Data Communication Basics Guide
Data Communication Basics Guide
-1
UNIT:1
Fundamentals of Data Communication and Computer Network
[12 Marks]
________________________________________________________
Contents:
1.1 process of data communication and its components: Transmitter
,Receiver,Medium,Message,Protocol
1.2 Protocols, Standards,Standard Organizations, Bandwidth,Data Transmission Rate, Baud
Rate and Bits per seconds.
1.3 Modes of Communicatio(Simplex,Half duplex,Full Duplex)
1.4 Analog Signal and Digital signal,Analog and Digital transmission: Analog To Digital
,Digital To Analog Conversion
1.5 Fundamental Of Computer Network: Defination ,Need Of Computer Network,
Applications, Network Benefits.
1.6 Classification Of Network:LAN,WAN,MAN.
1.7 Network Architecture: Peer To Peer, Client Server Network.
________________________________________________________
Course Outcome:
Analyze the functioning of Data communication and Computer Network
References:
a. www.nptelvideos.in/2012/11/data-communication.html
b.http://www.myreadingroom.co.in/notes-and-studymaterial/68-den/750-analog-to-analog-
conversion-techniques.html
c. http://www.tutorial reports.com/wireless/wlanwifi/wifi_architecture.php
d. http://standards.ieee.org/about/get/802/802.11.html
e. www.tutorialspoint.com/data_communication_computer_network/
f. http://www.studytonight.com/computer-networks/overview-of-computer-networks
MRS.S.S. KADAM 1
Data Communication and Computer Network (22414) Unit No.-1
Unit 1
Fundamentals of Data Communication and Computer Network
(Marks:12)
MRS.S.S. KADAM 2
Data Communication and Computer Network (22414) Unit No.-1
1.2 PROTOCOL: -
A Protocol is set of rules and conventions that governs data communications . -The sender
and receiver , the two key parties in data communication , must agree on common set of
rules ,i.e. protocols before they can communicate with each other.
STANDARDS IN NETWORKING:
Standards provide guidelines to product manufacturers and vendors to ensure national and
international interconnectivity. Data communications standards are classified into two
categories:
1. De facto Standard
1. These are the standards that have been traditionally used and mean by fact or by
convention
2. These standards are not approved by any organized body but are adopted by widespread
use.
2. De jure standard
It means by law or by regulation. o These standards are legislated and approved by an body
that is officially recognized.
BANDWIDTH OF A SIGNAL –
Bandwidth can be defined as the portion of the electromagnetic spectrum occupied by the
signal. -It may also be defined as the frequency range over which a signal is transmitted.
Different types of signals have different bandwidth.
-Ex. Voice signal, music signal, etc Bandwidth of analog and digital signals are calculated
in separate ways.
-Analog signal bandwidth is measured in terms of its frequency (hz)
-But digital signal bandwidth is measured in terms of bit rate (bits per second,
bps)Bandwidth of signal is different from bandwidth of the medium/channel
BANDWIDTH OF A CHANNEL
-A channel is the medium through which the signal carrying information will be passed.
-In terms of analog signal, bandwidth of the channel is the range of frequencies that the
channel can carry.
- In terms of digital signal, bandwidth of the channel is the maximum bit rate supported by
the channel. i.e. the maximum amount of data that the channel can carry per second
MRS.S.S. KADAM 3
Data Communication and Computer Network (22414) Unit No.-1
Two devices communicate with each other by sending and receiving data.
The data can flow between the two devices in the following ways.
1. Simplex
2. Half Duplex
3. Full Duplex
Modes of Communication
1. Simplex: -
In Simplex, communication is unidirectional Only one of the devices sends the data and
the other one only receives the data. -Example: in the above diagram: a CPU send data
while a monitor only receives data
2. Half Duplex:
MRS.S.S. KADAM 4
Data Communication and Computer Network (22414) Unit No.-1
-In half duplex both the stations can transmit as well as receive but not at the same time.
-When one device is sending other can only receive and vice versa (as shown in figure
above.)
