Communication and Networks Assignment

 The attached file has all instructions. The deadline is the first of February. Also there are every topic’s presentation. Need 100%.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Diplomain Information Technology

Communications and Networks

Instruction for CA3 Individual Assignment

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

January 2021 Semester

Continual Assessment 3 Individual Assignment (40%)

Task:

The objective of this assignment is to allow students to apply the concepts taught in
class and gain some knowledge on the designing networks. When doing research
beyond lesson materials, students are encouraged to check the validity of the
sources before using it in the assignment.

This assignment will make use of what you have learnt in:

• Lesson 9 Wired Media • Lesson 13 Modulation

• Lesson 10 Wireless Media • Lesson 14 Multiplexing

• Lesson 11 Error Handling • Lesson 15 Interconnection
Technologies

• Lesson 12 Transmission Modes • Lesson 16 Packet and Circuit
Switching

Read the following article on the Digital Solutions about Safe Reopening:
Article (1): https://www.imda.gov.sg/programme-listing/smes-go-digital/Digital-
Solutions-For-Safe-Reopening

DigiSec is an IT consultancy firm that helps education institutions digitalise their
processes and enables remote working. What distinguishes DigiSec from other IT
consultancy firms is that they believe in a combination of cloud and LAN
technologies to enable efficient data communication.

DigiSec has a list of remote working and collaboration tools that institutions can use
to expand their workforce overseas. This is also important for large multi-national
institutions to save on commute cost for their employees.

DigiSec is planning to setup a branch in Singapore and they are aware of the current
state of the virus pandemic that has forced many education institutions to conduct
classes virtually.

To qualify working for DigiSec, you are required to showcase some of your
knowledge in networking. Your task is to write a report to explain some networking
concepts.

Task Instructions
1. Make sure your report is related to DigiSec and Article (1).

2. Please make use of definitions and concepts covered in this module. You are

encouraged to use external sources to further support the concepts but not

replace the definitions.

3. You are required to read the Report Instructions. Failure to do so will result in

deduction of up to 20% of the total marks.

https://www.imda.gov.sg/programme-listing/smes-go-digital/Digital-Solutions-For-Safe-Reopening

https://www.imda.gov.sg/programme-listing/smes-go-digital/Digital-Solutions-For-Safe-Reopening

Question 1
(i) Write a summary, in at least 300 words, for Article (1). In your summary,

describe, with examples, what is online collaboration, virtual meetings, e-
signatures, workforce management and visitor management.

(ii) Many education institutions in Singapore are moving into virtual classroom
solutions. Explain and justify, in at least 100 words, which category of tools
should education institutions be looking into in Article (1).

(iii) Distinguish, in at least 200 words, between serial and parallel transmissions.

Do include diagrams, where possible, to illustrate the differences.

(iv) DigiSec is planning to introduce software and tools to private education

institutions to support remote learning. Recommend and justify, in at least 200
words, whether serial or parallel transmission is more suitable for:

a. High speed transmission
b. Long distance transmission at low cost

Question 2

(i) DigiSec is tasked by one of the education institutions to set up a telephone
system within their campus. Describe, in at least 100 words, the purpose of
modulators and demodulators in such scenario.

(ii) Explain with examples, in at least 200 words, FOUR (4) different types of
multiplexing techniques.

(iii) Distinguish, in at least 100 words, the difference between modulation and

multiplexing.

(iv) Propose and justify in your own words, in at least 200 words, a network
topology and wired/wireless media that DigiSec can recommend to their
clients. Your proposal should include network topology diagram that
supports the following:

1) 100x computers/laptops
2) 10x printer
3) 10x scanner
4) 1x Email server
5) 1x Domain Name Server

Question 3

(i) One of the error checking techniques that DigiSec recommends to their clients
is Hamming Code. Describe and show how the following byte can be coded
using an even Hamming Code.

1010 1001

(ii) Suppose one of the bits is corrupted and the bits received were as followed:
1100 0110 0101

a. Describe and show how a one-bit error can be detected and then
corrected.

b. Describe and give the correct byte that was transmitted.

Report Instructions

Format:

1. The report should have a cover page, content page, write-up on the task,

references, and optional appendices.

2. The cover page should include:

i. Institution name and institution logo of this programme

ii. Module name, term, and year

iii. Date of submission

iv. Student’s name and student ID numbers

3. Each question should start on a separate page and must be answered in paragraph

forms. Bulleted points and tables may only be used to support the answer.

4. The references and citations should be presented in Harvard or APA format and

should have at least THREE (3) references.

Report Word Limit

1,500 to 2,000 words

Report Font and Spacing

Font: Calibri, Black

Font size: 12 and 1 ½ or double spacing.

Penalty Marks for Late Submission

By one day: 20% to be deducted from total marks.

More than one day: submission will NOT be graded.

Plagiarism and Collusion

The submitted report must show evidence that this is students’ own work. ZERO

MARKS will be awarded if there are no workings, reasonable explanations, or

citations. Please be reminded that plagiarism and collusion is a serious offence, and

all cases will be referred to the administration. Grades will be withheld if the submission

is suspected of plagiarism or collusion till investigations are completed.

Important Deadlines
CA3 Written Report Deadline: 15 February 2021, 11.59a.m. Submit the softcopy

of your report via D2L/eGlobal.

Marking Rubric

The marking rubric for the written report can be found in the appendix of this

assignment. Please understand the marking rubric carefully and allocate your time

accordingly.

Lecturer Contact

You should contact your lecturer via your SIM email whenever you have any issue

about your project. You may send your email to: wbkoh001@mymail.sim.edu.sg.

mailto:wbkoh001@mymail.sim.edu.sg

Appendix

S/N Criteria Excellent Very good Good Acceptable Weak

1 Understanding
of the

Assignment
(5%)

Student has interesting,
logical, reasonable, and

non-obvious interpretation
of the assignment

Student has logical,
reasonable, and non-

obvious interpretation of
the assignment

Student has logical
and reasonable

interpretation of the
assignment

Student has logical
interpretation of
the assignment

Student has weak
interpretation of
the assignment

2 Question 1
(40%)

Student has a clear
understanding of the

question requirements
and can describe these

requirements effectively

and appropriately

Student has a clear
understanding of the
question requirements
and can describe these

requirements
appropriately.

Student has
sufficient

understanding of the
question

requirements and
can describe these

requirements
appropriately.

Student has limited
understanding of

the question
requirements and
is able to describe
these requirements

to some extent.

Student has limited
understanding of

the question
requirements but is
unable to describe

these
requirements.

3 Question 2
(30%)

Student has provided
appropriate solutions with

detailed explanation

Student has provided
appropriate solutions

with detailed
explanation to some

extent

Student has provided
appropriate solutions

with sufficient
explanation

Student has
provided solutions

but one of the
solutions is

inappropriate

Student
misunderstood the
question or has not

provided any
solution

4 Question 3
(20%)

Student has provided in-
depth description of their

workings

Student has described
in some detail about

workings

Student has
described the

workings
Student has
described the

workings to some
extent

Student has briefly
described the

workings
performed

6

Referencing
(5%)

Student has used more
than sufficient referencing
and practiced appropriate
referencing and citations

style

Student has used
sufficient referencing

and practiced
appropriate referencing

and citations style

Student has used
some referencing

and practiced
citations style

Student has used
limited referencing

Student has used
less than

satisfactory
amount of
referencing

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 20: TCP and UDP Transport Service

1

Lesson 20 Learning Outcomes
Distinguish between UDP and TCP transport service
Identify the components in a UDP datagram
Explain how TCP handles congestions
Explain TCP three-way handshake
Identify the components in a TCP segment

2

Lesson 20 Outline
UDP Transport Service
TCP Transport Service

3

End-to-End Communication
IP cannot distinguish among multiple application programs running on a given host
Source and destination field identifies a host
Does not contain additional bits to identify an application
Treats a computer as endpoint of communication
Transport-layer protocols are end-to-end protocols
Allows an application to be an endpoint of communication

4

Transport Protocols
Two main transport protocols
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
UDP is easy to understand
End-to-end: distinguish among multiple applications running on a given computer
Connectionless: does not requires connection to be establish before communicating
Message-oriented: sends and receives individual messages

5

UDP as Thin Protocol
UDP is less complex:
Best-effort Delivery: same best-effort delivery semantics as IP
Arbitrary Interaction: allows an application to send/receive to/from many other applications
Operating System Independent: provides means of identifying application programs that does not depend on identifiers used by the local OS
Thus, it is sometimes characterised as thin protocol

6

Message-Oriented
Each requests for UDP to send data places the data in a single message for transmission
Does not divide a message into multiple packets
Does not combine messages for delivery
On the positive side, applications preserve data boundaries as each message remains the same as transmitted
On the negative side, each UDP message must fit into a single IP datagram

7

Best-effort Delivery
Best-effort delivery means messages can be:
lost, duplicated and delivered out-of-order
Consequences for applications:
Must either be immune to the problems or take steps to detect and correct problems

8

UDP Application Limitations
Audio applications can tolerate packet errors
If sender places small amount of audio in each message, loss of a packet produces small gap
Gap will be heard as a pop or click
Online shopping application cannot use UDP
Packet errors can have serious consequences
Duplication of a message can result to duplicate orders or double charging

9

Endpoint Identification
UDP defines protocol port numbers that are independent of the OS
UDP provides mapping between protocol port numbers and program identifiers that OS uses
All computers running UDP recognise standard protocol port numbers, independent of the OS

10

UDP Datagram
Each UDP message is called a user datagram and consists of two parts:
Short header: specifies sending and receiving application
Payload: data being sent
Source: Douglas, C (2016) Computer Networks and Internets

11

Checksum & Encapsulation
UDP header contains 16-bit optional field named UDP checksum (like Internet checksum)
To verify headers
Each UDP datagram is encapsulated in an IP datagram for transmission across the Internet

Source: Douglas, C (2016) Computer Networks and Internets

12

Practice 20.1
What are the THREE (3) guarantees of message delivery of UDP that make it a best-effort protocol?
As a best-effort protocol, what are the applications that are suitable to use UDP and what are those that are unsuitable?

13

Lesson 20 Outline
UDP Transport Service
TCP Transport Service
Flow & Congestion Control
Three-way Handshake
TCP Segment Components

14

Transmission Control Protocol
A programmer assumes that data will arrive correctly, and OS guarantees that data will be delivered reliably
Transmission Control Protocol (TCP) provides reliable transport service
No lost, no duplication, on time and ordered delivery

15

TCP Characteristics
Connection Orientation: an application must first request a connection to a destination
Point-to-Point: each TCP connection has exactly two endpoints
End-to-End: distinguish among multiple applications running on a given computer
Complete Reliability: guarantees that the data sent across a connection will be delivered completely and in order
Full duplex: allows data to flow in either direction

16

TCP Services
Stream Interface: an application sends a continuous sequence of octets
Does not group data into records or messages
Reliable Connection Startup: allows two applications to reliably start communication
Graceful Connection Shutdown: ensures that both sides have agreed to shut down the connection

17

Virtual Connections
Connections in TCP are virtual connections as they are achieved in software
Two machine exchange messages to achieve the illusion of a connection
Uses IP to carry messages which each TCP message is treated as data
TCP software is needed at each end of a virtual connection but not on intermediate routers

18

TCP Illustration
Source: Douglas, C (2016) Computer Networks and Internets

19

Problems to Consider
Ensuring reliability: reliable transport service
End System Reboot: either of the two end systems might crash and reboot
Heterogeneous End Systems: a fast sender can overrun a slow receiver
Congestion in the Internet: intermediate switches and routers can become overrun by traffic

20

Handling Order & Duplicates
To handle duplicates and order, sender attach a sequence number to each packet
Receiver examines the sequence number to determine how the packet should be handled
Either use it to arrange packets in order
Or if the packet has already been delivered, discards the duplicated copy

21

Retransmission for Lost Packets
To handle packet loss, transport protocols use positive acknowledgement (ACK)
Receiver sends ACK message that reports successful reception
Sender starts a timer whenever it sends a packet
If ACK arrives before timer expires, cancels the timer
If timer expires before ACK, sender retransmit and starts timer again

22

Retransmission Illustration
Source: Douglas, C (2016) Computer Networks and Internets

23

Stop-and-go Flow Control
Flow control techniques are employed to handle a fast computer from sending so much data to overrun a slower receiver
Simplest flow control is stop-and-go
Sender waits after transmitting each packet
When receiver is ready, it sends a control message (usually ACK)
But result in extremely low throughput

24

Sliding Window Flow Control
Sliding window is another flow control technique
Window size: maximum amount of data that can be sent before an acknowledgement arrives
Source: Douglas, C (2016) Computer Networks and Internets

25

Flow Control Comparison
Source: Douglas, C (2016) Computer Networks and Internets
Stop-and-go
Sliding Window

26

Congestion
Congestion occurs when a network is unable to allow further packets from flowing through
Resulting in delay
Can cause intermediate network device to run out of memory and begin discarding packets
Retransmission for lost packets will sends more packets into the network
Network can become unusable which can result to congestion collapse

27

Congestion Control
To control congestion:
Network device sends a special message to the source of packets when congestion occurs
Receiver use increased delay or packet loss as estimate of congestion and inform sender
Congestions is mostly result of packet burst
Sudden increased in transmission or retransmission

28

Adaptive Retransmission
Rather than a fixed retransmission timeout, TCP monitors current delay on each connection
Adaptive retransmission: modify retransmission timeout according to network conditions
TCP estimates round-trip delay for each active connection by measuring time it receive a response
If delay is constant, adjusts timeout slightly longer than average round-trip delay
If delay varies, adjusts to a value greater/lower than average to accommodate peaks

29

Adaptive Retransmission Illustration
Source: Douglas, C (2016) Computer Networks and Internets
Congested Network
Less Congested Network

30

Lesson 20 Outline
UDP Transport Service
TCP Transport Service
Flow & Congestion Control
Three-way Handshake
TCP Segment Components

31

TCP 3-way Handshake
Source: https://www.youtube.com/watch?v=n-2YRCMX6Kc

32

Three-Way Handshake
To establish or terminate connections, TCP uses a technique call 3-way handshake
Handshake ensures that TCP will not open or close a connection until both ends have agreed
During the 3-way handshake to start a connection, each side sends a message that specifies
Initial buffer size for flow control and sequence number

33

Handshake Messages
Synchronization (SYN) segment: control message used in a 3-way handshake to create a connection
Finish (FIN) segment: control messages used in a 3-way handshake to close a connection
TCP also requires each end to generate a random 32-bit sequence number that becomes the initial sequence

34

Connection Establishment
Source: Douglas, C (2016) Computer Networks and Internets

35

Reconnection & Termination
If application re-establish a new TCP connection after a computer reboots, TCP will choose a new random number
Probability of selecting a random value that matches the value used previously is low
To close a connection, TCP uses FIN segments
An ACK is sent in each direction along with a FIN to guarantee all data has arrived before the connection is terminated

36

Connection Termination
Source: Douglas, C (2016) Computer Networks and Internets

37

Lesson 20 Outline
UDP Transport Service
TCP Transport Service
Flow & Congestion Control
Three-way Handshake
TCP Segment Components

38

TCP Segment Format
TCP uses a single format for all messages including data messages, ACKs, SYN and FIN
TCP uses the term segment to refer to a message
TCP connection contains two streams of data, one in each direction
Some fields in the segment refer to the data stream traveling in the forward direction
While others refer to data stream traveling in the reverse direction

39

TCP Segment Format Breakdown
Source: Douglas, C (2016) Computer Networks and Internets

40

TCP Segment Fields (1/2)
ACKNOWLEDGEMENT NUMBER: sequence number of the data that is expected next
WINDOW: how much additional buffer space is available beyond ACKed data
SEQUENCE NUMBER: sequence number of the first byte of data being carried in the segment
Receiver uses this to compute an acknowledgement number

41

TCP Segment Fields (2/2)
DESTINATION PORT: identifies which application program on the receiving computer should receive the data
SOURCE PORT: identifies the application program that sent the data
CHECKSUM: checksum that covers the TCP segment header and the data

42

Practice 20.2
How does TCP deals with flow control?

43

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 25, 26

44

End of Lesson

45

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 16: Packet and Circuit Switching

1

Lesson 16 Learning Outcomes
Distinguish circuit and packet switching
Explain the IEEE 802 model and standard
Describe the concept of unicast, broadcast and multicast
Describe the delivery of broadcast and multicast
Explain the purpose of bit and byte stuffing

2

Lesson 16 Outline
Network Topologies
Circuit and Packet Switching
IEEE Standards
Bit and Byte Stuffing

3

Multi-access Network
Multi-access Network: multiple computers to share a medium in such a way that any computer on the LAN can communicate with any other
In general, LAN technologies provide direct connection among communicating entities
However, professionals say that LANs connect computers with the understanding that a device such as a printer can also connect to a multi-access LAN

4

LAN Topologies
Each network is classified into a category according to its topology or general shape
Bus Topology
Ring Topology
Mesh Topology
Star Topology

5

Bus Topology
Bus topology consists of a single cable
Ends of bus network must be terminated to prevent electrical signals from reflecting back
Computers must coordinate to ensure only one computer sends a signal at any time

Source: Douglas, C (2016) Computer Networks and Internets
Advantage Disadvantage
All nodes share access to a common medium Not resilient to failures
Easy to implement
Single cable fault will split the network in two
Adding new node is easy Isolating a fault is difficult

6

Ring Topology
Ring topology: computers are connected closed loop
In practice, cables can run along hallways or rise vertically from one floor of a building to another
Advantage Disadvantage
Resilience to single failure provided data travel around the ring in either direction Harder to implement
Faults are easier to isolate Use more cable
Adding new node is difficult

Source: Douglas, C (2016) Computer Networks and Internets

7

Mesh Topology
Mesh topology: provides a direct connection between each pair of computers
Costly to connect n computers:

Advantage Disadvantage
Relatively easy to manage Expensive if there are large number of nodes
Relatively easy fault isolation Adding new nodes is difficult and expensive
Extremely resilient to multiple failures

Source: Douglas, C (2016) Computer Networks and Internets

8

Star Topology
Star topology: all computers attach to a central point often called a hub
Hub is typically a network device
Source: Douglas, C (2016) Computer Networks and Internets
Advantage Disadvantage
Relatively easy to add new nodes Not particularly resilient to failures especially at hub or central site
Faults are easier to isolate
Easy to manage as network equipment is centralized

9

Practice 16.1
For each of the following, determine a suitable network topology to use:
Resilient against single point of failure
Easy fault isolation
Cost effective

10

Lesson 16 Outline
Network Topologies
Circuit and Packet Switching
IEEE Standards
Bit and Byte Stuffing

11

Packet and Circuit Switching
Source: https://www.youtube.com/watch?v=gB0DCb84T7c

12

Circuit Switching
Circuit switching: a communication mechanism that establishes a dedicated path between sender and receiver when needed
Guarantees isolation from paths used by other pairs of senders and receivers
Usually associated with telephone technology as it provides dedicated connection between telephones

13

Virtual Circuit
Circuit switching networks use electronic devices to establish circuits
Instead of a physical path, multiple circuits are multiplexed over shared media
Resulting to a virtual circuit
Source: Douglas, C (2016) Computer Networks and Internets

14

Properties of Circuit Switching
Point-to-point communication as circuit is formed between exactly two endpoints
Separate steps for circuit creation, use, and termination, which distinguishes switched vs permanent circuit
Performance equivalent to isolated physical path
Communication between two parties is not affected by others
Provide illusion of an isolated path for each pair of communicating entities

15

Steps of Circuit Switching
Three-step process analogous to placing a phone call
Establish a circuit between two parties
Two parties communicate using the circuit
Two parties terminate use of the circuit

16

Packet Switching
Packet switching system uses statistical multiplexing
Multiple sources compete for a shared media

Source: Douglas, C (2016) Computer Networks and Internets

17

Packets
Packet switching system requires a sender to divide each message into smaller blocks of data
Packets: blocks of data
Size of a packet can vary
Each packet switching technology defines a maximum packet size

18

Properties of Packet Switching (1/2)
Asynchronous communication: allows sender with one or more recipients and recipient with one or more senders at any time
No set-up required: can deliver a packet to any destination at any time and no need for initialisation before communicating
No need to notify underlying system when communication terminates

19

Properties of Packet Switching (2/2)
Performance varies due to statistical multiplexing among packets
Multiplexing occurs among packets rather than among bits or bytes

20

Circuit vs Packet Switching
Packet switching incurs lower cost from sharing
To provide communication among N computers:
Circuit-switched network must have a connection for each computer plus at least N/2 independent paths
Packet switching network must have a connection for each computer but only requires one path that is shared

21

Packet Switching Technologies
Least expensive networks use technologies that span a short distance like inside a single building
Most expensive span long distances like across several cities

Source: Douglas, C (2016) Computer Networks and Internets

22

Packet Switching Identification
Each packet sent must contain identification of intended recipient
Senders agree on exact details of how to identify recipient and identification field in a packet
Standard organisations specify these details
IEEE organised Project 802 LAN/MAN Standards Committee to produce standards for networking

23

Practice 16.2
What are the steps to setup, communicate and terminate circuit switching?
Which property of packet switching allows multiple pairs communication to take place? Explain.

24

Lesson 16 Outline
Network Topologies
Circuit and Packet Switching
IEEE Standards
Bit and Byte Stuffing

25

Standard Organisation Focus
IEEE is mostly focus on the lower two layers of the protocol
Other standard organisations focus on other layers of the stack
Source: Douglas, C (2016) Computer Networks and Internets

26

IEEE Data Link Specification
IEEE divides Data Link into two conceptual sublayers
Logical Link Control (LLC): specifies addressing and the use of addresses for demultiplexing
Media Access Control (MAC): specifies how multiple computers share underlying medium
Source: Douglas, C (2016) Computer Networks and Internets

27

IEEE Standards
IEEE assigns multi-part identifier of the form XXX.YYY.ZZZ
XXX: category of standard
YYY: subcategory
ZZZ: reserved for 3rd category
Source: Douglas, C (2016) Computer Networks and Internets

28

IEEE Working Groups
IEEE created many working groups, each intended to standardise one type of network technology
Working group consists of representatives from industrial and academic communities
IEEE allows working group to be active provided the group makes progress and technology is still deemed important
If a working group decides that a technology is no longer relevant, it can decide to disband

29

Packet Addressing
IEEE has created a standard known as Media Access Control (MAC) address or Ethernet address, each consisting of 48 bits
Each packet that travels across the shared medium contains MAC address of specific recipient
Source: Douglas, C (2016) Computer Networks and Internets

30

Demultiplexing Packets
Demultiplexing of packets make use of the MAC address
IEEE allocates a unique address for each piece of interface
Each Network Interface Card (NIC) contains a unique address assigned when the device was manufactured

31

Assigning MAC Address
MAC Address consist of:
3-byte Organisationally Unique ID (OUI) to identify the equipment vendor
3-byte unique values assigned by vendor that identifies a NIC
Source: Douglas, C (2016) Computer Networks and Internets

32

Address Type
IEEE addressing supports three types of addresses that correspond to different types of delivery
Source: Douglas, C (2016) Computer Networks and Internets

33

Unicast, Broadcast & Multicast
IEEE address reserves a bit to distinguish between unicast and multicast but does not provide a way to designate a broadcast address
Broadcast address consists of all 1s
Broadcast is a special form of multicast
Multicast is for specific group of computers
Broadcast includes all computers on the network

34

Broadcast & Multicast Efficiency
In a typical LAN:
Each computer monitors the shared medium
Extracts a copy of each packet
Examines the address in the packet
Determine whether the packet should be processed or ignored
Broadcast and multicast are useful in LANs as they permit efficient delivery to many computers

35

Practice 16.3
What are the TWO (2) components in a MAC address?

