Module1 DC Notes
Module1 DC Notes
MODULE 1: INTRODUCTION
5. Protocol:
• A protocol is a set of rules that govern data-communications. In other words, a
protocol represents an agreement between the communicating-devices. Without a
protocol, 2 devices may be connected but not communicating.
Simplex:
• Keyboards and traditional monitors are examples of simplex devices. The keyboard
can only introduce input, the monitor can only accept output.
• The simplex mode can use the entire capacity of the channel to send data in one
direction.
Dept. of CSE/ BNMIT Page 3
Data Communication (18CS46)
Half Duplex:
• In half-duplex mode, each station can both transmit and receive, but not at the same
time. When one device is sending, the other can only receive and vice versa.
• In a half-duplex transmission, the entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the time.
• Walkie-talkies and CB (citizens band) radios are both half-duplex systems. The half-
duplex mode is used in cases where there is no need for communication in both
directions at the same time, the entire capacity of the channel can be utilized for each
direction.
Full Duplex:
• In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously.
• In full-duplex mode, signals going in one direction share the capacity of the link with
signals going in the other direction.
• This sharing can occur in two ways: Either the link must contain two physically
separate transmission paths, one for sending and the other for receiving, or the
capacity of the channel is divided between signals traveling in both directions.
• One common example of full-duplex communication is the telephone network. When
two people are communicating by a telephone line, both can talk and listen at the
same time.
• The full-duplex mode is used when communication in both directions is required all
the time. The capacity of the channel, however, must be divided between the two
directions.
1.2 NETWORKS
Physical Topology
• The physical-topology defines how devices are connected to make a network.
• Two or more devices connect to a link, two or more links form a topology.
• The topology of a network is the geometric representation of the relationship of all the
links and linking devices (usually called nodes) to one another.
There are four basic topologies possible: mesh, star, bus, and ring.
Bus Topology
• All the devices are connected to the single cable called bus (Figure 1.4).
• Every device communicates with the other device through this bus.
• A data from the source is broadcasted to all devices connected to the bus.
• Only the intended-receiver, whose physical-address matches, accepts the data.
• All the devices are connected to a central controller called a hub (Figure 1.5).
• There exists a dedicated point-to-point link between a device and a hub.
• The devices are not directly linked to one another. Unlike a mesh topology, a star
topology does not allow direct traffic between devices.
• The controller acts as an exchange: If one device wants to send data to another, it sends
the data to the controller, which then relays the data to the other connected device.
• Advantages:
1. Less expensive: Each device needs only one link & one I/O port to connect it to any
devices.
2. Easy installation & reconfiguration: Nodes can be added/removed w/o affecting the
network.
3. Robustness: If one link fails, it does not affect the entire system.
4. Easy to detect and troubleshoot fault.
5. Centralized management: The hub manages and controls the whole network.
• Disadvantages:
1. Single point of failure: If the hub goes down, the whole network is dead.
2. Cable length required is the more compared to bus/ring topologies.
3. Number of nodes in network depends on capacity of hub.
Ring Topology
• Each device is connected to the next, forming a ring (figure 1.6).
• There are only two neighbors for each device.
• Data travels around the network in one direction till the destination is reached.
• Sending and receiving of data takes place by the help of token.
• Each device has a repeater.
• A repeater
→ receives a signal on transmission-medium and
→ regenerates and passes the signal to next device.
• Advantages:
1) Easy installation and reconfiguration.
To add/delete a device, requires changing only 2 connections.
•Advantages:
1) Congestion reduced: Each connection can carry its own data load.
2) Robustness: If one link fails, it does not affect the entire system.
3) Security: When a data travels on a dedicated-line, only intended-receiver can see
the data.
4) Easy fault identification & fault isolation: Traffic can be re-routed to avoid
problematic links.
• Disadvantages:
1) Difficult installation and reconfiguration.
ii) Switched WAN: A switched WAN is a network with more than two ends. The
switched WAN can be the backbones that connect the Internet. A switched WAN is
a combination of several point-to-point WANs that are connected by switches.
Internetwork
• When two or more networks are connected, they make an internetwork, or
internet.
