Networking Protocols and Layers

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which layer of the OSI model is responsible for sending bits across a physical medium?

  • Physical Layer (correct)
  • Data Link Layer
  • Network Layer
  • Transport Layer

Encapsulation involves the lower layer examining the content of the higher layer's data.

False (B)

What is the term for the process of converting a signal containing multiple signal streams back into individual signal streams?

Demultiplexing

In the context of network layers, the pink portion of a message, as it is carried across the network, is 'not ______'.

<p>touched</p> Signup and view all the answers

Match the OSI model layers with their descriptions:

<p>Physical Layer = Sends bits across a physical medium. Data Link Layer = Sends units of information. Network Layer = Sends packets across multiple links. Transport Layer = Provides reliable delivery.</p> Signup and view all the answers

Which layer in the Internet Reference Model is responsible for sending packets over multiple networks?

<p>Internet Layer (C)</p> Signup and view all the answers

Hubs operate at the Link layer, while switches function at the Physical layer.

<p>False (B)</p> Signup and view all the answers

What is the primary function of a gateway in computer networks?

<p>Protocol translation</p> Signup and view all the answers

Message ______ is the delay to send a message over a link.

<p>latency</p> Signup and view all the answers

Match these prefixes with their corresponding exponential values:

<p>Milli = 10^-3 Micro = 10^-6 Kilo = 10^3 Mega = 10^6</p> Signup and view all the answers

If a link has a rate (R) of 20 Mbps and a delay (D) of 10 ms, what is the Bandwidth-Delay product (BD)?

<p>200,000 bits (D)</p> Signup and view all the answers

Coaxial cable generally offers slower data transmission speeds compared to twisted pair cables.

<p>False (B)</p> Signup and view all the answers

What type of analysis can represent a signal over time using its frequency components?

<p>Fourier analysis</p> Signup and view all the answers

The phenomenon where signals bounce off objects and take multiple paths is known as wireless ______.

<p>multipath</p> Signup and view all the answers

Match the following modulation techniques with their descriptions:

<p>Amplitude Shift Keying (ASK) = Varies the amplitude of the carrier signal. Frequency Shift Keying (FSK) = Alters the frequency of the carrier signal. Phase Shift Keying (PSK) = Modifies the phase of the carrier signal.</p> Signup and view all the answers

According to Nyquist's theorem, what is the maximum symbol rate for a channel with a bandwidth of B?

<p>2B (A)</p> Signup and view all the answers

Shannon's Capacity formula only considers bandwidth and ignores the Signal-to-Noise Ratio (SNR).

<p>False (B)</p> Signup and view all the answers

What type of modulation does ADSL2 use to separate bands for upstream and downstream?

<p>Passband modulation</p> Signup and view all the answers

In data link layer framing, messages are referred to as ______ of limited size.

<p>frames</p> Signup and view all the answers

Match the following framing methods with their descriptions:

<p>Byte Count = Starts each frame with a length field. Byte Stuffing = Uses a special flag byte to indicate the start/end. Bit Stuffing = Inserts a bit after a specific number of consecutive bits.</p> Signup and view all the answers

In byte stuffing, what is the purpose of an 'escape code'?

<p>To replace occurrences of the flag byte in the data (B)</p> Signup and view all the answers

Error detection codes always guarantee the correction of all errors.

<p>False (B)</p> Signup and view all the answers

What is the term for adding extra bits to a message to enable error detection or correction?

<p>Redundancy</p> Signup and view all the answers

The number of bit flips needed to change Codeword A to Codeword B is called the ______ Distance.

<p>Hamming</p> Signup and view all the answers

Match the following error detection methods with their protection strength:

<p>Parity Bit = Weakest protection Checksums = Moderate protection Cyclic Redundancy Check (CRC) = Strongest protection</p> Signup and view all the answers

What arithmetic is used to sum data in the Internet Checksum calculation?

<p>1s complement (B)</p> Signup and view all the answers

The ALOHA protocol is highly efficient even under high network load.

