WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

IP Packet charging for multimedia services

( Télécharger le fichier original )
par SAIDI SAIBA et KAYISINGA Jean de DIEU
National University of Rwanda - Bachelor's degree 2007
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

CHAPTER II: THEORITICAL CONCEPTS

II.1. COMPUTER NETWORK BASICS

An internet work is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. The networking devices are the vital tools for communication.

Whenever they have a set of computers or networking devices to be connected, they make the connections, depending on the physical layout and their requirements Depending on the physical layout or topology of the network, there are many types of networks topologies, but in this project let talk about Local Area Network(LAN) and Wide Area Network(WAN).

II.1.1. NETWORK DEVICES II.1.1.1.Router

A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. 2

2 http://www.webopedia.com/TERM/r/router.html, February 1,2007

II.1.1.2. Switch

A switch is used in a wired network to connect Ethernet cables from a number of devices together. The switch allows each device to talk to the others. (Switches aren't used in networks with only wireless connections, since network devices such as routers and adapters communicate directly with one another, with nothing in between.)3

II.1.2. LAN

The Local Area Network (LAN) is by far the most common type of data network. As the name suggests, a LAN serves a local area (typically the area of a floor of a building, but in some cases spanning a distance of several kilometers).

Typical installations are in industrial plants, office buildings, college or university campuses, or similar locations. In these locations, it is feasible for the owning Organization to install high quality, high-speed communication links interconnecting nodes. Typical data transmission speeds are one to 100 megabits per second.

A wide variety of LANs have been built and installed, but a few types have more recently become dominant. The most widely used LAN system is the Ethernet system developed by the Xerox Corporation.

Intermediate nodes (i.e. repeaters, bridges and switches) allow LANs to be connected together to form larger LANs. A LAN may also be connected to another LAN or to WANs and MANs using a "router".

In summary, a LAN is a communications network which is:

· local (i.e. one building or group of buildings)

· controlled by one administrative authority

· assumes other users of the LAN are trusted

· usually high speed and is always shared

3 http://kbserver.netgear.com/kb_web_files/n101528.asp, February 1, 2007

LANs allow users to share resources on computers within an organization, and may be used to provide a (shared) access to remote organizations through a router connected to a Metropolitan Area Network (MAN) or a Wide Area Network (WAN).4

II.1.3. WAN

The term Wide Area Network (WAN) usually refers to a network which covers a large geographical area, and use communications circuits to connect the intermediate nodes. A major factor impacting WAN design and performance is a requirement that they lease communications circuits from telephone companies or other communications carriers.

Numerous WANs have been constructed, including public packet networks, large corporate networks, military networks, banking networks, stock brokerage networks, and airline reservation networks.

Some WANs are very extensive, spanning the globe, but most do not provide true global coverage. Organizations supporting WANs using the Internet Protocol are known as Network Service Providers (NSPs). These form the core of the Internet.

By connecting the NSP WANs together using links at Internet Packet Interchanges (sometimes called "peering points") a global communication infrastructure is formed. NSPs do not generally handle individual customer accounts (except for the major corporate customers), but instead deal with intermediate organizations whom they can charge for high capacity communications.

They generally have an agreement to exchange certain volumes of data at a certain "quality of service" with other NSPs. So practically any NSP can reach any other NSP, but may require the use of one or more other NSP networks to reach the required destination. NSPs vary in terms of the transit delay, transmission rate, and connectivity offered.

4 http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/lan.html , September 12,2006

Figure 1: WAN topology (Typical "mesh" connectivity of a Wide Area Network) Source: http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.html,september 22,2006

A typical network is shown in the figure above. This connects a number of End System (ES) (e.g. A, C, H, K) and a number of Intermediate Systems (IS)(e.g. B, D, E, F, G, I, J) to form a network over which data may be communicated between the End Systems (ES).

The characteristics of the transmission facilities lead to an emphasis on efficiency of communications techniques in the design of WANs. Controlling the volume of traffic and avoiding excessive delays is important. Since the topologies of WANs are likely to be more complex than those of LANs, routing algorithms also receive more emphasis.

Many WANs also implement sophisticated monitoring procedures to account for which users consume the network resources. This is, in some cases, used to generate billing information to charge individual users.5

II.1.4. MAN

Short for Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than widearea networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media. 6

5 http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.html, September 12,2006

6 http://www.webopedia.com/TERM/M/MAN.html, September 12,2006

II.1.5. SWITCHING II.1.5.1. CIRCUITSWITCHING

Circuit switching is the most familiar technique used to build a communications network. It is used for ordinary telephone calls. It allows communications equipment and circuits, to be shared among users. Each user has sole access to a circuit (functionally equivalent to a pair of copper wires) during network use. Consider communication between two points A and D in a network. The connection between A and D is provided using (shared) links between two other pieces of equipment, B and C.

