Está en la página 1de 36

J.

Oscillada DATCOMM - EK FINALS Reviewer

Topic overview:
I. Introduction to Data and Computer Networks V. Routing
a. Network components a. ARP Revisited (RARP)
b. Network architecture b. Routing Protocols
c. The Internet
d. Network communications modes TRANSPORT LAYER
e. Scope and significance of data and computer VI. Transport Layer Protocols
networking in todays world a. TCP
b. UDP
PHYSICAL LAYER
II. Protocol Architecture APPLICATION LAYER
a. Network communications processes VII. Network Services and Applications
b. Layered protocol architecture a. Client-Server Network
c. OSI Layers b. WWW and HTTP
d. TCP/IP c. FTP
d. Email
DATA-LINK LAYER e. Remote Logging
III. Local Area Network Topologies f. DNS
a. Ethernet g. DHCP
b. Overview of other LAN media h. SNMP
c. MAC and CSMA/CD
d. ARP VIII. WAN Technologies
e. Bridges a. SONET/SDH
f. Switched Ethernet b. ATM
g. VLAN c. IoT
d. Cloud Computing
NETWORK LAYER e. WPAN an Bluetooth
IV. Network Addressing f. RFID
a. Internet Protocol
b. IPv4 and IPv6 IX. NETWORK SECURITY
c. Address Spacing a. Intro to Cryptography
d. NAT b. VPN

I. INTRODUCTION TO DATA AND COMPUTER NETWORKS

telecommunication communication at a distance


data information presented in any form
data communications exchange of data between two devices via a transmission medium such as wired cable
data communications occurs when communicating devices are part of a communicating system (combination of hardware and
software)

Four fundamental characteristics of an effective data communication system:


1. Delivery system delivers data to the correct destination; data is received only by intended receiver
2. Accuracy systems delivers data accurately; altered and uncorrected data are unusable
3. Timeliness system delivers data in timely manner; late data are useless
in video and audio, timely delivery is delivering data as it is produced, in the same order, without significant
delay real-time transmission
4. Jitter variation in packet arrival time; uneven delay in delivery of audio or video packets
assume packets sent every 30ms, some packets arrives with 30ms delay, others with 40ms delay and results to
uneven video quality
J. Oscillada DATCOMM - EK FINALS Reviewer

A. NETWORK COMPONENTS

Five components of a data communications system


1. Message information/data to be communicated (i.e. text, numbers, pictures, audio, video)
2. Sender device that sends data message (i.e. computer, workstation, telephone handset, video camera)
3. Receiver device that receives the message (i.e. computer, workstation, telephone handset, TV)
4. Transmission medium physical path the data travels from sender to receiver (i.e. twisted pair, coax, radio waves)
5. Protocol set of rules governing data comms; agreement between the devices
without protocol: two devices connected but not communicating (i.e. French man and Japanese man)

Data Representation
1. Text represented as bit pattern, sequence of bits
a. Code set of bit patterns designed to represent test symbols
b. Coding process of representing symbols
i. Unicode 32 bits = a symbol or character
ii. ASCII American Standard Code for Information Interchange; constituted first 127 characters in
Unicode; aka Basic Latin
2. Numbers represented by bit patterns; does not use ASCII; directly converted to binary number
3. Images represented by bit patterns; simplest form is composed of matrix of pixels (picture elements)
a. Pixel small dot; size depends of resolution (higher resolution, better quality, more memory)
b. RGB represent color image; primary color red, green, blue; intensity of color is assigned bit pattern
c. YCM represents color image; primary color yellow, cyan, magenta
4. Audio recording or broadcasting of sound or music; continuous
5. Video recording or broadcasting of picture or movie; continuous or discrete (combination of images)

Data Flow
1. Simplex unidirectional communication; one-way (one transmits, the other receives) (i.e. keyboard, monitors)
2. Half-duplex each station transmits and receive but not at the same time (i.e. one-lane road, CB)
3. Full-duplex both stations transmit and receive simultaneously (i.e. two-way street, telephone network)
Full-duplex twice BW of half-duplex

B. NETWORK ARCHITECTURE

network - interconnection of a set of devices capable of communication where device can be:
Host end system (i.e. computer, desktop, laptop, security system, phone)
Connecting device like router, switch, modem (modulator-demodulator) etc.
Computer network collection of nodes
node any device capable of transmitting or receiving data connected via links
link communications pathway that transfers data from one device to another

Network Criteria
1. Performance achieve high throughput and smaller time delay; depends also on number of users, type of medium,
software efficiency, etc.
a. Transit time amount of time required for a message to travel from one device to another
b. Response time elapsed time between an inquiry and a response
2. Reliability frequency of failure, time it takes a link to recover from a failure, and networks robustness in a failure
3. Security protecting data from unauthorized access, damage and development, and implementing rules and procedures
for recovery from data losses and breaches
J. Oscillada DATCOMM - EK FINALS Reviewer

Physical Structures
1. Type of connection
a. Point-to-point dedicated link between two devices;
entire capacity of link reserved for transmission
between the devices; wired or wireless (i.e. TV remote
infrared)
b. Multipoint/ multidrop more than two specific devices
share a single link; channel capacity is shared (spatially
shared if devices use link at the same time; timeshared
if they take turns)

2. Physical topology
- way in which a network is laid out physically (two or more devices connected to link; two or more links form a topology)
- topology is the geometric representation of the relationship of all links and linking devices (nodes) to one another
a. Mesh topology every device has a dedicated point-to-point link to every other device (i.e. regional telephone)
- number of duplex-mode links/lines = n(n-1)/2
- each device must have n-1 I/O ports
- advantages:
(1) dedicated links guarantees each connection can carry its own data load, eliminating traffic
(2) robust (one unusable link does not incapacitate whole system)
(3) privacy/security (only intended recipient receives data)
(4) fault identification and isolation easier (routing traffic, allowing precise fault location,
cause, and solution
- disadvantages:
(1) amount of cabling and IO ports required; installation and reconnection are difficult
(2) wiring bulk may be greater than available space
(3) expensive hardware required

b. Star topology each device has a dedicated point-to-point link only to a central controller (hub)
- used in LAN
- one link and IO port only; easy to install and reconfigure, less cabling
- robust (one fails, others still work); easy fault identification and isolation
- disadvantages:
(1) whole network depends on a single point
(2) more cabling required than ring and bus

c. Bus topology multipoint; one cable acts as backbone to link all devices
- Drop line connection from device to main cable
- Tap connector either splices or punctures the main cable
- signal weakens along the cable; limited number of taps and spacing
- easy installation but difficult fault isolation and reconnection
- one fault/break stops the whole system

d. Ring topology - each device has a dedicated point-to-point connection with only two devices on its side
- incorporates repeater to regenerate bits; two-way sending
- easy installation and reconfiguration, simplified fault isolation
- alarm issued if one device does not receive a signal within specified period
- one break, whole system fails (so use dual ring)
J. Oscillada DATCOMM - EK FINALS Reviewer

Network Types
Local Area Network (LAN) Wide Area Network (WAN)

Local/small areas; privately owned Large area coverage; companies/organization

High data transfer rate Lower data transfer rate

Host addressing: 192.168.x.x, 10.x.x.x, 172.x.x.x Internetworking (internet)

Interconnects hosts Interconnects connecting devices

(1) Point-to-point, (2) Switched

ATM, SONET/SDH, ISDN, Frame relay, X.25

Other network categories:


- MAN metropolitan area network; in cities
- SAN storage area network; network dedicated to optimum storage and delivery of data
- VPN virtual private network; private network connected through public network (Intranet, Extranet)
- CAN campus area network; essentially a LAN
- PAN personal area network; network of devices centered around the user; implementation includes WPAN
- Sensor networks specialized network of devices used for monitoring

Switching
1. Circuit switching dedicated connection (circuit) always available between two end systems (where switch makes it
active or inactive); i.e. PSTN
2. Packet switching communication done in blocks of data (packets); exchange of individual packets; may be stored; may
take different paths

C. THE INTERNET

A switched network; composed of interconnected networks


backbone large networks owned by communication companies; international ISPs
peering points complex switching systems connecting the backbones
provider networks smaller networks using the service of the backbones for a fee; national/regional ISPs
customer networks networks at the edge of the Internet using the services provided by the Internet for a fee

ISP Internet Service Provider; such as backbones and provider networks

History of Internet
- 1961 Leonard Kleinrock (MIT) presented theory of packet switching for bursty traffic; papers on packet-switched
networks published by Paul Baran and Donald Davies
- mid 1960s mainframe computers were stand-alone devices
- 1969 ARPANET; software Network Control Protocol (NCP) provided host communication
- 1972 Vint Cerf and Bob Kahn collaborated on Internetting Project an created the gateway
- 1973 Cerf and Kahn paper of Transmission Control Protocol (TCP)
- 1977 demonstration of internet with three different networks; split of TCP into TCP and IP TCP/IP
- 1983 TCP/IP is official protocol for ARPANET which split into MILNET and ARPANET (military, commercial)

TCP transmission control protocol; responsible for higher level functions (segmentation, reassembly, error detection)
IP internet protocol; handles datagram routing

