Ec 407 Computer Communication: Pg. 1 Department of Ece
Ec 407 Computer Communication: Pg. 1 Department of Ece
Ec 407 Computer Communication: Pg. 1 Department of Ece
MODULE I
Introduction to computer communication: Transmission modes -serial and parallel
transmission, asynchronous, synchronous, simplex, half duplex, full duplex communication.
Switching: circuit switching and packet switching
Networks: Network criteria, physical structures, network models, categories of networks,
Interconnection of Networks: Internetwork
Network models: Layered tasks, OSI model, Layers in OSI model, TCP/IP protocol suite.
Data transmission refers to the movement of data in form of bits between two or more
digital devices. This transfer of data takes place via some form of transmission media
(for example, coaxial cable, fiber optics etc.)
When data is sent or received using serial data transmission, the data bits can only be
sent one after another. Hence, they are organized in a specific order.
It is viewed as a reliable data transmission method because a data bit is only sent if
the previous data bit has already been received.
There are two types of serial transmission- Synchronous and Asynchronous; both
these transmissions use 'Bit synchronization'. (Bit synchronization helps the receiving
computer to know when data begin and end during a transmission)
Asynchronous Transmission
Asynchronous transmission sends only one character at a time where a character is
either a letter of the alphabet or number or control character i.e. it sends one byte of
data at a time.
Bit synchronization between two devices is made possible using start bit and stop bit.
Start bit indicates the beginning of data. A start bit usually 0 is added to the beginning
of each byte.
Stop bit indicates the end of data. These bits, usually 1s are called stop bits.
Addition of start and stop increase the number of data bits. Hence more bandwidth is
consumed in asynchronous transmission.
There is idle time between the transmissions of different data bytes. This idle time is
also known as Gap. The gap or idle time can be of varying intervals.
Application of Asynchronous Transmission
Asynchronous transmission is well suited for keyboard type-terminals and paper tape
devices. This method does not require any local storage at the terminal or the
computer as transmission takes place character by character.
Asynchronous transmission is best suited to Internet traffic in which information is
transmitted in short bursts. This type of transmission is used by modems.
In the absence of start & stop bits, bit synchronization is established between sender
& receiver by 'timing' the transmission of each bit.
Since there is no gap between the various bytes, receiver has to separate the bit stream
into bytes
In order to receive the data error free, the receiver and sender operates at the same
clock frequency.
Application of Synchronous transmission
Synchronous transmission is used for high speed communication between computers
Advantage of Synchronous transmission
This method is faster as compared to asynchronous as there are no extra bits (start bit
& stop bit) and also there is no gap between the individual data bytes.
Disadvantages of Synchronous transmission
It is costly as compared to asynchronous method. It requires local buffer storage at the
two ends of line to assemble blocks. It also requires accurately synchronized clocks at
both ends. This leads to increase in the cost.
The sender and receiver must operate at the same clock frequency. This requires
proper synchronization which makes the system complicated.
PARALLEL TRANSMISSION
In parallel data transmission, multiple data bits are transmitted over multiple channels
at the same time. This means that data can be sent much faster than using serial
transmission methods.
The order in which a bit string is received can depend on various conditions, such as
proximity to the data source, user location, and bandwidth availability.
Two examples of parallel interfaces can be seen below. In the first parallel interface,
the data is sent and received in the correct order. In the second parallel interface, the
data is sent in the correct order, but some bits were received faster than others.
TRANSMISSION MODES
Transmission mode means transferring of data between two devices. It is also known
as communication mode.
There are three types of transmission mode:-
Simplex Mode
Half-Duplex Mode
Full-Duplex Mode
Simplex Mode:
In Simplex mode, the communication is unidirectional.
Only one of the two devices on a link can transmit, the other can only receive.
The simplex mode can use the entire capacity of the channel to send data in one
direction. Example: Keyboard and traditional monitors. The keyboard can only
introduce input, the monitor can only give the output.
Half-Duplex Mode
Each station can both transmit and receive, but not at the same time. When one device
is sending, the other can only receive, and vice versa.
The half-duplex mode is used in cases where there is no need for communication in
both direction at the same time.
The entire capacity of the channel can be utilized for each direction.
Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously.
In full-duplex mode, signals going in one direction share the capacity of the link with
signals going in other direction, this sharing can occur in two ways:
o Either the link must contain two physically separate transmission paths, one
for sending and other for receiving.
o Or the capacity is divided between signals travelling in both directions.
Full-duplex mode is used when communication in both directions is required all the
time.
The capacity of the channel must be divided between the two directions.
Example: Telephone Network
COMPUTER NETWORK
A computer network is a system of interconnected computers and peripheral devices.
Using hardware and software, these interconnected computing devices can
communicate with each other through defined rules of data communications.
A computer network may operate on wired connections or wireless connections.
When two or more networks are linked or connected and are able to communicate
with one another using suitable hardware and software, it is called an internetwork.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of
these are performance, reliability, and security.
Performance : Performance can be measured in many ways, including transit time
and response time. Transit time is the amount of time required for a message to
travel from one device to another. Response time is the elapsed time between an
inquiry and a response. The performance of a network depends on several factors,
including the number of users, the type of transmission medium, the capabilities
of the connected hardware, and the efficiency of the software.
Performance is often evaluated by two networking metrics: throughput and delay.
We often need more throughput and less delay.
Reliability : In addition to accuracy of delivery, network reliability is measured by
the frequency of failure, the time it takes a link to recover from a failure, and the
network's robustness in a catastrophe.
Security : Network security issues include protecting data from unauthorized
access, protecting data from damage and development, and implementing policies
and procedures for recovery from breaches and data losses.
Physical Structures
Type of Connection
A network is two or more devices connected through links. A link is a
communications pathway that transfers data from one device to another.
There are two possible types of connections: point-to-point and multipoint.
Point-to-Point :
A point-to-point connection provides a dedicated link between two devices.
The entire capacity of the link is reserved for transmission between those two devices.
Multipoint :
A multipoint (also called multidrop) connection is one in which more than two
specific devices share a single link.
The capacity of the channel is shared, either spatially or temporally. If several devices
can use the link simultaneously, it is a spatially shared connection. If users must take
turns, it is a time-shared connection.
Q. Compare any three physical topologies used in computer networks (KTU Dec 2018 )
Physical Topology
The term physical topology refers to the way in which a network is laid out physically
The topology of a network is the geometric representation of the relationship of all the
links and linking devices (usually called nodes) to one another.
There are four basic topologies possible: mesh, star, bus, and ring.
1.Mesh Topology
In a mesh topology, every device has a dedicated point-to-point link to every other
device.
The term dedicated means that the link carries traffic only between the two devices it
connects. In a fully connected mesh topology with n nodes, we need n (n -1) /2
duplex-mode links.
To accommodate that many links, every device on the network must have (n – 1)
input/output (VO) ports to be connected to the other (n – 1) stations.
Advantages
The use of dedicated links eliminates the traffic problems that can occur when links
must be shared by multiple devices.
A mesh topology is robust. If one link becomes unusable, it does not incapacitate the
entire system.
There is the advantage of privacy or security. When every message travel along a
dedicated line, only the intended recipient sees it.
Point-to-point links make fault identification and fault isolation easy.
Disadvantages
Since every device must be connected to every other device, installation and
reconnection are difficult.
The sheer bulk of the wiring can be greater than the available space (in walls, ceilings,
or floors) can accommodate.
The hardware required to connect each link (I/O ports and cable) can be expensive.
One practical example of a mesh topology is the connection of telephone regional
offices in which each regional office needs to be connected to every other regional
office.
2.Star Topology
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
The devices are not directly linked to one another. It does not allow direct traffic
between devices.
The controller acts as an exchange: If one device wants to send data to another, it
sends the data to the controller, which then relays the data to the other connected
device.
The star topology is used in local-area networks (LANs). High-speed LANs often use
a star topology with a central hub.
Advantages
A star topology is less expensive than a mesh topology. In a star, each device needs
only one link and one I/O port to connect it to any number of others. This factor also
makes it easy to install and reconfigure.
Far less cabling needs to be housed, and additions, moves, and deletions involve only
one connection: between that device and the hub.
Other advantage includes robustness. If one link fails, only that link is affected. All
other links remain active. This factor also lends itself to easy fault identification and
fault isolation. As long as the hub is working, it can be used to monitor link problems
and bypass defective links.
Disadvantages
One big disadvantage of a star topology is the dependency of the whole topology on
one single point, the hub. If the hub goes down, the whole system is dead.
Although a star requires far less cable than a mesh, each node must be linked to a
central hub.
3.Bus Topology
A bus topology is multipoint. One long cable acts as a backbone to link all the devices
in a network
Nodes are connected to the bus cable by drop lines and taps.
A drop line is a connection running between the device and the main cable. A tap is a
connector that either splices into the main cable to create a contact with the metallic
core.
As a signal travels along the backbone, some of its energy is transformed into heat.
Therefore, it becomes weaker and weaker as it travels farther and farther. For this
reason there is a limit on the number of taps a bus can support and on the distance
between those taps
Advantages
Ease of installation. Backbone cable can be laid along the most efficient path, then
connected to the nodes by drop lines of various lengths. In this way, a bus uses less
cabling than mesh or star topologies.
In a star, for example, four network devices in the same room require four lengths of
cable reaching all the way to the hub. In a bus, only the backbone cable stretches
through the entire facility. Each drop line has to reach only as far as the nearest point
on the backbone.
Disadvantages
Include difficult reconnection and fault isolation. It can be difficult to add new
devices. Signal reflection at the taps can cause degradation in quality. Adding new
devices may therefore require modification or replacement of the backbone.
A fault or break in the bus cable stops all transmission, even between devices on the
same side of the problem.