<p>False (B)</p> Signup and view all the answers

What does CSMA/CD stand for?

<p>Carrier Sense Multiple Access with Collision Detection</p> Signup and view all the answers

In CSMA/CD, the time window in which a node may hear of a collision is equal to the ______.

<p>2D (RTT)</p> Signup and view all the answers

Match the characteristics with their respective multiple access protocols:

<p>Randomized = Good for low load; nodes access resource randomly. Contention-free = Good for high load; nodes order resource access.</p> Signup and view all the answers

What is a primary limitation of Stop-and-Wait protocol?

<p>Inefficiency due to single outstanding frame (A)</p> Signup and view all the answers

Multiplexing is a technology used to prevent sharing of a resource among multiple users.

<p>False (B)</p> Signup and view all the answers

What approach to multiple access is based on turns instead of randomization?

<p>Contention free</p> Signup and view all the answers

Nodes which are not directly connected but can cause collisions at a common node are called ______ Terminals.

<p>Hidden</p> Signup and view all the answers

Match the descriptions with their corresponding terms in multiple access protocols:

<p>ACk = Acknowledgement; indicates successful reception of a frame. RTS = Request to send; intiates communication in protocols like MACA. CTS = Clear to send; sent by the receiver after RTS.</p> Signup and view all the answers

What is an advantage of using LAN switches compared to hubs?

<p>Higher speeds due to dedicated bandwidth per port (D)</p> Signup and view all the answers

Backward learning in switches helps in preventing loops in the network.

<p>False (B)</p> Signup and view all the answers

What builds on the link layer, to send packets over multiple networks?

<p>Network layer</p> Signup and view all the answers

In a virtual circuit model, the term bandwith share links ______.

<p>statistically</p> Signup and view all the answers

Match the Virtual Circuits and Datagram protocols with their properties:

<p>Datagrams = Packets contain a destination address. Virtual Circuits = Packets are forwarded along the path.</p> Signup and view all the answers

What is the primary function of interior gateway protocols in computer networks?

<p>Exchanging routing information within an autonomous system (C)</p> Signup and view all the answers

Flashcards

Protocols and layering

The main structuring method used to divide up network functionality, enabling modularity and reuse.

Encapsulation

The mechanism by which a lower layer adds its own header information to the content of a higher layer to create a new message for delivery.

Demultiplexing

The reverse of multiplexing. Re converting a signal containing multiple signal streams back into individual streams using demultiplexing keys in the headers.

Reference models purpose

Reference models help in organizing protocols and deciding what function should be implemented in a protocol.

Signup and view all the flashcards

Physical Layer function

The Physical Layer sends bits across a physical medium.

Signup and view all the flashcards

Data Link Layer function

The Data Link Layer sends units of information.

Signup and view all the flashcards

Network Layer

The Network Layer sends packets across multiple links.Scope is broader.

Signup and view all the flashcards

Transport Layer function

The Transport Layer ensures reliable delivery.

Signup and view all the flashcards

IP's Role

Internet Protocol (IP) acts as a standard reference for the network layer.

Signup and view all the flashcards

Repeater/Hub

Device that operates on the physical layer.

Signup and view all the flashcards

Switch function

It operates on the Link layer.

Signup and view all the flashcards

Router function

Device that operates on the Network layer.

Signup and view all the flashcards

Proxy Server

A server that processes requests and forwards information between clients and servers.

Signup and view all the flashcards

Middlebox function

A device that transforms, inspects, filters, or manipulates traffic.

Signup and view all the flashcards

Gateway function

A component that connects two networks using different protocols, translating one into the other.

Signup and view all the flashcards

Host nodes

Computers that serve pages to users.

Signup and view all the flashcards

Gateways nodes

Computers that connect the networks in between.

Signup and view all the flashcards

Physical Layer Concerns

How signals are used to transfer message bits over a link.

Signup and view all the flashcards

Message Latency

Delay to send a message over a link. Includes Transmission and Propagation delay.

