Chapter 1 - Introduction
Chapter 1 - Introduction
Introduction
Dipa Soni
DATA COMMUNICATIONS
Type of Connection
Point to Point - single transmitter and receiver
Multipoint - multiple recipients of single transmission
Physical Topology
Connection of devices
Type of transmission - unicast, mulitcast, broadcast
Types of connections: Point-to-Point
Point-to-Point: A point-to-point connection provides a dedicated
link between two devices. The entire capacity of the link is
reserved for transmission between those two devices.
Types of connections: Multipoint
• Multipoint: A multipoint (also called multidrop) connection is one in which more
than two specific devices share a single link.
• In a multipoint environment, the capacity of the channel is shared, either
spatially or temporally. If several devices can use the link simultaneously, it is a
spatially shared connection. If users must take turns, it is timeshared connection.
Categories of Topology
Mesh Topology
There are two forms of this topology: full mesh and a partially-connected
mesh.
In a full mesh topology, every computer in the network has a connection
to each of the other computers in that network.
In a partially-connected mesh topology, at least two of the computers in
the network have connections to multiple other computers in that
network.
Advantages and Disadvantages of a mesh
topology
Advantage:
Manages high amounts of traffic, because multiple devices can transmit data
simultaneously.
A failure of one device does not cause a break in the network or transmission of data.
Adding additional devices does not disrupt data transmission between other devices.
Provide privacy or security. Every message travels along a dedicated line, only the
intended recipient sees it.
Disadvantage:
The cost to implement is higher than other network topologies, making it a less desirable
option.
Building and maintaining the topology is difficult and time consuming.
The chance of redundant connections is high, which adds to the high costs and potential
for reduced efficiency.
Star Topology
A network can be hybrid. For example, we can have a main star topology with
each branch connecting several stations in a bus topology
Advantage:
Can cover a large geographical area
Centralized infrastructure
Disadvantage:
High set up cost
Possibility for security gaps
Needs antivirus software and firewalls
Continue…
Metropolitan Area Network(MAN)
A metropolitan area network (MAN) is a network with a size greater than LAN
but smaller than a WAN. It connects two or more computers that are apart
but resides in the same or different cities.
It covers a large geographical area and may serve as an ISP (Internet Service
Provider). MAN is designed for customers who need a high-speed connectivity.
Speeds of MAN ranges in terms of Mbps. It’s hard to design and maintain a
Metropolitan Area Network.
Man is nothing but extended LAN.
The distinguishing features of MAN are:
Network size generally ranges from 5 to 50 km. It may be as small as a group of
buildings in a campus to as large as covering the whole city.
Data rates are moderate to high.
In general, a MAN is either owned by a user group or by a network provider who
sells service to users, rather than a single organization as in LAN.
Continue…
Questions
If two computers are in the range of 10Km and if they communicate with each
other using internet than it falls in which category
Ans: WAN
If two computers are in the two different countries and if they communicate
with each other using either Ethernet or optical fiber cable or twisted pair
cable than it falls in which category
Ans: LAN
Internetwork
When two or more networks are connected, they become an
internetwork, or internet.
Protocols
A protocol is synonymous with rule. It consists of a set of rules that govern data
communications. It determines what is communicated, how it is communicated
and when it is communicated.
The key elements of a protocol are:
Syntax
Structure or format of the data
Indicates how to read the bits - field delineation
Semantics
Interprets the meaning of the bits
Knows which fields define what action
Timing
When data should be sent and what
Speed at which data should be sent or speed at which it is being received.
Layered Task
We use the concept of layers in our daily life. As an example, let us consider
two friends who communicate through postal mail. The process of sending a
letter to a friend would be complex if there were no services available from
the post office.
