Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data and Computer Communications Ninth Edition by William Stallings Chapter 1 – Data Communications, Data Networks, and the Internet.

Similar presentations


Presentation on theme: "Data and Computer Communications Ninth Edition by William Stallings Chapter 1 – Data Communications, Data Networks, and the Internet."— Presentation transcript:

1 Data and Computer Communications Ninth Edition by William Stallings Chapter 1 – Data Communications, Data Networks, and the Internet

2 Data Communications, Data Networks, and the Internet “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point” - The Mathematical Theory of Communication, - The Mathematical Theory of Communication, Claude Shannon Message

3 1.3 1-1 DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data. Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.

4 1.4 Figure 1.1 Five components of data communication

5 1.5 Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)

6 1.6 1-2 NETWORKS A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network.

7 1.7 Figure 1.3 Types of connections: point-to-point and multipoint

8 Technological Advancement Driving Forces Technological Advancement Driving Forces Development of new servicesDevelopment of new services Advances in technologyAdvances in technology Traffic growth at a high & steady rate

9 Changes in Networking Technology * Emergence of high-speed LANs * Digital electronics * Corporate WAN needs

10 Convergence  The merger of previously distinct telephony and information technologies and markets  Layers: applicationsapplications these are seen by the end usersthese are seen by the end users enterprise servicesenterprise services services the information network supplies to support applicationsservices the information network supplies to support applications infrastructureinfrastructure communication links available to the enterprisecommunication links available to the enterprise

11 Convergence Layers

12 Benefits Efficiency better use of existing resources, and implementation of centralized capacity planning, asset and policy management Effectiveness the converged environment provides users with flexibility, rapid standardized service deployment and enhanced remote connectivity and mobility Transformation enables the enterprise-wide adoption of global standards and associated service levels Convergence benefits include:

13 Communications Model Communications Model

14 Communications Tasks Transmission system utilizationAddressing InterfacingRouting Signal generationRecovery SynchronizationMessage formatting Exchange managementSecurity Error detection and correctionNetwork management Flow control

15 The basic building block of any communications facility is the transmission line. The business manager is concerned with a facility providing the required capacity, with acceptable reliability, at minimum cost. Capacity Reliability Cost Transmission Line Transmission Lines

16

17 Networking VoiceData ImageVideo Advances in technology have led to greatly increased capacity and the concept of integration, allowing equipment and networks to work simultaneously.

18 18 Network Hardware Classifying networks based on their scale:  Local Area Networks  Metropolitan Area Networks  Wide Area Networks  Wireless Networks  Home Networks  Internetworks

19 19 Network Hardware

20 LANs and WANs Local Area Networks (LAN) Wide Area Networks (WAN) There are two broad categories of networks:

21 Wide Area Networks (WANs)  Span a large geographical area  Require the crossing of public right-of-ways  Rely in part on common carrier circuits  Typically consist of a number of interconnected switching nodes

22 Wide Area Networks Alternative technologies used include: Alternative technologies used include: Circuit switching Circuit switching Packet switching Packet switching Frame relay Frame relay Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM)

23 Circuit Switching  Uses a dedicated communications path  Connected sequence of physical links between nodes  Logical channel dedicated on each link  Rapid transmission  The most common example of circuit switching is the telephone network

24 24 Network Hardware Wide Area Networks

25 Packet Switching  Data are sent out in a sequence of small chunks called packets  Packets are passed from node to node along a path leading from source to destination  Packet-switching networks are commonly used for terminal-to-terminal computer and computer-to-computer communications

26 Asynchronous Transfer Mode (ATM)  Referred to as cell relay  Culmination of circuit switching and packet switching  Uses fixed-length packets called cells  Works in range of 10’s and 100’s of Mbps and in the Gbps range  Data rate on each channel dynamically set on demand

27 Local Area Networks (LAN)

28 Metropolitan Area Networks (MAN)

29 29 Network Hardware Wireless Networks Categories of wireless networks:  System interconnection  Wireless LANs  Wireless WANs

30 30 Network Hardware Wireless Networks  System interconnection Bluetooth a short-range wireless network. Allows system components together, digital cameras, headsets, scanners, and other devices to connect to a computer by merely being brought within range. Bluetooth a short-range wireless network. Allows system components together, digital cameras, headsets, scanners, and other devices to connect to a computer by merely being brought within range.  Wireless LANs Every computer has a radio modem and antenna with which it can communicate with other systems. Every computer has a radio modem and antenna with which it can communicate with other systems. Standard for wireless LANs: IEEE 802.11, which most systems implement and which is becoming very widespread. Standard for wireless LANs: IEEE 802.11, which most systems implement and which is becoming very widespread.