4.Ring Topology
Each device has a dedicated point-to-point connection with only the two devices on
either side of it.
A signal is passed along the ring in one direction, from device to device, until it
reaches its destination.
Each device in the ring incorporates a repeater. When a device receives a signal for
another device, its repeater regenerates the bits and passes them along.
Advantages
A ring is relatively easy to install and reconfigure. Each device is linked to only its
immediate neighbours (either physically or logically). To add or delete a device
requires changing only two connections.
In addition, fault isolation is simplified. Generally in a ring, a signal is circulating at
all times. If one device does not receive a signal within a specified period, it can issue
an alarm. The alarm alerts the network operator to the problem and its location.
Disadvantages
Unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such
as a disabled station) can disable the entire network. This weakness can be solved by
using a dual ring or a switch capable of closing off the break.
Circuit switching is completely transparent. The sender and receiver can use any bit
rate, format, or framing method they want to. With packet switching, the carrier
determines the basic parameters
Telephone networks are examples of circuit-switched networks. Internet routers use
packet switching.
In circuit switching, customers are charged based on time and distance and
independent of number of messages. In packet switching, customers are charged
based on number of bytes (in packets) and connect time and independent of distance.
Q. Differentiate between circuit switching and packet switching (KTU May 2019)
Protocols
A protocol is a set of rules and formats that govern the communication between
two devices in a network.
They are completely independent of the hardware technology implemented in a
network. Thus communication protocols are network independent protocols.
A protocol defines what is communicated, how it is communicated and when it is
communicated.
Need of protocols
Layering
Fig.1
Advantages of layering
1. One potential drawback of layering is that one layer may duplicate lower-layer
functionality.
Network architecture is a general blueprint that describes how data and network
information are communicated from an application on one computer through
network to an application on another computer in terms of different layers.
A set of layers and protocols is called network architecture.
Reference models may be open or closed.
Open reference model is one in which its architecture is not secret and is open for
anyone who uses it.
Closed or proprietary model is a system in which architecture is kept a secret from
general users by its creators.
Two of the most widely referenced architectures are: the OSI architecture and the
Internet architecture (TCP/IP architecture) .
IBM's SNA 7 layer model is closed network architecture (SNA- Systems Network
architecture).
Q. Write in detail how all the layers in OSI model work together for networking
(KTU May 2019)
The layers are organized based on natural sequence of events that occurred during
a communication session.
Top 3 layers define how applications within end stations will communicate with
each other and with users.
Bottom 4 layers define how data is transmitted end-to-end.
Each layer handles a particular set of functions, follows a particular set of
protocols based on the functions and provides a set of services.
Application layer (Layer 7)
The application layer is where network applications and their application layer
protocols reside.
Provides network access to application programs
Provides services that directly support the end user.
Services offered by application layer include e-mail service, file transfer service,
accessing web pages, videoconferencing, online chat etc.
The application layer protocols include HTTP (Hyper Text Transfer Protocol) to
support the Web, SMTP (Simple Mail Transfer Protocol) to support electronic
mail, and FTP (File Transfer Protocol) to support file transfer etc.
1. Application Layer
Provides an interface to the user through which he can access the network
resources.
An example is web browser.
The services provided by the application layer include file transfers, e-mail
services, webpage etc.
Application layer contains application protocols such as FTP (File Transport
Protocol), TELNET, HTTP (Hyper Text Transfer protocol), SMTP (Simple Mail
Transfer Protocol, or electronic mail, DNS (Domain Name System) etc.
2. Transport Layer
Helps in the exchange of messages between processes (application programs)
running on two different computers.
Two basic types of services are provided by transport layer- connection oriented
and connection-less services.
Transport layer protocols include TCP and UDP.
Transmission Control Protocol (TCP) handles connection oriented services while
User Datagram Protocol (UDP) handles connection-less services.
TCP also performs flow control and segmentation & reassembly.
TCP provides a reliable byte-stream channel and UDP provides an unreliable
datagram delivery channel.
3. Internet Layer
Handles the routing of messages across multiple networks with the help of routers
Logical addressing of all devices in a network is done by internet layer.
Data from upper layers is converted into a new format called IP datagram at this
layer. IP datagrams include source address and destination address.
IP datagram from a sending computer flows through different routers till it reaches
the intended receiver.
Internet Protocol (IP) controls all the activities of Internet layer.
IP provides all the support for successful delivery of messages across different
networks. But it cannot guarantee successful delivery. Thus the service offered by
Internet layer is termed as best-effort connectionless service.
4. Network Interface Layer
It defines the protocols (software – network device driver) and hardware –
network adaptor, required to deliver data across some physical network
Network Interface Layer converts IP datagrams from Internet layer into a new
format called frames. The frames are then converted into bit stream for sending
through a physical channel.
All the electrical and mechanical activities required for frame transmission is
handled by this layer.
Ethernet is an example protocol at this layer; it defines the required cabling,
addressing and protocols used to create an Ethernet LAN
Differences: