Back to Explore

Comprehensive Study Notes: Introduction to Networks & Wireless Summary & Study Notes

These study notes provide a concise summary of Comprehensive Study Notes: Introduction to Networks & Wireless, covering key concepts, definitions, and examples to help you review quickly and study effectively.

1.1k words6 views
Notes

๐Ÿ—๏ธ Layered Network Architecture

Layering divides networking complexity into clear responsibilities: Application, Transport, Network, Link, and Physical. Each layer offers services to the layer above and uses the layer below. This modularity makes updates and debugging easier because changes inside one layer are largely transparent to others.

๐Ÿ“ฆ Encapsulation & Protocol Stack

Data is wrapped as it descends the stack: application message โ†’ transport segment (adds header HtH_t) โ†’ network datagram (adds header HnH_n) โ†’ link frame (adds header HlH_l). This is encapsulation, and each header carries control information used by its layer.

๐Ÿ” Important Layers & Examples

  • Application: HTTP, SMTP, IMAP (user-facing protocols).
  • Transport: TCP (reliable, ordered byte stream), UDP (unreliable datagrams).
  • Network: IP (routing, host-to-host delivery).
  • Link: Ethernet, 802.11 (WiFi) โ€” neighbor-to-neighbor frame transfer.
  • Physical: bits on the wire/air.

โฑ๏ธ Packet Delay Components

End-to-end nodal delay has four parts: processing, queueing, transmission, propagation. Key formulas:

  • Transmission delay: dtrans=LRd_{trans} = \frac{L}{R} (L = packet bits, R = link bps).
  • Propagation delay: dprop=dsd_{prop} = \frac{d}{s} (d = distance, s โ‰ˆ speed of light). Queueing varies with congestion; packet loss occurs when router buffers overflow.

๐Ÿ“ˆ Throughput & Bottlenecks

Throughput is bits/time delivered end-to-end. The slowest link (bottleneck) limits throughput. When sending from a server at rate RsR_s to a client at RcR_c, effective throughput is constrained by the minimum link capacity on the path.

๐ŸŒ Addressing, Routing & DNS

  • IP addresses: 32-bit (IPv4) identifiers in network byte order.
  • DNS maps domain names to IP addresses (e.g., example.com โ†’ 34.239.29.130).
  • Routing: Networks (blocks) are advertised and routes chosen (static or adaptive). The Internet is a network-of-networks (ISPs, IXPs).

๐Ÿ”Œ Sockets, Ports & Connections

A socket is an endpoint: (IP address, port). Ports let the kernel demultiplex services (e.g., port 80 โ†’ webserver). TCP provides point-to-point, full-duplex, reliable byte streams.

๐Ÿงช Practical Notes

Use tools like Wireshark to observe packets and practice the material. Labs will focus on protocol analysis and capture.

๐Ÿ“ก What is Wireless & RF Basics

Wireless uses electromagnetic waves. RF (Radio Frequency) spans roughly 3 kHzโ€“300 GHz. Signals carry analog (continuous) or digital (discrete bits) information. Key signal properties: frequency, amplitude, and phase.

๐ŸŒŠ Wavelength & Frequency Relationship

Wavelength ฮป\lambda relates to frequency ff by ฮป=cf\lambda = \frac{c}{f}, where cc โ‰ˆ 3ร—10^8 m/s. Examples: 900 MHz โ†’ ฮป\lambda โ‰ˆ 0.33 m; 2.4 GHz โ†’ ฮป\lambda โ‰ˆ 0.125 m.

๐Ÿ“‰ Power, Gain, and Decibels

Power ratios use decibels: gain(dB)=10logโก10(PoutPin)\text{gain(dB)} = 10 \log_{10}\left(\frac{P_{out}}{P_{in}}\right). Power in dBm: PdBm=10logโก10(PmW)P_{dBm} = 10 \log_{10}(P_{mW}). Rules of thumb: +3 dB โ‰ˆ double power; +10 dB โ‰ˆ 10ร— power.

๐Ÿ”‹ Transmit Power and Sensitivity

Examples: an nRF52840 might transmit at 8 dBm (~6.31 mW) and have a receive sensitivity of -95 dBm. Different technologies trade transmit power and sensitivity (e.g., LoRa uses higher Tx power and much better sensitivity for long range).

๐Ÿ›‘ Propagation & Attenuation

Signal strength reduces with distance (free-space path loss, multipath, obstacles). Free-space loss scales roughly with the square of distance and depends on wavelength; however, indoor/outdoor models and reflections often dominate real-world range.

โš ๏ธ Noise & Errors

Noise sources: thermal, induced, interference, and impulse. Lower received energy increases BER (bit error rate). Distortion (frequency-dependent delays) can cause phase changes and inter-symbol interference.

