Part 1
Part 1
1
12.1 Chapter
12.2
124
12.5
12.6
12.1276 INTRODUCTION TO ATA
12.
12.10 8 OOMMUNICATION
12.12.1111
2.12 |1.1DATA COMMUNICATION
43
13.1 1,1.1 Definition
13.2 Data communication refers to the exchange of data between two devices via some
13.2 form of transmission medium.
13.5 Data communication is said to be local if communicating deviees are in the same
3.5building or a similarly restricted geographical area.
3.7
It is saidto be remote if the devices are farther apart.
3.8
.10 Combone nts
Components of data communication system (ombutet
11
12KCommunication system has following components : Ntok:
.16 Message : It is the information or data to be communicated. It can consist of
.19 text, numbers, pictures, sound or video or any combination of these.
.20
20 2.) Sender: It is the device/computer that generates and sends that message.
25
28
3. Receiver: It is the device or computer that receives the message. The location
The
of receiver computer is generally different from the sender computer.
distance between sender and receiver depends upon the types of network used
in between.o
message is
4. Medium : It is the channel or physical path through which the
twisted pair
carried from sender to the receiver. The medium can be wired like
radiowaves,
wire, coaxial cable, fiber-optic cable or wireless like laser,
microwaves.
between the
5. Protocol,It is a set of rules that govern the communication,
communicate with
devices., Both sender and receiver follow same protocols to
each other.
INTHODUCTION TO DATA COMML
UNICAT TODUCTION TO DATA COMMUNICATION
following funetionN:
A protocol pertorms the meksnyo Packe, Precedence and order of transmission, These rules snsure that allthe nodes
sequencing.
Dota size.
ixed It refers torules
Data sequencing definealong
breaking the method of numbering packe pet a chance to üse (be communication Jines snd other resources o
and to correctly identifypackets, network based on the priorities assigned to them
detect loss or duplication of packets, W
Conneetion establishment and termination, These rules define how
belong to same message.
most efficicnt path between the connections are established, maintained and terminated when two nodes of
Data routing. Datu routiny defines the network Want to cominunicate with each other,
and destination.
security nd privacy is also built into most
Data formating.
A. characters Data formatting rules deline which roup of bit, M Data security, Providing data
within packet constitute data, control, addressing, Or otly communication software packages, I prevents access of databy unauthorized
Users.
information.
sender 9 Log information. Several communication software are designed to develop
A. Flow control. Acommunication protocol also prevents a tast
It ensures resource sharing and protee log information, which consists of all jobs and data communications tasksthat
overwhelming a slow receiver.
congestion by regulating the flow of data on communicait have taken place. Such ínfornmation may be used for charging the users of the
against traffic ngtwork based on their usage of the network resources.
lines.
AcOMPUTER NETWORK
2.1 Definition
communication
"XA network is a set of devices or nodes that are connccted va
Rule 1 Rule 1
Rule 2 Rulo 2
media or channel.])
Protocol
Protocol Aprinter, computer, or any machine that is capable
of comnmunicating on the
Rule n Rule n
network is referred to. a_ a deyice or node.
an interconnection of various
We can also say thatcomputer network is
through a communication
computers to share software, hardwareand data
network share files,
Message medium between them.j The computers connected in a
printers etc,
folders, applications and resources like scanner, web-cams,
Medium SThe best example of computer network is the Internet
Serder
Receiver 1.2.2 Network Computing Models
in the network. It refers to the
Network model describes the organization of nodes
interconnected
way in which the different nodes are
Error control. These rules are designed to computing models are:
ensure transmission of correct messages. detect errors in messages and to The different network
The most common method is tó 1. Centralized computing
retransmit erroneous message block. In such a case, a
discarded by the receiver and is block having error is 2. Distributed computing
retransmitted by the sender. 3. Collaborative computing
INTRODUCTI
INTRODUCTION TO DATA COMMUNICATION 1.5
Data Transmission
node node 3
Parallel
node2 niode 3 Serial
node 2
processing. Alln bits of one group are transmitted with each clock pulse from one device
to another i.e. multiple bits are sent with each clock pulse.
INTRODUCTIONTO DATA
MON
communication. INTRODUCTION TO DATA COMMUNICATION 1.7
1.6
for shortdistance 8
transmission is usesd to transmit bit data These conversion devices convert the
Parallel separate wires are used parallel data into serial data a
the fig. 1.2, eight sender side so that it can be
As shown in transmitted over single line.
fro soier to
reiver. On receiver side, serial data
received is again converted to parallel torm So
that the interval circuitry of
Wires computer can accept it
Receiver MSB LSB
O Parallel 1 1 0 0
1 0 1
Sender to serial Serial
to Receiver
OConverter Single communication line parallel
0 |Converter
Source End
Transmission Destination End
Fig. 1.2 Parallel
transmission
Advantage of parallel simultaneously Fig. 1.3 Serial transmission
of transmiting data as multiple bits are transmitted
kis speedy way Serial transmission is used for long distance
communication.
with a single clock puise.
Advantage of Serial transmission
Disadvantage of parallel transmission Use of single communication line reduces the transmission line cost by the
as it requires n lines to transmit n bits
at the factor of n
i is costiy method of data transmission as compared to parallel transmission.
same time.
2. Serial Transmission
Disadvantages of Serial transmission
1. Use of conversion devices at source and destination end may lead to
In serial transnission, the various bits of data are transmitted serially one increase
in overall transmission cost.
after the other.
It requires only one communication Iine rather than n lnes to transmit data 2. This method is slower as compared to parallel transmission as bits are
from sender to receiver. transmitted serially one after the other.
Thus ati the bits of data are transmitted on single line in serial fashion. 1.3.2.1 Types of Serial Transmission
In serial transmission, only single bit is sent with each clock pulse.
There are two types of serial transmission-synchronous and asynchronous Both these
As shown in fig. 1.3, suppose an 8-bit data 11001010 is to be sent transmissions use Bit synchronization.'
from
source to deslination. Then least significant bit (LSB) Le. 0 will be
transmitted first followed by other bits. The most significant bit (MSB) i.e. I Bit Synchronization is a function that is required to determine when the beginning
will be transmitted in the end via single and end of the data transmission occurs.
communication line. Bit synchronization helps the receiving computer to know when data begin and end
The internal circuitiy of computer transmits data in paralel
order to change this parallel ata into serial fashion, So in Aring atransmission. Therefore bit synchronization provides tning
data, conversion devices are used. couuo
INTROL
Since the various bytes are placed on the link without any Sr.
transmission
responsibility of receiver to separate the bit stream into bytes t s gap, No. Factor
Serial
reconstruct the original information. Parallel
1. Number of
bitsOne bit
transmitted at one clock n bits
pulse
2. No. of lines required toOne line
L10101010 11001111 01011110| 00110011 | 10110011
transmit n bits n lines
Sender
Receiver 3. Speed of data transfer
Slow
Direction of flow Fast
4 Cost of transmission
Low as one line is
Higher as n lines are
required
5 required.
Application
Fig. 1.6 Synchronous Transmission Long distance Short distance
in order to receive the data error free, the receiver and sender operates communication communication. like
att between
same clock frequency. two computer to printer.
computers
Application of Synchronous transmission
Comparison between Asynchronous and
Synchronous transmission is used for high speed communication beti Sr. Synchronous.
computers. No. Factor
Asynchronous Synchronous
Advantage of Synchronous transmission 1 Data sent at one time
Usually 1byte Multiple bytes
1. This method is faster as compared to asynchronous as there are no extra bi 2. Start and Stop bit Used Not used
(start bit & stop bit) and also there is no gap between the individual da Gap between data units
bytes. Present Not present
4. Data transmission speed Slow Fast
Disadvantages of Synchronous transmission 5. Cost Low
1. It is costly as compared to asynchronous method. It requires local but: High
6
storage at the two ends of line to assemble blocks and it also requird Synchronization btween|
sender and receiver
Not required Required
accurately synchronized clocks at both ends. This lead to increase in t
cost. 7. Application Transfer of data Transfer of da
2. The sender and receiver have to operate at the same clock frequency. Th between keyboard and| between t
requires proper synchronization which makes the system complicated. computer computers.
DATA
1.12
INTRODUCTION TO
COMMUNICATION INTRODUCTION TO DATA COMMUNICATION 1.13
Full Duplex
Half Duplex
Sirnplex A is sending, B is receiving
1. Simplex mode
direction.
information is sent in only one
Send Receive
In simplex transmission on
either send only or receive only i.e. A
Device connected in simplex mode is receive. B is sending, A is receiving
can only
device can only send, other device sender.
information to be transmitted back to the
There is no m¹chanism for
Communication is unidirectional.
Receive Send
Examples of Simplex mode :
the examples of simplex devic Fig.1.8 Half duplex mode
1. Keyboards and traditional monitors are accept output.
Keyboard can only introduce input, the monitor can only Example of half duplex mode:
A walkie-talkie operates in half duplex mode. It can only send or receive a
CPU transmission at any given time. It cannot do both at the same time.
Direction of fiow
Monitor
As shown in fig. 1.8 computer A sends information to computer B. At the end of
transmission, computer B sends information to computer A. Computer Acannot send
any information to computer B, while computer Bis transmitting data.
3. Full Duplex (FDX)
4Direction of flow In full duplex transmission, data can be sent in both the directions
1 Keyboard simultaneously.
Both the connected devices can transmit and receive at the same time as
Fig. 1.7 Simplex transmission shown in fig. 1.9
INTRODUCTION TO DATA COMMU
1.14
InTherefore
full duplex truly bi-directional
mode, signals
system.
UNICATIO,
goingin either directionshare the full capaci
INTRODUCTION TO DATA
COMMUNICATION 1,15
it represents 5. Diagram
5. Diagram
CPU
of link. one for Direction of tlow
transmission paths
The link may contain two separate
The other
sending
way Is that the channel capacity is divided between the sigva
an Monitor A is sending, B is racgiving
The use of fuil duplex line improves the eliminated. turn arOUY T Keyboard
Bis sending, A is receiving
arrangement is
time required in a half duplex Receive
Send
Exampie
Telephoneofnetworks
Fulldupiex mode:
operate in full duplex mode when two persons talk on telephon Comparison between Half Duplex and Full Duplex
HDX
FDX
line, both can listen and speak simultanequsly 1. Data can be sent in both the
directions 1. Data can be sent in both the
but not simultaneously.
A directions simultaneously.
2. In HDX, devices can transmit & 2. In
FDX, devices can transmit and
receive but not at the same time. When receive at the
same time i.e. Each
Both A and B can send
and one device is sending, the other is
receive simultaneously station/device can send as well as
Send receiving and vice-versa. receive data simultaneously.
Receive
3. Example of HDX system is walkie- 3. Example of FDX is the telephone
talkie where one person speaks and system where both the persons can
Fig. 1.9 Full duplex mode other listens & vice-versa.
speak and listen simultaneously.
Comparison between Simple and half Duplex 4.Diagrammatically HDX is represented 4. Diagrammatically FDX is represented
Half Duplex (HDX) as:
as:
Simplex
Direction of data at time 1
duplex, data can be.sent in |Direction of data at all imes
1. In simplex mode data can be sent in 1. In half
one direction only at all times. both the direction, but only in one Direction of data at time 2
direction at a time. Station 1 Station 2 Station 1 Station 2
2. Devices connected in simplex mode 2. Both the connected devices can
are either send only or receive only i.e. transmit as well as receive data but no
Comparison between Simplex, Half Duplex and Full Duplex
one device can only send, other can only simultaneously. S.N. Basis Simplex Half-Duplex Full-Duplex
receive. 1 Direction of Data can be sent Data can be | Data can be sent
3.Communication is undirectional 3.Communication is bidirectional transmission of in one direction sent in both the in both the
message only directions but directions
4. Examples of simplex system are:|4. Example of HDX system is walkie not simultane- simultaneously.
Keyboard & traditional monitors, takie which can send as well as receive
loudspeaker system and fire alarms. ously.
transmission but not simultaneously.
1.16 Two Four INTRODUCTION TO DATA COMMUNICATION
Two 1.17
Number of wires
2. (e) To move from sources to
required Medium High different routes. destination, a packet (short message) may
Low
Efticiency
3.
Cost of
trans- Cheapest
Average
Costliest 2. Multipoint Configuration
(a) Multipoint configuration is the
are attached to a single link. (seeconfiguration is which more than two devices
4.
mission Transmission
5 Example
T.V. and
radio ||
transmission and|of
data from Telsystem.
ephone (b) It is also known as
fig. 1.11)
Multi-drop configuration.
hard disk to (c) The networks having
broadcasting Networks.
multipoint configuration are called Broadcast
main memory
in a computer (d) In broadcast network, a
message or a
by all other machines in a network. packet sent by any machine is received
(e) The packet contains address field
that specifies the receiver.
1.5LINE CONFIGURATION () Upon receiving a packet, every
machine
two or more
devices are
connected packet. If the transmitted packet is for that checks the address field of the
configuration defines the way in which particular machine, it processes it;
Line otherwise it just ignores the packet.
communication line. (g) Broadcast network provides the
of connections: provision for broadcasting &multicasting.
There are two possible types (h) Broadcasting is the process in
which a single packet is received and
1. Point to Point processed by all the machines in the network. It is made
special code in the address field of the packet. possible by using a
2. Multipoint
Networks (i) When a packet is sent to a subset of the
1. Point to Point Configuration machines i.e. only to few machines
the devices. (see fig. 1.10) in the network it is known as
(a) t uses dedicated link between multicasting.
for the transmission between th
(b) The entire capacity of the link is used
two devices.
Link
Link
This Point-t0-Point
network uses Network
dedicalcd ink ln Broadeast networkS, all devi Multi-computer
LAN. MAN & systems communicateby using
WAN communicate using very
long short
cables)
and very fast
attached to buses.)
.
communication line, Sltl Internet is the
between the two devices. example of inter-network (connection
of two or more
capacity of 1.6.2 Network Classiflcation networks) )
two devicescapacity
The entire is used for link between The entire
the sing on the basis of Geographical
of transission comunication link is shared h Depending upon the geographical area covered by a network, it is classifiedSpaninto 3
devices in a network.
the main categories :
between those two devices only. aiternate
No such
network, several broadcast networks.
routes are possi 1. LAN (Local Area Network)
3. In point-to-point available trom in 2. MAN (Metropolitan Area
Network)
dtfterent routes are 3. WAN (Wide Area Network)
one device to another.
technolCOMoMUgieNs.ICAN
1.20
wireless
Now-a-days LANs are being installed using
system makes Use of access point or APs to transmit and receive data.
INTRODUCTION TO DATA COMMUNICATION 1.21
network can become a server DQDB uses (wo
One of the computers in a
remaining computers calied Clients.
MANS and WANS on the
serving all connected to these unidirectional
two buses,
cables (buses) and all the
computels
LANs are also distinguished from
transmission media and topology, In general, a given LAN will use or basis
types of
mediun., The most common
type of transmission
LANare bus,ring and star.
topologies Intedevice.
tnetorking
communication of data rates of 4to 16
LAN offers high speed
second (Mbps)
megabits Network 1
Depending onthe size of the company and the building there may be
multistory building with hundred
more LANs. Acompany located in a internetworking
device
floor. Between each floor, a
emphoyees mav have a LAN on each
rRler is used to interconnect the
LANS. bridgs Hub
internetworking
device
Network 2
S compujers. printers and other devices use network interface &
moment
NICs) hat allow the devices to communicate at any given
speeds. DODB’Disubted Queuee
Network3 Digitat Bus
METROPOLITAN AREA NETWORK (MAN)
A MAN is made up of LANs that are interconnected across a ci Fig. 1.12 MAN
meropolitan area<as shown in fig. 1.12 Each bus has a specialized device that
device is called head end as shown in initiates the transmission activity. This
fig. 1.13
1A MAN can be created as asingle network such as Cable TV Netm
covering the entire city or a group of several Local Area Networks(LAN Head end
Bus
this way resources can be shared from LAN to LAN and from compute A
+ Direction of flow on Bus A
computer also.
MANS are usually owned by large organizations to interconnect its van
branches across a city 2 3
sender 1s
The subnet consists of two major components:
transmitted on upper bus. transmitted
the left hand
side of the Switching elements. Transmissiorn ne
Data that is to be sent to
lower bus.
Transmission lines carry bits between different machines and
elements are specialized computers that switching
linesThe switching elements are calledconnect two or more transmission
WIDE AREA NETWORK (WAN) country, continent Or Systems and Data switching exchanges or Switching modes, Intermediate
geographic area such as even routers.
WAN Covers a large
The purpose of switching
showninthe figure.