Example: A walkie-talkie.
3. Full Duplex:
-In Full duplex mode, both stations can transmit and receive at the same time.
-Example: mobile phone
1.4 Signals:
-Computer networks are designed to transfer data from one point to another.
-During transit data is in the form of electromagnetic signals.
- Hence it is important to study data and signals before we move to further concepts
in data communication.
Signal-Signal are generated as physical representations of Data.
signal is a function of time and location.
Digital Signal:-
refers to information that has discrete states Digital data take on discrete values. It takes
the form of pulses, where we have something or nothing (i.e. 0 or 1) can be used to plot
a digital signal. Information can also be explained in the form of a digital signal.
A digital signal can be explained with the help of following points:
MRS.S.S. KADAM 5
Data Communication and Computer Network (22414) Unit No.-1
Definition:- A digital is a signal that has discrete values. The signal will have value
that is not continuous
Baud Rate It is the rate of Signal Speed, i.e. the rate at which the signal changes. A
digital signal with two levels ‘0‘ & ‘1‘ will have the same baud rate and bit rate .
MRS.S.S. KADAM 6
Data Communication and Computer Network (22414) Unit No.-1
MRS.S.S. KADAM 7
Data Communication and Computer Network (22414) Unit No.-1
MRS.S.S. KADAM 8
Data Communication and Computer Network (22414) Unit No.-1
• Information Sharing
• Resource Sharing
1.Sharing hardware resources
2.Sharing software resources
• Facilitating Centralized management
1.management of software
2.Maintaining the network
3.Backing up data
MRS.S.S. KADAM 9
Data Communication and Computer Network (22414) Unit No.-1
MRS.S.S. KADAM 10
Data Communication and Computer Network (22414) Unit No.-1
MRS.S.S. KADAM 11
Data Communication and Computer Network (22414) Unit No.-1
• Client –Server network uses centralized management system., where decision are made in
central location
• There are two types of computer used in client server network.
1. Client
2. Server
• In client-Server network , certain computers act as servers and others act as client.
• Server is simply a computer that has the network resources and provides services to other
computer when they request for it.
• A client is the computer running a program and request the services from a server.
• Server is more powerful than clients.
• Server has more priority than client due to storage, speed or disk space.
• Server provides security and administration of a network.
MRS.S.S. KADAM 12
Data Communication and Computer Network (22414) Unit No.-1
• Functions of Server:
1. Accept the query which is coming from Client
2. Process Query 3. Send Response to the Client
• Functions of Client:
1. Client place a request on the server. i.e. ask the services from Server
2. Use the services
MRS.S.S. KADAM 13
Data Communication and Computer Network (22414) Unit No.-1
Types of Server :
1. File Server
2. Print Server
3. Application Server
4. Message Server
5. Database Server
1.File Server :
2.Print Server :
MRS.S.S. KADAM 14
Data Communication and Computer Network (22414) Unit No.-1
• Print server manages the printing functions on the network. It means that print server is used
for controlling and managing printing on the network.
• Print server provides various print and fax services. For printing, print server uses print
queue.
3.Application Server :
• With the help of application server, the expensive software can be shared in a network
4. Message Server :
• A message server is middle ware program that handles messages that are sent for use by
other programs using messaging application program interface.
•It is used to co-ordinate the interaction between users, documents and applications.
MRS.S.S. KADAM 15
Data Communication and Computer Network (22414) Unit No.-1
• This interaction can be in different forms like audio, video, binary, text or graphics. File
server cannot handle all those things, so message server came into the picture
5. Database Server :
MRS.S.S. KADAM 16
Data Communication and Computer Network (22414) Unit No.-1
• In this network, decision are made locally and resources are managed according to
the needs.
• In Peer to Peer network every computer is equal and works as a Client and Server.
