Module - 1 Layered Network Architecture - 1 Part
Module - 1 Layered Network Architecture - 1 Part
Computer Networks
Data Communications and Networking, 5th
Edition
By
Behrouz A. Forouzan
Module-I
Introduction
1.5
Outline
Data Communications
Type of Connection
Physical Topology
Categories of Networks
Layered Tasks
OSI Model
TCP/IP Addressing
Performance Metrics
1.6
DATA COMMUNICATIONS
The term telecommunication means communication at a
distance. The word data refers to information presented
in whatever form is agreed upon by the parties creating
and using the data. Data communications are the
exchange of data between two devices via some form of
transmission medium such as a wire cable.
1.7
Data communications are the exchange of data between two
devices via some form of transmission medium such as a
wire cable.
For data communications to occur, the communicating
devices must be part of a communication system made up
of a combination of hardware (physical equipment) and
software (programs).
The effectiveness of a data communications system
depends on four fundamental characteristics:
Delivery
Accuracy
Timeliness
Jitter
1.8
Data Communication cont..
1. Delivery
– System must deliver data to the correct destination.
– Data must be received only by the intended device or
user.
2. Accuracy
– System must deliver the data accurately.
– Data that have been altered in transmission and left
uncorrected are unusable.
Data Communication cont..
3. Timeliness
– System must deliver data in a timely manner.
– Data delivered late are useless.
– Ex: Real-time transmission
• Video and audio – Deliver it in the same order that
they are produced, and without significant delay.
Data Communication cont..
4. Jitter
– It refers to the variation in the packet arrival time.
– It is the uneven delay in the delivery of audio or
video packets.
– Caused by network congestion and packet loss.
Figure Components of a data communication system
1.12
Components of Data Communication
• A data communication system is made up of five
components.
1. Message
2. Sender
3. Receiver
4. Transmission medium
5. Protocol
Components of Data Communication
1. Message
– Information (data) to be communicated.
– Ex: text, numbers, pictures, audio and video.
2. Sender
– Device that sends the data message.
– Ex: computer, workstation, telephone handset, video
camera and so on.
3. Receiver
– Device that receives the message.
– Ex: computer, workstation, telephone handset,
television and so on.
Components of Data Communication
4. Transmission medium
– Physical path by which a message travels from sender
to receiver.
– Ex: twisted-pair wire, coaxial cable, fiber-optic cable
and radio waves.
5. Protocol
– It is a set of rules that govern data communications.
– It represents an agreement between the
communicating
devices.
– Ex: A person speaking French cannot be understood
by a person who speaks only Japanese.
Data Representation
• Information comes in different forms such as text, numbers,
images, audio and video.
Data Representation cont..
1. Text
– Represented as a bit pattern, a sequence of bits (0s or 1s).
– Different sets of bit patterns have been designed to represent
text
symbols.
– Each set is called a code.
– Process of representing symbols is called coding.
– Unicode
• Common coding system.
• It uses 32 bits to represent a symbol or character in any
language.
– American Standard Code for Information Interchange (ASCII)
• Developed some decades ago in the United States.
• Constitutes the first 127 characters in Unicode.
• Also referred to as Basic Latin
Data Representation cont..
2. Numbers
– Represented by bit patterns.
– It is directly converted to a binary
number.
Data Representation cont..
3. Images
– Represented by bit patterns.
– Composed of a matrix of pixels.
– Each pixel is a small dot.
– Size of the pixel is depend on
resolution.
– Better representation (resolution):
more memory is needed.
– Ex: Image can be divided into 1000
pixels or 10,000 pixels.
– Each pixel is assigned a bit pattern.
Data Representation cont..
3. Images
– Size and value of the pattern depend on the image.
– 1-bit pattern for image made of only black and white
dots.
• Ex: Chessboard
– 2-bit pattern for image is not made of pure white and
pure black pixels.
• Ex: 4 levels of gray scale
– A black pixel can be represented by 00
– A dark gray pixel by 01
– A light gray pixel by 10
– A white pixel by 11.
Data Representation cont..
3. Images
– Several methods to represent color images.
• RGB method
– Each color is made of a combination of three
primary colors: red, green, and blue.
• YCM method
– Each color is made of a combination of three
other primary colors: yellow, cyan, and magenta.
Data Representation cont..
4. Audio
– Refers to recording or broadcasting of sound or music.
– It is continuous, not discrete.
5. Video
– Refers to recording or broadcasting of a picture or
movie.
– It can either be
• Produced as a continuous entity (e.g., by a TV
camera),
– or it can be a
• Combination of images, each a discrete entity,
arranged to convey the idea of motion.
Data Flow or Transmission Mode
Defines the direction of signal flow
between two connected devices.