1.14 elements is to choose an outgoing line whenever it
whole of the world,as LANS (or WANs) and
receives the data from an incoming line. )
WAN interconnects two or more audio
We can say that
transmission of data,
distance
image, and viden Host
Subnet
~ provides long
iniormation.) public, leased or
whole of the world, it may utilize private
Since WAN spans combination of these.j LAN
LAN
communication devices or application
Host
5. used for time critical The problems like propagation dela Comparison between LAN, MAN and WAN
ppications there is no and variable signal travel time ma
Propagation delay in LAN. exist in WAN because of S.No. Basis LAN MAN WAN
distance involved. So WAN is no M. Full form Local Area Metropolitan Wide Area
used for time critical applications. Network Area Network Network
The communication medium used in Communication links used in WAN Geographic Operates in small Operates in large Operates over
area Such as same
LAN is co-axial cable, Unshielded | can be PSTN or satellite linke span area such as city. larger area such
twisted pair (UTP) because of long distances involved building or campus. as country or
continent.
7, LAN operates_on_ the principle of WAN operates on the principle of Ownership Usually privately Privately Usually public
the broadcasting. switching.. OWncd public owIned owned.
4. Set up cost Very cheap Moderate cost
Comparison between LAN & MAN. Very costly
Error Rate Very low Moderate High
S.
LAN MAN Transmission Trans1mission Transmission Because of long
No.
media medium is usually media can be distance
1. LAN stands for Local Area MAN stands for Metropolitan Are: Wires such as wires or medium can be
Network Network. Coaxial cable or telephone lines PSTN
2. LAN operates in a small geographic| MAN operates in a large geographi UTP satellite
area upto few kilometers such as area such as city or metropolitan area. VSpecd High Moderate Low
office, building or a campus. 8. Error rates Lowest Moderate Highest
1.27
1.26 INTRODUCTION TO DATA COMMUNICATION
INTRODUCTION TO DATA COMMUNICATION
10
Internet Hub, Switch, bridge Router, gateways Router, Peer to peer relationship is suitable for small networks having less than
Working repeater gateways computers on asingle LAN. )
Devices
Advantages of Peer to Peer Networks
Example LAN is used in MAN is used for| WAN is used
scale for Peer to peer networks have following advantages:
offices to connect | large 1. Such networks are easy to set up and maintain as each
different telephone service Intemetworking computer manages
itself.
departments or in and cable TV in a i.e. internet.
2. It eliminates extra cost required in setting up the
server.
college campus city.
3. Since each device is master of its own, they are not
dependent on other
6.3 Network Classification on the basis of Relationship computers for their operations.
are
On the basis of relationshin between the different devices of the network, there Disadvantages of Peer to Peer Networks
three types of networks: 1, In peer-to-peer network, theabsence of centralized server make it difficult to
vi. Peer to Peer Networks backup data as data is located on different workstations.
Z. Client Sever Networks 2. Security is weak as each system manages itself only.
3. Hybrid Networks 3. There is no central point of data storage for file archiving.
devices of networky Both
Alhese two netvworks differ in terms of control capability of 2. Client-Server Networks
Onerating system th¡t
these implementations require special software called Network
the devices.
determines the control and flow of information between In such networks, there exists a central controller called serverA server is a
specialized computer that controls the network resources and provides
1. Peer to Peer Networks services to other computers in the network.
have same status in the network and
In Peer to peer networks, all the devices All other computers in the network are called clients.A client computer
share the link equally as shown in fig. 1.16. receives the requested services from a server.
A server performs all the major operations like security and network
management.
All the clients communicate with each other via centralized server as shown
in diagramn
If client 1wants to send data to client 2. it first sends request to server to
seek
permission for it. The server then sends asignal to client1 allowing it to
initiate the communication.J
Fig. 1.16 Peer to Peer relationship A server is also responsible for managing all the network resources such as
files, directories, applications &shared devices like printer etc.
Insuch networks there is no master or controller or server.
If any of the clients wants to access these services, it first seeks permission
Each device is responsible for setting up and maintaining its own security i.e. from the server by sending a request.
each device acts as client and server of its own.
INTRODUCTION TO DATA COMMUNICATION
1.25
INTRODUCTION TO DATA COMMUNICATION 1.29
relationship.