Internet standards tested specification of Internet use


Token ring 1st network (IBM)
J. Oscillada DATCOMM - EK FINALS Reviewer

II. PROTOCOL ARCHITECTURE

protocol shared convention or rules allowing devices from different systems to communicate
protocol architecture how a protocol is organized and implemented

Key elements of a protocol:


Syntax structure or format of the data; order in which data is represented
Semantics meaning of each section of bits; control information for coordination and error handling
Timing when and how fast the data is sent; speed matching and sequencing

Two protocol architecture approaches:


Monolithic single module; communication is a complex task
Modular complex tasks into subtasks handled by a specific module; easier application development; layered
Modular communication between different modules on the same system and vice versa
Modular network change without modifying all programs
Modular i.e. file transfer using three modules: file transfer application, communication service module, and
network access module

Protocol functions:
Segmentation and reassembly data stream into smaller blocks or PDUs
Advantages: (1) communications network accept only limited data block size (53 octets for ATM, 1526
octets for Ethernet); (2) efficient error control, fewer bits retransmitted at failure; (3) shorter delay,
better access to shared transmission files; (4) smaller buffers at receiver stations
Disadvantages: (1) larger overhead with smaller PDU; (2) more interrupts; (3) more time spent in
processing smaller PDUs; (4) reassembly is an issue
Encapsulation [header][data][control info]
Control info contains address of sender and receiver, error detection/frame check sequence, protocol
control for other protocol functions
Connection control establish connection, transfer data, terminate connection, sequencing; types of connection:
Connectionless data transfer each packet independent of other PDUs
Connection-oriented data transfer if stations are connected for long time or dynamic protocol; AKA
logical association, or virtual circuit; has three phases: establish connection, transfer data, terminate;
requires connection before data can be transmitted; requires order of packets be maintained
Ordered delivery necessary to sort packets since not guaranteed to arrive in same order sent
Flow control receiving entity to limit the amount of data sent; stop-and-wait (acknowledgement); efficiency =
transmission of fixed number of PDUs without acknowledgement
Error control prevent loss/damaged data; error detection and retransmission (detection of error discard ; no
acknowledgement retransmit)
Addressing naming an entity
Addressing level level in communications architecture at which an entity is named (physical
addressing changes hop to hop; logical addressing remains the same)
Global non-ambiguity address one system:one address; but possible to have more than 1 address
Global applicability any system can be identified from anywhere (public IP, Ethernet NIC MAC)
Addressing mode:
Unicast one to one
Multicast one to many
Broadcast one to all
Multiplexing upward mux (multiple high-level connections, gain BW); downward mux (split high to low-level;
reliability, performance, efficiency)
Transmission services:
Priority control messages
Quality of service max acceptable delay or throughput
Security access restrictions
J. Oscillada DATCOMM - EK FINALS Reviewer

A. LAYERED PROTOCOL ARCHITECTURE

Modularized protocol wherein implementation is organized


into layers
Each layer acts as a module
Objects within a layer communicates with peers (same layer)

B. OSI MODEL

OSI open system interconnection model; model that allows


two different systems to communicate regardless of their
underlying network, hardware, software; NOT A PROTOCOL;
model to understand and design flexible, robust, interoperable
network architecture
Developed by International Organization for Standardization
(ISO)
Data transfer from device to device may pass through
intermediate nodes (usually involve first three layers of model);
data link determines next node, network layer determines last recepient

Allow access to network resources for user


7 APPLICATION User data FTP, HTTP, Telnet, DNS
interface
Upper
Translate, encrypt, compress data, syntax,
layer 6 PRESENTATION Raw data SSL
formatting

5 SESSION Establish, manage, terminate sessions (log in/out) Dialog units

Provide end-to-end message delivery and error


4 TRANSPORT Segment TCP, UDP, SPX
recovery (process-to-process)

Move packets from source to destination host; Datagram/


3 NETWORK X.25, RIP, IP, IP NAT
Lower provide internetworking; IP address Packets
layer Organize bits into frames; provide node-to-node HDLC, LAPB, LLC,
2 DATA LINK Frames
delivery of frames; error control; MAC address Ethernet, ATM

Transmit bits through hop/node; provide


1 PHYSICAL Bits RS232x SCSI, Cat5e
mechanical and electrical specs

Primitives:
a. Request issued by service user to invoke/request service
b. Indication/Response issued by service provider/user to indicate notify
c. Confirm issued by service provider to acknowledge/complete procedure

1. Physical layer - specifies characteristics of transmission medium, data rate, topology, nature of connection, mode of data
transfer, etc.; interfacing (connectors, cables)
Sender side physical layer receives data from data link, encodes signal, transmits through medium, receiver side
physical layer decodes signal back into data, sends to data link (synchronization is important)
J. Oscillada DATCOMM - EK FINALS Reviewer

2. Data link layer provides error detection/correction, flow/access control; physical address appended to frame header
Sender side data link layer receives data from network layer, divides into frames, sends to physical layer; receiver
side data link layer receives frame from physical layer, regroups and send to network layer
Uses MAC addressing
3. Network layer highest layer in network node; logical addressing and routing
Sender side network layer receives data from transport layer, divides to packets, add addressing info in header, send
to data link layer; receiver side network layer converts data into packets, verify physical address, send to transport
4. Transport layer ensures error-free data delivered
Sender side transport layer divides data into segments; receiver side receives packets, converts to proper segment
sequence, send to session layer
5. Session layer dialogue discipline (half or full duplex), grouping, recovery (checkpoints)
Sender side receives data, adds checkpoints (syn bits); receiver side receives data, removes checkpoints, send
6. Presentation layer defines syntax used
Sender side receives data, adds header containing info for encryption and compression, send to session laye; receiver
side presentation layer decompresses ad decrypts data, translates back
7. Application layer interface between application programs an OSI environment (HTTP, FTP)

Disadvantages of OSI
Bad timing, bad technology (multiple flow control, error control, addressing) (EMPTY session an presentation; FULL network
and data link), bad implementation

C. TCP/IP

Protocol used by Internet at present; hierarchical protocol; dominant layered model


De facto standard

Contains logic needed to support various user SMTP, FTP, HTTP, Specific addressing
4 APPLICATION
applications DNS, Telnet

3 TRANSPORT Uses TCP; common layer shared by all applications SCTP, TCP, UDP Port addressing

2 INTERNET Uses IP for routing across multiple networks IP, ARP, ICMP, IGMP Logical addressing

Includes physical and data-link; exchange of data from LAN, WAN underlying Physical addressing
NETWORK
1 end system and attached network; access and routing technology
INTERFACE
data

TCP/IP applications
SMTP simple mail transfer protocol; basic e-mail transport facility
FTP file transfer protocol; send files from system to system under user command
Telnet remote logon capability
J. Oscillada DATCOMM - EK FINALS Reviewer

D. NETWORK DEVICES
(more detailed discussion in file network_devices_homework1.docx)

1. Repeater Layer 1 device; interconnects media segments of extended network; regenerates corrupted signals
2. Hub Layer 1 device; connects multiple user stations via dedicated cable; possibility of network congestion; shared
collision on all devices (broadcast); physically star, logically bus
3. Switch layer 2 device; multiport bridge; looks for MAC address (table); separates collision domain; data only to intended
receiver; in standard eth, operation in half duplex, no ned for CSMA/CD
4. Router separates broadcast domain and collision domain; special gateway; connects different networks (IP address
capable of subnetting); best path; have built-in AP
5. Bridge layer 2 device; LAN-LAN with same protocol; like a switch
6. Gateway networks with different protocols
7. Access Point (AP) wired to wireless LAN; no decrease in BW
8. WiFi Extender decrease BW due to extension range

Common reason for network congestion


1. Too many hosts in broadcast domain (192.168.1.xx)
2. Low BW
3. Broadcast storm

Collision domain probability of collision; section of the network connected by shared medium or through repeaters where data
packets can collide with one another when being sent; apparent in early Ethernet versions
1 switch port = 1 coll. domain 1 hub = 1 coll. domain

Broadcast domain logical division of a computer network in which all nodes can reach each other by broadcast at the data link
layer; may be within same LAN segment or bridged to other LAN segments

III. LOCAL AREA NETWORK TECHNOLOGIES

MAC address media access control; unique ID and does not change (48 bits) (i.e. 07:01:02:01:2C:4B)
- Used for most IEEE 802 network technologies
IP address internet protocol; changes per user; allows network layer to identify devices
IP internetworking protocol; connection-less and unreliable protocol
*** port address is 16 bits represented as a single decimal number

A. PHYSICAL LAYER

Performance characteristics
1. Bandwidth maximum speed
a. BW (Hz) range of frequencies data can pass (4kHz in telephone line)
b. BW (bps) max speed of bit transmission (56kbps in dial up; Trellis Code Modulation)
2. Throughput data rate; actual bit transmission (in std Ethernet, 10Mbps BW, 56kbps throughput)
J. Oscillada DATCOMM - EK FINALS Reviewer

Example: A network with BW = 10Mbps can pass only an average of 12,000 frames/minute with each frame
carrying an average of 10,000 bits. What is the throughput?
(12,000 frames/min) x (10,000 bits/ 1 frame) x (1min/ 60 sec) = 2Mbps
3. Latency total time delivered from first to last bit
Latency = Propagation time + Transmission time + Queueing time + Processing delay

Propagation time time it takes to travel the total distance


tpropagation = distance / speed speed = (3x108 m/s)*velocity factor
Example: d=12,000km v=2.4x10 m/s tpropagation = 50 ms
8

Transmission time amount of time to deliver whole message


ttrans = message size / bandwidth
Example: 2.5kB message, BW = 1Gbps, D = 12,000km, vf = 2.4x108 m/s ttrans = 20us

Queuing time time period by connecting devices (switch, router, etc.)