There are three modes of transmission, namely:
1. Simplex
2. Half-duplex
3. Full-duplex
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
1.24
Simplex Mode
• Communication is unidirectional.
– Communication between sender and receiver occurs in only
one direction.
• Only sender can send the data and receiver can receive the
data.
• Receiver cannot reply to the sender.
• Use the entire capacity of the channel to send data.
Simplex Mode cont..
• Ex: One-lane road
• Ex: Keyboards and Monitors
– Only Keyboard can send input to monitor
– Monitor can only receive the input and display it on
the screen.
– Monitor cannot reply to the keyboard.
Half-Duplex Mode
• Each station can both transmit and receive, but not at the
same time.
• When one device is sending, the other can only receive,
and vice versa.
• Entire capacity of a channel is taken over by the
transmitting device.
Half-Duplex Mode cont..
• Ex: Walkie-talkies
– Speakers at both ends can speak, but they have to
speak one by one.
– They cannot speak simultaneously.
Full-Duplex Mode
• Also called duplex.
• Both stations can transmit and receive at same time.
• Signals going in either direction sharing the capacity of the
link.
• Sharing can occur in two ways:
– Link has two physically separate transmission paths
1.32
Network Criteria
Performance : Performance can be measured in many ways, including transit time and
response time
Depends on Network Elements: the number of users, the type of transmission
medium, the capabilities of the connected hardware, and the efficiency of the
software.
Measured in terms of Delay and Throughput
Reliability : accuracy of delivery, network reliability is measured by the frequency
of failure, the time it takes a link to recover from a failure, and the network's
robustness in a catastrophe.
Failure rate of network components
Measured in terms of availability/robustness
Security: protecting data from unauthorized access, protecting data from damage
and development, and implementing policies and procedures for recovery from
breaches and data losses.
Data protection against corruption/loss of data due to:
Errors
Malicious users
1.33
Physical Structures
Type of Connection
Point to Point - single transmitter and receiver : microwave
or satellite links
Multipoint - multiple recipients of single transmission
Physical Topology
Connection of devices
Type of transmission - unicast, multicast, broadcast
1.34
Figure 1.3 Types of connections: point-to-point and multipoint
1.35
Figure 1.4 Categories of topology
1.36
Figure 1.5 A fully connected mesh topology (five devices)
One practical example of a mesh topology is the connection of telephone regional offices in
which each regional office needs to be connected to every other regional office
1.37
Advantage:
First, the use of dedicated links guarantees that each
connection can carry its own data load, thus eliminating the
traffic problems that can occur when links must be shared by
multiple devices.
Robust. If one link becomes unusable, it does not incapacitate
the entire system.
Privacy or security. When every message travels along a
dedicated line, only the intended recipient sees it. Physical
boundaries prevent other users from gaining access to messages.
Finally, point-to-point links make fault identification and
fault isolation easy. Traffic can be routed to avoid links with
suspected problems. This facility enables the network manager
to discover the precise location of the fault and aids in finding
its cause and solution.
1.38
Disadvantages: To the amount of cabling and the number of
I/O ports required.
First, because every device must be connected to every other
device, installation and reconnection are difficult.
Second, the sheer bulk of the wiring can be greater than the
available space (in walls, ceilings, or floors) can accommodate.
1.39
Figure 1.6 A star topology connecting four stations
1.40
Unlike a mesh topology, a star topology does not allow
direct traffic between devices.
In a star, each device needs only one link and one I/O port
to connect it to any number of others.
Disadvantage: Dependency
The whole topology on one single point, the hub.
If the hub goes down, the whole system is dead.
Although a star requires far less cable than a mesh, each node
must be linked to a central hub.
For this reason, often more cabling is required in a star than in
some other topologies (such as ring or bus).
1.42
Figure 1.7 A bus topology connecting three stations
point-to-point connection
Multipoint connection
One long cable acts as a backbone to link all the devices in a
network
1.43
Nodes are connected to the bus cable by drop lines and taps.
For this reason there is a limit on the number of taps a bus can
support and on the distance between those taps.
1.44
Advantages: Easy Installation
Backbone cable can be laid along the most efficient path, then
connected to the nodes by drop lines of various lengths.
In this way, a bus uses less cabling than mesh or star topologies.
In a star, for example, four network devices in the same room
require four lengths of cable reaching all the way to the hub.
Each drop line has to reach only as far as the nearest point on the
backbone.
1.45
Disadvantages: Difficult reconnection and fault isolation.
1.47
A Ring Topology
1.48
Advantages: Easy to install and reconfigure.
1.49
Disadvantages: Unidirectional traffic
In a simple ring, a break in the ring (such as a disabled
station) can disable the entire network.
