Data Transmission and Home Networks. Gralla: part 2

Similar documents
DATA COMMUNICATION AND NETWORKS

Special expressions, phrases, abbreviations and terms of Computer Networks

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

ก ก Information Technology II

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Medium Access Protocols

Principles behind data link layer services:

Principles behind data link layer services

Principles behind data link layer services:

Summary of MAC protocols

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

COMPONENTS OF DATA COMMUNICATION

CARRIER SENSE MULTIPLE ACCESS (CSMA):

The Internet software layers

Module 11. OSI Model, Network Devices, and Network Standards

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Lecture 7: Internetworking See Chapter 3 of Colouris

Operating Systems CS 571

ECS 152A Computer Networks Instructor: Liu. Name: Student ID #: Final Exam: March 17, 2005

More on LANs. Roadmap. CPSC Network Programming. ! Hardware Addressing. !LAN Wiring. ! Extending LANs. ! Local Loop Digital Technologies

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

The Link Layer and LANs. Chapter 6: Link layer and LANs

Principles behind data link layer services:

DCN Questions CHAPTER 1:- NETWORKING FUNDAMENTALS

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 15: Multiplexing (2)

Data Link Layer -2- Network Access

Contents. Introduction to Networking. Preface...i. Introduction... xix

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

2012 Fall CS HW#7 True/False Multiple Choices

University of Southern California EE450: Introduction to Computer Networks

Chapter 16 Networking

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Typical Network Uses

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

CS1302 / Computer Networks

Digital Access Networks. T /301 Jouni Karvo, Timo Kiravuo

Data Link Layer -2- Network Access

Chapter 15 Computer and Multimedia Networks

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007.

MTA_98-366_Vindicator930

Links. CS125 - mylinks 1 1/22/14

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

The Medium Access Control Sublayer

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

Chapter 2 Communicating Over the Network

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Unit 09 Computer Networks

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

Link Layer and Ethernet

Review For Exam 2. Fundamentals of Data & Signals. Summary Questions. School of Business Eastern Illinois University

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Link Layer and Ethernet

ITP 140 Mobile Applications Technologies. Networks

TERM EXAMS CS610- COMPUTER NETWORKS

CCNA 1 v5.0 R&S ITN Final Exam 2014

Chapter 9 Ethernet Part 1

INTERNET ARCHITECTURE & PROTOCOLS

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

UNIT - IV Ques.4 Ques.5

CSCD 330 Network Programming Spring 2017

1. Data Link Layer Protocols

NZQA unit standard version 2 Page 1 of 6. Demonstrate basic knowledge of telecommunications concepts

VU Mobile Powered by S NO Group All Rights Reserved S NO Group 2012

NETWORK SECURITY ITEC 435

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

CS 455/555 Intro to Networks and Communications. Link Layer

CCNA 1 Capítulo 8 OSI Physical Layer. 2004, Cisco Systems, Inc. All rights reserved.

Chapter 8: Fundamental Networks

Study Guide. Module Two

Chapter 5 Link Layer and LANs

CSE 461: Multiple Access Networks. This Lecture

Slides for Chapter 3: Networking and Internetworking

CSC 4900 Computer Networks: The Link Layer

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

IEEE 802 LANs SECTION C

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

Chapter 6: Network Communications and Protocols

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

The following CompTIA Network+ domain objectives and examples are covered in this module:

Lecture (04) Network Access layer fundamentals I

WIRELESS SENSOR NETWORK

ITP 140 Mobile Applications Technologies. Networks

Transcription:

Data Transmission and Home Networks Gralla: part 2

A Home Network Home network Firewall Hub/ Switch 192.168.1.1/ 137.42.12.12 ADSL Modem Internet Operator's services 192.168.1.140 192.168.1.100 External network Roughly from: Gralla pp. 80-81

How the Home Network Works The computers are connected by a hub or switch to form one Ethernet segment The Ethernet is a shared medium Ethernet frames can be sent to other computers by attaching the recipient's Ethernet address into to the beginning Each computer has its own IP address Other computers can be found by their IP address by broadcasting an ARP query to the Ethernet network The gateway has two IP addresses One for the inside segment One for the outside interface

Local Area Network A LAN (lähiverkko) means usually a physical network and the lower layer (1-2) protocols related to it Current common standards are Ethernet and WLAN Both standards use 6 byte Medium Access Control (MAC) addresses inside the network segment Both require an adapter to the computer and a device driver to translate the signals to data Ethernet uses various media, most common is a twisted pair cable IEEE 802.3 defines the protocol behavior. Cabling and capacity differs in versions. Wireless LAN uses radio frequencies The most common standard is IEEE 802.11b/g, aka. WLAN or WiFi

A Shared Media The traditional Ethernet media is a shared bus, Only one station can send at the same time or signals confuse each other Likewisw with WLAN Solution: everybody waits until nobody is sending CSMA, Carrier Sense Multiple Access Other solutions: have a master controller or give everybody a fair share Many sensor or field bus networks have a master controller Token Ring nodes are organized in a ring and a data pattern called token is passed around in order, whoever has the token has a right to send

Collisions in the Shared Media Crash!! Collisions happen, so a strategy is needed to manage them Collision Detection and resend: CSMA/CD (Ethernet) When two stations on an Ethernet send simultaneously they recognize the collision, each party stops sending and starts again after a random time Collision Avoidance e.g. reservation of the media: CSMA/CA (WLAN) WLAN nodes ask the access point for a permission to send

