Module - 1 - Edited
Module - 1 - Edited
COMMUNICATIONS
Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire or cable. For data communications to occur, the
communicating devices must be part of a communication system made up of a combination of
hardware (physical equipment) and software (programs).
Components
2. Sender: The sender is the device that sends the data message.
It can be a computer, workstation, telephone handset, video camera, and so on.
Data Representation
Information today comes in different forms such as TEXT, NUMBERS, IMAGES, AUDIO, and
VIDEO.
1. Text
In data communications, Text is represented as a bit pattern, a sequence of bits (0s or 1s).
Different sets of bit patterns have been designed to represent text symbols. Each set is
called a code, and the process of representing symbols is called coding.
2. Numbers
Numbers are also represented by bit patterns. However, a code such as ASCII is not used to
represent numbers; the number is directly converted to a binary number to simplify
mathematical operations.
3. Images
Images are also represented by bit patterns. In its simplest form, an image is composed of a
matrix of pixels (picture elements), where each pixel is a small dot. The size of the pixel
depends on the resolution.
4. Audio
Audio refers to the recording or broadcasting of sound or music. Audio is by nature
different from text, numbers, or images. It is continuous, not discrete.
5. Video
Video refers to the recording or broadcasting of a picture or movie. Video can either be
produced as a continuous entity (e.g., by a TV camera), or it can be a combination of images,
each a discrete entity, arranged to convey the idea of motion.
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex
Simplex
In simplex mode, the communication is unidirectional (one-way). Only one of the two deviceson
a link can transmit; the other can only receive. The simplex mode can use the entire capacity of the
channel to send data in one direction
Example: The keyboard can only introduce input; the monitor can only accept output.
Mrs.Chaitra S N., Dept of ECE., GMIT., Davangere 2
Computer Communication Networks-18EC61 Module - 1 - Introduction to Network Model & Data Link Layer
Half-Duplex
In half-duplex mode, each station can both transmit andreceive, but not at the same time. When
one device is sending, the other can only receive, and vice versa. The entire capacity of the channel
can be utilized for each transmission direction.
Full-Duplex
In full-duplex mode, both stations can transmit and receive simultaneously. The capacity of the
channel, however, must be divided between the two directions
NETWORKS
A network is the interconnection of a set of devices capable of communication. These devices in a
network are connected using wired or wireless transmission media such as cable or air.
Example: Device can be a host (Computer, desktop, laptop, work station, cellular phone, or
security system) or (Connecting device such as a router, a switch, a modem and so on).
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are
Performance, Reliability and Security.
1. Performance
The performance of a network depends on a number of factors, including the number of
users, the type of transmission medium, the capabilities of the connected hardware, and
the efficiency of the software. Performance is often evaluated by two networking metrics:
throughput and delay.
2. Reliability
Network reliability is measured by the frequency of failure, the time it takes a link to
recover from a failure, and the network’s robustness in a catastrophe.
3. Security
Network security issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery
from breaches and data losses.
Physical Structures
Type of Connection
A network is two or more devices connected through links. A link is a communications pathway
that transfers data from one device to another. There are two possible types of connections: point-
to-point and multipoint.
Point-to-Point
A point-to-point connection provides adedicatedlink between twodevices. Theentirecapacity
of the link is reserved for transmission between those two devices.
Most point-to-point connections use an actual length of wire or cable to connect the two ends, but
other options, such as microwave or satellite links, are also possible.
Example: When we change television channels by infrared remote control, we are establishing a
point-to-point connection between the remote control and the television’s control system.
Multipoint
A multipoint (also called multidrop) connection is one in which morethan two specific devices
share a single link. In a multipoint environment, the capacity of the channel is shared, it is a
timeshared connection.
Physical Topology
The topology of a network is the geometric representation of the relationship of all the links and
linking devices is connected physically (usually called nodes). There are four basic topologies
possible: MESH, STAR, BUS, and RING.
Mesh Topology
In a mesh topology, every device has a dedicated point-to-point link to every other device.
Other advantages include robustness. If one link fails, only that link is affected. All other links
remain active. This factor also lends itself to easy fault identification and fault isolation. As long as
the hub is working, it can be used to monitor link problems and bypass defective links.
One big disadvantage of a star topology is the dependency of the whole topology on one single, the
hub. If the hub goes down, the whole system is dead.
The star topology is used in local-area networks (LANs), High-speed LANs often use a star
topology with a central hub.
Bus Topology
A bus topology is multipoint. One long cable acts as a backbone to link all the devices in a
network. Nodes are connected to the bus cable by drop lines and taps.
A drop line is a connection running between the device and the main cable. A tap is a connector to
create a contact with themetallic core.
Advantages of a bus topology include ease of installation. Backbone cable can be laid along the
most efficient path, and then connected to the nodes by drop lines of various lengths. In this way, a
bus uses less cabling than mesh or star topologies.
Disadvantages include difficult reconnection and fault isolation. There is a limit on the number of
taps a bus can support and on the distance between those taps.
Ring Topology
In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it. A signal is passed along the ring in one direction, from device to device,
until it reaches its destination. Each device in the ring incorporates a repeater. When a device
receives a signal intended for another device, its repeater regenerates the bits and passes them
along.
Advantages
A ring is relatively easy to install and reconfigure. Fault isolation is simplified.
Disadvantage
In a simple ring, a break in the ring (such as a disabled station) can disable the entire network.
This weakness can be solved by using a dual ring or a switch capable of closing off the break. Ring
topology was prevalent when IBM introduced its local-area network, Token Ring. Today, the need
for higher-speed LANs has made this topology less popular.
NETWORK TYPES
Two types of networks, LANs and WANs, we define switching, which is used to connect networks
to form an internetwork (a network of networks).
Today, most LANs use a smart connecting switch, which is able to recognize the destination
address of the packet and guide the packet to its destination without sending it to all other hosts.
The switch alleviates the traffic in the LAN and allows more than one pair to communicate with
each other at the same time if there is no common source and destination among them.
Switched WAN
A switched WAN is a network with more than two ends.
A switched WAN is used in the backbone of global communication today.
A switched WAN is a combination of several point-to-point WANs that are connected by
switches.
Point-to-Point WAN
A point-to-point WAN is a network that connects two communicating devices through a
transmission media (cable or air).
Switching
An internet is a switched network in which a switch connects at least two linkstogether. A switch
needs to forward data from a network to another network when required.
Circuit-Switched Network
In a circuit-switched network, a dedicated connection, called a circuit, is always available
between the two end systems; the switch can only make it active or inactive.
Figure shows a very simple switched network that connects four telephones to each end,
because circuit switching was very common in telephone networks in the past.
The four telephones at each side are connected to a switch.
The switch connects a telephone set at one side to a telephone set at the other side.
The thick line connecting two switches is a high-capacity communication line that can
handle four voice communications at the same time; the capacity can be shared between all
pairs of telephone sets.
The switches used in this example have forwarding tasks but no storing capability.
Circuit-switched network is efficient only when it is working at its full capacity.
Mrs.Chaitra S N., Dept of ECE., GMIT., Davangere 9
Module - 1 - Introduction to Network Model & Data Link Layer
Packet-Switched Network
In a computer network, the communication between the two ends is done in blocks of data
called packets.
This allows us to make the switches function for both storing and forwarding because a
packet is an independent entity that can be stored and sent later.
Figure shows a small packet-switched network that connects four computers at one site to
four computers at the other site.
A router in a packet-switched network has a queue that can store and forward the packet.
Packet-switched network is more efficient than a circuit-switched network, but the packets
may encounter some delays.
The Internet
An internet is two or more networks that can communicate with each other. Internet is
composed of thousands of interconnectednetworks.
Figure shows a conceptual (not geographical) view of the Internet. The figure shows the
Internet as several backbones, provider networks, and customer networks.
❑ Dial-up service. The first solution is to add to the telephone line a modem that converts
data to voice. The software installed on the computer dials the ISP and imitates making a
telephone connection. Unfortunately, the dial-up service is very slow, and when the line is
used for Internet connection, it cannot be used for telephone (voice) connection. It is only
useful for small residences.
❑ DSL Service. Since the advent of the Internet, some telephone companies have upgraded
their telephone lines to provide higher speed Internet services to residences or small
businesses. The DSL service also allows the line to be used simultaneously for voice and
data communication.
Important Questions:
1. Identify the five components of a data communications system.
2. What are the three criteria necessary for an effective and efficient network?
3. What are the advantages of a multipoint connection over a point-to-point one?
4. What are the two types of line configuration?
5. Categorize the four basic topologies in terms of line configuration.
6. What is the difference between half-duplex and full-duplex transmission modes?
7. Name the four basic network topologies, and cite an advantage of each type.
8. For n devices in a network, what is the number of cable links required for a mesh, ring, bus,
and star topology?
9. What are some of the factors that determine whether a communication system is a LAN or
WAN?
10. What is an internet? What is the Intranet?
11. Why are protocols needed?
Scenarios
Let us develop two simple scenarios to better understand the need for protocol layering.
First Scenario
In the first scenario, communication is so simple that it can occur in only one layer. Assume Maria
and Ann are neighbors with a lot of common ideas. Communication between Maria and Ann takes
place in one layer, face to face, in the same language, as shown in Figure below.
A single-layer protocol
Second Scenario
In the second scenario, the communication is happens from a far place, continue their
communication and exchange ideas using regular mail through the post office.
However, they do not want their ideas to be revealed by other people if the letters are
intercepted. They agree on an encryption/decryption technique.
The sender of the letter encrypts it to make it unreadable by an intruder; the receiver of the
letter decrypts it to get the original letter.