MRS.S.S. KADAM 17
Data Communication and Computer Network (22414) Unit No.-1
MRS.S.S. KADAM 18
Data Communication and Computer Network (22414) UNIT 2
UNIT:2
Transmission Media and Switching
(Marks16)
________________________________________________________
Contents:
2.1 Communication Media; Guided Transmission Media-Twisted pair Cable, Coaxial Cable,
Fiber-Optic Cable
2.5 Switching: Circuit Switched Networks Packet Switched Networks. Difference between
Circuit Switched Networks and Packet Switched Networks.
______________________________________________________________________________
Course Outcome:
Analyze the functioning of Data communication and Computer Network
References:
a. www.nptelvideos.in/2012/11/data-communication.html
b.http://www.myreadingroom.co.in/notes-and-studymaterial/68-den/750-analog-to-analog-conversion-
techniques.html
c. http://www.tutorial reports.com/wireless/wlanwifi/wifi_architecture.php
d. http://standards.ieee.org/about/get/802/802.11.html
e. www.tutorialspoint.com/data_communication_computer_network/
f. http://www.studytonight.com/computer-networks/overview-of-computer-networks
g. https://www.javatpoint.com/multiplexing-in-computer-network
MRS.S.S. KADAM 1
Data Communication and Computer Network (22414) UNIT 2
1. Transmission media are the physical pathways that connect computer, other device, in a
computer network.
Or
1. Transmission media is the medium over which information travels from the sender to
receiver.
Transmission media is a pathway that carries the information from sender to receiver. We use
different types of cables or waves to transmit data. Data is transmitted normally through
electrical or electromagnetic signals.
Transmission media :- Guided Transmission Media uses a cabling system that guides the data
signals along a specific path.
Guided transmission media uses a cabling system that guides the data signals along a specific
path. Guided media is the wired media.
MRS.S.S. KADAM 2
Data Communication and Computer Network (22414) UNIT 2
Unguided Transmission Media :-The wireless media is also called as unguided media .
• Types of medium
• Number of conductors
• Flexibility
• Required Speed
• Distance
• Cost
• Ease of installation and maintenance
The data transmission capabilities of various Medias vary differently depending upon the
various factors. These factors are:
1. Bandwidth. It refers to the data carrying capacity of a channel or medium. Higher bandwidth
communication channels support higher data rates.
2. Radiation. It refers to the leakage of signal from the medium due to undesirable electrical
characteristics of the medium.
3. Noise Absorption. It refers to the susceptibility of the media to external electrical noise that
can cause distortion of data signal.
4. Attenuation. It refers to loss of energy as signal propagates outwards. The amount of energy
lost depends on frequency. Radiations and physical characteristics of media contribute to
attenuation.
MRS.S.S. KADAM 3
Data Communication and Computer Network (22414) UNIT 2
1. Co-axial cable
2. Twisted Pair Cable
3. Optical Fiber cable
Twisted-pair cable is a type of cabling that is used for telephone communications and most
modern Ethernet networks. A pair of wires forms a circuit that can transmit data. The pairs are
twisted to provide protection against crosstalk, the noise generated by adjacent pairs. When
electrical current flows through a wire, it creates a small, circular magnetic field around the wire.
When two wires in an electrical circuit are placed close together, their magnetic fields are the
exact opposite of each other. Thus, the two magnetic fields cancel each other out. They also
cancel out any outside magnetic fields. Twisting the wires can enhance this cancellation effect.
Using cancellation together with twisting the wires, cable designers can effectively provide self-
shielding for wire pairs within the network media.
MRS.S.S. KADAM 4
Data Communication and Computer Network (22414) UNIT 2
UTP Cable
UTP cable is a medium that is composed of pairs of wires . UTP cable is used in a variety of
networks. Each of the eight individual copper wires in UTP cable is covered by an insulating
material. In addition, the wires in each pair are twisted around each other.
UTP cable often is installed using a Registered Jack 45 (RJ-45) connector . The RJ-45 is an eight-
wire connector used commonly to connect computers onto a local-area network (LAN), especially
Ethernets.
• In the beginning, the wires were kept parallel. However, this resulted in far greater levels
of noise. Hence, wires were then twisted.
• Twisting of wires will reduce the effect of noise or external interference.
• Number of twists per unit length will determine the quality of cable. More twist means
better quality.
Characteristics of UTP
• Light weight
• Low cost medium.
• Can support data rate of several mbps
• Installation is easy
MRS.S.S. KADAM 5
Data Communication and Computer Network (22414) UNIT 2
• Category 1—Used for telephone communications. Not suitable for transmitting data.
• Category 2—Capable of transmitting data at speeds up to 4 megabits per second (Mbps).
• Category 3—Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps.
• Category 4—Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps.
• Category 5—Can transmit data at speeds up to 100 Mbps.
• Category 5e —Used in networks running at speeds up to 1000 Mbps (1 gigabit per second
[Gbps]).
• Category 6—Typically, Category 6 cable consists of four pairs of 24 American Wire Gauge
(AWG) copper wires. Category 6 cable is currently the fastest standard for UTP.
• STP has a metal foil or braided mesh to cover each pair of insulating conductors known as
metal shield.
• STP reduces the interference of the noise but makes the cable bulky and expensive.
• So practically UTP is more used than STP.
• Twisted pair can be either used for analog or digital transmission.
• The bandwidth supported by the wire depends on the thickness of the wire and the distance
travelled.
Characteristics of STP
• Twisted conductors are shielded to reduce noise.
• Low cost medium
• Higher capacity than UTP
Although STP prevents interference better than UTP, it is more expensive and difficult to install.
In addition, the metallic shielding must be grounded at both ends. If it is improperly grounded,
the shield acts like an antenna and picks up unwanted signals. Because of its cost and difficulty
with termination, STP is rarely used in Ethernet networks. STP is primarily used in Europe.
When comparing UTP and STP, keep the following points in mind:
• The speed of both types of cable is usually satisfactory for local-area distances.
MRS.S.S. KADAM 6
Data Communication and Computer Network (22414) UNIT 2
• These are the least-expensive media for data communication. UTP is less expensive than
STP.
• Because most buildings are already wired with UTP, many transmission standards are
adapted to use it, to avoid costly rewiring with an alternative cable type.
2. Co-axial cable:-
The names “coax” comes from its two conductor construction in which the conductors
run concentrically with each othe along axis of the cable.
It has an outer plastic covering containing 2 parallel conductors each having a separate
insulated protection cover. Cable TVs and analog television networks widely use Coaxial
cables. Coaxial cable has a copper core (the inner conductor) with an outer cylindrical
shell for insulation. The outer shield, just under the shell, is the second conductor.
Because they have additional shielding provided by their multiple layers of material,
coaxial cables are less prone to interference and errors than basic low-cost twisted-pair
wires. Coaxial cables cost about three times as much as twisted-pair wires but offer few
additional benefits other than better shielding.
MRS.S.S. KADAM 7
Data Communication and Computer Network (22414) UNIT 2
Inner Conductor:- At the heart of coaxial cable is a inner conductor ,constructed of either pure
copper or copper coated steel or aluminum ,the inner conductor is responsible for transmating
the cable’s signal.
Insulator :- the dielectric insulator’s purpose is two-fold ;first ,it acts as an insulator between the
center conductor and the outer braided/foil shielding . second ,it helps physically hold the center
conductor in the center of the cable .
This is important ,as signal loss can occur if the center conductor strays too close to the outer
area of the cable .
Outer conductor (shield):- It protects the signal from EMI interference. Electromagnetic
interference is often caused by heavy power lines, cell phone signals.
Insulating Sheath (Outer jacket) :- it is generally made out of flexible PVC and serves primarily
to hod the cable together and protect it from the elements .
Advantages:
MRS.S.S. KADAM 8
Data Communication and Computer Network (22414) UNIT 2
• Large bandwidth
• Data losses are small
• High data transfer rate
• Less attenuation
• Easy to install
Disadvantages:
Applications:-
• Analog telephone network
• Digital telephone network
• Ethernet LAN
• Cable TV
• Digital Transmission
• Analog and digital transmission
It uses the concept of reflection of light through a core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic covering called the cladding. It is used for transmission
of large volumes of data.
