CN Unit I Part I
CN Unit I Part I
Unit I
Introduction
DATA COMMUNICATIONS
The term telecommunication means communication at a
distance. The word data refers to information presented
in whatever form is agreed upon by the parties creating
and using the data. Data communications are the
exchange of data between two devices via some form of
transmission medium such as a wire cable.
Effectiveness of data communication depends on
4 fundamental characteristics
1.Delivery
2.Accuracy
3.Timeliness
4.Jitter
Figure 1.1 Components of a data communication system
Half-Duplex
•Each station can both transmit and receive, but not at the same
time.
•When one device is sending, the other can only receive, and vice
versa.
•Use the entire capacity for each direction of data transmission.
Full-Duplex(Duplex)
•Both stations can transmit and receive simultaneously.
•Used when both directions is required at all the time.
•The capacity of the channel must be divided between the two
directions.
1-2 NETWORKS
Type of Connection
Point to Point - single transmitter and receiver
Entire capacity of the channel used between two devices
Multipoint - multiple recipients of single transmission
The capacity of the channel is shared, either spatially(If several devices use
the link simultaneously) or temporally(If devices must take turns- timeshared
connection).
Physical Topology
Connection of devices
Type of transmission - unicast, mulitcast, broadcast
Figure 1.3 Types of connections: point-to-point and multipoint
Figure 1.4 Categories of topology
Figure 1.5 A fully connected mesh topology (five devices)
Syntax
Structure or format of the data
Indicates how to read the bits - field delineation
Semantics
Interprets the meaning of the bits
Knows which fields define what action
Timing
When data should be sent and what
Speed at which data should be sent or speed at which it is being
received.
USES OF NETWORKS
1. Business Applications
To design products, write brochures, and do the payroll
Useful for resource sharing – to make all programs, equipment, and especially
data available to anyone on the network without regard to the physical location
of the resource or the user.
Sharing physical resources such as printers, and tape backup systems, is
sharing information
To access relevant information and documents instantly.
Networks called VPNs (Virtual Private Networks) may be used to join the
individual networks at different sites into one extended network.
Many peer-to-peer systems, such BitTorrent, do not have any central database
of content.
Peer-to-peer communication is often used to share music and videos - include
fans sharing public domain music, families sharing photos and movies, and
users downloading public software packages.
Person-to-person communication - E-mail - Twitter service that lets people
send short text messages called ‘‘tweets’’ to their circle of friends or other
willing audiences.
The Internet can be used by applications to carry audio (e.g., Internet radio
stations) and video (e.g., YouTube).
Between person-to-person communications and accessing information are
social network applications. – Facebook
Groups of people can work together to create content - Wikipedia, an
encyclopedia anyone can edit, but there are thousands of other wikis
Online Shopping – Flipkart, Amazon, ebay, meesho, etc,.
e-commerce is widely used is access to financial institutions. Many people already
pay their bills, manage their bank accounts, and handle their investments
electronically.
Entertainment – Users can find, buy, and download MP3 songs and DVD-quality movies and
add them to their personal collection. TV shows now reach many homes via IPTV (IP
TeleVision) systems that are based on IP technology instead of cable TV or radio transmissions.
OTT – Over The Top platform
Game playing
Consumer electronic devices are networked - For example, some high-end cameras already have
a wireless network capability and use it to send photos to a nearby display for viewing.
3. Mobile Users
To read and send email, tweet, watch movies, download music, play games, or simply to surf the
Web for information.
Wireless networks are of great value to fleets of trucks, taxis, delivery vehicles, and
repairpersons for keeping in contact with their home base.
Wireless hotspots based on the 802.11 standard - resulting in a patchwork of coverage at cafes,
hotels, airports, schools, trains and planes. Anyone with a laptop computer and a wireless modem
can just turn on their computer on and be connected to the Internet through the hotspot
Wireless networks are of great value to fleets of trucks, taxis, delivery vehicles, and
repairpersons for keeping in contact with their home base.
Wireless networks are also important to the military.
Text messaging or texting – SMS, Nowadays, WhatsApp, Telegram, etc.,
Electronic book readers can download a newly purchased book or the next edition of a magazine
or today’s newspaper wherever they roam.
Electronic picture frames can update their displays on cue with fresh images.
Short text messages from the mobile are used to authorize payments for food in vending
machines, movie tickets, and other small items instead of cash and credit cards.
Wearable computers are another promising application.
TRANSMISSION MODES
4.37
Parallel Transmission
Binary data, consisting of 1s and 0s, may be organized into groups of n bits
each. By grouping, we can send data n bits at a time instead of 1. This is
called parallel transmission.
The mechanism for parallel transmission is a conceptually simple one: Use
n wires to send n bits at one time.
That way each bit has its own wire, and all n bits of one group can be
transmitted with each clock tick from one device to another.
Figure 4.32 shows how parallel transmission works for n =8. Typically, the
eight wires are bundled in a cable with a connector at each end.
Adv Speed: It can increase the transfer speed by a factor of n over serial
transmission.
Disadv cost: It requires n communication lines (wires in the example)
just to transmit the data stream and limited to short distances.
Figure 4.32 Parallel transmission
4.39
Serial Transmission
In serial transmission one bit follows another, so we need only one
communication channel rather than n to transmit data between two
communicating devices.
Serial transmission occurs in one of three ways: asynchronous,
synchronous, and isochronous.
Adv with only one communication channel, serial transmission
reduces the cost of transmission over parallel by roughly a factor of n.
Since communication within devices is parallel, conversion devices are
required at the interface between the sender and the line (parallel-to-serial)
and between the line and the receiver (serial-to-parallel).
Figure 4.33 Serial transmission
4.41
Asynchronous Transmission
Without synchronization, the receiver cannot use timing to predict when the
next group will arrive.
To alert the receiver to the arrival of a new group, an extra bit is added to
the beginning of each byte. This bit, usually a 0, is called the start bit.
To let the receiver know that the byte is finished, 1 or more additional bits
are appended to the end of the byte. These bits, usually 1s, are called stop
bits.
In addition, the transmission of each byte may then be followed by a gap of
varying duration.
This gap can be represented either by an idle channel or by a stream of
additional stop bits.
For example, the connection of a keyboard to a computer is a natural
application for asynchronous transmission.
Figure 4.34 Asynchronous transmission
4.43
Note
4.44
Note
4.45
Synchronous Transmission
In synchronous transmission, the bit stream is combined into longer
"frames," which may contain multiple bytes.
Each byte, however, is introduced onto the transmission link without a gap
between it and the next one.
It is left to the receiver to separate the bit stream into bytes for decoding
purposes.
Timing becomes very important, because the accuracy of the received
information is completely dependent on the ability of the receiving device
to keep an accurate count of the bits as they come in.
Adv Speed
For this reason, it is more useful for high-speed applications such as the
transmission of data from one computer to another.
Byte synchronization is accomplished in the data link layer.
Here, there may be uneven gaps between frames.
Figure 4.35 Synchronous transmission
4.47
Note
4.48
Isochronous Transmission
In real-time audio and video, in which uneven delays between
frames are not acceptable, synchronous transmission fails.
For example, TV images are broadcast at the rate of 30 images
per second; they must be viewed at the same rate.
If each image is sent by using one or more frames, there should
be no delays between frames.
For this type of application, synchronization between
characters is not enough; the entire stream of bits must be
synchronized.
The isochronous transmission guarantees that the data arrive at
a fixed rate.
NETWORK HARDWARE
Broadcast Networks:
In contrast, on a broadcast network, the communication channel is shared by all the machines on the network; packets sent
by any machine are received by all the others.
An address field within each packet specifies the intended recipient.
Upon receiving a packet, a machine checks the address field. If the packet is intended for the receiving machine, that
machine processes the packet; if the packet is intended for some other machine, it is just ignored.
A wireless network is a common example of a broadcast link, with communication
shared over a coverage region that depends on the wireless channel and the
transmitting machine.
Broadcast systems usually also allow the possibility of addressing a packet to all
destinations by using a special code in the address field.
When a packet with this code is transmitted, it is received and processed by every
machine on the network. This mode of operation is called broadcasting.
Some broadcast systems also support transmission to a subset of the machines,
which known as multicasting.
Scale Distance
Fig. Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet.
In most cases, each computer talks to a device in the ceiling as shown in Fig.(a). This
device, called an AP (Access Point), wireless router, or base station, relays packets
between the wireless computers and also between them and the Internet.
There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi,
which has become very widespread. It runs at speeds anywhere from 11 to hundreds of
Mbps.
Wired LANs use a range of different transmission technologies.
Most of them use copper wires, but some use optical fiber.
LANs are restricted in size, which means that the worst-case transmission time is bounded
and known in advance.
Typically, wired LANs run at speeds of 100 Mbps to 1 Gbps, have low delay
(microseconds or nanoseconds), and make very few errors.
The topology of many wired LANs is built from point-to-point links.
IEEE 802.3, popularly called Ethernet, is, by far, the most common type of wired LAN.
Fig. (b) shows a sample topology of switched Ethernet.
Each computer speaks the Ethernet protocol and connects to a box called a switch with a
point-to-point link.
A switch has multiple ports, each of which can connect to one computer. The job of the
switch is to relay packets between computers that are attached to it, using the address in
each packet to determine which computer to send it to.
To build larger LANs, switches can be plugged into each other using their
ports.
It is also possible to divide one large physical LAN into two smaller logical
LANs.
Sometimes, the layout of the network equipment does not match the
organization’s structure.
For example, the engineering and finance departments of a company might
have computers on the same physical LAN because they are in the same
wing of the building but it might be easier to manage the system if
engineering and finance logically each had its own network Virtual LAN or
VLAN.
In this design each port is tagged with a ‘‘color,’’ say green for engineering
and red for finance.
The switch then forwards packets so that computers attached to the green
ports are separated from the computers attached to the red ports.
Broadcast packets sent on a red port, for example, will not be received on a
green port, just as though there were two different LANs.
A switched Ethernet is a modern version of the original Ethernet design
that broadcast all the packets over a single linear cable. At most one machine
could successfully transmit at a time, and a distributed arbitration
mechanism was used to resolve conflicts.
It used a simple algorithm: computers could transmit whenever the cable
was idle.
If two or more packets collided, each computer just waited a random time
and tried later. We will call that version classic Ethernet.
Both wireless and wired broadcast networks can be divided into static and
dynamic designs, depending on how the channel is allocated.
A typical static allocation would be to divide time into discrete intervals and
use a round-robin algorithm, allowing each machine to broadcast only when
its time slot comes up.
Static allocation wastes channel capacity when a machine has nothing to say
during its allocated slot, so most systems attempt to allocate the channel
dynamically (i.e., on demand).
Dynamic allocation methods for a common channel are either centralized or decentralized.
In the centralized channel allocation method, there is a single entity, for example, the base
station in cellular networks, which determines who goes next.
It might do this by accepting multiple packets and prioritizing them according to some
internal algorithm.
In the decentralized channel allocation method, there is no central entity; each machine
must decide for itself whether to transmit.
Characteristics
– small size
– transmission technology
• single cable (single channel)
• 10Mbps ~ 10Gb/s
• 10Gb/s : 10,000,000.000 bps
– topology:
• bus
– Ethernet (IEEE 802.3): 10 or 100 Mbps (10Gb/s)
• ring
– IBM token ring (IEEE 802.5): 4 or 16 Mbps
• Wireless broadcast
2. Metropolitan Area Network (MAN)
A MAN (Metropolitan Area Network) covers a city.
The best-known examples of MANs are the cable television networks
available in many cities.
These systems grew from earlier community antenna systems used in areas
with poor over-the-air television reception.
In those early systems, a large antenna was placed on top of a nearby hill and
a signal was then piped to the subscribers’ houses.
The second variation is that the subnet may be run by a different company.
The subnet operator is known as a network service provider and the offices are its
customers. This structure is shown in Fig. 2.
Fig.1 WAN using a virtual private network.
The subnet operator will connect to other customers too, as long as they can
pay and it can provide service.
Since it would be a disappointing network service if the customers could
only send packets to each other, the subnet operator will also connect to
other networks that are part of the Internet.
Such a subnet operator is called an ISP (Internet Service Provider) and the
subnet is an ISP network.
Its customers who connect to the ISP receive Internet service.
Fig.2 WAN using as an ISP network.
In most WANs, the network contains many transmission lines, each connecting a
pair of routers.
If two routers that do not share a transmission line wish to communicate, they
must do this indirectly, via other routers.
There may be many paths in the network that connect these two routers. How the
network makes the decision as to which path to use is called the routing
algorithm.
How each router makes the decision as to where to send a packet next is called
the forwarding algorithm.
Other kinds of WANs make heavy use of wireless technologies.
In satellite systems, each computer on the ground has an antenna through which it can
send data to and receive data from to a satellite in orbit.
All computers can hear the output from the satellite, and in some cases they can also
hear the upward transmissions of their fellow computers to the satellite as well.
The cellular telephone network is another example of a WAN that uses wireless
technology.
This system has already gone through three generations and a fourth one is on the
horizon.
The first generation was analog and for voice only.
The second generation was digital and for voice only.
The third generation is digital and is for both voice and data.
Each cellular base station covers a distance much larger than a wireless LAN, with a
range measured in kilometers rather than tens of meters.
The base stations are connected to each other by a backbone network that is usually
wired.
The data rates of cellular networks are often on the order of 1 Mbps, much smaller than
a wireless LAN that can range up to on the order of 100 Mbps.
Internetworks
A collection of interconnected networks is called an internetwork or internet.
The Internet uses ISP networks to connect enterprise networks, home networks, and
many other networks.