bsit-63-advance computer

112
1 BSIT 63 Advanced Computer Networks Chapter 1 Application Layer T his chapter presents some of the important functions of application layer . Mainly we discus DNS, Email and WWW . 1.1 INTRODUCTION Application layer is the outermost layer o f the TCP/IP architecture. This layer is responsible for many of the user applications such as WWW, EMAIL, FTP , DNS etc, In this chapter the reader will get a basic understanding of the concepts of some popular application layer functions. The lower layers of the TCP/ IP model does support for transport. However , there is still need for some transport functions at application layer which an essential for application to RUN. One for the most important one is DNS. 1.2 DOMAIN NAME SYSTEM ( DNS) It is well known that the IP addresses are used to identify the devices in the internet such as Routers, Servers etc. In the absence of a d omain name for an Email serve r, we wou ld have ended with a representation such as [email protected], [email protected] etc. It can been seen that such a representation is very difficul t to remember that too impossible if there are hundreds of such email ids. If the email server is loaded to a different machine with a different IP address, they above scheme does not work. If this is the case with Email, then how about the thousands of websites? For example, http:// 202.16.70.2/~index.html, is a URL. We need to remember the entire number to acce ss the page. Thus it is clear that the IP addresses are difficult to remember and DNS is a perfect solution to this problem. 1 BSIT 63 Advanced Computer Networks

Upload: helloshibi

Post on 30-Oct-2015

262 views

Category:

Documents


0 download

DESCRIPTION

Advance Computer Network

TRANSCRIPT

Page 1: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 1/112

1BSIT 63 Advanced Computer Networks

Chapter 1

Application Layer

This chapter presents some of the important functions of application layer. Mainly we discus DNS,

Email and WWW.

1.1 INTRODUCTION

Application layer is the outermost layer of the TCP/IP architecture. This layer is responsible for many

of the user applications such as WWW, EMAIL, FTP, DNS etc, In this chapter the reader will get a basic

understanding of the concepts of some popular application layer functions. The lower layers of the TCP/ IP model does support for transport. However, there is still need for some transport functions at application

layer which an essential for application to RUN. One for the most important one is DNS.

1.2 DOMAIN NAME SYSTEM (DNS)

It is well known that the IP addresses are used to identify the devices in the internet such as Routers,

Servers etc. In the absence of a domain name for an Email server, we would have ended with a

representation such as [email protected], [email protected] etc. It can been seen that such a

representation is very difficult to remember that too impossible if there are hundreds of such email ids. If 

the email server is loaded to a different machine with a different IP address, they above scheme does not

work.

If this is the case with Email, then how about the thousands of websites? For example, http:// 

202.16.70.2/~index.html, is a URL. We need to remember the entire number to access the page. Thus

it is clear that the IP addresses are difficult to remember and DNS is a perfect solution to this problem.

1BSIT 63 Advanced Computer Networks

Page 2: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 2/112

2

l we come across many applications which primarily depend upon the IP address. There is a

need to map IP address to a common Generic Name.

l So ASCII characters were introduced to replace IP address. Example [email protected]

where Cs.sjce.ac.in is mapped to the IP address,

l However, such a mapping should not result in conflict.

l Obviously a centralized system can not work because of large number of host names all over

the world. DNS was introduced to alleviate the above problems

Some points on DNS are

l It is a hierarchical scheme

l It employs domain based naming.

l It uses a distributed database.

l Primarily maps host names and E-mail servers to IP addresses.

l Found in RFC 1034, 1035

Working of DNS

An application program calls a library procedure called ‘Resolver’ with its domain name as

parameter. The Resolver sends an UDP packet to the local DNS server. The DNS server searches its

table and returns the IP address which matches the Domain name. Armed with that, the program can

establish a TCP connection or send UDP packets.

DNS Name Space

Attaching random names to IP address and managing them is too nontrivial. So, a structured approach

is needed.

n Best way is to employ the postal addressing system.

l Country

l State

l

Districtl Taluk 

l City

l Street

n Internet is divided into 200 Domains at Top level

Chapter 1 - Application Layer

Page 3: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 3/112

3BSIT 63 Advanced Computer Networks

n Each top-level domain is further divided into subdomain.

n Each subdomain is further divided into one or more levels of subdomains.

n Top level domain can be split into two major classes.l Generic

l Country

Generic domain names includes

com, int, mil, gov, org, net, edu……

biz, info, name (recent addition 2000 Nov) ,

aero, coop, museums (new ones)

Countries: each country has one entry, in, ae, us, jp etc

Top level domain should be unambiguous and non-contentious.

(prof) represents profession such as lawyer, Doctor etc, but how about the professions such as .

Mason, Tailor..? There should be clarity on such aspects while dealing with generic names. Common

generic tree currently used is shown in the diagram below.

Figure 1.1 A portion of the Internet domain name space.

 

Generic Countries

Int com edu gov mil org net jp us nl

Sun yale acm ieee ac co oce vu

Eng cs eng jack jill keio nec cs

Ai linda cs csl flits fluit

Robot pc24

Page 4: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 4/112

4

Domain names are hierarchically arranged and are separated by periods.

Eg. [email protected] and [email protected]

n Domain names are case insensitive for example, Edu, EDU, edu are same. Each componentname can be 63 characters and full path name should not exceed 255 characters.

n Naming follows organizational boundaries and not physical networks.

Resource Records:

n Every domain is associated with a set of records with it.

n To every enquiry, the Resolver will be supplied with Resource Records.

n Thus the primary function of DNS is to map the Domain Names into Resource Records.

n Resource Records have five components.

%Domain Name

%Time to live

%Class

%Type

%Value

I Domain name tell the domain to which this record applies. It is the primary search key.

II Time to live: Indicates how stable the record is. Most stable record has 86400 (the number of 

seconds in 1 day). Unstable records have a duration of 60 (1 minute).

III Class: Its value for internet information, is IN, other codes are used for other application.

IV Type: Tells what kind of record this is,

SOA Start of Authors Parameters for this zone

A IP address 32 bit integer

MX Mail Exchange Domain willing to accept e-mail

NS Name Server Name of a server for this domain

CNAME Canonical name Domain name

PTR Pointer Alias for an IP

HINFO Host description CPU/OS

TXT Text ASCII character

Chapter 1 - Application Layer

Page 5: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 5/112

5BSIT 63 Advanced Computer Networks

1) SOA : Gives the name of the name server zone.

2) A : Gives IP address

3) MX : Gives details about mail server name

4) NS : Gives name server

5) CNAME : Helps in connecting the DNS entry

Cs.mit.edu 86400 IN CNAME Ics.mit.edu

6) PTR : Pointer to another name

7) HINFO : OS/CPU details.

Name Server

DNS name space is divided into non-overlapping zones. Each zone contains some part of the tree and

contains name server holding the information. Zones have one primary server and secondary server.

Consider the example shown below on cs.stanford.edu

Figure 1.2 Domain Name at different levels

 

ROOT

EDU

STANFORD

CS

Page 6: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 6/112

6

We have Domain Name

DN : Edu

DN : Stanford.edu

DN : cs.stanford.edu

A Domain name may be fully qualified or partially qualified,

FQDN: Fully qualified domain name contains full name of a host, contains all labels.

PQDN: Contains few labels.

DOMAIN is a sub tree of  domain name space.

Figure 1.3 Domain name Tree

Domain name space is huge, so it is distributed among many DNS servers.

Root Server

Figure 1.4 Different Domain Spaces

Com edu Domain : .edu

JSS Domain : jss.edu

SJCE Domain : sjce.jss.edu

Arpa Edu Com USServer Server Server Server

bk.edu mit.edu rich.edu mcgrawhill.com CISCO.com

Chapter 1 - Application Layer

Page 7: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 7/112

7BSIT 63 Advanced Computer Networks

Iterative Resolution

Figure 1.5 Iterative resolution

Whenever the DNS server receive a packet, it will check whether it is an authority for the same, if so

it will send the answer to Resolver. If it is not, then it will send the IP address of another server, which it

thinks can resolve the DNS query. The client then sends DNS request to the new DNS server, if it is an

authority, it gives the IP address else. It sends the IP address of anther DNS server. This process is

called iterative resolution. The same idea is given in the figure 1.5

Catching

Whenever the DNS server gets a query for a name resolution, which is not in its domain, it searches

its databases for server IP address and it is cached. Whenever a similar query is encountered, it first

check the cache and return the answer. This increases the speed. TTL is a number in sec ( time in sec)

for which the server can cache the information). After this time the information is invalid and any query

should be sent again to authoritative server.

1.3 EMAIL

Architecture and Services

Electronic mail is the most widely used tool in the present world for fast and reliable communication.

It is based on RFC 822. It has two components from architectural point of view.

 

edu

3 4 mit.edu

1

2

client

Stanford.edu

Page 8: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 8/112

8

User agent (UA)

EMAIL

Message Transfer Agents.

User agents are local programs that provide that can provide Command based or Menu based or

Graphical method for interacting with email system.

Message Transfer agents are system daemons (processes that run in background) that move e-mail

through the system.

An E-mail system support five basic functions.

1) Composition: Helps in creating message and answers, supports many functions such as insertion

of address after extraction from the original message during replying etc.

2) Transfer: Causes movement of message to the destination. Connection establishments and passage

of message is done here.

3) Reporting: Do involve in reporting the origin of email whether it is delivered, lost or abandoned.

4) Disposition: Do involve in invoking certain tools to enable reading email message which come as

attachment. Ex: Adode to read a pdf file attachment.

5) Disposition: Involves, Reading, discarding, savings, replying, forwarding etc.

Additional features of E-mail system

Forwarding: forward email to another email ID

Mail box: storing/retrieving email

Mailing list: Send copies to the entire email list.

Other functions : CC : carbon copy

BCC : Blind copy

High priority

1.3.1 User Agent(UA)

It is a program that accepts wide varieties of commands that support

n Composition

Chapter 1 - Application Layer

Page 9: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 9/112

9BSIT 63 Advanced Computer Networks

n Receiving

n Replying to messages

n Support manipulation of mail box

Some UA have memo/Icon driven interface while other may use commands.

Sending an E-mail:

User must provide a message, destination address and other data.

n Messages are generated using built in editors.

n Destination address follows a format user@dns-address.

n Instead of entering the full address, one can write alias.

n Email can also be sent to a mailing list.

Reading Email: When a user agent in invoked, it looks for mail box and display the information

Is one typical table:

Each line of the display is extracted from the mail envelope or corresponding header.

The user can use any of the following commands

R: Reply

C: Compose

D: Delete

F: Forward

E: Exit

# Flags Bytes Sender Subject

No of 

the

mail

Status: K:

read

already

N : New

Size Sender,

Name

Email

Information

at header

Page 10: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 10/112

10

1.3.2 Message Transfer

The message transfer system is concerned with relaying messages from the originator to the recipient.

The simplest way to do this is to establish a transport connection from the source machine to the destinationmachine and then just transfer the message

SMTP The Simple Mail Transfer Protocol

Within the internet, e-mail is delivered by having the source machine establish a TCP connection to

port 25 of the destination machine. Listening to this port is an email daemon that speaks SMTP ( Simple

Mail Transfer Protocol). This daemon accepts incoming connections and copies message from them into

the appropriate mailboxes. If a message cannot be delivered, an error report containing the first part of 

the undeliverable message is returned to the sender. SMTP is a simple ASCII protocol. After

establishing the TCP connection to port 25, the sending machine, operating as the client, wits for the

receiving machine, operating as the client waits for the receiving machine, operating as the server, to talk fist. The server starts by sending a line of text giving its identity and telling whether it is prepared to

receive a mail. If it is not, the client releases the connection and tries again later.

If the server is willing to accept email, the client announces whom the email is coming from and whom

it is going to. If such a recipient exists at the destination, the server gives the client the go- ahead to send

the message. Then the client sends the message and the server acknowledges it. No checksums are

needed because TCP provide a reliable byte stream. If there is more email, that is now sent. When all the

email has exchanged in both directions, the connection is released. Finally, although the syntax of the four-

character commands from the client is rigidly specified, the syntax of the replies is less rigid. Only the

numerical code really counts. Each implementation can put whatever string it wants after the code.

To get a better feel for how SMTP and some of the other protocols described in this chapter work, try

them out. In all cases, first go to a machine connected to the internet. On a UNIX system, in a shell, type

telnet mail.isp.com 25

substituting the DNS name of your ISP’s mail server for mail.isp.com. On a windows system , click on

start then run , and type the command in the dialog box. This command will establish a telnet ( i.e, TCP)

connection to port 25 on that machine. Port 25 is the SMTP port You will probably get a response some

thing like this:

Trying 192. 30.200.66...

Connected to mail.isp.com

Escape character is ‘^]’.

220 mail.isp.com Smail#74 ready at thu, 25 sept 2002 13: 26 +0200

Chapter 1 - Application Layer

Page 11: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 11/112

11BSIT 63 Advanced Computer Networks

The first three lines are from telnet telling you what it is doing. The last line is from the SMTP server

on the remote machine announcing its willingness to talk to you and accept e-mail.

POP3Unfortunately, this solution creates another problem: how does the user get the email from the ISP’s

message transfer agent? The solution to this problem is to create another protocol that allows user transfer

agents ( on client PCs) to contact the message transfer agent ( on the ISP’s machine) and allow email to

be copied from the ISP to the user. One such protocol is POP3 ( Post office Protocol Version 3) , which

is described in RFC 1939.

The situation that is used to hold ( both sender and receiver having a permanent connection to the

Internet) is illustrated in fig 1.19.

 

Sending

host

SMTP  Internet

Message

transferagent Useragent

Receiving

host

Mail

BoxPermanent connection

.

SMTP

Internet

Message

transfer

agent User agent

Receiving

host

Permanentconnection

Mail BoxSending

host

Figure 1.19 TCP Connection and message transfer with POP3

Page 12: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 12/112

12

POP3 begins when the user starts the mail reader. The mail reader calls up the ISP ( Unless there is

already a connection) and establishes a TCP connection With the message transfer agent at port 110.

Once the connection has been established, the POP3 protocol goes through three states in sequence:

1. Authorization.

2. Transactions.

3. Update.

The authorization state deals with having the user log in. The transaction state deals with the user

collecting the emails and marking them for deletion from the mailbox. The update state actually causes

the emails to be deleted.

This behavior can be observed by typing something like:

telnet mail.isp.com 110

Where mail.isp.com represents DNS name of your ISP’s mail server. Telnet establishes a TCP

connection to port 110, on which the POP3 server listens. Upon accepting the TCP connection, the server

sends an ASCII message announcing that it present. Usually , it begins with +OK followed by a comment

. An example scenario is shown in fig 7-16 starting after the TCP connection has been established . As

before, the lines marked C: are from the client ( User) and those marked S: are from the server ( message

transfer agent on the ISP’s machine).

During the authorization state, the client sends over its user name and then its password. After a

successful login, the client can then send over the LIST command, which causes the server to list the

contents of the mailbox, one message per line, giving the length of that message . The list is terminated bya period.

Then the client can retrieve messages using RETR command and mark them for deletion with DELE.

When all messages have been retrieved ( and possibly marked for deletion), the client gives the QUIT

command to terminate the transaction state and enter the update state. When the server has deleted all

the messages , it sends a reply and breaks the TCP connection. While it is true that the POP3 protocol

supports the ability to download a specific message or set of messages and leave them on the server, most

email programs just download everything and empty the mail box. This behavior means that in practice,

the only copy is on the user’s hard disk . If that crashes, all email may be lost permanently.

1.4 WORD WIDE WEB (WWW)

- It is an architectural frame work for accessing linked documents.

- Linked documents are present across many machines all over Internet.

Chapter 1 - Application Layer

Page 13: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 13/112

13BSIT 63 Advanced Computer Networks

- It is a powerful GUI that presents the required information in a attractive way for the user.

- First graphical browser was developed by Marc Andreessen of University of Illinois in the year

1993 and named it as Mosaic.

- Netscape is another browser ( 1994)

- IE is the default windows based browser.

Architectural Overview

From users point of view, www is a collection of web documents ( Web Pages ) or simply pages.

- Each page contain links to other pages which may be present elsewhere on machines in the

internet.

- The idea of one page pointing to another page is called hypertext.

- Pages are viewed with a program called browser, browser fetches the requested pages, formatsand displays.

- On a web page, strings of texts which an underlined are links to other web pages. These are

called hyperlinks.

- Page fetching is done by the browser. Users work is only to click the mouse button on the

required link.

Figure 1.6 Server connection on the Internet

Server No.1 Server No.2 Server 3

xyz.com abc.com

abc.com 

x z.com 

D ……… 

D ………  ……… 

ws  ws  ws 

TCP : Port 80

INTERNET CLOUD

Page 14: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 14/112

14

The entire process of obtaining the web pages on the client machine in response to a click on the URL

falls into two major processes.

1 The dynamics happening on the client machine

2 The dynamics happening on the server machine.

These are described below.

1.4.1 Client Side

- Browser follows the hyperlinks on the web pages, so the hyperlinks needs a way to name the

pages on other machines in the web.

- Web pages are named using Uniform Resource Locators (URL)

For example, http: // www.abc.com/ index.html

A URL has three parts

- Name of the protocol ( http )

- DNS name of the machine where the page is located

- Name of the file containing the page.

When a hyperlink is clicked,

- The browser locate the URL.

- The browser ask DNS for IP address.

- DNS replies with IP address.

- Browser makes TCP connection to port 80 on the machine with the above IP address.

- Browser sends a request for the specific file.

- The server sends the required file.

- TCP connection is closed.

- Browser display all text info.

- Browser display all images.

- For uniformity in understanding, web pages are written in a standard language HTML.

Chapter 1 - Application Layer

Page 15: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 15/112

15BSIT 63 Advanced Computer Networks

Web browser is actually an html interpreter. Browser have many buttons which will provide facility for

easy navigation,

Eg - Previous page

- Next page

- Book Mark etc.

- Not all web pages contain HTML

- Web pages may also include PDF, JPEG, MP3, MPEG data.

- So a general approach is used to represent them. The server along with the web pages also

sends additional information about the page. This information uses MIME format. ( RFC 1341

) Multipurpose Internet Email Extension.

- Whenever the browser encounters a Format not available readily, it consults its MIME table to

understand how to display the page.

Two possibilities exists.

1. Use of plug-ins.

2. Use of helper application.

Use of plug in

A plug in is a code module that the browser fetches from a special directory in the disk and installs thisas an extension to itself.

Thus plug-ins runs inside the browser and therefore it has access to the current page and display it.

The plug - ins are removed after the application.

Figure 1.7 Browser and Plug-in

BROWSER

Base code

Browser Runs as a Single process

PLUG-IN

Plug in interface used by browser

Browser interface used by plug- in

Page 16: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 16/112

16

- There will be codes which are specific to browser’s plug-in. Plug-in are pre- installed in windows.

- On Unix the installer is a shell script.

Helper application

This is another way to display the MIME documents. Helper application is a separate process. Helper

application are large programs that do not have any 1/f with browser . They accepts the name of the file

and simply open them. Eg. Adobe, word. So URL can directly point to a PDF or a word document

directly. Other helper application include

Adobe photo shop - image | x- Photoshop

Real one player audio | mp3

Browser can also fetch local files. They heavily depend upon file extension than those Mime types.

1.4.2 Server Side Operation

Upon clicking a URL, the server side offers the following operations.

1. Accepts a TCP connection from a client.

2. Get the name of the file requested disk.

3. Get the file from the disk.

4. Return the file to the client.

5. Release the TCP connection

- Problems with this type is the disk access with every request

- SCSI disk have a disc access time of 5 ms. So it permits 200 disks access per second.

- It is still lower if the files are larger.

- To overcome this, the web server maintain a large cache space which holds ‘ n ’ most recent

files. Whenever a request comes, the server first look into caches and respond appropriately.

- To make the server faster, multithreading is adapted.

- There exists different concepts and design in one design. The server has a front end module and

k processing modules ( threads). The processing modules have access to the cache. The front

end module accepts input request and pass it to one of the module. The processing module

Chapter 1 - Application Layer

Page 17: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 17/112

17BSIT 63 Advanced Computer Networks

verifies the cache and respond if the file exists else it invokes disk search and caches the file

and also send the file to the client.

At any instant of time ‘t’ out of k modules, K-X modules may be few to take requests, X modules maybe in the queue waiting for disk access and cache search. If the number of disks are enhanced then it is

possible to enhance the speed.

Figure 1.8 A Multi-threaded Web Server

Each Module does the following.

1. Resolve the name of the Web page requested.

Eg: http:// www.cisco.com

There is no file name here. Default is index .html.

2. Authentication of client

needed because some pages are not available for public.

3. Perform access control on the client check to see if there are any restrictions.

4. Perform access control on the web page. Access restrictions on the page itself.

5. Check the cache.

6. Fetch the requested page.

 CACHE

Front end

- - - - - - - K Processes

K - Module

Threads

In coming

request.Out going

reply

Page 18: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 18/112

18

7. Determine MIME type

8. Take care of miscellaneous address ends.

( Building User profile, Satisfaction.)