Processing delay variable
4. Jitter variation in delay between received packets; real-time traffic occurrence caused by gaps between
consecutive packets at the receiver caused by uneven delays

If figure is a Standard Eth Half duplex. What is throughput?


throughput = 10/3 = 3.33 Mbps

If there is a switch between 2nd and 3rd PCs still half duplex, find
throughput
throughput = 10/2 = 5Mbps
If full duplex with switch, throughput = 5*2 = 10 Mbps (up and down)

If all PCs connected to switch in star topology, throughput of each = 20 Mbps (sent and receiving)

B. DATA LINK LAYER

Responsibilities:
1. Framing encapsulation + decapsulation; network layer (datagram) to data link layer (frames)
2. Flow control synchronize sending + receiving device by applying buffer or drop info
3. Error control identify data integrity; checksum or CRC-32 (error detect), hamming code (error correct)

Classification of data link layer


1. Logical link control (LLC) provide interconnectivity between networks or different protocols (MAC to upper layer);
defined by IEEE 802.2 committee
2. Media access control (MAC) defines specification for controlling access to the media; controls access to medium

ARP address resolution protocol; Layer 3 protocol; finds the MAC address; sends request (broadcast) receives reply (unicast)
from destination
How to know if unicast/ broadcast:
4A:30:10:21:10:1A unicast 47:20:1B:2E:08:EE broadcast
4A 0100 1010, if last bit 0=unicast 47 0100 0111, if last bit 1=broadcast

FF:FF:FF:FF:FF:FF broadcast
[FF:FF:FF][FF:FF:FF] [OUI][Device Identifier]

OUI organizational unique identifier (company)


J. Oscillada DATCOMM - EK FINALS Reviewer

C. ETHERNET

Family of LAN implementations derivative from original Ethernet by Xerox


Layer 1 and 2 operation
Bus topology was first used (one coax (ether), and on Ethernet cable is called a segment with 3meter minimum separation)
Half duplex, broadcast
Standard Ethernet 10Mbps; IEEE 802.3
Fast Ethernet 100Mbps; IEEE 802.3u
Gigabit Ethernet 1Gbps
10-Gigabit Ethernet 10Gbps

Common protocol an standards


IEEE 802.3x Ethernet, 10Mbps IEEE 802.15 WPAN
IEEE 802.11 WiFi IEEE 802.15.6 BAN

Ethernet physical layer

Ethernet Frame

Destination Source
Preamble SOF TYPE DATA FCS
Address Address

7B 1B 6B 6B 2B 46-1500B 4B

Physical layer
1. Preamble alternating 1, 0; tells other device that it wants to send frame; can be less than 7 bytes
2. Start of Frame last two bits are 11; synchronize frame-reception portions of all stations on LAN

Data link layer (64 bytes minimum)


1. Destination address MAC Address; unicast, multicast, or broadcast
2. Source address MAC address; unicast
3. Type indicates protocol of upper layer to receive the data
4. Data number of bytes (Length 802.3)
5. Frame check sequence error checking; CRC32 for Ethernet

Contention Methods
1. ALOHA protocol continuous sending (broadcast) of frames but will wait for acknowledgment from receiver then
retransmit if none received after certain time
a. Back-off time time to wait before retransmission; random per host
Back-off time = R*Tp where R = random # (1 to 2k-1, k=15 max number of attempts)
J. Oscillada DATCOMM - EK FINALS Reviewer

Minimum time out = 2*TP (travelling time)


Disadvantage: if transmission is at the same time = collision

2. CSMA carrier sense multiple access; listens first checks if someone is sending a frame sends when the coast is
clear (avoids collision)
Cause of collision: when simultaneous propagation, fails to sense that one is already sending

3. CSMA/CD CSMA/collision detection; when collision occurs/is detected, jamming signal is sent, everybody backs-off
CASE 1: Host 1 sends at t1, Host 3 does not receive any message yet so sends data because unaware of Host 1 sending.
When host 3 receives message from host 1, he will sense collision, host 3 will stop broadcasting frames and sends
jamming signal and everyone backs off
CASE 2: Host 1 sends frame and host 3 detects this, he will wait for host 1 to finish before he transmits (1-persistence)
CASE 3: Host 1 is the only one who wants to send, nobody else wants to. No collision

Host 1 send request Host 3 acknowledge Host 1 sends real data

Persistence methods:
a. 1-Persistence method continuous sensing at regular intervals, as many samples until data line detected free
to send; sensing is by order; standard for Ethernet
b. Non-persistence method random intervals of sensing; sense at random if interval is free or busy to send data

Autonegotiation additional feature of 802.3u fast Ethernet; computers in a network negotiates with one another to
determine compatible speed for all
Carrier sensing checks if line is busy before sending a frame
Multiple access many connected to a network in on transmission line

VLAN virtual LAN; separates/connects broadcast networks even if far away; physically separated, logically connected

D. WIRELESS LAN (WLAN)

Layer 1 and 2 operation; uses 2.4GHz (unlicensed band no need to pay, part of ISM) (latest evolution 5GHz)
Uses 2.401 2.473 GHz
Each channel with 22MHz bandwidth, incremental step 5MHz, total of 11 channels
Non-overlapping channels: 1, 6, 11
Advantages: (1) no need for physical wires; (2) no port limitations; (3) less collision based on protocol
Disadvantages: (1) prone to interference; (2) security issues; (3) slower speed; (4) less distance

ISM Industrial scientific and medical band


Multipath multiple path; packet has many paths it can take

Characteristics of WLAN
1. Half-duplex ALWAYS broadcast
2. Shared media transmit via air; more users, less BW, higher latency
3. Attenuation greater distance, less signal (a = 1/d2)
4. Interference 2.4GHz unlicensed band
5. Multipath propagation bouncing/spreading of signals thanks to walls/air; in elevator, Faraday cage no signal
6. Transmission acknowledgement hidden station problem solved via CSMA/CA

WLAN architecture
1. BSS basic service set
a. WLAN Infrastructure multiple host connected to base station controller (or AP)
b. ADHOC no base station needed to establish connection
2. ESS extended service set; several BSS connected in distribution system with a server
J. Oscillada DATCOMM - EK FINALS Reviewer

Hidden Station Problem


Host A communicates with Host B but cannot with Host C
Host C wants to communicate with Host B but unaware the B is already communicating with A
Collision in B is both A and C sends at the same time

CSMA/Collision Avoidance (CSMA/CA)


Used in WLAN
[Host 1]----------[Host 2]----------[Host 3]----------[Host 4]

1. If 1 wants to send to 3, will sense first until line is idle


2. If 3 already idle, waits for time DIFS
3. 1 will send RTS to 3
4. 3 receives RTS and waits for time SIFS before sending CTS
5. CTS is broadcasted and 1 waits for time SIFS before sending data
6. 1 sends DATA to 3
7. 3 receives DATA, wait for SIFS, and sends ACK
8. 1 is about to send DATA but waits for time NAV
9. all other stations waits for NAV

DIFS distributed inter frame space


RTS request to send
SIFS short inter frame space
CTS clear to send; broadcast to avoid collision and notify other hosts that 1 is about to send DATA
NAV network allocated vector; waiting time before host can send again; depends on data length

WLAN trivia:
Diffraction allows signals to be sent even in small holes then spread (Huygens principle)

Spread Spectrum
Advantages of spread spectrum:
a. More immune to multipath propagation; avoids multipath grading
b. Inherent security
c. Tolerance to interference
d. Less power density

1. FHSS frequency hop spread spectrum


- Used in Bluetooth
- Changes frequency where data is sent
- Avoids multipath fading
- BW = nB n = number of hops

2. DSSS direct sequence spread spectrum


- Converting a bit into n bits (i.e. 1 bit 11 bits in Barker Sequence 101 1011 1000) via XNOR
- Higher security
- BW = 11*BW

3. OFDM orthogonal frequency division multiplexing


- No interference on two orthogonal frequency (i.e. fourier series)
- BW = n*data rate
J. Oscillada DATCOMM - EK FINALS Reviewer

IV. NETWORK ADDRESSING

NETWORK LAYER (LAYER 3)


- MAC addressing; MAC addresses are unique and interpreted by the Layer 3 via the IP address
- Host-to-host or end-to-end delivery (recall data link is hop-to-hop or node-to-node)
Functions of Layer 3:
1. Internetworking connecting networks to other networks
2. Packetizing same concept as framing; encapsulating payload or data from upper layer with an added header and
decapsulating data; carry payload from source to destination without manipulating the data content
- routers cannot decapsulate packets unless fragmentation is needed
3. Routing creating the shortest possible/best path strategy from source to destination; protocols: RIPv2, OSPF, BGP
4. Forwarding action done by router when a packet arrives at interface; sending the packet to another network
5. Other functions
- Error control use of auxiliary protocol (ie ICMP)
- Flow control regulate amount of data to avoid overwhelming the receiver
- Congestion control avoid datagrams sent to exceed the capacity of network or routers
- Quality of service especially for real-time communication (audio, video)
- Security protect data of users