Figure 2: A connection between two systems A & D formed from 3 links

Source: http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/cs.html, September 12, 2006

Network use is initiated by a connection phase, during which a circuit is set up between source and destination, and terminated by a disconnect phase. These phases, with associated timings, are illustrated in the figure below.

Figure 3: A circuit switched connection between A and D

Source: http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/cs.html, September 12, 2006

Figure 3 shows how Information is flowing in two directions. Information sent from the calling end is shown in pink and information returned from the remote end is shown in blue.

After a user requests a circuit, the desired destination address must be communicated to the local switching node (B). In a telephony network, this is achieved by dialing the number.

Node B receives the connection request and identifies a path to the destination (D) via an intermediate node (C). This is followed by a circuit connection phase handled by the switching nodes and initiated by allocating a free circuit to C (link BC), followed by transmission of a call request signal from node B to node C. In turn, node C allocates a link (CD) and the request is then passed to node D after a similar delay.

The circuit is then established and may be used. While it is available for use, resources (i.e. in the intermediate equipment at B and C) and capacity on the links between the equipment are dedicated to the use of the circuit.

After completion of the connection, a signal confirming circuit establishment (a connect signal in the diagram) is returned; this flows directly back to node A with no search delays since the circuit has been established. Transfer of the data in the message then begins. After data transfer, the circuit is disconnected; a simple disconnect phase is included after the end ofthe data transmission.

Delays for setting up a circuit connection can be high, especially if ordinary telephone equipment is used. Call setup time with conventional equipment is typically on the order of 5 to 25 seconds after completion of dialing. New fast circuit switching techniques can reduce delays. Trade-offs between circuit switching and other types of switching depend strongly on switching times. 7

II.1.5.2. PACKET SWITCHING

Packet switching is similar to message switching using short messages. Any message exceeding a network-defined maximum length is broken up into shorter units, known as packets, for transmission; the packets, each with an associated header, are then transmitted individually through the network. The fundamental difference in packet communication is that the data is formed into packets, and well-known "idle" patterns which are used to occupy the link when there is no data to be communicated.

Packet network equipment discards the "idle" patterns between packets and processes the entire packet as one piece of data. The equipment examines the packet header information (PCI) and then either removes the header (in an end system) or forwards the packet to another system. If the out-going link is not available, then the packet is placed in a queue until the link becomes free. A packet network is formed by links which connect packet network equipment.

7 http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/cs.html, September 12,2006

Figure 4: Communication between A and D using circuits which shared dusing PS. Source: Own drawing

Figure 5: Packet-switched communication between systems A and D Source: http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/ps.html

Figure 5 illustrate how message has been broken into three parts labeled 1 to 3 There are two important benefits from packet switching.

1. The first and most important benefit is that since packets are short, the communication links between the nodes are only allocated to transferring a single message for a short period of time while transmitting each packet. Longer messages require a series of packets to be sent, but do not require the link to be dedicated between the transmission of each packet. The implication is that packets

belonging to other messages may be sent between the packets of the message being sent from A to D. This provides a much fairer sharing of the resources of each ofthe links.

2. Another benefit ofpacket switching is known as "pipelining". Pipelining is visible in the figure above. At the time packet 1 is sent from B to C, packet 2 is sent from A to B; packet 1 is sent from C to D while packet 2 is sent from B to C, and packet 3 is sent from A to B, and so forth. This simultaneous use of communications links represents a gain in efficiency; the total delay for transmission across a packet network may be considerably less than for message switching, despite the inclusion of a header in each packet rather than in each

8

message.

II.2 OSI MODEL AND TCP/IP II.2.1 THE SE VEN LAYERS MODEL Seven layers are defined:

Application: Provides different services to the applications and describes how real work actually gets done. This layer would implement file system operations.

Presentation: Converts the information and describes the syntax of data being transferred. This layer describes how floating point numbers can be exchanged between hosts with different math formats.

Session: Handles problems which are not communication issues and describes the organization of data sequences larger than the packets handled by lower layers. This layer describes how request and reply packets are paired in a remote procedure call.

Transport: Provides end to end communication control and describes the quality and nature of the data delivery. This layer defines if and how retransmissions will be used to ensure data delivery.

8 http://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/ps.html,September 12,2006

Network: Routes the information in the network and describes how a series of exchanges over various data links can deliver data between any two nodes in a network. This layer defines the addressing and routing structure of the Internet.

Data Link: Provides error control between adjacent nodes and describes the logical organization of data bits transmitted on a particular medium. This layer defines the framing, addressing and check summing of Ethernet packets.