9. Return the reply to the client.

10. Make an entry in the server log.

if too many requests come in each second, the CPU will not be able to handle the processing load,

irrespective of no of disks in parallel. The solution is to add more machine with replicated disks. This is

called server form. A front end still accepts the request and sprays them to all CPUs rather than multiple

threads to reduce the load on that machine. Individual machines are again Multithreaded with Multiple

disks

Front End

Router

LAN

Figure 1.9 A Server Farm

It is to be seen that cache is local to each machine. TCP connection should terminate at processing

node and not at front end.

URL

An URL need to address

1. What is the page called ?

2. Where the page is located ?

3. How can the page be accessed ?

http:// www.sjce.ac.in

http:// www.sjce.ac.in/~tnn

Chapter 1 - Application Layer

Page 19: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 19/112

19BSIT 63 Advanced Computer Networks

Some of the common URLS include, http, ftp, file, mailto, telnet, etc.

1.5 SUMMARY

In this chapter we presented technologies pertaining to some popular application layer functions. We

provided the details about the DNS, Email and WWW. More details on these and other applications such

as http, ftp, telnet etc can read from the reference book.

1.6 QUESTIONS

1. List the functions of application layer 

2. What is DNS?

3. Explain the working of DNS with an example

4. What is iterative resolution? Give example

5. What are the functions of the user agent in the Email architecture?

6. Discuss the sending and receiving process in Email?

7. Write a brief note on SMTP?

8. Discuss the working of POP3 in an Email system? What are its limitations?

9. What is www?

10. Discuss the architecture of WWW?

11. Explain the client side and server side events when a user click on a URL?

12. Explain what is a server farm? Give an example.

Page 20: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 20/112

20

Chapter 2

Routing Protocols

The main objectives of this chapter are

l To discuss the two types of connections for effecting datagram transfer between networks

l Discuss direct and indirect Routing

l Discuss different Routing protocols

2.1 INTRODUCTION

One of the main objectives of the network layer is to deliver the packets to the destination. The

delivery of packets is often accomplished using either a connection-oriented or a connectionless

network service. In a connection-oriented approach, the network layer protocol first makes a

connection with the network layer protocol at the remote site before sending a packet. When the connection

is established, a sequence of packets from the same source to the same destination can be sent one after

another. In this case, there is a relationship between packets. They are sent on the same path where they

follow each other. A packet is logically connected to the packet traveling before it and to packet traveling

after it. When all packets of a message have been delivered, the connection is terminated. In a connection-

oriented approach, the decision about the route of a sequence of packets with the same source anddestination addresses can be made only once, when the connection is established. The network device

will not compute the route again and again for each arriving packet. In a connectionless situation, the

network protocol treats each packet independently, with each packet having no relationship to any other

packet. The packets in a message may not travel the same path to their destination. The internet protocol

(IP) is a connectionless protocol. It handles each packet transfer in a separate way. This means each

20

Chapter 2 - Routing Protocols

Chapter 2 - Routing Protocols

Page 21: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 21/112

21BSIT 63 Advanced Computer Networks

packet travel through different networks before settling to their destination network. Thus the packets

move through heterogeneous networks using connection less IP protocol.

2.2 DIRECT AND INDIRECT ROUTING

There exits two approaches for the final delivery of the IP packets. In the Direct delivery, the final

destination of the packet is a host connected to the same physical network as the deliverer (Figure 1).

Direct delivery occurs when the source and destination of the packet are located on the same physical

network or if the delivery is between the last router and the destination host.

Figure 2.1 Direct Delivery of packets with in the same network

The sender can easily determine if the delivery is direct. It can extract the network address of the

destination packet (Mask all the bits of the Host address) and compare this address with the addresses of 

the networks to which it is connected. If a match is found, then the delivery is direct. In direct delivery,

the sender uses the destination IP address to find the destination physical address. The IP software then

delivers the destination IP address with the destination physical address to the data link layer for actual

delivery. In practical sense a protocol called address resolution protocol (ARP) dynamically maps an IP

address to the corresponding physical address. It is to be noted that the IP address is a FOUR byte code

where as the Physical address is a SIX byte code. The Physical address is also called as MAC address,

Ethernet address and hardware address.

When the network part of the IP address does not match with the network address to which the host

is connected, the packet is delivered indirectly. In an indirect delivery, the packet goes from router to

router until it reaches the one connected to the same physical network as its final destination ( Figure 2.1).

l Note that a delivery always involves one direct delivery but zero or more indirect deliveries.

 

Host 1 Host 2

Network Host 3

Page 22: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 22/112

22

l Note also that the last delivery is always a direct delivery. In an indirect delivery, the sender uses

the destination IP address and a routing table to find the IP address of the next router to which

the packet should be delivered.

l The sender then uses the ARP protocol to find the physical address of the next router. Note

that in direct delivery, the address mapping is between the IP address of the final destination and

the physical address of the final destination.

l In an indirect delivery, the address mapping is between the IP address of the next router and the

physical address of the next router.

Figure 2.2 Indirect Delivery

Routing tables are used in the routers. The routing table contain the list of IP addresses of neighboringrouters. When a router has received a packet to be forwarded, it looks at this table to find the route to the

final destination. However, this simple solution is impossible today in an Internetwork such as the Internet

because the number of entries in the routing table make table lookups inefficient. Several techniques can

make the size of the routing table manageable and handle such issues as security.

Host 5Host 6

Ho st 1Host 2 H ost 3

Hos t 4

Router

Router

Network 1 Network 2

Ne twork 3

Chapter 2 - Routing Protocols

Page 23: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 23/112

23BSIT 63 Advanced Computer Networks

2.3 OTHER FORMS OF ROUTING

To manage such large entries in the routing table following techniques are used

1. Next hop Routing

2. Network specific Routing

3. Host specific Routing

4. Default routing

Next-hop routing

One technique to make the contents of a routing table smaller is called next-hop routing. In this

technique, the routing table holds only the address of the next hop instead of holding information about the

complete route. Routing tables are thereby consistent with each other.

Network-specific routing

A second technique to make the routing table smaller and the searching process simpler is called

network-specific routing. Here, instead of having an entry for every host connected to the same

physical network, we have only one entry to define the address of the network itself. In other words, we

treat all hosts connected to the same network as only single entity. For example, if 1,000 hosts are

attached to the same network, only one entry exists in the routing table instead of 1,00.

Host-specific routing

In host-specific routing, the host address is given in the routing table. The idea of host-specific

routing is the inverse of network-specific routing. Here efficiency is sacrificed for other advantages:

Although it is not efficient to put the host address in the routing table, there are occasions in which the

administrator wants to have more control over routing. Host-specific routing is a good choice for certain

purposes such as checking the route or providing security measure.

Default routing

Another technique used to simplify routing is default routing. In Figure 6.6 host A is connected to a

network with two routers. Router R1 is used to route the packets to hosts connected to network N2.

However, for the rest of the Internet, router R2 should be used. So instead of listing all networks in the

entire Internet, host A can just have one entry called the default (network address 0.0.0.0).

A host or a router keeps a routing table, with an entry for each destination, to route IP packets. The

routing table can be either static or dynamic.

Page 24: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 24/112

24

2.4 STATIC ROUTING TABLE

A static routing table contains information entered manually. The administration enters the route form

each destination into the table. When a table is created, it cannot update automatically when there is achange in the Internet. The table must be manually altered by the administrator. A static routing table can

be used in a small internet that does not change very much, or in an experimental internet for troubleshooting.

It is not a good strategy to use a static routing table in a big internet such as the Internet.

2.5 DYNAMIC ROUTING TABLE

A dynamic routing table is updated periodically using one of the dynamic routing protocols such as RIP,

OSPF, or BGP. Whenever there is a change in the Internet, such as the shutdown of a router or breaking

of a link, the dynamic routing protocols update all of the tables in the routers.

2.6 ROUTING INFORMATION PROTOCOL (RIP)

The Routing Information Protocol, or RIP, as it is more commonly called, is one of the most enduring

of all routing protocols. RIP is also one of the more easily confused protocols because a variety of RIP-

like routing protocols proliferated, some of which even used the same name! RIP and the myriad RIP-

like protocols were based on the same set of algorithms that use distance vectors to mathematically

compare routes to identify the best path to any given destination address.

Today’s open standard version of RIP, sometimes referred to as IP RIP, is formally defined in two

documents: Request For Comments (RFC) 1058 and Internet Standard (STD) 56. As IP-based networks

became both more numerous and greater in size, it became apparent to the Internet Engineering Task 

Force (IETF) that RIP needed to be updated. Consequently, the IETF released RFC 1388 in January

1993, which was then superceded in November 1994 by RFC 1723, which describes RIP 2 (the second

version of RIP). These RFCs described an extension of RIP’s capabilities but did not attempt to obsolete

the previous version of RIP. RIP 2 enabled RIP messages to carry more information, which permitted the

use of a simple authentication mechanism to secure table updates. More importantly, RIP 2 supported

subnet masks, a critical feature that was not available in RIP.

Routing UpdatesRIP sends routing-update messages at regular intervals and when the network topology changes.

When a router receives a routing update that includes changes to an entry, it updates its routing table to

reflect the new route. The metric value for the path is increased by 1, and the sender is indicated as the

next hop. RIP routers maintain only the best route (the route with the lowest metric value) to a destination.

After updating its routing table, the router immediately begins transmitting routing updates to inform other

Chapter 2 - Routing Protocols

Page 25: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 25/112

25BSIT 63 Advanced Computer Networks

network routers of the change. These updates are sent independently of the regularly scheduled updates

that RIP routers send.

RIP Routing MetricRIP uses a single routing metric (hop count) to measure the distance between the source and a

destination network. Each hop in a path from source to destination is assigned a hop count value, which is

typically 1. When a router receives a routing update that contains a new or changed destination network 

entry, the router adds 1 to the metric value indicated in the update and enters the network in the routing

table. The IP address of the sender is used as the next hop.

RIP Stability Features

RIP prevents routing loops from continuing indefinitely by implementing a limit on the number of hops

allowed in a path from the source to a destination. The maximum number of hops in a path is 15. If a

router receives a routing update that contains a new or changed entry, and if increasing the metric value

by 1 causes the metric to be infinity (that is, 16), the network destination is considered unreachable. The

downside of this stability feature is that it limits the maximum diameter of a RIP network to less than 16

hops.

RIP includes a number of other stability features that are common to many routing protocols. These

features are designed to provide stability despite potentially rapid changes in a network’s topology. For

example, RIP implements the split horizon and hold down mechanisms to prevent incorrect routing

information from being propagated.

RIP Timers

RIP uses numerous timers to regulate its performance. These include a routing-update timer, a route-

timeout timer, and a route-flush timer. The routing-update timer clocks the interval between periodic

routing updates. Generally, it is set to 30 seconds, with a small random amount of time added whenever

the timer is reset. This is done to help prevent congestion, which could result from all routers simultaneously

attempting to update their neighbors. Each routing table entry has a route-timeout timer associated with it.

When the route-timeout timer expires, the route is marked invalid but is retained in the table until the

route-flush timer expires.

Packet Formats

The following section focuses on the IP RIP and IP RIP 2 packet formats illustrated in Figures 2.3 and2.4. Each illustration is followed by descriptions of the fields illustrated.

RIP Packet Format

Figure 2.3 illustrates the IP RIP packet format.

Page 26: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 26/112

26

An IP RIP Packet Consists of Nine Fields

Figure 2.3 Illustrates the IP RIP packet format.

The following descriptions summarize the IP RIP packet format fields illustrated in Figure 2.3

· Command—Indicates whether the packet is a request or a response. The request asks that a

router send all or part of its routing table. The response can be an unsolicited regular routing

update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are

used to convey information from large routing tables.

· Version number—Specifies the RIP version used. This field can signal different potentially

incompatible versions.

· Zero—This field is not actually used by RFC 1058 RIP; it was added solely to provide backward

compatibility with pre-standard varieties of RIP. Its name comes from its defaulted value: zero.

· Address-family identifier (AFI)—Specifies the address family used. RIP is designed to carry

routing information for several different protocols. Each entry has an address-family identifier

to indicate the type of address being specified. The AFI for IP is 2.

· Address—Specifies the IP address for the entry.

· Metric—Indicates how many internetwork hops (routers) have been traversed in the trip to the

destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route.

RIP 2 Packet Format

The RIP 2 specification (described in RFC 1723) allows more information to be included in RIP

packets and provides a simple authentication mechanism that is not supported by RIP. Figure 2.4 shows

the IP RIP 2 packet format.

Figure2.4 : An IP RIP 2 Packet Consists of Fields Similar to Those of an IP RIP Packet

Chapter 2 - Routing Protocols

Page 27: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 27/112

27BSIT 63 Advanced Computer Networks

The following descriptions summarize the IP RIP 2 packet format fields illustrated in Figure 2.4 :

· Command—Indicates whether the packet is a request or a response. The request asks that a

router send all or a part of its routing table. The response can be an unsolicited regular routing

update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are

used to convey information from large routing tables.

· Version—Specifies the RIP version used. In a RIP packet implementing any of the RIP 2

fields or using authentication, this value is set to 2.

· Unused—Has a value set to zero.

· Address-family identifier (AFI)—Specifies the address family used. RIPv2’s AFI field

functions identically to RFC 1058 RIP’s AFI field, with one exception: If the AFI for the first

entry in the message is 0xFFFF, the remainder of the entry contains authentication information.

Currently, the only authentication type is simple password.

· Route tag—Provides a method for distinguishing between internal routes (learned by RIP) and

external routes (learned from other protocols).

· IP address—Specifies the IP address for the entry.

· Subnet mask—Contains the subnet mask for the entry. If this field is zero, no subnet mask has

been specified for the entry.

· Next hop—Indicates the IP address of the next hop to which packets for the entry should be

forwarded.

· Metric—Indicates how many internetwork hops (routers) have been traversed in the trip to the

destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route.

2.7 OPEN SHORTEST PATH FIRST

Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks

by the Interior Gateway Protocol (IGP) working group of the Internet Engineering Task Force (IETF).

The working group was formed in 1988 to design an IGP based on the Shortest Path First (SPF) algorithm

for use in the Internet. Similar to the Interior Gateway Routing Protocol (IGRP), OSPF was createdbecause in the mid-1980s, the Routing Information Protocol (RIP) was increasingly incapable of serving

large, heterogeneous internetworks. This chapter examines the OSPF routing environment, underlying

routing algorithm, and general protocol components.

OSPF was derived from several research efforts, including Bolt, Beranek, and Newman’s (BBN’s)

SPF algorithm developed in 1978 for the ARPANET (a landmark packet-switching network developed in

Page 28: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 28/112

28

the early 1970s by BBN), Dr. Radia Perlman’s research on fault-tolerant broadcasting of routing information

(1988), BBN’s work on area routing (1986), and an early version of OSI’s Intermediate System-to-

Intermediate System (IS-IS) routing protocol.

OSPF has two primary characteristics. The first is that the protocol is open, which means that its

specification is in the public domain. The OSPF specification is published as Request For Comments

(RFC) 1247. The second principal characteristic is that OSPF is based on the SPF algorithm, which

sometimes is referred to as the Dijkstra algorithm, named for the person credited with its creation.

OSPF is a link-state routing protocol that calls for the sending of link-state advertisements (LSAs) to

all other routers within the same hierarchical area. Information on attached interfaces, metrics used, and

other variables is included in OSPF LSAs. As OSPF routers accumulate link-state information, they use

the SPF algorithm to calculate the shortest path to each node.

As a link-state routing protocol, OSPF contrasts with RIP and IGRP, which are distance-vector routing

protocols. Routers running the distance-vector algorithm send all or a portion of their routing tables in

routing-update messages to their neighbors.

Routing Hierarchy

Unlike RIP, OSPF can operate within a hierarchy. The largest entity within the hierarchy is the

autonomous system (AS), which is a collection of networks under a common administration that share a

common routing strategy. OSPF is an intra-AS (interior gateway) routing protocol, although it is capable

of receiving routes from and sending routes to other ASs.

An AS can be divided into a number of areas, which are groups of contiguous networks and attached

hosts. Routers with multiple interfaces can participate in multiple areas. These routers, which are called

Area Border Routers, maintain separate topological databases for each area.

A topological database is essentially an overall picture of networks in relationship to routers. The

topological database contains the collection of LSAs received from all routers in the same area. Because

routers within the same area share the same information, they have identical topological databases.

The term domain sometimes is used to describe a portion of the network in which all routers have

identical topological databases. Domain is frequently used interchangeably with AS.

An area’s topology is invisible to entities outside the area. By keeping area topologies separate, OSPF

passes less routing traffic than it would if the AS were not partitioned.

Area partitioning creates two different types of OSPF routing, depending on whether the source and

the destination are in the same or different areas. Intra-area routing occurs when the source and destination

are in the same area; interarea routing occurs when they are in different areas.

Chapter 2 - Routing Protocols

Page 29: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 29/112

29BSIT 63 Advanced Computer Networks

An OSPF backbone is responsible for distributing routing information between areas. It consists of all

Area Border Routers, networks not wholly contained in any area, and their attached routers. Figure 2.5

shows an example of an internetwork with several areas.

In the figure, routers 4, 5, 6, 10, 11, and 12 make up the backbone. If Host H1 in Area 3 wants to send

a packet to Host H2 in Area 2, the packet is sent to Router 13, which forwards the packet to Router 12,

which sends the packet to Router 11. Router 11 then forwards the packet along the backbone to Area

Border Router 10, which sends the packet through two intra-area routers (Router 9 and Router 7) to be

forwarded to Host H2.

The backbone itself is an OSPF area, so all backbone routers use the same procedures and algorithms

to maintain routing information within the backbone that any area router would. The backbone topology is

invisible to all intra-area routers, as are individual area topologies to the backbone.

Areas can be defined in such a way that the backbone is not contiguous. In this case, backbone

connectivity must be restored through virtual links. Virtual links are configured between any backbone

routers that share a link to a nonbackbone area and function as if they were direct links.

Figure2.5 An OSPF AS Consists of Multiple Areas Linked by Routers

Page 30: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 30/112

30

AS border routers running OSPF learn about exterior routes through exterior gateway protocols (EGPs),

such as Exterior Gateway Protocol (EGP) or Border Gateway Protocol (BGP), or through configuration

information.

SPF Algorithm

The Shortest Path First (SPF) routing algorithm is the basis for OSPF operations. When an SPF

router is powered up, it initializes its routing-protocol data structures and then waits for indications from

lower-layer protocols that its interfaces are functional.

After a router is assured that its interfaces are functioning, it uses the OSPF Hello protocol to acquire

neighbors, which are routers with interfaces to a common network. The router sends hello packets to its

neighbors and receives their hello packets. In addition to helping acquire neighbors, hello packets also act

as keepalives to let routers know that other routers are still functional.

On multiaccess networks (networks supporting more than two routers), the Hello protocol elects a

designated router and a backup designated router. Among other things, the designated router is responsible

for generating LSAs for the entire multiaccess network. Designated routers allow a reduction in network 

traffic and in the size of the topological database.

When the link-state databases of two neighboring routers are synchronized, the routers are said to be

adjacent. On multiaccess networks, the designated router determines which routers should become adjacent.

Topological databases are synchronized between pairs of adjacent routers. Adjacencies control the

distribution of routing-protocol packets, which are sent and received only on adjacencies.

Each router periodically sends an LSA to provide information on a router’s adjacencies or to inform

others when a router’s state changes. By comparing established adjacencies to link states, failed routers

can be detected quickly, and the network’s topology can be altered appropriately. From the topological

database generated from LSAs, each router calculates a shortest-path tree, with itself as root. The

shortest-path tree, in turn, yields a routing table.

Packet Format

All OSPF packets begin with a 24-byte header, as illustrated in Figure 2.6.

Figure2.6: OSPF Packets Consist of Nine Fields

Chapter 2 - Routing Protocols

Page 31: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 31/112

31BSIT 63 Advanced Computer Networks

The following descriptions summarize the header fields illustrated in Figure 46-2.

l Version number—Identifies the OSPF version used.

l Type—Identifies the OSPF packet type as one of the following:

m Hello—Establishes and maintains neighbor relationships.

m Database description—Describes the contents of the topological database. These

messages are exchanged when an adjacency is initialized.

m Link-state request—Requests pieces of the topological database from neighbor routers.

These messages are exchanged after a router discovers (by examining database-description

packets) that parts of its topological database are outdated.

m Link-state update—Responds to a link-state request packet. These messages also are

used for the regular dispersal of LSAs. Several LSAs can be included within a single link-

state update packet.

m Link-state acknowledgment—Acknowledges link-state update packets.

l Packet length—Specifies the packet length, including the OSPF header, in bytes.

l Router ID—Identifies the source of the packet.

l Area ID—Identifies the area to which the packet belongs. All OSPF packets are associated

with a single area.

l Checksum—Checks the entire packet contents for any damage suffered in transit.

l Authentication type—Contains the authentication type. All OSPF protocol exchanges are

authenticated. The authentication type is configurable on per-area basis.

l Authentication—Contains authentication information.

l Data—Contains encapsulated upper-layer information.

Additional OSPF Features

Additional OSPF features include equal-cost, multipath routing, and routing based on upper-layer type-

of-service (TOS) requests. TOS-based routing supports those upper-layer protocols that can specifyparticular types of service. An application, for example, might specify that certain data is urgent. If OSPF

has high-priority links at its disposal, these can be used to transport the urgent datagram.