The OSI Model
The OSI model is composed of seven ordered layers: physical (layer 1), data link (layer 2),
network (layer 3), transport (layer 4), session (layer 5), presentation (layer 6), and
application (layer 7). Above figure shows the layers involved when a message is sent from
device A to device B. As the message travels from A to B, it may pass through many
intermediate nodes. These intermediate nodes usually involve only the first three layers
of the OSI model.
The interaction between layers in the OSI
model
Organization of the Layers
Now we briefly describe the functions of each layer in the OSI model:
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Physical Layer
Physical layer is the lowest layer of the OSI reference model. It is responsible
for sending individual bits from one hop(node) to another. This layer is not
concerned with the meaning of the bits and deals with the setup of physical
connection to the network and with transmission and reception of signals.
Physical Layer
Functions of Physical Layer:
Representation of Bits: Data in this layer consists of stream of bits. The bits must
be encoded into signals for transmission. It defines the type of encoding i.e. how
0's and 1's are changed to signal.
Data Rate: This layer defines the rate of transmission which is the number of bits
per second.
Synchronization of bits: It deals with the synchronization of the transmitter and
receiver. The sender and receiver are synchronized at bit level. In other words,
the sender and the receiver clocks must be synchronized..
Physical characteristics of interfaces and medium: The physical layer defines the
characteristics of the interface between the devices and transmission medium. It
also defines the type of transmission medium.
Line Configuration: This layer connects devices with the medium: Point to Point
configuration and Multipoint configuration.
Topologies: Devices must be connected using the following topologies: Mesh, Star,
Ring and Bus.
Transmission Modes: Physical Layer defines the direction of transmission between
two devices: Simplex, Half Duplex, Full Duplex.
Data Link Layer
Data link layer performs the most reliable node to node delivery of data. It
forms frames from the packets that are received from network layer and
gives it to physical layer.
Data Link Layer
Functions of Data Link Layer:
Framing: The data link layer divides the stream of bits received from the network
layer into manageable data units called frames.
Physical Addressing: If frames are to be distributed to different systems on the
network, the data link layer adds a header to the frame to define the sender
and/or receiver of the frame. If the frame is intended for a system outside the
sender's network, the receiver address is the address of the device that connects
the network to the next one.
Flow Control: If the rate at which the data are absorbed by the receiver is less
than the rate at which data are produced in the sender, the data link layer
imposes a flow control mechanism to avoid overwhelming the receiver.
Error Control: Error control is achieved by adding a trailer at the end of the
frame. It adds a mechanisms to detect and retransmit damaged or lost frames. It
also uses a mechanism to recognize duplicate frames.
Access Control: Protocols of this layer determine which of the devices has control
over the link at any given time, when two or more devices are connected to the
same link.
Data Link Layer
Network Layer
The network layer is responsible for the source-to-destination delivery of a packet,
possibly across multiple networks (links). Whereas the data link layer oversees the
delivery of the packet between two systems on the same network (links), the network
layer ensures that each packet gets from its point of origin to its final destination.
If two systems are connected to the same link, there is usually no need for a network
layer. However, if the two systems are attached to different networks (links) with
connecting devices between the networks (links), there is often a need for the network
layer to accomplish source-to-destination delivery.
Network Layer
Transport layer provides services to application layer and takes services from
network layer. The data in the transport layer is referred to as Segments.
It is responsible for the End to End Delivery of the complete message.
The transport layer also provides the acknowledgement of the successful data
transmission and re-transmits the data if an error is found.
Transport Layer
Functions of Transport Layer:
Service Point Addressing: Transport Layer header includes service point address which is port
address. This layer gets the message to the correct process on the computer unlike Network Layer,
which gets each packet to the correct computer.
Segmentation and Reassembling: A message is divided into segments; each segment contains
sequence number, which enables this layer reassemble the message correctly upon arriving at the
destination and to identify and replace packets that were lost in transmission.
Connection Control: The transport layer can be either connectionless or connectionoriented:
Connectionless Transport Layer : Each segment is considered as an independent packet and delivered
to the transport layer at the destination machine.
Connection Oriented Transport Layer : Before delivering packets, connection is made with transport
layer at the destination machine
Flow control: Like the data link layer, the transport layer is responsible for flow control. However,
flow control at this layer is performed end to end rather than across a single link.
Error control: Like the data link layer, the transport layer is responsible for error control.
However, error control at this layer is performed process-to-process rather than across a single
link. The sending transport layer makes sure that the entire message arrives at the receiving
transport layer without error (damage, loss, or duplication). Error correction is usually achieved
through retransmission.
Transport Layer
Session Layer
The Session Layer allows users on different machines to establish active
communication sessions between them.
It establishes, maintains, and synchronizes the interaction among
communicating systems.
Session Layer
Functions of Session Layer:
Dialog Control : This layer allows the systems to communicate in either half-
duplex or full-duplex mode of communication.
Synchronization : This layer allows a process to add checkpoints which are
considered as synchronization points into stream of data. Example: If a
system is sending a file of 800 pages, adding checkpoints after every 50 pages
is recommended. This ensures that 50 page unit is successfully received and
acknowledged. This is beneficial at the time of crash as if a crash happens at
page number 110; there is no need to retransmit 1 to100 pages.
Presentation Layer
The primary goal of this layer is to take care of the syntax and semantics of
the information exchanged between two communicating systems.
Presentation layer takes care that the data is sent in such a way that the
receiver will understand the information(data) and will be able to use the
data. Languages(syntax) can be different of the two communicating systems.
Under this condition presentation layer plays a role translator.
Presentation Layer
Functions of Presentation Layer:
Translation : The processes (running programs) in two systems are usually
exchanging information in the form of character strings, numbers, and so on. The
information must be changed to bit streams before being transmitted. Because
different computers use different encoding systems, the presentation layer is
responsible for interoperability between these different encoding methods. The
presentation layer at the sender changes the information from its sender-
dependent format into a common format. The presentation layer at the receiving
machine changes the common format into its receiver-dependent format.
Encryption : To carry sensitive information, a system must be able to ensure
privacy. Encryption means that the sender transforms the original information to
another form and sends the resulting message out over the network. Decryption
reverses the original process to transform the message back to its original form.
Compression : Data compression reduces the number of bits contained in the
information. Data compression becomes particularly important in the transmission
of multimedia such as text, audio, and video.
Application Layer
The TCP/IP protocol suite was developed prior to the OSI model. Therefore,
the layers in the TCP/IP protocol suite do not exactly match those in the OSI
model. The original TCP/IP protocol suite was defined as having four layers:
host-to-network, internet, transport, and application.
However, when TCP/IP is compared to OSI, we can say that the host-to-
network layer is equivalent to the combination of the physical and data link
layers. The internet layer is equivalent to the network layer, and the
application layer is roughly doing the job of the session, presentation.
So, we can say that the TCP/IP protocol suite is made of five layers: physical,
data link, network, transport, and application.
Transmission Media
Guided media, which are those that provide a conduit(channel) from one
device to another, include twisted-pair cable, coaxial cable, and fiber-optic
cable.
Twisted –pair cables and coaxial cable use metallic (copper) conductors that
accept and transport signals in the form of electric current
Optical fiber is a cable that accepts and transport signals in the form of the
light
Twisted Pair Cable
A twisted pair consists of two conductors (normally copper), each with its own
plastic insulation, twisted together.
One of the wires is used to carry signals to the receiver, and the other is used only
as a ground reference.
If the two wires are parallel, the effect of interference noise and crosstalk is big.
Twisting the pair of wire balance the effect of unwanted signal and reduce it.
So, the number of twists per unit of length effects on the quality of the cable
Twisted Pair Cable
Twisted-pair cables are used in telephone lines to provide voice and data
channels. The local loop-the line that connects subscribers to the central
telephone office-commonly consists of unshielded twisted-pair cables.
