COMPUTER NETWORKS
802.1
Is one of the IEEE standards for LANs and MANs which gives the introduction to the
set of standards and defines the interface primitives.
802.2
The standard describes the upper part of the datalink layer and uses the Logical Link
Control(LCC) protocol.
802.3
Is a IEEE standard called CSMA/CD for LANs. Uses the Ethernet cabling (10Base5
indicates 10Mbps, uses baseband signalling and can support segments upto 500
meters) also called thick ethernet which are coaxial cables with markings at every 2.5
meters to show where the taps go and are connected by the Vampire taps. Other
types of cablings include 10Base2, called thin ethernet which can handle 30 terminals
per cable segment and are connected by BNC connectors. Both these methods require
time domain reflectometry to detect the breaks in the cable. Another cable standard
is 10BaseT also called twisted pair running into a central hub, connected by
transceivers. This can run only upto 100 or 150 meters. The fourth cabling option is
10Base-F which uses the fibre optics.
802.4
LAN standard also called Token Bus.
802.5
LAN standard called Token Ring.
ALOHA
Aloha is the multiple access protocol devised by Norman Abramson to solve the
channel allocation problem using the ground-based radio broadcasting and has two
versions: pure which considers the time as continuous and slotted in which the time
is devided into descrete slots into which all frames fit; this requires the global time
synchronization.
ARPANET
ARPANET (Advanced Research Projects Agency) was sponsored by DoD (U.S.
Department of Defense) which connected hundreds of Universities and government
organizations using leased telephone lines. With the advent of satellites and radio
networks, the existing protocols had trouble interworking with them, a new
reference model TCP/IP with the ability to connect to multiple networks together in
a seamless way as the main goal was proposed and named after its two primary
protocols.
ATM
Asynchronous TransferMode is the technology that makes Broadband Integrated
Services Digital Network (ISDN) offer video on demand, live television from many
sources, full motion multimedia electronic mail, CD-quality music, LAN inter
connection, high speed data transport for science and industry and many other
services that have not been thought of, all over the telephone line.
Backbone
Backbones are the fast routers connected by high-bandwidth lines on which the
LANs are built.
Broadcasting
Sending a packet to all destinations simultaneously is called broadcasting.
Computer Networks Page 3
Collision-Free Protocols
The two protocols devised to send the data in an contention free manner inMAC
sublayer are: bitmap method, where a N bit contention period is begun each time the
transmission of all the N stations end in which they reserve their time slot and binary
countdown where the stations send their addresses in binary form which are ORed
together to get the station with the highest address which ultimately gets the
channel.
Congestion Control
The congestion control algorithms can be devided into two groups: open loop and
close loop. Open loop solutions attempt to solve the problem by good design by
making sure the congestion does not occur in the first place. Open loop algorithms
are also divided into that act at source versus ones that act at destination. Closed
loop solutions are based on the feedback loop. Closed loop algorithms are also
divided into two subcatagories: explicit feedback and implicit feedback. Some
congestions control algorithms are traffic shaping, Leaky bucket, Token bucket, Flow
specification (all openloop). The close loop algorithms are: Admission control, Choke
packets, Weighted fair queuing, Hop-by-Hop choke packets, Load shedding
Contention
Systems in which the multiple users share a common channel in a way that can lead
to conflicts are called contention systems.
CRC
Cyclic Redundancy Code (Polynomial code) is a way to remove the errors in a frame
by considering the bit string as representations of polynomials with co-efficients of 0
and 1 only.
CSMA Protocols
Career sense multiple access protocols suite consists of persistent and nonpersistent
CSMA
Datagram Service
The unreliable connectionless service is called datagram service.
DQDB
DQDB is Distributed Queue Dual Bus, a standard used in MAN and is denoted by
802.6 in IEEE standards.
Fragmentaion
When data packet is to be moved inbetween two or more different netrowks, each
network may impose some restriction on the maximum size of the data that can be
sent through that network due to a number of regions as hardware, OS, protocols,
compilance with internal standards, desire to reduce transmission errors, desire to
prevent one packet from occupying the channel for a long time.
Frame
Frame is the collection of data bits from physical layer well demarkated by some rule
to form a unit of data transmission in data link layer. Frames is the basic way to
check errors in the data transmission.
Functions of Layers
Application Layer: Is concerned with the terminals. An abstract Network Virtual
Terminal is defined that editors and other programs can be written to deal with,
where a peice of software is written to map the functions of the network virtual
terminal onto the real terminal. Other functions of application layers include file
transfer, electronic mail, remote job entry, directory lookup and various other general
Computer Networks Page 4
purpose & special purpose facilites.
Presentation Layer: Is concerned with the syntax and semantics of the information
transmitted, encoding of data, deals with the exchange of data representation such as
ASCII and Unicode.
Session Layer: Remote log in, file transfer, token management, synchronization.
Transport Layer: accept data from the session layer and split it into small pieces and
send those to network layer and ensure the correct arrival at the other end. Making
multiplexing transparent to session layer. Transport layer header tells which
message belongs to which layer?. Flow control.
Network layer: Is concerned with the operation of the network, how the packets are
routed from one machine to other, congestion control, billing information, handling
of problems occuring due to heterogeneous networks.
Datalink Layer: create and recognize the frame boundaries, handling the problems of
duplicate frames, flow control, buffer space management, control the access to a
shared channel.
Physical Layer: Actual transmission of data, howmany volts should be used to
represent 1 and 0, how many microseconds a bit should last, how the initial
connection is established & how it's torn, how many pins the network connector
should have.
Interface
The primitive operations and services the lower layer offers to upper layer.