OSPF supports one or more metrics. If only one metric is used, it is considered to be arbitrary, and

TOS is not supported. If more than one metric is used, TOS is optionally supported through the use of a

separate metric (and, therefore, a separate routing table) for each of the eight combinations created by

Page 32: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 32/112

32

the three IP TOS bits (the delay, throughput, and reliability bits). For example, if the IP TOS bits specify

low delay, low throughput, and high reliability, OSPF calculates routes to all destinations based on this

TOS designation.

IP subnet masks are included with each advertised destination, enabling variable-length subnet masks.

With variable-length subnet masks, an IP network can be broken into many subnets of various sizes. This

provides network administrators with extra network-configuration flexibility.

2.8 BORDER GATEWAY PROTOCOL - BGP

The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol. An autonomous

system is a network or group of networks under a common administration and with common routing

policies. BGP is used to exchange routing information for the Internet and is the protocol used between

Internet service providers (ISP). Customer networks, such as universities and corporations, usually employ

an Interior Gateway Protocol (IGP) such as RIP or OSPF for the exchange of routing information within

their networks. Customers connect to ISPs, and ISPs use BGP to exchange customer and ISP routes.

When BGP is used between autonomous systems (AS), the protocol is referred to as External BGP

(EBGP). If a service provider is using BGP to exchange routes within an AS, then the protocol is referred

to as Interior BGP (IBGP). Figure 2.7 illustrates this distinction.

Figure2.7 External and Interior BGP

Chapter 2 - Routing Protocols

Page 33: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 33/112

33BSIT 63 Advanced Computer Networks

BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing

protocol employed on the Internet. At the time of this writing, the Internet BGP routing tables number

more than 90,000 routes. To achieve scalability at this level, BGP uses many route parameters, called

attributes, to define routing policies and maintain a stable routing environment.

In addition to BGP attributes, classless interdomain routing (CIDR) is used by BGP to reduce the size

of the Internet routing tables. For example, assume that an ISP owns the IP address block 195.10.x.x

from the traditional Class C address space. This block consists of 256 Class C address blocks, 195.10.0.x

through 195.10.255.x. Assume that the ISP assigns a Class C block to each of its customers. Without

CIDR, the ISP would advertise 256 Class C address blocks to its BGP peers. With CIDR, BGP can

supernet the address space and advertise one block, 195.10.x.x. This block is the same size as a traditional

Class B address block. The class distinctions are rendered obsolete by CIDR, allowing a significant

reduction in the BGP routing tables.

BGP neighbors exchange full routing information when the TCP connection between neighbors is firstestablished. When changes to the routing table are detected, the BGP routers send to their neighbors only

those routes that have changed. BGP routers do not send periodic routing updates, and BGP routing

updates advertise only the optimal path to a destination network.

BGP Attributes

Routes learned via BGP have associated properties that are used to determine the best route to a

destination when multiple paths exist to a particular destination. These properties are referred to as BGP

attributes, and an understanding of how BGP attributes influence route selection is required for the design

of robust networks. This section describes the attributes that BGP uses in the route selection process:

l Weight

l Local preference

l Multi-exit discriminator

l Origin

l AS_path

l Next hop

l Community

Weight Attribute

Weight is a Cisco-defined attribute that is local to a router. The weight attribute is not advertised to

neighboring routers. If the router learns about more than one route to the same destination, the route with

the highest weight will be preferred. In Figure 2.8, Router A is receiving an advertisement for network 

Page 34: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 34/112

34

172.16.1.0 from routers B and C. When Router A receives the advertisement from Router B, the associated

weight is set to 50. When Router A receives the advertisement from Router C, the associated weight is

set to 100. Both paths for network 172.16.1.0 will be in the BGP routing table, with their respective

weights. The route with the highest weight will be installed in the IP routing table.

Figure2.8BGP Weight Attribute

Local Preference Attribute

The local preference attribute is used to prefer an exit point from the local autonomous system (AS).

Unlike the weight attribute, the local preference attribute is propagated throughout the local AS. If there

are multiple exit points from the AS, the local preference attribute is used to select the exit point for a

specific route. In Figure 2.9, AS 100 is receiving two advertisements for network 172.16.1.0 from AS

200. When Router A receives the advertisement for network 172.16.1.0, the corresponding local preference

is set to 50. When Router B receives the advertisement for network 172.16.1.0, the corresponding local

preference is set to 100. These local preference values will be exchanged between routers A and B.

Because Router B has a higher local preference than Router A, Router B will be used as the exit point

from AS 100 to reach network 172.16.1.0 in AS 200.

Figure2.9 BGP Local Preference Attribute

Chapter 2 - Routing Protocols

Page 35: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 35/112

35BSIT 63 Advanced Computer Networks

Multi-Exit Discriminator Attribute

The multi-exit discriminator (MED) or metric attribute is used as a suggestion to an external AS

regarding the preferred route into the AS that is advertising the metric.

The term suggestion is used because the external AS that is receiving the MEDs may be using other

BGP attributes for route selection. We will cover the rules regarding route selection in the next section. In

Figure 2.10, Router C is advertising the route 172.16.1.0 with a metric of 10, while Route D is advertising

172.16.1.0 with a metric of 5. The lower value of the metric is preferred, so AS 100 will select the route

to router D for network 172.16.1.0 in AS 200. MEDs are advertised throughout the local AS.

Origin Attribute

The origin attribute indicates how BGP learned about a particular route. The origin attribute can

have one of three possible values:

l IGP—The route is interior to the originating AS. This value is set when the network router

configuration command is used to inject the route into BGP.

l EGP—The route is learned via the Exterior Border Gateway Protocol (EBGP).

l Incomplete—The origin of the route is unknown or learned in some other way. An origin of 

incomplete occurs when a route is redistributed into BGP.

The origin attribute is used for route selection and will be covered in the next section.

Figure2.10 BGP Multi-Exit Discriminator Attribute

Page 36: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 36/112

36

AS_path Attribute

When a route advertisement passes through an autonomous system, the AS number is added to an

ordered list of AS numbers that the route advertisement has traversed. Figure 2.11 shows the situation inwhich a route is passing through three autonomous systems.

AS1 originates the route to 172.16.1.0 and advertises this route to AS 2 and AS 3, with the AS_path

attribute equal to {1}. AS 3 will advertise back to AS 1 with AS-path attribute {3,1}, and AS 2 will

advertise back to AS 1 with AS-path attribute {2,1}. AS 1 will reject these routes when its own AS

number is detected in the route advertisement. This is the mechanism that BGP uses to detect routing

loops. AS 2 and AS 3 propagate the route to each other with their AS numbers added to the AS_path

attribute. These routes will not be installed in the IP routing table because AS 2 and AS 3 are learning a

route to 172.16.1.0 from AS 1 with a shorter AS_path list.

Next-Hop AttributeThe EBGP next-hop attribute is the IP address that is used to reach the advertising router. For EBGP

peers, the next-hop address is the IP address of the connection between the peers. For IBGP, the EBGP

next-hop address is carried into the local AS, as illustrated in Figure 2.12.

Figure2.11BGP AS-path Attribute

Chapter 2 - Routing Protocols

Page 37: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 37/112

37BSIT 63 Advanced Computer Networks

Figure2.12 BGP Next-Hop Attribute

Router C advertises network 172.16.1.0 with a next hop of 10.1.1.1. When Router A propagates this

route within its own AS, the EBGP next-hop information is preserved. If Router B does not have routing

information regarding the next hop, the route will be discarded. Therefore, it is important to have an IGP

running in the AS to propagate next-hop routing information.

Community Attribute

The community attribute provides a way of grouping destinations, called communities, to which routing

decisions (such as acceptance, preference, and redistribution) can be applied. Route maps are used to set

the community attribute. Predefined community attributes are listed here:

l no-export—Do not advertise this route to EBGP peers.

l no-advertise—Do not advertise this route to any peer.

l internet—Advertise this route to the Internet community; all routers in the network belong to

it.

Figure 2.13 illustrates the no-export community. AS 1 advertises 172.16.1.0 to AS 2 with the community

attribute no-export. AS 2 will propagate the route throughout AS 2 but will not send this route to AS 3 or

any other external AS.

Page 38: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 38/112

38

Figure2.13 BGP no-export Community Attribute

In Figure 2.14, AS 1 advertises 172.16.1.0 to AS 2 with the community attribute no-advertise. Router

B in AS 2 will not advertise this route to any other router.

Figure2.14 BGP no-advertise Community Attribute

 

Chapter 2 - Routing Protocols

Page 39: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 39/112

39BSIT 63 Advanced Computer Networks

Figure 2.15 demonstrates the internet community attribute. There are no limitations to the scope of the

route advertisement from AS 1.

Figure2.15 BGP internet Community Attribute

BGP Path Selection

BGP could possibly receive multiple advertisements for the same route from multiple sources. BGPselects only one path as the best path. When the path is selected, BGP puts the selected path in the IP

routing table and propagates the path to its neighbors. BGP uses the following criteria, in the order

presented, to select a path for a destination:

l If the path specifies a next hop that is inaccessible, drop the update.

l Prefer the path with the largest weight.

l If the weights are the same, prefer the path with the largest local preference.

l If the local preferences are the same, prefer the path that was originated by BGP running on

this router.

l If no route was originated, prefer the route that has the shortest AS_path.

l If all paths have the same AS_path length, prefer the path with the lowest origin type (where

IGP is lower than EGP, and EGP is lower than incomplete).

l If the origin codes are the same, prefer the path with the lowest MED attribute.

 

Page 40: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 40/112

40

l If the paths have the same MED, prefer the external path over the internal path.

l If the paths are still the same, prefer the path through the closest IGP neighbor.

l Prefer the path with the lowest IP address, as specified by the BGP router ID.

2.9 SUMMARY

In this chapter we presented an overview of Routing process in an inter network. Direct and indirect

routing have been discussed and some of the techniques available for making routing table more efficient

are discussed. We presented three important Routing protocols RIP, OSPF and BGP. Enough details are

provided on these as these protocols are default standards and are currently being used in the internet.

2.10 QUESTIONS

1. What is Routing? Discuss direct and indirect Routing?

2. Discuss different approaches used to make the routing table more efficient?

3. Name RIP’s various stability features.

4. What is the purpose of the timeout timer?

5. What two capabilities are supported by RIP 2 but not RIP?

6. What is the maximum network diameter of a RIP network?

7. When using OSPF, can you have two areas attached to each other where only one AS has an interface in

 Area 0?

8. Area 0 contains five routers (A, B, C, D, and E), and Area 1 contains three routers (R, S, and T). What routers

does Router T know exists? Router S is the ABR.

9. Can IBGP be used in place of an IGP (RIP, IGRP, EIGRP, OSPF, or ISIS)?

10. Assume that a BGP router is learning the same route from two different EBGP peers. The AS_path information

 from peer 1 is {2345,86,51}, and the AS_path information from peer 2 is {2346,51}. What BGP attributes

could be adjusted to force the router to prefer the route advertised by peer 1?

11. Can BGP be used only by Internet service providers?

12. If a directly connected interface is redistributed into BGP, what value will the origin attribute have for this

route?

Chapter 2 - Routing Protocols

Page 41: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 41/112

41BSIT 63 Advanced Computer Networks

Chapter 3

Multimedia Networking

We focus on the following objectives in this chapter

l Understanding the limitations of the best of best effort service rendered by the Network layer

l Possible solutions when we want some of the killer applications such as Video conferencing,

Video on Demand, Internet Telephony etc to happen on the existing Internet

l Some of the important protocols available to handle some such applications

3.1 INTRODUCTION

We have been experiencing the impact of the digital multimedia technology. This means we are

getting familiar with many applications which are becoming a part of our life. For Example

l Streaming Video

l IP Telephony

l Internet Radio

l Tele Conferencing

l Interactive Games

l Virtual Networks

41

Page 42: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 42/112

42

l E-Learning

l Web Commerce etc.,

Clearly these are new killer applications that have grown above the basic applications such as

l Email

l Web

l Remote login

l File Sharing etc..

It is to be noted that the Internet is the largest dynamic network which works on a simple concept of 

best of best service effort. This means the packets that are released from the internet layer do not

guarantee the final delivery to their respective destination in spite of its best effort. While conventionalEmail, web commerce and other off-line applications have no problem, the real time application with huge

data suffer many limitations. In other words

Multimedia applications are sensitive to end-to-end delay delay variation but can tolerate occasional

loss of data. In this chapter we will examine how multi-media applications can be designed to make the

best of the bet-effort Internet, which provides no end-to-end delay guarantees. Also we will examine a

number of activities that are currently under way to extend the Internet architecture to provide explicit

support for the service requirements of multimedia applications.

We know that timing considerations and tolerance of data loss are particularly important for networked

multimedia applications. Timing considerations are important because many multimedia applications arehighly delay-sensitive. We will see shortly that in many multimedia applications, packets that incur a

sender-to-receiver delay of more than a few hundred milliseconds are essentially useless. On the other

hand, networked multimedia applications are for the most part loss-tolerant occasional loss only causes

occasional glitches in the audio/video playback, and these losses can often be partially or fully concealed.

These delay-sensitive but loss-tolerant characteristics are clearly different from those of elastic applications

such as the Web, e-mail, FTP, and Telnet. For elastic applications, long delays are annoying but not

particularly harmful, and the completeness and integrity of the transferred data is of paramount importance.

3.2 MULTIMEDIA APPLICATIONS

We know that many multimedia applications are already invaded the Internet. I this chapter we

confine only few applications which are based on Audio and Video. The technologies pertaining to these

are presented in this section. We consider three broad classes of multimedia applications:

l Streaming stored audio/video,

Chapter 3 - Multimedia Networking

Page 43: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 43/112

43BSIT 63 Advanced Computer Networks

l Streaming live audio/video

l Real-time interactive audio/video.

3.2.1 Streaming Stored Audio and Video

In this class of applications, clients request on-demand compressed audio or video files that are stored

on servers. Stored audio files might contain audio from a professor’s lecture, rock songs, symphonies,

archives of famous radio broadcasts, or archived historical recordings. Stored video files might contain

video of a professor’s lecture, full-length movies, prerecorded television shows, documentaries, video

archives of historical events, cartoons, or music video clips. This class of applications has three key

distinguishing features.

l Stored media. The multimedia content has been prerecorded and is stored at the server. Asa result, a user may pause, rewind, fast-forward, or index through the multimedia content. The

time from when a client should be on the order of one to ten seconds for acceptable responsiveness.

l Streaming. In a streaming stored audio/video application, a client begins playout of the audio/ 

video of few seconds after it begins receiving the file from the server. This means that the client

will be playing out audio/video from one location in the file while it is receiving later parts of the

file from the server. This technique, known as streaming, avoids having to download the entire

file (and incurring a potentially long delay) before beginning playout. There are many streaming

multimedia products, such as RealPlayer, QuickTime and Media Player.

l Continuous playout. Once playout of the multimedia content begins, it should proceed accordingto the original timing of the recording. This places critical delay constraints on data delivery.

Data must be received from there server in time for its playout at the client. Although stored

media applications have continuous playout requirements, their end-to-end delay constraints are

nevertheless less stringent than those for live, interactive applications such as Internet telephony

and video conferencing.

3.2.2 Streaming Live Audio and Video

This class of applications is similar to traditional broadcast radio and television transmission emittedfrom any corner or the world. Since streaming live audio/video is not stored, a client cannot fast-forward

through the media. However, with local storage of received data, other interactive operations such as

pausing and rewinding through live multimedia transmissions are possible in some applications. Live,

broadcast-like applications often have many clients who are receiving the same audio/video program.

Distribution of live audio/video to many receivers can be efficiently accomplished using the IP multicasting

techniques.

Page 44: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 44/112

44

However, live audio/video distribution is more often accomplished through multiple separate unicast

streams. As with streaming stored multimedia, continuous playout is required, although the timing constraints

are less stringent than for real-time interactive applications. Delays of up to tens of seconds from when

the user requests the delivery/playout of a live transmission to when playout begins can be tolerated.

3.2.3 Real-Time Interactive Audio and Video

This class of applications allows people to use audio/video to communicate with each other in real

time. Real-time interactive audio over the Internet is often referred to as Internet phone, since, from the

user’s perspective, it is similar to the traditional circuit-switched telephone service. Internet phone can

potentially provide PBX (private branch exchange), local, and long-distance telephone service at very low

cost. It can also facilitate the deployment of new services that are not easily supported by the traditional

circuit-switched networks, including Web-phone integration, group real-time communication, directoryservices, caller filtering, and more. There are hundreds of Internet telephone products currently PC-to-

phone and PC-to-PC voice calls.

With real-time interactive video, also called video conferencing, individuals communicate visually as

well as orally. There are also many real-time interactive video products currently available for the Internet,

including Microsoft’s NetMeeting. Note that in a real-time interactive audio/video application, a user can

speak or move at any time. For a conversation with interaction among multiple speakers, the delay from

when a user speaks or moves until the action is manifested at the receiving hosts should be less than a few

hundred milliseconds. For voice, delays smaller than 150 milliseconds are not perceived by a human

listener, delays between 150 and 400 milliseconds can be acceptable, and delays exceeding 400 milliseconds

can result in frustrating, if not completely unintelligible, voice conversations.

3.3 MULTIMEDIA ON INTERNET : CURRENT SCENARIO

Recall that the IP protocol deployed in the Internet today provides a best-effort service to all the

packets it carries. In other words, the Internet makes its best effort to move each datagram from sender

to receiver as quickly as possible, but it does not make any promises whatsoever about the end-to-end

delay for an individual packet. Nor does the service make any promise about the variation of packet delay

within a packet stream. Because TCP and UDP run over IP, it follows that neither of these transport

protocols makes any delay guarantees to invoking applications. Due to the lack of any special effort todeliver packets in a timely manner, it is an extremely challenging problem to develop successful multimedia

networking application for the Internet.

To date, multimedia over the Internet has achieved significant but limited success. For example,

streaming stored audio/video with user-interactivity delays of five to ten seconds is now commonplace in

the Internet. But during peak traffic periods, performance may be unsatisfactory, particularly when

Chapter 3 - Multimedia Networking

Page 45: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 45/112

45BSIT 63 Advanced Computer Networks

intervening links are congested (such as congested transoceanic links). Internet phone and real-time

interactive video has, to date, been less successful than streaming stored audio/video. Indeed, real-time

interactive voice and video impose rigid constraints on packet delay and packet jitter. Packet jitter is the

variability of packet delay within the same packet stream. Real-time voice and video can work well inregions where bandwidth is plentiful, and hence delay and jitter are minimal. But quality can deteriorate

to unacceptable levels as soon as the real-time voice or video packet stream hits a moderately congested

link.

The design of multimedia applications would certainly be more straightforward if there were some sort

of first-class and second-class Internet services, whereby first-class packets were limited in number and

received priority service in router queues. Such a first-class service could be satisfactory for delay-

sensitive applications. But to date, the Internet has mostly taken an egalitarian approach to packet scheduling

in router queues. All packets receive equal service; no packets, including delay-sensitive audio and video

packets, receive special priority in the router queues.

So for the time being we have to live with best-effort service. But given this constraint, we can make

several design decisions and employ a few tricks to improve the user-perceived quality of a multimedia

networking application. For example, we can send the audio and video over UDP, and thereby circumvent

TCP’s low throughput when TCP enters its slow-start phase. We can delay playback at the receiver by

100 msecs or more in order to diminish the effects of network-induced jitter. We can timestamp packets

at the sender so that the receiver knows when the packets should be played back. For stored audio/video

we can pre-fetch data during playback when client storage and extra bandwidth are available. We can

even send redundant information in order to mitigate the effects of network-induced packet loss.

3.4 CHANGES NEEDED FOR THE INTERNET TO SUPPORT

MULTIMEDIA

Today there is a tremendous and sometimes ferocious debate about how the Internet should evolve in

order to accommodate multimedia traffic with its rigid timing constraints better. At one extreme, some

researchers argue that fundamental changes should be made to the Internet so that applications can

explicitly reserve end-to-end bandwidth. These researchers believe that if a user wants to make, for

example, an Internet phone call from host A to host B, then the user’s Internet phone application should

be able to reserve bandwidth explicitly in each link along a route between the two hosts. But permitting

applications to make reservations and requiring the network to honor the reservations requires some bigchanges.

1. We need a protocol that, on the behalf of applications, reserves bandwidth from the senders to

their receivers.

2. We must modify scheduling policies in the router queues so that bandwidth reservations can be

Page 46: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 46/112

46

honored. With these new scheduling policies, not all packets get equal treatment; instead, those

that reserve (and pay) more get more.

3. In order or honor reservations, the applications must give the network a description of the traffic

that they intend to send into the network.

The network must then police each application’s traffic to make sure that it abides by the description.

Finally, the network must have a means of determining whether it has sufficient available bandwidth to

support any new reservation request. These mechanisms, when combined, require new and complex

software in the hosts and routers as well as new types of services. At the other extreme, some researchers

argue that it isn’t necessary to make any fundamental changes to best-effort service and the underlying

Internet protocols. Instead they advocate a laissez-faire approach:

l As demand increases, the ISPs (both top-tier and lower-tier ISPs) will scale their networks to

meet the demand. Specifically ISPs will add more bandwidth and switching capacity to provide

satisfactory delay and packet loss performance within their networks. The ISPs will thereby

provide better service to their customers (users and customer ISPs), translating to higher revenues

through more customers and higher service fees. ISPs can also install caches in their networks,

which bring stored content (Web pages as well as stored audio and video) closer to the users,

thereby reducing the traffic in the higher-tier ISPs.

l Content distribution networks (CDNs), replicate stored content at the edges of the Internet.