Physical: Connects the entity to the transmission media and describes the physical properties of the various communications media, as well as the electrical properties and interpretation of the exchanged signals. This layer defines the size of Ethernet coaxial cable and the termination method.9

Figure 6: OSI model

Source: http://www.raduniversity.com/networks/1994/osi/layers.htm, september 22,2006

II.2.2 TCP/IP AND UDP PROTOCOLS

Even TCP and UDP use the same network layer (IP), TCP provides a totally different service to the application layer than UDP does.TCP provides a connection-oriented, reliable, byte stream service.

9 http://www.raduniversity.com/networks/1994/osi/layers.htm ,September 24, 2006

The term connection-oriented means the two applications using TCP (normally considered a client and a server) must establish a TCP connection with each other before they can exchange data. The typically analogy is dialing a telephone number, waiting for the other party to answer the phone and say something.

II.2.2.1 TCP

TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. In brief, TCP provide a reliable, connection-oriented, byte-stream, transport layer service.10

II.2.2.1.1 Internet Protocol (IP)

The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing information and some control information that enables packets to be routed. IP is the primary network-layer protocol in the Internet protocol suite.

Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes.11

10 http://www.webopedia.com/TERM/T/TCP.html, September 12,2006

11 http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ip.htm#wp4145, September 24, 2006

II.2.2.1.2 IP Packet Format

An IP packet contains several types of information, as illustrated in.

Figure 7: IP packet Datagram Source: Own drawing

The following discussion describes the IP packet fields illustrated in:

· Version--indicates the version of IP currently used.

· IF Header Length (IHL)--Indicates the datagram header length in 32-bit words.

· Type-of-Service--Specifies how an upper-layer protocol would like a current datagram to be handled, and assigns datagrams various levels of importance.

· Total Length--specifies the length, in bytes, of the entire IP packet, including the data and header.

· Identification--contains an integer that identifies the current datagram. This field is used to help piece together datagram fragments.

· Flags--consist of a 3-bit field of which the two low-order (least-significant) bits control fragmentation. The low-order bit specifies whether the packet can be fragmented. The middle bit specifies whether the packet is the last fragment in a series of fragmented packets. The third or high-order bit is not used.

· Fragment Offset--indicates the position of the fragment's data relative to the beginning of the data in the original datagram, which allows the destination IP process to properly reconstruct the original datagram.

· Time-to-Live--maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly.

· Protocol--Indicates which upper-layer protocol receives incoming packets after IP processing is complete.

· Header Checksum--helps ensure IP header integrity.

· Source Address--specifies the sending node.

· Destination Address--specifies the receiving node.

· Options--Allows IP to support various options, such as security.

· Data--Contains upper-layer information.

II.2.2.1.3 IP Addressing

As with any other network-layer protocol, the IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for subnetworks, as discussed in more detail later in this chapter.

Each host on a TCP/IP network is assigned a unique 32-bit logical address that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the InterNIC (Internet Network Information Center) if the network is to be part ofthe Internet.

An ISP (Internet Service Provider) can obtain blocks of network addresses from the InterNIC and can itself assign address space as necessary. The host number identifies a host on a network and is assigned by the local network administrator.

II.2.2.1.4 IP Address Format

The 32-bit IP address is grouped eight bits at a time, separated by dots, and represented in decimal format (known as dotted decimal notation). Each bit in the octet has a binary weight (128, 64, 32, 16, 8, 4, 2, 1). The minimum value for an octet is 0, and the maximum value for an octet is 255 Illustrates the basic format of an IP address.

Figure 8: IP address consists of 32 bits, grouped into four octets. Source: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ip.htm,September 24, 2006

II.2.2.2 UDP

UDP is a simple, datagram-oriented, transport layer protocol: each output operation by a process produces exactly one UDP datagram, which causes one IP datagram to be sent. This is different from a stream-oriented protocol such as TCP where the amount of data written by an application may have little relationship to what actually gets sent in a single IP datagram.

Figure 9: UDP encapsulation Source: Own drawing

II.2.2.2.1 UDP Segment Structure

The UDP segment structure, shown in Figure 10

Figure 10: UDP segment structure

The application data occupies the data field of the UDP datagram. For example, for DNS, the data field contains either a query message or a response message. For a streaming audio application, audio samples fill the data field. The UDP header has only four fields, each consisting of four bytes.

As discussed in the previous section, the port numbers allow the destination host to pass the application data to the correct process running on that host (i.e., perform the demultiplexing function). The checksum is used by the receiving host to check if errors have been introduced into the segment during the course of its transmission from source to destination.

II.2.2.2.2 UDP Checksum

The UDP checksum covers the UDP header data. Recall that the checksum in the IP header only covers the IP header; it does not cover any data in the IP datagram. Both TCP and UDP have checksums in their headers to cover their and their data. With UDP the checksum is optional, while it is mandatory.

II.3 QUEUING DELAY AND JITTER BUFFER

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Un démenti, si pauvre qu'il soit, rassure les sots et déroute les incrédules"   Talleyrand