BIT2204 Introduction To Data Communication and Computer Networks PDF
BIT2204 Introduction To Data Communication and Computer Networks PDF
DEPARTMENT OF INFORMATION
TECHNOLOGY
1.2
1.3
2.2
2.3
2.4
3.2
Introduction ............................................................................................................................. 45
4.2
4.3
4.4
1.2
1.3
Introduction to Switching........................................................................................................ 66
6.2
6.3
6.4
7.2
7.3
COURSE OUTLINE
BIT 2204: DATA COMMUNICATION AND COMPUTER NETWORKS
TOPICS - DETAILS
I. Introduction to Networks
A. Definition of terms
B. Network types, LAN, MAN, WAN
C. Basic components of a Network, terminal, server etc
D. Network types; peer to peer, client server, advantages
II. Transmission medium
A. Guided Medium, twisted pair, coaxial cable, fiber optic
B. Unguided medium, satellite, microwave
C. Transmission impairments, noise, attenuation, delay distortion
III. Network topologies
A. Star, ring, bus, mesh
B. Advantages and disadvantages of the different network topologies
C. Medium Access control, CMSA CD, Token, polling
IV. OSI LAYER AND TCP/IP LAYERS
A. Advantages of a layered model
B. Seven OSI layers
C. Four TCP/IP layer
V. Connecting Devices
A. Networking Devices, switch, hub, bridge, repeater
B. Internetworking Devices, Router, gateway
VI. Switching techniques
A. Circuit switching
B. Packet switching
C. Message switching
VII. Multiplexing
A. Time division Multiplexing
B. Frequency division Multiplexing
Main course text
Tanenbaum A.S.(1996), Computer Networks, Prentice Hall India
4
Reference Books
i.
ii.
iii.
CHAPTER ONE
INTRODUCTION TO NETWORKS
Learning Objectives
By the end of this chapter the learner shall be able to;
i.
ii.
iii.
The different types of networks such as the Local area network, Metropolitan area
network and the Wide area Network.
iv.
1.1
Definition of terms
the server decides who can and cannot log on the network and which resources the various can
access.
Data communication - electronic transmission of information that has been encoded digitally
(as for storage and processing by computers).
Data are groups of information that represent the qualitative or quantitative attributes of a
variable or set of variables. Data (plural of "datum", which is seldom used) are typically the
results of measurements and can be the basis of graphs, images, or observations of a set of
variables. Data are often viewed as the lowest level of abstraction from which information and
knowledge are derived.
Information Processed data that is in a meaningful form.
A transmitter is an electronic device which, usually with the aid of an antenna, propagates an
electromagnetic signal such as radio, television, or other telecommunications.
Receiver, the receiving end of a communications channel
Signal a physical quantity that can carry information
Channel , the medium used to convey information from a sender to a receiver.
An electric bus is a bus powered by electricity that connect two devices
Simplex communication refers to communication that occurs in one direction only.
A half-duplex system provides for communication in both directions, but only one direction at a
time (not simultaneously). Typically, once a party begins receiving a signal, it must wait for the
transmitter to stop transmitting, before replying.
An example of a half-duplex system is a two-party system such as a "walkie-talkie" style twoway radio, wherein one must use "Over" or another previously-designated command to indicate
the end of transmission, and ensure that only one party transmits at a time, because both parties
transmit on the same frequency.
A duplex communication system is a system composed of two connected parties or devices that
can communicate with one another in both directions.
A network is an interconnection of two or more computers in order to share data and resources.
Point to Point communication A traditional point-to-point data link is a communications
medium with exactly two endpoints and no data or packet formatting. The host computers at
7
either end had to take full responsibility for formatting the data transmitted between them.
Computers in close proximity may be connected by wires directly between their interface cards.
Multi point communication - A system with at least one, and preferably at least two, end
devices
Why network computers?
There are some compelling reasons why someone with more than a couple computers would
want to connect those computers into a network. What the network will actually be used for will,
of course, vary depending on the needs of the person or organization creating the network.
Networks can be used for simple tasks, such as sharing a printer, or they can be used for more
advanced applications, such as complex point-of-sale system and worldwide video conferencing.
All networks, whether big or small, are typically created so that users on the network can share
resources and communicate. The list that follows breaks down some of the reasons for
networking computers:
File sharing. Networking computers makes it very easy for the users on the network to
share application files
Hardware sharing. Users can share devices such as printers, CD-ROM drives, and hard
drives.
Program sharing. Applications such as spreadsheets and word processors can be run over
the network.
Computer
Computer
Computer
Computers of a Peer-To-Peer network can take both a client and a server role. There is no
centralized control over shared resources, such as files or printer. Any individual machine
can share its resources with any other computer on the same network, however and
9
whenever its users choose to do so. The Peer-To-Peer relationship also means that all
computers have equal access and responsibility in the network.
Advantages of Peer-To-Peer Network
Easy to install and configure.
Individual machines do not depend on the presence of a dedicated server.
Individual users control their own-shared resources.
Its inexpensive to purchase and operate.
No additional software or hardware beyond a suitable operating system is needed.
No dedicated administrators are needed to run the network.
It works best for network with 10 of fewer users.
Disadvantages of Peer-To-Peer Network
Network security applies only to a single resource at a time.
Users may be forced to use as many passwords as there are shared resources
Each machine must be backed up individually to protect all shared data.
There is no centralized organizational scheme to locate or control access to data.
Not suitable for more than 10 users
Suitability of Peer-To-Peer Network
In the following situations peer-to-peer is appropriate.
There are fewer than ten people in your organization
The people in your organization are sophisticated computer users
Security is not an issue or the user can be trusted to maintain good security
There is no one central administrator who sets network policies.
Costly to have an additional computer just to server files
User can be relied upon to back up their own data
User are physically close and no plans for expansion on the network
10
Server-Based Network
Computer
Computer
Server
Server based networks provide centralized control over network resources, primarily by
enforcing network security and control through the servers own configuration and setup. The
computers used for servers usually incorporate faster CPUs, more memory, larger disk drives, ad
extra peripherals (such as tape drives and CD ROM) when compare to end user machines
(clients). In most cases, servers are dedicated to handle network requests from their clients.
Advantages of Server-Based Network
Centralized user accounts, security, and access controls to simplify network
administration.
More powerful equipment means more efficient access to network resources.
A single password for network login deliver access to all.
Server-based networking makes the most sense for networks with 10 or more users or
any networks where resources are used heavily.
Disadvantages of Server-Based Network
At worst, server failure leads to whole network failure.
Complex, special-purpose server software requires allocation of expert staff, which
increases expanses.
Dedicated hardware (server) and special software (NOS) add to the cost.
Suitability of Server-Based Network
In the following situations server-based is appropriate.
11
Terminal
Terminal
Over the years, the data terminal market has increased substantially and there are now
literally hundreds of manufactures and many different kinds if terminal. However, the
fact is that all of these terminals have been designed primarily to input and display
information in some form or another. Therefore, even though specific characteristics such
as screen size and keyboard layout may differ, they can generally be categorized into
three simple groups.
1. Dumb Terminals
Dumb terminals are those which have limited functions and are driven with
information from a host computer. Normally, they consist of a Cathode Ray Tube
(CRT) display screen with a full alphanumeric keyboard and can be connected
12
13
Workstation
Workstation
2. Database Server
The database server was developed to solve the problem of passing an entire file over
the medium. The most common example of a database server is the SQL server.
