Data Comm. & Network
Data Comm. & Network
NETWORK
-AMRIT GUPTA
UNIT 1
Fundamentals of Communication System; Communication
Links, Communication System Formats; Character Codes,
Digital Data Rates; Asynchronous and Synchronous Data. Types
of signals: AM; FM; PM; PCM; PDM; TDMA; FDMA; SDMA; CDMA;
ASK; FSK; PSK Features: Error detection and correction codes;
Hamming codes.
UNIT 2
LAN topologies: Workstation; Server; Cables; Types of
Ethernet; Broadband and base-band; Optical Fibers; Network
Interface Card.
UNIT 3
Networks and accessories: LAN, MAN, WAN; Hub; Bridges;
Switches; Routers; Gateways Cell Relay; Frame Relay; ISDN;
B-ISDN.
UNIT 4
OSI Model; Broadcasting; Multicasting; Point-to-point
communication; IP Addressing, Concepts of Port; Socket; ATM;
Tunneling; Virtual Private Network. Network Operating
systems: Unix; Linux; Windows.
UNIT 5
Mobile Communication: Applications of Mobile Communication;
Wireless Communication: Bandwidth, Transmission
Impairment, Interference, Terrestrial Microwave, Broadcast
Radio, Infrared & Light Waves, Mobile Internet & WML: Mobile
IP, Wireless TCP& UDP, WAP, WML
UNIT 1
Communication System
What is Communication ?
What is Communication System ?
Components:
• Source (sender)
• Message
• Channel/Medium
• Receiver
• Noise (interference)
• Environment
• Feedback
Communication Links
The communications channel that connects two or more
communicating devices.
This link may be an actual physical link or it may be a logical link that
uses one or more actual physical links.
Example:
Two nodes of a network, an intercom station at an entryway with a
single internal intercom station, a radio path between two points, etc
Communication System Formats
Analog communication systems
Digital communication systems
Baseband communication systems
Carrier communication systems
Link https://www.vedantu.com/
physics/communication-systems
Character Codes
Alternatively referred to as the character set, charset,
and character encoding, a character code describes a specific
encoding for characters as defined in the code page. Each character
code defines how the bits in a stream of text are mapped to the
characters they represent. ASCII is the basis of most code pages.
Different Units
Asynchronous & Synchronous Data
Synchronous Data:
The term synchronous is used to describe a
continuous and consistent timed transfer of data blocks.
The data is sent in blocks (called frames or packets)
spaced by fixed time intervals.
Used when large amounts of data must be transferred
very quickly from one location to the other.
Asynchronous Data:
Asynchronous data is data that is not synchronized
when it is sent or received.
Data that is transmitted at intermittent intervals
rather than in a steady stream, which means that the first
parts of the complete file might not always be the first to
be sent and arrive at the destination.
Asynchronous & Synchronous Data
Asynchronous & Synchronous Data
Types of Modulation
AM (Amplitude Modulation)
FM (Frequency Modulation)
PM (Phase Modulation)
PCM (Pulse Code Modulation)
PDM (Pulse Density Modulation)
TDMA (Time Division Multiple Access)
FDMA (Frequency Division Multiple Access)
SDMA (Spatial Division Multiple Access)
CDMA (Code Division Multiple Access)
ASK (Amplitude Shift Keying)
FSK (Frequency Shift Keying)
PSK (Phase Shift Keying)
Types of Modulation
AM v/s FM v/s PM
All these modulation types are analog modulation
techniques.
used to transmit information from one place to the distant
place.
Mostly this techniques are employed in wireless
communication.
AM v/s FM
AM v/s FM
AM v/s FM
AM v/s FM
AM v/s FM
AM v/s FM v/s PM
AM v/s FM v/s PM
PHYSICAL
LOGICAL
TOPOLOGIES:
1) BUS
2) STAR or HUB
3) RING
4) MESH
5) HYBRID
BUS TOPOLOGY
Purpose
NIC allows both wired and wireless communications.
NIC allows communications between computers connected via local area
network (LAN) as well as communications over large-scale network
through Internet Protocol (IP).
NIC is both a physical layer and a data link layer device, i.e. it provides
the necessary hardware circuitry so that the physical layer processes and
some data link layer processes can run on it.
Network Interface Card (INC)
MORE INFO
UNIT 3
LAN, MAN & WAN
LAN stands for local area network. It is a group of network
devices that allow communication between various
connected devices. Private ownership has control over the
local area network rather than the public. It covers the
smaller area such as colleges, schools, hospitals, and so on.
