Data and Computer Communications Chapter 1 – Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data Communications, Data Networks, and the Internet “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point” - The Mathematical Theory of Communication, Claude Shannon Message Message 1-1 DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data. Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable. 1.3 Figure 1.1 Five components of data communication 1.4 Figure 1.2 Data flow (simplex, half-duplex, and full-duplex) 1.5 1-2 NETWORKS A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. 1.6 Figure 1.3 Types of connections: point-to-point and multipoint 1.7 Technological Advancement Driving Forces Traffic growth at a high & steady rate • Development of new services • Advances in technology Changes in Networking Technology * Emergence of high-speed LANs * Corporate WAN needs * Digital electronics Communications Model Communications Tasks Transmission system utilization Addressing Interfacing Routing Signal generation Recovery Synchronization Message formatting Exchange management Security Error detection and correction Network management Flow control Transmission Lines Capacity The basic building block of any communications facility is the transmission line. The business manager is concerned with a facility providing the required capacity, with acceptable reliability, at minimum cost. Reliability Cost Transmission Line Two mediums currently driving the evolution of data communications transmission are: and Networking Advances in technology have led to greatly increased capacity and the concept of integration, allowing equipment and networks to work simultaneously. Voice Data Image Video Network Hardware Classifying networks based on their scale: Local Area Networks Metropolitan Area Networks Wide Area Networks Wireless Networks Home Networks Internetworks 15 Network Hardware 16 LANs and WANs There are two broad categories of networks: Local Area Networks (LAN) Wide Area Networks (WAN) Wide Area Networks (WANs) Span a large geographical area Require Rely the crossing of public right-of-ways in part on common carrier circuits Typically consist of a number of interconnected switching nodes Wide Area Networks Alternative technologies used include: Circuit switching Packet switching Frame relay Asynchronous Transfer Mode (ATM) Circuit Switching Uses a dedicated communications path Connected sequence of physical links between nodes Logical channel dedicated on each link Rapid transmission The most common example of circuit switching is the telephone network Network Hardware Wide Area Networks 21 Packet Switching Data are sent out in a sequence of small chunks called packets Packets are passed from node to node along a path leading from source to destination Packet-switching networks are commonly used for terminal-to-terminal computer and computer-to-computer communications Asynchronous Transfer Mode (ATM) Referred to as cell relay Culmination of circuit switching and packet switching Uses fixed-length packets called cells Works in range of 10’s and 100’s of Mbps and in the Gbps range Data rate on each channel dynamically set on demand Local Area Networks (LAN) Metropolitan Area Networks (MAN) Network Hardware Wireless Networks Categories of wireless networks: System interconnection Wireless LANs Wireless WANs 26 Network Hardware Wireless Networks System interconnection Bluetooth a short-range wireless network. Allows system components together, digital cameras, headsets, scanners, and other devices to connect to a computer by merely being brought within range. Wireless LANs Every computer has a radio modem and antenna with which it can communicate with other systems. Standard for wireless LANs: IEEE 802.11, which most systems implement and which is becoming very widespread. 27 Network Hardware Wireless Networks Wireless WANs (cont.) Wireless LANs an operate at rates up to about 50 Mbps over distances of tens of meters. While cellular systems (Wireless WANs) operate below 1 Mbps, but the distance between the base station and the computer or telephone is measured in kilometers rather than in meters. High-bandwidth wide area wireless networks are also being developed (IEEE 802.16). 28 The Channel Allocation Problem To allocate a single broadcast channel among competing users, we can use: • Static Channel Allocation in LANs and MANs • Dynamic Channel Allocation in LANs and MANs Static Channel Allocation in LANs and MANs Frequency Division Multiplexing (FDM) is an example of static channel allocation where the bandwidth is divided among a number of N users. When there is only a small and constant number of users, each of which has a heavy (buffered) load of traffic (e.g., carriers' switching offices), FDM is a simple and efficient allocation mechanism. However, when the number of senders is large and continuously varying or the traffic is bursty, FDM presents some problems. Multiple Access Protocols • • • • • • ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Limited-Contention Protocols Wavelength Division Multiple Access Protocols Wireless LAN Protocols Evolution of random-access methods ALOHA network Procedure for ALOHA protocol Pure ALOHA The basic idea of an ALOHA system is simple: let users transmit whenever they have data to be sent. There will be collisions, of course, and the colliding frames will be damaged. If the frame was destroyed, the sender just waits a random amount of time and sends it again. How the channel know that there is a collision: - Due to the feedback property of broadcasting, a sender can always find out whether its frame was destroyed by listening to the channel, the same way other users do. With a LAN, the feedback is immediate; with a satellite, there is a delay of 270 msec before the sender knows if the transmission was successful. - If listening while transmitting is not possible for some reason, acknowledgements are needed. Pure ALOHA (2) In pure ALOHA, frames are transmitted at completely arbitrary times. The throughput of ALOHA systems is maximized Other protocols Slotted ALOHA: It assumed the time is divided into discrete intervals. The station can send at the beginning of the next time interval whenever it have data ready after the start of the current time interval. 1- Persistent CSMA: When a station has data to send, it first listens to the channel to see if anyone else is transmitting at that moment. if the channel is idle, it start transmission. If the channel is busy, the station waits until it becomes idle. When the station detects an idle channel, it transmits a frame. If a collision occurs, the station waits a random amount of time and starts all over again. Nonpersistent CSMA: same as 1-persistent except that the station does not continually sense the channel when it finds it busy, rather it waits a random period of time and then sense the channel again. When the channel becomes idle it transmit. p-Persistent CSMA: same as Nonpersistent CSMA but the station transmit with probability p when the channel is idle. Persistence strategies CSMA/CD procedure CSMA/CA procedure Wireless LAN Protocols A system of notebook computers that communicate by radio can be regarded as a wireless LAN A common configuration for a wireless LAN is an office building with base stations (also called access points) strategically placed around the building. All the base stations are wired together using copper or fiber. A simplifying assumption that all radio transmitters have some fixed range will be Wireless LAN Protocols (2) A naive approach to using a wireless LAN might be to try CSMA: just listen for other transmissions and only transmit if no one else is doing so. The trouble is, this protocol is not really appropriate because what matters is interference at the receiver, not at the sender. A wireless LAN. (a) A transmitting. (b) B transmitting. Wireless LAN Protocols (3) When A is transmitting to B (previous figure part a) If C senses the medium, it will not hear A because A is out of range, and thus falsely conclude that it can transmit to B. If C does start transmitting, it will interfere at B, wiping out the frame from A. The problem of a station not being able to detect a potential competitor for the medium because the competitor is too far away is called the hidden station problem. Wireless LAN Protocols (4) When B transmitting to A (previous figure part b) If C senses the medium, it will hear an ongoing transmission and falsely conclude that it may not send to D, when in fact such a transmission would cause bad reception only in the zone between B and C, where neither of the intended receivers is located. This is called the exposed station problem. Hidden station problem Note The CTS frame in CSMA/CA handshake can prevent collision from a hidden station. Use of handshaking to prevent hidden station problem Exposed station problem Use of handshaking in exposed station problem Wireless LAN Protocols (5) The problem is that before starting a transmission, a station really wants to know whether there is activity around the receiver. An early protocol designed for wireless LANs is MACA (Multiple Access with Collision Avoidance) (Karn, 1990). The basic idea behind it is for the sender to stimulate the receiver into outputting a short frame, so stations nearby can detect this transmission and avoid transmitting for the duration of the upcoming (large) data frame. Wireless LAN Protocols (6) Let us now consider how A sends a frame to B. - A starts by sending an RTS (Request To Send) frame to B. This short frame (30 bytes) contains the length of the data frame that will eventually follow. - Then B replies with a CTS (Clear to Send) frame. The CTS frame contains the data length (copied from the RTS frame). Upon receipt of the CTS frame, A begins transmission. Wireless LAN Protocols (7) The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A. UNICAST ROUTING PROTOCOLS A routing table can be either static or dynamic. A static table is one with manual entries. A dynamic table is one that is updated automatically when there is a change somewhere in the Internet. A routing protocol is a combination of rules and procedures that lets routers in the Internet inform each other of changes. Topics discussed in this section: Optimization Intra- and Interdomain Routing Distance Vector Routing and RIP Link State Routing and OSPF Path Vector Routing and BGP 22.53 Figure Autonomous systems 22.54 Figure 22.13 Popular routing protocols 22.55 Figure 22.14 Distance vector routing tables 22.56 Figure 22.15 Initialization of tables in distance vector routing 22.57 Note In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change. 22.58 Figure Updating in distance vector routing 22.59 Figure Two-node instability 22.60 Summary Trends challenging data communications: • traffic growth • development of new services • advances in technology Transmission mediums • fiber optic • wireless Network categories: • WAN • LAN Internet • evolved from the ARPANET • TCP/IP foundation