A. INTERNET PROTOCOL (IP)


- Unreliable; works with TCP (cannot work alone) for reliability
- connectionless protocol each packet independent of each other
- best effort delivery no acknowledgment, packets received prone to duplication/corruption/lost, unreliable, no
assurance that data is sent to destination or corrupted
- not capable of error handling if alone
- error checking given to protocol that owns the payload (UDP or TCP)
Protocols:
1. IPv4 main protocol at the network layer; unreliable
2. ICMPv4 helps IPv4 in error handling; Internet Control Message Protocol version 4
3. IGMP helps IPv4 in multicasting; Internet Group Management Protocol
4. ARP attaches the network and data-link layers in mapping network-layer addresses to link-layer addresses; Address
Resolution Protocol
J. Oscillada DATCOMM - EK FINALS Reviewer

IP Datagram
- packets used by IP; variable-length with two parts: header and payload (or data)
- payload packet from other protocols using IP services
Header content:
1. VER (version number) of protocol used (IPv4 is 4 0100)
2. HLEN (header length) total length of whole header divided by four; from receiver, multiply by 4
- Example: 0110 6x4 = 24 total length of entire header
3. Type of Service how datagram is handled in upper layer; for network layer prioritizing
4. Total Length total length (header + payload)
- TL = (HLENx4) + Data length
- Data length = TL (HLENx4)
5. Identification, Flags, Fragmentation Offset fragmentation of datagram when size exceeds network capacity; also
for datagram ordering or sequence of packet arrival
6. Time-to-live (TTL) maximum number of hops of packets to avoid traffic; typically 2x(max number of routers)
between any two hosts
7. Protocol define which upper-layer protocol is used to deliver the payload
8. Header Checksum checks integrity of the header (integrity if data is uncorrupted); recalculated every router
9. Source, Destination Addresses IP address of source and destination of the datagram
10. Options + Padding for network testing and debugging
Example:
1. An IPv4 packet has arrived with the first 8 bits as (0100 0010)2. The receiver discards the packet. Why?
- VER: 0100 is correct
- HLEN: 0010 2x4 = 8 bytes HLEN too small since minimum should be 20 bytes ERROR IN PACKET

2. If value of HLEN is (1000)2, how many bytes of options are being carried by this packet? If HLEN is (0100) 2
- HLEN: 1000 8x4 = 32 bytes base header = 20 Options = 32-20 = 12 bytes //
- HLEN: 0100 4x4 = 16 bytes ERROR, packet is discarded
3. HLEN is (0101)2 and TL is (0028)16. How log us the data?
- HLEN: 0101 5x4 = 20 bytes TL: 2816 40 bytes
- Payload = TL HLEN = 20 bytes //
4. (4500 0028 0001 0000 0102)16. Find max number of hops before being dropped and the protocol data belongs to.
- 10 bytes total; TTL at 9th byte (01)16 1 hop maximum
- Protocol at 10th byte (02)16 IGMP protocol
5. CHECKSUM: example of a checksum calculation for an IPv4 header without options. The header is divided into 16-
bit sections. All the sections are added and the sum is complemented after wrapping the leftmost digit. The result
is inserted in the checksum field.
J. Oscillada DATCOMM - EK FINALS Reviewer

B. IPv4 AND IPv6


IPv4 IPv6

- uses 32-bit addressing; total address space 232 - 128 bits length, 16 bytes, 32 hex digits

- 8 bits for each byte (0-255 or 0-FF) - bigger address space

- problem with address depletion - address abbreviation

- used by 77% - used by 23%

- Google, FB

IPv6 ADDRESSING
- hexadecimal colon notation address divided into 8
groups
- abbreviation use once to shorten series of 0s (zero
compression)
Addressing types:
1. unicast address single interface
2. anycast address group of computers sharing a single
address; packet sent only to one, most reachable
member
3. multicast address like anycast but all members receives the packet

TRANSITION IPv4 IPv6


1. Dual Stack station have IPv4 and IPv6 running simultaneously or whichever your system can handle; DNS is used
to determine which version to use based on DNS reply to source; typically migration from core to edges
2. Tunneling or port forwarding; IPv6 communicating with another IPv6 network but packet passes through region
using IPv4; IPv6 packet encapsulated in IPv4 until it exits the region and is decapsulated
3. Header translation when majority finally use IPv6 but there are still IPv4 users; IPv6 wants to communicate with
an IPv4 system, cannot use tunneling; router converts IPv6 address to IPv4 format; header format totally changed

C. ADDRESS SPACING
- total number of addresses used by the protocol (2b) 32 bits
- prefix and suffix may be fixed or variable length
- i.e. 192.168.10.1, FC.A1.3C.1B n n n n
Domain Naming System (DNS) specific sentence linked to an IP
prefix suffix
address; example www.google.com 202.105.186.141
Network address used in routing a packet to its destination network Network address Host address

Dynamic addressing changing address


Static addressing permanent, does not change

CLASSFUL ADDRESSING
- first addressing used; may be thought of as a special case of classless addressing
- MSB defines the class; useful classes: A,B,C
- Class E: experimental purposes
- remaining bits defines host or broadcast address
- Disadvantage: (1) address depletion, limited (2) inefficient, cannot use all hosts available [ie for class A, refer below,
cannot possibly use all 255x255x254 hosts] (3) obsolete
- Advantage: (1) easily identify class, prefix, and suffix (prefix length is fixed)
J. Oscillada DATCOMM - EK FINALS Reviewer

- sample addressing:
Class Address Network Address Broadcast Address
A 10.114.105.5 10.0.0.0 10.255.255.255 * change suffixes to 0
B 167.14.23.1 167.14.0.0 167.14.255.255 or 255
C 205.187.16.3 205.187.16.0 205.187.16.255

- to get total networks available per class: 2^(total network length number of bits to identify class)
example: for class C 24 bits 3 bits = 21 221 = 2,097,152 networks in the world
- to get first byte range for each class: 2^(8 bits number of bits to identify class)
- to identify number of valid hosts: (maximum used)
example: Network address: 205.187.16.0 Broadcast address: 205.187.16.255
256-2 = 254 valid hosts for class C (already used 0 and 255)
Subnet Mask Class A 255.0.0.0 or /8
- identifies network or broadcast address given an IP address Class B 255.255.0.0 or /16
- AND the IP address and subnet mask to get network address
- OR the IP address and invert subnet mask to get broadcast address Class C 255.255.255.0 or /24
- example:
205.187.16.3 /n indicates first n bits are 1 ; notation
205.187.16.3 ; 3 = 0000 0011
AND 255.255.255.0 OR 0.0.0.255 /30 for point-to-point
; 255 = 1111 1111
205.187.16.0 network address 205.187.16.255 broadcast address
First host: 205.187.16.1
Last host: 205.187.16.254

- example: using 10.114.105.5/8

10.114.105.5 10.114.105.5 ; 5 = 0000 0101


AND 255.0.0.0 OR 0.255.255.255
10.0.0.0 network address 10.255.255.255 broadcast address
First host: 10.0.0.1
Last host: 10.255.255.254 * there are 255x255x254 hosts
Block Size Valid Host
CLASSLESS INTERDOMAIN ROUTING (CIDR) /25 128 126
- no need to identify class; variable prefix length (0-32 range) /26 64 62
- may divide to multiple networks /27 32 30
- /n is variable and not divisible by 8 /28 16 14
- to get valid host or BLOCK SIZE: 2^(32-n) where 32 max bits /29 8 6
- Advantage: (1) address aggregation /30 4 2
- Disadvantage: (1) variable networking addresses, different subnets
J. Oscillada DATCOMM - EK FINALS Reviewer

- example: 167.199.170.82/27
167.199.170.82/27 ; 82 = 0101 0010
AND 255.255.255.1110 0000 ; /27 first 27 bits are 1 = 255.255.255.1110 0000
167.199.170.0100 0000 or 167.199.170.64 network address
First host: 167.199.170.65 * max hosts = 232-27 = 32hosts
Last host: 167.199.170.94 * BLOCK SIZE = 32-2 = 30 hosts
Broadcast address: 167.199.170.95

- example: 151.142.223.81/28
151.142.223.81/28 ; 81 = 0101 0001
AND 255.255.255.1111 0000 ; /28 first 28 bits are 1 = 255.255.255.1111 0000
151.142.223.0101 0000 or 151.142.223.80 network address
First host: 151.142.223.81 * max hosts = 232-27 = 16hosts
Last host: 151.142.223.94 * BLOCK SIZE = 32-2 = 14 hosts
Broadcast address: 167.199.170.95