Signup and view all the flashcards

Transmission delay

It is the time to put the message “on the wire”.

Signup and view all the flashcards

Propagation delay

It is the time for bits to propagate across the wire.

Signup and view all the flashcards

Main Prefixes (Data)

Prefixes relate to each other. Kilo, Mega, Giga etc.

Signup and view all the flashcards

Bandwidth-Delay Product

Describes the amount of data 'in flight'. Equal to Rate * Delay.

Signup and view all the flashcards

Analog signals

Analog signals encode digital bits for data transmission.

Signup and view all the flashcards

Fourier analysis

Frequency analysis says that fewer frequencies means less bandwidth degrades the signal

Signup and view all the flashcards

Signal delay

Signal propagates at 2/3 C rate.

Signup and view all the flashcards

Signal attenuated

Signal losses strength over distance.

Signup and view all the flashcards

Signals over Fiber

Using a carrier to send information.

Signup and view all the flashcards

Signals over Wireless

Multiple signals on the same frequency interfere at receiver.

Signup and view all the flashcards

4B/5B code

Invert signal level on a 1 to break up long runs of 1s (NRZI).

Signup and view all the flashcards

Passband Modulation

Only higher frequency is going to pass through the media, or we might want to divide the media in terms of frequency

Signup and view all the flashcards

Amplitude shift

Amplitude shift: carrier signal for 1, no signal for 0

Signup and view all the flashcards

Frequency shift

In the Frequency shift the change frequency to designated 1' frequency

Signup and view all the flashcards

Phase shift

In the Phase shift mode change phase to get 0/1

Signup and view all the flashcards

V signal levels

If there is four signal levels that will allow you to convey two bits on each level, eight signal levels three bits and so on

Signup and view all the flashcards

codewords using error codes

Data bits plus R check bits, is a systematic block code.

Signup and view all the flashcards

Frames

Each frame contains of limited size.

Signup and view all the flashcards

Byte Count

Start each frame with a length field. It shows at which byte the next length byte occurs

Signup and view all the flashcards

Byte Stuffing Rules

Replace each FLAG in data with ESC FLAG.

Signup and view all the flashcards

Study Notes

Lecture Progression

  • The layers include Physical, Link, Network, Transport, and Application
  • Focus will go from the bottom up, starting with Chapter 2

Protocols and Layers

  • Modularity is needed to manage complexity and maintain network functionality
  • Protocols and layering divide up network functionality
  • Each protocol instance communicates virtually with its peer
  • Protocol instances use services of the lower layer
  • A protocol stack refers to the set of protocols in use
  • The wire connecting two nodes is the physical medium
  • Example protocols: TCP, IP, Ethernet, and 802.11

Encapsulation

  • Encapsulation is how protocol layering is achieved
  • The lower layer takes higher layer content and adds information to send new messages
  • Layers do not inspect the content inside
  • Demultiplexing is the reverse of multiplexing
  • Demultiplexing reconverts a signal with multiple streams
  • In protocol layers demultiplexing keys are used in the headers

Advantages of Layering

  • Helps information hiding and reuse
  • Connects different systems through information hiding

Disadvantages of Layering

  • Introduces overhead, reducing efficiency
  • Hides information from apps which might need it

Reference Models

  • Help organize protocols
  • Determines which functions should be implemented in a protocol

OSI Reference Model

  • Principled, international standard to connect systems
  • A bottom-up model consisting of Physical, Data Link, Network, Transport, Session, Presentation, and Application Layers
  • Physical Layer: Sends bits across a physical medium
  • Data Link: Sends units of information
  • Network Layer: Sends packets across multiple links, is broader than data link
  • Transport Layer: Ensures reliable delivery
  • Session Layer: Manages task dialogs, may use multiple networks
  • Presentation Layer: Handles different data representations
  • Application Layer: Provides functionalities for users

