Individual Assignment1

download Individual Assignment1

of 26

Transcript of Individual Assignment1

  • 7/26/2019 Individual Assignment1

    1/26

    1. Discuss the relation of the following terms in datatransmission quality

    Channel Capacity,

    Data rate,

    Bandwidth,

    Reasons for Widespread Use of Multipleing

    Within recent years wireless communications has increased at a

    staggering rate. This has caused much debate on how best to

    utilize the available spectrum, and indeed has impelled more

    spectrum to be opened for commercial use. It not that easy

    just to say lets open up more spectrum giving more wireless

    communications. No, the limitations of wireless communications

    are very much found outside the engineering domain. afety

    regulations limits the power used by the user, commercial

    availability, under regulatory constraints, determines the

    carrier fre!uency and the bandwidth and finally the nature of

    the channels is governed by weather, car traffic, physical

    objects and so on... . "ll these constraints will determine

    the capacity of the channels.

    [Muriel Mdard, MAY 2000,]

    Channels

    " channel is basically the communication medium or the path

    which data ta#es to go from its source to its destination. "channel can comprise of several things, you have wires, free

    space, a whole networ#. "s you can imagine not all networ#s

    are the same different networ#s contain different

    characteristics. $ou could send your data over a wireless

    networ# which can then be routed onto an %thernet lan. &rom

    here to a '( modem and onto a fibre optic bac#bone. "ll these

    different channels have three characteristics in common for

    communication to ta#e place. They are latency, data rate and

    reliability of the channel.

    [https://en.wikibooks.org]

    When tal#ing about channels we need to first loo# at some of

    the terms about channel capacity.

    'ata rate ) this is the rate at which data can be communicated

    and is indicated in bytes per second *bps+.

    andwidth ) is the bandwidth of the transmitted signal as

    constrained by the transmitted signal as constrained by the transmitter and the nature of

    the transmission medium. It is measured in -ertz.

    1

  • 7/26/2019 Individual Assignment1

    2/26

    Noise )

    hannel apacity ) this is the ma/imum rate at which data can

    be transmitted over a given communication

    path, or channel, under the given

    conditions.

    %rror rate ) is the rate at which errors occur.

    ignal andwidth ) this is the bandwidth of the transmitted

    signal or the range of fre!uencies present

    in the signal, as constrained by the

    transmitter.

    In most cases, it is the changing of values in the signal timethat information is passed on. The direct measure of the rate

    of change in values of the signal is the fre!uency of the

    signal. o in other words the more the fre!uency of a signal,

    the more the data rate or information transfer rate is

    attainable. It can be more clearly demonstrated in an e/ample0

    If we loo# at transmission line coding such as inary "1,

    inary &1 or inary 21 data transmission, it is noted that

    if we alter the property of a high fre!uency carrier wave to a

    higher value it will reduce the bit interval T*345f+duration.

    "s a result more bits per second are transferred.

    This is also true about digital transmission techni!ues li#e

    N67, 8anchester encoding and so on. These can be modelled as

    periodic signals and hence it is composed of an infinite

    number of sinusoids, consisting of a fundamental fre!uency

    *f+and its harmonics. (i#e binary coding it to has a

    fundamental fre!uency *T345f+ resulting in increased data rate

    as a result of an increased fundamental rate representing adigital signal with shorter bit interval.

    This gives us a notable relationship between data rate and

    bandwidth on both analog or digital transmission. If you were

    to double the bandwidth you would in turn double the data

    rate.

    [Muriel Mdard, MAY 2000]

    2

  • 7/26/2019 Individual Assignment1

    3/26

    Widespread use of Multipleing

    8ultiple/ors have become an important player in thetelecommunications world. The main reason is to reduce cost byminimizing the number of communications lin#s needed betweentwo points.

    ome of the biggest advantages are0

    The ability to compress certain data characters withfewer bits freeing up additional capacity for themovement of other information.

    'ata integrity and accuracy are maintained througherror detection and correction between two points.

    Transmission resources are managed on a dynamic basis.Who gets their share of the bandwidth9 What happens whenlin#s go down9 What is plan for high priority

    information in the event of problems9

    8ultiple/ors are able to solve such problems.

    usinesses can face crippling costs if they need constantcommunication lin#s. The beauty of multiple/ing is that it canhelp to create more intelligent use of your resources bygrouping lines together for more efficient use.

    Imagine we have a business which relies on credit cards forpayments. This business is in (ondon *location "+, in fact

    there are several business in (ondon. The data centre thatmanages all credit transactions is in %dinburgh *location +.There is a clear need here for a constant communications lin#between the businesses in (ondon and the data centre in%dinburgh. The choice here would be a leased line from eachlocation in (ondon to the data centre in %dinburgh.

    [Figure ]

    This is going to be very costly having a leased line for eachof the businesses. Nobody else will be able to access their

    3

  • 7/26/2019 Individual Assignment1

    4/26

    bandwidth and the providers cant ma#e use of the lines duringnon:wor#ing hours so this comes at a high premium cost.

    This is good for the business because it ma#es them feel li#ethey are in control of the networ# as their traffic will notbe affected by any other traffic in the networ#. They can also

    use their own networ# management tools giving a sense ofsecurity. The downside is that leased lines are mileagesensitive. This means the longer the communications lin# thehigher the cost. If these leased lines are not usedefficiently then they become an over#ill and a burden on thebusiness.

    [Figure 2]

    -ow can this company get the same service but at a lot cheapercost9 Thats where multiple/ors come into play.

    The business gets to wor# on it right away. 8ultiple/ors comein pairs so they need one in (ondon and one in %dinburgh. Theyare also symmetrical so if we have five lines *outputs+ in

    (ondon we need five *inputs+ in %dinburgh. The #ey to thewhole operation is that you will only be using one *4+ leasedline so there will only be a need for one line between (ondonand %dinburgh. These are referred to a tail circuits. They runfrom a centrally placed multiple/or to each of the individualbusinesses. The outcome is that instead of the businessrenting individual leased lines or each other their businessesthey need only rent one leased line saving money.

    [!oleniewski, ", 2002]

    4

  • 7/26/2019 Individual Assignment1

    5/26

    !. Discuss the ad"antages and disad"antages of #oth circuitswitching $etwor% and pac%et switching networ%& then discusshow '(M Benefited from #oth)

    Within a wide area networ# where multiple local area networ#sare together networ#ing services and the speed at which they

    operate play a significant role in the final decision. Two ofthese services come in the form of switching networ# and apac#et switching networ#.

    *ac%et +witching

    2ac#et switching is how the data pac#ets are moved overswitched wide area networ#s. The two most common services are;.

  • 7/26/2019 Individual Assignment1

    6/26

    The characteristics of the ;.1 or >?1 ma/ line "lso #nown as variable length pac#et switching

    " 2"' decides which circuit the information is going tota#e as part of the virtual circuit concept

    2ac#ets usually have 4

  • 7/26/2019 Individual Assignment1

    7/26

    [Figure $]

    The disadvantages for &rame relay are that there is a decreasein speed and that it is not private with the advantagesinclude lower cost and less e!uipment to operate it.

    [Mi%roso&t, 20]

    Circuit +witched $etwor%s

    In circuit switched networ#s there is a need for a

    communication session to be set up between two communicatingnodes for the duration of the session. The resources need arereserved for the session to ta#e place. The resources are usedon demand and as a conse!uence there may be a waiting time foraccess to the communication lin#. " typical e/ample of this isa telephone networ#. efore you can communicate to the personon the other end a connection must be made and the connectionis between you and the receiver only. This is what is #nown asa circuit. Ance the circuit has been established it reserves aconstant transmission rate in the networ# lin#s.

    [Figure ']

    7

  • 7/26/2019 Individual Assignment1

    8/26

    "s we can see above there are two hosts directly connectedwith each other. This is #nown as a dedicated end:to:endconnection. &or this to happen the networ# must first reserveone circuit on each of the two lin#s. "bove we can see thatthere are four lin#s circuits and the second circuit has beenused to form the end:to:end connection. The transmission rate

    will be divide between the four lin#s. (ets say it has atransmission of 48bps. This gives each lin#

  • 7/26/2019 Individual Assignment1

    9/26

    (he 0+ Model

    (he 'pplication 3ayer

    This is #nown as layer D of the AI model. Its purpose is to

    serve as a window for application services. It is not theactual application but rather the channel through whichapplications communicate.

    $etwor% 'pplications

    Web

    %mail

    'N

    2

  • 7/26/2019 Individual Assignment1

    10/26

    (he *resentation 3ayer

    (ayer > is #nown as the 2resentation (ayer. Its mainresponsibility is to deliver and present data to theapplication layer. efore it can do this the data must beformatted in order for the application layer to understand it.

    It is responsible for0

    %ncryption and decryption of messages

    ompression and e/pansion of messages, formattranslation

    -andling protocol conversions[!regg. M, et all 200]

    When data is passed both down to the 2resentation layer it ischanged into a common format. "t the other end it is changedbac# into a useable format *for e/ample, %'I to "II+which

    is understood at the 2resentation layer. onversion from oneprotocol to another for communicating over different platformsis also achieved here. This is also the home of where gatewayservices operate. These are connection points between networ#swhich use different platforms or applications and gatewaysthat cross platforms or file systems.

    "nother job for this layer is data compression which lessensthe number of bits to be transmitted over the networ# media.

    [(rebauhg. A et all, 200)]

    +ession 3ayer

    Its job is to allow two applications on two differentcomputers to establish and coordinate a session. While insession it manages the data and once the session is over ittears down the session. 2rotocols that reside at this layerinclude0

    62 *6emote 2rocedure all+

    F( *tructured Fuery (anguage+[!regg. M, et all 200]

    Ance the Transport (ayer has done its job of establishing avirtual connection, the ession layer is counted upon forestablishing, monitoring, and terminating sessions using thevirtual circuits established by the transport layer.

    It is here that header information is put into pac#etsindication the source and destination of the pac#et. It thenperforms synchronization between the session layers of thesender and receiver aided with the help of "1s.

    The session layer also loo#s at and controls messages whichare either sent as full:duple/ or half:duple/. -alf:duple/means messages can be sent both ways but only one way at a

    10

  • 7/26/2019 Individual Assignment1

    11/26

    time. Whereas full:duple/ messages can be sent both ways atthe same time

    The difference between the ession layer and the Transportlayer are that the essions layer establishes a connectionbetween two processes whereas the transport layer establishes

    a connection between two machines. [(rebauhg. A et all, 200)]

    (ransport 3ayer

    The primary concern of the transport layer is to deal withsegments and reassembles data into data streams. It has toma#e a choice weather to send data !uic#ly or reliably byestablishing a logical connection between the sending host andthe destination host. This decision is based upon the

    application protocol being used. It is also responsible forend:to:end error recovery and flow control. It providesmechanisms for multiple/ing upper:layer applications,establishing sessions and tearing down virtual circuits. Theconnections can be either connectionless or connection:oriented and the two main protocols found at this layerinclude0

    T2 *Transfer ontrol 2rotocol+ this provides a reliableconnection by the use of handsha#ing, ac#nowledgments,error detection, and session teardown.

    C'2 *Cser 'atagram 2rotocol+is a connectionless protocol.T offers low speed and low overheads.

    low Control

    Is needed to ensure data integrity. &low control prevents asending host overflowing the buffers on the receiving hostside. ecause this employs connection:oriented communicationit is able to guarantee0

    ent segments are ac#nowledged upon receipt.

    egments that are not ac#nowledged are resent. ongestion, overloading and data loss are all achieved

    through manageable data flow.

    In order to understand the difference between connection andconnectionless thin# about this0

    $ou want to send an important letter to someone. The firstthing you do is call them to let them #now you are sending theletter *establishing a connection+. Ance your friend gets ithe call you to let you #now he got it o#ay *"1+. This isconnection:oriented communication.

    11

  • 7/26/2019 Individual Assignment1

    12/26

    In the networ#ing world one device first set up a connection:oriented communication through a session. The process isstarted with the use of the three way handsha#e.

    In figure 4 below we can see that both hosts applicationprograms are notifying their operating systems that a

    connection is being initiated. 8essages are send over thenetwor# confirming the transfer and both sides are ready tobegin. This setup is called overhead.

    %stablishing a connection:oriented session

    [Figure ]

    In the first stage, a connection agreement is sent as are!uest for synchronization.

    The ne/t two stages ac#nowledge the re!uest andestablishes the connection rules.

    The final stage is also an ac#nowledgement, ac#nowledginga connection has been agreed and accepted and data cannow be sent.

    [(rebauhg. A et all, 200)]

    Windowing

    12

  • 7/26/2019 Individual Assignment1

    13/26

    "n important mechanism for flow control is windowing.Windowing enables T2 to control the inta#e of traffic from aT2 session. It can be related to a traffic policeman. Ifeverything is o#ay it increases the window size but if thingsget a little congested in decreases the window size. It doesthis by as#ing hosts to slow down. If the congestion gets too

    much it stops all the traffic entirely. When a window isadvertised as a zero *cho#e pac#et+ its giving a red lightsignal to stop all transmission of data.

    "s we see in the ne/t figure host gives host " the greenlight to go ahead and send ?BG> bytes as its window size. -ost" then goes on to send ? frames containing 4B

  • 7/26/2019 Individual Assignment1

    14/26

    [Figure -]

    The Transport layers job is also to manage logical addressingof ports. This lets the data #now where it should go. elow isa list of commonly used ports0

    14

  • 7/26/2019 Individual Assignment1

    15/26

    [Figure ]

    "t any one given time a computer could be running severalapplications at the same time both sending and receivingre!uests. This mechanism helps to #eep a trac# of what isgoing on. Incoming data pac#ets are guided to the correct

    application based on the port number whether it be e:mail orweb browsing.

    Ane final important function of the Transport layer is nameresolution. When using the web we #now what we want by itsname i.e. www.google.com but the computer has no idea whatgoogle is9 It converts the name into binary so as to beunderstood. It will read D?.4

  • 7/26/2019 Individual Assignment1

    16/26

    networ#s. In order to do this it assigns logical source anddestination addresses and then wor#s out the best path toroute the data to its destination. The protocols involved dealwith logical address which is distinguished from the physicallayer 8edia "ccess ontrol *8"+ address. These addresses arenot burned into hardware unli#e the 8" address but rather

    they are assigned either manually or dynamically.

    The protocol involved at this layer include0

    6"62, "62, oot2, '-2 *these protocols perform addressresolution or configuration+

    I82 *'iagnostics and control protocol+

    6I2, IJ62, %IJ62, A&2 and J2 *routing protocols+[!regg. M, et all 200]

    (ayer K devices *routers+ can be found here to route thetraffic using routing services. The router will first loo# for

    the destination I2 address. If it sees it is not for hisnetwor# he will loo# up his routing table for the address andsend the pac#et out on the right interface. If however thedestination address cannot be found it will drop the pac#et.There are two types of pac#ets at this layer.

    'ata pac#ets0 These are used to transport user dataacross the networ#. 6outed protocols are used thatinclude I2 and I2v>.

    6oute update pac#ets0 These are used to updateneighbours on routers connected within theinternetwor#. 2rotocols used here include 6I2, 6I2

  • 7/26/2019 Individual Assignment1

    17/26

    "ssumes the function of sending and receiving dataover the wire.

    alculates 6 or &

    ridges and switches are also found at this layer.[(sterloh. , 2002]

    This layer also ta#es care of flow control and errornotification on the 2hysical layer as the 2hysical layer isonly responsible for moving data onto and off the networ#medium. It also manages error messaging related to thephysical delivery of pac#ets.

