Communications protocol In the field of

advertisement
Communications protocol
In the field of telecommunications, a communications protocol is the set of standard rules for data
representation, signaling, authentication, and error detection required to send information over a
communications channel. These rules also include guidelines that regulate the following
characteristics of a network: access method, allowed physical topologies, types of cabling, and speed
of data transfer. The communication protocols for digital computer network communication have many
features intended to ensure reliable interchange of data over an imperfect communication channel.
Communication protocol is basically following certain rules so that the system works properly.
Systems engineering principles have been applied to create a set of common network protocol design
principles. These principles include effectiveness, reliability, and resiliency.
Effectiveness
Needs to be specified in such a way, that engineers, designers, and in some cases software developers
can implement and/or use it. In human-machine systems, its design needs to facilitate routine usage
by humans. Protocol layering accomplishes these objectives by dividing the protocol design into a
number of smaller parts, each of which performs closely related sub-tasks, and interacts with other
layers of the protocol only in a small number of well-defined ways.
Protocol layering allows the parts of a protocol to be designed and tested without a combinatorial
explosion of cases, keeping each design relatively simple. The implementation of a sub-task on one
layer can make assumptions about the behavior and services offered by the layers beneath it. Thus,
layering enables a "mix-and-match" of protocols that permit familiar protocols to be adapted to
unusual circumstances.
For an example that involves computing, consider an email protocol like the Simple Mail Transfer
Protocol (SMTP). An SMTP client can send messages to any server that conforms to SMTP's
specification. Actual applications can be (for example) an aircraft with an SMTP server receiving
messages from a ground controller over a radio-based internet link. Any SMTP client can correctly
interact with any SMTP server, because they both conform to the same protocol specification,
RFC2821. Some examples of layers,
1. At the lowest level, bits are encoded in electrical, light or radio signals by the Physical layer.
Some examples include RS-232, SONET, and Wi-Fi.
2. A somewhat higher Data link layer such as the point-to-point protocol (PPP) may detect errors
and configure the transmission system.
3. An even higher protocol may perform network functions. One very common protocol is the
Internet protocol (IP), which implements addressing for large set of protocols. A common
associated protocol is the Transmission control protocol (TCP) which implements error
detection and correction (by retransmission). TCP and IP are often paired, giving rise to the
familiar acronym TCP/IP.
4. A layer in charge of presentation might describe how to encode text (i.e.: ASCII or Unicode).
5. An application protocol like SMTP, may (among other things) describe how to inquire about
electronic mail messages.
Reliability
Assuring reliability of data transmission involves error detection and correction, or some means of
requesting retransmission. It is a truism that communication media are always faulty. The
conventional measure of quality is the number of failed bits per bits transmitted. This has the
wonderful feature of being a dimensionless figure of merit that can be compared across any speed or
type of communication media.
In telephony, links with bit error rates (BER) of 10-4 or more are regarded as faulty (they interfere
with telephone conversations), while links with a BER of 10 -5 or more should be dealt with by routine
maintenance (they can be heard).
Data transmission often requires bit error rates below 10-12. Computer data transmissions are so
frequent that larger error rates would affect operations of customers like banks and stock exchanges.
Since most transmissions use networks with telephonic error rates, the errors caused by these
networks must be detected and then corrected.
Communications systems detect errors by transmitting a summary of the data with the data. In TCP
(the internet's Transmission Control Protocol), the sum of the data bytes of packet is sent in each
packet's header. Simple arithmetic sums do not detect out-of-order data, or cancelling errors. A bitwise binary polynomial, a cyclic redundancy check, can detect these errors and more, but is slightly
more expensive to calculate.
Communication systems correct errors by selectively resending bad parts of a message. For example,
in TCP when a checksum is bad, the packet is discarded. When a packet is lost, the receiver
acknowledges all of the packets up to, but not including the failed packet. Eventually, the sender sees
that too much time has elapsed without an acknowledgement, so it resends all of the packets that
have not been acknowledged. At the same time, the sender backs off its rate of sending, in case the
packet loss was caused by saturation of the path between sender and receiver.
In general, the performance of TCP is severely degraded in conditions of high packet loss (more than
0.1%), due to the need to resend packets repeatedly. For this reason, TCP/IP connections are typically
either run on highly reliable fiber networks, or over a lower-level protocol with added error-detection
and correction features (such as modem links with ARQ). These connections typically have
uncorrected bit error rates of 10-9 to 10-12, ensuring high TCP/IP performance.
Resiliency
Resiliency addresses a form of network failure known as topological failure in which a communications
link is cut, or degrades below usable quality. Most modern communication protocols periodically send
messages to test a link. In phones, a framing bit is sent every 24 bits on T1 lines. In phone systems,
when "sync is lost", fail-safe mechanisms reroute the signals around the failing equipment.
In packet switched networks, the equivalent functions are performed using router update messages to
detect loss of connectivity.
Protocol Summary
Protocol
Cable
Speed
Topology
Ethernet
Twisted Pair, Coaxial, Fiber
10 Mbps
Linear Bus, Star, Tree
Fast Ethernet
Twisted Pair, Fiber
100 Mbps
Star
LocalTalk
Twisted Pair
.23 Mbps
Linear Bus or Star
Token Ring
Twisted Pair
4 Mbps - 16 Mbps
Star-Wired Ring
FDDI
Fiber
100 Mbps
Dual ring
ATM
Twisted Pair, Fiber
155-2488 Mbps
Linear Bus, Star, Tree
Topology
The physical topology of a network refers to the configuration of cables, computers, and other
peripherals. Physical topology should not be confused with logical topology which is the method used
to pass information between workstations.
Main Types of Physical Topologies
The following sections discuss the physical topologies used in networks and other related topics.