- example: 18.14.12.0/n = ? if ISP address: 1000 address

1000 addresses choose which is closest/next highest 2n


Possible: 2048, 1024, 512 CHOOSE 1024 232-22 = 1024 n=22
18.14.12.0/22

- example: An organization is granted a block of addresses with the beginning address 14.24.74.0/24. The organization
needs to have 3 subblocks of addresses to use in its three subnets. Design the subblocks.
Subblock 1: 10 Subblock 2: 60 Subblock 3: 120

Solution:
Subnet Hosts Block Size
1. rearrange from highest to lowest host then choose nearest block size
3 120 128 /25
total hosts = 190 nearest is 256 or /24 addresses
2 60 64 /26
2. allocate n addresses per subblock starting from highest 1 10 16 /28
Subblock 3
Network address 14.24.74.0/25
Broadcast address 14.24.74.127/25
First Host 14.24.74.1/25
Last Host 14.24.74.126.25
Subblock 2
Network address 14.24.74.128/26
Broadcast address 14.24.74.191/26
First Host 14.24.74.129/26
Last Host 14.24.74.190/26
Subblock 1
Network address 14.24.74.192/28
Broadcast address 14.24.74.207/28
First Host 14.24.74.193/28
Last Host 14.24.74.206/28
Unused block
First 14.24.74.208
Last 14.24.74.255

- example: An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The ISP needs to
distribute these addresses to three groups of customers as follows. Design the subblocks and find out how many
addresses are still available after these allocations.
-
Subblock 1: 64 customers, each needs 256 addresses
J. Oscillada DATCOMM - EK FINALS Reviewer

Subblock 2: 128 customers, each needs 128 addresses


Subblock 3: 128 customers, each needs 64 addresses

Total address used: (64x256)+(128x128)+(128x64) = 40,576 addresses


Unused addresses: 65,536 40,576 = 24,960 addresses

Address Aggregation / Route Summarization

- Multiple networks into one IP address; simplify networks in one router


- routing based on prefix of the larger block when blocks of addresses are combined to create a larger block
- ICANN assigns large blocks of addresses to an ISP then ISP divides assigned block to smaller subblocks for customers
- How:
1. List the addresses. Check how many bits are changing from first
address to last address
i.e. (see figure) 3rd octet are different; 16 = 0001 0000 and 31 =
0001 1111
only 4 bits are changing
2. Determine block size = 24 - # of changing bits
i.e. 24 4 bits = 20 bits
24 = 16 indicates number of bits for range [ie 192.168.x.x]

- example: find list of addresses of packets from R2R1 if R2 address is 192.168.144.0/20

24-20 = 4 bits changing 144 = 1001 0000 159 = 1001 1111

192.168.144.0 192.168.1001 0000.0 192.168.144.0 to


AND
Subnet mask 255.255.1111 0000.0 192.168.159.255

D. NAT NETWORK ADDRESS TRANSLATION

- provide the mapping between the private and universal addresses and supports VPN
- private use but Internet sees it as public use (multiple private addresses)
- private addresses for internal communication and global Internet address for external communication
- client-server where client starts the communication
- one to many
Private Address Range Total
Private Addresses used by private networks invisible to the Internet;
10.0.0.0 10.255.255.255 224
range of local addresses; may be for small office use
172.16.0.0 172.32.255.255 220
192.168.0.0 192.168.255.255 216
J. Oscillada DATCOMM - EK FINALS Reviewer

How NAT works:

1. Address translation at the NAT router, source address in packet replaced with global NAT address; if from
destination address, NAT router replaces destination address with private address
2. Translation table lets router identify the destination address of packet from the Internet
a. 1 IP address simplest form only private and external address; during translation, router notes the
destination address; when reply comes from dest, private address found using the source address
i. Private network initiates

b. Pool of IP addresses allows more than one private-network host to access an external host
i. Drawbacks: (1) limited to maximum 4 connections to the same destination, (2) cannot access
two external server programs at the same time
c. IP address + Port addresses allows many-to-many communication by giving more information; five
columns; eliminates ambiguity

Where external port indicates if HTTP (80) or FTP (21)


* by 2020, 20B devices will connect to Internet
ISP and NAT

- ISP Internet Service Provider get 1000 addresses to create address for all users
J. Oscillada DATCOMM - EK FINALS Reviewer

V. ROUTING

Hierarchical routing - routing in several steps using different routing algorithms

A. ARP REVISITED ADDRESS RESOLUTION PROTOCOL

- helps IP to find the link-layer/physical address of a host or a router when its network-layer/IP address is given
- Looking for physical address broadcast to whole system
- Layer 3 auxiliary protocol; within the network
- detect ARP reply unicast contains correct address
Case Description Target IP address
1 Same network: host to host Destination address in IP datagram
Different network host to host: pass through
2 IP address of router
router first
3 Router to router IP address of appropriate router from the routing table
4 Router to host Destination address in IP datagram

PROXY ARP
- proxy ARP router replies to any ARP request received for given IP address destinations
REVERESED ARP (RARP) - find the IP address given MAC address when in another network

B. ROUTING PROTOCOLS

INTERNET CONTROL MESSAGE PROTOCOL (ICMP)


- IP has no error correction or reporting mechanism or mechanisms for host and management queries
- helps IP report problems when routing a packet; companion of IP protocol
UNICAST ROUTING

- one-to-one relationship between source and destination


- packet is routed, hop by hop, from its source to its destination by the help of forwarding tables
- source host no need for table since sends to default router in local network
o source router is default router of source host
o destination router is router connected to destination network
- weighted graph each edge corresponds to a cost

- Least Cost Routing identify best route


o Least-cost tree (N) - tree with the source router as the root that spans the whole graph (visits all other
nodes) and in which the path between the root and any other node is the shortest
o Least-cost path = N-1 from each router to any router with N routers
o Least-cost path entire internet = N(N-1) from each router to any router

Routing Algorithms
1. Distance Vector Routing simplest and easiest; each node shares routing table with immediate neighbors;
initialize routing table then update; get cost between immediate neighbors (directly connected)
- (1) each node creates own least-cost tree (2) trees made more complete by exchanging with immediate
neighbors
- Update existing least cost with new lesser cost; compare old and new tables
- Router tells all neighbors continuously what it knows
- if not immediate neighbor; 0 if loopback
a. Bellman-Ford Equation heart of DVR; finds minimum/shortest distance between two nodes through
other nodes when costs are given between each nodes; D xy = min{Dxy, (cxz + Dzy)}
b. Distance Vector rationale for DVR; 1-D array representation of least-cost tree
J. Oscillada DATCOMM - EK FINALS Reviewer

2. Link-State Routing - define the characteristic of a link (an edge) that represents a network in the internet; cost
at the edge specifies state of the link
- prefer links with lower costs; infinity means no link or broken link
a. Link-state database collection of states for all links used by each node to create tree; shows whole
map of internet; created by flooding (each node send messages to all immediate neighbors to get node
identity + link cost = LS packet)
b. Dijkstras Algorithm formation of least-cost tree; slow; gets cost of nearest node and so on
3. Path-Vector Routing not based on least-cost routing; best route is determined by the source using the policy
it imposes on the route (source controls the path); mainly for routing packets between ISPs
a. Spanning tree not the least-cost tree; tree determined by source imposing its own policy (route that
meets policy best)
Unicast Routing Protocols
Hierarchical routing considering each ISP as an
autonomous system (AS); internet routing cannot be
done with one protocol only because:
o Scalability problem size of the forwarding
tables becomes huge, searching for a
destination in a forwarding table becomes
time-consuming, and updating creates a
huge amount of traffic
o Administrative issue wrt Internet structure
where admin must have control
Autonomous System (AS) private entity owns a local network
o Given a 16-bit autonomous number (ASN) by ICANN
o Intradomain protocol within AS; aka interior gateway protocol (IGP); may be more than 1 (i.e. PLDT
to PLDT network)
o Interdomain global routing protocol or exterior gp (EGP); only 1 (i.e. PLDT to GLOBE network)
o Defined by connection mode
Stub AS only 1 connection to another; initiate or terminate data traffic; data cannot pass
through
Multihomed AS more than one connection to other AS; traffic not allowed to pass
Transient AS more than one connection with traffic allowed to pass (ie backbone)

1. Routing Information Protocol (RIP)


- most widely used intradomain protocol based on distance-vector routing algorithm (Bellman-Ford algo)
- weights of edges based on hop count; flat network design
J. Oscillada DATCOMM - EK FINALS Reviewer

- started as part of Xerox Network System (XNS)


- widespread use thanks to Berkeley Software Dist (BSD) version of UNIX
a. Hop Count maximum is 15 (16 is infinity/no connection); from AS to router = 1 hop
b. Forwarding table 3-column (destination, router address, cost or hops)
c. Implementation uses UDP on port 520; daemon process called routed in BSD; RIPv1, RIPv2
daemon process running in background
i. RIP message exchanged from client to server; two types (1) request 92) response
ii. RIP algorithm same as distance-vector algo
iii. RIP timers
1. periodic timer for regular update messages; 25-35 seconds, message sent at 0 sec
2. expiration timer for validity of route set to 180 secs and reset when new update is
received or expires when times up and hop count 16
3. garbage collector timer for purging route from forwarding table at 0 sec; set to 120
secs; informs neighbors that route is invalid
d. Performance
i. Update messages sent only to neighbors (local); avoid sending at same time by router
ii. Convergence of forwarding tables slow if domain is large; but since max at 15, no problem;
problem only from count 16 and loops
iii. Robustness failure in one router affects forwarding in each router

