CS475 – Networks Assignments Lecture 4 Chapter 2: Direct Link Networks

advertisement
CS475 – Networks
Lecture 4
Chapter 2: Direct Link Networks
Assignments
• Reading for Lecture 5: Sections 2.4 – 2.5
• Programming Project 1 out, due Thursday, September 15
Chapter 2: Introduction
After connecting two hosts there are other issues to resolve
3) How are errors detected?
before the two hosts can communicate:
4) How do we ensure reliability?
1) How are bits ________________ onto the medium?
5) How is access controlled on a shared link?
2) How do we separate bits into frames?
2.1 Perspectives on Connecting
Recall that networks are constructed from nodes and ________.
Network needs to connect all types of links together to provide
reliable and useful service to the higher layers of the protocol
stack.
Fig 2.1 End-user's view of the Internet
2.1.1 Classes of Links
1. Speed of Propagation and frequency depend on medium
(e.g. copper, optical fiber, air)
translate bits to “high” and “low” signals.
3.
WaveLength = SpeedOfPropagation / Frequency
Different modulation methods can be used to translate
the “high” and “low” signals to electronic waveforms.
2.
Different ______________ methods can be used to
4.
How the links are used
Service Bandwidth (typical)
Dial-up 28 – 56 kbps
"Last mile" links to users.
______ 64 – 128 kbps
Long-distance backbone links, mostly optical fiber
Building-wide LAN links, mostly Ethernet but also
DSL 128 kbps – 100 Mbps
CATV 1 – 40 Mbps
FTTH 50 Mbps - 1 Gbps
wireless
Table 2.1 Common services for home connections
09/06/2001
Page 1 of 4
2.2 Encoding
Most encoding/decoding functions are performed by a
____________________________.
NRZ Encoding
There are several methods used to map (encode) bits to “high”
and “low” signals.
Figure 2.3 NRZ encoding of a bitstream.
________________________________ (NRZ) is the simplest.
There are two problems with NRZ:
2) Frequent transitions are needed for the receiver clock to
1) The receiver averages the signal to determine a detection
maintain ___________________________ with the transmitter
threshold. A long stream of lows or highs can cause the
clock. A long stream of lows or highs may again cause
threshold to drift from the desired value.
problems.
NRZI Encoding
Nonreturn to Zero _________________ (NRZI) encoding uses a
transition to represent a 1. No transition represents a 0.
NRZI fixes problems due to a stream of 1s, but does nothing to
address the problems due to a stream of 0s.
Figure 2.5 Different encodings
Manchester Encoding
In Manchester encoding the NRZ signal is exclusive-or'ed with
signal change rate (the _____________ rate). The encoding is
the clock signal. This results in a transition each clock period.
considered to be 50% efficient.
With Manchester encoding the bit transmit rate is one-half the
4B/5B Encoding
In 4B/5B encoding, four bits are encoded as five bits in such a
Only 16 of the 32 five bit codes are needed for encoding, some
way that there are never more than three consecutive 0s. The
of the remaining 16 codes are used for signaling (11111 – line
bits are then further encoded using NRZI so consecutive 1s do
idle) and _____________________.
not present a problem. 4B/5B coding is 80% efficient.
In Class Exercise:
09/06/2001
Problem 2.2 (page 153)
Page 2 of 4
2.3 Framing
In packet-switched networks packets (called frames at this level)
are exchanged between hosts, not continuous bit streams.
The central challenge is determining what set of bits make up a
frame.
2.3.1 Byte Oriented Protocols
In byte oriented framing protocols a frame is viewed as a
Two approaches (__________________ and byte-count) are
collection of bytes.
used to indicate the message size.
BISYNC – Binary Synchronous Communication
The BISYNC format uses sentinel characters to mark the start of the frame (SYN) and the start and end of the message (STX &
ETX).
An ETX character in the body is “__________________” (preceded by) a DLE character. A DLE character is escaped by another
DLE. This technique is known as character stuffing.
Fig. 2.7 BISYNC Frame Format
PPP – Point-to-point Protocol
PPP is often used over modem links to carry IP packets. It is also used on some fiber optic links. The protocol field is used to
demultiplex high-level protocols (IP/IPX/LPC).
PPP uses the __________________________ Protocol (LPC) to negotiate the frame format, datagram size and escaped characters.
Fig. 2.8 PPP Frame
DDCMP–Digital Data Communication Message Protocol
Instead of using a sentinel character, DDCMP includes a ___________________________ field in the frame header that indicates
the number of bytes in the body.
Fig. 2.9 DDCMP Frame
09/06/2001
Page 3 of 4
2.3.2 Bit Oriented Protocols
HDLC–High Level Data Link Control
HDLC uses the bit sequence 01111110 to mark the start and end of the frame.
____________________ is used if this sequence appears anywhere else in the frame. After five 1s the transmitter inserts a 0 (bit
stuffing). The receiver discards any 0 that appears after five 1s.
Fig. 2.15 HDLC Frame
In-Class Exercises
Problem 2.7 (page 154)
Problem 2.8 (page 154)
09/06/2001
Turn in the in-class exercises before you leave.
Page 4 of 4
Download