Now the communication takes place in three layers, as shown in Figure.
Protocol layering enables us to divide a complex task into several smaller and simpler
tasks.
First Principle
The first principle dictates that if we want bidirectional communication, need to make each layer
so that it is able to perform two opposite tasks, one in each direction.
Example
The third layer task is to listen (in one direction) and talk (in the other direction).
The second layer needs to be able to encrypt and decrypt.
The first layer needs to send and receive mail.
Second Principle
The second principle is need to follow in protocol layering is that the two objects under each layer
at both sites should be identical.
Example
The object under layer 3 at both sites should be a plain text letter.
The object under layer 2 at both sites should be a cipher text letter.
The object under layer 1 at both sites should be a piece of mail.
Logical Connections
Logical connection between each layer as shown in Figure. This means that, layer-to-layer
communication.
Logical (imaginary) connection at each layer through which they can send the object
created from that layer.
Layered Architecture
To show how the layers in the TCP/IP protocol suite are involved in communication between two
hosts, we assume that we want to use the suite in a small internet made up of three LANs (links),
each with a link-layer switch. We also assume that the links are connected by one router, as shown
in Figure.
The destination host needs to receive the communication at the physical layer and then
deliver it through the other layers to the application layer.
The router is involved in only three layers; network, Data link and Physical layer.
A link-layer switch in a link, however, is involved only in two layers, data-link and physical.
The duty of the application, transport, and network layers is end-to-end. However, the duty of the
data-link and physical layers is hop-to-hop, in which a hop is a host or router.
In other words, the domain of duty of the top three layers is the internet, and the domain of duty
of the two lower layers is the link.
Figure shows the second principle for protocol layering, shows the identical objects below each
layer related to each device. Note that the link between two hops does not change the object.
Hop-to-Hop Delivery
Source-to-destination delivery
v) Application Layer:
The Application layer is responsible for providing services to the user.
We have not shown the layers for the link-layer switches because no encapsulation/decapsulation
occurs in this device. In Figure 2.8, we show the encapsulation in the source host, decapsulation in
the destination host, and encapsulation and Decapsulation in the router.
2. The network layer only inspects the source and destination addresses in the datagram header
and consults its forwarding table to find the next hop to which the datagram is to be delivered. The
contents of the datagram should not be changed by the network layer in the router unless there is
a need to fragment the datagram if it is too big to be passed through the next link. The datagram is
then passed to the data-link layer of the next link.
3. The data-link layer of the next link encapsulates the datagram in a frame and passes it to the
physical layer for transmission.
Addressing:
Four levels of addresses are used in an internet employing the TCP/IP Protocols:
a) Physical addresses
b) Logical addresses
c) Port addresses
d) Specific addresses
Each address is related to a specific layer in the TCP/IP architecture, as shown in the above fig.
a) Physical Address:
A node with physical address 10 sends a frame to a node with physical address 87. The two
nodes are connected by a link (bus topology LAN). As the figure shows, the computer with
physical address 10 is the sender, and the computer with physical address 87 is the receiver.
c) Port Address
The physical addresses change from hop to hop, but the logical and port addresses usually
remain the same
d) Specific Address
Some application have user-friendly addresses that are designed for that specific address
Example 1: e-mail address: kchung@kw.ac.kr
Defines the recipient of ane-mail
Example 2: URL (Universal Resource Locator) : www.google.com
Used to find a document on the WWW
At the network layer, IP can accept a segment from TCP or a user datagram from UDP. IP
can also accept a packet from other protocols such as ICMP, IGMP, and so on.
At the data-link layer, a frame may carry the payload coming from IP or other protocols
such as ARP.
The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust and interoperable. The OSI model is a layered framework for
the design of network systems that allows communication between all types of computer systems.
It consists of seven separate but related layers, each of which defines a part of the process of
moving information across anetwork.
The principles that were applied to arrive at the seven layers are as follows:
A layer should be created where a different level of abstraction is needed.
Each layer should perform a well-defined function.
The function of each layer should be chosen with an eye toward defining internationally
standardized protocols.
The layer boundaries should be chosen to minimize the information flow across the
interfaces.
The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that the architecture does not
become unwieldy.
Layered Architecture:
The OSI model is composed of seven layers: Physical, Data link, Network, Transport, Session,
Presentation, Application layers. Below figure shows the layers involved when a message travels
from A to B, it may pass through many intermediate nodes. These intermediate nodes involve only
the first 3 layers of the OSI model.
Within a single machine, each layer calls upon the services of the layer just below it, layer 3 for ex.
Uses the services provided by layer 2 & provides services for layer 4. Between machines, layer X
on one machine communicates with layer X on another machine. This communication is governed
by an agreed upon series of rules & Conventions called protocols. The processes on each machine
that communicate at a given layer are called peer – to – peer processes. Communication between
machines is therefore a peer – to –peer process using the protocols appropriate to a given layer.