Internet Reference Model

  • OSI-based but with some layers omitted, using IP as the network layer
  • Link Layer: Sends frames over a link
  • Internet: Sends packets over multiple networks, acts as the network layer from OSI
  • Transport Layer: Ensures reliable delivery
  • Application Layer: Provides user functionality
  • IP is a standard reference so that diversity can exist in the Link and Transport/Application layers, creating the "narrow waist" of the Internet

Layer-Based Names

  • Application: Message
  • Transport: Segment
  • Network: Packet
  • Link: Frame
  • Physical: Bit

Devices

  • Hubs operate on the physical layer
  • Switches operate on the link layer
  • Routers operate on the network layer
  • Proxy servers process requests and forward info between clients and servers
  • Middleboxes transform, inspect, filter, or manipulate traffic
  • Gateways connect two networks with different protocols, translating between them
  • Host nodes are computers that serve pages to users
  • Gateways connect the networks
  • ISP computers and computers that control company network traffic

Physical Layer Overview

  • Handles the transfer of message bits over a link
  • Wired connections carry analog signals to send digital bits
  • Topics includes properties of mediums, signal propagation, modulation and fundamental limits
  • Focuses on rate, delay, and whether the connection is broadcast

Physical Layer Key Variables

  • Rate in bits/second
  • Delay in seconds, related to length
  • Broadcast either wireless or wired

Message Latency

  • Latency is the delay to send messages over a link
  • Transmission delay is the time to put M-bit messages on the wire -> M(bits) / Rate (bits/sec) = M/R seconds
  • Propagation delay is the time its take for bits to propagate across the wire -> P-Delay: Length / (⅔ the speed of light) = D(elay) (seconds)
  • Formula: Latency = M/R + D

Prefixes

  • Milli: 10^-3
  • Micro: 10^-6
  • Nano: 10^-9
  • Kilo: 10^3
  • Mega: 10^6
  • Giga: 10^9
  • Use powers of 10 for rates, and 2 for storage
  • B is for bytes and b is for bits

Latency and Bandwidth Examples

  • Dial-Up example with specified delay, rate, and message size showcases latency calculation
  • Broadband cross-country example with specified delay, rate, and message size
  • High latency results from either a long link or a slower rate where one delay component usually dominates

Bandwidth-Delay Product

  • Messages take space on the wire
  • The amount of data is the Bandwidth-delay product = R * D
  • BD is measured in bits or in messages
  • Small BD for LANs and big for long pipes

Bandwidth-Delay Product Example

  • Using a Fiber line at home, from cross country
  • Rate is 40 Mbps, Delay is 50 ms
  • Bandwidth-Delay Product = 40 * 10^6 * 50 * 10^-3 = 2000 * 10^3 = 250 KB

Media Types

  • Media such as wires, fiber optics, and wireless, propagate signals that carry bit information
  • Twisted Pair cables are used in LANs and telephone lines
  • Twists reduces signal radiation, a category 5 UTP cable has 4 twisted pairs
  • Coaxial cables are used for video signals to home TVs, and offers better performance than twisted pairs
  • Fiber cables are comprised of pure strands of glass, allowing for enormous bandwidth and high data speeds with minimal attenuation
  • Wireless mediums radiate a wireless signal, with senders communicating over a region
  • Multi-mode cables are for shorter links, and single mode cables are up to 100km

Signals

  • Analog signals encode digital bits and propagate over a medium
  • A signal over time is represented by its frequency components
  • Fewer frequencies degrade signals with less bandwidth, but high fidelity is not necessary for clear 1s and 0s

Wire Signals

  • Signals are delayed and attenuated when passing over a wire
  • Frequencies above a cutoff are highly attenuated
  • Noise is added to signals
  • Electrical engineering defines bandwidth as the width of a frequency band
  • Computer science bandwidth is the information carrying capacity

Fiber Signals

  • Light propagates with minimal loss across wide frequency bands using a carrier to send information

Wireless Signals

  • Signals transmit on a carrier frequency
  • Wireless travels at the speed of light but tends to attenuate
  • Multiple signals on the same frequency interfere at the receiver
  • Wireless is complex and dependent on the environment
  • Wireless is frequency dependent, with multipath at microwave band

2-4 Modulation

  • How to represent bits as signals?
  • Baseband modulation involves directly applying signals on the wire
  • Using Non-Return-to-Zero (NRZ): +V = 1, -V represents 0
  • After a while, if timing can be lost so clock recovery is needed
  • Two clock recovery options exist in manchester coding, and scrambling via XOR
  • Higher frequencies are going to pass through the media
  • In passband modulation changes in Amplitude, frequency and phase happen

Fundamental Limits

  • Nyquist states (1924), and Shannon (1948) define practical systems
  • B signal bandwidth limits the rate of transitions
  • S Signal strength limit how many signal levels can be distinguished
  • N is the Noise strength
  • Involves the actual implementation of the protocols
  • Concerns transferring messages over links with limited size
  • It combines physical with frames

Framing Methods

  • Including byte count with length fields included
  • Bute stuffing with special flag values for start/end
  • Bit stuffing with a flag sets for 1s

Error Coding Overview

  • Error coding addresses the issue of bits received in error due to noise
  • Redundancy is added through error detection codes to add check bits
  • Error codes provide more check bits to correct errors
  • Detection testing will require analysing how many bits are used in the code

Hamming Distance

  • Hamming distance defines the number of bits flips needed to change D + R1 to D + R2
  • The minimum distance between any pair data is used
  • A code of certain distance (d + 1) detects up to d errors
  • A code of distance (2d+1) corrects up to d errors

Error Detection

  • Addresses the issue of bits received in error due to noise
  • Fixed through parity, checksums and CRCs
  • Retransmission is required if errors are detected

Error Detection - Internet Checksum

  • Parity defines that if bits have certain sum the system is correct
  • More complex options like error checksums with algorithms are stronger
  • TCP IP uses 16 bit checksum

Error detection - CRC

  • Even more secure
  • cyclic redundancy checks are better
  • it extends the data with zeros
  • And adjusts check bits

Error Correction

  • Techniques are used to address bits received in error due to noise
  • Check bit values are used to narrow down the error
  • Errors should be correct even if in check bits

Error Correction - The Hamming Perspective

  • Coding allows to fix error
  • Decoding Hamming codes involves recomputing check bits
  • Arranging values tells error
  • Otherwise flip bit correct

Retransmission ARQ

  • Checking and errors should happen everwhere for stabillity
  • Error correction happens in the stack
  • Layers are responsible for overall reliability
  • Most used where errors are common

###ARQ

  • Receiver automatically acknowledges
  • Timeout until ACK is received

Timeout Issues

  • Short timeouts lead to needless resends
  • Long timeouts link can go idle

Multiple ARQS and stop and wait

  • Lost ACKs lead to loss so sequencing is import
  • Stop and Waite to prevent
  • A short single bit is sufficient

Multiplexing

  • Sharing A link over different users
  • Uses scheduling and bandwidth allocations
  • TDMA Takes turns on a fixed schedule
  • FDM Divides frequencies for data rate
  • Multiple access schemes multiplex network traffic
  • Nodes randomize resource attempts
  • Classic ethernet is base but is bursty
  • Nodes send when have traffic
  • Wait if collision
  • More efficient if traffic not high
  • CSMA improves
  • If listening
  • Not eliminate because listen may heard nothing
  • BEB eliminates need queue the senders
  • Doubles collision increases efficiency
  • Collision increase time for work

Wireless protocol

  • Complicated because nodes use different areas
  • Nodes dont hear while sending

Terminals

  • Hidden - collisions can occur even though senders thought it was free
  • Exposed interferes, and prevent

MACA Protocol

  • MACA uses small handshake A . request sender B. Clear to send Collissons possbile
  • Clients connect
  • Multi Access Issues
  • Has become faster
  • CSTA and CMAC can fix
  • Needs short handhsake

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser