When i read the course summary i also wrote it down.
Summary of Sammanfattning datorkom
OSI has seven layers:
Switches are used within a network, routers between networks. Gateways are used between networks of different types.
When a signal travels trough a link it will degrade from:
Signal-to-noise-ratio (SNR):
SNR = Average signal power / Average Noise Power
Sender and receiver must use the same protocols for physical layer.
The process of converting digital data to digital signals where the data is represented by electric potentials.
Methods used:
The link layers function is to frame data with flags, bit stuffing so flags are not found in the data, error detection and handling.
The flags shows the receiver where the frame begins and ends.
Error detection is done using redundant bits which can be used to check if other bits have been corrupted. Methods for error detection:
Error handling
The receiver sends an ACK for all correctly received packages.
The link layer defines what happens if an ACK is missing.
Methods for Automatic Repeat Request (ARQ)
An example of how a link-protocol could work. PPP is character-oriented (sv: byte-baserat) protocol. In a character-oriented protocol all data in a frame is handled as characters (bytes) and uses byte-stuffing.
Multiplexing is used to split a physical link into multiple channels.
Methods:
Each node gets a time slot in which they are allowed to send data. If the device has nothing to send the time slot will be empty.
Synchronizing frames in STDM
If a multiplexer and demultiplexer aren't synchronized bits could end on the wrong channel. Therefor framing bits (synkroniseringsbitar) are used at the starts of each frame.
Fundamentals of a shared medium
All data sent trough a shared medium gets to all devices (broadcast).
Because of attenuation on the link the network has a limited size, which could be extended with repeaters.
The part in which a collision could occur is called a Collision-Domain (kollisonsdomän).
Collision-domain
All hosts sharing a link exist in the same collision domain, this applies restrictions on the amount of devices a single link could have.
In controlled access devices are only allowed to send data if the other nodes allows it.
Examples:
Methods with "Random access"
In methods with random access (contention) no node decides over others. All terminals instead decide for themselves when they can send. Each node uses a predetermined procedure for deciding if they shall send.
Examples:
6 bytes long - example: 06:01:02:01:2C:4B
All nodes with a network card supporting IEEE 802.x have a physical address (MAC). If a device possess more than one network card it also has multiple MAC addresses.
Unicast or Broadcast-addresses
Ethernet is a standard for wired LANs.
A hub sends data from a incoming link to all other links and thus operates on the physical layer (OSI 1).
Modern Ethernet networks use switches which gives each device their own link.
A switch has an adress-tabel to enable the transfer of frames to only the correct receiver. The table is extended with each address it sees.
Switches are used to build larger networks and broadcasts are still sent to all nodes in the network (networks end with a router).
Uses a mixture of CSMA/CA and RTS/CTS, the last mentioned is used to reserve access to the net and mitigate problems from the hidden terminal problem.
Spread Spectrum
Is a method used by different wireless networks which encounter lots of noise. Its therefor used in mobile networks, Bluetooth and some version of IEEE 802.11.
Responsible for sending information from a sender to a receiver potentially on different nets (host-to-host delivery).
A common addressing system is needed to be able to address hosts on other nets, this is called a net-address. A net address is built up by an net-id and a host-id.
Rules are needed for how to get information between nets (routing).
A device between the nets which does the routing is also needed, a router!
A router transfers packets between networks based on the addresses. Tries to make intelligient decisions on the best path to the destination. The routing decisions is made from the net-id and not the host-id.
Internet protocol (IP) is the only network protocol that is used on the internet. And has two versions, IPv4 and IPv6.
Data is later sent as IP-packets (sv: datagram) which uses checksums but defines no error handling or flow control.
IPv4:
Has two parts:
There exists two ways of defining IP-addresses, Classful addressing and Classless addressing.
Classful addressing
Five classes exist: A, B, C, D and E. The classes have different prefix sizes and host id ranges.
Classless addressing (CIDR)
Has a variable prefix length, example: 221.8.23.243/25 which shows that the first 25 bits are network id bits.