36

Lesson 16 Outline
Network Topologies
Circuit and Packet Switching
IEEE Standards
Bit and Byte Stuffing

37

Framing
Framing is the the structure added to a sequence of bits or bytes that allows sender and receiver to agree on exact format of the message
In a packet-switched network, each frame corresponds to a packet that consists of two conceptual parts:
Header: data like address and information used to process the frame
Payload: data being sent

38

Frames
A message is opaque: network only examines the frame header
Payload can contain bytes that are only meaningful to the sender and receiver
Some technologies represent frames by sending a short prelude before frame and short postlude after

Source: Douglas, C (2016) Computer Networks and Internets

39

Frame Example
Assume a packet header is 6 bytes and the payload consists of an arbitrary number of bytes
Can use ASCII characters where
Start Of Header (SOH) character for the beginning
End Of Transmission (EOT) character for the end
Source: Douglas, C (2016) Computer Networks and Internets

40

SOH and EOT Characters
In the ASCII character set:
SOH hexadecimal value is 201
EOT hexadecimal value is 204
If the payload of a frame includes value 201 or 204, can use byte stuffing to allows transmission of without confusion
SOH and EOT cannot appear in the payload

41

Bit and Byte Stuffing
Frame delimiters can be used to distinguish between data and control information
Sender changes a data to replace each control byte with a sequence
Receiver replaces sequence with the original
This is known as byte/data/character stuffing
Bit stuffing: a related technique used with systems that transfer a bit stream

42

Byte Stuffing Example
Byte stuffing reserves a third character to mark occurrences of reserved characters in the data
Sender can replace the special characters with a two-character sequence
An example is using the ESC character:

Source: Douglas, C (2016) Computer Networks and Internets

43

Byte Stuffing on Receiver
Receiver reverses the mapping
Looks for ESC followed by one of A, B, or C
Replace the 2-character combination with either SOT, EOT or ESC
Once byte stuffing has been performed, SOH EOT and ESC will not appear anywhere in the payload during transmission
Only appear after receiver reverse the mapping

44

Byte Stuffing Illustration
(a) is the original message
(b) is the message after byte stuffing
Source: Douglas, C (2016) Computer Networks and Internets

45

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 13

46

End of Lesson

47

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 15: Interconnection Technologies

1

Lesson 15 Learning Outcomes
Explain upstream and downstream
Explain narrowband, broadband and DSL technologies
Describe the characteristics of ADSL and local loops
Explain the evolution of access technologies
Describe SONET

2

Lesson 15 Outline
Broadband and Narrowband
Cable Modem Technologies
Core Technologies

3

Internet Access Technology
Internet access technology: a data communications system that connects an Internet subscriber to an ISP
Most Internet users follow an asymmetric pattern
Subscriber receives more data than sending
Browser sends a URL that comprises a few bytes
Web server can respond with content that are more than a few bytes

4

Downstream and Upstream
Downstream: data traveling from an ISP in the Internet to a subscriber
Upstream: data traveling from a subscriber to an ISP
downstream
upstream
Source: Douglas, C (2016) Computer Networks and Internets

5

Narrowband and Broadband
Technologies are used for Internet access can be divided into two broad categories based on data rate
Narrowband
Broadband
But network bandwidth refers to data rate
Hence, narrowband and broadband are used to reflect industry practice

6

Narrowband Technologies
Narrowband: technologies that deliver data at up to 128 Kbps
Max data rate for dialup phone lines is 56 Kbps and hence classified as narrowband technology
Source: Douglas, C (2016) Computer Networks and Internets

7

ISDN
Integrated Services Digital Network (ISDN) offers three separate digital channels:
B, B, and D (D is a control channel supports 16Kbps)
Usually written 2B + D
The 2 B channels (each 64 Kbps) are intended to carry digitised voice, data, or compressed video
B channels can be combined or bonded to produce single channel with data rate of 128 Kbps

8

Broadband Technologies
Broadband: technologies that offer higher data rates than dialup
Source: Douglas, C (2016) Computer Networks and Internets

9

Local Loop
Local loop: physical connection between a telephone company Central Office (CO) and a subscriber
Consists of twisted pair and dialup call with 4KHz of bandwidth
Subscriber close to CO may be able to handle frequencies above 1MHz
Source: https://networkencyclopedia.com/local-loop/

10

Digital Subscriber Line (DSL)
DSL: one of the main technologies used to provide high-speed communication services over local loop
Source: Douglas, C (2016) Computer Networks and Internets

11

Asymmetric DSL
ADSL most widely deployed variant and most common for residential use
uses FDM to divide bandwidth of the local loop into three regions
one region corresponds to analog phone service, known as Plain Old Telephone Service (POTS)
Source: Douglas, C (2016) Computer Networks and Internets

12

ADSL Properties
Complex: as no two local loops have identical electrical characteristics
Adaptive: when a pair of ADSL modems are powered on, they probe the line between them to find its characteristics
Use techniques that are optimal

13

Discrete Multi Tone Modulation
ADSL uses Discrete Multi Tone modulation (DMT)
Combines frequency division multiplexing and inverse multiplexing techniques
FDM in DMT is implemented by dividing the bandwidth into 286 sub-channels
255 sub-channels for downstream
31 sub-channel for upstream
2 upstream are reserved as control channel for control information

14

Control Channels (1/2)
Each control channel has a separate modem with its own modulated carrier
Carriers are spaced at 4.1325 KHz intervals to keep the signals from interfering with one another
To guarantee that its transmissions do not interfere with analog phone signals
ADSL avoids bandwidth below 26 KHz

15

Control Channels (2/2)
Two ends assess the signal quality at each frequency
Use the quality to select a modulation scheme
If a frequency has a high signal-to-noise ratio
selects a modulation scheme that encodes many bits per baud
If the quality on a given frequency is low
selects a modulation scheme that encodes fewer bits per baud

16

ADSL Data Rate
ADSL can achieve:
8.448 Mbps downstream on short local loops
64 Kbps upstream for control channel
576 Kbps upstream for user data
Adaptation property of ADSL does not guarantee a data rate
Only do as well as line conditions allow

17

ADSL Local Loop Distance
Subscribers far from CO or local loop passes near sources of interference have lower data rates
Subscribers near the CO or local loop does not pass near sources of interference have better data rates
Data rates can vary:
Downstream 32Kbps to 8.448Mbps
Upstream 32Kbps to 640 Kbps

18

ADSL Splitter
Analog phones operate at frequencies below 4KHz
lifting a receiver can generate noise that interferes with DSL signals
ADSL uses an FDM device known as a splitter
Divides bandwidth by passing low frequencies to one output and high frequencies to another
Usually installed at the location where local loop enters a residence or business
Passive: does not require power

19

ADSL Installation
Source: Douglas, C (2016) Computer Networks and Internets

20

DSL-Lite
A variation of ADSL wiring (DSL-lite)
Does not require a splitter to be installed on the incoming line
Subscriber can install DSL by plugging a splitter into a wall jack and plugging a telephone into the splitter

21

Practice 15.1
How are access technologies classified under broadband and narrowband? Give an example of each.
What is the purpose of control channels? What can be done to prevent their signal from interfering with one another?

22

Lesson 15 Outline
Broadband and Narrowband
Cable Modem Technologies
Core Technologies

23

Cable Modem Technologies
Community Antenna TeleVision (CATV): an alternative access technology that uses the wiring already in place for cable television
uses FDM to deliver TV signals over coaxial cable
CATV systems use FDM to deliver many channels
But bandwidth is insufficient to handle FDM scheme that extends a channel to each user
Using a separate channel per subscriber does not scale

24

Cable Modem Data Rate
In theory, cable system can support:
52 Mbps downstream
512 Kbps upstream.
In practice, the data rate can be much less
Data rate only pertains to communication between the local cable office and the subscriber’s site

25

Sharing Bandwidth
Bandwidth of cable system is shared with N subscribers
size is controlled by the cable provider
Effective data rate available to each individual subscriber varies over time
if N subscribers share a single frequency
amount of capacity available to an individual subscriber will be 1/N

26

Cable Modem Installation
Cable modem installation is straightforward
Cable modems attach to the cable wiring directly
FDM hardware in existing cable boxes and cable modems guarantees:
data and entertainment channels will not interfere with one another

27

Hybrid Fiber Coax (HFC)
HFC provides high-speed data communications
Fiber to connect to the central facilities
Coax to connect to individual subscribers
It is hierarchical
Uses fiber for parts that require highest bandwidth
Uses coax for parts that can tolerate lower data rates

28

Trunk and Feeder Circuit
Trunk: the high-capacity connections between the cable office and each neighborhood area
can be up to 24km long
Feeder circuit: the connection to an individual subscriber
Feeder circuits are usually less than 1.6km

29

HFC Illustration
Source: Douglas, C (2016) Computer Networks and Internets

30

Fiber Access Technologies
A variety of technologies employs optical fiber in a hybrid system
or deploy optical fiber all the way to each subscriber
Source: Douglas, C (2016) Computer Networks and Internets

31

Fiber to Curb and Building
Fiber To The Curb (FTTC) uses fiber for high capacity trunks
Idea is to run fiber close to subscriber
Use copper for the feeder circuits
Uses two media in each feeder circuit to provide additional service like voice
Fiber To The Building (FTTB) use fiber to allow high upstream data rates for businesses

32

Fiber to Home and Premises
Fiber To The Home (FTTH) uses fiber to deliver higher downstream for residential subscribers
Emphasis is on many channels of entertainment and video
Fiber To The Premises (FTTP) is a generic term that encompasses both FTTB and FTTH

33

Head-end & Tail-end Modem
Two types of modem based on location:
Head-end modem: modem used at the CO
Cable Modem Termination System (CMTS): set of head-end modems used by cable providers.
Tail-end modem: modem used at the subscriber
Data Over Cable System Interface Specifications (DOCSIS): specifies format of data that can be sent and messages that are used to request services like pay-per-view)

34

Wireless Access Technologies
Imagine a farm or remote village:
telephone wiring to such locations exceeds the max distance for technologies like ADSL
Also unlikely to have cable TV
Local loop may not work on all types of lines
Need wireless access technologies
Source: Douglas, C (2016) Computer Networks and Internets

35

Lesson 15 Outline
Broadband and Narrowband
Cable Modem Technologies
Core Technologies

36

What is a T1 Line?
Source: https://www.youtube.com/watch?v=o5zSxG-Atsc

37

Last Mile Problem
Access technologies handle last mile problem
Last mile: the connection to a typical residential subscriber or a small business
Access technology provides sufficient capacity for a residential subscriber or a small business
Small Office Home Office (SOHO)

38

Core Technologies
Connections among providers and enterprises require substantially more bandwidth
Core: connections at the backbone of Internet
Core technologies: high-speed technologies
Source: Douglas, C (2016) Computer Networks and Internets
Last mile
Core

39

Point-to-Point Digital Circuit
Point-to-point high-capacity digital circuit can be leased from a telephone company
Can be used to transfer data
Monthly fee depends on data rate of the circuit and the distance spanned
Telephone companies have the authority to install wiring that crosses municipal streets
Between two buildings, across a city, from one city to another

40

Leasing a Digital Circuit
Subscribers must follow the rules of telephone system and adhere to standards for transmitting digitised voice
Computer industry and the telephone industry developed independently
Need a hardware interface to work between computer and digital circuit

41

DSU and CSU
Data Service Unit/Channel Service Unit (DSU/CSU): hardware interface for a computer to a digital circuit
Two parts combined into a chassis
CSU handles line termination and diagnostics
DSU handles digital format translation for data
Between format used on circuit and computer

42

CSU Test Facility
A CSU contains a loopback test facility
To transmit a copy of all data that arrives across the circuit back to sender
Excessive 1s can cause excessive current on the cable due to voltage levels
To prevent problems, can use an encoding that guarantees a balance like differential encoding
Or use a technique known as bit stuffing

43

Interface Standard
Interface standard used on the computer depends on rate that circuit operates
If < 56 Kbps, the computer can use RS-232 If > 56 Kbps, use RS-449 or V.35 standards
One additional piece of equipment may be used
Network Interface Unit (NIU) or Smartjack

44

Network Interface Unit
NIU forms a boundary between equipment owned by the telco and equipment provided by subscriber
Telco refers to the boundary as the demarc
Digital circuit needs DSU/CSU at each end
To translate between digital representation used by phone and digital representation used by computer
Digital circuit from a telco follows same transmission standards as digital phone calls

45

Digital Circuit Standards
In US, standards for digital circuits consist of the letter T followed by a number like T1
Many small businesses use a T1 circuit
But T-standards are not universal
Japan adopted a modified version of the T-series standards
Europe uses the letter E

46

Digital Circuit Capacity
Source: Douglas, C (2016) Computer Networks and Internets

47

T-standards Data Rate
Data rates of T standards have been chosen to handle multiple voice calls
Capacity of circuits does not increase linearly with their numbers; T3 is much more than 3x T1
Telcos may lease circuits with lower capacity than those listed in the figure
Known as fractional T1 circuits

48

STS Standards
Telephone companies use trunk to denote a high-capacity circuit,
Synchronous Transport Signal (STS) standards specify the details of high-speed connections
Data rates for STS-24 and above are > 1 Gbps

49

List of STS & OC Standards
Source: Douglas, C (2016) Computer Networks and Internets
STS standards: electrical signals used in the digital circuit interface (i.e., over copper)
Optical Carrier (OC) standards: optical signals that propagate across the fiber

50

Concatenated Circuits
STC and OC allows for an optional suffix of the letter C, which stands for concatenated
denotes a circuit with no inverse multiplexing
OC-3 can consist of 3x OC-1 or single circuit that operates at 155.520 Mbps
Single circuit vs multiple circuits
Generally, single circuit provides more flexibility and eliminates need for inverse multiplexing equipment

51

Digital Transmission Standards
Two major digital transmission standards:
US, Synchronous Optical NETwork (SONET)
Europe Synchronous Digital Hierarchy (SDH)
SONET specifies details like:
How data is framed
How lower-capacity circuits are multiplexed into a high-capacity circuit
How synchronous clock information is sent along with data

52

SONET Frame on STS-1 Circuit
Source: Douglas, C (2016) Computer Networks and Internets

53

Practice 15.2
With cable modem technologies, why is there still a need for core technologies?

54

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 12

55

End of Lesson

56

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 3: Internet Networking

1

Lesson 3 Learning Outcomes
Distinguish between connectionless and connection-oriented communication
Distinguish the role of server and client in a client-server model
Identify the characteristics of a server and client
Understand how multiple clients and servers can be used to work together
Define concurrent servers
Describe the motivation for peer-to-peer interaction on the Internet

2

Lesson 3 Learning Outcomes
Describe what is the purpose of sockets
Identify the key functions of sockets

3

Lesson 3 Outline
Communication Paradigms
Client Server Model
Network Programming

4

Internet Rich Diversity of Services
None of the services is part of underlying communication infrastructure
Internet provides a general-purpose mechanism where:
Individual services are supplied by application programs that run on computers attached to the Internet

5

Programming on the Internet
Possible to create Internet applications without knowing how networks operate
However, understanding network protocols and technologies allows them to write efficient and reliable code
Enables applications to scale across many sites

6

Internet Communication Paradigms
Source: Douglas, C (2016) Computer Networks and Internets
Stream Paradigms Message Paradigms
Connection-oriented Connectionless
1-to-1 communication Many-to-many communication
Sequence of individual bytes Sequence of individual messages
Arbitrary length transfer Each message limited to 64 Kbytes
Used by most applications Used for multimedia applications
Built on TCP protocol Built on UDP protocol

7

Stream Transport
Stream: sequence of bytes flows from one application program to another
Without attaching meaning to the bytes and without inserting boundaries
Two streams between pair of communicating applications, one in each direction
Accepts input from one, delivers to the other
Sending application can choose to generate one byte at a time or can generate blocks of bytes
Network can choose to combine smaller blocks into one large block or divide a large block into smaller blocks

8

Message Transport
Message: the network accepts and delivers messages
Each message delivered corresponds to message transmitted
Never delivers part of a message, nor does it join multiple messages together
Sender places exactly n bytes in outgoing message
Receiver receives n bytes in the incoming message

9

Message Transport Types
Unicast
a message can be sent from an application on one computer directly to an application on another, 1-to-1
Multicast
a message can be multicast to some of the computers on a network, 1-to-many
Broadcast
a message can be broadcast to all computers on a given network, 1-to-all

10

Message Transport Reliability
Message transport is unreliable
Unreliable means no guarantee:
Lost: never delivered
Duplication: more than one copy arrives
Ordered: out-of-order
Programmers must ensure the application operates correctly even if packets are lost or reordered

11

Message vs Stream
Most applications require delivery guarantees
Use stream services
Programmers tend to use stream service except in special situations
E.g. video, where multicast is needed, the application provides support to handle packet reordering and loss

12

Connection-oriented Communication
Stream service is connection-oriented:
Applications must request connection be created
Once established, connection allows applications to send data in either direction
Finally, when communication finishes, the applications request the connection be terminated
Source: Douglas, C (2016) Computer Networks and Internets
Algorithm for Stream Paradigm

13

Practice 3.1
Distinguish between stream and message communication with TWO differences
Describe the THREE steps in a stream paradigm communication algorithm

14

Lesson 3 Outline
Communication Paradigms
Client Server Model
Network Programming

15

Client-server Model
16
How can a pair of applications that run on two independent computers coordinate to guarantee that they request a connection at the same time?
The answer lies in a form of interaction known as the client-server model
A server starts first and awaits contact
A client starts second and initiates the connection
Application programs known as clients and servers handle all services in the Internet

16

Client-Server Differences
Source: Douglas, C (2016) Computer Networks and Internets
Server Application Client Application
Starts first Starts second
Does not need to know which client will contact it Must know which server to contact
Waits passively and arbitrarily long for contact from a client Initiates a contact whenever communication is needed
Communicates with a client by both sending and receiving data Communicates with a sever by sending and receiving data
Stays running after servicing one client and waits for another May terminate after interacting with a server

17

Characteristics of Client Software
A client software:
Invoked directly by a user, executes only for one session
Runs locally on a user’s personal computer
Actively initiates contact with a server
Can access multiple services as needed, but usually contacts one remote server at a time
Does not require especially powerful computer hardware

18

Characteristics of Server Software
A server software:
A special-purpose, privileged program
Dedicated to providing one service that can handle multiple remote clients at the same time
Is invoked automatically when a system boots, and continues to execute through many sessions
Runs on a large, powerful computer
Waits passively for contact from arbitrary remote clients
Accepts contact from arbitrary clients, but offers a single service
Requires powerful hardware and a sophisticated OS

19

Server Programs & Server-class Computers
Server: a program that waits passively for communication
Not to the computer on which it executes
When a computer is running server program(s), it is sometimes called a server
Hardware vendors contribute to the confusion as they classify powerful machines as servers

20

Server Programs and Server-class Computers
Source: Douglas, C (2016) Computer Networks and Internets

21

Requests & Response
Once contact is established, two-way communication is possible
From a client to a server
From a server to a client
A client can send a series of requests
The server issues a series of responses
A database client might allow a user to look up more than one item at a time

22

One Computer, Multiple Servers
A computer that operate multiple servers is useful
Hardware can be shared
Has lower system administration overhead than multiple computer systems
Demand for a server is often sporadic:
Server can remain idle for long periods of time and does not use the CPU while waiting for a request to arrive
If demand is low, consolidating servers can reduce cost without reducing performance

23

Multiple Clients & Servers
A computer can run:
A single client
A single server
Multiple copies of a client that contact a given server
Multiple clients that each contact a server
Multiple servers, each for a service

24

Multiple Clients Benefits
A computer with multiple clients is useful as services can be accessed simultaneously
For example, a user can have three (3) windows open simultaneously running three (3) applications:
Email
Chat service
Web browser

25

Server Identification
Internet protocols divide identification to 2 pieces:
Identifier for the computer on which a server runs
Identifier for a service on the computer
Each computer in the Internet is assigned a unique 32-bit identifier known as an Internet Protocol (IP) address
192.168.1.0
It is an Internet layer address

26

DNS for Server Identification
A client must specify the server’s IP address
To make server identification easy, each computer is assigned a name and the Domain Name System (DNS)
Thus, a user specifies a name such as www.cisco.com rather than an integer address

27

Server Demultiplexing
Each service available in the Internet is assigned a unique 16-bit identifier known as port number
Email: 25, HTTP: 80
It is a Transport layer address
When a server begins, it registers with OS by specifying the port number for its service
A client contacts a server to request service
the request contains a port number
A request arrives at a server
software uses port number to determine which application on the server will handle request

28

Server Identification & Demultiplexing
Source: Douglas, C (2016) Computer Networks and Internets

29

Server Circular Dependencies
Circular dependencies: a server for one service can act as client for another
Before it can fill in a web page, a web server may need to become a client of a database
A server may also become the client of a security service to verify a client is allowed access to the service
Database
Server
Web Page Server
User
Client of
Client of

30

Concurrent Servers
Most servers are concurrent
A server uses more than one thread of control
Concurrent execution depends on the OS being used and the code is divided into 2 pieces
Main program (thread)
Handler
Main thread accepts contact from client and creates a thread of control for the client
Each thread of control interacts with a single client and runs the handler code

31

Running Concurrent Servers
After handling one client the thread terminates
Main thread keeps server alive after creating a thread to handle a request
If N clients are simultaneously using a concurrent server, N+1 threads will be running:
N threads for each client
+1 main thread to wait for additional requests
Main Thread
User
User
Web Page Server
Handler 1
Handler 2

32

Server Bottlenecks
If a single server provides a given service
the network connection between the server and the Internet can become a bottleneck
User
Internet
Server
User
User
Bottleneck

33

Peer-to-Peer Interactions
One way to avoid a bottleneck forms the basis of file sharing known as a peer-to-peer (P2P) architecture
Data is distributed equally among a set of N servers
Each request is sent to the appropriate server
Each server only provides 1/N of the data
User
Internet
Server 1 of N
User
1/N traffic
Server 2 of N

34

Practice 3.2
Describe TWO identification methods that Internet Protocols uses to identify servers
Explain what is server circular dependencies and bottleneck.

35

Lesson 3 Outline
Communication Paradigms
Client Server Model
Network Programming

36

What is an API?
Source: https://www.youtube.com/watch?v=s7wmiS2mSXY

37

Socket API
Application Program Interface (API): interface that an application uses to specify communication
Details of an API depend on the OS
de facto standard for software that communicates over the Internet is the socket API
commonly abbreviated sockets
Socket API is available for many OS
Windows, various UNIX, Linux

38

Sockets & Descriptors
Originally developed as part of UNIX OS, the socket API is integrated with I/O
When an application creates a socket, OS returns a small integer descriptor that identifies the socket
Application passes the descriptor as an argument
when it calls functions to perform an operation on the socket such as to transfer data across the network or to receive data

39

Network I/O
In many OS, socket descriptors are integrated with other I/O descriptors

An application can use the read and write operations for socket I/O or I/O to a file

40

Socket Functions
In socket programming an application must specify many details, such as
address, port number, whether the application will act as a client or as a server
To avoid having a single socket function with many parameters, designers of the socket API chose to define many functions
An application creates a socket, and then invokes functions for details

41

Pros & Cons of Socket Approach
Advantage of socket approach is that most functions have three or fewer parameters
Disadvantage is that a programmer must remember to call multiple functions when using sockets

42

Major Functions in Socket API
Source: Douglas, C (2016) Computer Networks and Internets

43

Socket Calls in a Client and Server
This illustrates the sequence of socket calls made by a typical client and server that use a stream connection
In some applications, send and recv are called in the reverse order
Source: Douglas, C (2016) Computer Networks and Internets

44

Client Connection Functions
Clients call connect to establish a connection with a specific server
connect (socket, saddress, saddresslen)
Argument socket is the descriptor of a socket to use for the connection

45

Sockets in Message Paradigm
Socket functions used to send and receive messages are more complicated than stream paradigm because many options are available
A sender can choose whether to store the recipient’s address in the socket and merely send data or to specify the recipient’s address each time a message is transmitted
One function allows a sender to place the address and message in a structure and pass the address of the structure as an argument, and another function allows a sender to pass the address and message as separate arguments

46

Practice 3.3
What is an Application Program Interface (API)?
Discuss one advantage and one disadvantage of using sockets.

47

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 3

48

End of Lesson

49

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 11: Error Handling

1

Lesson 11 Learning Outcomes
Describe the main sources of transmission errors
Understand the effects of transmission errors on data
Describe two strategies to handle channel errors
Describe block error codes and convolutional error codes

2

Lesson 11 Learning Outcomes
Describe single parity checking
Calculate Hamming distance between pair of words
Understand the error checks used on the Internet

3

Lesson 11 Outline
Transmission Errors
Channel Coding

4

Data Communication Issues
Data communications systems are prone to errors
Some are inherent in the physics of the universe
Some from devices that fail
Some from equipment that does not meet the engineering standards
Small errors that occur during transmission are more difficult to detect than complete failures
Need mechanisms to control and recover

5

Transmission Errors (1/2)
Interference: electromagnetic radiation emitted from devices like electric motors
Background cosmic radiation
Cause noise that can disturb radio transmissions and signals traveling across wires
Attenuation: signal loss over distance
signals on wired media become weaker over long distances
radio signal becomes weaker with distance

6

Transmission Errors (2/2)
Distortion: all physical systems distort signals
As pulse travels along fiber, it disperses
Capacitance and inductance: block signals at some frequencies while admitting signals at other frequencies
Placing wire near metal object can change the frequencies that can pass through wire
Metal objects can block some frequencies of radio waves, while passing others

7

Reducing Errors
Shannon’s Theorem suggests to increase SNR:
Either increase signal or lower noise if possible
Mechanisms like shielded wiring can help lower noise
Physical transmission system is always prone to errors
May not be possible to change the SNR

8

Error Handling
Noise/interference cannot be eliminated completely
Many errors can be detected
Some can be corrected automatically
But Error detection adds overhead
Error handling is a tradeoff
To decide whether a given error is likely to occur
If so, what is the consequence

9

Types of Errors
Spike: extremely short duration interference,
often the cause of a single bit error
Longer duration interference or distortion can produce burst errors
Sometimes signal is neither clearly 1 nor clearly 0, but falls in an ambiguous region, which is known as an erasure

10

Types of Errors Summary
Source: Douglas, C (2016) Computer Networks and Internets

11

Burst Error
For a burst error:
Burst size/length: number of bits from the start of the corruption to the end of the corruption
Source: Douglas, C (2016) Computer Networks and Internets

12

Lesson 11 Outline
Transmission Errors
Channel Coding
Parity Checking
Hamming Distance and Hamming Code
Row and Column Parity (RAC)
Internet Checksum

13

Error Correction History
Source: https://www.youtube.com/watch?v=q-3BctoUpHE

14

Channel Coding
Number of mathematical techniques have been developed to overcome errors
Known collectively as channel coding
These techniques are
Forward Error Correction (FEC)
Automatic Repeat reQuest (ARQ)

15

Automatic Repeat Request
ARQ requires cooperation of sender and receiver
Receiver needs to send a short acknowledgement (ACK) message back
If A sends message to B, B sends ACK back to A
Once receives ACK, A knows that the message arrived correctly
If no ACK is received after T time, A assumes the message was lost and retransmits a copy

16

ARQ Limitations
Useful with detecting errors but not for error correction
For error correction, most use Cyclic Redundancy Check (CRC)
ARQ scheme can be added to guarantee delivery if a transmission error occurs
Receiver discards message if an error occurs
Sender retransmits another copy

17

Forward Error Correction
FEC adds additional information to data to allow receiver to verify data arrives correctly (detection)
Tries to correct errors if possible
FEC mechanisms allow receivers to determine
Which bits have been changed
How to compute correct values

18

Visualising FEC
Source: Douglas, C (2016) Computer Networks and Internets

19

Block Error Codes
Block Error Codes is a type of FEC
Divides data sent into set of blocks
Attach information known as redundancy to each block
Encoding for a given block of bits depends on the bits themselves, not on bits sent earlier
Memoryless: does not carry state information from one block of data to the next

20

Convolutional Error Codes
Convolutional Error Codes is also a type of FEC
Treats data as a series of bits
Computes a code over a continuous series
Code computed for a set of bits depends on current input and some of the previous bits in the stream
Codes with memory

21

Single Parity Checking
Single Parity Checking (SPC): a type of block error codes
SPC can define a block to be 8-bit (byte) of data
Sender and receiver must be configured for either even parity or odd parity
On sender, an encoder adds an extra bit, parity bit
Total bits: 9-bit (8-bit data, 1-bit parity)
Receiver uses parity bit to check whether bits in the byte are correct

22

SPC Example
Source: Douglas, C (2016) Computer Networks and Internets
What is the limitation?

