BCS502 Module1 Notes
BCS502 Module1 Notes
Module -1
INTRODUCTION :DATA COMMUNICATIONS
Syllabus
Introduction: Data Communications, Networks, Network Types, Networks Models: Protocol
Layering, TCP/IP Protocol suite, The OSI model, Introduction to Physical Layer: Transmission
media, Guided Media, Unguided Media: Wireless. Switching: Packet Switching and its types.
4) Jitter
Jitter refers to the variation in the packet arrival-time.
In other words, jitter is the uneven delay in the delivery of audio/video packets.
For example, let us assume that video packets are sent every 30 ms. If some of
the packets arrive with 30-ms delay and others with 40-ms delay, an uneven
quality in the video is the result.
1) Message
2) Sender
3) Receiver
4) Transmission-Medium
5) Protocol
1) Message:
Message is the information (or data) to be communicated.
Popular forms of information include text, numbers, pictures, audio, and
video.
2) Sender :
Sender is the device that sends the data-message.
It can be a computer, workstation, telephone handset, video camera, and so on.
3) Receiver :
Receiver is the device that receives the message.
It can be a computer, workstation, telephone handset, video camera, and so on.
4) Transmission Medium :
Transmission-medium is physical-path by which a message travels from
sender to receiver.
Transmission-medium can be wired or wireless.
Examples of wired medium:
→ Twisted-pair wire (used in landline telephone)
→ Coaxial cable (used in cable TV network)
→ Fiber-optic cable
Examples of wireless medium:
→ Radio waves
→ Microwaves
→ Infrared waves (ex: operating TV using remote control)
5) Protocol :
A protocol is a set of rules that govern data-communications.
In other words, a protocol represents an agreement between the
communicating-devices.
Without a protocol, 2 devices may be connected but not communicating.
Data Representation :
Information today comes in different forms such as text, numbers, images,
audio, and video.
1) Text
Text is represented as a bit-pattern. (Bit-pattern sequence of bits: 0s or 1s).
Different sets of bit-patterns are used to represent symbols (or characters).
Each set is called a code.
The process of representing symbols is called encoding.
Popular encoding system: ASCII, Unicode.
2) Number
Number is also represented as a bit-pattern.
1) Simplex :
The communication is unidirectional
(For ex: The simplex mode is like a one-way street).
On a link, out of 2 devices:
i) Only one device can transmit.
ii) Another device can only receive.
For example (Figure 1.2a):
The monitor can only accept output.
Entire-capacity of channel is used to send the data in one direction.
2) Half-Duplex :
Both the stations can transmit as well as receive but not at the same time.
(For ex: The half-duplex mode is like a one-lane road with 2 directional traffic).
When one station is sending, the other can only receive and vice-versa.
For example (Figure 1.2b): Walkie-talkies
Entire-capacity of a channel is used by one of the 2 stations that are transmitting
the data.
3) Full-Duplex :
Both stations can transmit and receive at the same time.
(For ex: The full-duplex is like a 2-way street with traffic flowing in both directions at
the same time).
For example (Figure 1.2c):
Mobile phones (When 2 people are communicating by a telephone line, both can
listen and talk at the same time).
Entire-capacity of a channel is shared by both the stations that are transmitting the
data.
1.2 NETWORKS :
• A network is defined as a set of devices interconnected by communication-links.
• This interconnection among computers facilitates information sharing among them.
• Computers may connect to each other by either wired or wireless media.
• Often, devices are referred to as nodes.
• A node can be any device capable of sending/receiving data in the network.
• For example: Computer & Printer
• The best-known computer network is the Internet.
Network Criteria :
Physical Structures :
Type of Connection
• Two types of connections (Figure 1.3):
1) Point-to-Point
Only two devices are connected by a dedicated-link (Figure 1.3a).
Entire-capacity of the link is reserved for transmission between those two
devices.
For example: Point-to-Point connection b/w remote-control & TV for
changing the channels.
2) Multipoint (Multi-drop)
Three or more devices share a single link.
The capacity of the channel is shared, either spatially or temporally (Figure
1.3b).
i) If link is used simultaneously by many devices, then it is spatially
shared connection.
ii) If user takes turns while using the link, then it is time shared
(temporal) connection.
Physical Topology :
• The physical-topology defines how devices are connected to make a network.
• Four basic topologies are:
1) Mesh
2) Star
3) Bus and
4) Ring
Mesh Topology
• All the devices are connected to each other (Figure 1.7).
• There exists a dedicated point-to-point link between all devices.
• There are n(n-1) physical channels to link n devices.
• Every device not only sends its own data but also relays data from other nodes.
• For ‘n’ nodes,
→ There are n(n-1) physical-links
→ There are n(n-1)/2 duplex-mode links
• Every device must have (n–1) I/O ports to be connected to the other (n-1) devices.
Advantages:
1) Congestion reduced: Each connection can carry its own data load.
2) Robustness: If one link fails, it does not affect the entire system.
3) Security: When a data travels on a dedicated-line, only intended-receiver
can see the data.
4) Easy fault identification & fault isolation: Traffic can be re-routed to avoid
problematic links.
Disadvantages:
1) Difficult installation and reconfiguration.
2) Bulk of wiring occupies more space than available space.
3) Very expensive: as there are many redundant connections.
4) Not mostly used in computer networks. It is commonly used in wireless
networks.
5) High redundancy of the network-connections.
Bus Topology :
• All the devices are connected to the single cable called bus (Figure 1.4).
• Every device communicates with the other device through this bus.
• A data from the source is broadcasted to all devices connected to the bus.
• Only the intended-receiver, whose physical-address matches, accepts the data.
Advantages:
1) Less expensive: Each device needs only one link & one I/O port to connect
it to any devices.
Advantages:
1) Easy installation and reconfiguration.
2) To add/delete a device, requires changing only 2 connections.
3) Fault isolation is simplified. If one device does not receive a signal within a
specified period, it can issue an alarm. The alarm alerts the network-operator to the
problem and its location.
4) Congestion reduced: Because all the traffic flows in only one direction.
Disadvantages:
1) Unidirectional traffic.
Questions:
1. What is data communication ?
2. Identify the attributes of communication system ?
3. What is jitter ?
4. Identify the components of a communication-system ?
5. Give an example for Transmission Medium ?
6. Identify the forms of information ?
7. List the difference between half-duplex and full-duplex ?
8. What is network?
9. List the network criteria?
10.What is response time?
11.Identify the basic topologies?
A packet sent by a host to another host carries both source host’s and destination
host’s addresses.
• LANs use a smart connecting switch.
• The switch is able to
→ Recognize the destination address of the packet &
→ Guide the packet to its destination.
• The switch
WAN :
• WAN is used to connect computers anywhere in the world.
• WAN can cover larger geographical area. It can cover cities, countries and even
continents.
• WAN interconnects connecting devices such as switches, routers, or modems.
• Normally, WAN is
→ Created & run by communication companies (Ex: BSNL, Airtel)
→ Leased by an organization that uses it.
• A WAN can be of 2 types:
1) Point-to-point WAN:
A point-to-point WAN is a network that connects 2 communicating devices
through a transmission media (Figure 1.9).
2) Switched WAN :
A switched WAN is a network with more than two ends.
The switched WAN can be the backbones that connect the Internet.
A switched WAN is a combination of several point-to-point WANs that are
connected by switches (Figure 1.10).
Internetwork :
• A network of networks is called an internetwork. (Internet inter-network)
(Figure 1.12).
• For example (Figure 1.11):
Assume that an organization has two offices,
i) First office is on the east coast &
ii) Second office is on the west coast.
Each office has a LAN that allows all employees in the office to communicate with
each other.To allow communication between employees at different offices, the
management leases a point-to-point dedicated WAN from a ISP and connects the two
LANs.(ISP(Internet Service Provider) such as a telephone company ex: BSNL).
When a host in the west coast office sends a message to another host in the same
office, the router blocks the message, but the switch directs the message to the
destination.
On the other hand, when a host on the west coast sends a message to a host on the east
coast, router R1 routes the packet to router R2, and the packet reaches the destination.
Switching :
An internet is a switched network in which a switch connects at least two links
together.
• A switch needs to forward data from a network to another network when required.
• Two types of switched networks are 1)Circuit-switched and 2) Packet-switched
networks.
Circuit-Switched Network :
A dedicated connection, called a circuit, is always available between the two end
systems. The switch can only make it active or inactive.
As shown in Figure 1.13, the 4 telephones at each side are connected to a switch.
¤ The switch connects a telephone at one side to a telephone at the other side.
Packet-Switched Network
In a computer network, the communication between the 2 ends is done in blocks of
data called packets. The switch is used for both storing and forwarding because a
packet is an independent entity that can be stored and sent later.
As shown in Figure 1.14, the 4 computers at each side are connected to a router.
¤ A router has a queue that can store and forward the packet.
¤ The high-capacity line has twice the capacity of the low-capacity line.
¤ If only 2 computers (one at each site) need to communicate with each other, there is
no waiting for the packets.
¤ However, if packets arrive at one router when high-capacity line is at its full
capacity, the packets should be stored and forwarded.
Advantages:
A packet-switched network is more efficient than a circuit switched network.
Disadvantage:
The packets may encounter some delays.
The Internet Today :
A network of networks is called an internet. (Internet inter-network)
NETWORK MODELS :
2.1 Protocol Layering :
A protocol defines the rules that both the sender and receiver and all intermediate
devices need to follow to be able to communicate effectively.
When communication is simple, we may need only one simple protocol.
When communication is complex, we need to divide the task b/w different layers.
We need a protocol at each layer, or protocol layering.
Scenarios:
First Scenario
• In the first scenario, communication is so simple that it can occur in only one layer
(Figure 2.1).
• Assume Maria and Ann are neighbours with a lot of common ideas.
• Communication between Maria and Ann takes place in one layer, face to face, in the
same language.
Second Scenario
• Maria and Ann communicate using regular mail through the post office (Figure 2.2).
• However, they do not want their ideas to be revealed by other people if the letters
are intercepted.
• They agree on an encryption/decryption technique.
• The sender of the letter encrypts it to make it unreadable by an intruder; the receiver
of the letter decrypts it to get the original letter.
Protocol Layering
• Protocol layering enables us to divide a complex task into several smaller and
simpler tasks.
• Modularity means independent layers.
• A layer (module) can be defined as a black box with inputs and outputs, without
concern about how inputs are changed to outputs.
• If two machines provide the same outputs when given the same inputs, they can
replace each other.
• Advantages:
1) It allows us to separate the services from the implementation.
2) There are intermediate systems that need only some layers, but not all
layers.
• Disadvantage:
1) Having a single layer makes the job easier. There is no need for each layer
to provide a service to the upper layer and give service to the lower layer.
Principles of Protocol Layering
1) First Principle
• If we want bidirectional communication, we need to make each layer able to
perform 2 opposite tasks, one in each direction.
• For example, the third layer task is to listen (in one direction) and talk (in the other
direction).
2) Second Principle
• The two objects under each layer at both sites should be identical.
• For example, the object under layer 3 at both sites should be a plaintext letter.
Logical Connections
• We have layer-to-layer communication (Figure 2.3).
• There is a logical connection at each layer through which 2 end systems can send the
object created from that layer.
Questions:
1. What is protocol layering?
2. What is logical connection?
3. What is first principle of protocol layering?
4. What is second principle of protocol layering?
5. Identify the advantages of protocol layering?
6. List the disadvantage of protocol layering?
• As shown in the figure 2.6, the duty of the application, transport, and network layers
is end-to-end.
• However, the duty of the data-link and physical layers is hop-to-hop. A hop is a host
or router.
• The domain of duty of the top three layers is the internet.
Identical objects exist between two hops. Because router may fragment the packet at
the network layer and send more packets than received (Figure 2.7).
• The link between two hops does not change the object.
• Data-link-layer (DLL) is responsible for moving frames from one node to another
node over a link.
• The link can be wired LAN/WAN or wireless LAN/WAN.
• The data-link layer
→ Gets the datagram from network layer
→ Encapsulates the datagram in a packet called a frame.
→ Sends the frame to physical layer.
• TCP/IP model does not define any specific protocol.
DLL supports all the standard and proprietary protocols.
• Each protocol may provide a different service.
• Some protocols provide complete error detection and correction; some protocols
provide only error correction.
Network Layer
• The network layer is responsible for source-to-destination transmission of data.
• The network layer is also responsible for routing the packet.
• The routers choose the best route for each packet.
• Why we need the separate network layer?
1) The separation of different tasks between different layers.
2) The routers do not need the application and transport layers.
• TCP/IP model defines 5 protocols:
1) IP (Internetworking Protocol) 2) ARP (Address Resolution Protocol)
3) ICMP (Internet Control Message Protocol) 4) IGMP (Internet Group
Message Protocol)
1) IP
IP is the main protocol of the network layer.
IP defines the format and the structure of addresses.
IP is also responsible for routing a packet from its source to its destination.
It is a connection-less & unreliable protocol.
i) Connection-less means there is no connection setup b/w the sender and the
receiver.
ii) Unreliable protocol means
→ IP does not make any guarantee about delivery of the data.
2) ARP
ARP is used to find the physical-address of the node when its Internet-address
is known.
Physical address is the 48-bit address that is imprinted on the NIC or LAN
card.
Internet address (IP address) is used to uniquely & universally identify a
device in the internet.
3) ICMP
ICMP is used to inform the sender about datagram-problems that occur during
transit.
4) IGMP
IGMP is used to send the same message to a group of recipients.
Transport Layer
• TL protocols are responsible for delivery of a message from a process to another
process.
• The transport layer
→ gets the message from the application layer
→ encapsulates the message in a packet called a segment and
→ sends the segment to network layer.
• TCP/IP model defines 3 protocols:
Application Layer
• The two application layers exchange messages between each other.
• Communication at the application layer is between two processes (two programs
running at this layer).
• To communicate, a process sends a request to the other process and receives a
response.
• Process-to-process communication is the duty of the application layer.
• TCP/IP model defines following protocols:
1) SMTP (Simple Mail Transfer Protocol) is used to transport email between a
source and destination.
Addressing
• We have logical communication between pairs of layers.
• Any communication that involves 2 parties needs 2 addresses: source address and
destination address.
• We need 4 pairs of addresses (Figure 2.9):
1) At the application layer, we normally use names to define
→ site that provides services, such as vtunotesbysri.com, or
→ e-mail address, such as abc@gmail.com.
2) At the transport layer, addresses are called port numbers.
Port numbers define the application-layer programs at the source and
destination.
Port numbers are local addresses that distinguish between several programs
running at the same time.
3) At the network-layer, addresses are called logical addresses (IP Address).
IP address uniquely defines the connection of a device to the Internet.
The IP addresses are global, with the whole Internet as the scope.
4) At the data link-layer, addresses are called Physical addresses (MAC Address)
The MAC addresses defines a specific host or router in a network (LAN or
WAN).
The MAC addresses are locally defined addresses.
Questions:
1. Give an example for TCP/IP protocol?
2. How many layers in TCP/IP protocol suite?
3. What is router?
4. Identify the functionality of Datalink layer?
5. What is role of network layer in TCP/IP protocol suite?
6. What is multiplexing?
7. What is demultiplexing?
8. What is link?
9. What is the functionality of phyical layer?
10. What is DDL?
The OSI model specifies which functions belong to each of its layers.
In TCP/IP model, the layers contain relatively independent protocols that can be
mixed and matched depending on the needs of the system.
A transmission medium can be broadly defined as anything that can carry infor-
mation from a source to a destination.
For example, the transmission medium for two people having a dinner
conversation is the air.
The air can also be used to convey the message in a smoke signal or semaphore.
For a written message, the transmission medium might be a mail carrier, a truck,
or an airplane.
In data communications the definition of the information and the transmission
medium is more specific.
The transmission medium is usually free space, metallic cable, or fiber-optic
cable.
The information is usually a signal that is the result of a conversion of data from
another form.
The use of long-distance communication using electric signals started with the
invention of the telegraph by Morse in the 19th century.
Communication by telegraph was slow and dependent on a metallic medium.
In telecommunications, transmission media can be divided into two broad catego-
ries: guided and unguided. Guided media include twisted-pair cable, coaxial cable,
and fiber-optic cable. Unguided medium is free space. Figure 7.2 shows this
taxonomy.
One of the wires is used to carry signals to the receiver, and the other is used only
as a ground reference. The receiver uses the difference between the two.
In addition to the signal sent by the sender on one of the wires, interference (noise)
and crosstalk may affect both wires and create unwanted signals.
If the two wires are parallel, the effect of these unwanted signals is not the same
in both wires because they are at different locations relative to the noise or
crosstalk sources (e.g., one is closer and the other is farther). This results in a
difference at the receiver.
By twisting the pairs, a balance is maintained..
For example, suppose in one twist, one
wire is closer to the noise source and the other is farther; in the next twist, the
reverse is true.
Twisting makes it probable that both wires are equally affected by external influ-
ences (noise or crosstalk).
Connectors:The most common UTP connector is RJ45 (RJ stands for registered
jack), as shown in Figure 7.5. The RJ45 is a keyed connector, meaning the connector
can be inserted in only one way.
.
Applications:
Twisted-pair cables are used in telephone lines to provide voice and data channels.
7.2.2 Coaxial Cable :
Coaxial cable (or coax) carries signals of higher frequency ranges than those in
twisted-pair cable, in part because the two media are constructed quite differently.
Instead of having two wires, coax has a central core conductor of solid or
stranded wire (usually copper) enclosed in an insulating sheath, which is, in turn,
encased in an outer conductor of metal foil, braid, or a combination of the two.
The outer metallic wrapping serves both as a shield against noise and as the
second conductor, which completes the circuit.
This outer conductor is also enclosed in an insulating sheath, and the whole cable
is protected by a plastic cover (see Figure 7.7).
A coaxial cable (or coax cable) is a type of electrical cable that consists of four
main layers:
Inner Conductor:
This is the core of the coaxial cable, usually made of copper or aluminum.
It carries the electrical signal, such as data, video, or radio frequencies.
It can be either solid (single strand) or stranded (multiple smaller strands).
Insulator:
Surrounding the inner conductor is the dielectric insulator, typically made
from materials like polyethylene or Teflon.
It separates the inner conductor from the outer conductor and ensures the
signal remains confined within the cable.
The quality of the insulator affects the efficiency and performance of the
cable in transmitting signals.
Outer Conductor :
This is typically made of a braided or foil metal shield, often copper or
aluminum.
It serves two purposes: grounding and protecting the inner conductor from
electromagnetic interference (EMI).
The outer conductor ensures that external noise or interference doesn't affect
the signal carried by the inner conductor.
Plastic Cover
The outermost layer of the coaxial cable is a protective plastic sheath.
It protects the internal components of the cable from environmental damage
such as moisture, heat, and physical wear.
The plastic cover is often made of materials like PVC (Polyvinyl Chloride) or
polyethylene for durability and flexibility.
The BNC connector is used to connect the end of the cable to a device, such as a
TV set.
Performance :As we did with twisted-pair cable, we can measure the performance of
a coaxial cable.
Figure 7.9 that the attenuation is much higher in coaxial cable than in twisted-pair
cable.
In other words, although coaxial cable has a much higher bandwidth, the signal
weakens rapidly and requires the frequent use of repeaters.
Applications:
Coaxial cable was widely used in analog telephone networks where a single
coaxial network could carry 10,000 voice signals.
Cable TV networks also use coaxial cables.
traditional Ethernet LANs
As the figure shows, if the angle of incidence I (the angle the ray makes with the
line perpendicular to the interface between the two substances) is less than the critical
angle, the ray refracts and moves closer to the surface.
If the angle of incidence is equal to the critical angle, the light bends along the
interface.
If the angle is greater than the critical angle, the ray reflects (makes a turn) and
travels again in the denser substance.
Optical fibers use reflection to guide light through a channel.
A glass or plastic core is surrounded by a cladding of less dense glass or plastic.
Propagation Modes:
Current technology supports two modes (multimode and single mode) for
propagating light along optical channels, channels, each requiring fiber with
different physical characteristics.
Multi-mode can be implemented in two forms: step-index or graded-index (see
Figure 7.12).
In multimode step-index fiber, the density of the core remains constant from the
center to the edges.
A beam of light moves through this constant density in a straight line until it
reaches the interface of the core and the cladding.
At the interface, there is an abrupt change due to a lower density.
A second type of fiber, called multimode graded-index fiber, decreases this dis-
tortion of the signal through the cable.
The word index here refers to the index of refraction.
Single-Mode:
Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal.
The single-mode fiber itself is manufactured with a much smaller diameter than
that of multimode fiber, and with substantially lower density (index of refraction).
The decrease in density results in a critical angle that is close enough to 90° to
make the propagation of beams almost horizontal.
Fiber Sizes:
Optical fibers are defined by the ratio of the diameter of their core to the diameter
of their cladding, both expressed in micrometers.
The common sizes are shown in Table 7.3. Note that the last size listed is for
single-mode only.
Cable Composition:
Figure 7.14 shows the composition of a typical fiber-optic cable.
The outer jacket is made of either PVC or Teflon. Inside the jacket are Kevlar
strands to strengthen the cable.
Performance :
The plot of attenuation versus wavelength in Figure 7.16 shows a very interesting
phenomenon in fiber-optic cable.
Attenuation is flatter than in the case of twisted-pair cable and coaxial cable.
Applications :
Fiber-optic cable is often found in backbone networks
Some cable TV companies use a combination of optical fiber and coaxial cable,
thus creating a hybrid network.
Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-
X also use fiber-optic cable.
Advantages of Optical Fiber :
Higher bandwidth:Fiber-optic cable can support dramatically higher bandwidths
(and hence data rates) than either twisted-pair or coaxial cable. Currently, data rates
and bandwidth utilization over fiber-optic cable are limited not by the medium but
by the signal generation and reception technology available
Less signal attenuation:Fiber-optic transmission distance is significantly greater
than that of other guided media
Immunity to electromagnetic interference:Electromagnetic noise cannot affect
fiber-optic cables.
Resistance to corrosive materials:Glass is more resistant to corrosive materials
than copper
Questions:
1. list the transmission media?
2. List the difference between guided and unguided transmission media?
3. Give an example for Guided transmission media?
4. What is the full form of UTP?
5. What is the full form of STP?
6. Identify the Categories of unshielded twisted-pair cables?
7. List the Applications of twisted pair cables?
8. List the advantages of Coaxial cable?
9. List the Advantages of Optical Fiber?
10.List the Disadvantages of Optical Fiber?
In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth.
In sky propagation, higher-frequency radio waves radiate upward into the
ionosphere (the layer of atmosphere where particles exist as ions) where they are
reflected back to earth.
Table 7.4 lists these bands, their ranges, propagation methods, and some
applications.
We can divide wireless transmission into three broad groups: radio waves,
microwaves, and infrared waves.
7.3.1 Radio Waves :
electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are
normally called radio waves.
waves ranging in frequencies between 1 and 300 GHz are called microwaves
Radio waves, for the most part, are omnidirectional.
When an antenna transmits radio waves, they are propagated in all directions.
This means that the sending and receiving antennas do not have to be aligned.
A sending antenna sends waves that can be received by any receiving antenna.
Radio waves, particularly those waves that propagate in the sky mode, can travel
long distances.
This makes radio waves a good candidate for long-distance broadcasting such as
AM radio.
Radio waves, particularly those of low and medium frequencies, can penetrate
walls.
It is an advantage because, for example, an AM radio can receive signals inside a
building.
It is a disadvantage because we cannot isolate a communication to just inside or
outside a building.
Applications:
The omnidirectional characteristics of radio waves make them useful for
multicasting,in which there is one sender but many receivers.
Radio waves are used for multicast communications,such as radio and television,
and paging systems.
7.3.2 Microwaves:
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves.
Microwaves are unidirectional.
When an antenna transmits microwaves, they can be narrowly focused.
This means that the sending and receiving antennas need to be aligned.
A pair of antennas can be aligned without interfering with another pair of aligned
antennas.
The following describes some characteristics of microwave propagation:
Microwave propagation is line-of-sight.
Very high-frequency microwaves cannot penetrate walls.
The microwave band is relatively wide, almost 299 GHz.
Use of certain portions of the band requires permission from authorities.
Unidirectional Antenna :
Microwaves need unidirectional antennas that send out signals in one direction.
Two types of antennas are used for microwave communications: the parabolic
dish and the horn (see Figure 7.20).
7.3.3 Infrared :
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1
mm to 770 nm), can be used for short-range communication.
Infrared waves, having high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference between one system and
another.
a short-range communication system in one remote control, we do not interfere
with the use of the remote by our neighbors.
Applications:
Infrared signals can be used for short-range communication in a closed
area using line-of-sight propagation.
Questions:
1. what is wireless communication?
2. What is the range of radio waves?
3. Identify the propagation methods?
4. What are the applications of radio waves?
5. What are the applications of micro waves?
A switch needs to forward data from a network to another network when required.
Two types of switched networks are
Circuit-switched and
Packet-switched networks.
Figure 8.7 shows how the datagram approach is used to deliver four packets from
station A to station X.
The switches in a datagram network are traditionally referred to as routers.
In this example, all four packets (or datagrams) belong to the same message, but
may travel different paths to reach their destination.
Packets may also be lost or dropped because of a lack of resources.
The datagram networks are sometimes referred to as connectionless networks.
The term connectionless here means that the switch (packet switch) does not keep
information about the connection state.
There are no setup or teardown phases.
Each packet is treated the same by a switch regardless of its source or destination.
Routing Table :
In this type of network, each switch (or packet switch) has a routing table which
is based on the destination address.
The routing tables are dynamic and are updated periodically.
The destination addresses and the corresponding forwarding output ports are
recorded in the tables.
Figure 8.8 shows the routing table for a switch.
A switch in a datagram network uses a routing table that is based on the
destination address.
The Figure 8.9 gives an example of delay for one single packet.
The packet travels through two switches
There are three transmission times (3T), three propagation delays (slopes 3t of the
lines), and two waiting times (W1+ W2).
The network has switches that allow traffic from sources to destinations.
A source or destination can be a computer, packet switch, bridge, or any other
device that connects other networks.
Addressing
Two types of addressing: 1) Global and 2) Local (virtual-circuit identifier).
Global Addressing
A source or a destination needs to have a global address. Global address is an address
that can be unique in the scope of the network or internationally if the network is part
of an international network.
Virtual Circuit Identifier
The identifier used for data-transfer is called the virtual-circuit identifier
(VCI).
A VCI, unlike a global address, is a small number that has only switch
scope.
VCI is used by a frame between two switches.
When a frame arrives at a switch, it has a VCI. When the frame leaves, it has a
different VCI.
Figure 8.11 show how the VCI in a data-frame changes from one switch to
another.
Three Phases :
A source and destination need to go through 3 phases: setup, data-transfer, and
teardown.
o setup phase, the source and destination use their global addresses
to help switches make table entries for the connection.
o In the teardown phase, the source and destination inform the
switches to delete the corresponding entry.
o Data-transfer occurs between these 2 phases.
To In transfer a frame from a source to its destination, all switches need to
have a table-entry for this virtual-circuit.
As shown in Figure 8.13, each switch changes the VCI and routes the frame. The
data-transfer phase is active until the source sends all its frames to the destination.
The procedure at the switch is the same for each frame of a message.The process
creates a virtual circuit, not a real circuit, between the source and destination.
Setup Phase :
A switch creates an entry for a virtual-circuit.
For example, suppose source A needs to create a virtual-circuit to B.
Two steps are required:1) Setup-request and Acknowledgment.
1) Setup Request
A setup-request frame is sent from the source to the destination (Figure
8.14).
2) Acknowledgment
A special frame, called the acknowledgment-frame, completes the entries
in the switching-tables (Figure 8.15).
Questions:
1. What is delay?
2. What is tear down phase?
3. What is connection setup?
4. List difference between circuit ,virtual,packet switching
5. What is Virtual Circuit Identifier ?