• Assume that an organization has two offices,
i) First office is on the east coast &
ii) Second office is on the west coast.
• Each office has a LAN that allows all employees in the office to communicate with
each other. To allow communication between employees at different offices,
the management leases a point-to-point dedicated WAN from a ISP and
connects the two LANs. The company has an internetwork, or a private
internet, Communication between offices is now possible. Figure 1.11
shows the internet.
• When a host in the west coast office sends a message to another host in the same
office, the router blocks the message, but the switch directs the message to the
destination.
• On the other hand, when a host on the west coast sends a message to a host on the
east coast, router R1 routes the packet to router R2, and the packet reaches the
destination.
1.3.3 Switching
• An internet is a switched network in which a switch connects at least two links together.
• A switch needs to forward data from a network to another network when required.
• In Figure 1.13, the four telephones at each side are connected to a switch. The switch
connects a telephone set at one side to a telephone set at the other side. The thick line
connecting two switches is a high-capacity communication line that can handle four
voice communications at the same time; the capacity can be shared between all pairs
of telephone sets. The switches used in this example have forwarding tasks but no
storing capability
• The switch is used for only forwarding.
Advantage: A circuit-switched network is efficient only when it is working at
its full capacity.
Disadvantage: Most of the time, the network is inefficient because it is working at
partial capacity.
• A router has a queue that can store and forward the packet. The high-capacity line
has twice the capacity of the low-capacity line.
• If only 2 computers (one at each site) need to communicate with each other,
there is no waiting for the packets.
• However, if packets arrive at one router when high-capacity line is at its full
capacity, the packets should be stored and forwarded.
Advantages: A packet-switched network is more efficient than a circuit switched
network.
Disadvantage: The packets may encounter some delays.
• Two or more networks that can communicate with each other is called the Internet
and is composed of thousands of interconnected networks.
• Internet is made up of (Figure 1.15)
1) Backbones
2) Provider networks and
3) Customer networks
❖ Backbones
Backbones are large networks owned by communication companies such as
BSNL and Airtel. The backbone networks are connected through switching
systems, called peering points.
❖ Provider Networks
Provider networks use the services of the backbones for a fee.
Provider networks are connected to backbones and sometimes to other provider
networks.
❖ Customer Networks
Customer networks actually use the services provided by the Internet.
Customer networks pay fees to provider networks for receiving services.
• Backbones and provider networks are also called Internet Service Providers (ISPs).
• The backbones are often referred to as international ISPs.
• The provider networks are often referred to as national or regional ISPs.
• The Internet today is an internetwork that allows any user to become part of it.
• However, the user needs to be physically connected to an ISP.
• The physical connection is normally done through a point-to-point WAN.
Using Telephone Networks
Most residences have telephone service, which means they are connected to a
telephone network. Telephone networks have already connected themselves to the
Internet. Thus, residences can connect to the Internet using a point-to-point WAN.
DSL Service
The advent of the Internet, some telephone companies have upgraded their telephone lines to
provide higher speed Internet services to residences or small businesses. The DSL service
also allows the line to be used simultaneously for voice and data communication.
Birth of Packet-Switched Networks: The theory of packet switching for bursty traffic was
first presented by Leonard Kleinrock in 1961 at MIT. At the same time, two other
researchers, Paul Baran at Rand Institute and Donald Davies at National Physical Laboratory
in England, published some papers about packet-switched networks.
ARPANET:
❖ In the mid-1960s, mainframe computers in research organizations were stand-alone
devices. Computers from different manufacturers were unable to communicate with
one another. The Advanced Research Projects Agency (ARPA) in the Department of
Defense (DOD) was interested in finding a way to connect computers so that the
researchers they funded could share their findings, thereby reducing costs and
eliminating duplication of effort.
❖ In 1967, at an Association for Computing Machinery (ACM) meeting, ARPA
presented its ideas for the Advanced Research Projects Agency Network
(ARPANET), a small network of connected computers.
❖ The idea was that each host computer (not necessarily from the same manufacturer)
would be attached to a specialized computer, called an interface message processor
(IMP). The IMPs, in turn, would be connected to each other. Each IMP had to be able
to communicate with other IMPs as well as with its own attached host.