Internet
Internet is network of networks connected by black boxes called repeaters which
copy individual bits between cable segments, Bridges store and froward data link
frames between LANs,Mulitprotocol routers forward packets between dissimilar
networks, Transport gateways connect byte streams in the transport layer,
Application gateways allow interworking on networks. Conventionally gateway is
used to mean a device that connects two or more dissimilar networks.
IP Address
Each IP packet will contain IP addresses of both the source and destination. Each
address is of 32 bytes and are devided into five classes A, B, C, D, E. Each host on the
network will have its unique network number provided by the NIC (Network
Information Center). The IP address 0 means this network or this host and -1 is used
for broadcast addresses to mean all hosts on the indicated network. The network
address 0.0.0.0 is used by hosts while booting but not afterwards.
Hamming Distance
The number of bit positions by which the two code words differ is called hamming
distance. In another way the number of bits that need to be inverted in one code
word so that it will represent its nearest or next code word is called hamming
distance.
MAC
Medium Access Control is a sublayer of datalink layer, deals with the broadcast
channels, sometimes refered to as multiaccess channels or random access channels.
Manchester Encoding
Manchester encoding is the way to represent the bits in a data frame such that it
willn't produce any redundency in the bit transmissions in the physical layer.
Multicasting
Multicasting is sending messages to well-defined groups that are numerically large
in size but small compared to the network as a whole.
Computer Networks Page 5
Network architecture
A set of layers and protocols
Optimality Principle
It states that if router J is on the optimal path from router I to router K, then the
optimal path from J to K also falls along the same route. The set of optimal routes
from all sources to a given destination form a tree rooted at the destination, is called
Sink Tree.
OSI
Open System Interconnection reference model is developed by Inernational
Standards Organization to standardize the protocols used in various layers.
Pipelining
In Slinding window protocol suite, the goback n protocol causes the transmission of
all the frames to the destination even if the acknowledgement for a previous frame
hasn't been received yet, till the sender's window gets filled is called pipelining.
Port
Ports indicate which service is desired. port-23 is for Telnet, port-79 is for Finger,
port-119 is for USENET news, etc.
Protocol stack
A list of protocols, one per layer in certain system.
Routing Algorithm
The main function of network layer is routing packets from the source machine to the
destination machine.The routing algorithm is that part of the network layer S/W
resposible for deciding which output line an incoming packet should be transmitted
on. They can be grouped into two classes: Nonadaptive algorithm which don't base
their routing decisions on measurements or estimates of the current traffic and
topology. This is also called static routing. Adaptive algorithms change their routing
divisions to reflect the changes in the topology, and usually the traffic as well. Static
or Nonadaptive algorithms are Shortest Path Routing, Flooding, Selective Flooding,
Flow-Based Routing. The adaptive algorithms are Distance Vector Routing
algorithm, Link State Routing.
Simplex Protocol
The simplest protocol in data link layer where data is transmitted in only one
direction with the assumption that the sending and receiving networks are always
ready, ignoring the processing time, having infinite buffer space and the
communication channel between the data link layers never damages or looses the
frames.
Sliding Window Protocol
The goal of the protocol suite is to maximize the use of bandwidth through a
technique called piggibacking where the outgoing acknowledgement is temporarily
delayed so that they can be hooked on to next outgoing data frame.
SNA
System Network Architecture, as seven layer protocol designed by IBM.
Stop andWait Protocol
Is equivalent to Simplex Protocol with the restriction that buffer space is limited.
Traffic Shaping
The open loop method to manage congestion is forcing the packets to transmit in
more predictable way. This approach widely used in ATM networks is called traffic
shaping.Monitoring the traffic flow is called traffic policing.
Tunneling
Computer Networks Page 6
Tunneling is defined as a way of sending data packet of a network to the destination
network following the same protocol, through a network inbetween, which follows a
different protocol, by wrapping the data packet in the payload field of the network
inbetween.
Protocol Acronyms
ARP
In addition to IP, which is used for data transfer, the Ineternet has several other
control protocols used in the network layer, one of which is Address Resolution
Protocol. ARP maps the IP address into the host's LAN address.
BGP
Boarder Gateway Protocol: is the Exterior Gateway Protocol used between different
Autonomous Systems(AS) which mainly concerns with the transit packets.
DNS
Domain Name Service: maping of host names onto their network addresses.
FTP
File Transfer Protocol: Transfer of files
HTTP
Hyper Text Transfer Protocol: used for fetching the pages on world wide web.
ICMP
Internet Control Message Prortocol: is used to test the internet and monitor the
routers closely.
NCP
Network Core Protocol: is heart of NetWare (Network System from Novell) provides
various services along with user data transport.
NNTP
Network News Transfer Protocol: moving news articles around
OSPF
Open Shortest Path First: is the interior gateway protocol which gives a standard to
LANs that are Autonomous Systems(AS) operating in different organization.
Computer Networks Page 7
RARP
Reverse Address Resolution Protocol: allows the newly booted workstations to
broadcast its ethernet address, where the RARP server sees this 48 bit address and
finds out the 32 bit IP address of the host machine.
RSVP
Resource reSerVation Protocol: is a network layer protocol which allows multiple
senders to transmit to multiple groups of receivers, permits individual receivers to
switch channels freely, and optimizes bandwidth use while at the same time
eliminating congestion.
SMTP
Simple Mail Transfer Protocol: used for electronic mail transfer.
TCP/IP
Transmission Control Protocol and Internet Protocol: The two main protocols in
network layer of TCP/IP model which defines an official packet format.
TELNET
TELecommunication NETwork: remote login or virtual machine.
UDP
User Datagram Protocol: A unreliable connectionless protocol for application that do
not require the sequencing or flow control of data.
No comments:
Post a Comment