31 31 Network Hardware Wireless Networks  Wireless WANs (cont.) Wireless LANs an operate at rates up to about 50 Mbps over distances of tens of meters. While cellular systems (Wireless WANs) operate below 1 Mbps, but the distance between the base station and the computer or telephone is measured in kilometers rather than in meters. Wireless LANs an operate at rates up to about 50 Mbps over distances of tens of meters. While cellular systems (Wireless WANs) operate below 1 Mbps, but the distance between the base station and the computer or telephone is measured in kilometers rather than in meters. High-bandwidth wide area wireless networks are also being developed (IEEE 802.16). High-bandwidth wide area wireless networks are also being developed (IEEE 802.16).

32 The Internet  Internet evolved from ARPANET  Developed to solve the dilemma of communicating across arbitrary, multiple, packet-switched network  TCP/IP provides the foundation

33 Internet Key Elements

34 Internet Architecture

35 1.35 Figure 1.11 WANs: a switched WAN and a point-to-point WAN

36 1.36 Figure 1.12 A heterogeneous network made of four WANs and two LANs

37 1.37 Figure 1.13 Hierarchical organization of the Internet

38 The Channel Allocation Problem To allocate a single broadcast channel among competing users, we can use: Static Channel Allocation in LANs and MANs Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs

39 Static Channel Allocation in LANs and MANs Frequency Division Multiplexing (FDM) is an example of static channel allocation where the bandwidth is divided among a number of N users. When there is only a small and constant number of users, each of which has a heavy (buffered) load of traffic (e.g., carriers' switching offices), FDM is a simple and efficient allocation mechanism. However, when the number of senders is large and continuously varying or the traffic is bursty, FDM presents some problems. 1) when fewer than N users are currently interested in communicating, a large piece of valuable spectrum will be wasted. 2) when more users wants to communicate, those who have not been assigned a frequency will be denied permission. 3) even assuming that the number of users could somehow be held constant at N, each user traffic usually changes dynamically over time.

40 Multiple Access Protocols ALOHA ALOHA Carrier Sense Multiple Access Protocols Carrier Sense Multiple Access Protocols Collision-Free Protocols Collision-Free Protocols Limited-Contention Protocols Limited-Contention Protocols Wavelength Division Multiple Access Protocols Wavelength Division Multiple Access Protocols Wireless LAN Protocols Wireless LAN Protocols

41 Evolution of random-access methods

42 ALOHA network

43 Procedure for ALOHA protocol

44 Pure ALOHA The basic idea of an ALOHA system is simple: let users transmit whenever they have data to be sent. There will be collisions, of course, and the colliding frames will be damaged. If the frame was destroyed, the sender just waits a random amount of time and sends it again. How the channel know that there is a collision: - Due to the feedback property of broadcasting, a sender can always find out whether its frame was destroyed by listening to the channel, the same way other users do. With a LAN, the feedback is immediate; with a satellite, there is a delay of 270 msec before the sender knows if the transmission was successful. - If listening while transmitting is not possible for some reason, acknowledgements are needed.

45 Pure ALOHA (2) In pure ALOHA, frames are transmitted at completely arbitrary times. The throughput of ALOHA systems is maximized by having a uniform frame size rather than by allowing variable length frames.

46 Other protocols Slotted ALOHA: It assumed the time is divided into discrete intervals. The station can send at the beginning of the next time interval whenever it have data ready after the start of the current time interval. 1- Persistent CSMA: When a station has data to send, it first listens to the channel to see if anyone else is transmitting at that moment. if the channel is idle, it start transmission. If the channel is busy, the station waits until it becomes idle. When the station detects an idle channel, it transmits a frame. If a collision occurs, the station waits a random amount of time and starts all over again. Nonpersistent CSMA: same as 1-persistent except that the station does not continually sense the channel when it finds it busy, rather it waits a random period of time and then sense the channel again. When the channel becomes idle it transmit. p-Persistent CSMA: same as Nonpersistent CSMA but the station transmit with probability p when the channel is idle.