Most Local Area Networks are based on client server
Hybrid nelworks incorporate the best features of workgroups in
networks with the performance, security and reliability of peer-tuP
Server networks. server-bäsu
Hybrid networks still provide all of the centralized services of
they also allow users to share and manage their servers, but
own resources within the
workgroup.
Client 5
Advantages of Hybrid Network
Cient 1
1. Client Server application are still
centrally located and managed.
2 Users can assign local access to
resources in their
computers.
3. Workgroups can manage resources without requiring assistance from
network administrator.
Client 2 Client 4
Disadvantages of Hybrid Network
1. Users may need to remember multiple passwords.
Client 3 2. Files can be duplicated and changes
overwritten between the computer with
the shared folder and the Server.
Fig. 1.17 Client Server Relationship 3. Files saved on the workstation are not backed up.
Advantages of Client Server Networks Comparison between client-server network and peer-to-peer
network:
. Centralized back up is possible.
performance of whole system.
2. Use of dedicated server improves the S.No. Basis. Client/Server network Peer-to-Peer network
all the shared resources are centrally
J. Security is better in these networks as Definition In Client-server networks, In Peer-to-Peer network, all
administered. centralized computer callcd devices have same power.
sharing resources.
A. Use of dedicated serversalso increases the speed of Server is used that has more
powers than clients.
Disadvantages of Client Server Ne.works
secondary storage. Cost
Mt requires specialized servers with large memory and It requires costly hardwarc The cost incurred in these
This leads to increase in the cost. devices to create powerful networks is less.
te
2 The cost of network operating system that manages the various clients is also
SCrver.
Layers
Networks are organized as a stack of different layers or levels (see fig.1.18 Fig.1.18 Layered Architecture of an end system
These layers are ustually built one upon the other. 4. This approach also makes the network more flexible to implement
Each layer has a distinct identify and performs a specific set of functions. changes in the future. If we want to add some newservice, we may only
The number of layers, the name of each layer, the content of each layer, need to modify functionality at one layer, reusing the functions provided
the function of each layer differs from network to network. at all other layers.
Each layer provides some services to the higher layers, hiding details3ofProtocols
these services are actually implemented. Protocol refers to set of methods and rules used in a particular layer.
Each layer has an active element a piece of hardware or software It is an agreement between the communicating parties on how
carries out the layer functions. It is caled layer entity. communication is to proceed.
1.32
INTRODUCTION TO DATA COMMUNICAT
INTRODUCTION TO DATA COMMUNICATION 1.33
Laver n on one machine carries on a conversation with layer n on o
machine with the help of protocol. Figure 1.19 shows a computer called Host A communicating with anohei
Ihus, a protocol enables peer entities on different layer to communicate wks
computer called Host Bover a five layer network.
cach other. In such network architecture, no data are directly transferred from
layer n On
Alist of protocols used by a certain system, one protocol per layer is called: one machine to layer n on another machine. This is called vitual
communication.
protocol stack Rather, all data and control information is passed from one layer to the layer
a different machine are sometimes
These entities in same layer on
peers may be software such as processes, hardware
calle
devi. immediately below it.
peers. Thus the The actual communication occurs through physical,medium that lies below
or even bhuman beings. layer 1.
Therefore we can say that there is no direct communication path between
Host
Host
B
peer-layer, they interact using the services of the lower layers.
A
There are two types of communication that can take place in the layered
Layer 5 protocol architecture (see fig. 1.20).
Layer 5
Layar 5 1. Hierarchical communication
Layer 45 ntertaca 2. Peer-to-peer communication
Layar 4 protocol
Layer 4 Layer 4
Layer 2 protoco!
HO M1T2
Souroe machine
SAP SAP
Destination macthine
node 2
Disadvantages of ring topology
K A ring network requires more cable than a bus
network.
2. A break in cable ring brings down entire
network (in case of single ring).
node 5 3 Adding or removing the node disturbs the network
activity.
4. Inring network, communication delay is directly
of nodes in the network. Hence addition of new
proportional to the number
nodes in the network also
increases communication delay.
node 4 node 3
3. Star Topology
XThis topology has a central controller called Hub.
Fig. 1.29 Dual Ring Topology
Each computer in the network has a dedicated point to point link to
Token passing in Ring Network this
central controller. (see fig. 1.30).
Some ring networks do token passing. There is no direct link between these computers and the
Token is a short message that is passed around the ring. computers can
communicate via central controller only.