23

Practice 11.1
Complete the table below
Original Data Even Parity Odd Parity
0011 1100
1111 1100
0101 0101
1100 0011
1010 1100
0011 0111
1111 1111

24

SPC Limitation
SPC can detect errors but cannot correct errors
Even parity fails if odd number of bits changed
Odd parity fails if even number of bits changed
Consider even parity example:
If one-bit changed value, receiver will declare incoming byte is invalid
If two, four, six, or eight bits changed value, receiver will incorrectly declare valid

25

Lesson 11 Outline
Transmission Errors
Channel Coding
Parity Checking
Hamming Distance and Hamming Code
Row and Column Parity (RAC)
Internet Checksum

26

Some Definitions
Datawords: set of all possible messages
Codewords: set of all possible encoded versions
Codebook: subset of the possible combinations that are valid codewords

27

Hamming Distance
Engineers use a measure known as the Hamming distance
named after a theorist at Bell Laboratories who was a pioneer in the field of information theory and channel coding
Given two strings of n-bit each, Hamming distance is defined as the number of differences
Number of bits to change for one string to be identical to another

28

Hamming Distance Example
Source: Douglas, C (2016) Computer Networks and Internets

29

Computing Hamming Distance
Straight forward way is manual observation
Another way is:
Perform exclusive or (XOR) between two strings
Counting number of 1 bits in the answer

Input 1 Input 2 Output
0 0 0
0 1 1
1 0 1
1 1 0

XOR Function
String 1: 1 1 0
String 2: 0 1 1
1 0 1

Total number of 1s = 2
Hence, Hamming distance = 2

30

Hamming Distance for Codebook
Errors can transform a valid codeword into another valid codeword
To measure such transformations, compute the Hamming distance
between all pairs of codewords in a codebook
Source: Douglas, C (2016) Computer Networks and Internets

31

Minimum Hamming Distance
Minimum Hamming distance (dmin): lowest Hamming distance among pairs in a codebook
Number of bits that cause a transformation from one valid codeword to another valid codeword
In this example, dmin = 2
Source: Douglas, C (2016) Computer Networks and Internets

32

Hamming Distance Implication
Implication of dmin = 2:
There is at least one valid codeword that can be transformed into another valid codeword,
If 2-bit errors occur during transmission
A large value of dmin is desirable
if < dmin bits are changed, the code can detect that error(s) occurred 33 Bit Error Detection Maximum number of bit errors that can be detected: e = dmin – 1 Code with higher dmin sends more redundant information 34 Hamming Code Hamming code uses multiple parity bits within a code Each parity bit checks a unique combination of bits Parity bit appears in bit positions that are powers of 2 i.e. bits 1, 2, 4, 8 Remaining bit positions are occupied by bits that are to be checked 35 Hamming Code Parity Checks This table shows the bits check by each parity bits b1: checks all the odd bits b2: checks b2, b3, b6, b7, b10, b11 b4: checks b4, b5, b6, b7, b12 b8: checks b8, b9, b10, b11, b12 Binary code for bit number at top of each column can be obtained by reading all the bits in that column from bottom up 20 = 1 21 + 23 = 10 36 Hamming Example (1/3) Code 0110 1110 in even Hamming code Step 1: Place bits from this byte in first row of a table headed with bit numbers in reverse order, leaving spaces for parity bits Step 2: In b1 row, place all the bits that are checked by b1 Step 3: Calculate value of b1 which give even parity and write in b1 column (use hamming code parity table) Step 4: Repeat Step 2 and 3 for b2 in b2 row, b3 in b4 row and b8 in b8 row 37 Hamming Example (2/3) Step 1: Place bits from this byte in first row of a table headed with bit numbers in reverse order, leaving spaces for parity bits Step 2: In b1 row, place all the bits that are checked by b1 Step 3: Calculate b1 and write in b1 (using Hamming parity table) Step 4: Repeat Step 2 and 3 for b2 in b2 row, b3 in b4 row and b8 in b8 row 38 Hamming Example (3/3) With the parity bits calculated, even Hamming code is as follows 0110 0111 1001 As such, 0110 0111 1001 is transmitted 39 Hamming Example Error (1/2) Original: 0110 0111 1001 Error: 0110 0011 1001 Assuming the error byte is received Step 1: Enter the error byte in the first row Step 2: Check parity calculation for b1, b2, b4 and b8 Step 3: If total parity is odd, underline parity bit and place a 1, which is what is needed to ensure even parity, in the “fix” column and a 0 otherwise 40 Hamming Example Error (2/2) Error occurs in parity bit 1, 2 and 4 but not 8 b7 is the only one check by bit 1,2 and 4 Shows that b7 is the one corrupted Interesting fact is reading the bits in fix column upwards gives the decimal number 7, confirming that error is in b7 i.e. 01112 = 710 Correct the 7th bit to get the original byte 0110 1110 41 Practice 11.2 Code 1101 1010 in even Hamming code 42 Hamming Code Implication Hamming codes is a useful FEC technique But overhead is 50% for 8-bit characters Redundant data transmitted However, there is a potential saving in terms of reduced re-transmissions 43 Lesson 11 Outline Transmission Errors Channel Coding Parity Checking Hamming Distance and Hamming Code Row and Column Parity (RAC) Internet Checksum 44 Row and Column Parity (RAC) Imagine an array of 3-rows and 4-columns Row and Column (RAC) code: parity bit added to each row and column Source: Douglas, C (2016) Computer Networks and Internets 45 RAC Error Detection On the receiver, bits are arranged into an array and parity bits are recalculated If single bit error, two of the calculations will disagree with the parity bits received Source: Douglas, C (2016) Computer Networks and Internets 46 Practice 11.3 Assuming even parity, identify the error bit in the following array. 1 0 1 1 0 1 1 0 1 1 0 1 0 0 1 0 0 0 0 0 1 1 0 0 47 RAC Uses and Limitations Two disagreements correspond to the row and column position of the error Receiver uses calculated parity bits to determine exactly which bit is in error and corrects the bit RAC can only correct single-bit errors In cases where two or three bits are changed RAC encoding will be able to detect an odd number of errors 48 Lesson 11 Outline Transmission Errors Channel Coding Parity Checking Hamming Distance and Hamming Code Row and Column Parity (RAC) Internet Checksum 49 Internet Checksum Internet checksum is a coding scheme on the Internet Code consists of 16-bit 1s complement checksum The Internet checksum does not impose a fixed size on a dataword Allows a message to be of any length Computes a checksum over the entire message 50 Padding the Message Internet checksum treats data in a message as a series of 16-bit integers Source: Douglas, C (2016) Computer Networks and Internets 51 Computing Internet Checksum Sender adds the numeric values of the 16-bit integers, transmits the result Checksum computed in 1s complement arithmetic Uses 16-bit integers instead of 32 or 64-bit To validate the message, a receiver performs the same computation 52 Internet Checksum Example On the receiver: If sum is all 1’s, no error If sum has a 0 somewhere, error has occurred 53 Getting the Checksum (1/2) 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 1 1 0 1 1 0 1 0 0 1 0 0 1 1 1 1 0 1 0 1 1 1 1 0 1 0 1 1 1 1 1 0 0 0 0 1 1 1 0 0 1 0 0 0 0 0 Step 1: Perform binary addition Step 2: Bring the leftmost carry to rightmost 1 0 0 0 0 1 1 1 0 0 1 0 0 0 0 0 1 1 0 0 0 0 1 1 1 0 0 1 0 0 0 0 1 54 Getting the Checksum (2/2) Getting the Checksum Original 1 0 0 0 0 1 1 1 0 0 1 0 0 0 0 1 Complement 0 1 1 1 1 0 0 0 1 1 0 1 1 1 1 0 Step 3: One complement Checksum: 0111 1000 1101 1110 55 Detecting Errors (1/2) Valid 1st word: 1001 1011 0100 1001 Valid 2nd word: 1110 1011 1101 0111 1st word corrupted 3rd bit from right: 1001 1011 0100 1101 Checksum: 0111 1000 1101 1110 11 11 1 11 11 1 11 1 1 1 0 0 1 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 0 1 1 1 1 0 1 0 1 1 1 0 1 1 1 1 0 0 0 1 1 0 1 1 1 1 0 10 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 Step 1: Perform binary addition with checksum 56 Detecting Errors (2/2) Step 2: Spot the error bit Error bit 11 11 1 11 11 1 11 1 1 1 0 0 1 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 0 1 1 1 1 0 1 0 1 1 1 0 1 1 1 1 0 0 0 1 1 0 1 1 1 1 0 10 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 Valid 1st word: 1001 1011 0100 1001 Valid 2nd word: 1110 1011 1101 0111 1st word corrupted 3rd bit from right: 1001 1011 0100 1101 Checksum: 0111 1000 1101 1110 57 Practice 11.4 Calculate the Internet checksum for: 10101100 10010101 00100100 11100100 58 Reading Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 8 59 End of Lesson 60

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 17: Ethernet

1

Lesson 17 Learning Outcomes
Describe the different channelized, controlled access and random access protocols
Identify the frame format used in Ethernet
Describe the evolution of Ethernet
Describe the hardware used on the Ethernet

2

Lesson 17 Outline
Multi-access Protocols
Ethernet Standards
Ethernet Wiring

3

Multi-Access Protocols
Channelized access: like multiplexing
Controlled access: need to grant access
Random access: computer’s own judgement
Source: Douglas, C (2016) Computer Networks and Internets

4

Channelized Access
Channelization: mapping between a given communication and channel in underlying system
1-to-1 or static channel allocation: works well when communicating entities does not change
Dynamic channel allocation: needed where communicating entities varies
E.g. cellular telephony
Source: Douglas, C (2016) Computer Networks and Internets

5

Controlled Access
Controlled access is a distributed version of statistical multiplexing
Source: Douglas, C (2016) Computer Networks and Internets

6

Controlled Access: Polling
Polling: centralised controller that cycles through stations on the network and gives each an opportunity to transmit a packet
Round robin order: transmit on rotation basis
Each station equal opportunity to transmit
Priority order: based on highest priority
Priority stations more opportunity to send
Example: IP phone higher priority than PC

7

Controlled Access: Reservation
Reservation: employs a two-step process which each round of transmissions is planned in advanced
Step 1: each sender specifies whether they have packets to send and controller broadcast a transmission schedule
Step 2: stations use the schedule to transmit
Variation: an alternate channel to gather reservations for next round and main channel for current round of transmission

8

Controlled Access: Token Passing
Token passing: a special control message (token) circulate the network continuously
Computers who want to transmit must capture the token
Ring topology: order of circulation is defined, clockwise or anti-clockwise
Bus topology: each station is assigned a position in a logical sequence and the token is passed according to the assigned sequence

9

Random Access Protocols
Computers attempt to access the shared medium without coordination
Random: access only given when station has packet to send
Prevent all computers from using a medium at the same time
Source: Douglas, C (2016) Computer Networks and Internets

10

ALOHAnet
ALOHAnet: an early network in Hawaii that pioneered the concept of random access
no longer used, but ideas have been extended
ALOHAnet consist of a powerful transmitter in a central geographic location
Surrounded by a set of stations/computer
Stations can reach the central transmitter but not able to reach all the other stations

11

ALOHAnet Illustration
ALOHAnet used two carrier frequencies for broadcasting:
Outbound: central transmitter to all stations
Inbound: stations to the central transmitter
Source: Douglas, C (2016) Computer Networks and Internets

12

ALOHA Protocol
When a station has a packet to send, it transmits the packet on inbound frequency
Central transmitter repeats the transmission on the outbound frequency
To ensure transmission is successful, sender listens to outbound channel
Copy arrives: sender moves to next packet
No copy arrives: sender waits and try again

13

Transmission Collision
Interference can occur if two stations transmit simultaneously
Collision occurs when two signals interfere and becomes will be garbled
OR two transmitted packets collide
The protocol handles a collision by requiring sender to retransmit each lost packet

14

Handling Collisions in Ethernet
In 1978, Ethernet was created by Digital Equipment Corporation, Intel, and Xerox
Uses shared wired medium (cable) instead of broadcasting through the atmosphere
Ethernet uses 3 mechanisms to handle collisions:
Carrier sense
Collision detection
Binary exponential backoff

15

Carrier Sense
Carrier sense: each station monitor cable to detect if another transmission is in progress
Prevents most collision problems and improves network utilisation
Limitation: collision occurs if two stations finds cable idle, both transmit
Some time is required for signal to travel down the cable, a station may not know instantly when another station begins to transmit

16

Collision Detection
Collision detection: if signal on cable differs from signal that is transmitted, collision has occurred
If collision occurs, sender aborts transmission
Many details complicate Ethernet transmission
Following a transmission, stations must wait for an interpacket gap (9.6s for 10 Mbps Ethernet) to ensure that all stations sense an idle network and have a chance to transmit

17

Backoff Mechanism
Backoff: after a collision, sender must wait for cable to be idle before transmitting
Specifies max delay d, and a random delay less than d after collision
Randomisation is used to avoid multiple stations transmit simultaneously when cable is idle
If two or more sender choose nearly same amount of delay, there’s risk of second collision
Source: Bing, licensed under CC BY-NC-ND

18

Binary Exponential Concept
Binary exponential: doubling the range of the random delay
To avoid a sequence of collisions each computer will double range of delay after each collision
Random delay 0 – d, 0 – 2d, 0 – 4d etc.
After few collisions, range becomes large, lowers risks of choosing similar delay values

19

CSMA/CD
Binary exponential backoff doubles range of the random delay for transmission after each collision
Allows Ethernet to recover quickly after collision
Guarantees reduced contention
Carrier Sense Multi-Access with Collision Detection (CSMA/CD) combines all techniques
Carrier Sense, Collision Detection and Binary Exponential backoff

20

CSMA/CD Limitations
CSMA/CD does not work as well in wireless LANs (WLAN) as transmitter in WLAN has limited range
A receiver > δ distance away from transmitter will not receive signal and cannot detect carrier

Source: Douglas, C (2016) Computer Networks and Internets

21

Hidden Station Problem
Hidden station problem: some stations are not visible to others in a WLAN (> δ distance away)
WLAN use a modified access protocol CSMA with Collision Avoidance (CSMA/CA)
CSMA/CA triggers a brief transmission from the intended receiver before transmitting a packet

22

CSMA/CA
When both sender and receiver transmit a message, all computers within range of either will know a packet transmission is starting

Source: Douglas, C (2016) Computer Networks and Internets

23

CSMA/CA Steps
Comp3 sends a short message to announce it is ready to transmit a packet to Comp2
Computers in range of Comp3 receive this
Comp2 responds by sending a short message announcing it is ready to receive the packet
Computers in range of Comp2 receive this
Comp1 knows a packet transmission is taking place, even though it cannot receive the signal or sense a carrier

24

CSMA/CA Collision
Collisions of control messages can occur in CSMA/CA, but can be handled easily
If Comp1 and Comp3 each transmit a packet to Comp2 at the same time, their control messages will collide
When collision occurs, both senders apply random backoff before retransmission
Control messages are smaller than a packet, probability of second collision is low

25

Automotive Ethernet
Source: https://www.youtube.com/watch?v=BW57JpmZEcc

26

Practice 17.1
Explain why, for CSMA approaches, slower computers might not get an opportunity to transmit.
What is an alternative multi-access protocol for such cases?

27

Lesson 17 Outline
Multi-access Protocols
Ethernet Standards
Ethernet Wiring

28

Ethernet Compatibility
Ethernet versions are backward compatible
New version can automatically adapt to accommodate the older technology
Ethernet are also compatible with newer versions
Ethernet frame format has remained constant since it was created in 1970

29

Ethernet Frame Format
Frame format: the way a packet is organised
including details like size and meaning of individual fields
Ethernet frame consists of a fixed-length header, a variable-length payload, and a fixed-length CRC

Source: Douglas, C (2016) Computer Networks and Internets

30

Ethernet Multiplexing
Type field in Ethernet frame allows a computer run multiple protocols operating simultaneously e.g.:
hexadecimal 0800 (IP datagrams) & 0806 (ARP messages)
Receiver will use the type field to determine which software module should process the frame
Source: Douglas, C (2016) Computer Networks and Internets

31

Ethernet 802.3
IEEE developed standard for Ethernet 802.3 in 1983 which interprets the original type field as a packet length
But also adds 8-byte header that is known as a Logical Link Control / Sub-Network Attachment Point (LLC/SNAP)
Source: Douglas, C (2016) Computer Networks and Internets

32

Ethernet 802.3 Frame Size
Overall frame size in 802.3 Ethernet remains same at 1514 bytes
Payload is reduced from 1500 to 1492 bytes with 8 bytes SNAP header
To keep the two versions of Ethernet compatible, a convention is used: 
If bytes 13-14 of a frame contain a numeric value less than 1500, the field is interpreted as packet length and 802.3 standard applies

33

Practice 17.2
How does Ethernet achieve multiplexing?
What field does it examine to determine which software program should process the frame?

34

Lesson 17 Outline
Multi-access Protocols
Ethernet Standards
Ethernet Wiring

35

Ethernet Wiring
Original Ethernet wiring scheme was informally called thick wire Ethernet or Thicknet (10Base5)
Consisted of heavy coaxial cable
Hardware used with Thicknet is divided into two:
Network Interface Card (NIC) to handle digital aspects of communication
Transceiver to handles carrier detection and conversion between digital and analog data

36

Thicknet Wiring
A physical cable, Attachment Unit Interface (AUI) is connects a transceiver to a NIC
Transceiver is usually separated from a computer
In an office building, transceivers might attach to an Ethernet in a hallway ceiling
Source: Douglas, C (2016) Computer Networks and Internets

37

2nd Generation Ethernet Wiring
Thicknet evolves to Thinwire Ethernet or Thinnet (10Base2) that use a thinner coaxial cable
Integrates transceiver directly on NIC and runs a coaxial cable from one computer to another
Source: Douglas, C (2016) Computer Networks and Internets

38

Thinnet Benefits & Issue
Benefits:
Lower overall cost and ease of installation
No external transceivers were needed
Can be installed in a convenient path
Issue:
Entire network is vulnerable if user unplugged a segment of the network, the entire network would stop working

39

3rd Generation Ethernet Wiring
Instead of coax, it use a central electronic device (Hub) separate from the computers attached to the network and uses twisted pair
Informally known as twisted pair Ethernet
Hubs are available in a variety of sizes with cost proportional to size
Source: Douglas, C (2016) Computer Networks and Internets

40

Ethernet Wiring Emulation
A hub emulates a physical cable that makes entire system works like a conventional Ethernet
Uses CSMA/CD
Twisted pair Ethernet retains same frame format as the previous versions
Software on computers do not distinguish between thicknet, thinnet or twisted pair Ethernet
NIC handles details and hides any differences

41

Ethernet Topology
Hub can be thought of as a bus in a box
Logical and physical topologies:
Logically: twisted pair Ethernet employs a bus topology
Physically: twisted pair Ethernet forms a star-shaped topology

42

Wiring in Office Buildings
Styles of wiring used for LANs make little difference in a machine room or laboratory
Type of wiring makes a difference in terms of:
type
number of wires needed
distance spanned
cost

43

Wiring Illustration
Twisted pair Ethernet may require many individual cables to go between offices and a central point, wiring closet
Requires careful labeling of cables

Source: Douglas, C (2016) Computer Networks and Internets

44

Variants of Ethernet
Higher-speed Ethernet use an electronic device known as a switch
To remain backward compatible:
interfaces automatically sense (autosense) the speed at which a connection can operate; slows down to accommodate older devices
Source: Douglas, C (2016) Computer Networks and Internets

45

Twisted Pair Connectors
Twisted pair Ethernet uses RJ45 connectors
RJ45 are larger versions of the RJ11 connectors used to connect telephones
Source: Douglas, C (2016) Computer Networks and Internets

46

Twisted Pair Cables
Straight cable connects a computer and a switch
connects each pin of the RJ45 attached to one end of the cable directly to the corresponding pin on the RJ45 at the other end
Crossed cable connects two switches
connects a pin on one end to a different pin on the other end
To ensure correct connections, Cat 5 or Cat 6 cable are coated with colored plastic

47

Practice 17.3
Why is the 2nd generation of Ethernet known as Thinnet?

48

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 14, 15

49

End of Lesson

50

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 5: Internet Applications

1

Lesson 5 Learning Outcomes
Understand the purpose of File Transfer Protocols
Describe the steps performed in email
Describe the specifications used in email
Understand the role of ISP, Mail server and Mail Access
Compare and contrast SMTP, POP and IMAP
Describe the commonly used Email Representation standards

2

Lesson 5 Outline
File Transfer Protocol
Email Protocols
Email Transfer Protocols
Email Access & Representation

3

Transferring Files over the Internet
File Transfer Protocol (FTP): allows sending a copy of a file from one computer to another
FTP provides a powerful mechanism for the exchange of data
Most FTP is one-to-one

4

Files on the Internet
File: the fundamental storage abstraction
Holds an arbitrary object like document, spreadsheet, computer program, graphic image, or data
File transfer over the Internet is complicated because computers are heterogeneous
Different file representations
Different type information
Different naming
Different file access mechanisms

5

Heterogenous Computers
Different OS representation:
Extension for a JPEG image can be or
Each line in text file is terminated by a LINEFEED character or CARRIAGE RETURN and LINEFEED
Separator in files names can be slash (/) or backslash (\)
User accounts which are given the right to access certain files
Account information differs among computers
User X on one is not same as user X on another

6

FTP Characteristics
Arbitrary file contents: can transfer any type of data
Bidirectional transfer: download or upload
Supports authentication & ownership
Each file have ownership & access restrictions
Ability to browse folders
Textual control messages that are sent as ASCII text
Accommodates heterogeneity: hides the details of individual computer OS
FTP is mostly invisible: invoked automatically by browser when user requests for file download

7

FTP Communication Paradigm
FTP uses a client/server model
Client establishes a command connection to FTP server and sends requests to which the server responds
Control connection: connection used for commands, requests from clients
When FTP server needs to download or upload a file, it opens a data connection
Data connection: connection used to transfer files
This inverts client-server relationship for data connections!

8

FTP Communication Sequence
Source: Douglas, C (2016) Computer Networks and Internets
1
2
3
4
5
6
7
8
9

10
11

9

FTP Authentication
After creating the control connection, client must log into the server
USER command for login name
PASS command for password
Server sends a numeric status response over control connection to indicate if login is successful
Client can only send other commands if login is successful

10

Anonymous Login
For public files, anonymous clients can access
username “anonymous”
password mostly “guest”

Souce: Bing, licensed under CC BY-SA

11

FTP Port Number
However, what protocol port number should server specify when connecting to the client?
Default FTP port number is 21
Client allocates a protocol port on local OS and sends port number to the server
Client binds to port to wait for a connection
Clients transmits PORT command over control connection to inform server

12

FTP Exceptions
Transmission of port number may fail if one of the two endpoints lies behind a Network Address Translation (NAT) device
like wireless router in residence or small office
To support FTP, a NAT device will recognise FTP control connection, inspects the contents and rewrites values in a PORT command

13

FTP Commands
Four common commands:
open and close: for command connection
ls and cd: to list and change directory
get and put: to open download and upload data
quit: to close FTP

14

FTP Algorithm
Source: Douglas, C (2016) Computer Networks and Internets

15

Modern FTP
Modern FTP now comes with a GUI
It now more intuitive rather than by commands
More visually understood by user
Source: Dropbox
Source: Google Drive
Source: Microsoft OneDrive

16

Practice 5.1
A user uses FTP to transfer files between his laptop and a file server.
What kind of communication model does FTP uses?
What format are control messages sent as in FTP?
What are the TWO commands does the user need to provide to the file server in order authenticate himself?

17

Trivial File Transfer Protocol (TFTP)
Some devices do not have enough memory and processing capability
Hosts within same LAN has lower probability of errors
TFTP is a light-weight file transfer protocol
Based on message paradigm but each message must be acknowledged before another message can be sent

18

TFTP Usage and Limitations
TFTP is often used by network managers to download or upload router configurations and software
Unlike FTP, it cannot locate files in directories
File to be transferred are specified in the command line
TFTP has no authentication facility
Network managers need to configure to allow only known IP address

19

Network File System (NFS)
Sometimes it is easier to access files rather than transfer them
NFS allows physically remote directories to be mounted on local systems
Appears to be local to the users
All standard operations carried out by the OS are supported transparently on remote directories and files

20

NFS Communication Paradigm
NFS can use message or stream paradigm for its transport service
Since it is simple client/server application, best to use message paradigm
NFS is generally not secure but have some simple authentication facilities

21

Practice 5.2
What is the rational for using the TFTP over FTP?
Distinguish NFS from FTP by giving an explanation to each.

22

Lesson 5 Outline
File Transfer Protocol
Email Protocols
Email Transfer Protocols
Email Access & Representation

23

Electronic Mail
Email is one of the most common Internet application
Email software is divided into:
Email interface application: mechanism to compose/edit outgoing and read/process incoming messages
Mail transfer program: acts as client to send a message to a mail server on the destination computer
mail server accepts incoming messages and deposits each in the corresponding mailbox
Source: Douglas, C (2016) Computer Networks and Internets

24

Email Algorithm
Source: Douglas, C (2016) Computer Networks and Internets

25

Email Specifications
Specifications for email can be divided into three broad categories

Protocol Type Description
Transfer Move a copy of an email message from one computer to another
Access Allows user to access their mailbox and to view/send email messages
Representation Specifies the format of an email when stored on disk

26

Lesson 5 Outline
File Transfer Protocol
Email Protocols
Email Transfer Protocols
Email Access & Representation

27

Simple Mail Transfer Protocol (SMTP)
SMTP: standard protocol used by mail transfer program uses
Simple text-based protocol
SMTP can send a message to multiple recipients
By allowing clients to list users
Sends a copy of a message to all users on list

28

SMTP Headers and Body
Messages comprise a set of envelope headers
Headers has MAIL FROM and RCPT TO
Message header are followed by a blank line and the actual text
Message is prefixed with DATA followed by the text (content)
Body is terminated by newline with just a full stop followed by another newline

29

SMTP Characteristics
Follows a stream paradigm
Uses textual control messages
Only transfers text messages
Allows a sender to specify recipients’ names and check each name
Sends one copy of a given message

30

Multipurpose Internet Mail Extensions (MIME)
MIME extends the functionality of email to allow the transfer of non-text data in a messages
MIME specifies how a binary file can be encoded into printable characters and decoded by receiver 
MIME defines several data types
text/plain, text/html, image/jpeg, application/msword

31

MIME Encoding
MIME permits a sender/receiver to choose a convenient encoding
Sender includes additional lines in the header to specify encoding used
User can attach multiple attachments, each with their own encoding
Base64 encoding is most popular, but MIME does not restrict encoding to a specific form

32

MIME Header
MIME adds two lines to an email header
To declare that MIME has been used to
To specify how MIME information is included
For example, the header lines:
MIME-Version: 1.0
Content-Type: Multipart/Mixed;
Boundary=Mime_separator
Mime_separator (e.g. “/”) will appear in the message body before each part

33

MIME Backward Compatibility
MIME is backward compatible with email that do not understand the MIME standard or encoding
Such systems have no way of extracting non-text attachments
But will treat the body as a single block of text

34

SMTP Session Example
Source: Douglas, C (2016) Computer Networks and Internets

35

Practice 5.3
What is the limitation of SMTP that resulted in the protocol MIME?
What happen if a system is using an older version of email that do not support MIME but receives a message with an attachment that uses MIME?