Single collision domain (a) (b) Current Ethernet Hubs & Switches High-Speed backplane or interconnection fabric Hub (keskitin): Star-topology CSMA/CD Both: Twisted Pair is cheap Easy to work with Switch (kytkin): Bridging increases scalability Separate collision domains Full duplex operation Star topology

WLAN Hidden Node Problem (a) A Data Frame C A transmits data frame B C senses free medium, station A is hidden from C (b) Data Frame B Data Frame C A C transmits data frame & collides with A at B, C does not detect the collision New MAC algorithm: CSMA with Collision Avoidance A and C send Request To Send messages B decides who can send with a Clear To Send message

A computer on the network should know its: Own IP address Gateway (router, firewall) IP address Netmask Own IP address is obvious Gateway is needed to connect the host to the Internet and is recognized by its IP address Netmask is a binary mask that enables the operating system to recognize which addresses are on the LAN and which can be accessed through the gateway: IP: 192.168.1.100 GW: 192.168.1.1 NM: 255.255.255.0 This means that all 192.168.1.* addresses are on the LAN IP on LAN

IP Addresses IP address identifies a network interface. A host can have several interfaces. Current length is 32 bits (IPv4). Future length is 128 bits (IPv6). General syntax: 4 components (bytes) separated by dots ("dotted quad") Represented as decimal numbers (0-255) For example: 193.210.18.18 Addresses have two components, the network id and the host id.

Address Resolution Protocol Problem: IP addresses only make sense to the TCP/IP protocol suite, not to the hardware (Ethernet) interface Solution: ARP maps IP addresses to hardware addresses A host finds other hosts by broadcasting an ARP query for the IP address The host with correct IP address replies with its hardware address The address pair is added to receiver's dynamic ARP cache See: arp -a But how to know my own IP address?

DHCP Dynamic Host Configuration Protocol) Automatic assignment of IP addresses Dynamic assignment for a limited time Or a permanent address tied to the MAC address Used when a host enters a new LAN segment At boot time, or a portable computer connects Server1 Client Server 2 DHCPDISCOVER DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPOFFER DHCPREQUEST DHCPACK

DNS A translation between host names (mostly for humans) and IP addresses Based on distributed servers Each organization can maintain the data for their own zone Zones are delegated from above organizations in the hierarchy E.g. Ficora in Finland maintains the fi zone and they have delegated tkk.fi to TKK Thus: vipunen kiravuo 56 % /usr/sbin/dig www.hut.fi www.hut.fi. 3600 IN A 130.233.240.9 ns1.hut.fi. 3600 IN A 130.233.224.1

The Physical Layer What is really happening in the Ethernet network, GSM phones, WLAN etc. How to send a digital signal over a physical medium? The digital signal can be coded and the coding sampled at the receiving end How to translate an analog signal to digital? Analog signals can be sampled and translated to a digilat representation

How is Digital Voice Transmitted? Sound signal Sampling, Quantifying Coding Transmission Mikrophone A/D Source coding 1001101.mp3 Line coding Sound Filtering Decoding Receiving Transmission channel Loudspeaker D/A Sample generation Line (de)- coding

Why Digital Transmission? In optimal conditions analog transmission provides superior quality However conditions over any meaningful transmission path are usually not optimal It is usually impossible to figure out which part of an analog signal is distortion and which is original It is easy to recreate an exact replica of a digital signal Digitalization loses a pre-defined amount of detail

Sampling and Quantizing

Line Coding for Transmitting Digital Data 0 1 0 0 1 0 0 0 0 0 1 NRZ AMI HD3B Manchester Line coding is used over high quality media (e.g. Ethernet or optical cabling) Very little noise or other signals The coding provides a method to identify 0s and 1s

Transmission Errors Original signal Attenuated Limited bandwidth Noise

Modulation for Digital Signals A carrier wave can be used to transport the signal amplitude modulation (AM), amplitude shift keying (ASK) frequency modulation (FM), frequency-shift keying (FSK) phase modulation (PM), phase-shift keying (PSK), ASK FSK PSK Modulation is used when the media has noise or interference, the receiver can create a reference signal and detect the differences that contain the data

An example of a whole system: ADSL ADSL (Asymmetric Digital Subscriber Line) uses a single twisted pair, and allows simultaneous transmission of downstream simplex, duplex, base band analogue, ADSL line overhead and framing, error control, operations and maintenance. Uses Discrete Multitone (DMT) modulation, where the frequency spectrum is divided in narrow sub bands, each of which can be configured separately ADSL transmission is possible simultaneously with POTS, analogue modems, ISDN. ADSL has a low speed full-duplex bearer channel and a high speed bearer channel on the downstream direction. ADSL version ITU-T G.992.1 supports 6.144Mbps downstream and 640kbps upstream. ADSL version ITU-T G.992.2 supports up to 1.563Mbps downstream and 512kbps upstream. ADSL provides transport of STM and/or ATM.

Traffic Encapsulation HTTP request TCP header HTTP request IP header TCP header HTTP request Ethernet header IP header TCP header HTTP request Checksum Encapsulation allows the use of several techniques at the same time Different layers implement different methods

Summary LANs are needed to move data over shared local networks The Internet Protocol transmits data from LANs to other LANs regardless of the differences in underlaying protocols Otherwise WLAN could no provide access to Ethernet services Modulation or line coding is used at the physical layer to transmit bits