The DSL lines that are used by the telephone companies to provide high-data-
rate connections also use the high-bandwidth capability of unshielded
twisted-pair cables.
Local-area networks, such as 10-Base-T and 100-Base-T, also use twisted-pair
cables.
Coaxial(Coax) Cable
Coax cable carries signals of higher frequency ranges than those in Twisted
pair cable because the two media are constructed quite differently.
Analog telephone network where a single cable could carry 10,000 voice
signals. Later it was used in Digital telephone networks where cable can carry
600Mbps
Cable TV network: hybrid network use coaxial cable only at the network
boundaries , near the consumer.
Traditional Ethernet LANs.
10-base-2 or “Thin Ethernet”, uses RG-58 coax cable to transmit data at 10 Mbps
with a range of 200m.
10-base-5, or “Thick Ethernet”, uses RG-11 to transmit 10 Mbps with range of 500
m
Fiber-Optic Cable
A fiber-optic cable is made of glass or plastic and transmits signals in the form
of light.
Light travels in a straight line as long as it is moving through a single uniform
substance. If a ray of light traveling through one substance enters another
substance of different density , the ray change direction as shown:
Fiber-Optic Cable
Optical fibers use reflection to guide light through a channel. A glass or plastic
core is surrounded by a cladding of less dense glass or plastic.
Structure of Fiber-Optic Cable
Core − It is the innermost portion of an optical fiber through which light
propagates. It is cylindrical in shape and it made up of a flexible glass of high
refractive index.
Cladding − The core is surrounded by a glass cladding. The glass of cladding has a
lower refractive index than the core. This enables total internal reflection of light
waves in the core, and eventually propagation of light waves within the core.
Outer Coating or Jacket − The outer jacket is a thin plastic sheath or coating that
is opaque to light. It prevents light rays from outside to enter the optical fiber.
Applications of Fiber-Optic Cable
Cable TV network: hybrid network use a combination of optical fiber and coax
cable.
Local area networks such as 100base-FX(fast Ethernet) and 1000base-X LANs.
Backbone networks because its wide bandwidth
Advantages of Fiber-Optical
Higher Bandwidth
Less signal attenuation
Immunity to electromagnetic interference (noise)
Resistance to corrosive materials
Light weight
Disadvantages of Fiber-Optical
In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth. These low-frequency signals emanate in all
directions from the transmitting antenna and follow the curvature of the
planet.
In sky propagation, higher-frequency radio waves radiate upward into the
ionosphere (the layer of atmosphere where particles exist as ions) where they
are reflected back to earth. This type of transmission allows for greater
distances with lower output power.
In line-of-sight propagation, very high-frequency signals are transmitted in
straight lines directly from antenna to antenna. Antennas must be directional,
facing each other, and either tall enough or close enough together not to be
affected by the curvature of the earth.
Radio Waves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
micro waves.
Micro waves are unidirectional. When an antenna transmits microwaves, they
can be narrowly focused. This means that the sending and receiving antennas
need to be aligned.
The unidirectional property has an obvious advantage. A pair of antennas can
be aligned without interfering with another pair of aligned antennas.
Applications of Micro Waves:
Microwaves, due to their unidirectional properties, are very useful when
unicast(one-to-one) communication is needed between the sender and the
receiver.
They are used in satellite networks and wireless LANs.
Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz, can be used for
short-range communication. Infrared waves, having high frequencies, cannot
penetrate walls. This advantageous characteristic prevents interference
between one system and another, a short-range communication system in on
room cannot be affected by another system in the next room.
When we use infrared remote control, we do not interfere with the use of the
remote by our neighbors. However, this same characteristic makes infrared
signals useless for long-range communication. In addition, we cannot use
infrared waves outside a building because the sun's rays contain infrared
waves that can interfere with the communication.
