Data Communication and Computer Network
Data Communication and Computer Network
Computer Engineering
Data Communication
and Computer Network
Government of Nepal
Ministry of Education, Science and Technology
Curriculum Development Centre
Sanothimi, Bhaktapur
Phone : 5639122/6634373/6635046/6630088
Website : www.moecdc.gov.np
Feedback Copy
(Grade 12)
Secondary Level
Computer Engineering
Government of Nepal
Ministry of Education, Science and Technology
Curriculum Development Centre
Sanothimi, Bhaktapur
Publisher : Government of Nepal
Ministry of Education, Science and Technology
Curriculum Development Centre
Sanothimi, Bhaktapur
© Publisher
The Subscriber Channel(SC) connector is used for cable TV. It uses push/pull
locking system. The Straight-Tip(ST) connector is used for connecting cable to
the networking devices. MT-RJ is a connector that is the same size as RJ45.
Propagation Modes
Ground Propagation: In this, radio waves travel through the lowest portion
of the atmosphere, hugging the Earth. These low-frequency signals emanate
in all directions from the transmitting antenna and follow the curvature of the
planet.
Sky Propagation: In this, higher-frequency radio waves radiate upward into
the ionosphere where they are reflected back to Earth. This type of
transmission allows for greater distances with lower output power.
Line-of-sight Propagation: in this type, very high-frequency signals are
transmitted in straight lines directly from antenna to antenna.
We can divide wireless transmission into three broad groups:
Radio waves
Micro waves
A parabolic antenna works as a funnel, catching a wide range of waves and directing
them to a common point. In this way, more of the signal is recovered than would
be possible with a single-point receiver.
20 Data Communication & Computer Application : Grade 12
A horn antenna looks like a gigantic scoop. Outgoing transmissions are broadcast
up a stem and deflected outward in a series of narrow parallel beams by the curved
head. Received transmissions are collected by the scooped shape of the horn, in a
manner similar to the parabolic dish, and are deflected down into the stem.
Applications of Micro Waves
Microwaves, due to their unidirectional properties, are very useful when unicast
(one-to-one) communication is needed between the sender and the receiver. They
are used in cellular phones, satellite networks and wireless LANs.
There are 2 types of Microwave Transmission:
1. Terrestrial Microwave
2. Satellite Microwave
Advantages of Microwave Transmission
Used for long distance telephone communication
Carries 1000's of voice channels at the same time
Disadvantages of Microwave Transmission
It is very costly
Terrestrial Microwave
For increasing the distance served by terrestrial microwave, repeaters can be
installed with each antenna. The signal received by an antenna can be converted
into transmittable form and relayed to next antenna as shown in below figure. It is
an example of telephone systems all over the world
There are two types of antennas used for terrestrial microwave communication:
1. Parabolic Dish Antenna
In this every line parallel to the line of symmetry reflects off the curve at angles in
a way that they intersect at a common point called focus. This antenna is based on
2. Horn Antenna
It is a like gigantic scoop. The outgoing transmissions are broadcast up a stem and
deflected outward in a series of narrow parallel beams by curved head.
Satellite Microwave
This is a microwave relay station which is placed in outer space. The satellites are
launched either by rockets or space shuttles carry them.
These are positioned 36000 Km above the equator with an orbit speed that exactly
matches the rotation speed of the earth. As the satellite is positioned in a geo-
synchronous orbit, it is stationery relative to earth and always stays over the same
point on the ground. This is usually done to allow ground stations to aim antenna at
a fixed point in the sky.
Objectives
To identify different multiplexing techniques.
To elaborate different types of switching techniques.
Learning Process and support material
Class demonstration with chart paper drawings.
Case Study
Content’s Elaboration
Multiplexing
In general, a medium can carry only one signal at any moment in time. For multiple
signals to share one medium, the medium must somehow be divided, giving each
signal a portion of the total bandwidth. Multiplexing (also known as MUX-ing) is
a method by which multiple analog message signals or digital data streams are
combined into one signal over a shared medium. The basic aim of the Multiplexing
is to share an expensive resource by putting-up multiple signals on the same
channel. For example, in telecommunications, several telephone calls may be
carried using one wire. Multiplexing originated in telegraphy in the 1870s and is
now widely applied in different streams of communications. When several
communication channels are needed between the same two points, significant
economies may be realized by sending all the messages on one transmission facility
– called multiplexing. As shown in Figure,‘n’ number of signals from the low speed
channels have been combined to one sigh speed link using a n:1 multiplexer.
Whereas the opposite process is carried out at the other end, where the signals are
further separated into n number of low speed channels. This opposite process is
referred as demultiplexing.
Fig: FDM
In the telecommunication technology, the total bandwidth available in a
communication medium is divided into a series of non-overlapping frequencies sub
bands using the frequency division multiplexing. Each one of these sub-bands then
carries a separate signal. This allows a single transmission medium such as a cable
or optical fiber to be shared by many signals.
All address information is only transferred during setup phase. Once the route to
destination is discovered, entry is added to switching table of each intermediate
Objective
To Illustrate AM and FM modulation schemes with suitable circuit diagrams
Learning Process and Study Materials
Class demonstration and practical
Question/Answer
Group discussion
Content’s Elaboration
Modulation
A message carrying a signal has to get transmitted over a distance and for it to
establish a reliable communication, it needs to take the help of a high frequency
signal which should not affect the original characteristics of the message signal.
The characteristics of the message signal, if changed, the message contained in it
also alters. Hence, it is a must to take care of the message signal. A high frequency
signal can travel up to a longer distance, without getting affected by external
disturbances. We take the help of such high frequency signal which is called as
a carrier signal to transmit our message signal. Such a process is simply called as
Modulation. Modulation is the process of changing the parameters of the carrier
signal, in accordance with the instantaneous values of the modulating signal.
Fig:Modulation Process
Analog Modulation
In this modulation, a continuously varying sine wave is used as a carrier wave that
modulates the message signal or data signal. The Sinusoidal wave’s general
function is shown in the figure below, in which, three parameters can be altered to
get modulation – they are amplitude, frequency and phase, so the types of analog
modulation are:
Amplitude modulation (AM)
Fig: AM Modulation
Frequency Modulation:
Frequency modulation (FM) varies the frequency of the carrier in proportion to
the message or data signal while maintaining other parameters constant. The
advantage of FM over AM is the greater suppression of noise at the expense of
bandwidth in FM. It is used in applications like radio, radar, telemetry seismic
prospecting, and so on. The efficiency and bandwidths depend on modulation index
and maximum modulating frequency.
Below we have the complete representation of the OSI model, showcasing all the
layers and how they communicate with each other
Fig: OSI model vs. TCP/IP model, and TCP/IP protocol suite
62 Data Communication & Computer Application : Grade 12
Comparing the layers of the TCP/IP model and the OSI model, the application layer
of the TCP/IP model is similar to the OSI layers 5, 6, 7 combined, but TCP/IP model
does not have a separate presentation layer or session layer. The transport layer of
TCP/IP encompasses the responsibilities of the OSI transport layer and some of the
responsibilities of the OSI session layer. The network access layer of the TCP/IP
model encompasses the data link and physical layers of the OSI model. Note that
the Internet layer of TCP/IP does not take advantage of sequencing and
acknowledgment services that might be present in the data link layer of OSI model.
The responsibility is of the transport layer in TCP/IP model.
Considering the meanings of the two reference models, the OSI model is just a
conceptual model. It is mainly used for describing, discussing, and understanding
individual network functions. However, TCP/IP is firstly designed to solve a
specific set of problems, not to function as a generation description for all network
communications as OSI model. OSI model is generic, protocol independent, yet
most protocols and systems adhere to it, while TCP/IP model is based on standard
protocols which the Internet has developed. Another thing should be noted in OSI
model is that not all layers are used in simpler applications. While the layers 1, 2, 3
are mandatory for any data communication, the application may use some unique
interface layer to the application instead of the usual upper layers in the model.
Differences between OSI and TCP / IP Reference Models
1. OSI model is a generic model that is based upon functionalities of each layer.
TCP/IP model is a protocol-oriented standard.
2. OSI model distinguishes the three concepts, namely, services, interfaces, and
protocols. TCP/IP does not have a clear distinction between these three.
3. OSI model gives guidelines on how communication needs to be done, while
TCP/IP protocols layout standards on which the Internet was developed. So,
TCP/IP is a more practical model.