36

Lesson 5 Outline
File Transfer Protocol
Email Protocols
Email Transfer Protocols
Email Access & Representation

37

Internet Service Providers (ISP)
Most users leave computer running continuously
But do not know how to manage an email server
ISPs began offering email server services
Provides a mailbox for each user
each ISP provides interface to access mailbox
Email access follows one of two forms:
Special-purpose email interface application
Web browser that accesses an email web page

38

ISP Email Access
Source: Douglas, C (2016) Computer Networks and Internets

39

Accessing Email via Mail Application
Mail application can download an entire mailbox to a computer when connected to the Internet
Advantages:
Mailbox can be downloaded prior to disconnected from the Internet (process email on plane)
Once Internet connectivity is back, the application can upload email created and download any new email

40

Accessing Email via Web Browser
Web browser approach is straightforward:
ISP provides a special web page that displays messages from a user’s mailbox
Advantages:
Ability to read email from any computer
Do not need to run special mail interface application

41

ISP Mail Access Protocols
Variety of mechanisms available for email access:
Some ISPs provide free email access software to their subscribers
In addition, two standard email access protocols have been created

42

Mail Access Protocols
Access protocol is distinct from transfer protocol
Access only involves a user interacting with a single mailbox
Transfer protocols allow users to send mail to others
Two common access protocols
each provides its own authentication mechanism that user follows to identify themselves
Acronym Expansion
POP3 Post Office Protocol version 3
IMAP Internet Mail Access Protocol

43

POP3 vs IMAP
Source: https://www.youtube.com/watch?v=MrZIzZQvZ0c

44

Access Protocols Characteristics
Provide access to a user mailbox
Permit preview of headers, download, delete, or send messages
Client runs on user personal computer
Server runs on a computer that stores user mailbox

45

Email Preview
View a list of messages without downloading the message contents is useful
Good when link between two parties is slow
Example: user browsing on a cell phone may look at headers and delete spam without waiting to download the message contents

46

POP3 Characteristics
Downloads email onto the device, delete message on mail server
Has 3 basic phases
Authentication: authenticate user with username and password
Transaction: download messages from server
Update: delete messages (if required) after it is downloaded to the client

47

IMAP Characteristic
IMAP allows preview of mail
Useful when bandwidth are expensive and limited
Reduce wastage for spam or unwanted messages
Keeps original message on mail server
Saves a copy on local computer

48

Mail Representation Standards
Other than MIME, another standard is RFC (Request For Comments) 2822 Mail Message Format
From IETF standards document RFC 2822
Message is represented as a text file & consists:
header section, blank line and a body
Header lines each have the form:
Keyword: information
Set of keywords is defined to include From:, To:, Subject:, Cc:

49

Fixed Representation Problem
Traditional application protocols employs a fixed representation
Main problem is the difficulty involved when making changes
Example: SMTP restrict message content to text, major change was needed to add MIME extensions

50

Extensible Representation
Alternative to fixed representation is the extensible system that allows sender to specify format of data
One widely accepted extensible representation is the Extensible Markup Language (XML)
XML resembles HTML in the sense that both languages embed tags into a text document

51

Tags in XML
Tags in XML are not specified a priori and do not correspond to formatting commands
XML describes the structure of data and provides names for each field

52

XML Tags Characteristics
Tags in XML are well-balanced
Each occurrence of a tag must be followed by an occurrence of
XML does not assign any meaning to tags
Tag names can be created as needed
Tag names can be selected to make data easy to parse or access

53

XML Example
Suppose two companies agree to exchange corporate telephone directories
Can define an XML format that has data items
Employee’s name, phone number, office
Can further divide a name into last & first name
Source: Douglas, C (2016) Computer Networks and Internets

54

Practice 5.4
Distinguish between POP3 and IMAP email protocols based on the following characteristics:
Location of the original message
Bandwidth consumption

55

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 4

56

End of Lesson

57

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 18: Wireless Networking

1

Lesson 18 Learning Outcomes
Describe the different PAN technologies and standards
Explain the wireless LAN architecture
Explain how contention is resolved in a wireless LAN
Describe wireless WAN technologies
Explain the concept of cell clusters
Understand the different generations of cellular technologies
Describe the role of GPS and VSAT satellites

2

Lesson 18 Outline
PAN Technologies
LAN & MAN Technologies
WAN Technologies

3

Wireless Networks Types
Government regulations make specific ranges of the electromagnetic spectrum available for communication
License is required to operate transmission equipment in some parts of the spectrum
Some parts of the spectrum are unlicensed
Source: Douglas, C (2016) Computer Networks and Internets

4

Personal Area Networks (PANs)
PAN provides communication over a short distance intended for devices owned and operated by a single user
Example: wireless headset and cell phone
Source: Douglas, C (2016) Computer Networks and Internets

5

Bluetooth Illustration
Source: Douglas, C (2016) Computer Networks and Internets

6

Ultra Wideband (UWB)
UWB consumes low power to reach same distance
Idea behind is spreading data across many frequencies
Uses wide spectrum of frequencies
Short distance: 2m-10m
Signal permeates obstacles such as walls
Data rate of 110 at 10 meters, and up to 500 Mbps at 2 meters

7

Zigbee
Zigbee: arose from desire to standardise wireless remote-control technology especially for industrial equipment
Only send short command, high data rates are not required
Wireless standard for remote control, not data
Frequency bands, 868 MHz 915 MHz, 2.4 GHz
Data rate of 20-250 Kbps, depending on frequency band
Low power consumption

8

Zigbee Applications
Source: Douglas, C (2016) Computer Networks and Internets

9

InfraRED
InfraRED: often used in remote controls
Range of 1 to several meters
Directional transmission with a cone covering 30o
Data rates 2.4Kbps (control) to 16Mbps (data)
Generally low power consumption
Signal may reflect from surfaces but cannot penetrate solid objects

10

RFID
Radio Frequency Identification (RFID)
A small tag contains identification information that a receiver can “pull” from the tag
Passive tags: draw power from the signal sent by the reader
Active tags: contain a battery which may last up to 10 years
Can use frequencies < 100MHz to 868-954 MHz Used for inventory control, sensors, passports, and other applications 11 RFID Applications Source: Douglas, C (2016) Computer Networks and Internets RFID tag 12 ISM Wireless Bands ISM Wireless is a region of electromagnetic spectrum reserved for use by Industrial, Scientific, and Medical purposes Not licensed to specific carriers and are used for LAN/PAN Source: Douglas, C (2016) Computer Networks and Internets 13 Practice 18.1 Suggest appropriate PAN technology for the following criteria: Multiple devices, line of sight not required, public use Smart home purposes, line of sight not required Industrial, scientific and medical purposes 14 Lesson 18 Outline PAN Technologies LAN & MAN Technologies Wi-Fi Technology WiMax Technology WAN Technologies 15 Wireless LAN Technologies IEEE provides most wireless LAN standards (IEEE 802.11) Group of vendors who build wireless equipment formed Wi-Fi Alliance to test and certify equipment meant for 802.11 standards Thus, most consumers associate wireless LANs with Wi-Fi Source: Douglas, C (2016) Computer Networks and Internets 16 Spread Spectrum Spread spectrum: multiple frequencies to send data sender spreads data across multiple frequencies receiver combines information from multiple frequencies to reproduce original Can be used to achieve one of the following: Increase overall performance Make transmission more immune to noise 17 Spread Spectrum Techniques  When a wireless technology is defined, designers choose appropriate multiplexing technique Source: Douglas, C (2016) Computer Networks and Internets 18 Wireless LAN (WLAN) Architecture Building blocks of WLAN: Access Points (AP): also called base stations Interconnection mechanism: like switch or router used to connect APs Set of wireless hosts/nodes Two possible WLAN configurations: Ad hoc: wireless hosts communicate amongst themselves without a base station Infrastructure based: wireless host only communicates with AP that relays all packets 19 WLAN Illustration Source: Douglas, C (2016) Computer Networks and Internets 20 Overlaps & Dead Zone Dead zone: physical location with no wireless connectivity Overlap: wireless host can reach multiple APs To handle this, host can associate with an AP Source: Douglas, C (2016) Computer Networks and Internets 21 AP Coordination APs communicated amongst themselves to ensure smooth handoff AP also allows measuring signal strength and move a host to AP that have stronger signal Some vendors offers lower cost, less complex APs that do not coordinate Argued that signal strength does not provide a valid measure of mobility Mobile computer can handle changing from one AP to another 22 Handling Contention in WLAN Wi-Fi employs collision avoidance methods. CSMA/CA triggers a brief transmission from the intended receiver before transmitting a packet Source: Douglas, C (2016) Computer Networks and Internets 23 Lesson 18 Outline PAN Technologies LAN & MAN Technologies Wi-Fi Technology WiMax Technology WAN Technologies 24 WiMax WiMax: World-wide Interoperability for Microwave Access WiMAX Forum promote use of the technology Can be used as an Internet access technology Two main versions of WiMAX, Fixed WiMAX: does not provide for handoff among access points Mobile WiMAX: technology offers handoff among APs 25 WiMax Deployment Can be used as backhaul connection between ISP facility and remote locations like cell towers Use frequencies with clear Line-Of-Sight (LOS) Internet access can use frequencies with Non-Line-Of-Sight (NLOS) deployment Source: Douglas, C (2016) Computer Networks and Internets 26 WiMax Key Features Uses licensed spectrum (i.e., offered by carriers) Each cell can cover a radius of 3 to 10 Km Uses scalable orthogonal FDM Guarantees quality of services (for voice or video) Can transport 70 Mbps in each direction at short distances Provides 10 Mbps over a long distance (10 Km) 27 Lesson 18 Outline PAN Technologies LAN & MAN Technologies WAN Technologies Cellular Technologies Satellite Technologies 28 How Do Satellites Stay in Orbit Source: https://www.youtube.com/watch?v=IC1JQu9xGHQ 29 Cellular Communication Systems Cellular communication system: provides voice and data services and Internet Connectivity Each cell contains a tower and group of cells are connected to a Mobile Switching Center (MSC) MSC tracks mobile users and manages handoff as the user passes from one cell to another Source: Douglas, C (2016) Computer Networks and Internets 30 Handoff Approaches Handoff can occur: Same MSC if moving within same group of cells Another MSC if moving to another group of cells Perfect coverage occurs if each cell is a hexagon But in practice, coverage is imperfect 31 Cell Tower Signals Most cell towers use omnidirectional antennas that transmit in a circular pattern Cells overlap and gaps exist with no coverage Theoretical In practice Source: Douglas, C (2016) Computer Networks and Internets 32 Cell Density Variability of cell density is possible Rural areas: each cell is large, a single tower is adequate for a large area Urban areas: various size cells with smaller cells covering metropolitan areas Designers break a region into many cells to handle more calls 33 Cell Clusters Interference can be minimized if adjacent cells do not use the same frequency  Cellular planners employ a cluster approach in which a small pattern of cells is replicated Source: Douglas, C (2016) Computer Networks and Internets 34 Cell Clusters Approach For a cell assigned to a unique frequency, the repeated pattern will not be assigned to any adjacent cells Source: Douglas, C (2016) Computer Networks and Internets 35 Cellular Technologies Four generations: 1G, 2G, 3G, and 4G with intermediate versions like 2.5G and 3.5G 1G (1970s-1980s): analog signals to carry voice 2G & 2.5G (1990s): digital signals to carry voice with limited data 3G & 3.5G (2000s): addition of higher-speed data 4G (2008): focuses on real-time multimedia 36 Cellular Standards European: TDMA technology called Global System for Mobile Communications (GSM) Motorola: TDMA technology called iDEN Japan: TDMA technology called PDC Source: Douglas, C (2016) Computer Networks and Internets 37 Cellular Services General Packet Radio Service (GPRS) & Wireless Application Service (WAP): Internet access Enhanced Data rate for GSM Evolution (EDGE) & Enhanced GPRS (EGPRS): higher rates EDGE Evolution: even higher rates Short Message Service (SMS): textual messaging Multimedia Messaging service (MMS): multimedia messaging 38 Practice 18.2 Explain the THREE (3) building blocks of WLAN. What are the TWO (2) possible WLAN configurations? 39 Lesson 18 Outline PAN Technologies LAN & MAN Technologies WAN Technologies Cellular Technologies Satellite Technologies 40 Parabolic Antenna Key to satellite communication is a parabolic antenna (dish) Aiming dish at satellite and placing detector at focus point guarantees strong signal Incoming energy is reflected from dish towards receiver Source: Douglas, C (2016) Computer Networks and Internets 41 VSAT Satellite Technology Very Small Aperture Terminal (VSAT) satellites use three frequency ranges that differs in Strength of the signal delivered Sensitivity to atmospheric conditions Satellite footprint Source: Douglas, C (2016) Computer Networks and Internets 42 GPS Satellites Global Positioning System (GPS) satellite provide location-based services Obtaining position is straightforward: receiver can determine location on earth by calculating distance to the satellites Source: Douglas, C (2016) Computer Networks and Internets 43 GPS Process Source: Douglas, C (2016) Computer Networks and Internets 44 Reading Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 16 45 End of Lesson 46

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 14: Multiplexing

1

Lesson 14 Learning Outcomes
Explain the concept of multiplexing
Understand the concept of multiplexing and demultiplexing
Describe the concepts behind FDM, TDM and WDM
Describe the variations of FDM and TDM
Describe the framing used in telephone system version of TDM

2

Lesson 14 Learning Outcomes
Describe inverse multiplexing and code division multiplexing

3

Lesson 14 Outline
Frequency Division Multiplexing
Wavelength Division Multiplexing
Time Division Multiplexing
Code Division Multiplexing

4

Multiplexing
Multiplexing: combination of information streams from multiple sources for transmission over a shared medium
Multiplexor: mechanism that implements multiplexing
Demultiplexing: separation of a combination back into separate information streams
Demultiplexor: mechanism that implements demultiplexing

5

Multiplexing Illustration (1/2)
Each sender communicates with a receiver
All pairs share a transmission medium
Multiplexor combines information from senders
Demultiplexor separate information for receivers
Source: Douglas, C (2016) Computer Networks and Internets

6

Multiplexing Illustration (2/2)
Main purpose is sharing the medium
Source: Douglas, C (2016) Computer Networks and Internets

7

Multiplexing Example
Source: Douglas, C (2016) Computer Networks and Internets

8

Types of Multiplexing
Frequency Division Multiplexing (FDM)
Wavelength Division Multiplexing (WDM)
Time Division Multiplexing (TDM)
Code Division Multiplexing (CDM)
TDM and FDM are widely used
WDM is a form of FDM used for optical fiber
CDM is a mathematical approach used in cell phone mechanisms

9

Multiple Access and Multiplexing
Source: https://www.youtube.com/watch?v=oYRMYSIVj1o

10

Frequency Division Multiplexing (FDM)
Radio stations/TV can transmit electromagnetic signals simultaneously
With little interference by using separate channel (carrier frequency)
Possible to send simultaneously multiple carrier waves over a single copper wire
Demultiplexer applies filters that each extract a small range of frequencies near one of carrier frequencies

11

FDM Illustration
Filters used in FDM only examine frequencies
FDM mechanism will separate the frequency from others without modifying the signal
Source: Douglas, C (2016) Computer Networks and Internets

12

FDM Advantages & Limitations
Advantages: simultaneous use of a transmission medium by multiple pairs of entities
FDM provides each pair with a private transmission path like separate physical transmission medium
Limitations: If the frequencies of two channels are too close, interference can occur
Demultiplexing hardware that receives combined signal must divide signal into separate carriers

13

FDM Guard Band
Source: Douglas, C (2016) Computer Networks and Internets
Designers choose a set of carrier frequencies with a gap between them known as a guard band

14

FDM Independent Channels
Source: Douglas, C (2016) Computer Networks and Internets

15

FDM Characteristics (1/2)
Long-lived: the idea of dividing the electromagnetic spectrum into channels came from early experiments in radio
Widely used: used in broadcast radio and television, cable television, and some cellular telephone
Versatile: it filters on ranges of frequency without examining other aspects of signals

16

FDM Characteristics (2/2)
Analog: multiplexing and demultiplexing hardware accepts and delivers analog signals
Even if a carrier has been modulated to contain digital information, FDM hardware treats the carrier as an analog wave
But makes FDM susceptible to noise and distortion

17

Using Range of Frequencies
Most FDM systems assign each sender and receiver a range of frequencies
Can choose how frequencies can be used
Two primary ways:
Increase the data rate
Increase immunity to interference

18

Increasing Overall Data Rate
To increase the overall data rate:
Sender divides the frequency range of the channel into K carriers
Sends 1/K of the data over each carrier

19

Subchannel and Subdivision
Sender can perform FDM within allocated channel
subchannel allocation refers to subdivision
To increase immunity to interference
Use a technique known as spread spectrum

Godmother of Spread Spectrum: Hedy Lamarr

Source: Douglas, C (2016) Computer Networks and Internets

20

Multiplexing with FDM
Basic idea:
divide the range of the channel into K carriers
transmit data spread, using unique patterns, over multiple channels
allow receiver to use a copy compose data that arrives using same spread pattern used by sender
Works well in cases where noise is likely to interfere with some frequencies at a given time

21

Hierarchical FDM
If a set of incoming signals all use frequency 0-4 KHz
map first first onto the range 0-4 KHz
map second onto the range 4-8 KHz
map third onto the range 8-12 KHz
Hierarchy in FDM multiplexors is that each maps its inputs to a larger continuous band of frequencies

22

Hierarchical FDM in Telephone
Source: Douglas, C (2016) Computer Networks and Internets

23

Practice 14.1
Frequency Division Multiplexing (FDM) allocates different frequencies to each pair of communication.
What is the advantage and limitation of such approach?
How can the limitation of FDM be overcome?

24

Lesson 14 Outline
Frequency Division Multiplexing
Wavelength Division Multiplexing
Time Division Multiplexing
Code Division Multiplexing

25

Wavelength Division Multiplexing (WDM)
WDM: application of FDM to optical fiber
Dense WDM (DWDM): many wavelengths of light employed
Inputs and outputs of multiplexing are wavelengths of light denoted by the Greek letter λ, and informally called colors
Prisms are used in optical multiplexing and demultiplexing

26

WDM Idea
When white light passes through a prism colors of the spectrum are spread out
WDM demultiplexor uses a prism to separate the wavelengths.
If several colored light beams are each directed into a prism at the correct angle, the prism will combine the beams to form a beam of white light
WDM multiplexor accepts beams of light of various wavelengths to combine them into a beam

27

WDM Illustration
Source: Douglas, C (2016) Computer Networks and Internets
WDM Multiplexor
WDM Demultiplexor

Each color can be used as a channel

28

Practice 14.2
What is the purpose of a prism in WDM for:
A multiplexor
A demultiplexor

29

Lesson 14 Outline
Frequency Division Multiplexing
Wavelength Division Multiplexing
Time Division Multiplexing
Code Division Multiplexing

30

Time Division Multiplexing (TDM)
TDM: assigns time slots to each channel repeatedly
Sent in a round-robin fashion
TDM Multiplexing: transmitting an item from one source first before transmitting an item from another source
Source: Douglas, C (2016) Computer Networks and Internets

31

Synchronous TDM
Synchronous TDM: when TDM is applied to synchronous networks, no gap occurs between items
Source: Douglas, C (2016) Computer Networks and Internets

32

Synchronous TDM in Telephone
Telephone systems use synchronous TDM to multiplex digital streams from multiple phone calls
Demultiplexer is synchronized with multiplexer
A synchronous TDM sends one slot after another without any indication of the output to which a given slot occurs
Slight difference in the clocks used to time bits can cause a demultiplexer to misinterpret the bit stream

33

Synchronous TDM Framing
To prevent misinterpretation, phone system includes an extra framing channel as input
Instead of a complete slot, framing inserts a single bit in the stream on each round
Demultiplexor extracts data from the framing channel and checks for alternating 0 and 1 bits
If an error causes a demultiplexor to lose a bit, likely that framing check will detect the error and allow the transmission to be restarted

34

Framing Illustration

Source: Douglas, C (2016) Computer Networks and Internets

35

Hierarchical TDM
Each successive stage of a TDM hierarchy uses N times the bit rate
In FDM, each successive stage uses N times the frequencies
Additional framing bits are added to the data
The bit rate of each successive layer of hierarchy is slightly greater than the aggregate voice traffic

36

Hierarchical TDM Illustration
Source: Douglas, C (2016) Computer Networks and Internets

37

Synchronous TDM Unfilled Slots
Synchronous TDM works well if each source produces data at a uniform
Many sources generate data in bursts, with idle time between bursts
In real life, a slot cannot be empty as the underlying system must continue to transmit data
the slot is assigned a value (such as zero) with an extra bit set to indicate that the value is invalid

38

Unfilled Slots Illustration
Sources on the left produce data items at random
Synchronous multiplexor will leave a slot unfilled if the corresponding source has not produced an item by the time, the slot must be sent
Source: Douglas, C (2016) Computer Networks and Internets

39

Statistical TDM
One technique to increase utilisation of shared medium is statistical TDM or statistical multiplexing
Instead of leaving a slot unfilled, skip any source that does not have data ready
By eliminating unused slots, statistical TDM takes less time to send the same amount of data

40

Statistical TDM Illustration
Use only 8 slots instead of 12

Source: Douglas, C (2016) Computer Networks and Internets
Synchronous TDM
Statistical TDM

41

Statistical TDM Overheads
Statistical multiplexing incurs extra overhead
Synchronous TDM system: every Nth slot corresponds to which receiver
Statistical TDM: any slot can correspond to any receiver
Hence, each slot must contain the identification of the receiver to which the data is being sent
Overhead: extra information sent with data

42

Inverse Multiplexing
On the Internet, a connection between two points can consists of multiple transmission media
but no single medium has a bit rate that is sufficient as service providers need higher bit rates than what is available
Multiplexing can be used in reverse
Spread a high-speed digital input over multiple lower-speed circuits for transmission and combine the results at the receiving end

43

Inverse Multiplexing Illustration
Source: Douglas, C (2016) Computer Networks and Internets

44

Inverse Multiplexor Design
Inverse multiplexor cannot be constructed by connecting the pieces of a conventional multiplexor backward
Hardware must be designed so that sender and receiver agree on how data arriving from the input will be distributed over the lower-speed connections
To ensure ordered delivery, it must be designed to handle cases like different latency on different lower-speed connections

45

Practice 14.3
How does synchronous TDM handle cases where a sender has nothing to send?
What technique can be used with TDM to better utilise the shared medium?
On the Internet, explain why is multiplexing not such a suitable approach for multiple pairs of communication? Explain an alternative that can be used.

46

Lesson 14 Outline
Frequency Division Multiplexing
Wavelength Division Multiplexing
Time Division Multiplexing
Code Division Multiplexing

47

Code Division Multiplexing (CDM)
CDM is used in parts of the cellular telephone system and for some satellite communication
Version of CDM used in cell phones is known as Code Division Multi-Access (CDMA)
CDM does not rely on physical properties
such as frequency or time

48

CDM Idea
CDM relies on values from orthogonal vector spaces can be combined and separated without interference
Each sender is assigned a unique binary code Ci, known as a chip sequence
Chip sequences are selected to be orthogonal vectors
the dot product of any two chip sequences is zero

49

CDM Steps
Each sender’s value to transmit is Vi
Each ith senders transmit (Ci) x (Vi)
Each sender transmit at the same time and the values are added together
To extract value Vi, receiver multiplies the sum by Ci

50

CDM Example (1/5)
Consider an example
Use a chip sequence that is only 2-bit long and data values that are 4-bit long
think of the chip sequence as a vector
Source: Douglas, C (2016) Computer Networks and Internets

51

CDM Example (2/5)
The first step consists of converting binary values into vectors that use -1 to represent 0

Source: Douglas, C (2016) Computer Networks and Internets

52

CDM Example (3/5)
Resulting values is a sequence of signal strengths to be transmitted at the same time
Resulting signal is the sum of two signals

Source: Douglas, C (2016) Computer Networks and Internets

Normal arithmetic addition

53

CDM Example (4/5)
A receiver treats sequence as a vector
Computes dot product of vector and chip sequence
Treats result as sequence, converts result to binary by interpreting positive values as binary 1 and negative values as 0
Thus, receiver 1 computes:
Source: Douglas, C (2016) Computer Networks and Internets
C1

Received data
(1(0) + (-1)(-2))
(1(2) + (-1)(0))

54

CDM Example (5/5)
Interpreting the result as a sequence produces:
(2 -2 2 -2)
which becomes the binary value: (1 0 1 0)

1010 is the correct value of V1
Receiver 2 will extract V2 from the same transmission using C2

55

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 11

56

End of Lesson

57

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 13: Modulation

1

Lesson 13 Learning Outcomes
Explain carriers, frequency and propagation
Explain the three different types of modulation
Explain the shift keying
Understand what modulation and demodulation means
Describe the different types of modems used for modulation and demodulation

2

Lesson 13 Outline
Analog Modulation
Digital Modulation
Modulation and Demodulation Hardware

3

Carriers
Long-distance communication use an oscillating electromagnetic wave called carrier
Makes small changes to carrier that represent information being sent

4

Frequency and Propagation
Frequency of electromagnetic energy determines how the energy propagates
One motivation for the use of carriers arises from the desire to select a frequency that will propagate well
Independent of the rate that data is being sent

5

Analog Modulation
Modulation: changes made to a carrier according to the information being sent
Takes two inputs
Carrier
Information signal
Sender must change one of the fundamental characteristics of the wave

6

Analog Modulation Schemes
Three primary techniques that modulate an electromagnetic carrier according to a signal:
Amplitude modulation
Frequency modulation
Phase shift modulation
First two methods of modulation are most familiar and used extensively

7

What is Amplitude Modulation
Source: https://www.youtube.com/watch?v=fGf_ng7qljI

8

Modulation Concept
Diagram show the concept of modulation with two inputs
Source: Douglas, C (2016) Computer Networks and Internets

9

Amplitude Modulation (AM)
AM: varies amplitude of a carrier in proportion to the information being sent (according to a signal)
Carrier continues oscillating at fixed frequency, but amplitude of the wave varies
Only amplitude of the sine wave is modified

10

AM Illustration
(a) unmodulated carrier wave
(b) analog information signal
(c) resulting AM carrier
Source: Douglas, C (2016) Computer Networks and Internets

11

AM and Shannon’s Theorem
Modulation only changes amplitude of a carrier slightly, depending on a constant, modulation index
Practical systems do not allow for a modulated signal to approach zero
In Shannon’s Theorem, signal-to-noise ratio will approach zero as the signal approaches zero
Keeping carrier wave near maximum ensures signal-to-noise ratio remains as large
Permits the transfer of more bits per second

12

Frequency Modulation (FM)
FM: amplitude of the carrier remains fixed but frequency changes according to signal:
Signal stronger, carrier frequency increase slightly
Signal weaker, carrier frequency decrease slightly
FM is more difficult to visualize as slight changes in frequency are not as clearly visible
But can notice that modulated wave has higher frequencies when signal used for modulation is stronger

13

FM Illustration

Analog Information Signal
Resulting FM Carrier
Source: Douglas, C (2016) Computer Networks and Internets

14

Sine Wave Phase Properties
One of the properties of sine wave is its phase, the offset from reference time which sine wave begins
Possible to use changes in phase to represent signals
The term phase shift characterise such changes

15

Phase Modulation (PM)
If phase changes after cycle k, next sine wave will start slightly later than the time at which cycle k completes
Slight delay resembles a change in frequency
PM: a special form of frequency modulation
Phase shifts are important when a digital signal is used to modulate a carrier

16

Practice 13.1
Define modulation and describe THREE (3) different ways a signal can be transformed by a modulator into a resulting carrier that is transmitted over a medium.