Given that a large fraction of the traffic flowing through the Internet is stored content (Web

pages, MP3s, Video), CDNs can significantly alleviate the traffic loads on the ISPs and the

peering interfaces between ISPs. Furthermore, CDNs provide a differentiated service to content

providers: content providers that pay for a CDN service can deliver content faster and moreeffectively.

l To deal with live streaming traffic (such as a sporting event), which is being sent to millions of 

users simultaneously, Multicast overlay networks can be deployed. A multicast overlay network 

consist of servers scattered throughout the ISP network (and potentially throughout the entire

Internet). These servers and the logical links between them collectively form an overlay network,

which multicasts traffic from the source to the millions of users. Unlike layer, overlay networks

multicast at the application layer. For example, the source host might send the stream to three

overlay servers; each of the overlay servers may forward the stream to three more overlay

servers the process continues, creating a distribution three on top of the underlying IP network 

with router an hosts. By multicasting popular live traffic trough overlay networks, overall trafficloads in the Internet can be further reduced.

Between the “reservation camp” and the “laissez-faire camp” there is a yet a third camp the so

called differentiated service camp. This camp wants to make relatively small changes at the network and

transport layers, and introduce simple pricing and policing schemes at the edge of the network (that is, at

the interface between the user and the user’s ISP). The idea is to introduce a small number of traffic

Chapter 3 - Multimedia Networking

Page 47: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 47/112

47BSIT 63 Advanced Computer Networks

classes (possibly just two classes), assign each datagram to one of the classes, give datagrams different

levels of service according to their class in the router queues, and charge users according to the class of 

packets that they are sending into the network.

3.5 NEED FOR AUDIO AND VIDEO COMPRESSION

Raw Audio and Video samples after digitization occupy a large amount of space. Therefore audio

and video are compressed before being sent through the network. The need for digitization is obvious:

computer networks transmit bits, so all transmitted information must be represented as a sequence of bits.

Compression is important because uncompressed audio and video consume a tremendous amount of 

storage and bandwidth; removing the inherent redundancies in digitized audio and video signals can reduce

the amount of data that needs to be stored and transmitted by orders of magnitude.

As an example, a single image consisting of 1024 pixel * 1024 pixels, with each pixel encoded into 24

bits (eight bits each for the colors red, green, and blue), requires 3 MBytes of storage without compression.

It would take seven minutes to send this image over a 64 kbps link. If the image is compressed at a

modest 10:1 compression ration, the storage requirement is reduced to 300 Kbytes and the transmission

time also drops by a factor of ten. The fields of audio and video compression are vast. They have been

active areas pf research for more than 50 years, and there are now literally hundreds of popular techniques

and standards for both audio and video compression. Most universities offer entire courses on audio and

video compression and often offer separate courses on each. We therefore provide here a brief and high-

level introduction to the subject.

Audio Compression

A continuously varying analog audio signal (which could emanate from speech or music) is normally

converted to a digital signal as follows:

l The analog audio signal is first sampled at some fixed rate, for example, at 8,000 samples per

second. The value of each sample is an arbitrary real number.

l Each of the samples is then “rounded” to one of a finite number of values. This operation is

referred to as “quantization”. The number of finite value called quantization values is typically

a power of two, for example, 256 quantization values.

l Each of the quantization values is represented by a fixed number of bits. For example, if thereare 256 quantization values, then each value and hence each sample is represented by one

bytes. Each of the samples is converted to its bit representation. The bit representations of all

the samples are concatenated together t form the digital representation of the signal.

As an example, if an analog audio signal is sampled t 8,000 samples per second and each sample is

quantized and represented by 8 bits, then the resulting digital signal will have a rate of 64,000 bits second.

Page 48: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 48/112

48

This digital signal can then be converted back that is, decoded to an analog signal for playback. However,

the decoded analog signal is typically different from the original audio signal. By increasing the sampling

rate and the number of quantization values, the decoded signal can approximate the original analog signal.

Thus, there is a clear trade-off between the quality of the decoded signal and the storage and bandwidthrequirements of the digital signal. The basic encoding technique that we just described is called pulse

code modulation (PCM). Speech encoding often usesPCM, with a sampling rate of 8,000 samples per

second and eight bits per sample, giving a rate of 64 kbps. The audio compact disk (CD) also uses PCM,

with a sampling rate of 44,100 samples per second with 16 bits per sample; this gives a rate of 705.6 kbps

for mono and 1.411 Mbps for stereo.

A bit rate of 1.411 Mbps for stereo music exceeds most access rates, and even 64 kbps speech

exceeds the access rate for a dial-up modem user. For these reasons, PCM encoded speech and music

are rarely used in the Internet. Instead compression techniques are used to reduce the bit rates of the

stream. Popular compression techniques for speech include GSM (13 kbps), G.729 (8 kbps), and G.

723.3 (both 6.4 and 5.3 kbps), and also a large number of proprietary techniques, including those used by

Real Networks

MP3

A popular compression technique for near CD quality stereo music is MPEG 1 layer 3, more commonly

known as MP3, MP3 encoders typically compress to rates of 96 kbps, 128 kbps, and 160 kbps, and

produce very little sound degradation. When an MP3 file is broken up into pieces, each piece is still

playable. This header-less file format allows MP3 music files to be streamed across the Internet (assuming

the playback bit rate and speed of the Internet connection are compatible). The MP3 compression

standard is complex, using psychoacoustic masking, redundancy reduction, and bit reservoir buffering.

Video Compression

A video is a sequence of frames, with frames typically being displayed at a constant rate, for example

at 24 or 30 frames per second. An uncompressed, digitally encoded image consists of an array of pixels,

with each pixel encode into a number of bits to represent luminance and color.

Video has two types of redundancies

l Spatial redundancy

l Temporal redundancy

Spatial redundancy is the redundancy within a given image. For example, an image that consists of 

mostly white space can be efficiently compressed. Temporal redundancy reflects repetition from image

to subsequent image. If, for example, an image and the subsequent image are exactly the same, there is

no reason to re-encode the subsequent image; it is more efficient simply to indicate during encoding that

the subsequent image is exactly the same.

Chapter 3 - Multimedia Networking

Page 49: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 49/112

49BSIT 63 Advanced Computer Networks

The MPEG compression standards are among the most popular compression techniques. These

include MPEG 1 for CD-ROM quality video (1.5 Mbps), MPEG 2 for high-quality DVD video (3-6

Mpbs), and MPEG 4 for object-oriented video compression. The MPEG standard draws heavily from

the JPEG standard for image compression by exploiting temporal redundancy across images in addition to

the spatial redundancy exploited by JPEG. The H.261 video compression standards are also very popular

in the Internet. In addition there are numerous proprietary schemes, including Apple’s Quick Time and

Real Networks’ encoders.

3.6 STREAMING STORED AUDIO AND VIDEO

In recent years, audio/video streaming has become a popular application and a significant consumer of 

network bandwidth. This trend is likely to continue for several reasons. First, the cost of disk storage

continues to decrease rapidly, making room for storage-hungry multimedia files. Today, terabyte storage

facilities are available, capable of holding thousand of MPEG 2 videos. Second, improvements in Internet

infrastructure, such as high-speed residential access (that is, cable modems and ADSL, content distribution

techniques such as caching and CDNs greatly facilitate the distribution of stored audio and video. And

third, there is an enormous pent-up demand for high-quality video on demand, an application that combines

two existing killer communication technologies television and the on-demand Web.

In audio/video streaming, clients request compressed audio/video files that reside on servers. As we’ll

soon discuss, these servers can be “ordinary” Web servers or can be special streaming servers tailored

for the audio/video streaming application. Upon client request, the server directs an audio/video file to the

client by sending the file into a socket. Both TCP and UDP socket connections are used in practice.

Before sending the audio/video file into the network, the file is segmented, and the segments are typically

encapsulated with special headers appropriate for audio/video traffic.

The real-time protocol (RTP), is a public-domain standard for encapsulating such segments. Once

the client begins to receive the requested audio/video file, the client begins to receive the requested audio/ 

video file, the client begins to render the file (typically) within a few seconds. Most existing products also

provide for user interactivity, for example, pause/resume and temporal jumps within the audio/video file.

This user interactivity also requires a protocol for client/server interaction. Real-time streaming protocol

(RTSP), discussed at the end of this section, is a public-domain protocol for providing user interactivity.

Users often request audio/video streaming through a Web client (that is, browser). But because audio/ 

video playout is not integrated directly into today’s Web clients, a separate helper application is required

for playing out the audio/video. The helper application is often called a media player, the most popular of 

which are currently RealNetworks’ RealPlayer and the Microsoft Windows Media Player. The media

player performs several functions, including the following:

Page 50: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 50/112

50

l  Decompression. Audio/video is almost always compressed to save disk storage and network 

bandwidth. A media player must decompress the audio/video on the fly during playout.

l  Jitter removal. Packet jitter is the variability of source-to-destination delays of packets withinthe same packet stream. Since audio and video must be played out with the same timing with

which it was recorded, a receiver will buffer received packets for a short period of time to

remove this jitter.

l  Error correction. Due to unpredictable congestion in the Internet, a fraction of packets in the

packet stream can be lost. If this fraction becomes too large, user perceived audio/video quality

becomes unacceptable. To this end, may streaming systems attempt to recover from losses by

either (1) reconstructing lost packets through the transmission of redundant packets, (2) having

the client explicitly request retransmission of lost packets, or (3) masking loss by interpolating

the missing data from the received data.

The media player has a graphical user interface with control knobs. This is the actual interface that

the user interacts with. It typically includes volume controls, pause/resume buttons, sliders for making

temporal jumps in the audio/video stream, and so on.

Plug-ins may be used to embed the user interface of the media player within the window of the Web

browser. For such embeddings, the browser reserves screen space on the current Web page, and it is up

to the media player to manage the screen space. But whether appearing in a separate window or within

the browser window (as a plug-in), the media player is a program that is being executed separately from

the browser.

3.7 ACCESSING AUDIO AND VIDEO THROUGH A WEBSERVER 

Stored audio/video can reside either on a Web server that delivers the audio/video to the client over

HTTP, or on an audio/video streaming server that delivers the audio/video over non-HTTP protocol

(protocols that can be either proprietary or open standards). In this subsection, we examine delivery of 

audio/video from a Web server; in the next subsection, we examine delivery from a streaming server.

Consider first the case of audio streaming. When an audio file resides on a Web server, the audio fileis an ordinary object in the server’s file system, just as HTML and JPEG files are. When a user wants to

hear the audio file, the user’s host establishes a TCP connection with the Web server and sends an HTTP

request for the object. Upon receiving a request, the Web server encapsulates the audio file in an HTTP

response message and sends the response message back into the TCP connection.

Chapter 3 - Multimedia Networking

Page 51: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 51/112

51BSIT 63 Advanced Computer Networks

The case of video can be a little more tricky, because the audio and video parts f the “video” may be

stored in two different files; that is, they may be two different objects in the Web server’s file system. In

this case, two separate HTTP requests are sent to the server (over two separate TCP connections for

HTTP/1.0), and the audio and video files arrive at the client in parallel. It is up to the client to manage the

synchronization of the two streams. It is also possible that the audio and video are interleaved in the same

file, so that only one object need be sent to the client. To keep our discussion simple, for the case of 

“video” we assume that the audio and video are contained in one file.

An architecture for audio/video streaming is shown in Figure 3.1. In this architecture:

Figure 3.1 An audio streaming

l The browser process establishes a TCP connection with the Web server and requests the

audio/video file with an HTTP request message.

l The Web server sends the audio/video file to the browser in an HTTP response message.

l The content-type header line in the HTTP response message indicates a specific audio/video

encoding. The client browser examines the content type of the response message, launches the

associate media player, and passes the file to the media player.

l The media player then renders the audio/video file.

Although this approach is very simple, it has a major drawback: the media player (that is, the

 

Cl ient   S e r v e r  

W eb

B r o w s e r

M e d i a

p l a y e r

Page 52: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 52/112

52

helper application) must interact with the server through a Web browser as an intermediary, the entire

object must be downloaded before the browser passes the object to a helper application. The resulting

delay before playout can begin is typically unacceptable for audio/video clips of moderate length.

For this reason, audio/video streaming implementations typically have the server send the audio/video

file directly to the media player process. In other words, a direct socket connection is made between the

server process and the media player process. As shown in Figure 3.2, this is typically done by making use

of a meta file, a file that provides information (for example, URL or type of encoding) about the audio/ 

video file that is to be streamed.

A direct TCP connection between the server and the media player is obtained as follows:

1. The user clicks on a hyperlink for an audio/video file.

2. The hyperlink does not point directly to the audio/video file, but instead to a meta file. The metafile contains the URL of the actual audio/video file. The HTTP response message that

encapsulates the meta file includes a content type header line that indicates the specific audio/ 

video application.

3. The client browser examines the content type header line of the response message, launches

the associated media player, and passes the entire body of the response message (that is, the

meta file) to the media player.

4. The media player sets up a TCP connection directly with the HTTP server. The media player

sends an HTTP request message for the audio/video file into the TCP connection.

5. The audio/video file is sent within an HTTP response message to the media player. The media

player streams out the audio/video file.

The importance of the intermediate step of acquiring the meta file is clear, when the browser sees the

content type of the file, it can launch the appropriate media player, and thereby have the media player

contact the server directly.

We have just learned how a meta file can allow a media player to communicate directly with a Web

server that stores an audio/video file. Yet many companies that sell products for audio/video streaming do

not recommend the architecture we just described. This is because the architecture has the media player

communicate with the server over HTTP and hence also over TCP. HTTP is often considered insufficiently

rich to allow for satisfactory user interaction with the server; in particular, HTTP does not easily allow a

user (through the media player) to send pause/resume, fast-forward, and temporal jump commands to the

server.

Chapter 3 - Multimedia Networking

Page 53: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 53/112

53BSIT 63 Advanced Computer Networks

C l i e n t S e r v e r

A udio /v i sual f il e requested and

S e n t u si n g H T T P

Figure 3.2 Web server sends audio/video directly to the media player

3.8 TRANSMISSION OF MULTIMEDIA DATA FROM A

STREAMING SERVER TO A HELPER APPLICATION

In order to get around HTTP and /or TCP, audio/video can be stored on and sent from a streaming

server to the media player. This streaming server could be a proprietary streaming server, such as those

marketed by Real Networks and Microsoft, or could be a public-domain streaming server. With a streaming

server, audio/video can be sent over UDP (rather than TCP) using application-layer protocols that may be

better tailored than HTTP to audio/video streaming.

This architecture requires two servers, as shown in Figure 3.3. One server, the HTTP server, serverWeb pages (including meta files). The second server, the streaming server, serves the audio/video files.

The two servers can run on the same end system or on two distinct end systems. The steps for this

architecture are similar to those described in the preceding subsection. However, now the media player

requests the file from a streaming server rather than from a Web server, and now the media player and

streaming server can interact using their own protocols. These protocols can allow for rich user interaction

with the audio/video stream.

Page 54: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 54/112

54

In the architecture of Figure 3.3, there are many options for delivering the audio/video from the streaming

server to the media player. A partial list of the options is given below.

1. The audio/video is sent over UDP at a constant rate equal to the drain rate at the receiver

(which is the encoded rate of the audio/video). For example, if the audio is compressed using

GSM at a rate of 13 kbps, then the server clocks out the compressed audio file at 13 kbps. As

soon as the client receives compressed audio/video from the network, it decompresses the

audio/video and play it back.

 

C l i e n t S e r v e r

H T T P r e q u e s t /r e s p o n s e fo rPresen tat ion descr ipt ion f i l e

A u d i o / v id e o f il e r e q u e s t ed a n d

s e n t

Figure 3.3 Streaming from a streaming server to a media player

2. This is the same as Option 1, but the media player delays playout for two to five seconds in order

to eliminate network-induced jitter. The client accomplishes this task by placing the compressed

media that it receives from the network into a client buffer, as shown in Figure 3.4. Once the

client has “pre-fetched” a few seconds of the media, it begins to drain the buffer. For this, and

the previous option, the fill rate x(t) is equal to the drain rate d , except when there is packet loss,

in which case x(t) is momentarily less than d .

Chapter 3 - Multimedia Networking

Page 55: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 55/112

55BSIT 63 Advanced Computer Networks

3. The media is sent over TCP. The server pushes the media file into the TCP socket as quickly

as it can; the client (that is, media player) reads from the TCP socket as quickly as it can, and

places the compressed video into media player buffer. After an initial two to five second delay,

the media player reads from its buffer at a rate d and forwards the compressed media todecompression and playback. Because TCP retransmits lost packets, it has the potential to

provide better sound quality than UDP. On the other hand, the fill rate x(t)now fluctuates with

packet loss. TCP congestion control and window flow control. In fact, after packet loss, TCP

congestion control may reduce the instantaneous rate to less than d for long periods of time.

This can empty the client buffer and introduce undesirable pauses into the output of the audio/ 

video stream at the client.

For the third option, the behavior of x(t) will very much depend on the size of the client buffer (which

is not to be confused with the TCP receive buffer). If this buffer is large enough to hold all of the media

file (possible within disk storage), then TCP will make use of all the instantaneous bandwidth available to

the connection, so that x(t) can become much larger than d . If x(t) becomes much larger than d for long

periods of time, then a large portion of media is pre-fetched into the client, and subsequent client starvation

is unlikely. If, on the other hand, the client buffer is small, then x(t) will fluctuate around the drain rate d.

Risk of client starvation is much larger in this case.

Figure 3.4 Client buffer being filed at rate x(t) and drained at rate d

3.9 REAL-TIME STREAMING PROTOCOL (RTSP)

Many Internet multimedia users (particularly those who grew up with a TV remote control in hand)

will want to control the playback of continuous media by pausing playback, repositioning playback to a

Cl ien t buf fe r

Pre fe tched

Video da ta

Fi l lRa te=x( t )

D r a i nra te=d

To decompress ion and

P layout

Page 56: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 56/112

56

future or past point of time, fast-forwarding playback visually, rewinding playback visually, and so on.

This functionally is similar to what a user has with a DVD player when watching a DVD video or with a

CD player when listening to a music CD. To allow a user to control playback, the media player and server

need a protocol for exchanging playback control information. Real-time streaming protocol (RTSP),

defined in RFC 2326, is such a protocol.

Before getting into the details of RTSP, let us first indicate what RTSP does not do.

l RTSP does not define compression schemes for audio and video.

l RTSP does not define how audio and video are encapsulated in packets for transmission over a

network; encapsulation for streaming media can be provided by RTP or by a proprietary protocol.

(RTP is discussed in Section 6.4) For example, Real Networks’ audio/video servers and players

user RTSP to send control information to each other, but the media stream itself can beencapsulated in RTP packets or in some proprietary data format.

l RTSP does not restrict how streamed media is transported; it can be transported over UDP or

TCP.

l RTSP does not restrict how the media player buffers the audio/video. The audio/video can be

played out as soon as it begins to arrive at the client, it can be played out after a delay of a few

seconds, or it can be downloaded in its entirety before playout.

So if RTSP doesn’t do any of the above, what does it do? RTSP is a protocol that allows a media

player to control the transmission of a media stream. As mentioned above, control actions include pause/ resume, repositioning of playback, fast-forward, and rewind. RTSP is an out-of-band protocol. In particular,

the RTSP messages are sent out-of-band, whereas the media stream, whose packet structure is not

defined by RTSP, is considered “in-band”. RTSP messages use a different port number, 544, from the

media stream. The RTSP specification (RFC 2326) permits RTSP messages to be sent over either TCP

or UDP.

Recall that file transfer protocol (FTP) also uses the out-of-band notion. In particular, FTP uses tow

client/server pairs of sockets, each pair with its own port number: one client/server socket pair supports

a TCP connection that transports control information; the other client/server socket pair supports a TCP

connection that actually transports the file. The RTSP channel is in many ways similar to FTP’s control

channel.

Chapter 3 - Multimedia Networking

Page 57: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 57/112

57BSIT 63 Advanced Computer Networks

Client Server

H T T P G E T

Presen tat ion descr ipt ion f i l e

S e t u p

P l a y

M e d i a s t re a m

P a u s e

T e a r d o w n

Figure 3.5 Interaction between client and server using RTSP.

C: SETUP rtsp:// audio.example.com/twister/audio RTSP/1.0

Cseq: 1

Transport: rtp/udp; compression; port=3056; mode=PLAY

S: RTSP/1.0 200 OK

Cseq: 1

Session: 4231

Page 58: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 58/112

58

C: PLAY rtsp://audio. Example.com/twister/audio.en/lofi

RTSP/1.0

Range: npt=0-

Cseq: 2

Session: 4231

S: RTSP/1.0 200 OK

Cseq: 2

Session: 4231

C: PAUSE rtsp://audio.example.com/twister/audio.en/lofi

RTSP/1.0

Range: npt=37

Cseq: 3

Session: 4231

S: RTSP/1.0 200 OK

Cseq: 3

Session: 4231

C: TEARDOWN rtsp://audio. Example.com/twister/audio.en/ 

lofi RTSP/1.0

Cseq: 4

Session: 4231

S: RTSP/1.0 200 OK

Cseq: 4

Session: 4231

It is interesting to note the similarities between HTTP and RTSP. All request and response messages

are in ASCII text, the client employs standardized methods (SETUP, PLAY, PAUSE, and so on), and the

server responds with standardized reply codes. One important difference, however, is that the RTSP

Chapter 3 - Multimedia Networking

Page 59: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 59/112

59BSIT 63 Advanced Computer Networks

server keeps track of the state of the client for each ongoing RTSP session. For example, the server

keeps track of whether the client is in an initialization state, a play state, or a pause state (see the programming

assignment for this chapter). The session and sequence numbers, which are part of each RTSP request

and response, help the server keep track of the session state. The session number is fixed throughout the

entire session; the client increments the sequence number each time it sends a new message; the server

echoes back the session number and the current sequence number.