❖ By 1969, ARPANET was a reality. Four nodes, at the University of California at Los
Angeles (UCLA), the University of California at Santa Barbara (UCSB), Stanford
Research Institute (SRI), and the University of Utah, were connected via the IMPs to
form a network. Software called the Network Control Protocol (NCP) provided
communication between the hosts.
❖ In 1972, Vint Cerf and Bob Kahn, both of whom were part of the core ARPANET
group, collaborated on what they called the Internetting Project. They wanted to link
dissimilar networks so that a host on one network could communicate with a host on
another. Cerf and Kahn devised the idea of a device called a gateway to serve as the
intermediary hardware to transfer data from one network to another.
TCP/IP
❖ Cerf and Kahn’s landmark 1973 paper outlined the protocols to achieve end-toend
delivery of data. This was a new version of NCP. This paper on transmission control
protocol (TCP) included concepts such as encapsulation, the datagram, and the
functions of a gateway. A radical idea was the transfer of responsibility for error
correction from the IMP to the host machine. This ARPA Internet now became the
focus of the communication effort. Around this time, responsibility for the
ARPANET was handed over to the Defense Communication Agency (DCA).
❖ In October 1977, an internet consisting of three different networks (ARPANET,
packet radio, and packet satellite) was successfully demonstrated. Communication
between networks was now possible. Shortly thereafter, authorities made a decision
to split TCP into two protocols: Transmission Control Protocol (TCP) and Internet
Protocol (IP). IP would handle datagram routing while TCP would be responsible for
higher level functions such as segmentation, reassembly, and error detection. The new
combination became known as TCP/IP.
❖ In 1981, under a Defence Department contract, UC Berkeley modified the UNIX
operating system to include TCP/IP. This inclusion of network software along with a
popular operating system did much for the popularity of internetworking. The open
(nonmanufacturer-specific) implementation of the Berkeley UNIX gave every
manufacturer a working code base on which they could build their products.
❖ In 1983, authorities abolished the original ARPANET protocols, and TCP/IP became
the official protocol for the ARPANET. Those who wanted to use the Internet to
access a computer on a different network had to be running TCP/IP.
MILNET
❖ In 1983, ARPANET split into two networks: Military Network (MILNET) for
military users and ARPANET for nonmilitary users.
CSNET
❖ Another milestone in Internet history was the creation of CSNET in 1981. Computer
Science Network (CSNET) was a network sponsored by the National Science
Foundation (NSF). The network was conceived by universities that were ineligible to
join ARPANET due to an absence of ties to the Department of Defense.
❖ CSNET was a less expensive network; there were no redundant links and the
transmission rate was slower. By the mid-1980s, most U.S. universities with
computer science departments were part of CSNET. Other institutions and companies
were also forming their own networks and using TCP/IP to interconnect. The term
Internet, originally associated with government funded connected networks, now
referred to the connected networks using TCP/IP protocols.
NSFNET
❖ With the success of CSNET, the NSF in 1986 sponsored the National Science
Foundation Network (NSFNET), a backbone that connected five supercomputer
centers located throughout the United States.
❖ In 1990, ARPANET was officially retired and replaced by NSFNET. In 1995,
NSFNET reverted back to its original concept of a research network.
ANSNET
❖ In 1991, the U.S. government decided that NSFNET was not capable of supporting
the rapidly increasing Internet traffic. Three companies, IBM, Merit, and Verizon,
filled the void by forming a nonprofit organization called Advanced Network &
Services (ANS) to build a new, high-speed Internet backbone called Advanced
Network Services Network (ANSNET).
Draft Standard: A proposed standard is elevated to draft standard status after at least two
successful independent and interoperable implementations. Barring difficulties, a draft
standard, with modifications if specific problems are encountered, normally becomes an
Internet standard.
Internet Standard: A draft standard reaches Internet standard status after demonstrations of
successful implementation.
Historic: The historic RFCs are significant from a historical perspective. They either have
been superseded by later specifications or have never passed the necessary maturity levels to
become an Internet standard.