17

Lesson 13 Outline
Analog Modulation
Digital Modulation
Modulation and Demodulation Hardware

18

Digital Modulation
Modifications to the modulation schemes are needed for digital modulation
Instead of modulation that is proportional to a continuous signal, digital schemes use discrete values
Digital modulation is referred to as shift keying

19

Shift Keying
Shift keying operates like analog modulation
But instead of continuous values, digital shift keying has a fixed set
For example, AM allows amplitude of carrier to vary by small amounts in response to change in signal
Amplitude Shift Keying (ASK): uses a fixed set of possible amplitudes
Frequency Shift Keying (FSK): uses a fixed set of possible frequencies

20

Shift Keying Illustration
Carrier wave
Digital input signal
Amplitude Shift Keying
Frequency Shift Keying
Source: Douglas, C (2016) Computer Networks and Internets

21

Phase Shift Keying (PSK)
AM and FM require at least one cycle of a carrier wave to send a single bit
unless a special encoding scheme is used
Number of bits sent per unit time can be increased
if encoding scheme permits multiple bits to be encoded in a single cycle of the carrier
PSK: changes phase of the carrier wave abruptly
Each such change is called a phase shift

22

PSK Illustration
There are three abrupt phase changes
A phase shift is measured by angle of the change
Left most portion of sine wave changes its phase by π/2 radians or 180o
Second phase change corresponds to 180 shift
Abrupt changes
Source: Douglas, C (2016) Computer Networks and Internets

23

Encoding Data Using Phase Shifts
A sender and receiver can agree on the number of bits per second
No phase shift denote logical 0
Presence of a phase shift to denote a logical 1
A system can use a 180o phase shift to represent presence of a phase shift

24

Constellation Diagram
Constellation diagram: to express exact assignment of data bits to specific phase changes
A possible phase shift mechanism can permit sender to transfer one bit at a time
Called Binary Phase Shift Keying (BPSK) or 2-PSK
2-PSK is also used to denote the two possible values

25

Constellation Diagram Illustration
A constellation diagram showing logical 0 as 0o phase shift and logical 1 as a 180o phase shift
Source: Douglas, C (2016) Computer Networks and Internets

26

Detecting Specific Phase Shift
Receiver can measure amount a carrier shifted during a phase change
Can devise system that recognizes a set of phase shifts each to represent specific values of data
Systems are designed to use power of 2 possible shifts
Sender can use bits of data to select among shifts

27

Specific Phase Shift Illustration
Diagram shows a system that uses 4-PSK
At each stage of transmission, sender uses 2-bits of data to select among 4-possible shift values
Source: Douglas, C (2016) Computer Networks and Internets

28

Data Rate in Phase Shifts
Possible to increase the data rate by increasing the range of phase shifts
A 16-PSK mechanism can send twice as many bits per second as a 4-PSK mechanism
But in practice, noise and distortion limit the ability of hardware
to distinguish among minor differences in phase shifts

29

Increasing Data Rate Further
Data rate can be increased further by using combination of modulation techniques
Change two characteristics of carrier at one time
Most sophisticated technology combines ASK and PSK
Known as Quadrature Amplitude Modulation (QAM) or Quadrature Amplitude Shift Keying (QASK)

30

Quadrature Amplitude Modulation (QAM)
QAM: uses both change in phase and amplitude
To represent QAM on a constellation diagram
Use distance from the origin as a measure of amplitude

31

QAM Illustration
Diagram shows a variant known as 16QAM with dark gray areas indicating the amplitudes
Source: Douglas, C (2016) Computer Networks and Internets

32

Practice 13.2
What is digital modulation known as? Distinguish between analog and digital modulation.

33

Lesson 13 Outline
Analog Modulation
Digital Modulation
Modulation and Demodulation Hardware

34

What is a Modem
Source: https://www.youtube.com/watch?v=T4oeyn9Pxsc

35

Modulator and Demodulator
Modulator: accepts a sequence of data bits, applies modulation to carrier wave according to the bits
Demodulator: accepts a modulated carrier wave and recreates sequence of data bits
Most communication systems are full-duplex
Each location needs a modulator to send and a demodulator to receive data

36

Modem
To keep cost low and make the pair of devices easy to install and operate
Manufacturers combine modulation and demodulation into a device: modem (modulator and demodulator)
Modems are also designed to provide communication over long distances

37

Modem Illustration
Diagram shows how a pair of modems use a 4-wire connection to communicate
Source: Douglas, C (2016) Computer Networks and Internets

38

Modem Variations
Modems can be used with other media like Radio Frequency (RF) transmission and optical fibers
RF modems and optical modems
Modems can use entirely different media, but the principle remains the same:
at sender, a modem modulates a carrier
at receiver, extract data from modulated carrier

39

Dialup Modems
Dialup modem uses an audio tone
Like conventional modems, carrier is modulated at sender and demodulated at receiver
Uses data to modulate an audible carrier
which is transmitted to the phone system
Difference with conventional modems is the lower bandwidth of audible dialup modems

40

Modern Telephone System
Modern telephone system used today is digital
Phone system digitises incoming audio
Transports a digital form internally
Converts the digitised version back to analog audio for delivery
Receiver demodulates analog carrier
Extracts original digital data

41

Internal & External Modems
Dialup modem can also be embedded in a computer
Internal modem: denote an embedded device
External modem: denote separate physical device

Source: Douglas, C (2016) Computer Networks and Internets

42

QAM on Dialup Modem
QAM is used with dialup modems to maximise data rate
Most telephone connections transfer frequencies 300-3000Hz but a given connection may not handle the extremes well
To guarantee better reproduction and lower noise, dialup modems use 600-3000Hz
Available bandwidth = 3000-600= 2400 Hz

43

QAM on Dialup Modem Illustration
Source: Douglas, C (2016) Computer Networks and Internets

44

V.32 and V.32bis Modem
V.32 modem that uses 32 combinations of ASK and PSK to achieve a data rate of 9600 bps in each direction  
V.32bis modem uses 128 combinations of ASK and PSK to achieve 14400 bps in each direction
Sophisticated signal analysis is needed to detect the minor change that occurs
from a point in the constellation to a neighboring point

45

V.32 and V.32bis Constellations

Source: Douglas, C (2016) Computer Networks and Internets
V.32 Dialup Modem
V.32Bis Dialup Modem

46

Practice 13.3
How many modems are required in a full-duplex communication system?
What are optical modems and RF modem? Describe one similarity between them.

47

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 10

48

End of Lesson

49

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 4: Internet Protocols

1

Lesson 4 Learning Outcomes
Identify the purpose of the Application-Layer Protocols
Distinguish the two main types of Application-layer protocols
Distinguish between the three key standards of web protocols
Identify the components in a URL
Describe the four main HTTP request type functions

2

Lesson 4 Learning Outcomes
Describe the components in HTTP requests
Describe the architecture of a Web browser

3

Lesson 4 Outline
Application-layer Protocol
Web Protocols
Caching in Browser

4

Application-layer Programming
When programmer creates network applications, the programmer specifies some details:
Syntax and semantics of messages to be exchanged
Client or server initiates interaction
Error Control
When to terminate communication

5

Application-layer Protocol
Two broad types of application-layer protocols that depend on intended use:
Private communication
Standardised service
Size of a protocol specification depends on the complexity of the service

6

Private Communication
Private communication: communicate over the Internet with intention for private use
Straightforward interaction: code can be written without formal protocol specification
Source: https://www.publicdomainpictures.net/en/view-image.php?image=23003

7

Standardised Service
Standardised service: expectation that many programmers will create server software to offer the service or client software to access the service
Must be documented independent of implementation
Specification must be precise and unambiguous

8

Representation and Transfer
Application-layer protocols specify two aspects of interaction:
Representation
Transfer
Aspect Description
Data Representation Syntax of data items that are exchanged, specific form used in transfer, translation of integers, characters and files between computers
Data Transfer Interaction between client and server, message syntax and semantics, valid and invalid exchange error handling, termination of interaction

Source: Douglas, C (2016) Computer Networks and Internets

9

Web Protocols
World Wide Web (WWW) is the most widely used services on the Internet but the web is complex
Many protocol standards have been devised to specify various aspects and details
Source: Douglas, C (2016) Computer Networks and Internets
Standard Description
HyperText Markup Language (HTML) Representation standard to specify the contents and layout of a web page
Uniform Resource Locator (URL) Representation standard to specify the format and meaning of web page identifiers
HyperText Transfer Protocol (HTTP) Transfer protocol to specify how a browser interacts with a web server to transfer data

10

Practice 4.1
For each of the following scenario, suggest the appropriate web protocols to use.
To specify how a web page look like
To specify the address of the web page
To specify how data are transferred to a web server

11

Lesson 4 Outline
Application-layer Protocol
Web Protocols
HyperText Markup Langauge (HTML)
Uniform Resource Locator (URL)
HyperText Transfer Protocol (HTTP)
Caching in Browser

12

HTML Representation
HTML specifies the syntax of a web page
HTML allows complex web page that contains graphics, audio, video text
Hypermedia rather of hypertext

13

HTML Characteristics
Uses textual representation
Describes pages that contain multimedia
Follows a declarative rather than procedural paradigm
Provides markup specifications instead of formatting
Permits embedded hyperlink in an arbitrary object
Allows a document to include metadata

14

Declarative Markup Language
Declarative: allows one to specify what is to be done, not how to do it
Markup language: gives general guidelines for display and does not include detailed formatting instructions
Allows a page to specify level of importance of a heading
Does not require author to specify the exact font, typeface, point size, or spacing for the heading

15

HTML Extension
HTML Extensions: created to allow the specification of an exact font, typeface, point size, and formatting.
A browser chooses all display details

16

Importance of Markup Language
Two advantages:
Allows a browser to adapt the page to the underlying display hardware
Web page can be formatted for a high-resolution or low-resolution display
Large screen or small like smartphone

17

HTML Tags
To specify markup, HTML uses tags embedded in the document
Tags provide structure as well as formatting
Example: IMG tag to encode a reference to an external image
Additional parameters can be added to specify the alignment of the figure with surrounding text

18

HTML Tags Properties
Tags control all display
White space (extra lines or blank characters) can be inserted at any point in the HTML document
Without effect on the formatted version that a browser displays
Case insensitive: does not distinguish between uppercase and lowercase letters

19

HTML Example

Code Output


<br /> text that forms the document title<br />


body of the document appears here


Here is an icon of a house.

Here is an icon of a house
Source: Douglas, C (2016) Computer Networks and Internets

20

Practice 4.2
Why is HTML consider as a declarative language?
2. Why is HTML consider as a Markup language?

21

Lesson 4 Outline
Application-layer Protocol
Web Protocols
HyperText Markup Langauge (HTML)
Uniform Resource Locator (URL)
HyperText Transfer Protocol (HTTP)
Caching in Browser

22

URL Components
URL: syntactic form used by the Web to specify a web page
protocol://host_name:port/document?parameters
protocol: protocol used to access the document (HTTP,FTP)
host_name: domain name of the computer on which the document resides
port: port number that server is listening (default 80 for HTTP)
document: name of the document
%parameters: options for the page
Example: https://www.google.com/search?q=hello
Optional
Optional

23

Reason for URL
URL contains information that browsers need to retrieve a page
Browser uses the separator characters like “:”, “/”, and “%” to identify the components of a URL
Host name and protocol port are used to form a connection to the server on which the page resides
Browser uses the document and parameters to request a page

24

URL Hyperlinks
User can omit many of the parts of URL
protocol (http is assumed)
port (80 is assumed)
document name (index.html is assumed)
parameters (none are assumed)

25

Lesson 4 Outline
Application-layer Protocol
Web Protocols
HyperText Markup Langauge (HTML)
Uniform Resource Locator (URL)
HyperText Transfer Protocol (HTTP)
Caching in Browser

26

HTTP Transfer Protocol
HTTP: primary transfer protocol that a browser uses to interact with a web server
A browser is a client that extracts a server name from a URL and contacts the server
Most URLs contain an explicit reference of “http://” or omit the protocol (HTTP is assumed)

27

HTTP Characteristic
Uses textual control messages
Transfers binary data files
Can download or upload data
Incorporates caching

28

HTTP Methods
Source: https://www.youtube.com/watch?v=guYMSP7JVTA

29

HTTP Request Type
Once connection is established, client sends an HTTP request to server
Request Description
GET Requests a document; server responds by sending status information followed by a copy of the document
HEAD Request status information; server responds by sending status information but does not send a copy of the document
POST Sends data to a server; the server appends the data to a specified item i.e. a message appended to a list
PUT Sends data to a server; the server uses the data to completely replace the specified item i.e. overwrites the previous data

Source: Douglas, C (2016) Computer Networks and Internets

30

HTTP GET Request
Most common form of interaction begins with client requesting a page from the server
Client sends a GET request over
Server responds by sending a header, a blank line, and the requested document
Source: Bing, licensed under CC BY-SA

31

HTTP GET Request Form
GET /item version CRLF
Item: the URL for the item being requested,
Version: version of the protocol (HTTP/1.0 or HTTP/1.1)
CRLF: two ASCII characters, carriage return and linefeed
to signify the end of a line of text
Version information is important in HTTP
allows protocol to change but remains backward compatible
client sends version information that allows server to choose highest version that both understand

32

HTTP Response Header
HTTP/1.0 status_code status_string CRLF
Server: server_identification CRLF
Last-Modified: date_document_was_changed CRLF
Content-Length: datasize CRLF
Content-Type: document_type CRLF
CRLF
Source: Bing, licensed under CC BY-SA
Source: Douglas, C (2016) Computer Networks and Internets

33

HTTP Status Code
First line of a response header contains a status code that tells the browser whether the server handled the request
If the request is not available, status code pinpoints the problem

Status Code Message Description
200 Ok The request is OK
400 Bad Request Server did not understand the request
404 Not Found Server cannot find the requested page
403 Forbidden Access is forbidden to the requested page

34

HTTP GET Response Example
Sample output from an Apache web server
Item requested is a text file containing 16 characters
“This is a test.” plus a NEWLINE character
GET request specifies HTTP version 1.0 but the server runs version 1.1
Server returns 9 lines of header, a blank line, and the contents of the file

35

HTTP POST Request
Another common HTTP request is POST
Mainly used to send data to server
POST: Parameters is sent in body of the HTTP request
POST /test/demo.php HTTP/1.1
Host: host_name
name1=value1&name2=value2
GET: Parameters is piggybacked on the URL
/test/demo.php?name1=value1&name2=value2

36

HTTP POST vs GET
HTTP POST HTTP GET
Never cached Can be cached
Do not remain in browser history Remain in the browser history
Cannot be bookmarked Can be bookmarked
No restrictions on data length Have length restrictions
Should not be used for sensitive data
Should only be used to request data not modify

37

HTTP PUT Request
Similar to POST request
But PUT is meant to replace data in server
PUT: Parameters is sent in body of the HTTP request

38

HTTP HEAD Request
Similar to GET request
For the same GET request, if HEAD is used, the headers are returned without the body
Useful to check what a GET will return before making the request
i.e. before downloading a large file

39

Practice 4.3
Distinguish between HTTP GET and HTTP POST functions. Detailing at least TWO differences.

40

Lesson 4 Outline
Application-layer Protocol
Web Protocols
Caching in Browser

41

Browser Structure
Browser structure is complex
A browser must understand HTTP and:
Contain client code for each protocols used
Must know how to interact with a server
How to interpret responses from server
How to access FTP service
Ability to cache frequently visited web pages

42

Browser Architecture
Source: Douglas, C (2016) Computer Networks and Internets

43

Caching in Browser
Caching is an important optimization for web access
users tend to visit the same web sites repeatedly
Much of the content on web consists of large images
Graphics Image Format (GIF)
Joint Picture Encoding Group (JPEG)
Such images often contain backgrounds or banners that do not change frequently

44

Cached Copy
Browser can reduce download times significantly
by saving a copy of image in a cache on user’s disk and using cached copy
What happens if the document on server is modified after browser cache a copy?
How can a browser tell whether its cached copy is stale?

45

Updating Cache
When browser contacts server, response header shows the time document was modified
Browser saves Last-Modified date along with the cached copy
Browser makes HEAD request to the server
Server’s Last-Modified vs Cache’s Last-Modified
If cached version is stale, the browser downloads the new version

46

Updating Cache Algorithm
Source: Douglas, C (2016) Computer Networks and Internets

47

Cache Header
HTTP allows web site to include No-cache header that specifies a given item should not be cached
Browsers do not cache small items
Time to download the item with a GET request is approximately same as time to make a HEAD request
Keeping many small items in cache increases cache lookup times

48

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 4

49

End of Lesson

50

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 10: Wireless Media

1

Lesson 10 Learning Outcomes
Understand the motivation for infrared communication
Explain infrared communication
Explain point-to-point laser communication
Explain radio communication
Describe the different types of satellites
Distinguish the different types of satellite orbit

2

Lesson 10 Learning Outcomes
Compare and contrast wireless media with wired media
Use appropriate measures to measure performance of media

3

Lesson 10 Outline
Wireless Transmission
Radio Communication
Satellite Communication
Measuring Media Performance

4

Energy Types
Source: Douglas, C (2016) Computer Networks and Internets

5

Infrared Data Association (IrDA)
Infrared Data Association (IrDA): founded in 1993
To develop and promote a standard for infra-red data communications
Earliest members were HP, IBM and Sharp
Designed for short-range digital communications between PC and devices
Keyboard, digital cameras, smartphones

6

InfraRed(IR) Communication
InfraRed (IR): uses same type of energy as a TV remote control
Behaves like visible light but falls outside the range that is visible to a human eye
Like visible light, infrared disperses quickly
Infrared signals can reflect from a smooth, hard surface

7

IR Limitations
Opaque object can block the signal
Thin sheet of paper or moisture in atmosphere
Up to 1 meter in normal light conditions within a 30o cone from the transmitter
Speed ranging from 9.6 kbit/s to 4 Mbit/s
IR commonly used to connect to a nearby peripheral
Attractive for laptop users as can move around
Now mostly uses Bluetooth technology

8

IR Technologies
Source: Douglas, C (2016) Computer Networks and Internets

9

Point-to-Point Communication
Pair of devices with beam that follows line-of-sight
IR is a type of point-to-point communication
Other point-to-point communication technologies also exist
One form of point-to-point communication uses a beam of coherent light produced by a laser 

10

Laser Communication
Laser communication requires unobstructed path between the communicating sites
Laser beam does not cover broad area and is only a few centimeters wide
Sender and receiver must be aligned precisely to ensure that sender beam hits sensor in the receiver
Suitable for outdoors and span great distances
Useful in cities to transmit from building to building

11

Bluetooth
Low-cost, low power short-range radio developed by Bluetooth Special Interest Group made up initially of Ericsson, Intel, Nokia and Toshiba
Now include Microsoft and many others
Designed to carry voice and data between devices within noisy radio environment
Smartphones, hands-free devices, laptops
In unlicensed 2.4 GHz frequency band

12

Bluetooth Piconet
Piconet: network of 8 active Bluetooth devices
One act as master
Communication between master and slave
2 slaves cannot communicate directly
Piconet supports up to 255 non-active devices

13

Bluetooth Scatternet
Scatternet: network of ten piconets
Slave of a piconet becomes a master of another
Each bridging traffic between two piconets
Severe interference is likely to reduce data rate
but will not stop Bluetooth from working together

14

Service Discovery
Bluetooth includes service discovery protocols
Allows applications to discover what functions are supported by Bluetooth devices
Creates a database of trusted devices
following authentication
Pair up devices by entering PIN numbers

15

Bluetooth and WiFi
Bluetooth uses same frequency range as WiFi
Likely to cause interference when used near WiFi hotspots
IEEE has set up a task group to make recommendations that will help these two coexist

16

Practice 10.1
For each of the following, say whether an obstructed direct path will prevent communication entirely and give an example.
InfraRed (IR) communication
Laser communication
Bluetooth communication

17

Lesson 10 Outline
Wireless Transmission
Radio Communication
Satellite Communication
Measuring Media Performance

18

Radio Communication
Most common form of unguided communication consists of wireless networking technologies
Electromagnetic energy in the Radio Frequency (RF) range
RF transmission has distinct advantage over light
Can traverse long distances and penetrate objects like walls of a building

19

Radio Frequencies
Properties of electromagnetic energy depends on frequency
Spectrum: range of possible frequencies
Organizations allocate frequencies for specific purposes
Federal Communications Commission (FCC) sets rules for how frequencies are allocated
Limits on amount of power that communication equipment can emit at each frequency

20

Electromagnetic Spectrum
One part of the spectrum corresponds to IR
Spectrum used for RF communications spans frequencies from approximately 3KHz-300GHz
Includes frequencies allocated to radio and television broadcast, satellite and microwave communications

21

Electromagnetic Frequencies
Source: Douglas, C (2016) Computer Networks and Internets

22

Signal Propagation
Amount of information an electromagnetic wave can represent depends on the frequency
Frequency of electromagnetic wave determines how wave propagates
Source: https://www.earthmagazine.org/article/ionospheric-charge-could-forewarn-earthquakes

23

Radio Waves Types
Surface waves follows surface of earth
Space (or tropospheric) waves follows line of sight paths but can also be reflected off the ground and other large objects.
Sky (or Ionospheric) waves are reflected off the ionosphere and can be carried over long distance
Scattered waves: broadcast and scattered it in all directions
some are scattered back to earth and picked up, often used in off-shore oil platforms

24

Signal Frequency Types
Lowest frequencies: electromagnetic radiation follow the earth’s surface
If terrain is relatively flat, possible to place receiver beyond horizon of transmitter
Medium frequencies: signal can bounce off the ionosphere to travel
transmitter and receiver can be farther apart
Highest frequencies: signal propagates in a straight line
Path between transmitter and receiver must be free from obstructions

25

Signal Frequencies Summary
Source: Douglas, C (2016) Computer Networks and Internets

26

Wireless Propagation Types
Terrestrial: Communication uses equipment like radio or microwave transmitters that is close to earth surface
Typical locations include tops of hills, man-made towers and tall buildings
Non-terrestrial: some of the communication is outside the earth’s atmosphere
satellite in orbit around earth

27

Frequency & Power
Frequency and amount of power used can affect following:
Speed at which data can be sent
Maximum distance for communication to occur
Characteristics like if signal can penetrate solid objects

28

Practice 10.2
There are two kinds of wireless propagation types. For each of the following, say what kind of propagation type does it use.
Satellite dishes on top of buildings
Satellite in space
Antennas on top of a hill

29

Lesson 10 Outline
Wireless Transmission
Radio Communication
Satellite Communication
Measuring Media Performance

30

How Satellite Internet Works
Source: https://www.youtube.com/watch?v=QpO0FwN9Png

31

Laws of Physics
Kepler’s Law govern the motion of an object that orbits the earth
Satellite
Period: time required for a complete orbit
Depends on the distance from the earth
Communication satellites are classified according to their distance from the earth

32

Satellite Networks
Satellites have been used for communications since early days of space travel in 1960s
Provide high bandwidth between distant points on earth
Transmitter and receivers can be large or small dishes or even portable satellite telephones
Transponder: signal relay equipment on satellite (transmitter/responder)

33

Satellite Footprint
Each satellite can transmit and receive signals from an area of earth surface known as satellite footprint
Size of footprint depend on height of orbit and to what degree the satellite focuses the beam of its signal
Source: Douglas, C (2016) Computer Networks and Internets

34

GEO Satellites
Geostationary Earth Orbit (GEO): orbital period is the same as the rate that earth rotates
If positioned above equator, GEO satellite always remains in the same location over earth surface
Stationary satellite position means that once a ground station has been aligned with the satellite
Equipment never needs to move

35

GEO Communication
Source: Douglas, C (2016) Computer Networks and Internets
GEO satellite and ground stations are permanently aligned

36

GEO Distance from Earth
Distance required for GEO is 35,785 km
about 1/10 the distance to the moon
Implication:
Consider radio wave traveling to GEO and back
At speed of light, 3×108 m/s , trip takes:
Source: Douglas, C (2016) Computer Networks and Internets
Distance:
Speed:

37

Delays from GEO
Delay of about 0.2s can be significant for some applications
For electronic transactions like stock exchange offering a limited set of bonds
Delaying an offer by 0.2s may mean difference between successful and unsuccessful offer

38

Constraints in GEO
Limited space available in GEO above equator
Satellites using same frequency must be separated to avoid interference
Separation distance depends on power of transmitters
As technology evolves, possible allocate more satellites on orbit

39

Coverage of the Earth
Three satellites are needed to cover the earth
Positioned around the equator (120o)
Source: Douglas, C (2016) Computer Networks and Internets

40

Medium Earth Orbit (MEO)
Medium Earth Orbit (MEO): between 8,000-20,000Km above earth, orbital period of 2-12hours
Global Positioning System (GPS): uses 24 satellites in six MEOs
Triangulation: receivers measures delays from 4 GPS satellites in MEO to calculate their position on earth

41

Low Earth Orbit (LEO)
Low Earth Orbit (LEO): altitudes up to 2000Km
Satellite must be placed above fringe of the atmosphere to avoid drag produced by encountering gases
LEO satellites are typically placed at altitudes of 500-600Km or higher
LEO offers short delays, typically 1 to 4 ms

42

Problems with LEO
Orbit does not match the rotation of the earth
LEO satellite appears to move across the sky
Ground station must have an antenna that can rotate to track the satellite
Tracking is difficult because satellites move rapidly
Lowest altitude LEO satellites orbit the earth in approximately 90 minutes
Higher LEO satellites require several hours

43

Satellite Cluster
LEO satellites in clustering or array deployment
Group of LEO satellites designed to work together
Satellite in groups can communicate with one another
Members of the group stay in communication and agree to forward messages as needed

44

Satellite Cluster Example
Suppose a user in Europe sends a message to a user in USA
A ground station in Europe transmits message to satellite currently overhead (above it)
A cluster of satellites communicate to forward message to satellite in cluster that is currently over a ground station in USA
Finally, satellite currently over USA transmits the message to a ground station

45

Practice 10.3
What is a satellite footprint?
For Global Positioning System (GPS), how many satellites are needed and what kind of orbits are these satellites on?
Explain the idea that GPS uses to calculate the position on earth.

46

Lesson 10 Outline
Wireless Transmission
Radio Communication
Satellite Communication
Measuring Media Performance

47

Media Choice Factors (1/2)
Cost: materials, installation, operation, and maintenance
Data rate: number of bits per second that can be sent
Delay: time required for signal propagation or processing

48

Media Choice Factors (2/2)
Affect on signal: attenuation and distortion
Environment: susceptibility to interference and electrical noise
Security: susceptibility to eavesdropping

49

Quantitative Characteristics (1/2)
Propagation delay: time required for a signal to traverse the medium
Queuing delay: time required for a signal to wait for its turn to be transmitted
Channel capacity: maximum data rate that the medium can support
Shannon’s Law, Nyquist Theorem

50

Quantitative Characteristics (2/2)
Attenuation: loss of signal power over distance
Utilisation: proportion of time that channel is fully occupied
Throughput: number of bits carried by the channel per second as experienced by end user

51

Practice 10.4
Describe each of the following:
Attenuation
Utilisation
Throughput
Security
Channel capacity

52

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 7

53

End of Lesson

54

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 1: Overview of Communication and Networking

1

Lesson 1 Learning Outcomes
Understand the evolution of computer networking
Identify the five key aspects of networking
Define the term data communications
Define interoperability and communication protocol
Describe how packet switching and the Internet revolutionise data communication and computer networking
Compare and contrast the OSI and TCP/IP model

2

Lesson 1 Outline
Evolution of Computer Networking
Key Aspects of Networking
Interoperability and Standards
OSI and TCP/IP Model

3

Network & Internet
Network: system for connecting computer using a single transmission technology
Internet: set of networks connected by routers that are configured to pass traffic among any computers attached to networks in the set
Source: Bing images licensed under CC BY-NC-ND

4

Evolution of Internet (1/2)
Roots in military network called ARPANET
Fundamental changes from centralized to distributed computing
Incorporated reliability and robustness
Multiple links & distributed routing

Source: Bing images licensed under CC BY-SA

5

Evolution of Internet (2/2)
Ethernet standard made local networking feasible
TCP/IP protocol made internetworking possible
Developed after Arpanet
Switchover occurred in 1983
Exponential growth
doubling every 18 months

6

History of Internet
Source: https://
www.youtube.com
/
watch?v
=h8K49dD52WA

7

Growth of Computer Networks
Computer networks (NW) growing explosively
used in advertising, production, shipping, planning, billing, and accounting

Continued growth of the global Internet is one of the most exciting phenomena in NW
Source: Bing images licensed under CC BY-SA

8

Economic Impact
Data NW made telecommuting available to individuals and have changed business communication
Popularity & importance of NW has produced a demand in all industries for people with more NW expertise
Companies need workers to plan, acquire, install, operate, and manage the hardware (HW) and software (SW) systems that comprise computer NW and Internets

9

Why Network is Complex
Diverse technologies, each has features that distinguish it from the others
Multiple NW standards, some are incompatible
Various commercial NW products and services that use the technologies in unconventional ways
Multiple technologies required to interconnect two or more NW
Many combinations of NW are possible!

10

Challenges for Beginners
No simple and uniform terminology for NW concepts
Multiple terms exist for a given concept
Large set of terms & acronyms that contains many synonyms
NW jargon contains terms that are often abbreviated, misused, or associated with products
Source: Bing images licensed under CC BY-SA

11

Network Conceptual Models
Various conceptual models to be used to explain the differences and similarities among NW HW and SW systems
Simplistic models: do not distinguish among details
Complex models: do not help simplify the subject

12

Simplistic Models

Complex Models

Practice 1.1
Define network and Internet. How are networks and the Internet related?
Describe 4 reasons why network is complex.

B
13

Lesson 1 Outline
Evolution of Computer Networking
Key Aspects of Networking
Interoperability and Standards
OSI and TCP/IP Model

14

Five Key Aspects of Networks

15

1. Network Applications

2. Data Communications

3. Packet Switching

4. Internetworking with TCP/IP

5. Public and Private Networks

1. NW Applications & Programming
Network applications: program that communicates across a network
Email, file transfer, web browsing
Network programming: write codes for network applications to communicate across a network
Similar to conventional programming

16

2. Data Communication
Data communication: study of low-level technologies used to send information across a medium like wire and radio wave
Provides foundation of concepts on which networking is built upon

17

3. Packet Switching
Packet switching: a way to allow multiple senders to transmit data over a shared network
Divides data into small blocks call packets
Each packets has an identification for the intended recipient
Source: Bing images licensed under CC BY-SA

18

4. Internetworking with TCP/IP
Transmission Control Protocol (TCP)
Transport layer protocol that receives data and divide them into smaller packets
Internet Protocol (IP)
Network layer protocol that deals with the routing of the packets through the Internet

19

5. Public & Private Networks
Internet Service Providers (ISP): are vendors who offer Internet access for a fee
Public network: a network owned by a ISP and offers service to any individual or organisation that pays the subscription fee
Private network: a network that is restricted to one group
Can be leased from a provider

20

Private Network Types
Consumer: smallest and least expensive network
Small Office/Home office (SOHO): slightly larger than consumer network
Small-to-medium Business (SMB): larger than SOHO, usually multiple offices in a building
Large Enterprise: large network with multiple buildings

21

Practice 1.2
What is data communication?
Describe how does packet switching works

B
22

Lesson 1 Outline
Evolution of Computer Networking
Key Aspects of Networking
Interoperability and Standards
OSI and TCP/IP Model

23

History of Communication
Source: https://
www.youtube.com
/
watch?v
=0ay2Qy3wBe8

24

Communications
Communication must involved at least two entities
One to sends the information
One to receive it
Can also contain intermediate entities
Devices to forward packets

25

Interoperability
Misunderstanding can occur in communications
Real-world: different language, different context etc.
Network: disruptions, corrupted data, congestion
Interoperability: ability of two entities to communicate without misunderstanding
Source: Bing images licensed under CC BY-SA-NC

26

Interoperability for Communication
Communication between entities must agree on the details
Electrical voltage used to the format and meaning of messages
To ensure entities can interoperate, rules for all aspects of communications are written down

27

Communication Protocol
Protocols are specification or set of rules
Communication protocol: specifies details for one aspect of computer communication
Actions taken when errors arises
Voltage and signals to be used
Format of messages that applications exchange

28

Networking Standards
Networking standards ensure interoperability between product vendors
de jure: if they have been produced or accepted by a recognized standards body
de facto: if they have not been accepted by a recognized body but have gained widespread use by market forces

29

de jure Standards
Hardware and communications standards are often de jure
Network routers
Software standards are often de facto
Microsoft Windows
Competitive markets will arise after de jure standards have been agreed and stabilized
Achieved by having different vendors work together in standard bodies to agree standards for new technologies

30

de facto Standards
Can be divided into two kinds
Proprietary standards which are produced, owned and controlled by a commercial organization
Microsoft Windows
Open standards may originally produced by a commercial organization but since transferred to the public domain
Unix

31

Practice 1.3
What is interoperability?
Distinguish between the two main types of standards.

B
32

Lesson 1 Outline
Evolution of Computer Networking
Key Aspects of Networking
Interoperability and Standards
OSI and TCP/IP Model

33

Network Architecture
Engineers like to define an architecture for complex system
Easier to design, build, test and maintain
Network architecture
Structured framework within which networks can be analysed, designed and implemented, incorporating a defined set of layers and protocols

34

Cooperating Protocols
Protocol suite: set of protocols that work together to fulfil a communication
Each protocol fulfil one aspect
Abstract version of protocol suite is a layering model

35

Multi-layered Architecture
Set of layers each serving different function
Can be implemented separately
Lower layers provides a service to the layer directly above it by means of an interface
Imagine layer as software implementations that perform specific functions
Imagine interface as a set of procedure calls with parameters

36

Layered Architecture Benefits
Divide complex operations into manageable groups
Can change one layer without affecting others
Can mix different technologies and suppliers for different layers

37

Layered Architecture Model
Layered architecture advantages is clear but:
How many layers is needed?
What function should be at each layer?
International Organization for Standardization (ISO)
Seven layer model: Open Systems Interconnection (OSI)
Developed in the 1980s
To free users from proprietary standards which were being used by vendors to lock customers into their network architectures

38

TCP/IP vs OSI Model

Source: Douglas, C., 2016. Computer Networks and Internets
Internet TCP/IP Model
Open System Interconnection Networking Model
TCP/IP Layer 5 maps to Layer 5-7 in OSI
Course is focused on TCP/IP model

39

Layer 1: Physical Layer Protocols
Concern with transmission medium and the associated hardware
Specification about:
Electrical properties
Radio frequencies
Signals

40

Layer 2: Network Interface
Concern with communication between higher layers of protocols, which are usually software
And the underlying network, which is implemented in hardware
Specifications about:
Network addresses
Maximum packet size that a network can support
Protocols used to access the underlying medium
Hardware addressing

41

Layer 3: Internet
Concern with communication between two computers across the Internet
Across multiple interconnected networks
Also known as network layer
Specifications about:
Internet addressing structure
Format of Internet packets
Methods for dividing packets into smaller packets for transmission
Mechanisms for reporting errors

42

Layer 4: Transport
Concern with communication between two application programs
Specifications about:
Maximum receiver rate
Congestion control
Delivery of data
Ordered, no duplication, no error

43

Layer 5: Application
Concern with how a pair of applications interact when they communicate
Specifications about:
Email exchange
File Transfer
Web Browsing
Telephone services
Video conferencing

44

Communicating Between Layers
Source: Douglas, C., 2016. Computer Networks and Internets

45

Layered Communication
Application
Transport
Internet
Network Interface
Application
Transport
Internet
Network Interface
Communication Flow
Host 1
Host 2
Interfaces
Layers
Peers
Physical
Physical

46

Headers and Layers
Each layer will add their own information
Header: additional information added/removed by the corresponding layer
Not necessary of the same size for each header
Example: Port number (transport), IP address (Internet)
Source: Douglas, C., 2016. Computer Networks and Internets

47

Practice 1.4
Briefly describe the functions of the five layers in the Internet model.

B
48

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 1

49

End of Lesson

50

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 19: Internet Addressing

1

Lesson 19 Learning Outcomes
Describe the addressing scheme used on the Internet
Explain the IP address hierarchy
Explain the motivation behind CIDR
Distinguish between IPv4 and IPv6 addressing

2

Lesson 19 Outline
IPv4 Addressing
Classless Addressing
Berkeley Address
IPv6 Addressing

3

Seamless Communication
To achieve seamless communication system
Protocols must hide the details of physical networks and offer the illusion of a single, large network
The Internet is created entirely by protocol software
Addresses, packet formats, and delivery techniques independent of underlying hardware

4

Internet Addressing
Addressing is a critical component of the Internet
All host must use uniform addressing scheme
MAC addresses does not suffice as each network technology on the Internet defines its own
Internet Protocol (IP) address: supplied by protocols
Application programs can communicate without knowing the underlying hardware
Many protocols use IP addresses

5

IP Addressing Scheme
IP address (or Internet address) is a unique 32-bit number
Sender’s protocol must specify source IP address (itself) and destination IP address (receiver)
Network number (prefix) assignments must be coordinated globally
Suffixes are assigned locally without global coordination

6

Prefix and Suffix
Prefix: physical network of the host
Each network is assigned a unique prefix
Suffix: specific host/node on the network
Each host/node is assigned a unique suffix
Source: Douglas, C (2016) Computer Networks and Internets

7

Classful IP Addressing
Difficult choice to allocate bits for prefix and suffix
Large prefix: many networks, limited size each
Large suffix: many computers, limited networks
Original classful IP addressing divided IP address space into three primary classes
Each class has a different size prefix and suffix
Leading bits are used to identify class

8

IP Address Authority
ICANN handle address assignment and disputes but authorise registrars to assign prefixes
Registrars make blocks of addresses available to ISPs
ISPs provide addresses to subscribers
To obtain a prefix, a corporation usually contacts an ISP

9

Dotted Decimal Notation
Dotted Decimal Notation express each 8-bit section of a 32-bit number as a decimal value
Use periods to separate the sections
Treats each byte as an unsigned binary integer
0.0.0.0 to 255.255.255.255
Source: Douglas, C (2016) Computer Networks and Internets

10

Classful Addressing Limitations
Classful address are divided into unequal sizes to accommodate variety of scenarios
Class A is limited to 128 networks meant for ISP
Class C allows few hosts on a LAN
Source: Douglas, C (2016) Computer Networks and Internets

11

Meeting Growing Needs
Many demanded class A or class B address for future growth but many addresses were unused
Many class C addresses remained, but few wanted to use them
Can use variable prefix and suffix length:
Subnet addressing
Classless addressing

12

Subnet and Classless Addressing
Subnet addressing was originally used within large organizations
Classless addressing extended subnet addressing to all Internet
If a customer requests a prefix for a network that contains 55 hosts, a class C will be wasteful
Classless addressing allows the ISP to assign:
Prefix that is 26 bits long
Suffix that is 6 bits long

13

Classless Addressing
With classless addressing the prefix can be divided into several prefixes and assign each to a subscriber
Instead of wasting addresses, ISP can assign each of the four classless prefixes to a subscriber

Classful Class C
Classless
Source: Douglas, C (2016) Computer Networks and Internets

14

Address Masks
Classless and subnet require hosts and routers to store additional piece of information:
Boundary of prefix and suffix
To mark the boundary, IP uses a 32-bit value known as address mask or subnet mask
Hosts and routers compare prefix portion of the address to a value in their forwarding tables
bit-mask makes comparison efficient

15

Address Masks Comparison
Suppose a destination address (D), prefix (N) and address mask (M)
To test whether destination lies on specified network, router tests condition: N == (D & M)
Router uses mask with a “logical and (&)” operation to set the host bits of address D to zero (0)
Compares the result with the network prefix N

16

Address Masks Example
Consider the 32-bit prefix:
10000000 00001010 00000000 00000000= 128.10.0.0
32-bit mask:
11111111 11111111 00000000 00000000= 255.255.0.0
32-bit destination address:
10000000 00001010 00000010 00000011= 128.10.2.3
”AND” operation for destination address and address mask to extracts high-order 16-bits
10000000 00001010 00000000 00000000= 128.10.0.0

17

Practice 19.1
Why is there a need for classless addressing?

18

Lesson 19 Outline
IPv4 Addressing
Classless Addressing
Berkeley Address
IPv6 Addressing

19

Classless Inter-domain Routing
Source: https://www.youtube.com/watch?v=rJXvFWY4Ak0

20

Classless Inter-Domain Routing
Classless Inter-Domain Routing (CIDR) specifies addressing and forwarding
General form of CIDR: ddd.ddd.ddd.ddd/m
ddd: decimal value for an octet of the address
m: number of one bits in the mask
192.5.48.69/26 specifies a mask of 26 bits

21

CIDR Example
Assume an ISP has 128.211.0.0/16
customer1 CIDR: 128.211.0.16/28
customer2 CIDR: 128.211.0.32/28
The binary value customer1 is:
10000000 11010011 00000000 0001 0000
The binary value assigned to customer2 is:
10000000 11010011 00000000 0010 0000
No ambiguity as each customer has unique prefix
Retains most of original address to allocate remaining to other customers

22

CIDR Host Address
Assume organization is assigned 128.211.0.16/28
Source: Douglas, C (2016) Computer Networks and Internets

23

Special IP Address
IP defines a set of address that are reserved; never assigned to hosts
Network Address
Directed Broadcast Address
Limited Broadcast Address
This Computer Address
Loopback Address
Source: Douglas, C (2016) Computer Networks and Internets

24

1. Network Address
IP reserves host address zero (all 0s in the suffix) to denote a network
Address 128.211.0.16/28 denotes a network as bits beyond 28 are 0s
A network address should never appear as the destination address in a packet

25

2. Directed Broadcast Address
When packet sent to directed broadcast address (DBA)
A copy of the packet travels across Internet until it reaches the specified network
Delivered to all hosts on the specific network
Directed broadcast address for a network is formed by adding a all 1s suffix to the prefix
Prefix: 10000000 11010011 00000000 0000000
Result: 10000000 11010011 11111111 11111111

26

DBA Requirements
If network hardware supports broadcast
directed broadcast will be delivered using the hardware broadcast capability
If a network does not have hardware support for broadcast
software must send a separate copy of the packet to each host on the network

27

3. Limited Broadcast Address
Limited broadcast: broadcast on directly-connected network
Normally used during system startup by computer that does not know network number
Limited broadcast address are 32-bits of 1s
IP will broadcast any packet sent to the all-1s address across the local network

28

4. This Computer Address
A computer needs to know its IP address before it can send or receive Internet packets
The startup protocols use an IP to communicate
To obtain IP address automatically when the computer boots
IP reserves the address that consists of all 0s to mean this computer

29

5. Loopback Address (1/2)
Loopback address used to test network applications
Used for preliminary debugging
Instead of executing each program on a separate computer
Runs both programs on a computer and use a loopback address when communicating
Programmers often use host number 1
127.0.0.1 is most popular loopback address

30

5. Loopback Address (2/2)
Allows testing the program logic quickly
IP reserves the network prefix 127/8 for use with loopback
During loopback testing no packet leaves computer
IP software forwards packets from one application to another
Never appears in a packet traveling across a network

31

Practice 19.2
For CIDR, how can an address be split into multiple subnetworks?

32

Lesson 19 Outline
IPv4 Addressing
Classless Addressing
Berkeley Address
IPv6 Addressing

33

Berkeley Broadcast Address
The University of California at Berkeley developed an early implementation of TCP/IP protocols
Berkeley Software Distribution (BSD)
BSD contained a nonstandard feature
Uses a host suffix of all 0s identical to the network address
this address form is known as Berkeley broadcast

34

Berkeley Contribution
Initially many computer manufacturers derived their early TCP/IP software from Berkeley implementation
Few still uses Berkeley broadcast today
TCP/IP implementations often include a configuration parameter
To select between TCP/IP standard and Berkeley form

35

Routers IP Address
Router has connections to multiple physical networks
Each IP address for a physical network
Each router is assigned two or more IP addresses
One address for each network attached
IP address does not identify a device but identifies a connection between a device and a network

36

Router IP Address Illustration
A device with multiple network like a router must be assigned one IP address for each connection

Source: Douglas, C (2016) Computer Networks and Internets

37

Multi-homed Hosts
A host computer with multiple network connections is said to be multi-homed
Multiple addresses, one for each network connection
Reliability: can reach the Internet through either connections
Performance: can send traffic directly and avoid routers that are sometimes congested

38

Lesson 19 Outline
IPv4 Addressing
Classless Addressing
Berkeley Address
IPv6 Addressing

39

IPv6 Addressing
IPv6 includes addresses with a multi-level hierarchy
highest level corresponds to an ISP
next level corresponds to an organization
next to a site
IPv6 defines a set of special addresses
does not include a special address for broadcasting on a given remote network

40

IPv6 Address Types
Packets will be only delivered to just one of a group of addresses
Nearest one, measured by routing protocol, will be chosen
Source: Douglas, C (2016) Computer Networks and Internets

41

Colon Hexadecimal Notation
IPv6 address occupies 128 bits represented in Colon hexadecimal notation (colon hex)
Reduce number of characters used to write addresses
Each group of 16 bits is written in hex with a colon separating groups
69DC : 8864 : FFFF : FFFF : 0 : 1280 : 8C0A : FFFF

42

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 21, 24

43

End of Lesson

44

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 7: Analogue and Digital Signals

1

Lesson 7 Learning Outcomes
Distinguish between analogue and digital signal
Distinguish between periodic and aperiodic signals
Define sine waves
Identify the four important characteristics of signals
Define composite signals

2

Lesson 7 Learning Outcomes
Discuss the time and frequency domain representation of signals
Use Shannon law and Nyquist theorem to calculate the channel theoretical capacity

3

Lesson 7 Outline
Data Communications
Communication Model
Physics of Transmission
Types of Signal
Representing Signals

4

Information Source & Destination
Communication system accepts input from one or more sources and delivers to a destination
On the Internet, source and destination of information are pair of application programs
Source: generate data
Destination: consume data
Source: Bing, licensed under CC BY-SA

5

Data Communications
Data communications theory concentrates on low-level communications systems
Sources: microphones, sensors, measuring devices like thermometers and scales and computer peripherals like keyboards, mice
Destinations: audio output devices like earphones and loud-speakers, LEDs that emit light

6

Data vs Computer Communications
In most cases, the terms are interchangeable
To be specific:
Data communication: for lower layer aspects like signaling, device interfaces, hardware related issues
Computer communication: for higher layer aspects such as network protocols, applications, software related issues

7

Communication Model
Provides an understanding of how information is transferred
Shows how information is sent and received
Shows the parties and factors involved in a communication

8

Claude Shannon & Warren Weaver
In 1948, Shannon and Weaver came up with an idea
Successful communication requires:
Information source: generates data
Messages: data transmitted
Transmitter: converts information to signals
Channel: medium in which signal are transmitted
Receiver: translate signal back to original message
Destination: consume data

9

Shannon’s Communications Model
Information
Source
Transmitter
Channel
Receiver
Destination
Noise Source
Noise
Message
Signal
Received Signal
Message

10

Complicating Factor
Transmission of signal can be disrupted by noise
Noise could be caused by the medium/channel used
Noise source: generates noise
Increase the signal, increase the noise
If signal is amplified, noise is amplified too

11

Amplifying Signal
Source: Douglas, C (2016) Computer Networks and Internets
Signal to noise ratio will remain constant
P1 : N1 = P2 : N2

Noise level N1
Noise level N2

12

Communication Model
Source: https://
www.youtube.com
/
watch?v
=OY1JsGFZprc

13

Practice 7.1
Describe the SIX components in the Shannon’s communication model.

14

Lesson 7 Outline
Data Communications
Communication Model
Physics of Transmission
Types of Signal
Representing Signals

15

Physics of Transmission
Most functions on physical layer depends on characteristics of physical medium
Each physical medium requires own physical layer
Before looking into the functions, we need to consider some basic physics
like electromagnetism including electric conduction and electromagnetic radiation

16

Transmitting Information
Data communications deals with two types of signals to transmit information:
analog
digital
Analog signal is characterized by continuous signal levels
When input changes from one value to next, it does so by moving through all possible intermediate values

17

Analog vs Digital Signal
A digital signal has a fixed set of valid levels
Each change consists of an instantaneous move from one valid level to another
Source: Douglas, C (2016) Computer Networks and Internets
Analog
Digital

18

Signal Classification
Signals are broadly classified as
periodic – repeated
aperiodic – sometimes called nonperiodic
Classification depends on whether they repeat
Left: aperiodic as the signal does not repeat
Right: periodic as the signal repeats

Source: Douglas, C (2016) Computer Networks and Internets

19

Sine Waves
Much analysis in data communications involves the use of sinusoidal trigonometric functions
Especially sine, abbreviated sin
Sine wave: periodic wave that oscillates regularly and smoothly between negative and positive value

Source: Bing, licensed under CC BY-SA

20

Sine Waves: Superimposed
Two sine waves are superimposed exactly on each other
If they are in the same phase
Two sine waves cannot superimpose on each other
If one of the waves of the same frequency has crest slightly later than the other
They are said to be out of phase

21

Sine Waves Importance
Sine waves are especially important in information sources
Natural phenomena produce sine waves
A microphone picks up an audible tone, the output is a sine
Electromagnetic radiation can be represented as sine wave
We are interested in sine waves that correspond to a signal that oscillates in time

22

Sine Waves Shape
Importance of sine waves is not just that signals often carried by them
Like in fibre optics, wireless transmission and communications using modems
The shapes are also important
Square shaped digital signal can be represented by a series of sine waves of different frequencies
Help engineers to analyse and design transmission systems

23

Signal Characteristics
Frequency: the number of oscillations per unit time (usually seconds)
Amplitude: the difference between the maximum and minimum signal heights
Phase: how far the start of the sine wave is shifted from a reference time
Wavelength: length of a cycle as a signal propagates across a medium
Determined by speed which signal propagates

24

Speed of Waves

25

Electromagnetic Spectrum
Source: Douglas, C (2016) Computer Networks and Internets

26

Visualising Signal Characteristics
Signal characteristics can be expressed mathematically
Source: Douglas, C (2016) Computer Networks and Internets

27

Signal Observations (1/3)
Frequency can be calculated as inverse of the time required for one cycle, which is known as period
The example (a) has:
Period T = 1 seconds
Frequency of 1 / T or 1 Hertz
The example (b) has
Period T = 0.5 seconds
Frequency of 2 Hertz

Source: Douglas, C (2016) Computer Networks and Internets

28

Signal Observation (2/3)
Both (a) and (b) are extremely low frequencies
Typical communication systems use high frequencies measured in millions of cycles per second

Source: Douglas, C (2016) Computer Networks and Internets

29

Signal Observation (3/3)
To clarify high frequencies, engineers express time in fractions of a second
OR express frequency in units like megahertz (MHz)
There are other orders of time to express frequency

30

Time & Frequency Units
Source: Douglas, C (2016) Computer Networks and Internets

31

Practice 7.2
Describe the FOUR signal characteristics.

32

Lesson 7 Outline
Data Communications
Types of Signal
Representing Signals

33

Simple Signals
Signals like the ones illustrated below are classified as simple
They consist of a sine wave that cannot be decomposed further
Source: Douglas, C (2016) Computer Networks and Internets

34

Composite Signals
However, most signals are classified as composite
signal can be decomposed into a set of simple sine waves
Source: Douglas, C (2016) Computer Networks and Internets

35

Importance of Composite Signal
Data communications concepts mostly relates to sine functions and composite signals
In modulation and demodulation, one of the primary reasons:
Signals that result from modulation are usually composite signals

36

Fourier Analysis (1/2)
A mathematician named Fourier discovered that
Possible to decompose a composite signal into its constituent parts
Each part is a sine function with frequency amplitude and phase

37

Fourier Analysis (2/2)
Analysis by Fourier shows that if composite signal is periodic, the constituent parts will also be periodic
Most systems use composite signals to carry information
Composite signal is created at the sending end
Receiver decomposes the signal into simple components

38

Fourier Analysis Result
Harmonics: frequencies from multiples of a base frequency
Mathematics behind this is known as Fourier Analysis
Signal of any shape can be represented by series of sine waves of different harmonic frequencies

39

Lesson 7 Outline
Data Communications
Types of Signal
Representing Signals

40

Representing Composite Signals
Several methods have been invented to represent composite signals
Time domain: graph of signal as function of time
Frequency domain: graph of frequency vs amplitude

41

Frequency Domain
Frequency domain graph shows a set of simple sine waves that constitute a composite function
y-axis gives the amplitude
x-axis gives the frequency

Source: Douglas, C (2016) Computer Networks and Internets
Frequency domain of

42

Frequency Domain Benefits
Frequency domain representation can also be used with nonperiodic signals
Compactness: frequency domain graph is small and easy to read as each sine wave occupies a single point along the x-axis
Good when a composite signal contains many simple signals

43

Bandwidth
Range of frequencies that can be effectively carried by the channel
Measures the difference between the upper and lower level frequency of transmission
In other words, it measures the number of times a signal oscillates per second
Unit of measurement: Hertz (Hz)

44

Maximum Bit Rate Achievable
Dependent on ability of receiver to discern level of signals received without errors
Depends on the effects of transmission impairments, particularly noise
There are two useful theorem:
Nyquist’s theorem
Shannon’s law

45

Nyquist Theorem
Nyquist Theorem: considers a noiseless channel when calculating maximum theoretical capacity of a channel
Nyquist Theorem: C = 2B log2V
V is the number of signaling levels used to carry the signals
C is the maximum theoretical capacity in bit/s
B is the bandwidth in Hertz (Hz)

46

Nyquist Theorem Example
Suppose a 3.1 kHz telephone circuit in which signal is carried using 32 signaling levels
Using Nyquist Theorem:
C = 2B log2V
= 2 x 3100 x log232
= 6200 x 5
= 31,000 bit/s
= 31 kbit/s

47

Practice 7.3
A signal making use of 64 separate signaling states is transmitted in a channel between the frequencies of 2kHz and 2.4 kHz.
What is the maximum achievable data rate in this channel?

