Business Da Business Data ta Commu Communica nications tions and and Netw Networ
- rking
king
Abdullah Alfarrarjeh
Most of the slides in this lecture are either from or adapted from the slides provided by Dr. Hussein Alzoubi
Commu Communica nications tions and and Netw Networ orking - - PowerPoint PPT Presentation
Business Da Business Data ta Commu Communica nications tions and and Netw Networ orking king Abdullah Alfarrarjeh Most of the slides in this lecture are either from or adapted from the slides provided by Dr. Hussein Alzoubi
Most of the slides in this lecture are either from or adapted from the slides provided by Dr. Hussein Alzoubi
5/5/2020 Business Data Communications and Networks (13711) 2
5/5/2020 Business Data Communications and Networks (13711) 3
5/5/2020 Business Data Communications and Networks (13711) 4
5/5/2020 Business Data Communications and Networks (13711) 5
▪ they use a contention technique to send an access request.
5/5/2020 Business Data Communications and Networks (13711) 6
▪ Roll-call polling
▪ first polling client 1, then client 2, and so on, until all are polled. ▪ For example, one could increase the priority of client 1 by using a polling sequence such as 1, 2, 3, 1, 4, 5, 1, 6, 7, 1, 8, 9. ▪ Usually, a timer “times-out” the client after waiting several seconds without getting a response. ▪ If some sort of fail-safe time-out is not used, the circuit poll might lock up indefinitely on an out-of-service client.
▪ Hub polling (often called token passing): one device starts the poll and passes it to the next computer on the multipoint circuit, which sends its message and passes the poll to the next. That computer then passes the poll to the next, and so on, until it reaches the first computer, which restarts the process again.
5/5/2020 Business Data Communications and Networks (13711) 7
Media Access Control Sub- layer Contention Controlled Access Access Request Polling Roll-call Polling Hub Polling
5/5/2020 Business Data Communications and Networks (13711) 8
▪ which approach will permit the most amount of user data to be transmitted through the network.
▪ Because usage is low, there is little chance of a collision.
5/5/2020 Business Data Communications and Networks (13711) 9
5/5/2020 Business Data Communications and Networks (13711) 10
5/5/2020 Business Data Communications and Networks (13711) 11
▪ For example, the error rate might be stated as 1 in 500,000,
5/5/2020 Business Data Communications and Networks (13711) 12
5/5/2020 Business Data Communications and Networks (13711) 13
5/5/2020 Business Data Communications and Networks (13711) 14
1. White noise
▪ Background hiss or static on radios and telephones. ▪ Not usually a problem unless being so strong that it obliterates the transmission. ▪ Caused by the thermal agitation of electrons. ▪ To prevent it, increase the signal-to-noise ratio.
2. Impulse noise
▪ Heard as a click or a crackling noise and can last as long as 1∕100 of a second. ▪ Not really affect voice communications, but it causes a burst error.
▪ At 1.5 Mbps, 15,000 bits would be changed by a spike of 1∕100 of a second.
▪ Caused by voltage changes in adjacent lines, lightning flashes during thunderstorms, fluorescent lights, and poor connections in circuits. ▪ To prevent it, shield the wires.
5/5/2020 Business Data Communications and Networks (13711) 15
3. Cross-talk
▪ During telephone calls, someone can hear other conversations in the background. ▪ Usually has a low signal strength that it is normally not bothersome. ▪ Occurs :
▪ when one circuit picks up signals in another ▪ between pairs of wires that are carrying separate signals, ▪ in multiplexed links carrying many discrete signals, ▪ In microwave links in which one antenna picks up a minute reflection from another antenna.
▪ Increased with :
▪ increased communication distance ▪ increased proximity of a two wires, ▪ increased signal strength, ▪ higher-frequency signals ▪ Wet or damp weather.
▪ To prevent it, shield the wires.
5/5/2020 Business Data Communications and Networks (13711) 16
▪ Usually has a low signal strength that it is normally not bothersome.
▪ If the strength of the echo is strong enough to be detected, it causes errors.
▪ Occurs:
▪ when having poor connections that cause the signal to reflect back to the transmitting equipment. ▪ in fiber-optic cables when connections between cables are not properly aligned.
▪ To prevent it
▪ fix connection ▪ tune equipment
5/5/2020 Business Data Communications and Networks (13711) 17
▪ Attenuation is the loss of power a signal suffers as it travels from the transmitting computer to the receiving computer. ▪ Some power is absorbed by the medium, or is lost before it reaches the receiver
▪ As the medium absorbs power, the signal becomes weaker, and the receiving equipment has less and less chance of correctly interpreting the data.
▪ The power loss affected by:
▪ transmission method ▪ circuit medium
▪ Increased with:
▪ High frequencies ▪ Decrease of the diameter of the wire
▪ To prevent it, use repeaters or amplifiers.
5/5/2020 Business Data Communications and Networks (13711) 18
6. Intermodulation noise (a special type of cross-talk)
▪ On a multiplexed line, many different signals are amplified together, ▪ Slight variations in the adjustment of the equipment can cause such noise ▪ A maladjusted modem may transmit a strong frequency tone when not transmitting data, thus producing this type of noise.
▪ To prevent it, shield the wires
5/5/2020 Business Data Communications and Networks (13711) 19
5/5/2020 Business Data Communications and Networks (13711) 20
▪ Protecting wires by covering them with an insulating coating
▪ When increasing the shielding, the cable becomes more expensive and more difficult to be installed.
▪ One of the best ways to prevent impulse noise, cross-talk, and intermodulation noise.
▪ Locating cables away from sources of noise (especially power
sources)
▪ Reduces impulse noise, cross-talk, and intermodulation noise.
▪ For impulse noise:
▪ Avoiding lights and heavy machinery. ▪ Locating communication cables away from power cables.
▪ For cross-talk:
▪ Separating the cables physically from other communication cables.
5/5/2020 Business Data Communications and Networks (13711) 21
▪ Changing multiplexing techniques (e.g., from FDM to TDM) ▪ Changing the frequencies or size of the guardbands in FDM.
▪ poorly maintained equipment ▪ poor connections
▪ e.g., echo in fiber-optic cables
▪ splices among cables.
5/5/2020 Business Data Communications and Networks (13711) 22
5. Using Repeaters or Amplifiers
▪ For telephone circuits, use repeaters or amplifiers spaced throughout their length. ▪ The distance between repeaters/amplifiers depends on the amount of power lost per unit length of the transmission line. ▪ Amplifiers:
▪ Commonly used on analog circuits ▪ An amplifier takes the incoming signal, increases its strength, and retransmits it on the next section of the circuit
▪ On analog circuits, the noise and distortion are also amplified, along with the signal. This means some noise from a previous circuit is regenerated and amplified each time the signal is amplified.
▪ Repeaters:
▪ Commonly used on digital circuits. ▪ A repeater receives the incoming signal, translates it into a digital message, and retransmits the message.
▪ Because the message is recreated at each repeater, noise and distortion from the previous circuit are not amplified ▪ This provides a much cleaner signal and results in a lower error rate for digital circuits.
5/5/2020 Business Data Communications and Networks (13711) 23
▪ The way to do error detection is to send extra data with each message. ▪ These error-detection data are added to each message by the data link layer of the sender on the basis of some mathematical calculations performed on the message. ▪ As the amount of error-detection data is increased, the throughput
used to transmit these error-detection data and less is used to transmit the actual message itself. ▪ Three well-known error-detection methods are:
▪ parity checking ▪ Checksum ▪ cyclic redundancy checking.
5/5/2020 Business Data Communications and Networks (13711) 24
▪ Parity Checking:
▪ One additional bit is added to each byte in the message
▪ Based on the number of 1s in each byte transmitted ▪ A parity bit is set to make the total number of 1s in the byte (including the parity bit) either an even number or an odd number
▪ odd parity or even parity
▪ The probability of detecting an error, given that one has occurred, is
▪ can detect errors only when an odd number of bits have been switched
▪ Many networks today do not use parity because of its low error- detection rate.
5/5/2020 Business Data Communications and Networks (13711) 25
1. adding the decimal value of each character in the message 2. dividing the sum by 255 3. using the remainder as the checksum.
5/5/2020 Business Data Communications and Networks (13711) 26
▪ It adds 8, 16, 24, or 32 bits to the message. ▪ [Sender Side]
▪ A message is treated as one long binary number, which is divided by a preset number, and the remainder is used as the CRC code. ▪ The preset number is chosen so that the remainder will be either 8 bits, 16 bits, 24 bits, or 32 bits.
▪ [Receiver Side] The receiving divides the received message by the same preset number, which generates a remainder. The receiving checks if the received CRC matches the locally generated remainder. If it does not, the message is assumed to be in error. ▪ CRC-16 will detect about 99.998% of all burst errors longer than 16 bits. ▪ CRC-32 will detect about 99.99999998% of all burst errors longer than 32 bits.
