
Welcome!
Long time no see! These two weeks we continue learning networking. We learnt about the construction of networks and seven layers in networks. There are various transmission media with different features. Last week, we learnt about wireless networks and its advantages ad disadvantages.
Construction of networks
Standards are the common ground on which hardware and software manufacturers can depend on in order to build systems that are able to communicate with each other. If the hardware does not follow some common standards, the computer systems may not be able to interconnect together to create a network. Normally, there are two types of standardized networking protocols which are IEEE and IETF. If hardwares and softwares in a network following various standards, the hardwares and softwares will not be incompatible. For instance, if the computer system only support USB ports, while the switch only support Ethernet ports, these two hardware elements are unable to connect to each other, for having different communication standards. Without standards, communication will be extremely difficult. Interconnecting products from various vendors would be difficult. It can be indicated that standards play an important role in the construction of networks.
Layers in networks

Open system is a system that is based on a common model of network architecture and an accompanying suite of protocols. Open system interconnection is a most-widely used networking standard, which is established by the International Standards Organization. It is an abstract depiction and explanation of network communication process. Organizing a network design in layers makes the process less complex because any problem is broken down into distinct modules. It is clear that different layers serve different functions and use different protocols for information exchange. There are seven layers of open system interconnection: application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer.

Application layer serves as the window for users and application processes to access the network services. Program that opens what was sent or creates what is to be sent is application layer, like Safari. The central device is user application. Common used protocols are Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), Telnet, Secure Shell (SSH), File Transfer Protocol (FTP).etc. The protocol data unit is data. Clicking on a link on an internet browser is akin to a customer dialing on their phone to order a pizza.
Presentation layer (encrypt and decrypt) formats the data to be presented to the application layer, like SMPP, NetBIOS, and PAP7. It can be viewed as the “Translator” for the network, like name recognition and data compression. It is responsible for opening, closing, and managing the connection between the two hosts. The PDU of this layer is data. Common protocols are Joint Photographic Experts Group (JPEG), Graphics Interchange Format (GIF),(Tagged Image Format File (TIFF), Moving Picture Experts Group (MPEG), American Standards Code for Information Interchange [ASCII]. Encryption also tends to take place on this layer, although it can also be done on other layers like application, session, transport, or network layers. Decryption also takes place on this layer. In order for our pizza customer to place an order, she needs to speak a common language with the person taking her order.
Session layer allows session establishment between processes running on different stations, which means to synchronize and send information to ports. The session layer makes it possible to establish an open communication line to send the requested packets, like the process session establishment, maintenance, and termination. Central devices are logical ports. The PDU is data as well. Common protocols are Lightweight Directory Access Protocol (LDAP) and Remote Procedure Call (RPC), as well as NFS, SQL, and X Windows. For example, the session layer will create a connection between you and a web server that you are trying to connect.
Transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications, like message segmentation and message acknowledgment. The transport layer not only defines how data is sent, but also provides validation and firewall security. It is important for making sure that the data sent is accurate and reliable. Common protocols are Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Sequenced Packet Exchange (SPX), Name-Binding Protocol (NBP). Suspicious packets will not make it past a firewall. Similarly, suspicious looking pizzas will not go out for delivery. The PDU of this level is a part for TCP and datagram for UDP.
Network layer controls the operations of the subnet, deciding which physical path the data takes. Data encapsulation means that the router encapsulates data with a header with a source and destination IP address. Fragmentation and re-assembly happens when packets are too large, the layer is responsible fore defragmenting information into sizable chunks for the Data Link Layer. The central devices are routers. The PDU is packets at this layer. Common protocols are Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP). Logical addressing are virtual IP addresses that help packets navigate a network to reach their destination using IPv4 or IPv6 products. In the same way that the network layer determines the best way to route information, our pizza deliver person will rely on a GPS to map out a customer’s location.
Data Link Layer provides error-free transfer of data frames from one node to another over the Physical layer. It is responsible for the physical addressing or MAC addresses. The central devices are switch, bridge, and WAP. The PDU is a frame. Common protocols are Lightweight Directory Access Protocol (LDAP) and Remote Procedure Call (RPC), as well as NFS, SQL, and X Windows. LLC sublayer frames bits and bytes and encapsulates data with a header and trailer. One of the major functions of the data link layer is to provide a physical MAC address so that requested information can find its destination.
Physical Layer is concerned with the transmission and reception of the unstructured raw bit stream over the physical medium. The physical layer consists of the physical components in a Local Area Network (LAN) such as networking hardware and Ethernet cables. Data encoding and physical medium attachment are involved in this layer. Cables or hubs might be used in physical layer. The PDU of this layer is bit. Data will be converted into signals and sent across the network through physical items.
Besides, a port is a logical connection of two end points; while a socket is one end point of connection. Ports take place in transport layer. Sockets are a ways to plug the application layer in, which are determined by an IP address and port number. Session initiation protocol is a signaling protocol used for initiating, maintaining, and terminating real-time sessions which include voice, video, and messaging applications.
Transmission Media

There are various types of transmission media: twisted-pair, coaxial, and fiber-optic. Coaxial cable consists of two copper conductors. It is usually used in computer networks and cable TV. However, it needs less money for installation. Unshielded twisted pair cable is the most popular in LANs, which is easy to install. It is prone to electrical interference. It also has low cost of installation. The most significant is that it is relatively secure. Shielded twisted pair cable is more difficult to install than UTP, but it reduces interference. Fiber optic cable carries a beam of light to transmit data, but it is extremely expensive compared with other types of transmission medias. It is fast and needs less repeaters. It is the most secure among these medias. This type is mainly for data transmission and telephone lines.
Here is a picture to compare the transmission medias from the aspects of speed, reliability, cost, and security.

