DCN-unit-1 Modified
DCN-unit-1 Modified
DCN-unit-1 Modified
• Data Communication
• Networks
• Internet
• Protocols and Standards
• Standard Organizations
1.1 Data Communication
The term telecommunication, which includes telephony, telegraphy, and
television, means communication at a distance.
The word data refers to information presented in whatever form is agreed upon
by the parties creating and using the data.
Numbers
Numbers are also represented by bit patterns.
Images
Images are also represented by bit patterns. In its simplest form, an image is
composed of a matrix of pixels (picture elements), where each pixel is a
small dot. The size of the pixel depends on the resolution. For example, an
image can be divided into 1000 pixels or 10,000 pixels. In the second case,
there is a better representation of the image (better resolution), but more
memory is needed to store the image.
Audio
Audio refers to the recording or broadcasting of sound or music. Audio is by
nature different from text, numbers, or images. It is continuous, not discrete.
Even when we use a microphone to change voice or music to an electric
signal, we create a continuous signal.
Video
Video refers to the recording or broadcasting of a picture or movie. Video
can either be produced as a continuous entity (e.g., by a TV camera), or it
can be a combination of images, each a discrete entity, arranged to convey
the idea of motion.
Data Flow
Simplex
Half-Duplex
Full-Duplex
1.2 Networks
A network is a set of devices (often referred to as nodes) connected by
communication links. A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by other nodes on the
network.
Distributed Processing
Most networks use distributed processing, in which a task is divided among
multiple computers. Instead of one single large machine being responsible
for all aspects of a process, separate computers (usually a personal
computer or workstation) handle a subset.
Network Criteria
Performance
Performance can be measured in many ways, including transit time and
response time.
i) Response time is the elapsed time between an inquiry and a response.
ii) Performance is often evaluated by two networking metrics: throughput
and delay.
Reliability
In addition to accuracy of delivery, network reliability is measured by the
frequency of failure, the time it takes a link to recover from a failure,
Security
Network security issues include protecting data from unauthorized access,
Physical Structures
Type of Connection
A network is two or more devices connected through links. A link is a
communications pathway that transfers data from one device to another.
Advantages:
1. Less Expensive than a Mesh topology
2. Adding and/or deleting new node is
very easy than mesh
3. Robustness: If one link fails, only that
link affected
4. Easy fault identification
Disadvantages:
1. Dependency of the whole topology
only one single point, the HUB.
Tree Topology
Bus Topology
Featurtes:
The preceding examples all describe point-to-point connections. A bus topology,
on the other hand, is multipoint.
Advantages:
1. Easy of installation
2. Less cabling than Mesh or Star.
Disadvantages:
1. Difficult reconnection and fault identification.
2. Difficult to add new devices.
3. Signal reflection at taps can degrade the quality of signal.
4. As a signal travels along the backbone, some of its energy is transformed
into heat. Therefore, it becomes weaker and weaker as it travels farther and
farther. For this reason there is a limit on the number of taps a bus can
support.
5. Adding devices may require modification and replacement of backbone.
6. A fault or break into a cable can stop entire transmission.
Ring Topology
Station Station
Station Station
Repeater Repeater
Repeater Repeater
Repeater
Station
Features:
In a ring topology, each device has a dedicated point-to-point connection
with only the two devices on either side of it.
A signal is passed along the ring in one direction, from device to
device, until it reaches its destination.
Each device in the ring incorporates a repeater. When a device receives
a signal intended for another device, its repeater regenerates the bits and passes
them along
Advantages:
1. Easy to install and reconfigure.
2. To add or remove a device requires changing only two immigiate
neighboring connections (physically or logically).
3. Fault detection is easy: Generally in a ring, a signal is circulating at all
times. If one device does not receive a signal within a specified period, it
can issue an alarm. The alarm alerts the network operator to the problem
and its location.
Disadvantages:
1. Unidirectional traffic can be a disadvantage.
2. A break in the ring (such as a disabled station) can disable the entire
network.
Hybrid Topology
Features:
A topology having a combination of several different types of topologies
keeping Star topology on its top is referred as “Hybrid Topology” .
Categories of Network
Local Area Network
Features:
Features:
A wide area network (WAN) provides long-distance transmission of data,
image, audio, and video information over large geographic areas that may comprise a
country, a continent, or even the whole world.
A WAN can be as complex as the backbones that connect the Internet or as
simple as a dial-up line that connects a home computer to the Internet. We normally
refer to the first as a switched WAN and to the second as a point-to-point WAN.
Switched WAN:
The switched WAN connects the end systems, which usually comprise a
router (internetworking connecting device) that connects to another LAN or WAN.
Point-to-point WAN:
The point-to-point WAN is normally a line leased from a telephone or cable
TV provider that connects a home computer or a small LAN to an Internet service
provider (lSP). This type of WAN is often used to provide Internet access.
Wide Area Network
1.3 Internetwork : Interconnection of Networks
(Internet)
Today most end users who want Internet connection use the services of
Internet service providers (lSPs).
LAYERED MODELS
• The model
• Functions of the layers
2.1 LAYERED TASKS
We use the concept of layers in our daily life. As an example, let us consider two
friends who communicate through postal mail. The process of sending a letter to
a friend would be complex if there were no services available from the post
office.
Inter-host communication
Physical Addressing
1. Framing.
2. Physical addressing.
3. Flow control.
4. Error control.
5. Access control.
2-3 LAYERS IN THE OSI MODEL
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
Figure 2.9 Source-to-destination delivery
Other responsibilities of the network layer include the following:
1. Logical addressing.
2. Routing.
2-3 LAYERS IN THE OSI MODEL
The transport layer is responsible for the delivery
of a message from one process to another.
Figure 2.11 Reliable process-to-process delivery of a message
Other responsibilities of the transport layer include the following:
1. Service-point addressing.
2. Segmentation and reassembly.
3. Connection control.
4. Flow control.
5. Error control.
2-3 LAYERS IN THE OSI MODEL
The session layer is responsible for dialog
control and synchronization.
Specific responsibilities of the session layer include the following:
1. Dialog control.
2. Synchronization (by using Check Points)
2-3 LAYERS IN THE OSI MODEL
The presentation layer is responsible for translation,
compression, and encryption.
Specific responsibilities of the presentation layer include the following:
The layers in the TCP/IP protocol suite do not exactly match those
in the OSI model. The original TCP/IP protocol suite was defined
as having four layers: host-to-network, internet, transport, and
application. However, when TCP/IP is compared to OSI, we can
say that the TCP/IP protocol suite is made of five layers: physical,
data link, network, transport, and application.
Figure 2.16 TCP/IP and OSI model
2.4.1 Physical and Data Link Layers:
At the physical and data link layers, TCPIIP does not define any
specific protocol. It supports all the standard and proprietary protocols. A
network in a TCPIIP internetwork can be a local-area network or a wide-area
network.
1. RARP allows a host to discover its Internet address when it knows only its
physical address.
2. It is used when a computer is connected to a network for the first time or
when a diskless computer is booted.
Internet Control Message Protocol:
1. SCTP provides support for newer applications such as voice over the
Internet.
2. It is a transport layer protocol that combines the best features of UDP and
TCP.
NOTE: The physical addresses will change from hop to hop, but the logical addresses
usually remain the same.
2.5.3 Port Addresses:
Computers are devices that can run multiple processes at the same time. The
end objective of Internet communication is a process communicating with
another process. For these processes to receive data simultaneously, we need a
method to label the different processes. In other words, they need addresses.
In the TCP/IP architecture, the label assigned to a process is called a port
address. A port address in TCP/IP is 16 bits in length.
753
Some applications have user-friendly addresses that are designed for that
specific address.
Examples include:
Characteristics………………………..
The data rate defines the number of data elements (bits) sent in
1 sec.
The unit is bits per second (bps).
The signal rate is the number of signal elements sent in Is. The
unit is the baud.
The signal rate is sometimes called the pulse rate, the
modulation rate, or the baud rate.
Bandwidth:
Bmin = c * N * 1/r
We can solve for the maximum data rate if the bandwidth of the channel is
given.
Nmax = 1/c * B * r
DC Components:
Self-synchronization:
Complexity:
NRZ (Non-Return-to-Zero):
Traditionally, a unipolar scheme was designed as a non-return-to-zero
(NRZ) scheme in which the positive voltage defines bit 1 and the zero voltage
defines bit 0. It is called NRZ because the signal does not return to zero at the
middle of the bit.
Types of Polar Encoding
In polar schemes, the voltages are on the both sides of the time
axis. For example, the voltage level for 0 can be positive and the voltage
level for 1 can be negative.
NRZ-L (Level) and NRZ-I (Invert) Encoding
NOTE: In NRZ-L the level of the voltage determines the value of the bit.
In NRZ-I the inversion or the lack of inversion determines the value
of the bit.
NRZ-L (Level) and NRZ-I (Invert) Encoding
Differential Manchester:
It combines the ideas of RZ and NRZ-I.
There is always a transition at the middle of the bit, but the bit values are
determined at the beginning of the bit. If the next bit is 0, there is a
transition; if the next bit is 1, there is none.