MRS.S.S. KADAM 9
Data Communication and Computer Network (22414) UNIT 2
Advantages:
MRS.S.S. KADAM 10
Data Communication and Computer Network (22414) UNIT 2
Disadvantages:
• Medical
Used as light guides, imaging tools and also as lasers for surgeries
• Defense/Government
Used as hydrophones for seismic and SONAR uses, as wiring in aircraft, submarines and
other vehicles and also for field networking
• Data Storage
Used for data transmission
• Telecommunications
Fiber is laid and used for transmitting and receiving purposes
• Networking
Used to connect users and servers in a variety of network settings and help increase the
speed and accuracy of data transmission
• Industrial/Commercial
Used for imaging in hard to reach areas, as wiring where EMI is an issue, as sensory
devices to make temperature, pressure and other measurements, and as wiring in
automobiles and in industrial settings
• Broadcast/CATV
Broadcast/cable companies are using fiber optic cables for wiring CATV, HDTV, internet,
video on-demand and other applications
MRS.S.S. KADAM 11
Data Communication and Computer Network (22414) UNIT 2
MRS.S.S. KADAM 12
Data Communication and Computer Network (22414) UNIT 2
o In unguided media, air is the media through which the electromagnetic energy
can flow easily.
MRS.S.S. KADAM 13
Data Communication and Computer Network (22414) UNIT 2
1.Radio wave
2.Micro wave
3. Infrared signal
Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o In the case of radio waves, the sending and receiving antenna are not aligned,
i.e., the wave sent by the sending antenna can be received by any receiving
antenna.
MRS.S.S. KADAM 14
Data Communication and Computer Network (22414) UNIT 2
o A Radio wave is useful for multicasting when there is one sender and many
receivers.
o Radio transmission is mainly used for wide area networks and mobile cellular
phones.
o Radio waves cover a large area, and they can penetrate the walls.
Microwaves
MRS.S.S. KADAM 15
Data Communication and Computer Network (22414) UNIT 2
o In this case, antennas are mounted on the towers to send a beam to another
antenna which is km away.
o It works on the line of sight transmission, i.e., the antennas mounted on the
towers are the direct sight of each other.
Characteristics of Microwave:
MRS.S.S. KADAM 16
Data Communication and Computer Network (22414) UNIT 2
Advantages Of Microwave:
o It is free from land acquisition as it does not require any land for the installation
of cables.
o A satellite is a physical object that revolves around the earth at a known height.
MRS.S.S. KADAM 17
Data Communication and Computer Network (22414) UNIT 2
The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth station.
o The transmission cost of the satellite is independent of the distance from the
centre of the coverage area.
o It is easy to install.
o Satellite designing and development requires more time and higher cost.
o The life of the satellite is about 12-15 years. Due to this reason, another launch
of the satellite has to be planned before it becomes non-functional.
Infrared
o An infrared transmission is a wireless technology used for communication over
short ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell
phones, TV remote operation, data transfer between a computer and cell phone
resides in the same closed area.
Characteristics Of Infrared:
MRS.S.S. KADAM 18
Data Communication and Computer Network (22414) UNIT 2
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared communication is unreliable outside the building because the sun rays
will interfere with the infrared waves.
2.4 Multiplexing:
Multiplexing is a technique used to combine and send the multiple data streams over a
single medium. The process of combining the data streams is known as multiplexing
and hardware used for multiplexing is known as a multiplexer.
Why Multiplexing?
o The transmission medium is used to send the signal from sender to receiver. The
medium can only have one signal at a time.
o If there are multiple signals to share one medium, then the medium must be
divided in such a way that each signal is given some portion of the available
bandwidth. For example: If there are 10 signals and bandwidth of medium is100
units, then the 10 unit is shared by each signal.