Example address shortened different amounts:
For a host or router to be able to find a node within a net the IP-address must be translated to a physical address.
Address Resolution Protocol is used to query for a MAC address from a IP address within a network.
A host in a LAN always knows the IP-address to the router (default router/ gateway) which is connected to the rest of the Internet.
Each router uses the net address to determine the next hop. All routers must also have forwarding.
The links (edges in the network graph) costs can depend on many things, for example:
All routers contains message buffers where packages wait on processing. If the network load increases the buffers fill and latency increase. If the buffers fill totally packages are trough away. As IP has no error correction some other protocol has to handle this.
The transport layer is responsible for sending messages between two application processes (Process-to-process delivery).
The transport protocol encapsulates data from applications and ensures that it is sent to the correct destination application. The receivers transport protocol encapsulates (unpacks) the data.
The transport layer uses port-numbers to separate applications on the same host. Example 23 is telnet.
Transmission Control Protocol (TCP) is one of the most used transport protocols on the internet and it provides a connection-oriented data transfer with error handling and flow control. It uses checksum and Go-back-N ARQ to accomplish that.
User Datagram Protocol (UDP) provides connection-free data transfer without error handling or flow control, uses checksum. Used when latency is more important than the data.
The session layer is responsible for coordinating and synchronizing dialogues between sender and receiver processes.
The Presentation layer is responsible for translating, compressing and encryption of application data. The layer adds a header when received from application layer and removes one when sent to application layer.
The application layer is responsible for enabling user services.
There exist two basic user models for applications. The client-server model and the peer-to-peer model. Some applications may decide to use combinations of the different models.
In the client-server model data is passed trough a server which redirects it to another client if they wish to communicate.
Data is passed directly between devices without a middleman.
WWW is built up by three parts.
HTTP uses a TCP-session to send and receive data. Uses host-names to find destination (www.google.com). But TCP/IP uses IP addresses.
To map ip addresses to host-names a Domain Name System is used (DNS).
DNS servers exist in all domain and communicate between domains to share their tables of domain name to IP pairs. A host always knows the IP-address to its closest DNS server.
If a data enters from a higher layer which does not fit in a single data packet a fragmentation is done. The fragmentation works by splitting the data into two parts with new headers, the first part holds the new header and the original header.
The receiver can then reassemble the data from the fragments.
A protocol can specify a MTU which limits the possible size of payloads sent using the protocol.
PSTN nets feature a core network (SONET/SDH) and access networks which connect to the core net. The core net is digital but the access nets are analog.
The access nets transfer information from phones to local base-stations using 0-4kHz frequencies.
The core networks instead use PCM in local station to translate analog data to digita. It transfers data with 8-bit samples. And uses circuit switching by STDM (Synchronous Time Division Multiplexing)
Translating analog signals to digital are done by PCM which works by:
Worldwide telecom stations operate with a standardized protocol "Signaling System #7) by a separate data network.
Internet sends the protocols on the same net as data, often as a part of the data packets header. Has some special protocols like ICMP, ARP and DNS.
In the telecom network data transfers are held separate from protocol data transfers which increases latency for starting or ending connections. It is however very effective data transfers using circuit coupling???.
Cellular nets use access networks and core networks like telecom networks. The network is split into geographic cells (cellular) of which each has a base station and a specific frequency band to minimize interference with other nearby cells.
Many mobile devices must share the same frequency band in a cell and different channelization methods has thus been created. All access in mobile phone networks are also controlled.
Three methods are often combined and used for channeling.
LTE is the fourth generation of mobile networks and uses data packages and is developed for Internet-access instead of telecom and features a higher bandwidth. The higher bandwidth requires much smaller cells, called pico and femto-cells.
To still be able to send voice over these networks "Voice over LTE" was developed.
Circuit switched fallback is used to switch over mobile calls to the GSM/UMTS nets and this requires communications between LTE and GSM/UMTS.