Applications of Infrared Waves:
The Infrared Data Association(IrDA), an association for sponsoring the use of
infrared waves, has established standards for using these signals for
communication between devices such as keyboards, mouse, PCs and printers.
Infrared signals can be used for short-range communication in a closed area
using line-of-sight propagation.
Digital Transmission
Digital-To-Digital Conversion
The data rate defines the number of data elements (bits) sent in 1s. The unit
is bits per second (bps).
The signal rate is the number of signal elements sent in 1s. The unit is the
baud.
The data rate is sometimes called the bit rate; the signal rate is sometimes
called the pulse rate, the modulation rate, or the baud rate.
One goal in data communications is to increase the data rate while decreasing
the signal rate. Increasing the data rate increases the speed of transmission;
decreasing the signal rate decreases the bandwidth requirement.
Relationship between data rate and
signal rate
This relationship, depends on the value of r. It also depends on the data pattern. If
we have a data pattern of all 1s or all 0s, the signal rate may be different from a
data pattern of alternating 0s and 1s.
To derive a formula for the relationship, we need to define three cases: the worst,
best, and average.
The worst case is when we need the maximum signal rate; the best case is when
we need the minimum.
In data communications, we are usually interested in the average case.
The relationship between data rate and signal rate can be expressed as:
S =c * N * 1/r baud
where N is the data rate (bps); c is the case factor, which varies for each case; S is
the number of signal elements; and r is ratio between data element & signal
element
Example
A signal is carrying data in which one data element is encoded as one signal
element ( r = 1). If the bit rate is 100 kbps, what is the average value of the
baud rate if c is between 0 and 1?
Solution:
We assume that the average value of c is 1/2 . The baud rate is then
Baseline Wandering
When the voltage level in a digital signal is constant for a while, the spectrum
creates very low frequencies.
These frequencies around zero, called DC (direct-current) components,
present problems for a system that cannot pass low frequencies or a system
that uses electrical coupling(via a transformer).
For example, a telephone line cannot pass frequencies below 200 Hz. Also a
long-distance link may use one or more transformers to isolate different parts
of the line electrically.
For these systems, we need a scheme with no DC component.
Self-synchronization
To correctly interpret the signals received from the sender, the receiver's bit
intervals must correspond exactly to the sender's bit intervals.
If the receiver clock is faster or slower, the bit intervals are not matched and
the receiver might misinterpret the signals.
Example
In a digital transmission, the receiver clock is 0.1 percent faster than the
sender clock. How many extra bits per second does the receiver receive if the
data rate is 1 kbps? How many if the data rate is 1 Mbps?
Solution:
At 1 kbps, the receiver receives 1001 bps instead of 1000 bps.
Noise and interference - there are line encoding techniques that make the
transmitted signal “immune” to noise and interference.
This means that the signal cannot be corrupted, it is stronger than error
detection.
Complexity
Return to Zero(RZ)
Biphase
Manchester
Differential Manchester
Polar NRZ-L and NRZ-I schemes
Polar-RZ
The main problem with NRZ encoding occurs when the sender and receiver
clocks are not synchronized. The receiver does not know when one bit has
ended and the next bit is starting.
One solution is the return-to-zero (RZ) scheme, which uses three values:
positive(+), negative(-), and zero(0).
In RZ, the signal changes not between bits but during the bit.
This scheme has more signal transitions (two per symbol) and therefore
requires a wider bandwidth.
Polar RZ scheme
Polar - Biphase: Manchester and
Differential Manchester
Manchester coding consists of combining the NRZ-L and RZ schemes.
Every symbol has a level transition in the middle: from high to low or low to high.
Uses only two voltage levels.
Differential Manchester coding consists of combining the NRZ-I and RZ
schemes.
Every symbol has a level transition in the middle. But the level at the beginning of
the symbol is determined by the symbol value. One symbol causes a level change
the other does not.
Polar biphase: Manchester and differential
Manchester schemes
Bipolar - AMI and Pseudoternary