47 Persistence strategies

48 CSMA/CD procedure

49 CSMA/CA procedure

50 Wireless LAN Protocols A system of notebook computers that communicate by radio can be regarded as a wireless LAN A common configuration for a wireless LAN is an office building with base stations (also called access points) strategically placed around the building. All the base stations are wired together using copper or fiber. A simplifying assumption that all radio transmitters have some fixed range will be used follow. When a receiver is within range of two active transmitters, the resulting signal will generally be garbled and useless.

51 Wireless LAN Protocols (2) A naive approach to using a wireless LAN might be to try CSMA: just listen for other transmissions and only transmit if no one else is doing so. The trouble is, this protocol is not really appropriate because what matters is interference at the receiver, not at the sender. A wireless LAN. (a) A transmitting. (b) B transmitting.

52 Wireless LAN Protocols (3) When A is transmitting to B (previous figure part a) If C senses the medium, it will not hear A because A is out of range, and thus falsely conclude that it can transmit to B. If C does start transmitting, it will interfere at B, wiping out the frame from A. The problem of a station not being able to detect a potential competitor for the medium because the competitor is too far away is called the hidden station problem.

53 Wireless LAN Protocols (4) When B transmitting to A (previous figure part b) If C senses the medium, it will hear an ongoing transmission and falsely conclude that it may not send to D, when in fact such a transmission would cause bad reception only in the zone between B and C, where neither of the intended receivers is located. This is called the exposed station problem.

54 Hidden station problem

55 The CTS frame in CSMA/CA handshake can prevent collision from a hidden station. Note

56 Use of handshaking to prevent hidden station problem

57 Exposed station problem

58 Use of handshaking in exposed station problem

59 Wireless LAN Protocols (5) The problem is that before starting a transmission, a station really wants to know whether there is activity around the receiver. An early protocol designed for wireless LANs is MACA (Multiple Access with Collision Avoidance) (Karn, 1990). The basic idea behind it is for the sender to stimulate the receiver into outputting a short frame, so stations nearby can detect this transmission and avoid transmitting for the duration of the upcoming (large) data frame.

60 Wireless LAN Protocols (6) Let us now consider how A sends a frame to B. - A starts by sending an RTS (Request To Send) frame to B. This short frame (30 bytes) contains the length of the data frame that will eventually follow. - Then B replies with a CTS (Clear to Send) frame. The CTS frame contains the data length (copied from the RTS frame). Upon receipt of the CTS frame, A begins transmission.

61 Wireless LAN Protocols (7) The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.

62 22.62 UNICAST ROUTING PROTOCOLS UNICAST ROUTING PROTOCOLS A routing table can be either static or dynamic. A static table is one with manual entries. A dynamic table is one that is updated automatically when there is a change somewhere in the Internet. A routing protocol is a combination of rules and procedures that lets routers in the Internet inform each other of changes. Optimization Intra- and Interdomain Routing Distance Vector Routing and RIP Link State Routing and OSPF Path Vector Routing and BGP Topics discussed in this section:

63 22.63 Figure Autonomous systems

64 22.64 Figure 22.13 Popular routing protocols

65 22.65 Figure 22.14 Distance vector routing tables

66 22.66 Figure 22.15 Initialization of tables in distance vector routing

67 22.67 In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change. Note

68 22.68 Figure Updating in distance vector routing

69 22.69 Figure Two-node instability

70 Summary  Trends challenging data communications: traffic growthtraffic growth development of new servicesdevelopment of new services advances in technologyadvances in technology  Transmission mediums fiber opticfiber optic wirelesswireless  Network categories: WANWAN LANLAN  Internet evolved from the ARPANETevolved from the ARPANET TCP/IP foundationTCP/IP foundation


Download ppt "Data and Computer Communications Ninth Edition by William Stallings Chapter 1 – Data Communications, Data Networks, and the Internet."

Similar presentations


Ads by Google