MRS.S.S. KADAM 19
Data Communication and Computer Network (22414) UNIT 2
History of Multiplexing
o Multiplexing technique is widely used in telecommunications in which several
telephone calls are carried through a single wire.
o Multiplexing originated in telegraphy in the early 1870s and is now widely used
in communication.
Concept of Multiplexing
o The 'n' input lines are transmitted through a multiplexer and multiplexer
combines the signals to form a composite signal.
Advantages of Multiplexing:
o More than one signal can be sent over a single medium.
Multiplexing Techniques
Multiplexing techniques can be classified as:
MRS.S.S. KADAM 20
Data Communication and Computer Network (22414) UNIT 2
o The input signals are translated into frequency bands by using modulation
techniques, and they are combined by a multiplexer to form a composite signal.
o The main aim of the FDM is to subdivide the available bandwidth into different
frequency channels and allocate them to different devices.
o Using the modulation technique, the input signals are transmitted into frequency
bands and then combined to form a composite signal.
o The carriers which are used for modulating the signals are known as sub-
carriers. They are represented as f1,f2..fn.
MRS.S.S. KADAM 21
Data Communication and Computer Network (22414) UNIT 2
Advantages of FDM:
Disadvantages of FDM:
Applications of FDM:
MRS.S.S. KADAM 22
Data Communication and Computer Network (22414) UNIT 2
o Wavelength Division Multiplexing is same as FDM except that the optical signals
are transmitted through the fiber optic cable.
o It is used to utilize the high data rate capability of fiber optic cable.
o Optical signals from different source are combined to form a wider band of light
with the help of multiplexer.
o Prism can perform a role of multiplexer by combining the various optical signals
to form a composite signal, and the composite signal is transmitted through a
fiber optical cable.
MRS.S.S. KADAM 23
Data Communication and Computer Network (22414) UNIT 2
o In TDM, the signal is transmitted in the form of frames. Frames contain a cycle
of time slots in which each frame contains one or more slots dedicated to each
user.
o It can be used to multiplex both digital and analog signals but mainly used to
multiplex digital signals.
o Synchronous TDM
o Asynchronous TDM
MRS.S.S. KADAM 24
Data Communication and Computer Network (22414) UNIT 2
Synchronous TDM
o A Synchronous TDM is a technique in which time slot is pre assigned to every
device.
o In Synchronous TDM, each device is given some time slot irrespective of the fact
that the device contains the data or not.
o If the device does not have any data, then the slot will remain empty.
o In Synchronous TDM, signals are sent in the form of frames. Time slots are
organized in the form of frames. If a device does not have data for a particular
time slot, then the empty slot will be transmitted.
o The most popular Synchronous TDM are T-1 multiplexing, ISDN multiplexing,
and SONET multiplexing.
cc
MRS.S.S. KADAM 25
Data Communication and Computer Network (22414) UNIT 2
In the above figure, the Synchronous TDM technique is implemented. Each device is
allocated with some time slot. The time slots are transmitted irrespective of whether
the sender has data to send or not.
o The capacity of the channel is not fully utilized as the empty slots are also
transmitted which is having no data. In the above figure, the first frame is
completely filled, but in the last two frames, some slots are empty. Therefore,
we can say that the capacity of the channel is not utilized efficiently.
o The speed of the transmission medium should be greater than the total speed of
the input lines. An alternative approach to the Synchronous TDM is
Asynchronous Time Division Multiplexing.
Asynchronous TDM
o An asynchronous TDM is also known as Statistical TDM.
o An asynchronous TDM is a technique in which time slots are not fixed as in the
case of Synchronous TDM. Time slots are allocated to only those devices which
have the data to send. Therefore, we can say that Asynchronous Time Division
multiplexor transmits only the data from active workstations.
o In Asynchronous TDM, total speed of the input lines can be greater than the
capacity of the channel.
o Asynchronous Time Division multiplexor accepts the incoming data streams and
creates a frame that contains only data with no empty slots.
o In Asynchronous TDM, each slot contains an address part that identifies the
source of the data.
o The difference between Asynchronous TDM and Synchronous TDM is that many
slots in Synchronous TDM are unutilized, but in Asynchronous TDM, slots are
fully utilized. This leads to the smaller transmission time and efficient utilization
of the capacity of the channel.