As shown in the example, the client initiates the session with the SETUP request, providing the URL

of the file to be streamed and the RTSP version. The setup message includes the client port number to

which the media should be sent. The setup message also indicates the client port number to which the

media should be sent.

The setup message also indicates that the media should be sent over UDP using the packetization

protocol RTP. Notice that in this example, the player chose not to play back the complete presentation,but instead only the low-fidelity portion of the presentation.

The RTSP protocol is actually capable of doing much more than described in this brief introduction. In

particular, RTSP has facilities that allow clients to stream toward the server (for example, for recording).

RTSP has been adopted by Real Networks one of the industry leaders in audio/video streaming

3.10 LIMITATIONS OF A BEST-EFFORT SERVICE

We mentioned that the best-effort service can lead to packet loss, excessive end-to-end delay, and

packet jitter. Let’s examine these issues in more details.

Packet Loss

Consider one of the UDP segments generated by our Internet phone application. The UDP segment

is encapsulated in an IP datagram. As the datagram wanders through the network, it passes through

buffers (that is, queues) in the routers in order to access outbound links. It is possible that one or more of 

the buffers in the route from sender to receiver is full and cannot admit the IP datagram. In this case, the

IP datagram is discarded, never to arrive at the receiving application.

Loss could be eliminated by sending the packets over TCP rather than over UDP. Recall that TCP

retransmits packets that do not arrive at the destination. However, retransmission mechanisms are often

considered unacceptable for interactive real-time audio applications such as Internet phone, because they

increase end-to-end delay. Furthermore, due to TCP congestion control, after packet loss the transmission

rate at the sender can be reduced to a rate that is lower than the drain rate at the receiver. This can have

a severe impact on voice intelligibility at the receiver. For these reasons, almost all existing Internet phone

applications run over UDP and do not bother to retransmit lost packets.

Page 60: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 60/112

60

But losing packets is not necessarily as disastrous as one might think. Indeed, packet loss rates

between 1 and 20 percent can be tolerated, depending on how the voice is encoded and transmitted, and

on how the loss is concealed at the receiver. For example, forward error correction (FEC) can help

conceal packet loss. We’ll see below that with FEC, redundant information is transmitted along with the

original information so that some of the lost original data can be recovered from the redundant information.

Nevertheless, if one or more of the links between ender and receiver is severely congested, and packet

loss exceeds 10-20 percent, then there is really nothing that can be done to achieve acceptable sound

quality. Clearly, best effort service has its limitations.

End-to-End Delay

End-to-end delay is the accumulation of transmission, processing, and queuing delays in routers;

propagation delays in the links; and end-system processing delays. For highly interactive audio applications,

such as Internet phone, end-to-end delays smaller than 150 milliseconds are not perceived by a humanlistener; delays between 150 and 400 milliseconds can be acceptable but are not ideal; and delays exceeding

400 milliseconds can seriously hinder the interactivity in voice conversations. The receiving side of an

Internet phone application will typically disregard any packets that are delayed more than a certain threshold,

for example, more than 400 milliseconds. Thus, packets that are delayed by more than the threshold are

effectively lost.

Packet Jitter

A crucial component of end-to-end delay is the random queuing delays in the routers. Because of 

these varying delays within the network, the time from when a packet is generated at the source until it is

received at the receiver can fluctuate from packet to packet. This phenomenon is called jitter.

As an example, consider two consecutive packets within a talk spurt in our Internet phone application.

The sender sends the second packet 20 msec after sending the first packet. But at the receiver, the

spacing between these packets can become greater than 20 msec. To see this, suppose the first packet

arrives at a nearly empty queue at a router, but just before the second packet arrives at the queue a large

number of packets from other sources arrive at the same queue. Because the first packet suffers a small

queuing delay and the second packet suffers a large queuing delay at this router, the first and second

packets become spaced by more than 20 mecs. The spacing between consecutive packets can also

become less than 20 msecs. To see this, again consider two consecutive packets within a talk spurt.

Suppose the first packet joins the end of a queue with large number of packets, and the second packet

arrives at the queue before packets from other sources arrive at the queue. In this case, our two packets

find themselves one right after the other in the queue. If the time it takes to transmit a packet on the

router’s outbound link is less than 20 msecs, then the first and second packets become spaced apart by

less than 20 msecs.

Chapter 3 - Multimedia Networking

Page 61: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 61/112

61BSIT 63 Advanced Computer Networks

If the receiver ignores the presence of jitter and plays out chunks as soon as they arrive, then the

resulting audio quality can easily become unintelligible at the receiver. Fortunately, jitter can often be

removed by using sequence numbers, timestamps, and a playout delay, as discussed below.

Removing Jitter at the Receiver for Audio

For a voice application such as Internet phone or audio-on-demand, the receiver should attempt to

provide synchronous playout of voice chunks in the presence of random network jitter. This is typically

done by combining the following three mechanisms:

l Prefacing each chunk with a sequence number. The sender increments the sequence number

by one for each of the packets it generates.

l Prefacing each chunk with a timestamp. The sender stamps each chunk with the time at

which the chunk was generated.

l  Delaying playout of chunks at the receiver. The playout delay of the received audio chunks

must be long enough so that most of the packets are received before their scheduled palyout

times. This playout delay can either be fixed throughout the duration of the audio session or it

may vary adaptively during the audio session lifetime. Packets that do not arrive before their

scheduled playout times are considered lost and forgotten; as noted above, the receiver may use

some form of speech interpolation to attempt to conceal the loss.

Recovering from Packet Loss

We now briefly described several schemes that attempt to preserve acceptable audio quality in the

presence of packet loss. Such schemes are called loss recovery schemes. Here we define packet loss

in abroad sense: a packet is lost either if it never arrives at the receiver or if it arrives after its scheduled

playout time. As mentioned at the beginning of this section, retransmitting lost packets is not appropriate

in an interactive real-time application such as Internet phone. Indeed, retransmitting a packet that has

missed its playout deadline serves absolutely no purpose. and retransmitting a packet that overflowed a

router queue cannot normally be accomplished quickly enough. Two types of loss anticipation schemes

are forward error correction (FEC) and interleaving.

Streaming Stored Audio and Video

Let us conclude this section with a few words about streaming stored audio and video. Streaming

stored audio/video applications also typically use sequence numbers, timestamps, and playout delay to

alleviate or even eliminate the effects of network jitter. However, there is an important difference between

real-time interactive audio/video and streaming stored audio/video.

Page 62: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 62/112

62

Specifically, streaming of stored audio/video can tolerate significantly larger delays. Indeed, when a

user requests an audio/video clip, the user may find it acceptable to wait five seconds or more before

playback begins. And most users can tolerate similar delays after interactive actions such as a temporal

 jump within the media stream. This greater tolerance for delay gives the application developer greater

flexibility when designing stored media applications.

3.11 PROTOCOLS FOR REAL-TIME INTERACTIVEAPPLICATIONS

Real-time interactive applications, including Internet phone and video conferencing, promise to drive

much of the future Internet growth. It is therefore not surprising that standards bodies, such as the IETF

and ITU, have been busy for many years (and continue to be busy!) at hammering out standards for thisclass of applications. With the appropriate standards in place for real-time interactive applications,

independent companies will be able to create new and compelling products that interoperate with each

other. In this section we examine RTP, SIP and H.323 for real-time interactive applications. All three

sets of standards are enjoying widespread implementation in industry products.

3.12 RTP:REAL TIME PROTOCOL

In the previous section we learnt that the sender side of a multimedia application appends header fields

to the audio/video chunks before passing them to the transport layer. These header fields include sequencenumbers and timestamps. Since most multimedia networking applications can make use of sequence

numbers and timestamps, it is convenient to have a standardized packet structure that includes fields for

audio/video data, sequence number, and timestamp, as well as other potentially useful fields. RTP, defined

in RFC 1889, is such a standard.

RTP Basics

RTP typically runs on top of UDP. The sending side encapsulates a media chunk within an RTP

packet, then encapsulates the packet in a UDP segment, and then within an RTP packet, then encapsulates

the packet in a UDP segment, and then hands the segment to IP. The receiving side extracts the RTPpacket from the UDP segment, then extracts the media chunk from the RTP packet, and then passes the

chunk to the media player for decoding and rendering.

As an example, consider the use of RTP to transport voice. Suppose the voice source is PCM-

encoded (that is, sampled, quantized, and digitized) at 64 kbps. Further suppose that the application

collects the encoded data in 20 msec chunks, that is, 160 bytes in a chunk. The sending side precedes

Chapter 3 - Multimedia Networking

Page 63: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 63/112

63BSIT 63 Advanced Computer Networks

each chunk of the audio data with an RTP header that includes the type of audio encoding, a sequence

number, and a timestamp. The RTP header is normally 12 bytes.

The audio chunk along with the RTP header form the RTP packet. The RTP packet is then sent intothe UDP socket interface. At the receiver side, the application receives the RTP packet from its socket

interface. The application extracts the audio chunk from the RTP packet and uses the header fields of the

RTP packet to properly decode and play back the audio chunk.

If an application incorporates RTP instead of a proprietary scheme to provide payload type, sequence

numbers, or timestamps then the application will more easily interoperate with other networked multimedia

applications. For example, if two different companies develop Internet phone software and they both

incorporate RTP into their product, there may be some hope that a user using one of the Internet phone

products will be able to communicate with a user using the other Internet phone product. In Section 6.4.3

we’ll see that RTP is often used in conjunction with the Internet telephony standards.

It should be emphasized that RTP in itself does not provide any mechanism to ensure timely delivery of 

data or provide other quality of service guarantees; it does not even guarantee delivery of packets or

prevent out-of-order delivery of packets. Indeed, RTP encapsulation is seen only at the end systems.

Routers do not distinguish between IP datagrams that carry RTP packets and IP datagrams that don’t.

RTP allows each source (for example, a camera or a microphone) to be assigned its own independent

RTP stream of packets. For example, for a video conference between tow participant, four RTP stream

could be opened two streams for transmitting the audio(one in each direction) and two streams for

transmitting the video (again, one in each direction). However, many popular encoding techniques includingMPEG 1 and MPEG 2 bundle the audio and video into a single stream during the encoding process. When

the audio and video are bundled by the encoder, then only one RTP stream is generated in each direction.

RTP packets are not limited to unicast applications. They can also be sent over one-to-many and

many-to-many multicast trees. For a many-to-many multicast session, all of the session’s senders and

sources typically use the same multicast group for sending their RTP streams. RTP multicast streams

belonging together, such as audio and video streams emanating from multiple senders in a video conference

application, belong to an RTP session.

3.13 SUMMARY

In this chapter we have learnt wealth of information on the multimedia data transport across internet.

Especially we looked into the audio and video streaming across internet. Limitation of the present internet

and removal of certain drawbacks to make the existing internet to port multimedia information. Some of 

the protocols used for real time streaming are also presented.

Page 64: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 64/112

64

3.14 QUESTIONS

1. What is multimedia? Give examples of multimedia data

2. What is an audio? What is a video?

3. What is streaming?

4. List the drawbacks of the current internet to drive the multimedia data?

5. How the existing internet can be made to port multimedia data?

6. Explain the Why Audio and Video need to be compressed?

7. Explain audio streaming process?

8. What is a streaming server?

9. What are the limitations of the best effort service? Explain

10. Discuss the features of Real Time Protocol?

11. Explain how does the helper application get the data from a streaming server?

12. Explain RTSP?

Chapter 3 - Multimedia Networking

Page 65: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 65/112

65BSIT 63 Advanced Computer Networks

Chapter 4

Wireless Local Area Network (WLAN)

In this chapter we present yet another upcoming technology that is making impact on the way we use

the modern computer based devices. So we focus on the technologies related to the Wireless Local

Area Network. The main objectives include,

l Overview of the different forms of signals and their characteristics

l Necessities of Wireless LAN.

l WLAN system architecture, Protocols and standards,

l To study the MAC management issues and functions for WLAN.

4.1 INTRODUCTION

As the number of portable computing and communication devices grows, so does the demand to

connect them to the outside world. Even the very first portable telephones had the ability to connect to

other telephones. The first portable computers did not have this capability, but soon afterward, modems

became commonplace. To go on-line, these computers had to be plugged into a telephone wall socket.

Requiring a wired connection to the fixed network meant that the computers were portable, but not

mobile. To achieve true mobility, portable computers need to use radio (or infrared) signals for

communication. In this manner, dedicated users can read and send email while driving or boating. A

system of portable computers that communicate by radio can be regarded as a wireless LAN.

As the name suggests, a wireless LAN is one that makes use of a wireless transmission medium. Until

relatively recently, wireless LANs were little used; the reasons for this included high prices, low data

65BSIT 63 Advanced Computer Networks

Page 66: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 66/112

66

rates, occupational safety concerns, and licensing requirements. As these problems have been addressed,

the popularity of wireless LANs has grown rapidly.

Wireless LANs have been developed over the last 30 years. ALOHANET, the first operating wirelessnetwork, was implemented in Hawaii in 1971. It was started as a research project of the University of 

Hawaii. It allowed seven campuses across four islands to communicate via satellite with a central

computer. The protocol used for ALOHA went through multiple iterations before a good throughput was

achieved.

Ham radio operators developed terminal node controllers (TNCs) in the 1980s, which they used to

connect their computers to the ham radio network. The TNCs modulated the computer signal and used

packet switching to transmit the data. Ham radio associations began sponsoring forums for the development

of wireless WANs in the early 1980s.

In the mid-1980s, the FCC authorized pubic use of the Industrial, Scientific, and Medical (ISM) frequencybands. The ISM band is designated for short range, low power devices therefore licensing is not required

to manufacture or use equipment operating in this range. This move by the FCC encouraged the

development of wireless LAN components. Early development, as with most new technology, resulted in

a lot of proprietary wireless equipment. This equipment was also expensive, which prevented widespread

use.

In the late 1980s, commercial industry standards development began for Wireless LAN. The Institute

of Electrical and Electronics Engineers (IEEE) 802 Working Group created the 802.11 Working Group to

develop wireless LAN standards. They defined the physical and media access control specifications. As

time has progressed, the initial standards were finalized and extended to cover multiple frequencies and

access speeds. Equipment prices are now falling and performance is increasing. Wireless LANs havebecome a viable solution in both homes and in industry.

4.2 SOME BASIC DEFINITIONS

Modulation

Data rates of a few bits per minute (bpm), all the way to 100 Mbps, do not have radio characteristics

that are sufficient to allow them free movement through the air. To make data move through the air, it

must be mixed with a frequency that has good free-air transmission characteristics. The frequency that

can carry the data is called the carrier frequency.

In Figure 4.1, we see a block diagram of a simple transmitter. Note that, as the data enters on the left

of the figure, it is mixed with the carrier frequency in a functional box called a modulator. A generator

produces the carrier frequency. When the intelligence is mixed with that frequency, it creates an output

signal that may resemble the output shown in the antenna.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 67: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 67/112

67BSIT 63 Advanced Computer Networks

The mixing, or modulating, of intelligence with the carrier frequency comes in various forms. Common

methods are AM, CCK, PBCC, FM, BPSK, and QPSK.

Figure 4.1: Block Diagram of Simple Transmitter

Carriers

If you tune the radio in your home to 103.9 FM, you will receive the same station all the time. In theUS, this is because the FCC regulates this range of frequencies. However, the frequency band used for

wireless – both the 2 and 5 GHz ranges – are unregulated. There is no ownership of any one frequency.

Interference could become a problem if fixed carrier frequencies were used. To overcome this problem,

carrier frequencies are consistently changed via several approaches. The major approach used in wireless

is called spread spectrum. The height of the carrier is reduced (suppressed carrier ), and the carrier

frequency is consistently changed within a predefined range and with a pattern known by both the receiver

and the transmitter.

 

S p r e a d S p e c tr u m M e th o d s  

F r e q u e n c y H o p p i n g S p r e ad S p e c t r u m ( F H S S )  

u se s a p se ud o - ra nd o m c a rr ie r h o p m e th o d. I n

theory , FH SS i s more secure because o f the

d i f fi cu l ty invo lved in p red ic t ing and cap tu r ing

car r ie rs genera ted in pseud o- random pa t te rns .

Page 68: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 68/112

68

D i r e c t S e q u e n c e S p r e a d S p e c t r u m ( D S S S ) uses a

sequence gene r a t o r t o p r oduce ca r r ie r f requen c i e s ,

and i s t he r e fo r e l e s s s ecu r e than F H SS . 

Figure 4.2: Spread Spectrum Methods

In Figure 4.3, we see the output of a spread spectrum system. Notice how the carrier moves back and

forth. There are several approaches to spread spectrum; these approaches comprise different 802.11

standards.

 Figure 4.3: Spread Spectrum Transmitter Block Diagram

Figure 4.4 Carrier with Noise

Chapter 4 - Wireless Local Area Network (WLAN)

Page 69: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 69/112

69BSIT 63 Advanced Computer Networks

Signal Strength and Signal-to-Noise

When a signal is sent into space, it mixes with radio noise. Once this happens, it is difficult to separate

the two. In radio communications, you may have two units of signal strength, but if one unit is noise, youreally have one useable unit of signal. The relationship in proportions of signal to noise is called signal-to-

noise ratio. The lower the signal-to-noise ratio, the lower the overall data performance. In Figure 4.4, we

see a radio signal and noise for a fixed carrier signal.

Figure 4.5 shows how a spread spectrum signal would look with noise. The suppressed carriers

operate just above the typical noise floor, making spread spectrum look like noise to the untrained eye.

The receiving stations must detect the carrier shift pattern and match their demodulation patterns to the

existing modulation pattern in order to recover data.

Figure 4.5: Spread Spectrum Signal and Noise

Bandwidth

Bandwidth alone should not be the deciding factor in equipment purchase and installation. In a wired

environment, many devices share the same wires. In a wireless environment, many devices share the

same radio spectrum. However, with the use of spread-spectrum technology, the resources are reused

many times over.

It is said that bigger is better, so more bandwidth is better, right? It may not be. In wired networks,

sometimes the rating of the wire’s clock speed is confused with traffic throughput. Because Ethernet

uses CSMA/CD with statistical multiplexing, the general rule is to design networks in which the throughput

does not exceed 30% of the rating, so an Ethernet-based 10Mbps link would have an average throughputof 3Mbps.

But what if I need more bandwidth for killer applications? We have been waiting for that killer

application for some time now. VoIP, Videoconferencing, and even on-line interactive training courses

use much less BW than one would think. An interactive videoconference uses around 2MHz of stream

bandwidth.

 

Page 70: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 70/112

70

4.3 802.11 STANDARDS

Now that we have discussed some of the basic concepts of wireless communications, let’s take a look 

at the difference between 802.11 a, b, and g.

The wireless 802.11 standard is a top-level standard that has been divided into several subsections,

including 802.11a, 802.11b, and 802.11g. The 802.11 umbrella covers the sub-committee standards 802.11a,

b, and g, along with any other 802.11 standards.

There has been more than just the IEEE committee work on wireless standards. Thinking that it could

improve both marketing and product quality, a consortium called bluetooth was formed. Bluetooth’s

promoters include 3Com, Ericsson, IBM, Intel, Microsoft, Motorola, Nokia, and Toshiba, as well as hundreds

of associate and adapter member companies.

In Table 4.1, we see a comparison between the different 802.11 and Bluetooth standards. Standards

a and b were approved at the same time, but products supporting 802.11b, being less expensive to make,

have flooded the market. It should be noted that 802.11b operates in the 2.4 GHz range, with an operational

bandwidth of 11Mbps. Notice that the 802.11a standards operates at 5Ghz with an operational l bandwidth

of 54Mbps. These two standards are not compatible.

Wireless LAN Standards 

802.11a 802.11b 802.11g Bluetooth

Data Rate  54-72 11 54 721 Kbps56 Kbs

Frequency  5Ghz 2.4Ghz 2.4Ghz 2.4Ghz

Modulation  OFDM DSSS/CCK DSSS/PBCC FHSS

Channels  12/8 11/3 11/379

( 1Mhz wide)

Bandwidth

Available 300 83.5

83.5

(22MHz per

channel)

83.5

Power  40-800mW 100mW 100mW 100mW

Table 4.1: Wireless LAN Standards

Chapter 4 - Wireless Local Area Network (WLAN)

Page 71: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 71/112

71BSIT 63 Advanced Computer Networks

4.4 ADVANTAGES AND DISADVANTAGES OF WLAN

4.4.1 Advantages of WLANS

l Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio

waves can penetrate walls, senders and receivers can be placed anywhere.

l Planning: Only wireless networks allow for communication without previous planning, any

wired network needs wiring plans.

Robustness: Wireless networks can survive disasters. Networks requiring a wired infrastructure will

typically some time break down completely.

Table 4.2: Application of Wireless LANs in Industry

4.4.2 Disadvantages of WLANS

l Quality of Service (QoS): WLANs typically offer lower quality than wired networks. The

main reasons are lower bandwidth due to limitations in radio transmission (e.g., only 1-10 Mbps),

higher error rates due to interference (e.g., 10 -4 instead of 10-10 for fiber optics), and higher

delay/delay variation.

Industry Applications

Retail Portable point-of-sale, wireless order entry

FinancialReplicated branches, temporary audit

workgroups

MedicalMobile nursing stations, patient record

tracking

Transportation Remote mobile customer service

Education Mobile classrooms

Manufacturing

Real-time data collection, inventory

management

Government Wireless office automation

ResidentialPersonal area networks, wireless home

networks

Warehousing Networking forklift trucks

Page 72: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 72/112

72

l Cost: For e.g., high-speed Ethernet adapters are in the range of some 10 pounds, wireless

LAN adapters, e.g., as PC-Card ranges from 100 pounds.

l Proprietary solutions: Due to slow standardization procedures, many companies have comeup with proprietary solutions offering standardized functionality plus many enhanced features.

However, these additional features only work in a homogeneous environment.

l Restrictions: Several government and non-government institutions worldwide regulate the

operation and restrict frequencies to minimize interference. Consequently, it takes a very long

time to establish global solutions like e.g., IMT-2000. WLANs are limited to low power senders

and certain license-free frequency bands.

l Safety and security: Using radio waves for data transmission might interfere with other high-

tech equipment in e.g., hospitals. Additionally, the open radio interface makes eavesdroppingmuch easier in WLANs than e.g., in the case of fiber optics.

4.5 INFRARED VS. RADIO TRANSMISSION

Infrared light transmission is used for directed links, e.g., to connect different buildings via laser

links Radio transmission works in the range 2.4 GHz. Both technologies can be used to set up ad hoc

connections for work groups, to connect, e.g., a desktop with a printer without a wire, or to support

mobility with a small area.

Infrared technology uses diffuse light reflected at walls; furniture etc. or directed light if a line-of-sight

(LOS) exists between sender and receivers. Senders can be simple light emitting diodes (LEDs) or laser

diodes, whereas photodiodes act as receivers.

l The main advantages of infrared technology are its simple and extremely cheap senders and

receivers, which are integrated in almost all mobile devices and receivers available today. PDAs,

laptops, notebooks, mobile phones etc. have an infrared data association (IrDA) interface. Version

1.0 of this industry standard implements data rates of up to 115 kbps, while IrDA 1.1 defines

higher data rates of 1.152 and 4 Mbps. No licenses are required for infrared technology and

shielding is very simple. Furthermore, electrical devices do not interfere with infrared transmission.

l Disadvantages of  infrared transmission are its low bandwidth compared to other LAN

technologies. Typically, IrDA devices are internally connected to a serial port limiting transfer

rates to 115 kbps. Infrared is quite easily shielded. They cannot penetrate walls or other obstacles,

for good transmission quality and high data rates typically a LOS, i.e., direct connection is

needed.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 73: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 73/112

73BSIT 63 Advanced Computer Networks

There are many networks that use radio transmission, e.g. GSM at 900, 1,800 and 1,900 MHz, DECT

at 1,880 MHz etc.

l Advantagesof radio transmission include the long-term experiences made with radio transmissionfor wide area networks (e.g., microwave links) and mobile cellular phones. Radio transmission

can cover larger areas and can penetrate (thinner) walls, furniture, plants etc. Thus, radio typically

does not need a LOS if the frequencies are not too high (then radio waves behave more and

more like light). Current radio-based products offer higher transmission rates (e.g., 10 Mbps)

than infrared.

l Shielding is not so simple and thus radio transmission can interfere with other senders or electrical

devices can destroy data transmission via radio. Additionally, radio transmission is only permitted

in certain frequency bands. Very limited ranges of license-free bands are available worldwide

and those available are typically not the same in all countries.

WLAN technologies:

1. IEEE 802.11: infrared and radio both

2. HIPERLAN: radio only

3. Bluetooth: radio only

4.6 IEEE 802.11 ARCHITECTURE

The IEEE standard 802.11 specifies the most famous family of WLANs in which many products are

already available. The standards number indicates this standard belongs to the group of 802.x LAN

standards, e.g. 802.3 Ethernet or 802.5 Token ring. This means that the standard specifies the physical

and the medium access layer adapted to the special requirements of wireless LANs. The primary goal of 

the standard was the specification of a simple and robust WLAN which offers time bound and asynchronous

services. Furthermore, the MAC layer should be able to operate with multiple physical layers, each of 

which exhibits a different medium sense and transmission characteristic. Candidates for physical layers

were infrared and spread spectrum radio transmission techniques. Additional features of the WLAN

should include the support of power management to save battery power, the handling of hidden nodes, and

the ability to operate worldwide.

Page 74: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 74/112

74

  H T T PAppl ica t ion

layer

O S I 4

Transpor t l ayerT C P

O S I 7Appl ica t ion

layer

O S I 6Presen ta t ion

layerO S I 5

Sess ion layer

O S I 4

Transpor t l ayer

O S I 3

N e t w o r k l a y e r

L L C l a y e r

O S I 3

N e t w o r k l a y e r

O S I 2D ata L ink layer

O S I 1

Phy s ica l layer

M A C l a ye r

O S I 1

Phy s ica l layer

IP

L L C l a y e rEtherne t 802 .3

1 0 B A S E - 2 ,

1 0 B A S E - T

C S M A / C A

D S S S , F H S S ,

Infrared

O S I

m o d e l

O S I m o d el

adap ted fo r

E x a m p l e

L A N

W I R E L E S S

L A N IE E E

Pai r cab le ,

C o a x c a b l e

A ir

LAN implimentation 802.11standards

Fig 4.6: Overview Architecture of Wireless LAN

System architecture

Wireless networks can exhibit two different basic system architectures – Infrastructure based and 

ad hoc based.

The following figure 4.7 shows the components of an infrastructure and wireless part as specified for

IEEE 802.11.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 75: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 75/112

75BSIT 63 Advanced Computer Networks

 

Fig 4.7: Architecture of an infrastructure-based IEEE 802.11

Several nodes, called stations (STAi) are connected to access point (AP). Stations are terminals

with access mechanisms to the wireless medium and radio contact to the AP. The stations and the AP,which are within the same radio coverage form a basic service set (BSS

i). The example shows two BSS

- BSS1 and BSS2 - which are connected via a distribution system. A distribution system connects

several BSSs via the AP to form a single network and there by extends the wireless coverage area. This

network is now called an extended service set (ESS). Further more, the distribution system connects

the wireless networks via the APs with a portal, which forms the internetworking unit to other LANs.

The architecture of the distribution system is not specified further in the IEEE 802.11. It could consist

of bridged IEEE LANs, wireless links or any other networks. However, distribution system services

are defined in the standard. The APs support roaming, distribution system then handles data transfer

between the different APs. Furthermore, APs provide synchronization with in a BSS, support power

management, and can control medium access to support time bounded service.

IEEE 802.11allows the building of ad hoc networks between stations, thus forming one or more BSSs

is shown in figure 4.8.

Page 76: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 76/112

76

 Fig.4.8: Architecture of IEE 802.11 ad hoc wireless LANs

In this case, BSS comprises a group of stations using the same radio frequency. Stations STA1, STA

2

and STA3 are in BSS1, STA4 and STA5 are in BSS2. This means that for example that STA3 cancommunicate directly with STA

2but not with STA

5. Several BSSs can either be formed via the distance

between the BSSs or by using different carrier frequencies.

4.7 PROTOCOL ARCHITECTURE

The following figure 4.9 shows the most common scenario: an IEEE 802.11 WLAN connected to an

IEEE 802.3 Ethernet via a bridge. The higher layers (application, TCP, IP) look the same for the wireless

node as for the wired node. The upper part of the data link control layer, the logical link control (LLC),

covers the differences of the medium access control layer needed for the different media.

The IEEE 802.11 standard only covers the physical layer PHY and medium access layer MAC like

the other 802.x LANs do. Physical layer is sub divided into physical layer convergence protocol (PLCP)

and the physical medium dependent sub layer PMD .The basic tasks of the MAC layer comprise medium

access, fragmentation of user data and encryption. The PLCP sublayer provides the carrier sense signal,

called clear channel assessment (CCA) and provides a common PHY service access point (SAP)

independent of the transmission technology. Finally the PMD sublayer handles modulation and encoding/ 

decoding of signals.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 77: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 77/112

77BSIT 63 Advanced Computer Networks

 

Fig. 4.9 : IEEE 802.11 protocol architecture and bridging

The MAC management supports the association and re-association of a station to an access point and

roaming between different access points. Furthermore, it controls authentication mechanism encryption,

synchronization of a station with regard to access point and power management to save battery power.

MAC management also maintains the MAC management information base (MIB). The main tasks of the

PHY management include channel tuning and PHY MIB maintenance. Finally, station management

interacts with both management layer and is responsible for additional higher layer functions.

PHYSICAL LAYER 

IEEE 802.11 supports three different physical layers: one layer based on infrared and two layers on

the basis of radio transmission. All PHY variants include the provision of the clear channel assessment

signal (CCA). The PHY layer offers a service access point (SAP) with 1 or 2 Mbps transfer rate to the

MAC layer.

Frequency hopping spread spectrum

Frequency hopping spread spectrum (FHSS) is a spread spectrum technique, which allows for the

coexistence of multiple networks in the same area by separating different networks using different hopping

sequences. Figure 4.10 shows a frame of the physical layer used with FHSS. The frame consists of twobasic parts the PLCP part and the payload part. While the PLCP part is always transmitted at 1 Mbps

payload i.e. MAC data can use 1 or 2 Mbps.

l Synchronization: The PLCP preamble starts with 80-bit synchronization. This pattern is used

for synchronization of potential receivers and signal detection by the CCA.

Page 78: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 78/112

78

l Start frame delimiters (SFD): The 16 bits indicate the start of the frame and thus provide

frame synchronization.

l PLCP_PDU length word (PLW): The first field of the PLCP header indicates the length of 

the payload in bytes including the 32 bit CRC at the end of the payload .PLW can range between

0 and 4,095.

l PLCP signaling fields (PSF): Only one bit is currently specified in this 4-bit field indicating the

data rate of the payload (1or 2 Mbit/s).

Header error check (HEC): The PLCP header is protected by a 16 bit checksum with the standard

ITU-T generator polynomial G (x) = x^16+x^12+x̂ 5+1.

Fig. 4.10 : Format of an IEEE 802.11 PHY frame using FHSS

4.8 DIRECT SEQUENCE SPREAD SPECTRUM

Direct sequence spread spectrum (DSSS) is the alternative spread spectrum method separated bycode and not by frequency .In the case of IEEE 802.11 DSSS, spreading is achieved using the 11-chip

sequence (+1,-1,+1,+1,-1,+1,+1,+1,-1,-1,-1), also called Barker code.

IEEE 802.11 DSSS PHY also uses the 2.4 GHz ISM band and offers both 1or 2Mbit/s data rates .The

system uses differential binary phase shift keying (DBPSK) for 1Mbit/s transmission and differential

quadrature phase shift keying (DQPSK) for 2 Mbps as modulation schemes.

Figure 4.11 shows a frame of the physical layer using DSSS. The frame consists of two basic parts,

the PLCP part (preamble and header) and the payload part. The PLCP part is always transmitted at 1

Mbit/s, Payload, i.e., MAC data, can use 1 or 2Mbit/s. The fields of the frame have the following function:

l Synchronization: The first 128 bits are not only used for synchronization, but also game setting,

energy detection (for the CCA), and frequency offset compensation.

l Start frame delimiters (SFD): This 16-bit field is used for synchronization at the beginning of 

a frame.

l Signal: Only two values have been defined for this field to indicate the data rate of the payload.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 79: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 79/112

79BSIT 63 Advanced Computer Networks

l Service: This field is reserved for future use.

l Length: 16 bits are used for length indication of the payload.

Header error check (HEC): Signal, servers and length fields are protected by this checksum usingthe ITU-T CRC –16 standard polynomial.

Fig. 4.11: Format of an IEEE 802.11 PHY frame using DSSS

Infrared

The PHY layer is based on infrared (IR) transmission, uses near visible light at 850-950 nm, which is

not regulated apart from safety restrictions (using laser instead of LEDs). The standard does not require

a line-of-sight between sender and receiver, but should also work with diffuse light. This allows for point-

to-multipoint communication. The maximum range is about 10 m if no sunlight of heat sources interferes

with the transmission. Typically, such a network will only work in buildings, e.g., classrooms, meeting

room’s etc. Frequency reuse is very simple-a wall is more than enough to shield one IR based IEEE

802.11 network from another.

The Table 4.3 summaries the various features of the spread spectrum and infrared specifications.

S pread S pec t rum In f ra red

F r e q u e n c y2 . 4 - 2 .4 3 8 5 G H z

5 . 7 2 5 – 5 .8 2 5 G H z

3 x 1 0 1 4

H z

M a x im u m c o v e ra g e 3 0 – 2 5 0 m , 4 5 0 0 m 2 1 0 - 2 5 m

Line o f s i gh t requ i rem en tN o , bu t in p rac t i ce t he r ad io w aves

P ene t ra t e on ly one concre t e w a l l.Yes

T r a n sm i t p o w e rD S S S : 1 - 1 0 0 m W

F H S S : 1 0 - 1 0 0 m W N /A

Interbui ld ing use P oss ib l e w i th an t enna P oss ib l e

R a t e d s p e e d

( % o f 1 0 M b p s w i re )2 0 % to 5 0 %

5 0 % to

1 0 0 %

Table 4.3 : Features of spread spectrum & infrared specifications

Page 80: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 80/112

80

4.9 MEDIUM ACCESS CONTROL LAYER 

The MAC layer has to fulfill several tasks. First of all, it has to control medium access, but it can also

offer support for roaming, authentication, and power conservation. The basic services provided by theMAC layer are the mandatory asynchronous data service and an optional time-bounded service. While

802.11 only offer the asynchronous service in ad hoc network mode, both service types can be offered

using an infrastructure-based network together with the access point coordinating medium access. The

asynchronous service supports broadcast and multicast packets and packet exchange is based on a best

effort model, i.e., no delay bounds can be given for transmission.

The mandatory basic method based on a version of CSMA/CA, an optional method avoiding the

hidden terminal problem, and finally a contention-free polling method for time-bounded service. The first

two methods are also summarized as distributed coordination function (DCF), the third method is called

point coordination function (PCT). DCP only offers asynchronous service while PCF offers both

asynchronous and time-bounded service but needs an access point to control medium access and to avoid

contention. The MAC mechanisms are also called distributed foundation wireless medium access control

(DFWMAC).

Figure 4.12 shows three different parameters defining the priorities of medium access. The medium,

as shown, can be busy of idle (which is detected by the CCA). If the medium is busy this can be due to

data a frame of other control frames.

Fig. 4.12: Medium access and inter-frame spacing

DCF inter-frame spacing (DIFS): This parameter denotes the longest waiting time and thus the

lowest priority for medium access. This waiting time is used for asynchronous data service within a

contention period.

PCF inter-frame spacing (PIFS): A waiting time between DIPS and SIFS (and thus a medium

priority) is used for a time-bounded service. That is, an access point polling other nodes only has to wait

PIFS for medium access.

Short inter-frame spacing (SIFS): The shortest waiting time for medium access (and thus the

Chapter 4 - Wireless Local Area Network (WLAN)

Page 81: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 81/112

81BSIT 63 Advanced Computer Networks

highest priority) is defined for short control messages, such as acknowledgment for data packets of 

polling responded.

Basic DFWMAC-DCF Using CSMA/CAThe mandatory access mechanism of IEEE 802.11 is based on the carrier senses multiple access with

collision avoidance (CSMA/CA). The basic CSMA/CA mechanism is shown in the following figure 4.13.

Fig. 4.13 : CSMA / CA Mechanism

If the mechanism is sensed idle for at least the duration of DIFS, a node can access the medium at

once. This allows for short access delay under light load. But as soon as more and more nodes try to

access the medium, additional mechanism is needed.

If the medium is busy, nodes have to wait for the duration of DIFS, entering a contention phase

afterwards. Each node now chooses a random backoff time with a contention window and additionally

delays medium access for this random amount of time. As soon as a node senses the channel is busy it

has lost this cycle and has to wait for the next chance, i.e. until the medium is idle again for at least DIFS.

But if the randomized additional waiting time for a node is over and the medium is still idle, the node can

access the medium immediately.

The additionally waiting time is measured in multiples of slots. Slot time is derived from the medium

propagation delay, transmitter delay and other PHY dependent parameters. To provide fairness IEEE

802.11 adds a backoff timer. Again each node selects a random waiting time with in the range of the

contention window. As soon as the counter expires, the nodes access the medium. This means that

deferred stations do not choose a randomized backoff time again but continue to count down. Thus longerwaiting stations have the advantage over newly entering stations.

 

Page 82: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 82/112

82

Fig. 4.14: Access Mechanism of IEEE 802.11

Figure 4.14 explains the basic access mechanism of IEEE 802.11 for five stations trying to send a

packet at the marked points in time. Station has the first request from a higher layer to send a packet,

waits for DIFS and accesses the medium, i.e., sends the packet. Station1, station2, and station5 have to

wait at least until the medium is idle for DIPS again after station3 has stooped sending. Now all three

stations choose a backoff time within the contention window and start counting down their backoff timers.

Still, the access scheme has problems under heavy or light load. Depending on the size of the contention

window (CW), the random values can either be too close together, causing too many collisions, or the

values are too high, causing unnecessary delay.

The contention window starts with a size of, e.g., CW min = 7. Each time a collision occurs, indicating

a higher load on the medium, the contention window doubles up to a maximum of e.g.

CW max =255 (the window can take on the values 7, 15, 31, 63,127, and 255). The larger the contention

window is the greater is the resolution power of the randomized scheme. It is less likely to choose the

same random back off time using a large CW. However, under a light load, a small CW ensures shorter

access delays. This algorithm is also called exponential back off and is already familiar from IEEE 802.3

CSMA/CD in similar version.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 83: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 83/112

83BSIT 63 Advanced Computer Networks

Fig. 4.15: CSMA / CA Mechanism

Figure 4.15 shows a sender accessing the medium and sending its data. But now the receiver answers

directly with an acknowledgement (ACK).

The receiver accessed the medium after waiting for duration of SIFS and, thus, no other station can

access the medium in the meantime and cause a collision. The other stations have to wait for DIFS plus

their backoff time. This acknowledgement ensures the correct reception of the frame on the MAC layer,which is especially important in error-prone environments such as wireless connections. If no ACK is

returned, the sender automatically retransmits the frame. But now the sender has to wait again and

compete for the access right.

DFWMAC-DCP with RTS/CTS EXTENSION

Discussed the problem of hidden terminals, a situation that can also occur in IEEE 802.11 networks.

The problem occurs if one station can receive two others, but those stations cannot receive each other.

Then those two stations may sense the channel idle. Send a frame, and cause a collision at the receiver in

the middle. To deal with this problem, the standard defines an additional mechanism using two control

packets, RTS and CTS. The use of the mechanism is optional, however, every 802.11 node has to implementthe functions to react properly upon reception of RTS/CTS control packets.

Fig. 4.16: Use of RTS / CTS

Figure 4.16 illustrates the use of RTS and CTS. After waiting for DIFS, the sender can issue a request

to compare to other data packets. The RTS packet thus is not given any higher priority compared to other

data packets. The RTS packet includes the receiver of the data transmission to come and the duration of 

the whole data transmission.

Page 84: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 84/112

84

This duration specifies the time interval necessary to transmit the whole data frame and acknowledgement

related to it. Every node receiving this RTS now has to set its net allocation vector (NAV) in accordance

with the duration field. The NAV specifies then the earliest point in time at which the station can try to

access the medium again.

If the receiver of the data transmission receives the RTS, it answers with a clear to send (CTS)

message after waiting for SIFS. This CTS packet contains the duration field again and all stations receiving

this packet from the receiver of the intended data transmission have to adjust their NAV. The latter set of 

receivers need not be the same as the first set receiving the RTS packet. Now all nodes within receiving

distance around sender and receiver are informed that they have to wait more time before accessing the

medium. Basically, this mechanism reserves the medium for one sender exclusively.

Finally, the sender can send the data after SIFS. The receiver waits for SIFS after receiving the data

packet and then acknowledges whether the transfer was correct. Now the transmission has been completed

and thus the NAV in each node marks the medium as free and the standard cycle can start again.

However, the mechanism of fragmenting a user data packet into several smaller parts should be

transparent for a user. Furthermore, the MAC layer should have the possibility of adjusting the retransmission

frame size to the current error rate on the medium. Therefore, the IEEE 802.11 standard specifies a

fragmentation mode. Again, a sender can send an RTS control packet to reserve the medium after a

waiting time of DIFS. This RTS packet now includes the duration for the transmission of the first fragment

and the corresponding acknowledgement. A certain set of nodes may receive answers with CTS, again

including the duration of the transmission up to the acknowledgement. A set of receivers gets this CTS

message and set the NAV.