The common transmission media for wireless networks are infrared, broadcast radio, cellular radio, microwaves, and communications satellites. Infrared is a wireless transmission medium that sends signals using infrared light waves. Mobile computers and devices, such as a mouse, printer, and smart phone, can transfer of data from one device to another using infrared light waves. Broadcast radio is a wireless transmission medium that distributes radio signals through the air over long distances such as between cities, regions, and countries and short distances such as within an office or home. Bluetooth, UWB, Wi-Fi, and WiMAX communications technologies use broadcast radio signals. Cellular radio is a form of broadcast radio that is used widely for mobile communications, specifically wireless modems and cell phones. A cell phone is a telephone device that uses high-frequency radio waves to transmit voice and digital data messages. Microwaves are radio waves that provide a high-speed signal transmission, involving sending signals from one microwave station to another. A communications satellite is a space station that receives microwave signals from an earth-based station, amplifies the signals, and broadcasts the signals back over a wide area to any number of earth-based stations.
Both guided transmission media and unguided transmission media can be used to transmit data and information. For guided transmission media, signals are transmitted directly and are confined in a narrow pathway by using physical links. However, for unguided transmission media, no physical medium is required for the transmission of electromagnetic signals.
Wireless Network

All wireless devices communicate and exchange data through radio transmissions, without any physical connection or cabling. Wireless systems and devices include cell phones, cordless computer keyboards, local area networks, mouse devices, personal network, remote controls, wireless microphones and so on. These are the hardware components of wireless network which are wireless node (PC, laptop, smart phone, printer …), wireless router, wireless network adapter, wireless antennas, wireless repeater, radio waves or ethernet cable, switch or hub, and modem. For software, wireless network involves network operating system with drivers, protocol stack, and applications like browser or file explorer. DHCP automatically assigns IP dress. Firewall software controls data comes in and goes out. SSID is used to differentiate one WLAN from another. NIC drivers translate and operate the hardware of the card. Operating system manages system resources, all protocols, hardware and applications. Security software accesses control, anti-spyware, intrusion detection system, IPC and so on. WAP is a set of protocols for accessing information over a mobile wireless network. Web browser is an application software to find, retrieve and display content on the WWW.
NOS is more expensive to obtain compared with OS. NOS is installed on network servers, which can also be found in a router or hardware firewall. Both OS and NOS are system softwares that manage a system’s resources. They can both manage access and permission on a system.
There are various standards for wireless networks: 1G, 2G, 3G, 4G, and even 5G. 1G is analog and 2G is digital. 3G provides amazing internet browsing speed, with 500-700 Kbps. 4G is for all IP technology. The main technology for 4G are WiMAX and LTE. Speeds for 4G are increased to lighting fast to keep up with data access demand used by various services. LTE is a standard for wireless broadband communication for mobile devices and data terminals. It increases the capacity and speed using a different radio interface together with core network improvements. WiMAX equals to worldwide interoperability for microwave access which is designed for large distance high speed internet access. It enables fast data transfer rate for a large quantity of users. It is much cheater compared with LTE.
Wireless sensor networks are used to measure data and parameters, like temperature, sound, pressure and so on. It can also be used for environmental sampling, security and surveillance, health-care monitoring, and underwater measurements. In WSN, sensors are located at specific spots and connected to a wireless network to perform distributed sensing tasks. It needs many nodes to communicate and promise coordination and cooperation. For example, it enables technologies like bluetooth, ZigBee and other middleware. It involves one or more than one data sinks. Necessary resources are involved in each system to perform necessary tasks, without requiring to communicate with central system even time. It is said that network has to be robustly and fault-tolerant between nodes. However, it needs large amount of devices and softwares. More bandwidth or resources are needed for back-up system. Security issues are still a problem for WSN.
Advantages and Disadvantages of Wireless Networks
The advantages of networks are using unlicensed radio spectrum which reduce license fees. It is easy to setup without cabling which saves space, time and cost. Wireless network is more flexible and convenient. It has global standard like 802.1 ln. Furthermore, there are many varieties of components that are available and prices are cheap. For disadvantages, wireless communication gives relatively low speed. It also gives higher error rates. It might be affected by weather which is not liable. Wireless communication offers weak security, protection, and privacy. Many information might be leaked through internet. Since some old devices do not have wireless connection, compatibility issues might occur.
Indirectly, because of wireless network, computers, smartphones and iPads rise in people’s lives. These might cause health issue, like near-sighted since electronic devices are bad for health and neck diseases because people always put their head down to see the screen. Social impacts might also be one consideration. Because of wireless networks, there are online shopping which saves people’s time and even money. It makes people’s life more convenient. It also decrease unemployment rate because of the rise of online shopping.
Here are pictures of in-class activities related with this topic. These activities are interesting and we can learn about other’s thoughts and perspectives from these activities since that various people have various angles when thinking about a thing or a topic.


In conclusion, we have learnt a lot during these two weeks. I can say that I am more professional in network, especially wireless network after these weeks’ learning. I am looking forward to next week’s classes. See you next week! Hope you have a great weekend!



















