5/5/2020 Business Data Communications and Networks (13711) 27
5/5/2020 Business Data Communications and Networks (13711) 28
▪ It ranges from a small percentage of extra bits to 100% redundancy
5/5/2020 Business Data Communications and Networks (13711) 29
▪ error correction is commonly done by the transport layer using continuous automatic repeat reQuest (ARQ).
5/5/2020 Business Data Communications and Networks (13711) 30
5/5/2020 Business Data Communications and Networks (13711) 31
Protocol Data Unit (PDU) as the message passes through them.
transmit the message through the network.
▪ so media access control is not a concern.
5/5/2020 Business Data Communications and Networks (13711) 32
▪ With asynchronous transmission, each character is transmitted independently of all other characters. ▪ To separate the characters and synchronize transmission, a start bit and a stop bit are put on the front and back of each individual character.
▪ For example, if we are using 7-bit ASCII with even parity, the total transmission is 10 bits for each character (1 start bit, 7 bits for the letter, 1 parity bit, 1 stop bit).
▪ The start bit and stop bit are the opposite of each other. Typically, the start bit is a 0 and the stop bit is a 1. ▪ There is no fixed distance between characters because the terminal transmits the character as soon as it is typed, which varies with the speed of the typist.
5/5/2020 Business Data Communications and Networks (13711) 33
5/5/2020 Business Data Communications and Networks (13711) 34
5/5/2020 Business Data Communications and Networks (13711) 35
▪ Synchronous Data Link Control (SDLC) is a mainframe protocol developed by IBM in 1972 that is still in use today.
▪ It uses a controlled-access media access protocol.
▪ If you use a 3270 protocol, you’re using SDLC.
▪ SDLC Frame Components:
▪ The Flag fields: e.g., 01111110 (a fixed pattern) – identifies the start and end
▪ The address field identifies the destination. ▪ The control field (the kind of frame that is being transmitted)
▪ An information frame ▪ A supervisory frame:
▪ ACKs and NAKs
▪ The frame check sequence field is a 32-bit CRC code ▪ The message field.
5/5/2020 Business Data Communications and Networks (13711) 36
5/5/2020 Business Data Communications and Networks (13711) 37
5/5/2020 Business Data Communications and Networks (13711) 38
5/5/2020 Business Data Communications and Networks (13711) 39
▪ In most cases, the control field is 1-byte long.
5/5/2020 Business Data Communications and Networks (13711) 40
▪ The type field is used to specify an ACK frame or the type of network layer packet the frame contains (e.g., IP). ▪ Ethernet II has an unusual way of marking the end of a frame.
▪ When the frame ends, the sending computer transmits no signal for 96 bits (i.e., neither a 0 or a 1). ▪ After these 96 bits have been on no signal, the sending computer then transmits the next frame, which starts with a preamble, and so on.
▪ It is possible that in the time that the computer is sending no signal, some other computer could jump in and begin transmitting.
5/5/2020 Business Data Communications and Networks (13711) 41
5/5/2020 Business Data Communications and Networks (13711) 42
5/5/2020 Business Data Communications and Networks (13711) 43
▪ Transmission efficiency is defined as the total number of information bits (i.e., bits in the message sent by the user) divided by the total bits in transmission (i.e., information bits plus overhead bits).
▪ For example, with asynchronous transmission, only 70% of the data rate is available for the user;
▪ 30%is used by the transmission protocol. ▪ If we have a communication circuit using a dial-up modem receiving 56 Kbps, the user sees an effective data rate (or throughput) of 39.2 Kbps.
▪ This is very inefficient.
▪ With SDLC: if the message portion of the frame contains 100 information characters and we are using 8-bit code. Then there are 100*8 = 800 bits of
a beginning flag (8 bits), an address (8 bits), a control field (8 bits), a frame check sequence (assume that we use a CRC-32 with 32 bits), and an ending flag (8 bits).This is a total of 64 overhead bits.
▪ efficiency is 800∕(800 + 64) = 92.6%. ▪ If the circuit provides a data rate of 56 Kbps, then the effective data rate available to the user is about 51.9 Kbps.
5/5/2020 Business Data Communications and Networks (13711) 44
5/5/2020 Business Data Communications and Networks (13711) 45
5/5/2020 Business Data Communications and Networks (13711) 46
5/5/2020 Business Data Communications and Networks (13711) 47
5/5/2020 Business Data Communications and Networks (13711) 48
▪ and is therefore hardcoded on the network interface card (NIC) and cannot be changed.
▪ This feature allows for some degree of security.
▪ However, MAC address filtering can offer a false sense of security because of MAC address spoofing.
▪ Keep in mind that while MAC address spoofing is not illegal, what you do with it may be.
5/5/2020 Business Data Communications and Networks (13711) 49