As shown in figure 6.10 the sender can now send the first data frame, frag1 after waiting only forSIFS. The new aspect of this fragmentation mode is that it includes another duration value in the frame

frag1.

This duration field reserves the medium for the duration of the transmission comprising the second

fragment and its acknowledgement. several nodes may receive this reservation and adjust their NAV.

The receiver of frag1 answers directly after SIFS with the acknowledgement packet ACK1 including

the reservation for the next transmission as shown in figure 6.10.

If frag2was not the last frame of this transmission, it would also include a new duration for the third

consecutive transmission. The receiver acknowledges this second fragment, not reserving the medium

again. After ACK2, all nodes can compete for the medium again after having waited for DIFS.

DFWMAC-PCF with Polling

The two-access mechanism presented so far cannot guarantee a maximum access delay or minimum

transmission bandwidth. To provide a time-bounded service, the standard specifies a point co-ordination

function (PCF) on top of the standard DCF mechanisms. Using PCF, which requires an access point that

Chapter 4 - Wireless Local Area Network (WLAN)

Page 85: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 85/112

85BSIT 63 Advanced Computer Networks

controls medium access and polls the nodes. Ad hoc networks cannot use this function and thus provide

no QoS, but only best effort in IEEE 802.11 WLANs.

The point co-coordinator in the access point splits the access time into super frame periods as shown

in figure 4.17. A super frame comprises a contention-free period and a contention period. The contention

period can be used for the two access mechanisms presented above. The figure 4.18 also shows several

wireless stations and the stations NAV.

 Fig. 4.17: The access point splits the access time

 Fig. 4.18: Wireless stations & the stations NAV

At time t0 the contention-free period of the super frame should theoretically start, but another station

is still transmitting data. This means that PCF also defers to DCF, and thus, the start of the super frame

may be postponed. The only possibility of avoiding variation is not to have any contention period at all.

After the medium has been idle until t1, the point coordinator has to wait for PIFS before accessing the

medium. Since PIFS is smaller than DIFS, no other station can start sending earlier.

Page 86: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 86/112

86

The point coordinator now sends data D1 downstream to the first wireless station. This station can

answer at once after SIFS. After waiting for SIFS again, the point coordinator can poll the second station

by sending D2. This station may answer upstream to the coordinator with data D2. Polling continues with

the third node. This time the node has nothing to answer and, thus, the point coordinator will not receive apacket after SIFS.

After waiting for PIFS, the coordinator can resume polling the stations. Finally, the point coordinator

can issue an end marker (CF end), indicating that the contention period may start again. Using PCF it

automatically sets the NAV, preventing other stations from sending. In the example, the contention free

period planned initially would have been from t0 to t3. However, the point coordinator finished polling

earlier thus shifting the end of the contention free period to t2. At t4, the cycle starts again with the next

super frame.

Mac Frames

The figure 4.19 shows the basic structure of an IEEE 802.11 MAC data frame.

Fig. 4.19: Basic structure of an IEEE 802.11 MAC data frame

The fields are the following:

l Frame control: These indicates the protocol version, the type of the frame (management,

control, data), whether the frame has been fragmented, privacy information, and the 2 DS bits

(distribution system bits), indicating the meaning of the four address fields in the frame.

l Duration ID: for the virtual reservation mechanism using RTS/CTS and during fragmentation,

the duration field contains a value indicating the period of time in which the medium is occupied.

l Address 1 to 4: The four address fields contain standard IEEE 802 MAC addresses (48 bit

each), as they are known from other 802.x LANs. The meaning of each address depends on the

DS bits in the frame control field.

l Sequence control: Due to the acknowledgement mechanism it may happen that frames are

duplicated. Therefore a seq. no. is used to filter duplicates.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 87: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 87/112

87BSIT 63 Advanced Computer Networks

l Data: The MAC frame may contain arbitrary data (max. 2312 byte), which is transferred

transparently from sender to the receiver(s).

l Checksum (CRC): Finally, a 32-bit checksum is used to protect the frame as this is commonprocedure in all 802.x networks.

MAC frames can be transmitted between mobile stations, between mobile stations and an access

point, and between access points over a distribution system.

4.10 MAC MANAGEMENT

MAC management plays a central role in an IEEE 802.11 station as it more or less control all functions

related to system integration i.e., integration of a wireless station into a BSS, formation of an ESS,synchronization of stations etc.

The functional groups include:

i) Synchronization:

Each node of an 802.11 network maintains an internal clock. To synchronize the clocks of all nodes,

IEEE 802.11 specifies a timing synchronization function (TSF). Synchronized clocks are needed for

power management, but also for coordination of the PCF, for synchronization of the hopping sequence in

an FHSS system. Using PCF, the local timer of a node can predict the start of a super frame, i.e., the

contention free and contention period. FHSS physical layers need the same hopping sequences for all thenodes to be able to communicate within a BSS.

Within a BSS, timing is conveyed by the periodic transmission of a beacon frame. A beacon contains

a timestamp and other management information used for power management and roaming. The timestamp

is used by a node to adjust its local clock. The node is not required to hear every beacon to stay synchronized;

however, from time to time internal clocks should be adjusted The transmission of a beacon frame is not

always periodic, but is also deferred if the medium is busy.

Within the infrastructure-basednetworks, the AP performs synchronization by transmitting the periodic

beacon signal, whereas all other wireless nodes adjust their local timer to the time stamp. This is shown inthe figure. 4.20.14 The AP is not always able to send its beacon B periodically if the medium is busy.

However, the AP always tries to schedule transmissions according to the expected beacon interval (target

beacon transmission time), i.e., beacon intervals are not shifted if one beacon is delayed. The timestamp

of a beacon always reflects the real transmit time, not the scheduled time.

Page 88: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 88/112

88

 Fig. 4.20: Target beacon transmission time

For ad hoc networks, the situation is slightly more complicated as they do not have an AP for beacon

transmission. In this case, each node maintains its own synchronization timer and starts the transmission

of a beacon frame after the beacon interval. Figure 4.21 shows an example where multiple stations try tosend their beacon. However, the standard random back off algorithm is also applied to the beacon frames

and thus, typically only one beacon wins. Now all other stations adjust their internal clock according to the

received beacon and suppress their beacons for this cycle. If collision occurs, the beacon is lost. In this

scenario, the beacon intervals can be shifted slightly in time because all clocks may vary and, thus also the

start of a beacon interval from a node’s point of view. However, after synchronization all nodes again

have the same consistent view.

 Fig. 4.21: Multiple stations try to send their beacon.

ii) Power management

Wireless devices are battery powered. Therefore, power-saving mechanisms are crucial for the success

of such devices. Standard LAN protocols assume that stations are always ready to receive data, although

receivers are idle most of the time in lightly loaded networks. However, this permanent readiness of the

receiving module is critical for battery lifetime as the receiver current may be up to 100mA.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 89: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 89/112

89BSIT 63 Advanced Computer Networks

The basic idea of the IEEE802.11 power management is to switch off the transceiver whenever it is

not needed. Since the power management cannot know in advance when the transceiver has to be active

for a specific packet, it has to ‘wake up’ the transceiver periodically. Switching off the transceiver should

be transparent to existing protocols and should be flexible enough to support different applications. However,

throughput can be traded –off for battery life. Longer periods save battery life but reduce average

throughput and vice versa.

The basic idea of power saving includes two actions for a station, sleep and awake, and buffering of 

data in senders it has to buffer data if the station is asleep. The sleeping station on the other hand has to

wake up periodically and stay awake for a certain time. During this time, all senders can announce the

destinations of their buffered data frames. If a station detects that it is a destination of a buffered packet

it has to stay awake until the transmission takes place. Walking up at the right moment requires the timing

synchronization function (TSF). All stations have to wake up or be awake at the same time.

The following figure 4.22 shows an example with an access point and one station.

 Fig. 4.22: Access point and one station

Power management in infrastructure-based networks is much simpler compared to ad hoc networks.

In the latter case, there is no AP to buffer data in one location but each station needs the ability to buffer

data if it wants to communicate with a power-saving station. All stations now announce a list of buffered

frames during a period when they are all awake. Destinations are announced using ad hoc traffic

indication map (ATIMs) –the announcement period is called the ATM window.

Page 90: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 90/112

90

 Fig. 4.23: Simple ad hoc network with two stations

Figure 4.23 shows a simple ad hoc network with two stations. Again, the beacon interval is determined

by a distributed function (different stations may send the beacon). However, due to this synchronization,

all stations within the ad hoc network wake up at the same time. All stations stay awake for the ATIM

interval as shown in the first steps and go to sleep again if no frame is buffered for them. In the third step,

station1has data buffered for station

2. This is indicated in an ATIM transmitted by staiton

1. Station

2

acknowledges this ATIM and stays awake for the transmission. After the ATIM window, station1can

transmit the data frame, and station2acknowledges its receipt. In this case, the stations stay awake for the

next beacon.

iii) Roaming

Typical wireless networks within buildings require more than just one access point to cover all rooms.

Depending on the solidity and material of the walls on one AP has a transmission range of 10-20 m if 

transmission is to have a decent quality. If a user walks around with a wireless station, the station has to

move from one AP to another to provide uninterrupted service. Moving between APs is called roaming.

The steps for roaming between AP are the following:

l A station that the current link quality to its AP1is too poor. The station then starts scanning for

another AP.

l Scanning involves the active search for another BSS and can also be used for setting up a newBSS in case of ad hoc networks. IEEE 802.11 specifies scanning on single or multiple channels

and differentiates between passive scanning and active scanning. Passive scanning means

listening into the medium to find other networks, i.e., function within an AP. Active scanning

comprises sending a probe on each channel and waiting for response. Beacon and probe

response contain the information necessary to join the new BSS.

Chapter 4 - Wireless Local Area Network (WLAN)

Page 91: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 91/112

91BSIT 63 Advanced Computer Networks

l The station then selects the best AP for roaming based on, e.g., signal strength, and sends an

association request to the selected AP2.

l The new AP2answers with an association response. If the response is successful, the station

has roamed to the new AP2

Otherwise; the station has to continue scanning for new APs.

l The AP accepting an association’s request indicates the new station in its BSS to the distribution

system (DS). The DS then update its database, which contains the current location of the

wireless stations. This database is needed for forwarding frames between different BSSs, i.e.,

between the different APs controlling the BSSs, which combine to form an ESS.

4.11 SUMMARY

In this chapter we presented definition of signals and their characteristics. Specifically we introducedthe concept of modulation, Carrier Signal, and noise, Bandwidth. These serve as basis for WLAN. We

have touched upon different IEEE standards used in Wireless applications. The architecture and protocol

of WLAN are covered in detail. Some of the related topics in MAC layer and power management are

also discussed.

4.12 QUESTIONS

1. What are WLANs?

2. What is modulation?

3. What is a carrier signal?

4. Define SNR?

5. What is BW?

6. Compare 802.11a, 802.11b, 802.11g and blue tooth.

7. List out the advantages and disadvantages of WLAN?

8. Compare Infrared and Radio transmission?

9. Discuss the architecture of WLAN?

10. Briefly explain the WLAN protocol architecture?

11. Write a note on DSSS?

12. Discuss MAC layer of WLAN.

Page 92: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 92/112

92

Chapter 5

Crytography and Network Security

5.1 INTRODUCTION

Up until the mid 1970’s cryptography was an arcane science practised largely by government and

military security experts. A more serious attempt occurred in 1980, when the NSA (National

Security Agency) funded the American council on education to examine the issue with a view to

persuading congress to give it legal control of publications in the field of cryptography. As the eighties

progressed, pressure focused more on the practice than the study of cryptography. This gave rise to the

wide use of cryptography in all the fields of computer as well as Internet.

With the introduction of the computer, the need for automated tools for protecting files and otherinformation stored on the computer became evident. This is especially the case for a share system such

as a time-sharing system and the need is even more acute for systems that can be accessed over a public

telephone or data network. The generic name for the collection of tools designed to protect data and to

thwart hackers is computer security.

The second major change that affected security is the introduction of distributed systems and the use

of networks and its communications facilities for carrying data between terminal user and computer and

also between computers. Network security measures are needed to protect data during their transmission.

5.2 DEFINITION OF CRYPTOGRAPHY AND CRYPTANALYSIS

Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables

us to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot

be read by anyone except the intended recipient.

Chapter 5 - Crytography and Network Security

Chapter 5 - Crytography and Network Security92

Page 93: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 93/112

93BSIT 63 Advanced Computer Networks

Cryptography is the science of securing data, whereas the cryptanalysis is the science of analyzing

and breaking secure communication. Cryptanalysts are also called attackers. Classical cryptanalysis involves

an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience

and determination.

5.3 WORKING OF CRYPTOGRAPHY

A cryptographic algorithm (also referred as cipher), is a mathematical function used in the encryption

and decryption process. A cryptographic algorithm works in combination with a key. This key may be a

word, number, or phrase used to encrypt the plaintext (also called as message). The same plaintext

encrypts to different cipher text with different keys. The security of encrypted data is entirely dependent

on two things: the strength of the cryptographic algorithm and the secrecy of the key.

There are different types of attacks that create the need for network security, network services and

network mechanisms. Security services and mechanisms can be viewed with a general model.

5.4 ATTACKS, SERVICES AND MECHANISMS

To assess the security needs of an organization effectively and to evaluate and choose various security

products and policies, the manager is responsible for identifying the security needs, defining the requirements

for security in a systematic way and characterizing the different approaches to satisfy those requirements.

One approach is to consider three aspects of information security.

l Security attack: An action that compromises the security of information owned by an

organization.

l Security mechanism: A mechanism that is designed to detect, prevent or recover from a

security attack.

l Security Service: A service that enhances the security of the data processing systems and the

information transfers of an organization. The services are intended to counter security attacks

and they make use of one or more security mechanisms to provide the service.

5.4.1 Security Attacks

Attacks on the security of a computer system or network are best characterized by viewing the

function of the computer system as providing information. There are four general types of cryptanalytic(also

referred as security attacks) attacks. Each of them assumes that the cryptanalyst has complete

Page 94: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 94/112

94

knowledge of the encryption algorithms used. The four general categories of attacks are as

shown in the diagram 5.1.

(b) Interruption

Source Destination

(a) Normal Flow

(c) Interception

(d) Modification

Chapter 5 - Crytography and Network Security

Page 95: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 95/112

95BSIT 63 Advanced Computer Networks

(e) Fabrication

 

Fig: 5.1 Security Threats

l Interruption: An asset of the system is destroyed or becomes unavailable or unusable. This is

an attack on availability.

l Interception:an unauthorized party gains access to an asset. This is an attack on confidentiality.

The unauthorized party could be a person, a program, or a computer.

l Modification: An unauthorized party not only gains access to but tampers with an asset. This

attack is on integrity.

l Fabrication:An unauthorized party inserts counterfeit objects into the system. This is an attack 

on authenticity.

Attacks are mainly categorized into passive and active attacks (figure 5.2).

Fig: 5.2 Active and Passive Network security threats

Passive Attack: In this attack the goal of opponent is to obtain information that is being transmitted.

Their exists 2 types of passive attacks. They are release of message contents and traffic analysis.

l The release of message contents is easily understood. A telephone conversation, an electronic

Passive Attacks  Active Attacks 

Release of traffic analysis Masquerade Replay Modification of messages

Denial of service

Message contents

Page 96: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 96/112

96

mail message, and a transferred file may contain sensitive or confidential information. It is necessary to

prevent the opponent from learning the contents of the transmissions.

l The second traffic analysis is more subtle. Suppose that we had a way of masking the contents

of messages or other information traffic so that opponents, even if they captured the message

could not extract the information form the message. The common technique for masking contents

is encryption. If we had encryption protection in place, an opponent might still be able to observe

the pattern of these messages. The opponent could determine the location and identity of 

communication hosts and could observe the frequency and length of messages being exchanged.

This information might be useful in guessing the nature of the communication that was taking

place.

Passive attacks are very difficult to detect because they do not involve any alteration of the data. The

emphasis in dealing with passive attacks is on prevention of the attack rather than detection.

Active attacks

These attacks involve some modification of the data stream or the creation of a false stream and it has

been divided into 4 categories like masquerade, replay, and modification of messages and denial of service.

Masquerade: This takes place when on entity pretends to be a different than other entity. This includes

one of the other form of active attacks i.e. replay or modification of messages or denial of service.

Replay: This involves the passive capture of a data unit and its subsequent retransmission to produce an

unauthorized effect.

Modification of messages: This means that some portion of the message is altered or that messagesare delayed or reordered to produce an unauthorized effect.

Denial of service: This prevents or inhibits the normal use or management of communications facilities.

This attack will have a specific target. For example and entity may suppress all messages directed to a

particular destination. Another form of service denial is the disruption of an entire network, either by

disabling the network or by overloading it with message so as to degrade performance.

Active attacks present the opposite characteristics of passive attacks. Active attacks are difficult to

prevent their success. Prevention is difficult because to do so it require physical protection of all

communications facilities and paths at all times. Instead, the goal is to detect them and to recover from

any disruption or delays caused by them. Because the detection has a deterrent effect, it may alsocontribute to prevention.

5.4.2 SECURITY SERVICES

Computer and network security research and development have instead focused on three or four

Chapter 5 - Crytography and Network Security

Page 97: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 97/112

97BSIT 63 Advanced Computer Networks

general security services that encompass the various functions required of an information security facility.

The classification of security services are classified as follows:

l Confidentiality: This is the main service offered by the cryptography. This ensures that the

information in a computer system and transmitted information are accessible only for reading by

authorized parties. This type of access includes printing, displaying and other forms of disclosure

including simply revealing the existence of an object.

l Authentication:This ensures that the origin of a message or electronic document is correctly

identified, with an assurance that the identity is not false.

l Integrity: Ensures that only authorized parties are able to modify computer system assets and

transmitted information. Modification includes writing, changing, changing status, deleting,

creating, and delaying or replaying of transmitted messages.

l Non-repudiation: This requires that neither the sender nor the receiver of a message be ableto deny the transmission.

l Access control: Requires that access to information resources may be controlled by or for the

target system.

l Availability: Requires that computer system assets be available to authorized parties when

needed.

5.4.3 Security Mechanisms

There is no single mechanism that will provide all the services just listed or perform all the functions as

shown in the table 1.1. There is one particular element that underlies most of the security mechanisms in

use: cryptographic techniques. Encryption or encryptions like transformations of information are the most

common means of providing security.

Table1.1 A Partial List of Common Information Integrity Function

• Identification • Validation

• Authorization • Time of occurrence

• Signature • Authenticity

• Concurrence • Ownership

• Receipts • Registration

• Endorsement • Privacy

• Access • Endorsement

Page 98: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 98/112

98

5.5 MODEL OF INTERNET SECURITY

A model for network security is as shown in the figure 5.3. A message is to be transferred form one

party to another across some sort of Internet. The two parties, who are the principals in this transaction,must cooperate for the exchange to take place. A logical information channel is established by defining a

route through the Internet from source to destination and by the cooperative use of communication protocols

by the two principals.

Security aspects come into play when it is necessary or desirable to protect the information transmission

from an opponent who may present a threat to confidentiality, authenticity and so on. All the techniques

for providing security have two components:

Figure 5.3 Model for network security

l A security-related transformation on the information to be sent.

l Some secret information shared by the two principals and it is hoped, unknown to the opponent.

A trusted third part may be needed to achieve secure transmission. For example, a third party may be

responsible for distributing the secret information to the two principals while keeping it from any opponent.

Trusted Third party

Principal Principal

Message Information channel

Message

Secrete

Information

Secrete information

Security related transformation Opponent Security related transformation

Chapter 5 - Crytography and Network Security

Page 99: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 99/112

99BSIT 63 Advanced Computer Networks

Or a third party may be needed to arbitrate disputes between the two principals concerning the authenticity

of a message transmission

The above general model shows that there are four basic tasks in designing a particular security

service:

1. Design an algorithm for performing the security-related transformation. The algorithm should

be such that an opponent cannot defeat its purpose.

2. Generate the secrete information to be used with the algorithm.

3. Develop methods for the distribution and sharing of the secret information

4. Specify a protocol to be used by the two principals that makes use of the security algorithm and

the secret information to achieve a particular security service.

A general model of other situations, which reflects a concern for protecting an information system

from unwanted access is as shown in the figure 5.4. Hackers are the persons who attempt to penetrate

systems that can accessed over a network. The hacker can be someone who, with no malign intent,

simply gets satisfaction from breaking and entering a computer system. Or, the intruder can be a disgruntled

employee who wishes to damage, or a criminal who seeks to exploit computer assets for financial gain.

Figure 5.4 Network Access Security Model

Programs can present usually two kinds of treats:

l Information access threats- intercept or modify data on behalf of users who should not have

access to that data.

Information system

Opponent

Access Channel

Gatekeeper

function

Competingresources

Data

Process

Software

Internal Security

controls

Page 100: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 100/112

100

l Service threats-exploit service flaws in computers to inhibit use by legitimate users.

The security mechanisms needed to cope with unwanted access fall into two broad categories as

shown in figure 1.4. The first category might be termed a gatekeeper function. It includes password-

based login procedures that are designed to deny access to all but authorized users and screening logic

that is designed to detect and reject viruses and other similar attacks.

Once either an unwanted user or unwanted software gains access, the second line of defense consists

of a variety of internal controls that monitor activity and analyze stored information in an attempt to detect

the presence of unwanted intruders.

5.6 CONVENTIONAL ENCRYPTION

Conventional encryption also referred as symmetric encryption or single-key encryption, was theonly type of encryption in use prior to the development of public key encryption. There are two general

types of encryption (i,e, Classical encryption and Modern encryption) techniques. These are key based

algorithms i.e, symmetric and public key algorithms. In conventional algorithms the encryption key can be

calculated from the decryption key and vice versa. In these algorithms, the encryption key and the

decryption key are the same. These algorithms are also called secret key algorithms, or one key algorithm.

In this the sender and receiver agree on a key before they communicate securely. The security of the

symmetric algorithm rests in the key. The key means that anyone could encrypt and decrypt messages

using any encryption and decryption algorithms. Encryption and decryption with a conventional algorithm

are denoted by:

Ek (M)=C where M is message, E – Encryption C-Ciphertext or Encrypted message

Dk (C)=M where D – Decryption K – this subscript stands for denoting key

5.7 CONVENTIONAL ALGORITHMS

Conventional or Symmetric algorithms can be divided into two categories. The first category of 

algorithms are called as stream algorithms or stream ciphers which operate on the single bit of the

plaintext or byte at a time.. Others operate on the plaintext in-groups of bits. The second category of the

algorithm is block algorithms or block cipher, which operates on group of bits at a time. The figure 5.5shows the general model of encryption and decryption of the message.

5.7.1 Model of message encryption and decryption

A message is nothing but plaintext (also called clear text). The process of disguising a message in such

Chapter 5 - Crytography and Network Security

Page 101: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 101/112

101BSIT 63 Advanced Computer Networks

a way as to hide its substance is called encryption. An encrypted message is cipher text. The process of 

turning cipher text back into plaintext is called decryption as shown below.

Figure 5.5 Encryption and decryption Model

M or P that stands for message or plaintext denotes either plain text. It can be a steam of bits, a text

file, a bitmap, a stream of digitized voice, a digital video image. As far as a computer is concerned, M is

simply binary data. The plaintext can be intended for either transmission or storage, which is to be decrypted.

C denotes Ciphertext which is also a binary data. The size of the C can sometimes be the same size as

M, or it may be larger than M. The encryption function E operates on M to produce C or in mathematical

function E(M)=C. In the reverse process, the decryption function D operates on C to produce M i,e, D(C)

= M. The whole point of encrypting and decryption a message is to recover the original plaintext. Both

encryption and decryption operations use the keys (i.e they are dependent on the key and this fact is

denoted by the K subscript), so the functions become

Ek (M)=C

Dk (C)=M

Dk (E

k (M))=M

5.7.2 Model of Conventional Encryption

The essential elements of conventional encryption scheme are as shown in figure 5.6.

 Key Key

Plaintext Cipher text(C) Original plaintext

M Encryption (E) Decryption (D)

Page 102: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 102/112

102

Figure 5.6 Model of Conventional Cryptosystem

A source produces a message in plaintext, x=[x1,x

2…x

m]. The elements of X are letters in some finite

alphabet. The alphabet usually consists of the 26 letters. Nowadays, the binary alphabet {0,1} is typically

used. For encryption, a key of the form k=[k 1,k 

2…k 

 j] is generated. If the key is generated at the message

source, then it must also be provided to the destination by means of some secure channel. ( There is also

possibility that a third party could generate the key and securely deliver it to both source and destination).

With the message X and the encryption key K as input, the encryption algorithm form the cipher text

Y=[y1

,y2

….yN

]. we can write this as Y=Ek 

(X). This notation indicates that using encryption algorithm E

as a function of the Plaintext X, with the specific function determined produces Y by the value of the key.

The intended receiver, in possession of the key, is able to invert the transformation: X=Dk (Y). An opponent,

observing Y but not having access to K or X, may attempt to recover X or K or both X and K. If the

opponent knows the encryption (E) and decryption (D) algorithms, he tries to recover X by generating a

plaintext estimate X1. By identifying the key or the decrypting the message he can read future messages

as well, in which case an attempt is made to recover K by generating an estimate K1.

5.8 CRYPTOGRAPHY

Cryptographic systems are generically classified along three dependent dimensions:

1. The type of operations used for transforming plaintext to cipher text: All encryption

algorithms are based on two general principles: Substitution, in which each element in the plaintext

(bit, letter, group of bits or letters) is mapped into another element, and transposition, in which

elements in the plaintext are rearranged.

X1

K1 

X Y X

K

Cryptanalyst 

Key

Source

Secure channel

DestinationMessage

Source

Encryption

algorithm

Decryption

algorithm

Chapter 5 - Crytography and Network Security

Page 103: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 103/112

103BSIT 63 Advanced Computer Networks

2. The number of keys used: If both sender and receiver use the same key, the system is

referred as symmetric or singe-key or secret-key or conventional encryption. If the sender and

receiver each uses a different key, the system is referred to as asymmetric, two key or public

key encryption.

3. The way in which the plaintext is processed: This cipher processes the input of one block 

of elements at a time, producing an output block for each input block.

5.8.1 Cryptanalysis

The whole point of cryptography is to keep the plaintext (or the key, or both) secrete from the opponents

(also called adversaries, attackers, interceptors, interlopers, intruders, opponents, or simply the enemy).

The process of attempting to discover X (Message or key) or both is known as cryptanalysis. There are

four general types of cryptanalytic attacks.

1. Cipher text-only attack: The cryptanalyst has the cipher text of several messages, all of 

which have been encrypted using the same encryption algorithm. The cryptanalyst’s job is to

recover the plaintext or key of any messages used to encrypt the messages, in order to decrypt

other messages encrypted with the same key.

Given: C1=D

m(P

1),C

2=E

k (p

2)……ci =E

k (P

i)

Deduce: Either P1, P

2,….P

i,k ; or an algorithm to infer P

i+1from C

i+1= E

k (P

i+1)

2. Known – plaintext attack: The cryptanalyst has the access to the cipher text as well asplaintext of the messages. Cryptanalysts job is to deduce the key (or keys) used to encrypt the

messages or an algorithm to decrypt any new messages encrypted with the same key (or keys).

Given: P1,C

1=E

k (P

1),P

2,C

2=E

k (P

2),…..Pi,Ci=E

k (Pi)

Deduce: Either k, or an algorithm to infer Pi+1

from Ci+1

=(Pi+1

)

3. Chosen plaintext attack: The cryptanalyst not only has access to the cipher text and associated

plaintext for several messages, but also chooses the plaintext that gets encrypted. This is more

powerful than a plaintext attack, because the cryptanalyst can choose specific plaintext blocks

to encrypt, which might yield more information about the key.

Given: P1,C

1=E

k (P

1),P

2,C

2=E

k (P

2),…..Pi,Ci=E

k (Pi),

Where the cryptanalyst gets to choose P1,P

2…Pi

Deduce: Either k, or an algorithm to infer Pi+1

from Ci+1

=Ek (P

i+1)

4. Adaptive chosen plaintext attack: This is a special case of chosen plaintext attack. In this

Page 104: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 104/112

104

attack the cryptanalyst can choose and modify the plaintext that is encrypted, based on the results of 

previous encryption.

The cipher text-only attack is the easiest attack to defend against other attacks. The analyst is able tocapture one or more plaintext messages as well as their encryptions. For example, a file that is encoded

in the Postscript format always begins with the same pattern, or there may be a standardized header or

banner to an electronic funds transfer message, and so on. These are the examples of known plaintext.

From this knowledge, the analyst is able to deduce the key on the basis of the way in which the known

plaintext is transformed.

In general, the analyst is able to choose the message to encrypt the messages using certain patterns

that can be expected to reveal the structure of the key.

5.9 STEGANOGRAPHY

Stenography hides the message (secrete) in other messages. Generally the sender writes an innocuous

message and then conceals a secret message on the same piece of paper. Historical tricks include invisible

inks, tiny pin punctures on selected characters, minute differences between handwritten characters, pencil

marks on typewritten character, grilles which cover most of the message except for a few characters and

so on.

Some examples are listed below:

l Character marking: Selected letters of printed or type written text are over- written in pencil.The marks are ordinarily not visible unless the paper is held at an angle to bright light.

l Invisible ink: A number of substances can be used for writing but leave no visible trace until

heat or some chemical is applied to the paper.

l Pin punctures: Small pin punctures on selected letters are ordinarily not visible unless the

paper is held up in front of a light.

l Typewriter correction ribbon: Used between lines typed with a black ribbon, the results of 

typing with the correction tape are visible only under a strong light.

The advantage of steganography is that the parties can employ the stenographers to reveal the

secrecy of the messages. But this has more disadvantages when compared to encryption. Stenography

requires a lot of overhead to hide few bits of information and once the system is discovered, it becomes

useless without maintaining the secrecy. This can be overcome by first encrypting the message and then

hiding that message using stenography maintains the secrecy of the information.

Chapter 5 - Crytography and Network Security

Page 105: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 105/112

105BSIT 63 Advanced Computer Networks

5.10 CLASSICAL ENCRYPTION TECHNIQUES

This section provides the brief introduction to classical encryption techniques and its different techniques.

A study of these techniques illustrates the basic approaches to conventional encryption used in the presentscenario. Before computers, cryptography consisted of character-based algorithms. Different cryptographic

algorithms were used.

Most good cryptographic algorithms combine the elements of substitution and transposition.

In the classical encryption techniques there are four types of substitution

ciphers:

1. A simple substitution cipher or monoalphabetic cipher- This is the one in which each

character of the plaintext is replaced with a corresponding character of cipher text. The

cryptograms in newspapers are simple substitution ciphers.

2. A homophonic substitution cipher – is like a simple substitution cryptosystem, except a

single character of plaintext can map to one of several characters of cipher text.

3. A Polygram substitution cipher is one in which blocks of characters are encrypted in-groups.

4. A polyalphabetic substitution cipher is made up of multiple simple substation ciphers. For

example, there might be five different simple substation ciphers used; the particular one used

changes with the position of each character of plaintext.

5.10.1 SUBSTITUTION TECHNIQUES OR SUBSTITUTION

CIPHERS

A substitution cipher is one in which each character in the plaintext is substituted for another

character in the cipher text. The receiver decrypts the ciphertext or the encrypted message to deduce or

to recover the plaintex.

Caesar Cipher

This is the most famous substitution algorithm, in which each plaintext character is replaced by the

character three to the right modulo 26. ( i,e A is replaced “D” , B is replaced by “E”) For example:

Plain: m e e t m e t o m o r r o w

Cipher: PHHW PH WRPRUURZ

Note that the alphabet is warped around, so that the letter following Z is A. The transformation can be

listed by the following possibilities:

Page 106: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 106/112

106

Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z

Cipher: D E R G H I J K L M N O P Q R S T Y V W X Y Z A B C

If the numerical values are assigned value of each letter is equal to (a=1,b=2, etc,) then the algorithm

is expressed as follows. For each plaintext letter p, substitute the cipher text letter C:

C= E(p) = ( p + 3 ) mod (26)

A shift may be of any amount, so that the general Caesar algorithm is

C = E ( p ) = ( p + k ) mod(26)

Where k takes value in the range 1 to 25.

The decryption algorithm is given by

P = D ( C ) = ( C – k ) mod(26)

If the given cipher text is a Caesar cipher, then a brute-force cryptanalysis is easily performed, by

simply trying all the 25 possible keys. Figure 2.4 shows the results of applying this strategy to the example

cipher text. In this case the plaintext leaps out as occupying the third line.

Plain text : meet me after the toga party

Cipher text are:

PHHW PH DIWHU WKH WRJD SDUWB

oggv og chvgt vjg vqic rctva

nffu nf bgufs uif uphb qbsuz

meet me after the toga party

ldds ld zesdq sgd snfz ozqsx

kccr kc ydrcp rfc rmey nyprw

 jdbq jb xcqbo qeb qldx mxoqv

iaap ia wbpan pda pkcw lwnpu

hzzo hz vaozm ocz ojbv kvmot

gyyn gy uznyl nby niau julns

fxxm fx tymxk max mhzt itkmr

ewwl ew sxlwj lzw lgys hsjlq

dvvk dv rwkvi kyv kfxr grikp

Chapter 5 - Crytography and Network Security

Page 107: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 107/112

107BSIT 63 Advanced Computer Networks

The brute force cryptanalysis is used because of the following three characteristics:

l The encryption and decryption algorithms are known.

l There are only 25 keys to try.

l The language of the plaintext is known and easily recognizable.

5.10.2 Monoalphabetic Ciphers

With only 25 possible keys, the Caesar cipher is far from secure. A sequential increase in the key

space can be achieved by allowing an arbitrary substation. The cipher line can be any permutation of the

26 alphabetic characters, then there are 26! Or greater than 4x1026 possible keys. This is 10 orders of 

magnitude greater than the key space for DES and would seem to eliminate brute force techniques for

cryptanalysis. The relative frequency diagram of the character of English is as shown in figure 5.7.

cuuj cu qvjuh jxu jewq fghjo

btti bt puitg iwt idvp epgin

assh as othsf hvs hcuo dofhm

zrrg zr nsgre gur gvtn cnegl

yqqf yq mrfqd ftq fasm bmdfk  

xppe xp lqecp esp ezrl alcej

wood wo kpdob dro dyqk zkbdi

vnnc vn jocna cqn cxpj yjach

unnb um imbmz bpm bwoi xizbg

tlla tn hmaly aol avnh whyaf  

skkz sk glzkx znk zumg vgxze

rjjy rc fkyjw ymj ytlf ufwyd

qiix gr ejxiv xli xske tevxe

Page 108: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 108/112

108

Figure 5.7 Relative frequency diagram

The two principal methods are used in substitution ciphers to lessen the extent to which the structure

of the plaintext survives in the ciphertext. One approach is to encrypt multiple letters of plaintext, and theother is to use multiple cipher alphabets.

5.10.3 Playfair Cipher

The well known multiple letter encryption cipher is the playfair, which treats diagrams in the plaintext

as single units and translates these units into ciphertext diagrams. The playfair algorithm is based on the

use of a 5x5 matrix of letters constructed using a keyword. For example

M O N A R

C H Y B D

E F G I/J K

L P Q S T

U V W X Z

Chapter 5 - Crytography and Network Security

Page 109: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 109/112

109BSIT 63 Advanced Computer Networks

In this case, the keyword is monarchy. The matrix is constructed by filling the letters of the keyword

from left to right and from top to bottom, and then filling in the remainder of the matrix with the remaining

letters in alphabetic order. The letters J and I count as one letter. Plaintext is encrypted two letters at a

time, according to the following rules:

1. Repeating plaintext letters that would fall in the same pair are separated with a filler letter, such

as x, so that bolloon would be enciphered as ba lx lo on.

2. Plaintext letters that fall in the same row of the matrix are each replaced by the letter to the

right, with first element of the row circularly following the last. For example, ar is encrypted as

RM.

3. Plaintext letters that fall in the same column are each replaced by the letter beneath, with the top

element of the row circularly following the last. For example, mu is encrypted as CM.

4. Otherwise, the letter that lies in its own row replaces each plaintext letter and the columnoccupied by the other plaintext letter. Thus, hs becomes BP and ea becomes IM(or JM, as the

encipherer wisher).

The palyfair cipher is a great advance over simple monoalphabetic ciphers. For one thing, whereas

there are only 26 letters, there are 26x26=676 diagrams, so that identification of individual digrams is more

difficult. .

5.10.4 Hill cipher

This is the multi letter cipher algorithm developed by the mathematician Lester Hill in 1929. The

encryption algorithm takes m successive plaintext letters and substitutes for them m cipher text letters.

The substitution is determined by m linear equations in which each character is assigned a numerical

value(a=0,b=1,….z=25). For m=3 the system can be described as follows:

C1 = ( k 11

p1

+ k 12

p2

+ k 13

p3

) mod26

C2 = ( k 21

p1

+ k 22

p2

+ k 23

p3

) mod26

C3 = ( k 31

p1

+ k 32

p2

+ k 33

p3

) mod26

This can be expressed in term of column vectors and matrices:

26mod

3

2

1

333231

232221

131211

3

2

1

   

 

 

 

 

   

 

 

 

 =

   

 

 

 

 

 p

 p

 p

k k k 

k k k 

k k k 

Page 110: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 110/112

110

or

Where C and P are column vectors of length 3, representing the plaintext and cipher text, and K is a

3x3 matrix, representing the encryption key. Operations are performed mod 26.

Example , consider the plain text “paymoremoney.” And use the encryption key.

The first three letters of the plain text are represented by the vector (15 0 24). Then K(15 0 24)= (375

819 486) mod26 = 11 13 18) = LNS. Continuing in this fashion, the cipher text for the entire plaintext is

LNSHDLEWMTRW.

Decryption requires using the inverse of the matrix K. the inverse k -1 of a matrix K is defined by the

equation kk -1 K=1, where I is the matrix that is all zeros except for once along the main diagonal from

upper left to lower right. The inverse of a matrix does not always exist, but when it does, it satisfies the

proceeding equation. In this case, the inverse is

This is demonstrated as follows:-

= mod 26

It is easily seen that if the matrix K is applied to the cipher text, then the plaintext is recovered to

explain how the inverse of a matrix is determined, we make an exceedingly brief excursion into linear

algebra:- The interested reader must consult any text on that subject for greater detail. For any square

matrix (m x n), the determinant = the sum of all the products that can be formed by taking exactly one

  17 17 5

K = 21 18 21

2 2 19

17 17 5

K = 21 18 21

2 2 19

4 9 15

K-1

= 15 17 6

24 0 17

17 17 5

21 18 21

2 2 19

4 9 15

15 17 6

24 0 17

443 442 442

858 495 780

494 52 19

1 0 0

0 1 0

0 0 1

Chapter 5 - Crytography and Network Security

Page 111: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 111/112

111BSIT 63 Advanced Computer Networks

element from each row and exactly one element from each column, with certain of the product terms

preceding by menu’s sign. For a 2 x 2 matrix the determinant is K11

, K22

– K12

K21

.For a 3 x 3 matrix

the value for determinant is K11

K22

K33

+ K21

K32

K13

+ K13

K12

K23

– K31

K22

K13

– K21

K12

K33

– K11

K32 K23. If a square matrix A has a non zero determinant then the inverse of the matrix is computed as[A-1]

ij=(-1)i+j (D

ij) /dt (A), where ( D

ij) is the sub-determinant formed by deleting the ith row and jth

column of A and dt (A) is the determinant of A. For our purposes all arithmetic is done mode 26.

In general terms, the Hill system can be expressed as follows”

C = Ek 

( P ) = KP

P = Dk 

( C ) = K-1 C = K-1 KP = P

As with playfair, the strength of the Hill cipher is that it completely hides single-letter frequencies.

Indeed, with Hill, the use of a larger matrix hides more frequency information. Thus a 3x3 Hill cipher

hides not only single letter but also two-letter frequency information. This is strong against a cipher text-only attack; it is easily broken with a known plaintext attack.

For an mXn Hill cipher, suppose we have m plaintext – ciphertext pairs,each of length m. we label the

pairs P j

=(P1j,P

2j……P

mj) and C

 j=(C

1j,C

2j…..C

 jm)such that C

 j=KP

 jfor 1<=j<=m and for some unknown

key matrix k. Now define two m x m matrices X=(Pij) and Y=(C

ij). Then we can form the matrix

equation Y=XK. If X has an inverse, then we can determine K=X-1Y. If X is not invertible, then a new

version of X can be formed with additional plaintext – ciphertext pairs until an invertible X is obtained

5.10.5 Transposition CiphersIn a transposition cipher the plaintext remains the same, but the order of characters is shuffled around.

In a simple columnar transposition cipher, the plaintext is written horizontally onto a piece of graph paper

of fixed width and the ciphertext is read off vertically seen the following example. Decryption is a matter

of writing the ciphertext vertically onto a piece of graph paper of identical width and then reading the plain

text off horizontally.

Plaintext: COMPUTER GRAPHICS MAY BE SLOW BUT AT LEAST IT’S

EXPENSIVE

COMPUTERGR

APHICSMAYB

ESLOWBUTAT

LEASTITSEX

PENSIVE

Ciphertext: CAELPOPSEEMHLANPIOSSUCWTITSBIVEMUTERATSGYAERBTX

Page 112: BSIT-63-Advance Computer

7/16/2019 BSIT-63-Advance Computer

http://slidepdf.com/reader/full/bsit-63-advance-computer 112/112

112

A pure transposition cipher is easily recognized because it has the same letter frequencies as the

original plaintext. For the type of columnar transposition just shown, cryptanalysis is fairly straightforward

and involves laying out the ciphertext in a matrix and playing around with column positions. The transposition

cipher can be made significantly more secure by performing more than one stage of transposition .

5.11 SUMMARY

This chapter covered the introduction to cryptography , network services, network mechanisms and

different types of attacks. The importance of gatekeeper in the network is also discussed in detail. We

discussed upon many issues such as Attacks, services, and security mechanism. Different types of ciphers

are discussed in detail.

5.12 QUESTIONS

1. What is cryptography?

2. Explain cryptographic algorithms

3. Explain different types of attacks

4. Explain briefly on security mechanisms

5. Explain conventional encryption model?

6. What is STEGANOGRAPHY?

5.13 REFERENCE BOOKS

Chapter 5 - Crytography and Network Security