Structured Query Language (SQL) is standard database definition, access, and update
language for relational database. An SQL server accepts a database request, accesses
all necessary records locally, and then sends only the result back to the requester (not
the whole database).
3. Print Server
Print server allows anyone on the network to have access to a printing service.
4. Disk Server
It is server with large storage. A portion of storage is given to each user to store their
files/data. It is very useful in university where each student is given a user account
with password and some storage space in disk server. Once the student completes the
education the same space can be assigned to new student.
5. Dedicated Vs Non-Dedicated Server
Many networks will let their user run standard programs while their computer is
simultaneously functioning as a server to others. A computer that both runs standard
programs and lets other user see its data at the same time is said to be non-dedicated
server. Non-dedicated servers can be clever way of setting up a small LAN without
having to buy any extra system. Dedicated server are specially assigned for network
management and provided no general-purpose services.
Network Interface Card
15
NIC
Attaching a computer to a network requires a physical interface between computer and
the networking medium. For PCs, this interface resides in a special network interface
card (NIC), also known as network adapter or a network card that plugs into an adapter
slot inside the computers case. Laptops and other computers may include built-in
interface or use special modular interface such as PC card interface, to accommodate a
network adapter of some kind.
For any computer, a NIC performs following crucial tasks:
1. It establishes and manages the computers network connection.
2. it translates digital data( of source computer) into signals (appropriate for the
networking medium) for outgoing messages, and translates from signals into digital
computer data for incoming messages.
3. Converts serial incoming data via cable into parallel data to for CPU, and vice versa.
4. It has some memory, which acts as a holding tank or buffer. It buffers the data to
control the data flow.
16
i.
ii.
iii.
17
CHAPTER TWO
TRANSMISSION MEDIA
Learning Objectives
By the end of this chapter the learner shall be able to;
i.
Explain the different guided transmission medium such as the twisted pair, coaxial
cable and fiber optic
ii.
Explain different unguided transmission medium such as the satellite and microwave
iii.
iv.
2.1
Guided
Twisted-Pair
cable
Coaxial
cable
Unguided
Fiber-optic
cable
Terrestrial
microwave
Satellite
18
Infrared
2.2
telephone system.
The Electrical Industry Association (EIA) divides UTP into different categories by quality grade.
The rating for each category refers to conductor size, electrical characteristics, and twists per
foot.
Category 1: Applies to transmit traditional UTP telephones cabling, which is designed to carry
voice but not data.
19
Category 2: Certifies UTP cabling for bandwidth up to 4 Mbps and consists of four pair of
wires. Since 4 Mbps is slower than most networking technologies in the use today. Category 2 is
rarely encountered in networking environment.
Category 3: Certifies UTP cabling for bandwidth up to 10Mbps. This includes most
conventional networking technologies, such as 10BaseT Ethernet and 4Mbps token ring etc.
Category 3 consists of four pairs, each having minimum 3 twist per foot.
Category 4: Certifies UTP cabling for bandwidth up to 10Mbps. This includes primarily
10BaseT Ethernet and 16Mbps token ring. Category 4 consists of four pairs.
Category5: Used for data transmission up to 100Mbps Category 5 also consists of four pairs.
UTP is particularly prone to cross talk, and the shielding included with STP is designed
specifically to reduce this problem.
Shielded Twisted Pair (STP) cable
STP includes shielding to reduce cross talk as well as to limit the effects of external interference.
For most STP cables, this means that the wiring includes a wire braid inside the cladding or
sheath material as well as a foil wrap around each individual wire. This shield improves the
cable's transmission and interference characteristics, which, in tern, support higher bandwidth
over longer distance than UTP.
Coaxial Cable: Coaxial cable, commonly called coax, has two conductors that share the same
axis. A solid copper wire runs down the center of the cable, and this wire is surrounded by plastic
foam insulation. The foam is surrounded by a second conductor, wire mesh tube, metallic foil, or
20
both. The wire mesh protects the wire from EMI. It is often called the shield. A tough plastic
jacket forms the cover of the cable, providing protection and insulation.
Where Ethernet is concerned, there are two types of coaxial cable, called this Ethernet (also
known as thinnet or thinwire,) and thick Ethernet (also known as thinnet or thickwire). The
Institute of Electrical and Electronics Engineers (IEEE) designates these cable types as 10Base2
and 10Base5, respectively, where these notations indicates:
Total bandwidth for the technology: in this case, 10 means 10Mbps
Base: indicates that the network uses baseband signaling and this applies to both types of cable.
2 or 5: a rough indicator of maximum segment length, measured in hundreds of meters; thinwire
support a maximum segment length of 185 meters, which rounds up to 200; thickwire supports a
maximum segment length of 500 meter
Fiber Optic Cable: fiber optic cable transmits light signals rather than electrical signals. It is
enormously more efficient than the other network transmission media. As soon as it comes
down in price (both in terms of the cable and installation cost), fiber optic will be the choice for
network cabling.
A light pulse can be used to signal a 1 bit; the absence of a pulse signals a 0 bit. Visible light
has a frequency of about 108 MHz, so the bandwidth of an optical transmission system is
potentially enormous.
21
An optical transmission system has three components: the transmission medium, the light source
and the detector. The transmission medium is an ultra-thin fiber of glass or fused silica. The light
source is either a LED (Light Emit Diode) or a laser diode, both of which emits light pulses
when a electrical current is applied. The detector is a photo diode, which generates an electrical
pulse when light falls on it.
Silica tube
Photo Diode
Led
A cable may contain a single fiber, but often fibers are bundled together in the center of the
cable. Optical fiber are smaller and lighter than copper wire. One optical fiber is approximately
the same diameter as a human hair.
Advantages of Fiber Optic
Noise resistance: it is immune to Electromagnetic Interference (EMI)
Less signal attenuation: signal can run for miles without requiring regeneration
Higher bandwidth: fiber optic cable can support dramatically higher bandwidths (and hence
data rate) than all other cables. Currently, data rates and bandwidth utilization over fiberoptic cable are limited not by the medium but by the signal generation and reception
technology available. A typical bandwidth for fiber optic is 100Mbps to 1Gbps.
Disadvantages of Fiber Optic
Cost : most expensive among all the cables
Installation / maintenance: is high
Fragility : glass fiber is more easily broken than wire
Summary Table of the Characteristic of All Cable Type
22
Factor
UTP
Coaxial
Fiber Optic
Cost
Lowest
Moderate
Moderate
Highest
Installation
Easy
Fairly easy
Fairly easy
Difficult
Bandwidth
Capacity
10 Mbps
16 Mbps
10 Mbps
100 Mbps
1 Gbps
Node
Capacity
Per Segment
2.3
STP
30
(10Base2)
100
(10Base5)
Attenuation
High
High
Lower
Lowest
EMI
Most
vulnerable
to EMI
Less
vulnerable
than UTP
Less
vulnerable
than UTP
No effect by
EMI
No wires needed. Running wires can be difficult in some cases; such as wiring an
existing building, wiring between buildings, wiring across mountains, etc.
Staying connected is important for mobile users. Wireless networks allow users stay
connected more hours each day. Users with laptops may roam their work space without
losing network connection and without logging into another machine. This increases the
productivity of workers.