48

Shannon’s Law
Shannon’s Law: considers a noisy channel by using signal to noise ratio when calculating maximum theoretical capacity of a channel
Shannon’s Law: C = B log2 (1 + S/N)
C is the maximum theoretical capacity in bit/s
B is the bandwidth in Hertz (Hz)
S is the signal power in Watts (W)
N is the noise power in Watts (W)

49

Signal to Noise Ratio
Signal to Noise Ratio (SNR) is calculated using
SNR = 10 log10 (S/N)
S is the power of signal
N is the power of noise
Unit of measurement: deciBel (dB)

50

Shannon’s Law Example (1/2)
Suppose a 3.1 kHz telephone circuit with a signal to noise ratio of 40dB
Converting 40dB to real ratio:
40 = 10 log10 S/N
4 = log10 S/N
104 = S/N
S/N = 10,000

51

Shannon’s Law Example (2/2)
Using Shannon’s law to calculate the theoretical maximum capacity
C = B log2(1 + S/N)
= 3,100 log2 (1 + 10000)
= 3,100 log2 (10,001)
= 3,100 x 13.2879
= 41,192 bit/s
= 41.2 kbit/s

52

Practice 7.4
A microwave radio signal is broadcast between the frequencies of 1 GHz and 1.1 GHz between two radio towers where it is affected by noise of power 2mW.
If the signal must carry 1 Gbit/s of data, calculate minimum level of power that will be required in the transmitter.

53

Extreme Cases to Consider
If signal do not change at all over time, frequency range of the component sine waves is 0
Requires no bandwidth
If the signal change abruptly from one level to another, like a square wave, frequency range of the component sine waves is infinite
Requires infinite bandwidth

54

Infinite Range of Frequencies
No medium can support infinite range of frequencies
All media must remove higher frequency components from the signal
No medium can perfectly carry a square shaped wave
Shape will be distorted when higher frequency components are removed
Shape of the signal received will not have perfectly straight edges

55

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 6

56

End of Lesson

57

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 2: History of the Internet

1

Lesson 2 Learning Outcomes
Describe the motivation for resource sharing
Describe how the Internet has evolved to the present state
Describe the evolution in audio that has occurred in the Internet
Describe the impact of the Internet on cable television industry
Describe the significance of wireless Internet access

2

Lesson 2 Outline
Brief History
Changes on the Internet
Impact on Cable TV Industry

3

Early Computer Networks
Early computers networks when computers were large and very expensive, and the main motivation was resource sharing
To connect multiple users
Each with a screen & keyboard (terminals) to a large centralized computer
Allows sharing of peripheral devices
Permitted sharing of expensive, centralized resources

4

Birth of the Internet
In 1960s, Department of Defense for Advanced Research Projects Agency (DARPA or ARPA) wanted to find ways to share resources
Researchers needed powerful computers, but were very expensive
ARPA budget was insufficient
ARPA planned to interconnect all computers with a network!

5

ARPANET
ARPA devise a software that would allow a researcher to use whichever computer was best suited to perform a given task
ARPA did the following to achieve the visionary work:
gathered some of the best minds
focused them on computer network research
hired contractors to turn the designs into a working system: ARPANET
Research turned out to be revolutionary

6

Growth of the Internet
In less than 30 years…
the Internet has grown from ARPANET
Connecting a handful of sites to a global communication system
The rate of growth has been phenomenal!

7

Exponential Growth
Source: Douglas, C (2016) Computer Networks and Internets
x-axis: the year
y-axis: number of computers attached to the Internet, in millions
Exponential growth between 1980s-2000s

8

Early Internet Timeline
Source: Douglas, C (2016) Computer Networks and Internets

9

Lesson 2 Outline
Brief History
Changes on the Internet
Overview
Technological Changes
Application Changes
Impact on Cable TV Industry

10

Changes in the Internet
The Internet changed in two ways:
Communication speeds increased dramatically
New applications arose that appealed to many parts of the society
No longer dominated by scientists and engineers, scientific applications, or access to computational resources

11

Technological Changes
Internet was born out of resource sharing
More for communication now
Two technological changes that shifted the Internet
Higher communication speeds
Enable large data to be transferred quickly
Affordable personal computers
Powerful computational power and graphical display eliminates needs for resource sharing

12

Text to Multimedia
Data being sent across the Internet has changed
Multimedia: combination of text, audio, graphics and video
Originally only text but change to images, videos and audio
Source: Douglas, C (2016) Computer Networks and Internets
Email, files
1970s
Mixed Media
1980s
Multimedia
1990s
On-demand
Real-time
2000s

13

Audio Content on the Internet
Much of the content available is now multimedia
Quality of media also improved due to higher bandwidth
High resolution video and high-fidelity audio
Source: Douglas, C (2016) Computer Networks and Internets

14

Static to Dynamic
The Internet has transitioned from transfer of static textual documents
Now the Internet can transfer dynamic high-quality multimedia
Offline vs real-time requirements

15

Changes in Technologies
New technologies continue to emerge
Most significant transitions are the traditional communication systems
Voice and television moved from analog to digital
Support for mobile communication
Although the Internet applications changes, the underlying technologies remain the same

16

Analogue vs Digital
Analogue: analogue signals
Sounds waves, which vary continuously over time are analogue data
Digital: digital signals (bits)
Each bit can be represented by one of a number of discrete energy values
Superior performance
Computers produce digital data that is in binary form, that is, it is represented as a series of 1s and 0s

17

Practice 2.1
Describe the two motivations of resource sharing
What are the two ways in which the Internet has changed since 1960s?

B
18

Digital and Analogue Signals
Source: https://www.youtube.com/watch?v=RQc_frX50BA

19

Lesson 2 Outline
Brief History
Changes on the Internet
Overview
Technological Changes
Application Changes
Impact on Cable TV Industry

20

Technology Changes
The Internet has enabled some technology changes
Learning points
Traditional way of doing certain task
Modern way of doing certain task

21

Telephone System
Before: analog transmission of audio
Use the analog telephone circuits to communicate
Known as the Public Switched Telephone Network (PSTN)
After: digital transmission of audio
Uses the Internet infrastructure to communicate
Voice over Internet Protocol (VoIP)

22

How Telephone Works
Source: https://www.youtube.com/watch?v=hDCSMN-h8RU

23

Television
Before: wired analog channel
Can also make use of satellite dishes to receive TV broadcasts
After: wired/wireless digital
Can be received wireless
Digital transmission
Uses Internet Protocol (IP) for transmission

24

Cellular
Before: analog wireless cellular services
Satellite dishes on Earth
No connection to the Internet
After: digital cellular services
3G onwards
High speed mobile data

25

Internet Access
Before: wired, dial-up modem
Make use of telephone circuits
Cannot use telephone while connected
After: wireless, broadband, fibre optic
Wi-Fi
Separate/shared channel from telephone

26

Significance of Wi-Fi
Before: mobile devices has to have mobile data connectivity
Additional hardware needed for Internet Access
Incurs mobile data charges
After: any device near a Wi-Fi broadcast can access the Internet
Allows for less powerful electronic devices to connect to the Internet
Save on mobile data charges

27

Data Access
Before: centralised
Single server, multiple users
Bottleneck performance
After: distributed, peer-to-peer (P2P)
User can act as servers (Torrent)
Can be used as backups

28

Content Delivery
Before: requires download to view
Sometimes slow download
Impact work efficiency
After: streaming
Can view content on browser
Video streaming

29

Applications
Before: standalone, download and install
Updates requires additional download
Manual updates
After: cloud, auto-updates
Low cost computers, good productivity
No need to install applications, save space
Auto updates

30

Technology on the Internet
Area Before After Technology
Telephone System Analog voice Voice over IP VoIP
Television Analog delivery Digital delivery Internet Protocol (IP)
Cellular Analog cellular services Digital cellular services 3G
Internet Access Wired, Dial-up Wireless Wi-Fi
Data Access Centralised Distributed P2P
Content Delivery Download Streaming Video streaming
Applications Standalone Cloud Cloud services

31

Practice 2.2
How has the Internet changed the telephone system?
What are the 2 benefits of wireless Internet access?

B
32

Lesson 2 Outline
Brief History
Changes on the Internet
Overview
Technological Changes
Application Changes
Impact on Cable TV Industry

33

Application Trends
Technological advances has lead to many new Internet applications
Learning points
Definition
Benefits
Examples

34

Teleconferencing Systems
Teleconferencing system: combination of software and hardware to allow virtual meetings
Made possible by technological changes
Benefits
Reduces travel expenses/costs
Communicate anywhere

35

Navigation System
Navigation system: combination of software and hardware that provides users with map functions
Enabled by cloud technologies
Benefits
Can navigate to new locations
No need for standalone GPS system

36

Social Media
Social Media: community or platform that facilitates sharing and creation of multimedia
Enabled by availability and accessibility of the Internet
Benefits
Creates and maintains social connections
Meet new people
Entertainment purposes

37

Forums
Forums: platform that engage participants in some form of discussions
Contributes to community development
Benefits
Get help easily
Mostly free to use

38

Wikis
Wikis: platforms facilitates and maintain knowledge creation and sharing
Enabled by growing capacity and reduction in price of storage devices available on the Internet
Benefits
Public access knowledgebase
Contains plenty of content

39

Blogs
Blogs: customisable website that allows individual to share and create contents
Can be used to review products or act as a personal diary
Benefits
Can be designed to suit individual needs
Often free to create
Easily accessible to most people

40

Email
Email: electronic mail system that facilitates sending of multimedia messages
Important form of communication and can be used in courts as evidence
Benefits
Supported on most devices
Almost instant delivery

41

E-commerce
E-commerce: online retail platform that facilities sales transactions
Enabled by online payment services
Benefits
Shop anywhere
Shop anytime
Cost effective transactions

42

Remote Working
Remote Working: ability to work and remain productive anywhere
Enabled by remote access services
Benefits
Can access to complex software running on powerful computers
Allows mobile devices to be productive

43

Applications on the Internet
Area Uses Example
Teleconferencing Business-to-business communication Skype, Zoom
Navigation Systems Military, shipping industry, consumers Google Map
Social Media Consumers, volunteer organisations, businesses Instagram, Facebook
Forums Discussions Reddit, Stack Overflow
Wikis Knowledge sharing Wikipedia
Blogs Branding, diary Wordpress
Email Textual communication Gmail, Hotmail
E-commerce Consumers, businesses Amazon, Lazada, Shopee
Remote Working Remote access TeamViewer, Google Docs

44

Practice 2.3
Define E-commerce and how has the Internet help to enable E-commerce?
What are the two benefits of remote working?

45

Lesson 2 Outline
Brief History
Changes on the Internet
Impact on Cable TV Industry

46

Cable TV Companies
Often laid networks across metropolitan areas
Primarily to carry signals from cable TV head-end to individual homes
Most have been designed as cascaded star networks with head-end as central hub
Can usually support about 400,000 subscribers from a Regional Cable Head (RCH)
Cable TV Company
RCH

RCH

47

Cable TV Network
Original cable TV networks used copper coaxial cables
From RCH via a series of splitters and amplifiers to homes
Modern networks have been re-engineered
To use optical fibre cables
But cost of running it to each home is prohibitive
As such, optical network is converted back to copper at Fibre Nodes in street cabinets

48

Cable TV Network Architecture
RCH feeds a number of Distribution Hubs
Can support about 40,000 subscribers via switches and Fibre Nodes
Fibre Node will split TV signals and transmit over coaxial cable
Can provide service to about 1,000 homes using a tree topology

49

Hybrid Network
Cable TV networks are known as Hybrid Fibre-Coaxial networks
Can be adapted to provide a backwards channel to support interactive services
Most cable TV companies have adapted their networks to support broadband services using cable modems
Coaxial cables carrying TV signals also carry downstream and upstream data channel

50

Cable TV as Service Providers
Cable TV companies also supports voice services
But usually via a separate cable
Carried over separate channels to RCH where these voice channels are connected to the telephone network circuits
Cable TV companies offer similar products to enterprises as network operators
Like private circuits, LAN extension and IP VPNs
Access charges for use of the cable TV network are subsumed within prices charged for the WAN services

51

Practice 2.4
What type of cables did cable TV provider used to provide services to individual homes?
Why is cable TV network sometimes known as hybrid networks?

52

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 2

53

End of Lesson

54

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 8: Signal Encoding

1

Lesson 8 Learning Outcomes
Define analogue bandwidth
Describe how information can be represented as digital signal
Define baud and bit rate
Describe how signals are synchronised
Define line coding
Describe Manchester encoding
Define lossy and lossless data compression

2

Lesson 8 Outline
Analog Signal Bandwidth
Digital Signal Bandwidth
Converting Analog to Digital Signal
Data Compression

3

The Electromagnetic Spectrum
Source: https://www.youtube.com/watch?v=cfXzwh3KadE

4

Analog Bandwidth
In networking and communication, the definition of bandwidth varies
Bandwidth: difference between highest and lowest frequencies of the constituent parts
Obtained by Fourier analysis
Known as analog bandwidth
OR bandwidth of an analog signal

5

Analog Bandwidth Example
Consider the frequency domain plot below
audible frequencies to humans
Bandwidth = 5 KHz – 1 KHz = 4 KHz
Source: Douglas, C (2016) Computer Networks and Internets

6

Digital Signals
Some systems use voltage to represent digital values
positive voltage correspond to logical one
zero voltage correspond to logical zero
Example
+5 volts can be used for a logical one
0 volts for a logical zero

7

Two Signal Levels
If only two levels of voltage are used
each level corresponds to one data bit (0 or 1)
Some physical transmission mechanisms can support more than two signal levels
When multiple digital levels are available each level can represent multiple bits

8

Four Signal Levels
Consider a system that uses four levels of voltage:
-5 volts, -2 volts, +2 volts, +5 volts
Each level can correspond to two bits of data
Source: Douglas, C (2016) Computer Networks and Internets
Digital Signal, Two levels
Digital Signal, Four levels

9

Number of Levels Required
Relationship between number of levels required and the number of bits to be sent is straightforward
There must be a signal level for each possible combination of bits
There are 2n combinations possible with n bits
Communication system must use 2n levels to represent n bits

10

Determining Number of Levels
Numbers of levels can be determined by dividing voltage into small increments
Millions of levels between 0 and 1 volts
0.0000001 volts for one level, 0.0000002 for the next level etc.
However, in real world, systems cannot distinguish between signals that differ by small amounts
They are restricted to a few signal levels

11

Practice 8.1
Suppose a system sent the following voltage:
+5, -1, +1, -5, +1, -1, +5, +2, -2, +3, -3
How many bits are sent by this system?
2. Suppose a system need to represent 4 bits, how many number of levels should it have?

12

Bits Per Second
How much data can be sent in each time depends on two aspects
Number of signal levels
Amount of time the system remains at a given level before moving to the next
2)
1)
Source: Douglas, C (2016) Computer Networks and Internets

13

Increasing Bits Per Second
If the communication system is modified to use half as much time for a given bit
Twice as many bits will be sent in the same amount of time
Source: Douglas, C (2016) Computer Networks and Internets
1
1
1
1

14

Limitation on Hardware
As with signal levels, hardware in real-world system places limits on how short the time can be
If signal does not remain at a given level long enough, the receiving hardware will fail to detect it

15

Baud Rate
Baud: how many times the signal can change per second
If a system requires signal to remain at a given level for .001 seconds, it operates at 1000 baud
Both baud and number of signal levels affects bit rate

16

Baud and Bits Per Second
System with two signal levels operates at 1000 baud
can transfer 1000 bits per second
System with four signal levels operates at 1000 baud
can transfer 2000 bits per second (as four signal levels can represent two bits)
Source: Douglas, C (2016) Computer Networks and Internets

17

Practice 8.2
Suppose a system with eight levels with 2000 baud, how many bits per second can the system transfer?
Suppose a system with four levels with 500 baud, how many bits per second can the system transfer?
Suppose a system with two levels with 1000 baud, how many bits per second can the system transfer?

18

Converting Digital to Analog
According to Fourier, any curve can be represented as a composite of sine waves
where each sine wave has specific amplitude, frequency, and phase
Fourier’s theorem also applies to a digital signal
However, accurate representation of a digital signal requires infinite set of sine waves

19

Engineer Approach
Engineers adopt a compromise:
conversion of a signal from digital to analog is approximate
generate analog waves that closely approximate the digital signal
approximation involves building a composite signal from only a few sine waves

20

Approximating Digital Signal
Source: Douglas, C (2016) Computer Networks and Internets

21

Lesson 8 Outline
Analog Signal Bandwidth
Digital Signal Bandwidth
Converting Analog to Digital Signal
Data Compression

22

Bandwidth of Digital Signal
Suppose Fourier analysis is applied to a square wave
such as the digital signal illustrated before
A digital signal has infinite bandwidth
as Fourier analysis of a digital signal produces an infinite set of sine waves with frequencies that grow to infinity

23

Synchronised Communication
Electronics at both ends of a physical medium must have circuitry to measure time precisely
if one transmits a signal with 10 elements per second,
Receiver must expect 10 elements per second
At slow speeds, making both ends agree is easy

24

Synchronisation Difficulty
Building electronic systems that synchronise at high speeds is extremely difficult
Problem is how data is represented which will affect synchronisation of sender/receiver
Suppose receiver misses first bit that arrives and starts interpreting data starting at the second bit
Mismatch in interpretation can produce errors

25

Synchronisation Errors
Source: Douglas, C (2016) Computer Networks and Internets
Synchronisation error where receiver allows slightly less time per bit than sender

26

Avoiding Synchronisation Errors
Several techniques have been invented to avoid synchronization errors
Signal agreement: sender transmits a known pattern of bits for receiver to synchronize
typically a set of alternating 0s and 1s,
Avoid ambiguity: Data is represented in a way that there can be no confusion about the meaning

27

Line Coding
Line coding: the way data is encoded in a signal
Eliminates ambiguity
Consider a transmission mechanism that supports three signal levels
Source: Douglas, C (2016) Computer Networks and Internets
three signal levels
two bits

28

Line Coding Efficiency Issues
Using multiple signal elements to represent a single bit means fewer bits can be transmitted per unit time
Designers prefer schemes that transmit multiple bits per signal element
Source: Douglas, C (2016) Computer Networks and Internets

29

Line Coding Variety
Line coding choice depends on the specific needs of a given system
A variety of line coding techniques are available that differ in
How they handle synchronization
Other properties like the bandwidth used

30

Line Coding Types
Source: Douglas, C (2016) Computer Networks and Internets

31

Detecting Signal Transition
One important line coding:
The Manchester Encoding used in Ethernet
Detecting a transition in signal level is easier than measuring the signal level

32

Manchester Encoding
Manchester Encoding uses transitions rather than levels to define bits
1 corresponds to a transition from negative voltage level to positive voltage level
0 corresponds to a transition from a positive voltage level to a negative level
Transitions occur in the “middle” of the time slot of a bit

33

Visualising Manchester Encoding
Differential Manchester Encoding
Manchester Encoding
Source: Douglas, C (2016) Computer Networks and Internets

34

Practice 8.3
State the sequence of bits for the following Manchester Encoding.

35

Differential Manchester in 2mins
Source: https://www.youtube.com/watch?v=du_boiwX1yU

36

Differential Manchester Encoding
Differential Manchester Encoding (or Conditional DePhase Encoding) uses relative transitions rather than absolute
representation of a bit depends on previous bit
Each bit time slot contains one or two transitions
transition always occurs in middle of the bit time

37

Differential Manchester Process
Bit is represented by presence or absence of a transition at the beginning of a bit time:
logical 0 is represented by a transition
logical 1 is represented by no transition
Important property from a practical consideration:
encoding works correctly even if the two wires carrying the signal are accidentally reversed

38

Lesson 8 Outline
Analog Signal Bandwidth
Digital Signal Bandwidth
Converting Analog to Digital Signal
Data Compression

39

Converting Analog to Digital
Many sources of information are analog which means they must be converted to digital form
further processing such as before they can be encrypted
There are two basic approaches:
Pulse Code Modulation (PCM)
Delta Modulation (DM)

40

Pulse Code Modulation
In PCM, level of an analog signal is measured repeatedly at fixed time intervals (sampling) and converted to digital form
Source: Douglas, C (2016) Computer Networks and Internets

41

PCM Steps
Sampling: each measurement is known as a sample
A sample is quantised by converting it into a small integer value
quantized value is not a measure of voltage or any other property of the signal
range of the signal from minimum to maximum levels is divided into a set of slots (in power of 2)
Encoded into a specific format

42

Visualising Sample Quantisation
Source: Douglas, C (2016) Computer Networks and Internets

43

PCM Samples & Quantisation
Six samples are represented by vertical gray lines
each sample is quantized by choosing the closest quantum interval
Example, the third sample, taken near the peak of the curve, is assigned a quantized value of 6

44

Avoiding Inaccuracy
In practice, slight variations in sampling have been invented
To avoid inaccuracy caused by a brief spike or dip in the signal, averaging can be used
instead of relying on single measurement for each sample
Averaging: mean of three measurements taken close together is computed

45

Delta Modulation
Delta modulation (DM) takes samples like PCM
But does not do quantization for each sample
DM sends one quantization value followed by a string of values that give difference between the previous value and current value

46

DM vs PCM
Transmitting differences requires fewer bits than sending full values
Especially when signal does not vary rapidly
Main issue with DM is the effect of an error
if any item in sequence is lost or damaged, subsequent values will be misinterpreted
Communication systems that expect lost or changes during transmission usually use PCM

47

Sampling Rate
Undersampling: taking too few samples
Gives crude approximation of the original signal
Oversampling: taking too many samples
more digital data will be generated which uses extra bandwidth

48

Nyquist Theorem
Mathematician named Nyquist discovered the answer to how much sampling is required
Nyquist Theorem provides a practical solution to the problem
sample a signal at least twice as fast as the highest frequency that must be preserved
fmax is the highest frequency in the composite signal

Source: Douglas, C (2016) Computer Networks and Internets

49

Lesson 8 Outline
Analog Signal Bandwidth
Digital Signal Bandwidth
Converting Analog to Digital Signal
Data Compression

50

Data Compression
Data compression: technique that reduces the number of bits required to represent data
Data compression is useful for communication system:
Reduce number of bits used to represent data reduces the time required for transmission
Communication system can be optimised by compressing data

51

Lossy Data Compression
Lossy: some information is lost during compression
generally for data that human consumes, like image and video/audio
Only need to preserve details to level of human perception
change is acceptable if humans cannot detect the change
JPEG (JPG) for images or MPEG-3 (MP3) for audio recordings employ lossy compression

52

Lossless Data Compression
Lossless: all information is retained in the compressed version
Can be used for documents or in any situation where data must be preserved exactly
For communication, sender compresses data before transmission and receiver decompresses the result
arbitrary data can be compressed by a sender and decompressed by a receiver to recover an exact copy of the original
GIF is lossless

53

Practice 8.4
Differentiate between lossy and lossless data compression. Give an example for each.

54

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 6

55

End of Lesson

56

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 9: Wired Media

1

Lesson 9 Learning Outcomes
Distinguish between guided and unguided transmission media
Identify the different classification of transmission media based on forms of energy
Understand the motivation for using different forms of wired media
Distinguish the three different types of twisted pair copper wiring
Explain the motivation for shielding copper wiring

2

Lesson 9 Learning Outcomes
Identify the categories of twisted pair cables
Compare and contrast optical fibre with copper wiring

3

Lesson 9 Outline
Wired Transmission Media
Electrical Energy Transmission
Light Energy Transmission

4

Transmission Media Classes
There are two broad approaches:
Type of path: communication can follow an exact path such as a wire, or can have no specific path, such as a radio transmission
Form of energy: electrical energy is used on wires, radio transmission is used for wireless, and light is used for optical fiber

5

Guided Media
Guided: constrain the propagation of signals into a solid cable
Copper wiring or optical fibers provide a specific path
Signals do not easily stray from the cable
Energy requirements are relatively low
Relatively secured from eavesdropping
Good error performance

6

Unguided Media
Unguided: little to no constraint to the propagation of signals
At higher frequencies, signals tends to follow line of sight but still strays
Require more energy
Vulnerable to eavesdropping
Subject to interference and errors
Often fail in certain atmospheric conditions

7

Taxonomy by Forms of Energy
Taxonomy: the practice and science of classification
classification are not perfect and exceptions exist
Example:
Space station in orbit around the earth might employ non-terrestrial communication that does not involve a satellite

8

Energy Types
Source: Douglas, C (2016) Computer Networks and Internets

9

Practice 9.1
What are the TWO (2) ways to classify transmission media?

10

Lesson 9 Outline
Wired Transmission Media
Electrical Energy Transmission
Light Energy Transmission

11

Electrical Energy Transmission
Electrical current flows along a complete circuit
All transmissions of electrical energy need two wires to form a circuit
One wire to receiver
One wire back to the sender
Simplest form of wiring consists of a cable that contains two copper wires

12

Insulating Wires
Each wire used for electrical energy transmission is wrapped in plastic coating
To insulates the wires electrically
The outer coating on the cable holds related wires together to make it easier for humans who connect equipment
Prevent electrical shock

13

Interferences and Noise (1/2)
Random electromagnetic radiation, called noise, permeates the environment
Most communication systems generate minor amounts of noise as side-effect under normal operation
When noise hits metal, electromagnetic radiation induces a small signal
interfere with signals used for communication

14

Interferences and Noise (2/2)
Metal absorbs radiation, acting as shield
Placing enough metal between source of noise and communication medium can prevent noise from interfering
Source: Bing, licensed under CC BY-SA

15

Parallel Wiring
If two wires are parallel, high probability that one is closer to radiation than other
One wire act as shield, absorbs radiation
Second wire receives less radiation
Total of 32 units of radiation strikes
Top wire absorbs 20 units,
Bottom wire absorbs 12, producing difference of 8

Source: Douglas, C (2016) Computer Networks and Internets

16

Twisted Pair Wiring
Twisting two wires makes them less susceptible to electrical noise than leaving them parallel
Total of 32 units of radiation strikes
Each is on top half the time
Each absorbs same amount of radiation
Source: Douglas, C (2016) Computer Networks and Internets

17

Why Wires are Twisted
Source: https://www.youtube.com/watch?v=P7WfY9P2uNY

18

Practice 9.2
What is the rational to twisting wires?