2. Open Shortest Path First (OSPF)


- Multiple factors affect link cost (jitter, throughout, etc.); link-state using Dijkstras algorithm
- Hierarchical network design; different for different vendors
- CISCO routers cost: 108/BW
- only difference with RIP is cost value, table is the same because both based on shortest-path trees
- Open public document specification
- 3 steps: (1) establish neighbors (2) synchronize LSDB thru LSA (3) SPF calculation
a. Metric cost is additive of weights assigned
b. Forwarding table each router creates its table after determining shortest-path tree using Dijkstra
c. Area subdivision of AS to small sections to avoid traffic with one designated as backbone area (or
area 0) to connect all
d. Link-state advertisements five types
i. Router link advertises the existence of a router as a node; defines also other link types
1. Transient link announces and defines address of transient network (network
connected to the rest of the networks by one or more routers) and cost
2. Stub link defins address of stub network (network that is not a through network)
3. Point-to-point link - define the address of the router at the end of the point-to-point
line and the cost to get there
J. Oscillada DATCOMM - EK FINALS Reviewer

ii. Network link advertises the network as a node; but network is passive entity and cannot do
announcements itself so a router does the advertisement
iii. Summary link to network done by area border router; summary of links collected by
backbone to an area
iv. Summary link to AS done by AS router
v. External link also done by an AS router to announce the existence of a single network outside
the AS to the backbone area to be disseminated into the areas
e. Implementation as a program in the network layer using IP service for propagation; protocol field 89
i. OSPF Message OSPF is complex and has five types
1. Type 1 or hello self introduction to neighbors
2. Type 2 or database description response to hello; acquire full LSDB
3. Type 3 or link-state request from router needing info about LS
4. Type 4 or link-state update main OSPF message for building LSDB
5. Type 5 or link-state acknowledgment create reliability in OSPF
ii. Authentication prevents a malicious entity from sending OSPF messages to a router and
causing the router to become part of the routing system to which it actually does not belong
iii. OSPF algorithm same with link-state but with changes
f. Performance
i. Update messages large area flooding may create heavy traffic
ii. Convergence of forwarding table faster but each router needs to run Dijkstras
iii. Robustness more robust than RIP; after receiving LSDB, each router is independent ; failures
in one router does not affect others as seriously as in RIP

3. Border Gateway Protocol Version 4 (BGP4)


- only interdomain routing protocol used in the Internet today; complex protocol
- based on the path-vector algorithm; provide information about the reachability of networks in the Internet
- when least-cost is not priority

VI. TRANSPORT LAYER

- Process-to-process delivery typically through client-server paradigm


- Heart of TCP/IP protocol suite; logical connection (virtual or imaginary direct connection)
- Packets are called user datagrams, segments, or packets
- Segment is group of bytes (TCP) or user datagram (UDP)

Client-server paradigm local host (client) needs process on remote host (server); client starts the communication,
receives a port number an uses ephemeral port

TRANSPORT LAYER SERVICES main role: in red


1. Process-to-process communication process (application layer entity) using services of transport layer
J. Oscillada DATCOMM - EK FINALS Reviewer

2. Port Addressing used to identify the process used (16 bits from 0-65,535)
FTP port numbers: 20,21; Telnet is 23; SSH is 22 (default remote logging)
a. Ephemeral port number for client program; short-lived/temporary like a clients life; greater than 1023;
depends on availability
b. Well-known port number universal port numbers for server; permanent; established by IANA and known
by client; not chosen randomly; (i.e. HTPP is 80 an FTP is 25)
For ICANN or IANA range:
Well-known port: 0 - 1023; assigned and controlled by IANA (ie UDP, TCP)
Registered port: 1024 - 49,151; not controlled by IANA; can only be registered to prevent duplication
Dynamic port: 49,152 - 65,535; neither controlled nor registered; ephemeral

3. Encap/Decap encap at sender side and transport layer adds header to data; decap at receiver
4. Mux/Demux mux (many to one) done by source; demux (one to many) done by destination
5. Flow control ensure balance between production and consumption; use of buffers typically
a. Delivery mode: (1) Pushing sender delivers items whenever produced without request from consumer
and (2) Pulling item delivery after consumer request
b. At pushing, client may get overwhelmed need for flow control

6. Error control responsible for (1) detect and discard corrupted packets (2) keep track of lost and discarded packets
and resend them (3) recognize duplicates and discard them (4) buffer out-of-order packets until missing packets
arrive; for BOTH transport and network layers (TCP/IP ensures reliability)
a. Sequence numbers determine if packets arrive correctly; range from 0-2m-1 where m bits; numbering
system per data byte assigned to each segment
b. Acknowledgment when packets arrive safe; if no ACK after time expiration, packets are resent
7. Congestion control mechanisms and techniques that control the congestion and keep the load below the capacity

Socket Addressing combination of IP address + port


number needed by transport layer protocol; defines
process uniquely; need pair (client + server) to use
transport layer services in Internet
J. Oscillada DATCOMM - EK FINALS Reviewer

Well-known ports

Other ports

1 TCP Port Service Multiplexer (TCPMUX) 119 Newsgroup (NNTP)


5 Remote Job Entry (RJE) 137 NetBIOS Name Service
7 ECHO 139 NetBIOS Datagram Service
18 Message Send Protocol (MSP) 143 Interim Mail Access Protocol (IMAP)
20 FTP -- Data 150 NetBIOS Session Service
21 FTP -- Control 156 SQL Server
22 SSH Remote Login Protocol 161 SNMP
23 Telnet 179 Border Gateway Protocol (BGP)
25 Simple Mail Transfer Protocol (SMTP) 190 Gateway Access Control Protocol
29 MSG ICP (GACP)
37 Time 194 Internet Relay Chat (IRC)
42 Host Name Server (Nameserv) 197 Directory Location Service (DLS)
43 WhoIs 389 Lightweight Directory Access Protocol
49 Login Host Protocol (Login) (LDAP)
53 Domain Name System (DNS) 396 Novell Netware over IP
69 Trivial File Transfer Protocol (TFTP) 443 HTTPS
70 Gopher Services 444 Simple Network Paging Protocol (SNPP)
79 Finger 445 Microsoft-DS
80 HTTP 458 Apple QuickTime
103 X.400 Standard 546 DHCP Client
108 SNA Gateway Access Server 547 DHCP Server
109 POP2 563 SNEWS
110 POP3 569 MSN
115 Simple File Transfer Protocol (SFTP) 1080 Socks
118 SQL Services
J. Oscillada DATCOMM - EK FINALS Reviewer

A. USER DATAGRAM PROTOCOL (UDP)

- Connectionless, unreliable, simple as possible delivery


- Real-time usage; if error detected, UDP drops signal whether
clean or not
- checksum is optional (if applied and error detected, receiver
drops the data; adds pseudo header; 16 bits)
- connectionless data goes anywhere; unreliable; no order

B. TRANSPORT CONTROL PROTOCOL (TCP)

- connection-oriented (establish first the virtual circuit before sending data), reliable
- guaranteed data delivery sequence
- with error and flow control
- Steps: (1) establish new connection (2) transfer data (3) terminate connection
- Stream oriented delivery data come in stream or in order; requires sequence number
o Data + Control need sequence number
o Control Only logically no sequence number
o Control Only + Requires ACK sequence number + imaginary 1 byte
- ACK value number of next byte that receiving party is expecting to receive
o (i.e. ACKnum = 5643, bytes until 5642 has been received; expecting to receive 5643 next)

Sending and Receiving buffers:


- Represented by weights; wait for ACK if received
- continuous sending, buffer stores if not yet ready to process segment; does not stop sender from sending; at
receiver, stored segments are read one by one
- byte-oriented
- has a limit; if too fast sending, receiver will say to slow down
- receiver detects error, drop the segment

1. Connection Establishment
a. Three-way handshaking
- client first sends SYN to indicate it wants to send
- server sends ACK+SYN to indicate it also wants to
communicate with client
- client finally sends ACK established
b. Full-duplex communication (Piggybacking)
SYN = no data, 1 imaginary byte
SYN+ACK = no data, 1 imaginary byte
ACK = no data, no imaginary byte
2. Data Transfer
a. Piggybacking
J. Oscillada DATCOMM - EK FINALS Reviewer

3. Connection Termination
a. Three-way handshaking
- similar to establishment but instead use FIN to
terminate communication
- ACK by both parties
b. Full-duplex communication (piggybacking)
4. Half-Close Termination
a. Only one party closes; not ACK by one end; one-sided
termination
Ie client wants to end but serve still wants to send;
server keeps on sending but client wil just ACK (seen
zone) until server sends FIN

DATA TRANSFER

1. Sliding Window for Flow Control


- byte oriented
- increases efficiency
- cwnd= congestion window; based on network performance
- rwnd = receiver window (sender from receiver)
- HOW IT WORKS:
closing if ACK is received, opening if SYN
after ACK, sender will begin to get lost
at receiver, opening widens when segments have been processed