Wireless networks can grow without much difficulty compared with wired networks.
Making a wired network larger often involves wiring and usually costly.
Wireless networks are not confined to an area. There is no long term commitment as in
the wired networks.
Radio transmission: These are systems for AM or FM radio. They are one form of
communications and not used for computer networks.
Terrestrial Microwave
Microwaves do not follow the curvature of the earth therefore require line of sight transmission
and reception equipment. The distance coverable by line of sight signals depends to a large
extend on the height of the antenna: the taller the antenna, the longer the sight distance. Height
allows the signals to travel farther without being stopped by the curvature of the earth and raises
24
the signals above many surface obstacles, such as low hills and tall buildings that would
otherwise block transmission.
Microwave signals propagate in one direction at a time, which means that two frequencies are
necessary for two ways communication such as telephone communication. One frequency is
reserved for transmission in one direction and other for transmission in other. Each frequency
requires its own transmitter and receiver. Today, both pieces of equipment usually are combined
in a single piece of equipment called transceiver, which allows a single antenna to serve both
frequencies and functions.
River
Building A
Building B
Terrestrial microwave systems are typically used when using cabling is very costly and difficult
to set.
Satellite Communication
Satellite transmission is much like line of sight microwave transmission in which one of the
stations is a satellite orbiting the earth. The principle is the same as terrestrial microwave, with a
satellite acting as a super-tall antenna and repeater. Although in satellite transmission signals
Satellite
Mother Earth
Satellite dish
Satellite dish
USA
25
Singapore
must still travel in straight lines, the limitations imposed on distance by the curvature of the earth
are reduced. In this way, satellite relays allow microwave signals to span continents and ocean
with a single bounce.
Satellite microwave can provide transmission capability to and from any location on earth, no
mater how remote. This advantage makes high quality communication available to undeveloped
parts of the world without requiring a huge investment in ground based infrastructure. Satellite
themselves are extremely expensive, of course, but leasing time or frequencies on one can be
relatively cheap.
Infrared Transmission
Infrared media uses infrared light to transmit signals. LEDs transmit the signals, and photodiodes
receive the signals. The remote control we use for television, VCR and CD player use infrared
technology to send and receive signals.
Because infrared signals are in high frequency range, they have good throughput. Infrared
signals do have a downside; the signals cannot penetrate walls or other objects, and they are
diluted by strong light sources.
26
2.4
Transmission Impairments:
With any communication system, there is a high possibility that the signal that is received
will differ from the signal that is transmitted as a result of various transmission
impairments. For analog signals, these impairments introduce various random
modifications that degrade the signal quality. For digital signals, bit errors are introduced:
A binary 1 is transformed into a binary 0, and vice versa.
The most significant impairments are the following:
Attenuation
Noise
a) Attenuation
When an electromagnetic signal is transmitted along any medium, it gradually
become weaker at greater distances, this is referred to as attenuation. To solve this
problem amplifier is used. The amplifier boosts the signals and extends the
transmission distance.
b) Noise
Random electrical signals that can be picked up by the transmission medium and
result in degradation of the data.
c) Delay Distortion
This is a common phenomenon with guided transmission media. The distortion is
caused by the fact that the velocity of propagation of a signal through a guided
medium varies with frequency. For a band limited signal, the velocity tends to be
highest near the centre frequency and fall off toward the two edges of the band. Thus
various frequency components of a signal will arrive at the receiver at different times.
This effect is called delay distortion.
d) Jitters
Jitter is a variation or dislocation in the pulses of a digital transmission; it may be
thought of, in a way, as irregular pulses. Jitter can manifest through variations in
27
amplitude, signal strength, and other elements of such waves. The usual causes
include connection timeouts, connection time lags, data traffic congestion, and
interference. Simply put, this jitter is an undesirable output of system flaws and
interruptions.
When is unguided media more appropriate to use than the guided media?
i.
ii.
iii.
28
CHAPTER THREE
NETWORK TOPOLOGIES
Learning Objectives
By the end of this chapter the learner shall be able to;
A. Explain the different network topologies and their operation in communication
B. Explain the advantages and the disadvantages of the different network topologies
C. Explain the different methods of medium access control such as CMSA/CD, token
passing etc.
3.1
The way in which the connections are made among all the computers is called the topology of
the network. Network topology specifically refers to the physical layout of the network, specially
the location of the computers and how the cable is run between them. Each topology has its own
strengths and weaknesses.
The most common topologies are the bus, the star, the ring and the mesh.
Bus Topology
The bus topology is the simplest and most common method for connecting computers. It is often
used when a network installation is small, simple, or temporary. It is important to note that the
bus topology is a Passive topology. This means that computers on the bus only listen for data
being sent, they are not responsible for moving the data from one computer to the next. If one
computer fails it has no effect on the rest of the network. In an active topology network, the
computers regenerate signals and are responsible for moving the data through the network.
29
Computer
Computer
Computer
Computer
Computer
Computer
30
3. It is easy to extend a bus. Two cables can be joined into one longer cable with a BNC barrel
connector, making a longer cable and allowing more computers to jinn the network.
Disadvantages of Bus
1. Heavy network traffic can slow a bus considerably.
2. A break in the cable or lake of proper termination can bring the network down.
3. It is difficult to troubleshoot a bus.
Bus topology is appropriate in following situation:
The network is small
The network will not be frequently reconfigured.
The least expensive solution is required.
The network is not expected to grow much
Star Topology
In a star topology, each device has a dedicated point to point link only to central controller,
usually called a hub.
How a Star Network Works
Each computer on a star network communicates with a central hub that resends the message
either to all the computers (in a broadcast star network) or only to the destination computer (in a
switched star network). The hub can be active or passive.
Star topology
Computer
Server
HUB
31
Computer
Computer
Computer
Computer
An active hub regenerates the electrical signal and sends it to all the computers connected to it.
This type of hub is often called a multiport repeater. Active hub requires electrical power to run.
A passive hub, such as wiring panels, merely acts as a connection point and does not amplify or
regenerate the signal. Passive hubs do not require electrical power to run.
Using a hybrid hub, several types of cable can be used to implement a star network. Hybrid hub
is used to connect different types of cables. It is used to maximise the networks efficiency and
utilise the benefits different cables.
Advantages of the Star
1. It is easy to modify and add new computers to a star network without disturbing the rest of
the network. You simply run a new line from the computer to the central location and plug it
into the hub. When the capacity of the central hub is exceeded, it can be replaced with one
that has a larger number of ports to plug lines into (or multiple hubs can be connected
together to extend the number of ports)
2. The centre of a star network is a good place to diagnose network faults. Intelligent hubs
(hubs with microprocessors that implement features in addition to repeating network signals)
also provide for centralised monitoring and management of the network.
3. Single computer failure does not necessarily bring down the whole star network.
4. Several types of cable can be used in the same network with a hybrid hub.
Disadvantages of Star
1. If the central hub fails, the whole network fails to operate.
2. It cost more to cable a star network.
Ring Topology
In a ring topology, each computer is connected directly to the next computer in line, forming a
circle of cable. It uses token to pass the information from one computer to another.
How a Ring Network Works
Every computer is connected to the next computer in the ring, and each retransmit what it
receives from the previous computer. The message flow around the ring in one direction. Since
each computer retransmits what it receives, a ring is an active network and is not subject to the
signal loss problem a bus experience. There is no termination because there is no end to the ring
Computer
Computer
Computer
Computer
Computer
Token passing a method of sending data in a ring. A small packet called the token passed around
the ring to each computer in turn. If a computer has information to send, it modifies the token,
adds address information and the data and sends it down the ring. The information travels around
the ring until it either reaches its destination or returns to the sender. When the intended
destination computer receives the packet, it returns a message to the sender including its arrival.
33
A new token is then created by the sender and sent down the ring, allowing another station to
capture the token and begin transmission.
A token can circle a ring 200 meters in diameter at about 10,000 times a second.
Advantages of Ring
1. All the computers have equal access to the network.
2. Even with many users, network performance is even
3. Allows error checking, and acknowledgement.
Disadvantages of Ring
1. Failure of one computer can affect the whole network.
2. It is difficult to troubleshoot the ring network.
3. Adding or removing computers disturbs the network.
Ring Topology is Appropriate in Following Situation:
The network must operate reasonably under a heavy load
A higher-speed network is required.
The network will not be frequently reconfigured.
Mesh Topology
In a mesh topology, every device has a dedicated point to point link to every other device. The
term dedicated means that the link carries traffic only between the two devices it connects. A
fully connected mesh network therefore has n (n-1)/2 physical channels to link n devices. To
accommodate that many links, every device on the network must have n-1 input/output ports.
34
Computer
Computer
Computer
Computer
Computer
Most mesh topology network are not true mesh networks. Rather, they are hybrid mesh
networks, which contain some redundant links but not all.
Advantages of Mesh
1. Because of the dedicated link, no traffic between computers.
2. Failures of one node computer not affect rest of the network.
3. Because of the dedicated link privacy and security are guaranteed
4. Point to point links make fault identification and fault isolation easy.
Disadvantages of Mesh
1. Due to the amount of cabling and number of input output ports, it is expensive.
2. Large space is required to run the cables.
3. Installation and reconfiguration are difficult.
When a Mesh Appropriates to Use
1. Direct transmission is required for privacy reason
2. Need to have dedicated lint for fast transmission.
Variations of the Major Topologies
35
Hybrid Star
A star network can be extended by placing another star hub where a computer might otherwise
go, allowing several more computers or hubs to be connected to that hub.
Star Bus
Hub
Hub
Hub
Hub
Hub
Hub
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
36
3.2
A network of computers based on multi-access medium requires a protocol for effective sharing
of the media. As only one node can send or transmit signal at a time using the broadcast mode,
the main problem here is how different nodes get control of the medium to send data, that is
who goes next?. The protocols used for this purpose are known as Medium Access Control
(MAC) techniques. The key issues involved here are - Where and How the control is exercised.
Where refers to whether the control is exercised in a centralised or distributed manner. In a
centralised system a master node grants access of the medium to other nodes. A centralized
scheme has a number of advantages as mentioned below:
Easy coordination.
Although this approach is easier to implement, it is vulnerable to the failure of the master node
and reduces efficiency. On the other hand, in a distributed approach all the nodes collectively
perform a medium access control function and dynamically decide which node to be granted
access. This approach is more reliable than the former one.
How refers to in what manner the control is exercised. It is constrained by the topology and
trade off between cost-performance and complexity.
Medium Access Control techniques are designed with the following goals in mind.
Initialisation: The technique enables network stations, upon power-up, to enter the state
required for operation.
Fairness: The technique should treat each station fairly in terms of the time it is made to
wait until it gains entry to the network, access time and the time it is allowed to spend for
transmission.
Priority: In managing access and communications time, the technique should be able to
give priority to some stations over other stations to facilitate different type of services
needed.
37
Limitations to one station: The techniques should allow transmission by one station at a
time.
Receipt: The technique should ensure that message packets are actually received (no lost
packets) and delivered only once (no duplicate packets), and are received in the proper
order.
Recovery: If two packets collide (are present on the network at the same time), or if
notice of a collision appears, the method should be able to recover, i.e. be able to halt all
the transmissions and select one station to retransmit.
Compatibility: The technique should accommodate equipment from all vendors who
build to its specification.
Contention
In contention based network, computers sent data whenever they had data to send. This might
work well in a small environment when little data is being sent along the cable. But as more
computers send data, the messages collide more frequently, must be resent, and then collide
again. Soon there will be a communication breakdown.
Figure 6.4 Collision in Contention Method
Computer
packe
t
Computer
Computer
packe
t
Computer
38
Computer
Computer
To organize contention based network, two carrier access method were created:
1. Carrier Sense multiple Access with Collision detection (CSMA/CD): is one of the most
popular ways to regulate network traffic. Used by Ethernet, this access method prevents
collision by listening to the channel to see if another computer is sending data. If the
computer does not sense data on the line, it sends its message. If another computer is using
the channel, the computer waits a random amount of time and then checks again. This
process is continued until the channel is free and the computer can send the data.
Advantages:
a) Inexpensive to implement.
b) Fast in a small network with low traffic.
Disadvantages:
a) Slow in a large network with high traffic.
b) Does not support priority. A single computer can block all other computer if it has very
long message to send.
2. Carrier senses multiple access with collision avoidance (CSMA/CA): It uses collision
avoidance, rather than detection, to prevent collision. With CSMA/CA, once the computer
senses that no other computer is using the network, it signals its intent to transmit data. Any
other computer with data to sensed wait when they receive the intent-to-transmit signal and
send their intent-to-transmit signals when they see that channel is free. Although this method
is more reliable than CSMA/CD in avoiding collision, the additional overhead created by the
intent-to-transmit packets significantly reduces the speed of any network using this
method.
Network Architecture
Ethernet (CSMA/CD)
LocalTalk (CSMA/CA)
39
Token Passing
Using this channel access method, a special packet called the token is passed from one
computer to the next sequentially. Only the computer holding token can send data. A computer
can keep token only a specific amount of time. If the computer with the token has no data to
send, it passes the token to the next computer.
Computer
Token
Computer
Computer
Computer
40
a) Even if only one computer on the network has data to send, it must wait until it receives
the token. If its data is large enough it will more than one turns of token to finish the
transmission, means further delay.
b) The process of creating and passing the token is complicated and requires more
expensive equipment than contention based network.
Network Architecture
Token ring
ARCNet
Demand Priority
Demand priority is a recent channel access method and relies on following method.
Hub
Hub
Figure
Hub 6.6 Demand Priority Hub
Hub
Hub
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Intelligent hubs are used to control access to the network. The hub searches all connections in a
round robin fashion. When an end node (computer) has data to send, it transmits a demand
signal to the hub. The hub then sends and acknowledgement that the node can start transmitting
its data.
Unlike other channel access methods, demand priority allows for certain computers to be
assigned a higher priority than other. If multiple computers make simultaneous demands, the
computer with highest priority is allowed to transmit first. Demand priority makes the most
efficient use of the available network media. Rather than wasting time addressing computers that
do not have data to send, hubs using demand priority cannel access respond only when
computers signal the hub for service. Also packets are not broadcast in demand priority network
41
as they are in CSMA/CD and CSMA/CA network but, instead, are sent from the computer to the
hub and from the hub directly to the destination. This eliminates traffic on the network.
Advantages:
a) Very fast in high and low traffic environments
b) No collision
c) Provide priority
Disadvantages:
a) Expensive because special equipment is required.
b) Lower priority may starve for service
Network architecture:
100VG-AnyLAN
Polling
Polling is one of the oldest ways of controlling access to the network. a central controller, often
referred to as the primary device, ask each computer (the secondary device) on the network if
it has data to send. If so, the computer is allowed to send data, up to a certain amount of time;
then it is the next computers turn.
42
Computer
Computer
Computer
Primary Device
Computer
Computer
43
44
CHAPTER FOUR
OSI LAYER AND TCP/IP LAYERS
Learning Objectives
By the end of this chapter the learner shall be able to;
A. Explain the advantages of a layered model
B. Explain the seven layers of the Open Systems Interconnection (OSI) and its importance
in networking
C. Explain the four TCP/IP layers
4.1
Introduction
4. The layer boundaries should be chosen to minimize the information flow across the interface.
5. The number of layers should be large enough that distinct function need not be thrown
together in the same layer out of necessity, and small enough that the architecture does not
become unwieldy
4.2
4.3
The 7 layers of the OSI model can be split into 2 halves, those which provides interconnection
services and those which provide internetworking services. Each layer within the model provides
a set of services to the layer above and enhances the service provided by the layer below.
7
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
46
Interconnection group of standards makes up the bottom 4 layers of the OSI model, which
are known as the physical, data link, network and transport layers.
The physical layer defines the functional, procedural and physical interfaces of
communication links between equipment. For example, plug specifications, and pin
allocations.
The data link layer adds error-checking information and formats data for physical
transmission.
The transport layer includes error detection and correction as well as multiplexing. Its
basic function is to enhance the quality provided by the network layer below, if this is
necessary.
The session layer provides the organization, synchronization and timing of the exchange
of the data between end systems.
The presentation layer is concerned with now the information to be exchanged. This
includes resolving character set differences, such as ASCII to EBCDIC, providing text
compression and encryption/decryption services.
The application layer provides support for the user applications, which wish to exchange
information. (i.e. file transfer)
47
The physical layer co-ordinates the functions required to transmit a bit streams over a
physical medium. It deals with the mechanical and electrical specifications of the primary
connections, such as cables and connectors.
It also handles:
Line configuration: how can two or more devices be linked physically? Are
transmission lines to be shared or limited to use between two devices?
Node to node delivery: the data link layer is responsible for node to node delivery.
Flow control: It regulates the amount of data that can be transmitted at one time.
Error handling: Data link layer protocols provide for data recovery, usually by having
the entire frame retransmitted.
3. Network Layer
The network layer is responsible for the source to destination delivery of packet across
multiple network links. Whereas the data link layer oversees station to station (node to node)
delivery. The network layer ensures that each packet gets from its point of origin to its
48
destination successfully and efficiently. For this purpose the network layer provides two
reliable services switching and routing.
Switching refers to temporary connection between physical links, resulting in longer links for
network transmission; i.e. long distance telephone services.
Routing means selecting the best path for sending a packet from one point to another when
more than one path is available. In this case, each packet may take a different route to the
destination. Where the packets are collected and resembled into their original order.
Network layer is responsible for following:
Source to destination delivery: moving the packet from its point of origin to its intended
destination across multiple network links.
Routing: Deciding which of the multiple paths a packet should take. Routing
considerations include speed and cost.
Multiplexing: using a single physical line to carry data between many devices at the
same time.
4. Transport Layer
The transport layer is responsible for source to destination (end to end) delivery of the entire
message. Whereas the network layer oversees end to end delivery of individual packets, it
does not recognize any relationship between those packets.
Transport layer is responsible for following:
End to end message delivery: conforms the transmission and arrival of all packets of a
message at the destination point.
5. Session Layer
49
The session layer is the network dialog controller. It establishes, maintains, and synchronizes
the link between communicating devices. It also ensures that each session close appropriately
rather than shutting down abruptly and leaving the user hanging.
Session layer is responsible for following:
Synchronization: Deciding in what order to pass the dialog units to the transport layer,
and where in the transmission to require conformation from the receiver.
Graceful close: Ensuring that the exchange has been completed appropriately before the
session close.
6. Presentation Layer
The presentation layer ensures interoperability among communicating devices. It is
responsible for code conversion (e.g. from ASCII to EBCDIC and vice versa), if required.
The presentation layer is also responsible for the encryption and decryption of data for
security purposes. It also handles the compression and expansion of data when necessary for
transmission efficiency.
Presentation layer is responsible for following:
Translation: changing the format of message (e.g. from ASCII to EBCDIC and vice
versa).
Compression: It also handles the compression and expansion of data when necessary for
transmission efficiency.
7. Application Layer
The application layer enables the user, whether human or software, to access the network. It
provides user interface and support for services such as electronic mail, remote file access
and transfer.
Presentation layer is responsible for following:
Mail services: provides the basis for electronic mail forwarding and storage.
Directory services: Provides distributed database sources and access for global
information about various object and services.
File access, transfer, and management: Allows a user at a remote computer to access
files in another host (to make changes or read data); to retrieve files from a remote
computer for use in the local computer.
Assuming two hosts follow OSI model, example of files transferring from host A to
host B.
Host A:
1. User will issue a file transfer command to the Application Layer. (initiates or accepts
a request)
2. The Application Layer then passes the file to the Presentation Layer, which may
reformat the data. (handles protocol conversion, data encryption or decryption, text
compression)
3. The data is then passed to the Session Layer, which requests that a connection be
provided to the destination host and passes the data to Transport Layer.(handles
session setup and Session close)
4. Transport Layer breaks the file into manageable chunks of data for transmission and
passes them to network layer. (Handles flow control, error recovery).
5. Network Layer selects the datas route and then passes the data to the data link layer.
(handles addressing, route discovery and route selection, error control)
6. Data link Layer adds extra information to the data so that it can be checked for errors
at the receiving end. And passes the data to the physical layer. (handles CRC cyclic
redundancy check).
7. Physical Layer takes the resulting data stream and transmit it across the physical link
to the Host B (handles mechanical and electrical characteristic to provide and
maintain physical connection)
Host B
51
1. Host Bs physical layer receives the bits and passes them on to the
2. Data link layer.
3. Data link layer verifies that no errors occurred, and then passes the data onto the
network layer.
4. Network Layer ensures that the selected route is proving reliable, and then passes the
data onto the transport layer.
5. Transport Layer reassembles the small chunks of data into the file being transferred,
and then passes it onto the session layer.
6. Session Layer determines if the transfer is complete, and if so, may break down the
session, in effect ending the communication. It passes the data onto presentation
layer.
7. Presentation Layer may reformat the data, performing any necessary conversion, data
are passed on to application layer.
8. Host Bs user can then access the transferred information through the Application
Layer.
4.4
The TCP/IP model uses four layers that logically span the equivalent of the top six layers of the
OSI reference model; this is shown below. (The physical layer is not covered by the TCP/IP
model because the data link layer is considered the point at which the interface occurs between
the TCP/IP stack and the underlying networking hardware.) The following are the TCP/IP model
layers, starting from the bottom.
52
Internet Layer
This layer corresponds to the network layer in the OSI Reference Model (and for that reason is
sometimes called the network layer even in TCP/IP model discussions). It is responsible for
typical layer three jobs, such as logical device addressing, data packaging, manipulation and
delivery, and last but not least, routing. At this layer we find the Internet Protocol (IP), arguably
the heart of TCP/IP, as well as support protocols such as ICMP and the routing protocols (RIP,
OSFP, BGP, etc.) The new version of IP, called IP version 6, will be used for the Internet of the
future and is of course also at this layer.
(Host-to-Host) Transport Layer
This primary job of this layer is to facilitate end-to-end communication over an internetwork. It
is in charge of allowing logical connections to be made between devices to allow data to be sent
either unreliably (with no guarantee that it gets there) or reliably (where the protocol keeps track
of the data sent and received to make sure it arrives, and re-sends it if necessary). It is also here
that identification of the specific source and destination application process is accomplished
The formal name of this layer is often shortened to just the transport layer; the key TCP/IP
protocols at this layer are the Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP). The TCP/IP transport layer corresponds to the layer of the same name in the OSI model
(layer four) but includes certain elements that are arguably part of the OSI session layer. For
example, TCP establishes a connection that can persist for a long period of time, which some
people say makes a TCP connection more like a session.
Application Layer
This is the highest layer in the TCP/IP model. It is a rather broad layer, encompassing layers five
through seven in the OSI model. While this seems to represent a loss of detail compared to the
OSI model, I think this is probably a good thing! The TCP/IP model better reflects the blurry
nature of the divisions between the functions of the higher layers in the OSI model, which in
practical terms often seem rather arbitrary. It really is hard to separate some protocols in terms of
which of layers five, six or seven they encompass. (I didn't even bother to try in this Guide which
54
is why the higher-level protocols are all in the same chapter, while layers one through four have
their protocols listed separately.)
Numerous protocols reside at the application layer. These include application protocols such as
HTTP, FTP and SMTP for providing end-user services, as well as administrative protocols like
SNMP, DHCP and DNS.
55
CHAPTER FIVE
CONECTING DEVICES
Learning Objectives
By the end of this chapter the learner shall be able to;
i.
ii.
iii.
56
Internetworking Devices
Networking Devices
Hub
Bridge
Switch
Router
Gateway
Repeater
Switch
In a telecommunications network, a switch is a device that channels incoming data from any of
multiple input ports to the specific output port that will take the data toward its intended
destination. In the traditional circuit-switched telephone network, one or more switches are used
to set up a dedicated though temporary connection or circuit for an exchange between two or
more parties. On an Ethernet local area network (LAN), a switch determines from the physical
device (Media Access Control or MAC) address in each incoming message frame which output
port to forward it to and out of. In a wide area packet-switched network such as the Internet, a
switch determines from the IP address in each packet which output port to use for the next part of
its trip to the intended destination.
In the Open Systems Interconnection (OSI) communications model, a switch performs the Layer
2 or Data-link layer function. That is, it simply looks at each packet or data unit and determines
from a physical address (the "MAC address") which device a data unit is intended for and
switches it out toward that device.
Repeater
Because of the electrical and mechanical limitations of any wiring system a network has physical
limitations. Such as :
Attenuation: Loss of signal strength as the signal travels along a medium.
Segment length: longest successful data transmission through a continuous single cable.
Node capacity per segment: number of nodes can be connected on a media
Signal that carry information within a network can travel a fixed distance before attenuation or
other interference from noise endangers the integrity of the data. A repeater installed on a link
receive the signal before it becomes too week or corrupted, regenerates the original bit pattern,
and puts the refreshed signals back onto the link. A repeater allows is to extend only physical
length of the network.
58
Repeaters operate at the physical layers of the OSI model and have no concern for the type of
data being transmitted, the packet address, or the protocol being used. They are unintelligent
electronic device unable to perform any filtering or translation on the actual data.
Repeater
Regenerated signals
Repeaters retransmit the data at the same speed as the network. However there is a slight delay as
the repeater regenerate the signal. If there are a number of repeaters in a row, a significant
propagation delay can be crated. Therefore, many network architectures limits the number of
repeaters on the network.
The location of a repeater on a link is vital. A repeater must be placed so that a signal reaches it
before any noise changes the meaning of any of its bits. A little noise can alter the precision of a
bits voltage without destroying its identity. If the corrupted bit travels much farther, however,
accumulated noise can change its meaning completely. At that point the original voltage become
unrecoverable and the error can be corrected only by retransmission.
Strengths and Limitations of Repeaters
Strength:
Limitations:
Bridge
Bridges operate in both the physical and data link layer of OSI model. Like repeaters, bridges
also can be used to connect two network segments and can connect dissimilar physical media.
However, bridges can also limit the traffic on each segment and eliminate bottlenecks.
How Does Bridge Works?
A bridges primary function is to filter traffic between network segments. As a packet is received
from a network segment, the bridge looks at the physical destination address of the packet before
forwarding the packet on to other segments. If the packets destination is on another network
segment, the bridge retransmits the packet. However, if the destination is on the same network
segment, on which the packet was received, the bridge assumes the packet has already reached
its destination and the packet is discarded. As a result, network traffic is greatly reduced.
Bridges work at the data link layer of the OSI model. At this layer the hardware address, both
source and destination, is added to the packet. Because bridges function at this layer, they have
access to this address information. Each computer in the network is given a unique address.
Bridges analyze these address to determine whether or not to forward a packet.
1.1.11.
C to K
D 1.1.13.
C to K
1.1.3. B
1.1.9. E
Bridge
LAN1
1.1.7. G
C to K
C to K
1.1.5. L
LAN2
1.1.19.
1.1.17.
H
60
1.1.21.
1.1.15.
J
In above figure, the packet generated by computer C is intended for computer K. The bridge
allows the packet to cross and relay it to the entire lower segment where it is received by
computer K. IF a packet is destined on a same segment (for example from computer A to
computer F) the bridge will block the packet from crossing into lower segment to reduce the
traffic.
Strengths and Limitations of Bridges
Strength:
Limitation:
1.3
Expansion that involves and joins two separate networks called internetworking connectivity.
Following devices can be used for internetworking.
Routers
Brouters
Gateways
Switches
Router
Routers are combination of hardware and software and used to connect separate networks to
form an internetwork. Router can be used like bridges to connect multiple network segments and
filter traffic. Also, unlike bridges, routers can be used to connect two or more independent
networks.
61
Routers can connect complex networks with multiple paths between network segments. Each
network segment, also called a subnetwork, is assigned a network address. Each node on a subset
is assigned an address as well. Using a combination of the network and node address, the router
can route a packet from the source to a destination address somewhere else on the network.
Router has access to first three layers(physical, data link, and network) but works in the network
layer. To successfully route a packet through the internetwork, a router must determine packets
path. When the router receives a packet, it analyzes the packets destination network address and
look up that address in its routing table. The router than repackages the data ad sends it to the
next router in the path.
Because operate at the higher layers of the OSI model than bridges do, routers can easily send
information over different network architectures. For example, a packet received from a token
ring network can be sent over an Ethernet network. The router removes the token ring frame,
examines the packet to determine the network address, repackages the data into Ethernet frames,
and sends the data out onto the Ethernet networks.
With this kind of translation, however, network speed is affected. As an example, Ethernet
frames have a maximum data frame size of approximately 1,500 bytes, whereas token ring
frames range in size from 4,000 to 18,000 bytes. So, for a single token ring frame of maximum
size (18,000 bytes), 12 Ethernet frames must be created. Although routers are very fast, this type
of translation does affect the networks speed.
Unlike bridges routers have ability to select the best path that is faster and economical. When a
router receives a packet whose destination address is unknown, it simply discards the packet but
if the same packet received by a bridge the bridge will forward it to all connected network
segments
Routing Table
Routing has a routing table that contains network addresses and the address of the routers that
handle those networks. Following table shows a sample routing table for router A. it includes the
next hop (i.e., where transmission will go next) and cost (i.e., number of hops the packet must
take).
62
1. Static Routing
If router uses static routing, the routing table must be updated manually by the administrator.
Each individual route must be added manually. The router will always use the same path to a
destination, even if it is not necessarily the shortest or most efficient route.
2. Dynamic Routing
Dynamic routers communicate with each other and are constantly receiving and are
constantly receiving updated routing tables from other routers. If multiple routes are
available to a particular network, the router will decide which route is best and enter that
route into its routing table.
Strengths and Limitations of Routers
Strength:
Limitation:
Slower than bridge because they perform more complex calculations on the
packet
Only work with routable protocols (TCP/IP, IPX/SPX, DECnet, OSI, XNS).
Brouters
Brouters combines the best of both bridges and routers. When brouters receive packets that are
routable, they will operate as a router by choosing the best path for the packet and forwarding it
to its destination. However, when a nonroutable packet is received, the brouter functions as a
bridge, forwarding the packet based on hardware address. To do this brouters maintain both
bridging table, which contains hardware address, and a routing table, which contains network
address.
63
Gateway
Gateways operate in all seven layers of OSI model. A gateway is a protocol converter. A router
itself transfers, accepts, and relays packets only across network using similar protocols. A
gateway on the other hand, can accept a packet formatted for one protocol (e.g. AppleTalk) and
convert it to a packet formatted for another protocol (e.g. TCP/IP) before forwarding it.
Netware
Network
Gateway
SNA
Network
A gateway is generally software installed within a router. The gateway understands the protocol
used by each network linked into the router and is therefore able to translate from one to another.
Strengths and limitations of Gateway
Strength:
Limitation:
Greater processing requirements men they are slower than other devices.
64
65
CHAPTER SIX
SWITCHING TECHNIQUES
Learning Objectives
By the end of this chapter the learner shall be able to;
i.
ii.
iii.
6.1
Introduction to Switching
The main objective of networking is to connect all the devices so that resources and information
can be shared efficiently. Whenever we have multiple devices, we have problem of connecting
them to make one-to-one connection possible. One solution is to install a point to point link
between each pair of devices such as in mesh topology or between a central device and every
other device as in star topology. These methods, however, are impractical and wasteful when
applied to very large network. The number and length of the links require too many
infrastructures to be cost efficient; and majority of those links would be idle most of the time.
A better solution is to uses switching. A switch network consists of a series of inter-linked nodes,
called switches. Switched are hardware and/or software capable of creating temporary
connection between two or more devices linked to switch but not to each other.
Traditionally, three methods of switching have been important:
Circuit switching
Packet switching and
Message switching
66
6.2
Circuit Switching
Communication via circuit switching implies that there is a dedicated communication
path between two stations. The path is a connected sequence of links between network
nodes. On each physical link, a channel is dedicated to the connection. A common
example of circuit switching is the telephone network..
Communication via circuit switching involves three phases:
4
7
F
Network Station
Node
Dedicated Connection
Non Dedicated
Connection
1. Circuit Establishment
67
Before any signals can be transmitted, an end-to-end (station to station) circuit must
be established. For example, station A wants to communicate with station E. station A
sends a request to node 4 requesting a connection to station E. typically, the link from
A to 4 is a dedicated line, so that part of connection already exists. On the basis of
routing information and measures availability and perhaps cost, lets assume that node
4,5, and 6 are used to complete the connection. In completing the connection, a test is
made to determine if station E is busy or is prepared to accept the connection.
2. Information Transfer
Information now can transmit from A through the network to E the transmission may
be analog voice, or binary data. Generally the connection is full duplex, and signals
may be transmitted in both direction simultaneously.
3. Circuit Disconnection
One the transmission is completed, the connection is terminated, usually by the action
of one of the two station. Signals must be propagated to the nodes 4,5, and 6 to
deallocate the dedicated resources.
Circuit switching can be rather inefficient. Channel capacity is dedicated for the
duration of a connection, even if no data are being transferred. The connection
provides for transmission at a constant data rate. Thus, each of the devices that are
connected must transmit and receive at the same data rate as the other.
6.3
Packet Switching
In a packet switching data are transmitted in short packets. A typical packet length is
1000 byte. If a source has longer message to send, the message is broken up into a series
of packets. Each packet contains a portion (or the entire short message) of the users data
plus some control information. These packets are routed to the destination via different
available nodes.
68
C
A
7
F
Network Station
Node
Dedicated Connection
Non Dedicated
Connection
Above figure illustrate the basic operation. A transmitting computer or other device sends
a message as a sequence of packets. Each packet includes control information including
the destination station. The packets are initially sent to the node to which the sending
station attaches. As each packet arrives at these nodes, the node stores the packet briefly,
and determines the next available link. When the link is available, the packet is
transmitted to the next node. The entire packet eventually delivered to the intended node.
69
There are two popular approaches to packet switching: datagram and virtual circuit.
a) Datagram Approach
In the datagram approach to packet switching, each packet is treated independently
from all others and each packet can be sent via any available path, with no reference
to packet that have gone before. In the datagram approach packets, with the same
destination address, do not all follow the same route, and they may arrive out of
3
5
4
7
F
Network Station
Node
Dedicated Connection
Non Dedicated
Connection
b) Virtual Circuit
70
In this approach, a preplanned route is established before any packets are sent. Once
the route is established, all the packets between a pair of communicating parties
follow this same route through the network. Each packet now contains a virtual
circuit identifier as well as the data. Each node on the pre-established route knows
where to direct such packet. No routing decisions are required. At any time, each
station can have more than one virtual circuit to any other station and can have virtual
circuits to more than one station.
6.4
Message Switching
The descriptive term store and forward best know message switching. In this mechanism,
a anode (usually a special computer with number of disks) receives a message, stores it
until the appropriate route is free, then send it along. Note that in message switching the
messages are stored and relayed from the secondary storage (disk), while in packet
switching the packets are stored and forward from primary storage (RAM).
The primary uses of message switching have been to provide high-level network service
(e.g. delayed delivery, broadcast) for unintelligent devices. Since such devices have been
replaced, message switching has virtually disappeared. Also delays inherent in the
process, as well as the requirement for large capacity storage media at each node, make it
unpopular for direct communication.
71
i.
ii.
iii.
72
CHAPTER SEVEN
MULTIPLEXING
Learning Objectives
By the end of this chapter the learner shall be able to;
i.
ii.
\ iii.
7.1
Introduction to multiplexing
Multiplexing is the process of combining separate signal channels into one composite
stream. It is carried out to increase the utilization of transmission channel. In a
multiplexed system, n devices share the capacity of one link. In the following figure, four
devices on the left direct their transmission stream to a multiplexer (MUX) which
combines them into a single stream (many to one). At the receiving end, the stream is fed
into a demultiplexer (DEMX), which separates the stream back into its component
Computer
Computer
1 path
M
Computer
E
Three
Input Line
Computer
U
Computer
X
transmissions (one to many) and directs them to their receiving devices.