    The 'ata (in# (ayer has two sub:layers the 8" ub:layer andthe (( ub:layer.

    (he M'C 3ayer

    It is here that control for accessing the transmission mediumis done. It moves data pac#ets from one NI to another acrossa medium such as %thernet or fibre:optic cables.

    %very NI has a uni!ue 8" address *physical address+ whichidentifies the device. This 8" address is burned into a read:only memory *6A8+ chip on the NI. It comes in the form of a4< he/adecimal digit *e.g. 4

  • 7/26/2019 Individual Assignment1

    18/26

    levels. It is the 2hysical layer that deals with tangibleitems, that is things you can touch such as cables andrepeaters. The specifications include0

    Eoltage changes

    The timing of voltage changes

    'ata rates 8a/imum transmission distances

    The physical connections to the transmission medium

    The topology or physical layout of the networ#

    There are many decisions to be made at this layer for e/ampledigital vs analog signalling, baseband vs broadbandsignalling, whether data is transmitted synchronously orasynchronously and multiple/ing.

    [(rebauhg. A et all, 200)]

    Mapping 0+ to (C*2*

    The AI model has been mainly used as a teaching model and hasnever been fully adopted. The foundation of the Internet as we#now it today. The 'epartment of 'efence *'o'+ funded the"dvanced 6esearch 2rojects "gency Networ# *"62"N%T+ toimplement the T25I2 model. "s we have seen the AI consistsof seven layers as opposed to the T25I2 model which only hasfour layers. The figure below demonstrates the relationshipbetween the two.

    [!regg. M, et all 200]

    [Figure 0]

    When loo#ing at the different protocols of both models the AIand 'o' models are interchangeable. o when we tal# about the

    18

  • 7/26/2019 Individual Assignment1

    19/26

    2rocess5"pplication layer on the 'o' model we are tal#ingabout the top three layers of the AI model, "pplication,2resentation and the ession layers.

    The 2recess5"pplication layer defines protocols for the node:to:node application communication and also controls user:

    interface specifications.

    The -ost:to:-ost layer parallels the functions of theTransport layer in the AI model. It uses protocols forsetting up the level of transmission service for applications.It also deals with creating reliable end:to:end communicationand ensuring the error free delivery of data. It does this byhandling pac#et se!uencing and maintains data integrity.

    The Internet layer e!uals the Transport layer of the AI. Itsets up the logical transmission of pac#ets. It ta#es care of

    the addressing of hosts by giving them an I2 address and dealswith routing the pac#ets along multiple networ#s.

    The bottom layer is the Networ# "ccess layer which correspondswith the 'ata (in# and the 2hysical layers of the AI. Anceagain it deals with hardware addressing and defines protocolsfor the physical transmission of data.

    In many ways the 'o' and the AI models are very ali#e indesign and concept and have similar functions.

    19

  • 7/26/2019 Individual Assignment1

    20/26

    5. Discuss the spread spectrum ad"antages in wirelesscommunication& Compare pros and cons of 6++ and D+++techniques)

    &irst of all I feel there is a need to discuss what &- and

    ' is.

    &- was originally designed as a security protocol during

    World War II. It was intended as a secret communication system

    with the intention of guiding torpedoes to their target with

    interception. omposer Jeorge "ntheil and actress -edy (amarr

    originally patented sending radio signals from transmitter to

    receiver over multiple fre!uencies in a random pattern. It was

    achieved by fitting the sender and receiver with identicalpaper rolls perforated with a pseudo:random pattern utilizing

    @@ different fre!uencies. eacon frames and probe responses

    contain fre!uency hopping parameter set elements necessary for

    synchronicity *'well Time, -op et, -op 2atetrn, -op Inde/+.