- Example: Find value of receiver window (rwnd) for host A if receiver host B has buffer size = 5000
bytes and 1000 bytes or received unprocessed data
Solution: rwnd = 5000-1000 = 4000 bytes sent to next segment

- Example: Find window size of host A if rwnd = 3000 bytes and cwnd = 3500 bytes
Solution: get the minimum = 3000 bytes

2. Retransmission
- Retransmission timer expires (RTO) starts counting when no ACK is received for that segment
- 3 duplicate ACK segments received
Normal operation very fast transmission that ACK from server sent at the same time
Lost Segment RTO expires; sender unaware of loss and keeps sending data; receiver will detect the loss and
tells sender that it wants to receive the lost segment; when RTO expires, sender will resend lost segment to
receiver
Fast Retransmission 3 duplicate ACK; sender sends too fast that it did not detect a lost; at third ACK, it will
finally retransmit segment lost
J. Oscillada DATCOMM - EK FINALS Reviewer

TCP Segment Format


J. Oscillada DATCOMM - EK FINALS Reviewer

Control Field

C. STREAM CONTROL TRANSMISSION PROTOCOL (SCTP)

- new transport-layer protocol combining some features of UDP and TCP

VII. NETWORK SERVICES AND APPLICATIONS

Application layer provides services to the user; communication via logical connection

A. CLIENT-SERVER NETWORK

-distributed application structure in tasks are partitioned between service providers (server) and the clients
-first packet sent by client (initiator)
-types of server: proxy, web, application, chat, mail, domain, etc
-client conversion to server: possible because clients may be programmed to act as servers and are still connected
through the internet; also, connection or flow of information
is bidirectional
B. WWW AND HTTP

- WWW VS Internet: Internet is a giant network of networks and


WWW is the system we use to access the Internet
HTTP hypertext transfer protocol protocol used by WWW;
command used to fetch the Web page requested by the user
Uniform Resource Locator (URL) a unique identifier of a
webpage that distinguishes itself from other webpages
<protocol>://<server>/<context path>/<type>/<path>

Cookies retains the login credentials of a user; no need to reenter


credentials when opening new tabs or pages

Cache speeds up the accessing of web pages by storing web objects on the user machine

HTTP METHODS

C. FTP FILE TRANSFER PROTOCOL

- transferring files from a server to a client; standard network protocol used for the transfer of computer files from a
server to a client using the Clientserver model on a computer network; may either be data or control
J. Oscillada DATCOMM - EK FINALS Reviewer

Control connection first connection always established in an FTP server; allows client to connect and send commands
to the server; instructs the sending or the transferring of a file

Data communication used by the server to exchange file listings and transfer files; actual data exchange is done

D. EMAIL SYSTEM

SMTP (Simple Mail Transfer Protocol) used when email is delivered from an email client, such as Outlook Express, to
an email server or when email is delivered from one email server to another; uses port 25

POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail; a client/server
protocol in which e-mail is received and held for you by your Internet server; typically uses port 110

ICMP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but
allows the end user to view and manipulate/download the messages as though they were stored locally on the end user's
computing device(s); typically uses port 143

Agents:
1. User agent program allowing the user to receive and send email messages; software that gives information about
what system specifications are used (i.e. Mozilla Thunderbird, Microsoft Outlook, Opera, etc.)
2. Message transfer agent receives, routes, transports, and delivers mail messages using the SMTP protocol in the
client-server network; like an electronic mail deliverer dispersing messages to an electronic mailbox or to another
MTA
3. Message access agent responsible for getting, accessing or the delivery of the email to the local inbox through
POP3 and IMAP4

Architecture of EMAIL

E. REMOTE LOGGING

Two common protocols used:


1. TELNET (terminal network)
- TCP/IP standard for establishing a connection to a remote system
- allows a user to log in to a remote machine across the Internet by first making a TCP connection and then
pass the detail of the application from the user to the remote machine
- virtual terminal protocol used mostly by network administrators to remotely access and manage devices.
Administrator can access the device by telnetting to the IP address or hostname of a remote device
- Disadvantage: all data, including usernames and passwords, is sent in clear text, which is a potential security
risk
2. SSH (secure shell)
- based on UNIX programs; most commonly used in remotely accessing Cisco devices
- uses TCP for communications but is more powerful and flexible than TELNET and allows the user to more
easily execute a single command on a remote client
- advantages over TELNET:
- provides a secure communication by encrypting and authenticating messages (normally requires entry of
private password); relies on public key cryptography for encryption
- provides several additional data transfers over the same connection by multiplexing multiple channels
that are used for remote login
J. Oscillada DATCOMM - EK FINALS Reviewer

- Format:

Remote logging - in a client-server model, it allows a user to establish a session on the remote machine and then run
its applications
- allows the users system to directly send important data or system event information to a central
server dedicated to storing and archiving that data
- advantage scenario: Keeping a remote copy of your systems logs on a centrally located, secure log
server can help you recover more quickly from a system crash or help you analyze a security incident.
In cases of system crashes or when local logs have been altered or lost, log copies are secured and
backed up in the central server for easy retrieval

SSH vs TELNET - when higher security is needed; SSH provides confidentiality of user data even if intruder obtains a
copy of the packets sent over SSH connection
- TELNET is unsecure and mostly only used as a network diagnostics tool

F. DNS DOMAIN NAME SYSTEM

- a hierarchical decentralized naming system for


computers, services, or other resources connected to
the Internet or a private network
Domain - represents the entire set of names / machines that
are contained under an organizational domain name; broken
into zones; For example, all domain names ending with
".com" are part of the "com" domain

Zone - a domain less any sub-domains delegated to other


DNS servers; contains exactly one SOA-record describing the
general properties of the zone, and any number of other
DNS records

Root server server that does not store any domains but delegates the task to other servers

Name resolution - mapping a name to an IP address

DNS clients and resolver used by the client on communicating to the local DNS Server

Iterative solution a DNS client allows the DNS server to return the best answer it can give based on its cache or zone
data. If the queried DNS server does not have an exact match for the queried name, the best possible information it can
return is a referral

Recursive iteration the DNS client requires that the DNS server respond to the client with either the requested resource
record or an error message stating that the record or domain name does not exist. The DNS server cannot just refer the
DNS client to a different DNS server
J. Oscillada DATCOMM - EK FINALS Reviewer

VII. WAN TECHNOLOGIES

A. SONET/SDH

- Synchronous Optical Networking/Synchronous Digital


Hierarchy
- standard for fiber-optic based transmission systems
- synchronous network using synchronous TDM multiplexing
with all system clocks locked to a master (STS multiplexing)
- carry large volume of traffic over long distances using fiber-
optic
SONET/SDH replaced PDH (Plesiochronous Digital Hierarchy) systems for long distance data transfer

ARCHITECTURE
1. SIGNALS
a. STS Synchronous Transport Signals electrical signaling levels
b. OC Optical carriers - corresponding optical signals
c. STM Synchronous Transport Module - a separate standard similar to SDH
2. DEVICES
a. Terminals - Data sources and receivers
b. STS Multiplexer / Demultiplexer - device in charge of transporting the STS signals from the data sources
(e.g. computers)
c. Regenerator - aka repeaters; light signals also experience deterioration therefore they need a way to be
boosted every now and then
d. Add/Drop Multiplexer - can add or drop SPEs from different sources without demultiplexing the whole
frame by relying on bit timing only
3. TERMINALS
a. Sections - optical link connecting two neighboring devices
b. Lines - optical link connecting two multiplexers
c. Paths - optical link connecting two terminals

SONET LAYERS
1. Photonic Layer - corresponds to the physical layer of the OSI model; uses NRZ
encoding
2. Section Layer - responsible for the movement of a signal across a physical section
3. Line Layer - responsible for the movement of a signal across a physical line
4. The path layer - responsible for the movement of a signal from its optical source to
its optical destination

SONET FRAMES
- 125 us duration
- Section Overhead (SOH) - defines and identifies frames, and monitors
section errors and communication between section terminating
equipment
- Line Overhead (LOH) - locates the first octet of SPE and monitors line
errors and communication between terminating equipment;
multiplexing, concatenating, and protection switching
- Path Overhead (POH) - verifies connection, and monitors path errors, receiver status, and communication between
path terminating equipment

SONET NETWORKS
1. Point-to-point network
2. Multipoint network
3. Automatic switching protection
a. Unidirectional path switching
b. Bidirectional path switching
4. Combinational network
J. Oscillada DATCOMM - EK FINALS Reviewer

B. ATM

- Asynchronous Transfer Mode; Layer 2 operation; point-to-point multipoint system


- wide area protocol featuring high data rates and equal-sized packets (cells); ATM is suitable for transferring text, audio,
and video data
- used for both synchronous channel networking and packet-based networking
- uses Asynchronous time-division multiplexing
- No Distance Limitation (Operates Virtually); high speed transmission

ATM adaptation layer (AAL) layer in the ATM protocol that encapsulates the user data
ATM layer - layer in ATM that provides routing, traffic management, switching, and multiplexing services

ATM DEVICES
1. ATM endpoint - contains the ATM network interface adapter (router, switches, CODECs)
2. ATM switch - cell transit through the ATM Network