Experimental: An RFC classified as experimental describes work related to an experimental
situation that does not affect the operation of the Internet. Such an RFC should not be
implemented in any functional Internet service.
Requirement Levels
bodies such as IAB, IETF, IRTF, and IANA. ISOC also promotes research and other
scholarly activities relating to the Internet.
IAB
• The Internet Architecture Board (IAB) is the technical advisor to the ISOC.
• Two main purposes of IAB:
i) To oversee the continuing development of the TCP/IP Protocol Suite
ii) To serve in a technical advisory capacity to research members of the Internet
community.
• Another responsibility of the IAB is the editorial management of the RFCs.
• IAB is also the external liaison between the Internet and other standards organizations and
forums.
IETF
• The Internet Engineering Task Force (IETF) is a forum of working groups managed
by the Internet Engineering Steering Group (IESG).
• IETF is responsible for identifying operational problems and proposing solutions to
these problems. IETF also develops and reviews specifications intended as Internet
standards.
• The working groups are collected into areas, and each area concentrates on a specific
topic. Currently nine areas have been defined.
• The areas include applications, protocols, routing, network management next
generation (IPng), and security.
IRTF
• The Internet Research Task Force (IRTF) is a forum of working groups managed by
the Internet Research Steering Group (IRSG).
• IRTF focuses on long-term research topics related to Internet protocols, applications,
architecture, and technology.
NETWORK MODELS
2.1.1 Scenarios:
❖ First Scenarios
• In the first scenario, communication is so simple that it can occur in only one layer (Figure
2.1).
• Assume Maria and Ann are neighbors with a lot of common ideas. Communication
between Maria and Ann takes place in one layer, face to face, in the same language.
❖ Second Scenario
• Maria and Ann communicate using regular mail through the post office (Figure 2.2).
• However, they do not want their ideas to be revealed by other people if the letters are
intercepted.
• They agree on an encryption/decryption technique.
• The sender of the letter encrypts it to make it unreadable by an intruder; the receiver
of the letter decrypts it to get the original letter.
Protocol Layering
• Protocol layering enables us to divide a complex task into several smaller and simpler
tasks. Modularity means independent layers.
• A layer (module) can be defined as a black box with inputs and outputs, without
concern about how inputs are changed to outputs.
• If two machines provide the same outputs when given the same inputs, they can replace
each other.
• Advantages:
1) It allows us to separate the services from the implementation.
2) There are intermediate systems that need only some layers, but not all layers.
• Disadvantage:
1) Having a single layer makes the job easier. There is no need for each layer
to provide a service to the upper layer and give service to the lower layer.
1) First Principle
• The first principle dictates that, if want bidirectional communication, we need to
make each layer so that it is able to perform two opposite tasks, one in each direction.
• For example, the third layer task is to listen (in one direction) and talk (in the other
direction).
• The second layer needs to be able to encrypt and decrypt. The first layer needs to send
and receive mail.
2) Second Principle
• The second principle that we need to follow in protocol layering is that the two
objects under each layer at both sites should be identical.
• For example, the object under layer 3 at both sites should be a plaintext letter. The
object under layer 2 at both sites should be a cipher text letter. The object under layer
1 at both sites should be a piece of mail.
• As shown in the figure 2.6, the duty of the application, transport, and network layers is
end-to-end.
• However, the duty of the data-link and physical layers is hop-to-hop. A hop is a host or
router.
• The domain of duty of the top three layers is the internet, and the domain of duty of the
two lower layers is the link.
• In top 3 layers, the data unit (packets) should not be changed by any router or link-layer
switch.
Dept. of CSE/ BNMIT Page 24
Data Communication (18CS46)
• In bottom 2 layers, the data unit is changed only by the routers, not by the link-layer
switches.
• Identical objects exist between two hops. Because router may fragment the packet at the
network layer and send more packets than received (Figure 2.7).
• The link between two hops does not change the object.
over a link.
• There may be several overlapping sets of links that a datagram can travel from the host to
the destination. The routers are responsible for choosing the best links.
• However, when the next link to travel is determined by the router, the data-link layer is
responsible for taking the datagram and moving it across the link.
• The link can be a wired LAN with a link-layer switch, a wireless LAN, a wired WAN, or
a wireless WAN.
• The data-link layer is responsible for moving the packet through the link. TCP/IP does
not define any specific protocol for the data-link layer. It supports all the standard and
proprietary protocols.
• Any protocol that can take the datagram and carry it through the link suffices for the
network layer.
• The data-link layer takes a datagram and encapsulates it in a packet called a frame. Each
link-layer protocol may provide a different service.
• Some link-layer protocols provide complete error detection and correction, some provide
only error correction.
Network Layer
• The network layer is responsible for creating a connection between the source computer
and the destination computer. The communication at the network layer is host-to-host.
• However, there can be several routers from the source to the destination; the routers in the
path are responsible for choosing the best route for each packet.
• Network layer is responsible for host-to-host communication and routing the packet
through possible routes.
• The separate network layer
1) The separation of different tasks between different layers.
2) The routers do not need the application and transport layers.
• TCP/IP model defines 5 protocols:
1) IP (Internetworking Protocol) 2) ARP (Address Resolution
Protocol)
3) ICMP (Internet Control Message Protocol) 4) IGMP (Internet Group
Message Protocol)
❖ IP
• The network layer in the Internet includes the main protocol, Internet Protocol (IP)
that defines the format of the packet, called a datagram at the network layer.
• IP also defines the format and the structure of addresses used in this layer. IP is also
responsible for routing a packet from its source to its destination, which is achieved
by each router forwarding the datagram to the next router in its path.
• IP is a connectionless protocol that provides no flow control, no error control, and no
congestion control services.
• The network layer also includes unicast (one-to-one) and multicast (one-to-many)
routing protocols.
• A routing protocol does not take part in routing (it is the responsibility of IP), but it
creates forwarding tables for routers to help them in the routing process.
❖ ARP
• The Address Resolution Protocol (ARP) is a protocol that helps IP to find the link-
layer address of a host or a router when its network-layer address is given.
• Physical address is the 48-bit address that is imprinted on the NIC or LAN
card.
• Internet address (IP address) is used to uniquely & universally identify a
device in the internet.
❖ ICMP
• The network layer also has some auxiliary protocols that help IP in its delivery and
routing tasks. The Internet Control Message Protocol (ICMP) helps IP to report some
problems when routing a packet.
❖ IGMP
• The Internet Group Management Protocol (IGMP) is another protocol that helps IP in
multitasking. The Dynamic Host Configuration Protocol (DHCP) helps IP to get the
network-layer address for a host.
Transport Layer
• The logical connection at the transport layer is also end-to-end. The transport layer at
the source host gets the message from the application layer, encapsulates it in a
transport layer packet and sends it, through the logical connection, to the transport
layer at the destination host.
• Transport layer is responsible for giving services to the application layer, to get a
message from an application program running on the source host and deliver it to the
corresponding application program on the destination host.
• In transport layer more than one protocol, means that each application program can
use the protocol that best matches its requirement.
• TCP/IP model defines 3 protocols: 1) TCP (Transmission Control Protocol)
2) UDP (User Datagram Protocol) &
3) SCTP (Stream Control Transmission Protocol)
1) TCP
• TCP is a connection-oriented protocol that first establishes a logical connection
between transport layers at two hosts before transferring data.
• It creates a logical pipe between two TCPs for transferring a stream of bytes.
• TCP provides
▪ flow control - matching the sending data rate of the source host with
the receiving data rate of the destination host to prevent overwhelming
the destination.
▪ Error control - to guarantee that the segments arrive at the destination
without error and resending the corrupted ones
▪ Congestion control - to reduce the loss of segments due to congestion
in the network.
2) UDP
• UDP is a connectionless protocol that transmits user datagrams without first creating
a logical connection.
• In UDP, each user datagram is an independent entity without being related to the
previous or the next one.
• UDP is a simple protocol that does not provide flow, error, or congestion control.
• Its simplicity, which means small overhead, is attractive to an application program
that needs to send short messages and cannot afford the retransmission of the packets
involved in TCP, when a packet is corrupted or lost.
3) SCTP
• A new protocol, Stream Control Transmission Protocol (SCTP) is designed to
respond to new applications that are emerging in the multimedia.
Application Layer
• The logical connection between the two application layers is end to-end. The two
application layers exchange messages between each other as though there were a
bridge between the two layers.
• Communication at the application layer is between two processes, a process sends a
request to the other process and receives a response.
• Process-to-process communication is the duty of the application layer.
• The application layer in the Internet includes many predefined protocols, but a user
can also create a pair of processes to be run at the two hosts.
• TCP/IP model defines following protocols:
1. Hypertext Transfer Protocol (HTTP) - is a vehicle for accessing the World Wide Web
(WWW).
2. Simple Mail Transfer Protocol (SMTP) - is the main protocol used in electronic mail
(e-mail) service.
3. File Transfer Protocol (FTP) - is used for transferring files from one host to another.
4. Terminal Network (TELNET) and Secure Shell (SSH) are used for accessing a site
remotely.
5. Simple Network Management Protocol (SNMP) - is used by an administrator to
manage the Internet at global and local levels.
6. Domain Name System (DNS) - is used by other protocols to find the network-layer
address of a computer.
7. Internet Group Management Protocol (IGMP) - is used to collect membership in a
group.
2.2.5 Addressing
• Any communication that involves two parties needs two addresses: source address
and destination address.
• Five pairs of addresses, one pair per layer but only four because the physical layer
does not need addresses; the unit of data exchange at the physical layer is a bit, which
definitely cannot have an address. Figure 2.9 shows the addressing at each layer.
1) At the application layer, normally use names to define
→ Site that provides services, such as vtunotesbysri.com, or
→ e-mail address, such as vtunotesbysree@gmail.com.
2) At the transport layer, addresses are called port numbers, and these define the
application-layer programs at the source and destination. Port numbers are local
addresses that distinguish between several programs running at the same time.
3) At the network-layer, the addresses are global, with the whole Internet as the
scope. A network-layer address uniquely defines the connection of a device to the
Internet.
4) The link-layer addresses, sometimes called MAC addresses, are locally defined
addresses, each of which defines a specific host or router in a network (LAN or
WAN).
LAYERS IN THE OSI MODEL (Detailed OSI layers not in syllabus, it’s for
your reference)
Physical Layer
• Main Responsibility:
Physical-layer (PL) is responsible for movements of individual bits from one node to
another node.
i) Simplex: Only one device can send; the other device can only receive.
ii) Half-duplex: Two devices can send and receive, but not at
the same time.
iii) Full-duplex: Two devices can send and receive at the same
time.
Data Link Layer
• Main Responsibility:
Data-link-layer (DLL) is responsible for moving frames from one node to another
node.
• Other responsibilities of data-link-layer (Figure 2.6 & 2.7):
1) Framing
▪ DLL receives & divides the stream of bits from network-layer into
frames.
2) Physical-addressing
▪ DLL appends a header to the frame coming from the network-layer.
▪ Header contains the physical-address of sender & receiver of the
frame.
3) Flow Control
▪ DLL provides flow-control.
▪ Flow-control ensures that source sends the data at a speed at which destination can
receive it
▪ DL an overflow at the receiver-side, the data will be lost.
4) Error Control
▪ DLL provides error-control.
▪ Error-control is process of identification or correction of error occurred in the
transmitted data.
▪ Error-control uses mechanisms to
→ detect damaged-frames
→ retransmit lost-frames
→ recognize duplicate frames.
▪ Normally, error control information is present in the trailer of a
frame.
5) Access Control
▪ DLL provides access-control.
▪ Access-control determines which device has right to send the data in
a multipoint connection.
Network Layer
• Main Responsibility:
Network-layer (NL) is responsible for source-to-destination delivery of a packet,
possibly across multiple-networks.
• Data-link-layer vs. Network-layer:
1) The data-link-layer ensures the delivery of the packet between 2 systems on the
same link.
2) The network-layer ensures that each packet gets from the source to the final
destination.
• If 2 systems are connected to the same link, there is no need for a network-layer.
However, if the 2 systems are attached to different links, there is often a need for the
network layer to accomplish source-to-destination delivery.
Transport Layer
• Main Responsibility:
Transport-layer (TL) is responsible for process-to-process delivery of the entire
message.
• Process-to-process delivery means delivery from a specific process on one
computer to a specific process on the other computer.
• A process is an application program running on a host.
• Network-layer vs. Transport-layer:
3) Connection Control
▪ TL can be either i) connectionless or ii) connection-oriented.
i) In connectionless, TL
→ treats each segment as an independent packet and
→ delivers the segment to the transport-layer at the
destination-machine. ii) In connection-oriented, TL
→ first, makes a connection with the destination-machine.
→ then, delivers the packets to the destination-machine.
3) Flow Control & Error Control
▪ Like DLL, TL is responsible for flow-control & error-control.
However, flow-control & error-control are performed end-to-end rather than
node-to-node.
Session Layer
• Main Responsibility:
Session-layer (SL) establishes, maintains, and synchronizes the interaction between
2 systems.
• Other responsibilities of session-layer (Figure 2.12):
1) Dialog Control
▪ SL allows 2 systems to start communication with each other in half-
duplex or full-duplex.
2) Synchronization
Presentation Layer
• Main Responsibility:
Presentation-layer (PL) is concerned with syntax & semantics of the info. exchanged b/w
2 systems.
Application Layer
• Main Responsibility: The application-layer (AL)
→ provides services to the user.
→ enables the user to access the network.
• Both analog and digital signals can take one of two forms: periodic or nonperiodic.
• Periodic signal completes a pattern within a measurable time frame, called a period,
and repeats that pattern over subsequent identical periods. The completion of one
full pattern is called a cycle.
• Nonperiodic signal changes without exhibiting a pattern or cycle that repeats over
time.
Example 1.1
Example 1.2
Example 1.3
Example 1.4
The bit length is the distance one bit occupies on the transmission medium.
❖ Baseband Transmission
• Baseband transmission means sending a digital signal over a channel without changing
the digital signal to an analog signal (Figure 3.19).
B) Better Approximation
▪ To make the shape of the analog signal look more like that of a digital signal, we need to
add more harmonics of the frequencies (Figure 3.23).
▪ We can increase the bandwidth to 3N/2, 5N/2, 7N/2, and so on.
▪ In baseband transmission, the required bandwidth is proportional to the bit rate; If we
need to send bits faster, we need more bandwidth.
Example 1.5
Example 1.6
Attenuation
• Attenuation means a loss of energy.
• When a signal, simple or composite, travels through a medium, it loses some of its
energy in overcoming the resistance of the medium.
• As signal travels through the medium, its strength decreases as distance increases.
This is called attenuation (Figure 3.27).
• As the distance increases, attenuation also increases.
• For example:
Voice-data becomes weak over the distance & loses its contents beyond a certain
distance.
• To compensate for this loss, amplifiers are used to amplify the signal.
Decibel
• The decibel (dB) measures the relative strengths of
→ 2 signals or
→ one signal at 2 different points.
The decibel is negative if signal is attenuated. The decibel is positive if a signal is amplified.
Example 1.7
Example 1.8
Example 1.9
Example 1.10
Distortion
• Distortion means that the signal changes its form or shape (Figure 3.29).
• Distortion can occur in a composite signal made of different frequencies.
• Different signal-components
→ have different propagation speed through a medium.
→ have different delays in arriving at the final destination.
• Differences in delay create a difference in phase if delay is not same as the period-
duration.
• Signal-components at the receiver have phases different from what they had at the sender.
• The shape of the composite signal is therefore not the same.
Noise
• Noise is defined as an unwanted data (Figure 3.30).
• In other words, noise is the external energy that corrupts a signal.
• Due to noise, it is difficult to retrieve the original data/information.
• Four types of noise:
i) Thermal Noise
It is random motion of electrons in wire which creates extra signal not
originally sent by transmitter.
ii) Induced Noise
Induced noise comes from sources such as motors & appliances. These
• SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise).
• A high-SNR means the signal is less corrupted by noise.
• A low-SNR means the signal is more corrupted by noise.
• Because SNR is the ratio of 2 powers, it is often described in decibel units, SNR dB,
defined as
Example 1.11
For a noiseless channel, the Nyquist bit-rate formula defines the theoretical maximum bit-
rate
Example 1.12
Example 1.13
Example 1.14
For a noisy channel, the Shannon capacity formula defines the theoretical maximum bit-
rate.
where bandwidth = bandwidth of channel in bps.
SNR = signal-to-noise ratio
Capacity = capacity of channel in bps.
This formula does not consider the no. of levels of signals being transmitted (as done
in the Nyquist bit rate).
This means that no matter how many levels we have, we cannot achieve a data-rate higher
than the capacity of the channel.
In other words, the formula defines a characteristic of the channel, not the method of
transmission.
Example 1.1.5
Example 1.16
Example 1.17
3.6 PERFORMANCE
3.6.1 Bandwidth
• One characteristic that measures network-performance is bandwidth.
• Bandwidth of analog and digital signals is calculated in separate ways:
(1) Bandwidth in hertz
Bandwidth in hertz is the range of frequencies contained in a composite signal or the range of
frequencies a channel can pass.
For example, the bandwidth of a subscriber telephone line is 4 kHz.
In figure 3.13, the signal has a minimum frequency of F1 = 1000Hz and maximum frequency
of F2 = 5000Hz.
Hence, the bandwidth is given by F2 - F1= 5000 - 1000 = 4000 Hz
(2) Bandwidth in bits per sec
The term bandwidth can also refer to the number of bits per second that a channel, a link, or
even a network can transmit.
For example, the bandwidth of a Fast Ethernet network (or the links in this network) is a
maximum of 100 Mbps. This means that this network can send 100 Mbps.
3.6.2 Throughput
• The throughput is a measure of how fast we can actually send data through a network.
• Although, bandwidth in bits per second and throughput seem the same, they are actually
different.
• A link may have a bandwidth of B bps, but we can only send T bps through this link
with T always less than B.
• In other words,
1) The bandwidth is a potential measurement of a link.
2) The throughput is an actual measurement of how fast we
can send data.
3) For example:
¤ We may have a link with a bandwidth of 1 Mbps, but the devices
connected to the end of the link may handle only 200 kbps.
¤ This means that we cannot send more than 200 kbps through this
link.
Example 1.18
1) Propagation Time
Propagation time is defined as the time required for a bit to travel from source to
destination.
The propagation time is calculated by dividing the distance by the propagation speed.
Example 1.19
Example 1.20
Example 1.21
Let us assume,
Bandwidth of the link = 1 bps and Delay of the link = 5s.
From the figure 3.32, bandwidth-delay product is 1 x 5 = 5. Thus, there can be maximum 5 bits
on the line. There can be no more than 5 bits at any time on the link.
Let us assume,
Bandwidth of the link = 4 bps and Delay of the link = 5s.
From the figure 3.33, bandwidth-delay product is 5 x 5 = 25. Thus, there can be
maximum 25 bits on the line. At each second, there are 5 bits on the line, thus
the duration of each bit is 0.20s.
• The above 2 cases show that the (bandwidth X delay) is the number of bits that can fill the
link.
• This measurement is important if we need to
→ send data in bursts and
→ wait for the acknowledgment of each burst.
• To use the maximum capability of the link
→ need to make the burst-size as (2 x bandwidth x delay).
→need to fill up the full-duplex channel (two directions).
• Amount (2x bandwidth x delay) is the number of bits that can be in transition at any time
(Fig 3.34).
3.6.5 Jitter
• Another performance issue that is related to delay is jitter.
• We can say that jitter is a problem
→ if different packets of data encounter different delays and
→ if the application using the data at the receiver site is time-sensitive (for ex:
audio/video).
• For example: If the delay for the first packet is 20 ms, for the second is 45 ms, and for the
third is 40 ms, then the real-time application that uses the packets suffer from jitter.