4. In OSI, the model was developed first and then the protocols in each layer
were developed. In the TCP/IP suite, the protocols were developed first and
then the model was developed.
5. The OSI has seven layers while the TCP/IP has four layers.
The number of networks and the number of hosts per class can be derived by this
formula:
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP
range 127.x.x.x is reserved for loopback IP addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that
Class A addressing can have 126 networks (27-2) and 16777214 hosts (224-2).
Class A IP address format is:
0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Class B Address
An IP address which belongs to class B has the first two bits in the first octet set to
10, i.e.
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask
for Class B is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
Class B IP address format is:
10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is:
In case of subnetting too, the very first and last IP address of every subnet is used
for Subnet Number and Subnet Broadcast IP address respectively. Because these
two IP addresses cannot be assigned to hosts, sub-netting cannot be implemented
by using more than 30 bits as Network Bits, which provides less than two hosts per
subnet.
Class B Subnets
Class C Subnets
Class C IP addresses are normally assigned to a very small size network because it
can only have 254 hosts in a network. Given below is a list of all possible
combination of subnetted Class B IP address:
Internet Service Providers may face a situation where they need to allocate IP
subnets of different sizes as per the requirement of customer. One customer may
Step - 2
Sort the requirements of IPs in descending order (Highest to Lowest).
Sales 100
Purchase 50
Accounts 25
Management 5
What we have here is our 200 computers on the left are connected to R1 and in the
192.168.1.0 /24 network. R2 has 200 computers behind it and the network we use
over there is 192.168.2.0 /24. Routers “route” based on IP information, in our
example R1 only has to know that network 192.168.2.0 /24 is behind R2. R2 only
needs to know that the 192.168.1.0 /24 network is behind R1. Are you following
me here?
Instead of having a MAC-address-table with 400 MAC addresses we now only need
a single entry on each router for each other’s networks. Switches use mac address
In this topology, R1 and R2 are stub routers so we can configure default routing for
both these routers.
22. Fast Forward: Used to fast forward any task. For example, Fast forwarding
Device Boot procedure. It just saves time during work.
23. Inventory: Device inventory. User has to select device types from here
24. Device List: Device list shows all the devices of inventory. If you have
selected Routers from inventory then all the router’s list will be showed in the
device list. A user has to select a Specific device from the device list to use
in the simulator.
25. Workspace: The place where you work or build your topology.
Now let’s Make a topology using Cisco Packet tracer: So we are going to make a
topology like the below one.
Now Select 2 Desktop PC: Select End user list. Select PC from the right-side
device list. Now click on workspace. Do this 2 times.
Cable Connection: Go to the cable option. Select cables, select Auto cable first.
Auto Cable Connection: Now after selecting auto cable click on the left router
first. The cable will be automatically connected. Then move the mouse cursor to
the 2nd router and click on it. Cable will be automatically connected.
Manual Cable connection: to perform this step please select appropriate cable like
for same type of devices use cross cable and for different type of cable use straight
cable. Here for switch to router connection we will use straight cable:
That’s all for today, lets cook some typologies and practice to enhance the skills
Let’s practice some configuration, to do that please check Network Fundamental
Page. To go there click on the link below:
If you find this post helpful then please do not hesitate to rate this post.
Fig: Repeater
Switch – A switch is a multi-port bridge with a buffer and a design that can
boost its efficiency (large number of ports imply less traffic) and
performance. Switch is data link layer device. Switch can perform error
checking before forwarding data, that makes it very efficient as it does not
forward packets that have errors and forward good packets selectively to
correct port only. In other words, switch divides collision domain of hosts,
but broadcast domain remains same.
Portable media example (tape, external hard drive, optical disc, REV, and so
on):
The media pool diagram for the Professional scheme shows that a total of 14
separate backup tapes are required: 4 daily,4 weekly, 2 monthly, 3 quarterly,
and 1 yearly.
An icon at the top-right of each colored square indicates how the media should be
rotated and stored (e.g. Monthly tapes (in the green square) should be stored offsite
after the backup completes and be brought onsite when next required; a yearly tape,
however, should be permanently stored offsite after being backed up to and a new
Once you have selected an appropriate scheme you can specify the time of the day
Fig: Speedtest
Fig: PingTest
Fig: Pathping
Fig: Mtr