ADVANTAGES :
It is simple to implement.
The implementation cost is low.
It does not require any special system administration configuration.
We can just plug and play it.
Hub
DISADVANTAGES :
It can connect devices of the same network only.
It uses a half-duplex mode of communication.
It is less secure, as it broadcasts the data packets.
It can be used in a limited network size only.
Broadcasting induces unnecessary traffic on the channel.
Bridge
A bridge is a layer-2 network connecting device, i.e., it works on the
physical and data-link layer of the OSI model. It interprets data in the
form of data frames. In the physical layer, the bridge acts as a Repeater
which regenerates the weak signals, while in the data-link layer, it checks
the MAC(Media Access Control) address of the data frames for its
transmission.
A bridge connects the devices which are present in the same network. It is
mainly used to segment a network to allow a large network size. It has two
types of port - incoming and outgoing. It uses the incoming port to receive
the data frames and outgoing port to send the data frames to other devices.
It has two collision domains, so there is still a chance of collision and traffic
in the data transmission channel.
A Bridge has filtering capacity. It means that it can discard the faulty data
frames and will allow only the errorless data frames in the network. Also, it
can check the destination MAC address of a frame and decides the port from
which the frame should be sent out. For this, it maintains a table containing
the physical(MAC) addresses of all the devices in the network. Whenever a
data frame arrives at the incoming port of the bridge, it first checks the
data frame for any kind of errors. If the frame is errorless, it directs the
data frame to the specified MAC address(taking instance from the address
table) using its outgoing port. It does not change the physical(MAC Address)
of the frames during transmission. In other words, a Bridge is a Repeater
with filtering capability.
Bridge
2 Types:
Transparent Bridge: Transparent bridge simply works as a
transmission medium between two devices. They are actually
transparent(they are present but are not functionally visible to the
devices) to the networking devices.
Routing Bridge: Routing bridges have their unique identity, they
can be easily identified by the network devices. The source station
or the sender can send the data packets through specific
bridges(using the unique identity of bridges).
ADVANTAGES :
It is not so complex to implement.
The implementation cost is medium.
It does not require any special system administration configuration.
We can just plug and play it.
Improves security by limiting the scope of data frames.
It has the filtering capability.
It can be used in a large network.
Bridge
DISADVANTAGES :
It can connect devices of the same network only.
There is a delay in forwarding the frames due to error checking.
There is a need to maintain an Address table.
Switch
A switch is a layer-2 network connecting device, i.e., it works on the physical
and data-link layer of the OSI model. It interprets data in the form of data
frames. A switch acts as a multiport bridge in the network. It provides the bridging
functionality with greater efficiency.
A switch maintains a Switch table which has the MAC addresses of all the devices
connected to it. It is preferred more over the hub, as it reduces any kind of
unnecessary traffic in the transmission channel. A switch can connect the devices
only in the same network. It uses the full-duplex mode of communication and saves
bandwidth. The switch table keeps on updating every few seconds for better
processing.
A Switch is an intelligent device with filtering capabilities. It can discard the faulty
data frames and will allow only the errorless data frames in the network. Also, it
will forward the data frames to the specific node based on the MAC address(taken
from the Switch table). A Switch has multiple collision domains, so it has least or
no collisions in the transmission channel. In fact, every port of switch has a
separate collision domain.
When a data frame arrives at the Switch, it first checks for any kind of error in the
data frame. If the frame is error-free, it will search the MAC address of the
destination in the Switch table. If the address is available in the switch table, it
will forward the data frame to that specific node, else switch will register the MAC
address in the switch table. If the destination address is not specified, it will
broadcast the data frame to each node in the network.
A Switch can have 8/6/24/48 ports. The data transmission speed is slow in a
switch(around 10-100 Mbps). Also, it has only one broadcasting domain.
Switch
4 Types:
Store and Forward Switch: It is the most widely and commonly used switch. It does
not forward the data frames unless the frames are errorless and completely received
in the switch buffer. It is reliable in nature.
Cut-through Switch: Cut-through switches have no error checking. Also, it starts
sending the data frame to the destination node when it starts receiving it. It is
unreliable in nature.
Fragment-Free Switch: It is a combination of store and forward, and cut-through
switch. It checks only the starting 64 bytes(header information) of the data frame
before transmitting the frame.
Adaptive Switch: It is the most advanced kind of switch which automatically chooses
any of the above three switches as per the need.
ADVANTAGES :
The implementation cost is medium.
It does not require any special system administration configuration. We can just plug
and play it.