๐Ÿ”Š Signal Quality: SNR & Multipath

SNR (Signal-to-Noise Ratio) is the signal power divided by noise power (often expressed in dB) and indicates link quality. Multipath occurs when reflections cause multiple delayed copies of a signal to arrive, producing constructive/destructive interference and fading.

๐Ÿ“ถ Spectrum, Channels & Unlicensed Bands

Spectrum is limited and valuable. Common unlicensed bands for IoT: 902โ€“928 MHz, 2.4โ€“2.5 GHz, 5 GHz. Different technologies share spectrum in different ways; coexistence and interference are key concerns.

๐Ÿ” Modulation Types & Tradeoffs

  • ASK / OOK: amplitude-based (simple, noise-prone).
  • FSK: frequency shifts (robust, uses more bandwidth).
  • PSK / DPSK: phase changes (energy-efficient, needs more complex hardware).
  • QAM: combines amplitude and phase to encode multiple bits/symbol. Tradeoffs include bandwidth use, noise immunity, and hardware complexity.

๐Ÿงฉ Framing & PHYโ€“MAC Interaction

Frames typically include a preamble (sync), header (addresses/type), payload (data + upper-layer headers), and trailer (CRC). Wireless link layers often include PHY control info, robust header protection, and sometimes in-frame rate changes.

โœ… Error Control

  • Detection: CRCs detect single-bit and burst errors.
  • Recovery: retransmissions (ARQ) or Forward Error Correction (FEC) to correct some errors without retransmission. Wireless favors more robust error strategies due to higher retransmission costs.

๐Ÿ•น๏ธ Medium Access Control (MAC) โ€” Intuition

Wireless medium is a shared broadcast channel. MAC protocols decide who transmits when to avoid collisions. Approaches mirror human coordination: listen-before-talk, scheduled turns, or random access.

โš”๏ธ MAC Protocol Families

  • Contention-based: ALOHA, Slotted ALOHA, CSMA/CA (WiFi), BLE advertising.
  • Contention-free: TDMA, scheduled slot allocations (BLE connections, some LPWANs).
  • Frequency split: FDMA.
  • Code split: CDMA. Each has tradeoffs in throughput, latency, overhead, synchronization, and robustness to interference.

๐Ÿ” ALOHA & CSMA Highlights

  • Pure ALOHA: send whenever; peak throughput โ‰ˆ 18.4% of channel capacity.
  • Slotted ALOHA: synchronized slots; peak โ‰ˆ 36.8%.
  • CSMA/CA: listen-before-send with collision avoidance (used by WiFi).
  • CSMA/CD: collision detection (works on wired media like Ethernet, not wireless).

๐Ÿ›ก๏ธ Hidden Terminal & RTS/CTS

Hidden terminal arises when two transmitters cannot hear each other but collide at a receiver. RTS/CTS reduces costly collisions by reserving the medium but adds overhead.

๐ŸŒ Real-world Mappings

  • WiFi โ†’ slotted CSMA/CA.
  • BLE โ†’ both advertising (ALOHA-like) and connection modes (TDMA-like scheduling).
  • LoRa/Sigfox โ†’ ALOHA-style LPWANs.
  • Cellular LPWANs (LTE-M, NB-IoT) โ†’ scheduled/TDMA-like and centralized control.

๐Ÿงญ How to Approach These Slides (User Guidance)

These slides cover two linked themes: how networks are structured (layers, addressing, routing) and how wireless differs (physics, modulation, MAC). Study the layered model first to place concepts, then map wireless specifics to the layers they affect (PHY โ†’ modulation/propagation; Link โ†’ framing/MAC; Network/Transport โ†’ routing/connection semantics).

โ“ Key Questions to Practice

  • Which layer provides reliability? (Transport, e.g., TCP.)
  • Where does DNS live? (Application.)
  • Who decides when a wireless device can transmit? (Link/MAC.)
  • Who decides which router to forward a packet to? (Network/Routing.)

๐Ÿ” Example: Visiting a Website (Step Checklist)

  1. Enter domain name โ†’ trigger DNS lookup (Application).
  2. Resolve to IP โ†’ open socket to IP:80 (Transport + Network).
  3. Send HTTP request and receive response โ†’ parse and render (Application/Transport).

๐Ÿงช Tips for Labs

Use Wireshark to see encapsulation and timing (delays, retransmissions). Observe physical/wireless specifics by noting retries, rates, and RSSI/SNR fields in captures.

Sign up to read the full notes

It's free โ€” no credit card required

Already have an account?

Create your own study notes

Turn your PDFs, lectures, and materials into summarized notes with AI. Study smarter, not harder.

Get Started Free
Comprehensive Study Notes: Introduction to Networks & Wireless Study Notes | Cramberry