many volts should be used to represent a and how many for a

    , howmany micro seconds a bit occupies, whether transmission is simplex or duplex, how the initial connectionis established and how it is broken when both sides are nished, how many pins the network connector hasand what each pin is used for. In some cases a transmission facility consists of multiple physical channels,in which case the physical layer can make them look like a single channel, although higher layers can alsoperform this function.

  • 7/24/2019 Telecommunication and Computer Networks

    34/292

    1.7.2 Data link layer 15

    Layer N-1

    SAP

    SAP SAP

    SAP

    Peer protocolentity

    Protocol

    Correspondent

    UserUser

    (Logical) exchange path of PDUs

    Used services

    Service provider

    User services

    Service user

    Layer N

    (N-1) services

    N-services

    Layer N + 1

    SAP = Service access point

    entityPDUs

    Figure 1.8: Layers, protocols, and interfaces.

    1.7.2 Data link layer

    The task of the data link layer is to take a raw transmission facility and transform it into a line that appears free of transmission errors to the network layer. It accomplishes this task by breaking the input data upinto data frames transmitting the frames sequentially, and processing the acknowledgement frames sentback by the receiver. Since Layer 1 merely accepts and transmits a stream of bits without any regard tomeaning or structure, it is up to the data link layer to create and recognize frame boundaries. This can beaccomplished by attaching special bit patterns to the beginning and end of the frame. These bit patterns canunintentionally occur in the data, so special care must be taken to avoid confusion. It is up to this layer tosolve the problems caused by damaged, lost, and duplicate frames, so that network layer can assume it isworking with an error-free (virtual) line.

    1.7.3 Network layer

    The network layer controls the operation of the subnet. Among other things, it determines the chief char-acteristics of the DCE-DTE interface, and how Network Protocol Data Units or NPDUs , more commonlyknown as packets , the units of information exchanged in the network layer, are routed within the network.A major design issue here is the division of labour between the DCEs and hosts, in particular who shouldensure that all packets are correctly received at their destinations, and in the pr