Computer
73
7.2
FDM is an analogue technique that works by dividing slicing the total bandwidth of a media into
a number of narrow bandwidth units known as channels.
Channel 1
Total Bandwidth
Guard Band
Of Media
Channel 2
Guard Band
Channel 3
Time
Figure 6.9 Frequency Division of Media Bandwidth
These channels are separated by further narrower slices, known as guard bands, to prevent interchannel interface. This actual waste of bandwidth is offset by the lower costs of the filter
(frequency selection device). The closer the channels are together (the narrower the guard bands
(the more critical and expensive the channel filter become.
Bellow figure gives a conceptual view of FDM. In this illustration, the transmission path is
divided into three parts (based on different frequencies), each representing a channel to carry one
D
Computer
Computer
Computer
Channel 2
Channel 3
Computer
X
Computer
Computer
X
74
transmission.
As an analogy, imagine a point where three separate narrow roads merge to form a three-lane
highway. Each of the three roads corresponds to a lane of the highway. Each car merging into the
highway from one of the road still has its own lane and can travel without interfering with cars in
other lane.
Example: Cable Television
A familiar application of FDM is cable television. The coaxial cable used in a cable television
system has a bandwidth of approximately 500 MHz. An individual television channel requires
about 6 MHz of bandwidth for transmission. The coaxial cable, therefore, can carry many
multiplexed channels (theoretically 83 channels, but actually fewer to allow for guard band). A
demultiplexer at your television allows you to select which of those channels you wish to
receive.
75
7.3
Synchronous TDM
AAAA
Computer
C
A
Computer
U
CCCCC
Computer
X
Figure 6.12 Synchronous TDM
In this method, multiplexer allocates the same time slot to each device at all time, whether or not
a device has anything to transmit. IF there are n input line than there must be n time slots in the
frame (time slots are grouped into frames). Time slot (lets say T), for example, is assigned to
device (lets say D) alone and can not be used by any other device. Each time its allocated time
slot comes in (in a round robin fashion), Device D has the opportunity to send a portion of its
data for time slot T. If the device D is unable to transmit or does not have data to send, its time
slot remains empty and no other device can use it, another words it is wasted.
Asynchronous TDM(Statistical TDM)
Asynchronous TDM provide better utilization of media. Like synchronous TDM, asynchronous
TDM allows a number of lower speed input lines to be multiplexed to a single higher speed line.
Unlike synchronous TDM, however, in asynchronous TDM the total speed of input line can be
greater than the capacity of the media. In asynchronous TDM the number of slots in the frame
are less than numbers of input lines. Slots are not preassigned, each slot is available to any of the
attached input lines that has data to send. The multiplexer scans the input line, accepts the
portion of data until a frame is filed, and then sends the frame across the link.
76
Computer
1
AAA
2
B
A
1
C
3
A
1
C
3
B
2
A 1
Computer
U
3
CCCCC
Computer
X
Figure 6.13 Asynchronous TDM
Since the slots are not pre-assigned for each input line, line address must be added along with the
data to send.
77
78
Mt Kenya
University
Time: 2 HRS
QUESTION 1
Mount Kenya University requires a Network that will cater for their administrative and students needs.
The users range from lecturers, administrative assistants and students. All types of users need to access
the internet through the network. The university management also requires the network to support WIFI
access. The university members of staff need to access the university management information system,
which should not be accessed by the students. The total number of expected users is 500 at any given
time.
(a) Which is the most appropriate network topology for this network. Give the reasons for your
answer
(2 marks)
(b) What network devices will be used while designing the network? Briefly explain their use
(8 Marks)
(c) What transmission impairments is the network likely to experience? (8 marks)
(d) What transmission medium will be used to connect the network? Give reasons for your answer
(2 marks)
(e) Briefly explain how the user computers will be configured to access the network (4 marks)
(f) How will this network be secured from intruders and students who might attempt to access
confidential information such as examinations?
(4 marks)
(g) What switching technique might be appropriate for the network. Give reasons for your answer
(2 marks)
QUESTION 2
There are several different network topologies:
(a) Bus
(b) Ring
(c)Mesh
79
(5 marks each)
QUESTION 3
The Open Systems Interconnection (OSI) 7 layer model, sometimes called the International Standards
Organisation (ISO) 7 layer model, is a critical model for modern computer networking.
(a) In the correct sequence from either end, identify the seven layers of the ISO/OSI
7 layer model.
(4 marks)
(b) Briefly explain the function of each layer.
(2 marks)
Question 4
(a) With the aid of diagrams, describe the main features of modulation and demodulationwhen used for
transmitting data across the Public Switched Telephone Network (PSTN).
(8 marks)
(b) With the aid of diagrams, explain what is meant by each of the terms: amplitude modulation,
frequency modulation and phase modulation.
(12 marks)
(Total 20 marks)
Question 5
(a) Local Area Networks (LANs) require an 'access method' which determines how computers share a
common transmission medium. Write down the two main approaches for controlling this sharing in wired
networks. Briefly explain how each approach operates.
(8 marks)
(b) Compare four transmission media used in LANs and WANs in terms of maximum data rates and
other limitations.
(12 marks)
80
Mt Kenya
University
UNIVERSITY EXAMINATION 2010
(14 marks)
81
(4 marks)
(c) Discuss the main differences between Synchronous and Asynchronous Transmission, emphasising
signal timing issues.
(4 marks)
(d) Describe the main elements of the Local Area Network model.
(6 marks)
(e) Briefly explain the Open Systems Interconnection (OSI) network reference model by emphasising the
importance of layers for functional communication requirements.
(2 marks)
Question 2
Describe the seven layers of the OSI model by focusing on the responsibilities and interface of each layer.
(20 marks)
Question 3
(a) Briefly describe circuit switching.
(4 marks)
(4 marks)
(c) Briefly discuss the main differences between TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol).
(8 marks)
(d) Which of these services in (b) is most suitable for developing a real time application? Briefly explain
your reasoning.
(4 marks)
Question 4.
a) Video conferencing was expected to eliminate much of the need for
business travel but has not been as widely adopted as was hoped.
i) Give THREE limitations of video conferencing.
( 6 marks)
ii) Video Voice Over Internet Protocol (VOIP) may be more likely to be
widely adopted.
A) What equipment other than a PC, monitor and broadband
connection is required for video VOIP?
(2 marks)
B) Explain how you would find, download and install the software
82
(4 marks)
b) Many homes and small offices now have a wireless local area network
(WLAN).
i) What should the owner do to protect his WLAN from eavesdroppers?
ii) Give TWO advantages of using a WLAN rather than a cabled network.
(4 marks)
(4 marks)
(Total 20 marks)
Question 5
(a) Local Area Networks (LANs) require an 'access method' which determines how computers share a
common transmission medium. Write down the two main approaches for controlling this sharing in wired
networks. Briefly explain how each approach operates.
(8 marks)
(b) Three physical topologies associated with LANs are: the bus, ring and star topologies. Describe each
one, highlighting their strengths and weaknesses from a reliability point of view.
(12 marks)
(Total 20 marks)
83