19

Unshielded Twisted Pair (UTP)
Otherwise known as telephone cables
Pairs of metal cables twisted around each other in a regular fashion
Each metal conductor is surrounded by a plastic sheath to insulate it from other conductors
Several (usually 6) twisted pairs are then surrounded by an outer plastic sheath for protection

Source: Douglas, C (2016) Computer Networks and Internets

20

Twisted Pair Problems
Although immune to most background radiation, twisted pair wiring does not solve all problems
Twisted pair tends to have problems with:
Strong electrical noise when close physical proximity to the source of noise
High frequency communication

21

Electrical Noise Source
Electrical noise source:
factory that uses electric arc welding equipment
Cable runs above the ceiling in an office building on top of a florescent light fixture
Difficult to build equipment that can distinguish between valid signals and noise
even small amount of noise can cause interference when high frequencies are used

22

Cable Television Wiring
One familiar form of wiring that have extra metal shielding is the wiring for cable television
known as coaxial cable (coax)
It has a thick metal shield formed from braided wires that surround a center (inner) wire that carries the signal
Provides barrier to electromagnetic radiation from any direction

23

Coaxial Cable (Coax)
Early 10Mbit/s Ethernets and long-distance telecommunication circuits used Coax
Provide excellent performance
Outer plastic sheath for protection
But bulky, heavy and expensive
Difficult to install

Source: Douglas, C (2016) Computer Networks and Internets

24

Coax Benefits
Metallic shield prevents signals on inner wire from radiating electromagnetic energy
that could affect other wires
Coax can be:
Placed adjacent to sources of electrical noise and other cables
Can be used for high frequencies

25

Shielding of Coax
Source: Douglas, C (2016) Computer Networks and Internets

26

Shielding Wires
Using braided wire instead of solid metal shield keeps coaxial cable flexible but making it heavy
less flexible than twisted pair wiring
Variations of shielding have been invented that provide a compromise:
cable is more flexible, but has slightly less immunity to electrical noise

27

Making Shielded Cable Flexible
One popular shielded variation is known as Shielded Twisted Pair (STP)
STP has a thinner, more flexible metal shield surrounding one or more twisted pairs of wires
In most STP cable, the shield consists of metal foil like aluminum foil used in a kitchen

28

Shielded Twisted Pair (STP)
Like UTP except outer sheath contains a metal mesh connected to the earth
Compare to UTP:
Pairs inside are protected from electromagnetic interference
Less subject to impulse noise
Higher speed or longer distance
More expensive
Heavier and harder to install
Better performance
Source: Douglas, C (2016) Computer Networks and Internets

29

Standards for Twisted Pair
Standards organizations worked together to create standards for twisted pair cables used in computer networks
Mostly American orgnisations:
American National Standards Institute (ANSI)
Telecommunications Industry Association (TIA)
Electronic Industries Alliance (EIA)

30

Categories of Twisted Pair
Source: Douglas, C (2016) Computer Networks and Internets

31

Practice 9.3
Group the following type of media based on firstly, COST and secondly, immunity NOISE, in ascending order.
Coaxial cable (Coax)
Unshielded Twisted Pair (UTP)
Shielded coaxial Cable (STP)

32

Lesson 9 Outline
Wired Transmission Media
Electrical Energy Transmission
Light Energy Transmission

33

How Fiber Optics is Made
Source: https://www.youtube.com/watch?v=6CqT4DuAVxs

34

Using Light Energy Transmission
Three media use light energy to carry information:
Optical fibers
InfraRed transmission
Point-to-point lasers
Most important and widely used type is optical fiber

35

Optical Fiber
Each fiber consists of a thin strand of glass or transparent plastic encased in a plastic cover
One end connects to a laser or Light Emitting Diode (LED) used to transmit light
Other end connects to a photosensitive device used to detect incoming light
Two fibers are needed for two-way communication
One to carry information in each direction
Source: Douglas, C (2016) Computer Networks and Internets

36

Traveling Round a Bend in Fiber
When light encounters boundary between two substances, its behavior depends on:
density of the two substances
angle at which the light strikes the boundary
Given a pair of substances, there exists a critical angle, theta θ
measured with respect to a line that is perpendicular to boundary

37

Angle of Incidence
Angle of incidence: angle between the transmitted light and perpendicular line to the boundary
angle of incidence < θ, light crosses the boundary and is refracted angle of incidence = θ, light travels along the boundary angle of incidence > θ, light is reflected as if boundary was a mirror

38

Angle of Incidence Illustration
Angle of incidence < θ Angle of incidence = θ Angle of incidence > θ
Source: Douglas, C (2016) Computer Networks and Internets

39

Reflection in Fiber
Reflection in optical fiber is not perfect
It absorbs a small amount of energy
If a photon takes a zig-zag path that reflects from the walls of the fiber many times
This photon will travel slightly longer distance than another that takes straight path
Is dispersed (stretched) over time
Serious problem for long optical fibers

40

Dispersion Illustration
Source: Douglas, C (2016) Computer Networks and Internets
Light pulse sent and received over an optical fiber

41

Types of Fiber
Multimode, Step Index: least expensive and used when performance is unimportant
Reflect frequently and high dispersion
Multimode, Graded Index: slightly more expensive
Reduced reflection and lowered dispersion
Single Mode: most expensive and least dispersion
used for long distances and higher bit rates
has smaller diameter and other properties that help reduce reflection

42

Types of Fiber Illustration
Source: Douglas, C (2016) Computer Networks and Internets

43

Transmitting Light
Single mode fiber and the equipment used at each end are designed to focus light
Pulse of light can travel long distances without becoming dispersed
Minimal dispersion helps increase the rate at which bits can be sent
A pulse corresponding to one bit does not disperse into the pulse that corresponds to a successive bit

44

Receiving Light
Devices used for transmission must match the fiber
Transmission: LED or Injection Laser Diode (ILD)
Reception: photo-sensitive cell or photodiode
Multimode fiber generally use LEDs and photo-sensitive cells
Single mode fiber generally use ILDs and photodiodes

45

Fiber Optic Transmission

Source: Douglas, C (2016) Computer Networks and Internets

46

Optical Fiber Properties
Optical fiber:
immune to electrical noise
higher bandwidth
Ends of an optical fiber must be polished before they can be used
Requires special equipment and expertise for installation
Can easily break if accidentally pulled or bent

47

Optical Fiber vs Copper Wiring
Source: Douglas, C (2016) Computer Networks and Internets

48

The Internet’s Undersea World
Source: https://visual.ly/community/Infographics/technology/internets-undersea-world

49

Practice 9.4
For each of the following requirements, each suggest ONE type of media that can be used.
Electrical energy transmission, lowest cost
Light energy transmission, high bandwidth
Electrical energy transmission, flexible cabling
Radio transmission, non-terrestrial propagation

50

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 7

51

End of Lesson

52
Google

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 12: Transmission Modes

1

Lesson 12 Learning Outcomes
Distinguish between parallel and serial transmission
Distinguish between asynchronous and synchronous transmission
Define bits, bytes, blocks and frames
Distinguish between simplex, half-duplex and full-duplex transmission
Explain what is meant for an equipment to be DCE and DTE

2

Lesson 12 Outline
Transmission Modes
Serial Transmission Types
Channel Types

3

Serial vs Parallel Transmission
Source: https://www.youtube.com/watch?v=myU2x27FIIc

4

Transmission Modes
Transmission mode: manner in which data is sent over the underlying medium
Two fundamental categories:
Serial: one bit is sent at a time
Further categorised according to timing of transmissions
Parallel: multiple bits are sent at the same time

5

Transmission Modes Types
Source: Douglas, C (2016) Computer Networks and Internets

6

Parallel Transmission
Allows multiple data bits sent at the same time over separate media
Mostly used with a wired medium that uses multiple, independent wires
Signals on all wires are synchronised
a bit travels across each of the wires at precisely the same time

7

Parallel Transmission Illustration
Source: Douglas, C (2016) Computer Networks and Internets
Each wire carries one bit

8

Parallel Transmission Notes
In addition to parallel wires that each carry data, a parallel interface usually contains other wires
To allow sender and receiver to coordinate
To make installation and troubleshooting easy, wires for parallel transmission system are placed in a single physical cable

9

Parallel Transmission Benefits
High speed: can send N bits at the same time
parallel interface can operate N times faster than an equivalent serial interface
Match to underlying hardware: computer and communication hardware uses parallel circuitry
parallel interface matches internal hardware well

10

Serial Transmission
Parallel is superior but most communication systems use serial mode
Serial can be extended over long distances at much less cost
Using only one wire means there will never be a timing problem caused by one being slightly longer than another
However, devices must contain a hardware to converts data from parallel circuitry to serial form for the wire

11

Serial Transmission Illustration
Source: Douglas, C (2016) Computer Networks and Internets

12

Parallel & Serial Interface
Source: Douglas, C (2016) Computer Networks and Internets
MSB: Most Significant Bit
LSB: Least Significant Bit
Diagram shows the conversion

13

Serial Transmission Hardware
Hardware needed to convert data between parallel and serial can be straightforward or complex
Depend on type of serial communication
Universal Asynchronous Receiver and Transmitter (UART): chip that performs the conversion
Universal Synchronous-Asynchronous Receiver and Transmitter (USART): chip that handles conversion for synchronous networks

14

Serial Transmission Order
What should sender transmit first:
Most Significant Bit (MSB): big-endian to describe a system that sends the MSB first
Least Significant Bit (LSB): little-endian to describe a system that sends the LSB first
Either form can be used, but sender and receiver must agree

15

Ethernet Transmission Order
Order in which bits are transmitted does not settle the question of transmission order
Data in a computer is divided into bytes, and each byte is further divided into 8bits
Possible to choose a byte order and a bit order independently
Ethernet technology specifies data is sent byte big-endian and bit little-endian

16

Byte Big-endian Bit Little-endian
Source: Douglas, C (2016) Computer Networks and Internets
What happens if bit big-endian and byte little-endian

17

Serial Transmission Timing
Asynchronous: transmission can occur at any time
arbitrary delay between transmission of two data items
Synchronous: transmission occurs continuously
no gap between transmission of two data items
Isochronous transmission occurs at regular intervals
fixed gap between transmission of two data items

18

Practice 12.1
Suppose each character is represented by 8-bit, suggest the possible transmission modes for the following and explain why.
Achieve high speed
Achieve long distance at low cost

19

Lesson 12 Outline
Transmission Modes
Serial Transmission Types
Channel Types

20

Asynchronous Transmission
System is asynchronous if it allows physical media to be idle for some time between two transmissions
Asynchronous style of communication is well-suited to applications that generate data at random
User typing on a keyboard or clicks on a link

21

Asynchronous Transmission Issues
Issues arises from the lack of coordination between sender and receiver
Receiver don’t know how long medium will remain idle before more data arrives
Asynchronous usually arrange for sender to transmit a few extra bits before each data item
Preamble or Start bits: extra bits to inform data transfer is starting and allow receiver to synchronise with incoming signal

22

RS-232 Character Transmission
Consider transfer of characters across copper wires between a computer and a device keyboard
Each data item represents one character
Standardized by Electronic Industries Alliance (EIA)
Most widely used for character communication
Known as RS-232-C, and commonly abbreviated RS-232

23

EIA Specification for RS-232
EIA standard specifies the details like:
physical connection size: max cable length 50 feet long
electrical details: between -15v +15v
the line coding being used
Can be configured to control exact number of bits per second
Can be configured to send

24

RS-232 Illustration
Voltage varies at different stages
When a start bit, eight bits of a character, and a stop bit are sent
Diagram shows voltage for 8-bits character
Source: Douglas, C (2016) Computer Networks and Internets

25

Synchronous Transmission
Synchronous mechanism transmits bits continually
No idle time between bits
after transmitting final bit of one data byte, sender transmits bit of the next data byte
Sender and receiver constantly remain synchronized
Less synchronization overhead

26

Synchronous vs Asynchronous
Asynchronous RS-232 requires an extra start bit and stop bit
8-bit character requires minimum of 10-bit time, even if no idle time
On a synchronous system
each character is sent without start or stop bits

27

Synchronous Transmission Illustration

Async:
Sync:
Source: Douglas, C (2016) Computer Networks and Internets

28

Framing
Sometimes sender does not have data ready to send
Can make use of the idea of framing
Framing: interface added to a synchronous mechanism that accepts and delivers a block of bytes
Frame: blocks of bytes in framing

29

Framing Synchronisation
To ensure sender and receiver stay synchronized, a frame starts with a special sequence of bits
Idle sequence or idle byte: transmitted when sender has no data to send
Source: Douglas, C (2016) Computer Networks and Internets

30

Isochronous Transmission
Isochronous transmission: delivering data at a steady rate
provide steady bit flow for multimedia applications
Important to reduce jitter that disrupt reception
cause pops or clicks in audio/make video freeze for a short time
Jitter: variability of delay

31

Isochronous Network
Isochronous network is designed to accept and send data at a fixed rate, R
Data must be handed to the network for transmission at exactly R bits per second
Suppose an isochronous mechanism designed to transfer voice operates at a rate 64000bits/second
Sender generate digitized audio continuously
Receiver must be able to accept and play the stream

32

Practice 12.2
Propose and explain for each of the following type of scenarios, what will be a suitable serial transmission to use.
Minimum idle time in the physical medium
User typing on a keyboard
Real-time streaming video

33

Lesson 12 Outline
Transmission Modes
Serial Transmission Types
Channel Types

34

Channels Types
Depending on direction of transfer:
Simplex: transfer data in a single direction
analogous to broadcast radio or television
Full-Duplex: allows transmission in two directions simultaneously
analogous to a voice telephone conversation
participant can speak even if they are able to hear background music at the other end
Half-Duplex: transmission in two direction but one at a time

35

Channel Types Illustration
Source: Douglas, C (2016) Computer Networks and Internets

36

Half-duplex Transmission
Uses shared transmission medium
Shared medium can be used for communication in each direction
Analogous to using walkie-talkies where only one side can transmit at a time
Additional mechanism is needed at each end to coordinate transmission to ensure only one side transmits at a given time

37

DTE and DCE
Source: https://www.youtube.com/watch?v=62tQoiqt2cc

38

DTE and DCE Terms
Data Communications Equipment (DCE) and Data Terminal Equipment (DTE) were originally created by AT&T to distinguish between
DCE are communications equipment owned by phone company
DTE are terminal equipment owned by a subscriber

39

DTE and DCE Example
If a business leases a data circuit from a phone company
Phone company installs DCE equipment at business
Business purchases DTE equipment that attaches to the phone company’s equipment

40

Ownership Concept
Concept of DCE-DTE distinction is not ownership of the equipment
It lies in the ability to define an arbitrary interface for a user
If underlying network uses synchronous transmission
DCE equipment can provide either synchronous or isochronous interface to user equipment

41

DCE and DTE Illustration
Source: Douglas, C (2016) Computer Networks and Internets

42

Practice 12.3
Suppose a user sign up with an Internet Service Provider (ISP) for a fiber plan. The ISP will have to setup a modem in his premise. On this modem, the user plugs in his own network device onto the modem and connects his end-user devices to the network device.
What are some examples of end-user devices?
What kind of network device can the user attach to the modem. How can his end-user devices connect to it?
Which device(s) is a DCE and which is a DTE?

43

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 9

44

End of Lesson

45

Communications and Networks

version 1.0

Diploma in Information Technology

Copyright © 2020 by Singapore Institute of Management Pte Ltd. All rights reserved.

Lesson 6: Domain Name System

1

Lesson 6 Learning Outcomes
Explain what is DNS
Describe the purpose of DNS
Explain how DNS works
Describe how DNS cache
Describe the different types of DNS entries
Identify how abbreviations is handled in DNS

2

Lesson 6 Outline
DNS Basics
Implementing DNS Servers
DNS Mapping Process

3

Human-Readable Names
Domain Name System (DNS): provides a service that maps human-readable names to computer addresses
Browsers, mail software, most other Internet applications use the DNS
DNS is an example of client-server interaction!

4

Mapping of Domain Names
Traditionally, mapping of names was done via centrally managed text file
helloworld.com => 123.151.121.131
Inefficient: Text file is distributed to all hosts
DNS allows applications to use domain names
Domain names is then translated into network layer address (IP address)
Hierarchical and fully distributed

5

Resolving Hostname
Mapping is not performed by a single server
Fully distributed: Naming information is distributed to multiple servers on the Internet
Whenever an application needs to translate a name, it becomes a client of the naming system
client sends request message to name server
server finds corresponding address and sends a reply message

6

Temporary Client
Mapping may not be always available
If a server cannot answer a request,
Server temporarily becomes the client of another name server
Until a server is found that can answer the request

7

DNS Syntax
Each name consists of a series of alpha-numeric segments separated by periods
Domain names are hierarchical, most significant part of the name is on the right
Top layer of the hierarchy is the last field
.com, .org, .edu, .net

8

Domain Name Hierarchy Example
Example: mordred.cs.purdue.edu, anakin.cisco.com
Left-most segment “mordred” and “anakin” is the name of individual computer
Other segments identifies the group that owns it
“purdue” gives the name of a university
“cisco” gives the name of a company

9

Top-level Domain
DNS specifies values for the most significant segment called a top-level domain (TLD)
Controlled by Internet Corporation for Assigned Names and Numbers (ICANN)
ICANN designates one or more domain registrars to administer a given top-level domain and approve specific names
But ICANN is responsible for managing 13 top DNS root server

10

TLDs Servers
For each top-level domains are at least 2 DNS servers
Below this level are other delegated authorities to managed them
Some TLDs are generic: they are generally available
Other TLDs are restricted to specific groups or government agencies

11

Domain Registration
An organisation applies for a name under one of the existing top-level domains
most US corporations choose to register under the “.com” domain
DNS allows organisations to use a geographic registration
Corporation For National Research Initiatives
cnri.reston.va.us

12

List of TLDs
Source: Douglas, C (2016) Computer Networks and Internets

13

Mnemonic Names
Domain names are assigned to reflect the service provided
FTP server: ftp.foobar.com
Web server: www.foobar.com
Such names are mnemonic, but not compulsory

14

Using WWW
Use of www for a web server is merely a convention
Any computer can run a web server, even if it does not contain www
A computer with domain name beginning with www is not required to run a web server

15

DNS Example
doc.gold.ac.uk
.uk managed by UK registration authority (Nominet)
.ac.uk and gov.uk managed by UK Education and Research Networking Assocation (UKERNA)
.gold.ac.uk managed by Goldsmiths (a school in a university)
doc.gold.ac.uk managed by Department of Computing in Goldsmiths

16

DNS Explained
Source: https://www.youtube.com/watch?v=72snZctFFtA

17

DNS Process Summary
If local server can resolve name, returns the address
If unable, make request to one of the root servers
If root server can resolve, returns the address
Otherwise, return address of another server that can help
Repeats until name is resolved OR firmly established that name cannot be resolved
Recursive or iterative

18

Practice 6.1
What happens to a request when a name server receives it but does not have an answer to it?
In the URL, “cnri.reston.va.us”, which segment is the TLD? What does the TLD represent?
What does it mean when domain names are mnemonic?

19

Lesson 6 Outline
DNS Basics
Implementing DNS Servers
DNS Mapping Process

20

Implementing the DNS
Each organization is free to choose the details of its servers
A small organization that only has a few computers can contract with an ISP to run a DNS server
Computer
Computer
Computer
Hub
DNS Computer
Computer
Computer
Computer
Hub
ISP DNS Computer
ISP Hub

21

DNS Choices
An organization that runs its own DNS
Can choose to place all names in a single physical server
Can choose to divide its names among multiple servers
candy.foobar.com
soap.foobar.com
foobar.com
candy
soap

22

DNS Server Hierarchy Example
A hypothetical Foobar Corporation could choose to structure servers if the corporation had a candy division and a soap division
Source: Douglas, C (2016) Computer Networks and Internets

23

DNS Autonomy
DNS is designed to allow each organisation to assign or modify domain names without informing a central authority
Autonomy: each organization is permitted to operate DNS servers for its part of the hierarchy
Purdue University operates a server for names ending with purdue.edu
IBM Corporation operates a server for names ending with ibm.com

24

Replicating DNS Servers
Each DNS server can link to other domain name servers up and down the hierarchy
a server can be replicated; multiple physical copies of the server exist
Replication is useful for heavily used servers (like root servers) that provide information about TLDs
Administrators must guarantee all copies are coordinated to provide identical information

25

Name Resolution
Translation of a domain name into an address is called name resolution
The name is said to be resolved to an address
Software that perform this is known as a name resolver or resolver
In socket API, the resolver is invoked by calling function gethostbyname

26

DNS Request and Reply
Resolver becomes a client by contacting a DNS server
DNS server returns an answer to the caller
Each resolver is configured with the address of one or more local domain name servers
Resolver forms a DNS request message
Sends the message to the local server
Waits for server to send DNS reply message

27

Name Resolution Paradigm
Resolve can choose to use either stream or message paradigm when communicating with a DNS server
Most resolvers use message paradigm as it imposes less overhead for a small request
Example: chocolate.candy.foobar.com
Resolver will send request to local DNS server for foobar.com
Even if it cannot answer the request, the server knows to contact the server for candy.foobar.com, which can generate an answer

28

Locality of Reference
Locality of reference principle that forms the basis for caching applies to the Domain Name System in two ways
Spatial: A user tends to look up the names of local computers more often than the names of remote computers
Temporal: A user tends to look up the same set of domain names repeatedly

29

Exploiting Locality
DNS exploits spatial locality
Resolver contacts a local server first
To exploit temporal locality
a DNS server caches all lookups

30

DNS Lookup Algorithm
Source: Douglas, C (2016) Computer Networks and Internets

31

Caching in DNS Server
When a request arrives for a name outside the set for which the server is an authority
Server temporarily becomes a client of another name server
When the other server returns an answer, original server caches the answer
Sends a copy of the answer back to the resolver from which the request arrived

Server 1
(authority)
Resolver
i) Help resolve name
ii) Can’t resolve name
Server 2
iii) Ask others
iv) Can resolve name
v) Returns answer
vi) Cache answer
vii) Returns answer

32

Caching Consideration
In addition to knowing the address of all servers down the hierarchy
Each DNS server must know address of a root server
How long items should be cached?
If cached too long, the item will become stale (may become outdated)
DNS will specify a cache timeout for each item

33

Practice 6.2
How does DNS allow autonomy?
Why is there a need to replicate a DNS server?
What kind of communication paradigm does name resolution uses? Which is more commonly used and why?

34

Lesson 6 Outline
DNS Basics
Implementing DNS Servers
DNS Mapping Process

35

Entry Fields
Each entry in a DNS database consists of three fields:
Domain name: human readable names
Record type: specifies how the value is to be interpreted
Value: such as IP address
A query specifies both a domain name and a type
Server only returns a binding that matches the type of the query

36

Binding Classifications
Principal type maps a domain name to an IP address
Known as type A bindings
used by applications such as FTP, or a browser
ftp.web.com -> 192.168.1.0
Another is type MX that specifies a Mail eXchanger
SMTP uses type MX to look up the domain name in an email address
hello@myemail.com

37

Entry Type
Each entry in a DNS server has a type
Resolver must specify the type desired when looking up a name
DNS server returns only entries that match the specified type

38

Mapping Entry Type Efficiently
DNS type system can produce unexpected results
Address returned depends on the type
the name corporation.com can be used for both web and email services
Possible to divide the workload between separate computers
Mapping of type A lookups to one computer and type MX lookups to another

39

Alias and CNAME
The DNS offers a CNAME
Analogous to shortcut in file systems
This provides an alias for another DNS entry
aliases can be useful, suppose Foobar Corporation has two computers, named as:
hobbes.foobar.com and calvin.foobar.com

40

Alias and CNAME Example
Suppose that foobar runs a web server on computer hobbes, and wants to follow the convention of using the name www
EITHER: rename computer hobbes
OR: create a CNAME entry for www.foobar.com that points to hobbes
When resolver sends a request for www.foobar.com, server returns address of computer hobbes

41

Alias Benefits (1/2)
Alias permits an organization to change the computer used for a service without changing the names or addresses:
Foobar Corporation can move its web service from hobbes  calvin
changing the CNAME record in DNS server allows two computers retain their original names and IP addresses

42

Alias Benefits (2/2)
Aliases allows an organization to associate multiple aliases with a single computer
Can run an FTP server and a web server on the same computer
Create CNAME records for:
www.foobar.com
ftp.foobar.com

43

Abbreviations
DNS does not incorporate abbreviations
Server only responds to a full name
Most resolvers can be configured with a set of suffixes that allow a user to abbreviate names
Each resolver at Foobar Coporation might be programmed to look up a name twice:
once with no change
once with the suffix foobar.com appended

44

Abbreviations and DNS
If user enters full domain name
Local server will return address and proceed
If user enters an abbreviated name
Will first try to resolve the name
Receive error because no such name exists
Then it will try appending suffix and looking up the resulting name

45

DNS Character Set Limitations
DNS uses the ASCII character set
Can represent mostly English characters
Languages like Russian, Greek, Chinese, and Japanese each contain special characters
No ASCII representation exists
Many European languages use diacritical (accent) marks that cannot be represented in ASCII

46

IETF Approach to DNS Characters
IETF debated modifications and extensions of the DNS to accommodate international domain names
Chose an approach known as Internationalizing Domain Names in Applications (IDNA)
IDNA uses ASCII to store all names
If a domain name contains a non-ASCII character, IDNA translates the name into a sequence of ASCII characters
Stores the result in the DNS

47

IDNA Translation
IDNA relies on applications to translate between international characters and internal ASCII form
Rules for translating international domain names are complex and uses Unicode
Latest versions of Firefox and Internet Explorer can accept and display non-ASCII domain names as they each implement IDNA

48

Practice 6.3
Describe each of the three fields in a DNS entry.
Describe the type of domain name binding that can be used for a mail exchanger. Give an application example that uses such binding.

49

Reading
Douglas, C. (2016). Computer Networks and Internets, Global Edition (6th ed.). Pearson Education. ISBN: 978-1292061177 Chapter 4

50

End of Lesson

51

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP