Unit V Fit
Unit V Fit
Data Communication:
• Delivery
• Accuracy
• Timeliness
• Jitter
► Delivery
Data must be sent in the correct order from the source device to the correct
destination.
► Accuracy:
The information must be supplied without errors. The data should be retransmitted if
there is any inaccuracy during transmission.
► Timeliness:
Data must be given within the timeframe provided. The data that was given late has
become unusable.
► Jitter:
The different components of Data communication are shown in the following figure.
1. Message:
The message is the information (data) to be communicated. Popular forms of
information include text, numbers, pictures, audio, and video.
2. Sender:
The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
1
3. Receiver:
The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
4. Transmission medium:
The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire,
coaxial cable, fiber-optic cable, and radio waves.
5. Protocol:
A protocol is a set of rules that govern data communications. It represents an
agreement between the communicating devices. Without a protocol, two devices
may be connected but not communicating, just as a person speaking French
cannot be understood by a person who speaks only Japanese.
Repeaters
A Repeater is a regenerator.Repeaters are network devices operating
at physical layer of the OSI model that amplify or regenerate an
incoming signal before retransmitting it. They are incorporated in
2
networks to expand its coverage area. They are also known as signal
boosters.
According to the types of networks that they connect, repeaters can be categorized
into two types −
Bridges:
A bridge can check, does not change the physical (MAC) addresses in a
frame
Router:
A router works on the third layer of the OSI model, and it is based on the IP
address of a computer. It uses protocols such as ICMP to communicate
3
between two or more networks. It is also known as an intelligent device as it
can calculate the best route to pass the network packets from source to the
destination automatically.
There are two types of tables in the router that are static and dynamic. The
static routing tables are configured manually, and the dynamic routing
tables are updated automatically by dynamic routers based on network
activity.
GateWays:
4
using a specific protocol. When it is configured as a router, it routes the data
packets to the appropriate network using a routed protocol such as IP.
Switches:
Switches are networking devices operating at layer 2 or a data link layer of the OSI
model. They connect devices in a network and use packet switching to send, receive
or forward data packets or data frames over the network.
A switch has many ports, to which computers are plugged in. When a data frame
arrives at any port of a network switch, it examines the destination address, performs
necessary checks and sends the frame to the corresponding device(s).It supports
unicast, multicast as well as broadcast communications.
Hubs:
Hubs are networking devices operating at a physical layer of the OSI model that are
used to connect multiple devices in a network. They are generally used to connect
computers in a LAN.Hub commonly refers to a multiport repeater.
A hub has many ports in it. A computer which intends to be connected to the network
is plugged in to one of these ports. When a data frame arrives at a port, it is broadcast
to every other port, without considering whether it is destined for a particular
destination device or not.
Types of Hubs
Passive Hubs − Passive hubs connects nodes in a star configuration by collecting
wiring from nodes.
Active Hubs − Active hubs amplify and regenerate the incoming electrical signals
before broadcasting them.
5
Intelligent Hubs − Intelligent hubs are active hubs that provide additional network
management facilities.
Topology:
Types of Topology
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5.Tree Topology
6. Hybrid Topology
Mesh Topology
In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the
link only carries data for the two connected devices only.
6
Lets say we have n devices in the network then each device must be connected
with (n-1) devices of the network. Number of links in a mesh topology of n devices
would be n(n-1)/2.
1. No data traffic issues as there is a dedicated link between two devices which
means the link is only available for those two devices.
2. Mesh topology is reliable and robust as failure of one link doesn’t affect other links
and the communication between other devices on the network.
3. Mesh topology is secure because there is a point to point link thus unauthorized
access is not possible.
4. Fault detection is easy.
Star Topology
In star topology each device in the network is connected to a central device called
hub. If one device wants to send data to other device, it has to first send the data to
hub and then the hub transmit that data to the designated device.
1. Less expensive because each device only need one I/O port and needs to be
connected with hub with one link.
2. Easier to install
3. Less amount of cables required because each device needs to be connected
with the hub only.
4. Robust, if one link fails, other links will work just fine.
5. Easy fault detection because the link can be easily identified.
1. If hub goes down everything goes down, none of the devices can work without
hub.
7
2. Hub requires more resources and regular maintenance because it is the central
system of star topology.
Bus Topology
In bus topology there is a main cable and all the devices are connected to this main
cable through drop lines. There is a device called tap that connects the drop line to
the main cable. Since all the data is transmitted over the main cable, there is a limit
of drop lines and the distance a main cable can have.
Ring Topology
In ring topology each device is connected with the two devices on either side of it.
There are two dedicated point to point links a device has with the devices on the
either side of it. This structure forms a ring thus it is known as ring topology. If a device
wants to send data to another device then it sends the data in one direction, each
device in ring topology has a repeater, if the received data is intended for other
device then repeater forwards this data until the intended device receives it.
1. Easy to install.
2. Managing is easier as to add or remove a device from the topology only two links
are required to be changed.
8
1. A link failure can fail the entire network as the signal will not travel forward
due to failure.
2. Data traffic issues, since all the data is circulating in a ring.
Tree Topology
Tree topology is the topology in which the nodes are connected hierarchically, with
all the nodes connected to the topmost node or root node. Hence, it is also known
Advantages
-The main reason why tree topologies are used is to extend bus and star topologies.
-Under this hierarchical format, it is easy to add more nodes to the network when
your organization grows in size.
Disadvantages
-If the root node fails then all of its subtrees become partitioned.
-Maintaining the network system is not simple either because the more nodes you
add, the more difficult it becomes to manage the network.
- Cables are required to connect every device throughout the hierarchy which
makes the network layout more complex .
Hybrid topology
9
A combination of two or more topology is known as hybrid topology. For example a
combination of star and mesh topology is known as hybrid topology.
1. We can choose the topology based on the requirement for example, scalability is
our concern then we can use star topology instead of bus technology.
2. Scalable as we can further connect other computer networks with the existing
networks with different topologies.
Transmission speed is the rate at which data packets cross a computer network from
one server to another. Transmission speed is typically measured in megabits per
second (Mbps), which equals one million bits per second, although gigabit and
even terabit speeds are becoming common. Transmission speed depends on:
Transmission mode:
10
o The way in which data is transmitted from one device to another device is known
as transmission mode.
o The transmission mode is also known as the communication mode.
o The transmission mode is defined in the physical layer.
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
o In simplex mode, the station can utilize the entire bandwidth of the
communication channel, so that more data can be transmitted at a time.
11
Disadvantage of Simplex mode:
Half-Duplex mode
o In a Half-duplex channel, Messages flow in both the directions, but not at the
same time.
o The entire bandwidth of the communication channel is utilized in one
direction at a time.
o In half-duplex mode, it is possible to perform the error detection, and if any
error occurs, then the receiver requests the sender to retransmit the data.
o A Walkie-talkie is an example of the Half-duplex mode.
o In half-duplex mode, both the devices can send and receive the data and
also can utilize the entire bandwidth of the communication channel during
the transmission of data.
o In half-duplex mode, when one device is sending the data, then another has
to wait, this causes the delay in sending the data at the right time.
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions.
o Both the stations can send and receive the message simultaneously.
12
Advantage of Full-duplex mode:
o Both the stations can send and receive the data at the same time.
o If there is no dedicated path exists between the devices, then the capacity
of the communication channel is divided into two parts.
Transmission media:
Guided Media
It is defined as the physical medium through which the signals are transmitted. It is
also known as Bounded media.
1.Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each
otherThe frequency range for twisted pair cable is from 0 to 3.5KHz.
13
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
o Category 1: Category 1 is used for telephone lines that have low-speed data.
o Category 2: It can support upto 4Mbps.
o Category 3: It can support upto 16Mbps.
o Category 4: It can support upto 20Mbps. Therefore, it can be used for long-
distance communication.
o Category 5: It can support upto 200Mbps.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that
allows the higher transmission rate.
Ex:telephone conversations.
14
Characteristics Of Shielded Twisted Pair:
Disadvantages
2.Coaxial Cable
o The inner conductor of the coaxial cable is made up of copper, and the
outer conductor is made up of copper mesh. The middle core is made up of
non-conductive cover that separates the inner conductor from the outer
conductor.
o The middle core is responsible for the data transferring whereas the copper
mesh prevents from the EMI(Electromagnetic interference).
15
Advantages Of Coaxial cable:
3.Fibre Optic
Thin glass or plastic threads used to transmit data using light waves are called optical
fibre. Light Emitting Diodes (LEDs) or Laser Diodes (LDs) emit light waves at
the source, which is read by a detector at the other end. Optical fibre cable has a
bundle of such threads or fibres bundled together in a protective covering. Each
fibre is made up of these three layers, starting with the innermost layer −
• Cladding made of high quality silica glass or plastic, with a lower refractive
index than the core
• Protective outer covering called buffer
o Greater Bandwidth
o Faster speed
o Longer distances
16
o Better reliabilityThinner and Sturdier
UnGuided Media:
1.Satellite Communication
A satellite is a smaller object that revolves around a larger object in space. For
example, moon is a natural satellite of earth.
If the communication takes place between any two earth stations through a
satellite, then it is called as satellite communication. In this communication,
electromagnetic waves are used as carrier signals. These signals carry the
information such as voice, audio, video or any other data between ground
and space and vice-versa.
two kinds of propagation are used earlier for communication up to some distance.
A repeater is a circuit, which increases the strength of the received signal and then
transmits it. But, this repeater works as a transponder. That means, it changes the
frequency band of the transmitted signal from the received one.
The frequency with which, the signal is sent into the space is called as Uplink
frequency. Similarly, the frequency with which, the signal is sent by the transponder is
called as Downlink frequency. The following figure illustrates this concept clearly.
17
The transmission of signal from first earth station to satellite through a channel is
called as uplink. Similarly, the transmission of signal from satellite to second earth
station through a channel is called as downlink.
Cellular Telephony:
Transmitting:
To place a call from a mobile phone, the caller enters a code of 9 digits and pressed
a send buttons.The mobile phone scans the band, seeking a setup channel.It sends
the phone number to the closest cell office using that channel.The cell office relays
the data to the MTSO.The MTSO sends the data to the telephone central office. IF
the called party is available, a connection is made and the result is relayed to the
MTSO.The MTSO assigns an unused voice channel to the call and a connection is
established.The mobile phone automatically adjust its tuning to the new channel an
voice communication can begin.
Receiving:
When a land phone places a call to a mobile phone, the telephone office sends the
number to the MTSO.The MTSO searches for the location of the mobile phone by
sending query signals to each cell in a process called paging.One the mobile phone
18
is found, the MTSO transmits a ringing signal.When the mobile phone is answered,
assigns a voice channel to the call, allowing voice communication to begin.
Handoff:
During the conversation, the mobile phone may move from one cell to another.
When it does, the signal may become weak.To solve this problem, the MTSO,
monitors the level of the signal every few seconds.If the strength of the signal is
diminished, the MTSO seeks a new cell that can accommodate the communication
better.
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data,
and applications.
19
o Local Area Network provides higher security.
Wired Personal Area Network: Wired Personal Area Network is created by using the
USB.
20
o In MAN, various LANs are connected to each other through a telephone
exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
o It has a higher range than Local Area Network(LAN).
21
o High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in
turn increases the productivity of our co
Computers understand the language of 0’s and 1’s i.e. digital form. The modem will
modulate the signal into a sine wave. So, this modulated digital signal can easily run
over the telephone lines. Then the signal will reach the IP hub. After this the
demodulation of the signal will take place into digital form. Then you will be
connected to the internet. All these processes are performed by modem at extremely
high speeds. The speed of the modem depends upon the number of the available
access lines and the technology of the modem.
A modem may also include some or all of the features and specifications listed
below.
Computer Protocols:
22
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
23