    [aelt, 1, 200]

    There are two types of spread spectrum0

    &re!uency hopping spread spectrum *&-+

    'irect se!uence spread spectrum *'+

    In todays W("Ns they only use ' and &- is used by

    cordless phones and luetooth. oth of them use more than just

    a single pea# fre!uency which allows them to spread their

    signal over a larger part of the spectrum.

    6++

    &re!uency -opping pread pectrum *&-+ is one of two basic

    modulation techni!ues used in the spread spectrum signal

    transmission. This enables a signal to be transmitted across a

    fre!uency band that is much wider than the minimum bandwidth

    re!uired by the information signal. The energy is spread more

    fre!uencies on a wider electromagnetic spectrum. This results

    in improved privacy, decreased narrowband interference, and

    increased signal capacity. (ets loo# at it a bit more in:

    depth.

    [http://sear%hnetworking.te%htarget.%o*]

    &- changes fre!uency from @ to K< times each second it does

    not spread its signal energy out but rather rapidly shifts the

    20

  • 7/26/2019 Individual Assignment1

    21/26

    energy from fre!uency to fre!uency. " narrow band &- signal

    is transmitted first on one narrow *4:8-z+ channel and then

    !uic#ly shifted to another channel, then another. There are

    two types allowed in the

  • 7/26/2019 Individual Assignment1

    22/26

    are often affected by e/ternal factors li#e noise or

    interference which can garble data. To counter this, a

    wireless transmitter performs several functions.

    crambler0 'ata is first scrambled in a predetermined

    manner and is randomized in Bs and 4s. oder0 %ach bit is then converted into multiple bits

    of information that contain carefully crafted patterns

    to protect against errors due to noise or

    interference.

    Interleaver0 The coded data stream of symbols is

    spread into separate bloc#s so that bursts of

    interference might affect one bloc# but not the other.

    8odulator0 The bits are used to alter or modulate the

    phase of the carrier signal. This enables the 6&

    signal to carry the binary data bit values.

    [u%ab4, 5, 20$]

    "ll that being said what are the pros and cons of each9

    &-0: &re!uency -opping pread pectrum. In &- the

    transmitted signal changes the fre!uency randomly. In short

    that means that a user may start out on channel 4 but at a

    random time the fre!uency will change. It could switch to

    channel K or > it is completely random. This is great becauseit is hard for a hac#er to trace or intercept because he does

    not #now which channel to go to.

    '0: 'irect e!uence pread pectrum is different because

    the channel is not switched but rather the pseudo:random code

    is and never repeats itself. This ma#es it very difficult to

    decipher as the code changes from time to time.

    The good news is that both of these are used for security

    purposes and lead to secure communications.

    "lthough &- is easy to implement because it is narrow:band,

    its security measures are not as good as '. ' provides

    ma/imum security but can be a little bit difficult to

    implement due to its wideband nature and more complicates

    synchronising circuitry.

    ecurity is not everything though there are other factors toconsider. The pace of technology is fast moving and it is not

    all that difficult to trac# and decode the information these

    22

  • 7/26/2019 Individual Assignment1

    23/26

    days it just needs the right software and the #nowhow to do

    it.

    Ather factors to consider are that both are very good at

    avoiding or even operating in the presence of noise or other

    signals *narrow:band interference+. With &- it avoids noise

    by simply hopping to another channel but data can be lost if

    the channel is jammed. Whereas, ' has the ability to

    attenuate everything apart from the desired signal. It is

    possible for ' to operate below the noise floor.

    "nother big pro is that they can both be used in the same band

    as other devices. The

  • 7/26/2019 Individual Assignment1

    24/26

    R88R8$C8+

    4.

    8uriel 8Mdard, 8"$

  • 7/26/2019 Individual Assignment1

    25/26

    H4 I%%% T6"N"TIAN AN IN&A68"TIAN T-%A6$, EA(. ?>, NA. K,

    8"$

  • 7/26/2019 Individual Assignment1

    26/26

    &igure &rame relay cloud

    &igure 4, = (ammle, T, ,

    Wiley