Linear Bus
Star
Star-Wired Ring
Tree
Considerations When Choosing a Topology
Summary Chart
Linear Bus
A linear bus topology consists of a main run of cable with a terminator at each end .All nodes (file
server, workstations, and peripherals) are connected to the linear cable. Ethernet and LocalTalk
networks use a linear bus topology.
Linear Bus topology
Advantages of a Linear Bus Topology


Easy to connect a computer or peripheral to a linear bus.
Requires less cable length than a star topology.
Disadvantages of a Linear Bus Topology




Entire network shuts down if there is a break in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in a large building.
Star
A star topology is designed with each node (file server, workstations, and peripherals) connected
directly to a central network hub or concentrator .
Data on a star network passes through the hub or concentrator before continuing to its destination.
The hub or concentrator manages and controls all functions of the network. It also acts as a repeater
for the data flow. This configuration is common with twisted pair cable; however, it can also be used
with coaxial cable or fiber optic cable.
Star topology
Advantages of a Star Topology



Easy to install and wire.
No disruptions to the network then connecting or removing devices.
Easy to detect faults and to remove parts.
Disadvantages of a Star Topology



Requires more cable length than a linear topology.
If the hub or concentrator fails, nodes attached are disabled.
More expensive than linear bus topologies because of the cost of the concentrators.
The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a
similar topology, called the star-wired ring.
Star-Wired Ring
A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the
MAU (multistation access unit) of a star-wired ring contains wiring that allows information to pass
from one device to another in a circle or ring .The Token Ring protocol uses a star-wired ring topology.
Tree
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of
star-configured workstations connected to a linear bus backbone cable . Tree topologies allow for the
expansion of an existing network, and enable schools to configure a network to meet their needs.
Tree topology
Advantages of a Tree Topology


Point-to-point wiring for individual segments.
Supported by several hardware and software venders.
Disadvantages of a Tree Topology