C. INTERNET OF THINGS

- first used in 1999 by British technology pioneer Kevin Ashton


- to describe a system in which objects in the physical world could be connected to the Internet by sensors

COMMUNICATION MODELS
1. Device-to-device
2. Device-to-cloud
3. Device-to-gateway
4. Back-End Data-sharing

PROTOCOLS
1. 6LowPAN - is an acronym of IPv6 over Low power Wireless Personal Area Networks; adaption layer for IPv6 over
IEEE802.15.4 links; operates only in the 2.4 GHz frequency range with 250 kbps transfer rate
2. IEEE 802.15.4 - basis for the ZigBee,ISA100.11a, WirelessHART, and MiWi specifications
3. CoAP (constrained application protocol) - specialized web transfer protocol for use with constrained nodes and
constrained network
4. MQTT (message queue telemetry transport) - thing or sensor publishes data and server will subscribe to data
5. Other protocols: HTTP, XMPP

D. CLOUD COMPUTING / SAAS / CLOUD STORAGE

- Way for individuals to access digital resources over the internet


- usually has a third party software provided
- IT outsourcing
- Eliminates the need for on-site hardware and software
- delivery of on-demand computing resources offered as a pay to use basis

CLOUD COMPUTING ARCHITECTURE


1. FRONT END
From clients computer; contains the applications required to access the cloud computing system
Different cloud computing services requires different hardware and software requirements
2. BACK END
Contains the various computers, data storages and servers
central server administers the system; follows protocols to ensure server is running smoothly; uses a special
kind of software called middleware; Virtualization happens to reduce the need for more physical machines and
maximizing the output of the individual servers

SOFTWARE AS A SERVER
- Uses the web to deliver applications that is managed by a third party vendor
J. Oscillada DATCOMM - EK FINALS Reviewer

- Some SAAS applications can run directly from the web browser without installations required
- Email collaboration and customer relationship management are the common applications
- Known as on demand software because it does not need traditional software installation and maintenance
- service provider will have the burden for the security and performance

CLOUD STORAGE
- saving data to an off-site storage system maintained by a third party
- Instead of the traditional way of storing of data in hard drives and large storage servers, data are stored in a remote
database; serves as a backup service

E. WPAN AND BLUETOOTH

- Wireless personal area network


- Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones and
notebooks in a small area such as a room; 2.4GHz; adhoc; 10-100m
- Short distance
- Technologies include: IEEE 802.15.1, Infrared, IEEE 802.15.4

ARCHITECTURE
1. Piconet network connection where one device is designated as primary and the rest as secondary; supports up to 7
active slave devices. Other connecting devices are in a parked state
2. Scatternet network connection where a secondary device in a piconet acts as a master in another piconet

F. RFID

- Radio Frequency Identification


- Uses radio waves to read and capture information stored on RFID tag
- Can be read several feet away
- Does not need direct line of sight; Read/Write
- Generic term for technologies that uses radio waves to automatically identify people or objects

IX. NETWORK SECURITY

A. INRODUCTION TO CRYPTOGRAPHY

- Offers: confidentiality, integrity, non-repudiation, authentication


- It is the science and art of transforming messages to make them secure and immune to attack
- From the greek work kryptos Meaning hidden and graphein meaning writing

NETWORK ATTACKS

1. Eavesdropping - occurs when network communication is in a clear text format. Attackers may gain access and interpret
data
2. Data modification - altering the data in the packet
3. Man in the middle attack - third party user actively monitors, captures and controls communication
4. Compromised Key Attack - attackers may obtain key that interpret secured communication

Plaintext - original message


Ciphertext - transformed message
Cipher - encryption and decryption algorithm
Key - is a number of set of numbers that the cipher works on

TYPES OF CRYPTOGRAPHY
1. Symmetric-key cryptography algorithm (secret-key) - a key is shared by the sender and receiver
2. Asymmetric-key cryptography algorithm (public-key) - a public key and private key will be used
J. Oscillada DATCOMM - EK FINALS Reviewer

TRADITIONAL CIPHER
1. Caesar Cipher - monoalphabetic ciphe; shift cipher; used by the romans; each letter is substituted with a certain number
either up or down; the alphabet (3 was the most common number of shifts)
2. Polyalphabetic cipher - One Leon Battista Alberti - Father of western cryptography; using multiple substitution of
alphabets; message will be substituted by other alphabets according to a specific keyword; limiting the use of frequency
analysis to crack the cipher
3. Transposition cipher - Characters location changes; key serves as the map between the position of the symbols in the;
plaintext to the cipher text
4. One Time Pad - Gilbert Vernam in 1918; substitution and transposition cipher; uses a keyword once with the same length
as the message; proved to be unbreakable; encounters practical problems, low message volume

B. VPN

- virtual private network that allows a user to connect to a private network over the Internet securely and privately
- Client-Server technology
- Functions: Authentication, Access Control, Confidentiality, Data Integrity

VPN IMPLEMENTATION
1. Remote access
2. Site-to-site access
a. Intranet
b. Extranet

VPN OPERATION
1. Tunneling Internetwork infrastructure for secure data transfer
Generic name for any system capable of encapsulating data packet
Virtual point-to-point connection via public networks; transports encapsulated datagrams
Uses tunneling protocols: PPTP, L2TP, IPSec, SOCKS
2. Encryption - Protect against passive attacks or external snooping
packet payloads externally visible are encrypted
Ensures data security when traveling through global Internet
Scrambles readable data (plaintext) then unscramble using keys
3. Authentication - Protects against active attack
Ensures that data originates at the source that it claims
Requires digitally signing each packet with a secure hash to prove legitimacy of source and not from a
fake/attacker
Must be done mutually (client and server authenticate each other)
4. Firewall - Uses packet filtering to allow or disallow the flow of specific types of network traffic
IP packet filtering allows admins to define what IP traffic is allowed to cross the firewall
Important when private intranets are connected to public networks for security

TUNNELING PROTOCOLS
1. PPTP Point to Point Tunneling Protocol
- Layer 2 (tunneling) protocol
- one of the most widely used VPN protocol; created by the PPTP forum
- is built on the protocols of PPP (Point-to-Point Protocol)
o Authentication (PAP/CHAP)
o Error Detection (FCS)
- encapsulates PPP frames into IP datagrams for transmission using GRE (Generic Routing Protocol)
- Requires tunnel maintenance with the PPTP Control Connection
2. L2TP Layer 2 Tunneling Protocol
- officially published in 1999.
- combination of Microsofts PPTP and Layer 2 Forwarding (L2F).
- can be used in either voluntary or compulsory tunneling.
- two endpoints of an L2TP tunnel
o LAC (L2TP Access Concentrator)
o LNS (L2TP Network Server)
J. Oscillada DATCOMM - EK FINALS Reviewer

3. IPSec Protocol
- Provides security at the network layer (separate authentication and priva
- secures IP datagrams between any two network-layer entities
- Security Association (SA) - simplex connection established by protocol
- Opportunistic encryption - ideally works without you knowing its there
- PSec examines packets, determine existence of security association with destination, tries to automatically encrypt
and decrypt packets
- Features authentication, integrity, confidentiality
- Can be used for encryption in correlation with L2TP tunneling protocol
- Elements:
o Encapsulating Security Payload (ESP) - provides confidentiality, authentication, integrity
o Authentication Header (AH) - provides authentication and data integrity but does not provide encryption
o Internet Key Exchange (IKE) - provides key management and security association (SA); all devices must share a
common or public key

References:

Catalan, J. (n.d.). Introduction to networking [PDF].


Computer networking concepts. (n.d.). Retrieved from http://mucins.weebly.com/1-data-communication.html
Forouzan, B. A. (2013). Data communications and networking, fifth edition (5th ed.).
University of Pakistan. (n.d.). Data communication cs601 [PDF].
Larmouth, J. (2016). Understanding OSI. Retrieved from https://www.packetizer.com/osi/understandingosi/
Rubens, P., & Schluting, C. (2014, May 28). Networking 101: Understanding BGP Routing. Retrieved from Enterprise Networking
Planet: http://www.enterprisenetworkingplanet.com/netsp/article.php/3615896/Networking-101-Understanding-BGP-
Routing.htm
Skeie, T. (n.d.). Introduction to data communication [PDF]. Retrieved from
http://www.uio.no/studier/emner/matnat/ifi/INF1060/h14/undervisningsmateriale/datacom-01.pdf
Stallings, W. (2014). Data and computer communications (8th ed.).
Thakur, D. (n.d.). Data communication what is data communication. Retrieved February 17, 2017, from
http://ecomputernotes.com/computernetworkingnotes/communication-networks/what-is-data-communication
University of Glasgow. (n.d.). Ethernet frame format. Retrieved February 17, 2017. Retrieved from
http://www.dcs.gla.ac.uk/~lewis/networkpages/m04s03EthernetFrame.htm University of Mumbai. (n.d.). Introduction to
data communications and networking [PDF]. Retrieved from http://archive.mu.ac.in/myweb_test/syllFybscit/dcn.pdf
What is BGP anyway. (n.d.). Retrieved from BGP expert: http://www.bgpexpert.com/what.php

También podría gustarte