This weakness can be solved by using a dual ring or a switch
capable of closing off the break
1.50
Figure 1.9 A hybrid topology: a star backbone with three bus networks
1.51
Categories of Networks
1.52
Local Area Networks (LANs)
Privately owned and links the devices in a single office,
building, or campus.
Depending on the needs of an organization and the type of
technology used, a LAN can be as simple as two PCs and a
printer in someone's home office; or it can extend
throughout a company and include audio and video
peripherals.
Currently, LAN size is limited to a few kilometers.
LANs are designed to allow resources to be shared
between personal computers or workstations.
The resources to be shared can include hardware (e.g., a
printer), software (e.g., an application program), or data.
1.53
Local Area Networks (LANs)
A common example of a LAN, found in many business
environments, links a workgroup of task-related computers, for
example, engineering workstations or accounting PCs.
One of the computers may be given a large capacity disk drive
and may become a server to clients.
Software can be stored on this central server and used as
needed by the whole group.
In this example, the size of the LAN may be determined by
licensing restrictions on the number of users per copy of
software, or by restrictions on the number of users licensed to
access the operating system.
1.54
Local Area Networks (LANs)
1.55
Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet
1.56
Wide Area Networks (WANs)
A wide area network (WAN) provides long-distance
transmission of data, image, audio, and video information over
large geographic areas that may comprise a country, a continent,
or even the whole world.
A WAN can be as complex as the backbones that connect the
Internet or as simple as a dial-up line that connects a home
computer to the Internet.
We normally refer to the first as a switched WAN and to the
second as a point-to-point WAN
The switched WAN connects the end systems, which usually
comprise a router (internetworking connecting device) that
connects to another LAN or WAN.
1.57
Wide Area Networks (WANs)
The point-to-point WAN is normally a line leased from a
telephone or cable TV provider that connects a home computer or
a small LAN to an Internet service provider (lSP). This type of
WAN is often used to provide Internet access.
An early example of a switched WAN is X.25, a network
designed to provide connectivity between end users.
X.25 is being gradually replaced by a high-speed, more efficient
network called Frame Relay.
A good example of a switched WAN is the asynchronous transfer
mode (ATM) network, which is a network with fixed-size data
unit packets called cells.
Another example of WANs is the wireless WAN that is
becoming more and more popular.
1.58
Figure 1.11 WANs: a switched WAN and a point-to-point WAN
1.59
Metropolitan Area Networks (MANs)
A metropolitan area network (MAN) is a network with a size
between a LAN and a WAN.
It normally covers the area inside a town or a city.
It is designed for customers who need a high-speed
connectivity, normally to the Internet, and have endpoints
spread over a city or part of city.
Example: The telephone company network that can provide a
high-speed DSL line to the customer.
Another example: The cable TV network that originally was
designed for cable TV, but today can also be used for high-
speed data connection to the Internet
1.60
Figure 1.12 A heterogeneous network made of four WANs and two LANs
1.61
Switching
An internet is a switched network in which a
switch connects at least two links together.
A switch needs to forward data from a network to
another network when required.
1.62
Circuit-Switched Network
In a circuit-switched network, a dedicated connection,
called a circuit, is always available between the two end
systems; the switch can only make it active or inactive.
1.63
In Figure 1.13, the four telephones at each side are
connected to a switch.
The switch connects a telephone set at one side to a
telephone set at the other side.
The thick line connecting two switches is a high-capacity
communication line that can handle four voice
communications at the same time; the capacity can be
shared between all pairs of telephone sets.
The switches used in this example have forwarding tasks
but no storing capability.
1.64
Let us look at two cases.:
In the first case, all telephone sets are busy; four people at
one site are talking with four people at the other site; the
capacity of the thick line is fully used.
In the second case, only one telephone set at one side is
connected to a telephone set at the other side; only one-
fourth of the capacity of the thick line is used. This means that
a circuit-switched network is efficient only when it is working
at its full capacity; most of the time, it is inefficient because it
is working at partial capacity.
The reason that we need to make the capacity of the thick
line four times the capacity of each voice line is that we do
not want communication to fail when all telephone sets at
one side want to be connected with all telephone sets at the
other side.
1.65
Packet-Switched Network
In a computer network, the communication between
the two ends is done in blocks of data called packets.
1.66
Figure 1.14 shows a small packet-switched
network that connects four computers at one site
to four computers at the other site.
1.67
A router in a packet-switched network has a queue that
can store and forward the packet.
Now assume that the capacity of the thick line is only
twice the capacity of the data line connecting the
computers to the routers.
If only two computers (one at each site) need to
communicate with each other, there is no waiting for the
packets.
However, if packets arrive at one router when the thick
line is already working at its full capacity, the packets
should be stored and forwarded in the order they arrived.
The two simple examples show that a packet-switched
network is more efficient than a circuit-switched network,
but the packets may encounter some delays.
1.68