Overall length of each segment is limited by the type of cabling used.
If the backbone line breaks, the entire segment goes down.
More difficult to configure and wire than other topologies.
5-4-3 Rule
A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of
the Ethernet protocol requires that a signal sent out on the network cable reach every part of the
network within a specified length of time. Each concentrator or repeater that a signal goes through
adds a small amount of time. This leads to the rule that between any two nodes on the network there
can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition,
only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A
populated segment is one which has one or more nodes attached to it. In the above figure the 5-4-3
rule is applied. The furthest two nodes on the network have 4 segments and 3
repeaters/concentrators between them.
This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling
or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic
backbone and UTP cabling, the rule is simply translated to 7-6-5 rule.
Considerations When Choosing a Topology:




Money. A linear bus network may be the least expensive way to install a network; you do not
have to purchase concentrators.
Length of cable needed. The linear bus network uses shorter lengths of cable.
Future growth. With a star topology, expanding a network is easily done by adding another
concentrator.
Cable type. The most common cable in schools is unshielded twisted pair, which is most often
used with star topologies.
Summary Chart:
Physical Topology
Common Cable
Common Protocol
Linear Bus
Twisted Pair
Coaxial
Fiber
Ethernet
LocalTalk
Star
Twisted Pair
Fiber
Ethernet
LocalTalk
Star-Wired Ring
Twisted Pair
Token Ring
Tree
Twisted Pair
Coaxial
Fiber
Ethernet
Cabling
UTP Ethernet cables
Note that the TX (transmitter) pins are connected to corresponding RX (receiver) pins, plus to plus
and minus to minus. And that you must use a crossover cable to connect units with identical
interfaces. If you use a straight-through cable, one of the two units must, in effect, perform the
cross-over function.
Two wire color-code standards depicted with RJ-45 jacks as follows (the view is from the front of the
jacks):
If we apply the 568A color code and show all eight wires, our pin-out looks like this:
Note that pins 4, 5, 7, and 8 and the blue and brown pairs are not used in either standard. Quite
contrary to what you may read elsewhere, these pins and wires are not used or required to implement
100BASE-TX duplexing--they are just plain wasted. However, the actual cables are not physically that
simple. In the diagrams, the orange pair of wires are not adjacent. The blue pair is upside-down.
The right ends match RJ-45 jacks and the left ends do not. If, for example, we invert the left side of
the 568A "straight"-thru cable to match a 568A jack--put one 180° twist in the entire cable from endto-end--and twist together and rearrange the appropriate pairs, we get the following can-of-worms:
Coaxial Cabling
10BASE2 is a variant of Ethernet that uses thin coaxial cable (RG-58 or similar, as opposed to the
thicker RG-8 cable used in 10BASE5 networks), terminated with BNC connectors. For many years this
was the dominant 10 Mbit/s Ethernet standard, but due to the immense demand for high speed
networking, the low cost of Category 5 Ethernet cable, and the popularity of 802.11 wireless
networks, both 10BASE2 and 10BASE5 have become obsolete.
In a 10BASE2 network, each segment of cable is connected to the transceiver (which is usually built
into the network adaptor) using a BNC T-connector, with one segment connected to each arm of the
T. At the physical end of the network a 50 Ohm terminator is required.
When wiring a 10BASE2 network, special care has to be taken to ensure that cables are properly
connected to all T-connectors, and appropriate terminators are installed. One, and only one,
terminator must be connected to ground via a ground wire. Bad contacts or shorts are especially
difficult to diagnose, though a time-domain reflectometer will find most problems quickly. A failure at
any point of the network cabling tends to prevent all communications. For this reason, 10BASE2
networks could be difficult to maintain and were often replaced by 10BASE-T networks, which
(provided category 3 cable or better was used) also provided a good upgrade path to 100BASE-TX.
10BASE2 networks cannot generally be extended without breaking service temporarily for existing
users and the presence of many joints in the cable also makes them very vulnerable to accidental or
malicious disruption. The name 10BASE2 is derived from several characteristics of the physical
medium. The 10 comes from the maximum transmission speed of 10 Mbit/s (millions of bits per
second). The BASE stands for baseband signaling, and the 2 represents a rounded up shorthand for
the maximum segment length of 185 meters (607 feet).
Download