Improves security by limiting the scope of data frames.
It has the filtering capability.
It can be used in a large network.
It uses full-duplex mode of communication
It has multiple collision domains, so there are least or no collisions in the channel.
Switch
DISADVANTAGES :
It can connect devices of the same network only.
There is a delay in forwarding the frames due to error checking.
There is a need to maintain a Switch table.
Router
A Router is a layer-3 network connecting device, i.e., it works on the
physical, data-link and network layer of the OSI model. It interprets data in
the form of data packets. It is mainly an internetworking device, which can
connect devices of different networks(implementing the same architecture and
protocols). In other words, it can connect two physically and logically different
network devices with each other. A Router is used to connect the networks or
it routes traffic between the networks. In other words, a Router is the
Gateway of a network.
Since, connecting two devices of different networks, the connecting device
should implement an Internet Protocol(IP) address. So, the Router has a
physical and logical(Internet Protocol) address for each of its interfaces. It
routes or forwards the data packets from one network to another based on
their IP addresses. It changes the physical address of the data packet(both
source and destination) when it forwards the data packets.
A router maintains a routing table using the routing algorithms. When a data
packet is received at the router, it first checks the IP address. If the IP address
is the same as the network's IP address, it receives the data packet, else it
forwards the data packet to the destination IP address using the routing table.
A router does not perform addressing. It can have 2/4/8 ports for connecting
the devices. It can control both the collision domain(inside the network) and
the broadcast domain(outside the network). It has a fast data transmission
speed(up to 1 Gbps). A Router can be a Wireless Router, Core Routers, Edge
Routers, Virtual Routers, etc.
Router
2 Types:
Static Routing: In Static Routing, the path for the data packets is
manually set. It is generally used for small networks.
Dynamic Routing: In Dynamic Routing, various routing algorithms
are used to find the best and shortest path for the data packets.
ADVANTAGES :
It can connect devices and provides routing facilities over different
networks implementing the same protocol and structure.
Improves security by limiting the scope of data packets.
It has the filtering capability.
It can be used in a large network.
It uses full-duplex mode of communication
It has control over both the collision and broadcast domain.
Router
DISADVANTAGES :
It is very complex to implement.
The implementation cost is quite high.
There is a need to maintain a Routing table.
There is a delay in forwarding the packets due to error checking.
It requires a special system administration configuration.
Simplified
COLLISION DOMAIN
In the picture above you can see a network of seven computers, two hubs, a
bridge, a switch, and a router. The collision domains created by these devices
are marked in red. Remember, all devices connected to the hub are in the
same collision domain. Each port on a bridge, a switch or router is in a
seperate collision domain. That is why there are seven collision domains in
the network pictured above.
CELL RELAY
Cell relay refers to a method of statistically multiplexing
small fixed-length packets, called "cells", to transport data
between computers or kinds of network equipment. It is a
reliable, connection-oriented packet switched data
communications protocol.
Transmission Rate:
Cell relay transmission rates usually are between 56
kbit/s and several gigabits per second. ATM(Asynchronous
Transfer Mode), a particularly popular form of cell relay, is
most commonly used for home DSL connections, which often
runs between 128 kbit/s and 1.544 Mbit/s, and for high-speed
backbone connections.
How it Works:
Cell relay systems break variable-length user packets into
groups of fixed-length cells, that add addressing and
verification information. Cell length is fixed in networking
hardware, based on time delay and user packet-length
considerations. One user data message may be segmented
over many cells.
FRAME RELAY
Frame Relay is a standardized wide area network (WAN)
technology that specifies the network and data link layers of
digital telecommunications channels using a packet
switching methodology.
It is a circuit-switched telephone network system that transmits both data and voice over a
digital line. You can also think of it as a set of communication standards to transmit data,
voice, and signaling.
These digital lines could be copper lines. It was designed to move outdated landline
technology to digital.
Principle of ISDN:
The ISDN works based on the standards defined by ITU-T (formerly CCITT). The
Telecommunication Standardization Sector (ITU-T) coordinates standards for
telecommunications on behalf of the International Telecommunication Union (ITU) and is
based in Geneva, Switzerland. The various principles of ISDN as per ITU-T
recommendation are:
To support switched and non-switched applications
To support voice and non-voice applications
Reliance on 64-kbps connections
Intelligence in the network
Layered protocol architecture
Variety of configurations
B-ISDN(Broadband)
It is a virtual circuit-switched network that can use high-speed packet switching services.
The B-ISDN will use a flexible multiplexing format called ATM (asynchronous transfer
mode).
B-ISDN services are classified into interactive and distribution services. Interactive
services contain the bidirectional flow of user information between two subscribers or
between a subscriber and a service provider.
Interactive services
The interactive services are further divided into three sub-categories which are as
follows−
Conversational
Conversational service involves the real-time exchange of information such as sound,
video, data or entire documents. Examples include video-telephony, video-conference, and
high-speed data transfer. Video-telephony is like the normal video telephony service but
also has video capture, transmission and display capabilities. Video-conference supports
voice and video communication between two conference rooms or between several
individuals.
Messaging
Messaging service involves the non-real-time exchange of information between
subscribers in a store-and-forward fashion.
B-ISDN(Broadband)
Retrieval
Retrieval services provide subscribers with retrieval access to centrally-stored
public information. Examples include broadband videotext (retrieval of video
images/sequences with sound, text and graphics), video retrieval (subscriber create
to video libraries of movies) and return of high-resolution pictures and records from
multiple archives and data centers.
Distribution Services
Distribution services contain the unidirectional flow of user information from a
service provider to a subscriber.
Distribution services are divided into two sub-categories, which are as follows:
Distribution services without user presentation control involve the central
broadcast of information to many subscribers, where subscribers have no control
over data display. Examples include the broadcast of TV programs, electronic
newspapers, and electronic publishing.
Distribution services with user presentation control are the same as the previous
category. The information is offered as cyclically repeated frames, thereby
enabling the subscribers to control the start and the order of the frames
presentation. Examples include electronic newspaper and tele-advertising.
UNIT 4
OSI Model (Open Systems Interconnection)
OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer
moves through a physical medium to the software application in another
computer.
OSI consists of seven layers, and each layer performs a particular network
function.
OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an architectural
model for the inter-computer communications.
OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
Each layer is self-contained, so that task assigned to each layer can be
performed independently.
OSI Model
OSI Model
The OSI model is divided into two layers: upper layers and
lower layers.
The upper layer of the OSI model mainly deals with the
application related issues, and they are implemented only in the
software. The application layer is closest to the end user. Both
the end user and the application layer interact with the software
applications. An upper layer refers to the layer just above
another layer.
The lower layer of the OSI model deals with the data transport
issues. The data link layer and the physical layer are
implemented in hardware and software. The physical layer is
the lowest layer of the OSI model and is closest to the physical
medium. The physical layer is mainly responsible for placing
the information on the physical medium.
OSI Model
1. Physical Layer (Layer 1) :
The main functionality of the physical layer is to transmit the
individual bits from one node to another node.
It is the lowest layer of the OSI model.
It establishes, maintains and deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface
specifications.
Functions of a Physical layer:
Line Configuration: It defines the way how two or more devices can
be connected physically.
Data Transmission: It defines the transmission mode whether it is
simplex, half-duplex or full-duplex mode between the two devices on
the network.
Topology: It defines the way how network devices are arranged.
Signals: It determines the type of the signal used for transmitting the
information.
* Hub, Repeater, Modem, Cables are Physical Layer devices.
** Network Layer, Data Link Layer, and Physical Layer are also known as Lower
Layers or Hardware Layers.
Physical Layer (Layer 1) :
2. Data Link Layer (Layer 2) :
This layer is responsible for the error-free transfer of data frames.
It defines the format of the data on the network.
It provides a reliable and efficient communication between two or more
devices.
It is mainly responsible for the unique identification of each device that
resides on a local network.
It contains two sub-layers:
Logical Link Control Layer(LLC)
→ It is responsible for transferring the packets to the Network layer
of the receiver that is receiving.
→ It identifies the address of the network layer protocol from the
header.
→ It also provides flow control.
Media Access Control Layer(MAC)
→ A Media access control layer is a link between the Logical Link
Control layer and the network's physical layer.
→ It is used for transferring the packets over the network.
2. Data Link Layer (Layer 2) :
Functions of the Data-link layer
Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer to
the frame. The header which is added to the frame contains the hardware
destination and source address.
Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
Flow Control: Flow control is the main functionality of the Data-link layer.
It is the technique through which the constant data rate is maintained on
both the sides so that no data get corrupted. It ensures that the transmitting
station such as a server with higher processing speed does not exceed the
receiving station, with lower processing speed.
Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer
which is added to the message frame before it is sent to the physical layer. If
any error seems to occur, then the receiver sends the acknowledgment for
the retransmission of the corrupted frames.
Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
Data Link Layer (Layer 2)