MRS.S.S. KADAM 26
Data Communication and Computer Network (22414) UNIT 2
o In Synchronous TDM, if there are n sending devices, then there are n time slots.
In Asynchronous TDM, if there are n sending devices, then there are m time
slots where m is less than n (m<n).
o The number of slots in a frame depends on the statistical analysis of the number
of input lines.
In the above diagram, there are 4 devices, but only two devices are sending the data,
i.e., A and C. Therefore, the data of A and C are only transmitted through the
transmission line.
The above figure shows that the data part contains the address to determine the source
of the data.
MRS.S.S. KADAM 27
Data Communication and Computer Network (22414) UNIT 2
2.5 Switching
o When a user accesses the internet or another computer network outside their
immediate location, messages are sent through the network of transmission
media. This technique of transferring the information from one computer
network to another network is known as switching.
o Network switches operate at layer 2 (Data link layer) in the OSI model.
o Switching is transparent to the user and does not require any configuration in
the home network.
o A Switch is used to transfer the data only to the device that has been addressed.
It verifies the destination address to route the packet appropriately.
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The switching
technique will decide the best route for data transmission.
MRS.S.S. KADAM 28
Data Communication and Computer Network (22414) UNIT 2
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated path
between sender and receiver.
o In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
o A complete end-to-end path must exist before the communication takes place.
o In case of circuit switching technique, when any user wants to send the data,
voice, video, a request signal is sent to the receiver then the receiver sends back
the acknowledgment to ensure the availability of the dedicated path. After
receiving the acknowledgment, dedicated path transfers the data.
o Circuit establishment
o Data transfer
o Circuit Disconnect
MRS.S.S. KADAM 29
Data Communication and Computer Network (22414) UNIT 2
o Once the dedicated path is established, the only delay occurs in the speed of
data transmission.
Message Switching
o Message Switching is a switching technique in which a message is transferred as
a complete unit and routed through intermediate nodes at which it is stored and
forwarded.
o Message switches are programmed in such a way so that they can provide the
most efficient routes.
MRS.S.S. KADAM 30
Data Communication and Computer Network (22414) UNIT 2
o Each and every node stores the entire message and then forward it to the next
node. This type of network is known as store and forward network.
o Data channels are shared among the communicating devices that improve the
efficiency of using available bandwidth.
o The size of the message which is sent over the network can be varied. Therefore,
it supports the data of unlimited size.
o The message switches must be equipped with sufficient storage to enable them
to store the messages until the message is forwarded.
o The Long delay can occur due to the storing and forwarding facility provided by
the message switching technique.
Packet Switching
o The packet switching is a switching technique in which the message is sent in
one go, but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given a
unique number to identify their order at the receiving end.
MRS.S.S. KADAM 31
Data Communication and Computer Network (22414) UNIT 2
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend
the message.
MRS.S.S. KADAM 32
Data Communication and Computer Network (22414) UNIT 2
o Call request and call accept packets are used to establish the connection
between sender and receiver.
o In this case, the path is fixed for the duration of a logical connection.
o In the above diagram, A and B are the sender and receiver respectively. 1 and 2
are the nodes.
o Call request and call accept packets are used to establish a connection between
the sender and receiver.
o If the user wants to terminate the connection, a clear signal is sent for the
termination.
MRS.S.S. KADAM 33
Data Communication and Computer Network (22414) UNIT 2
Node takes routing decisions to forward the Node does not take any routing decision.
packets.
Congestion cannot occur as all the packets Congestion can occur when the node is busy,
travel in different directions. and it does not allow other packets to pass
through.
o Reliable: If any node is busy, then the packets can be rerouted. This ensures that
the Packet Switching technique provides reliable communication.
o The protocols used in a packet switching technique are very complex and requires
high implementation cost.
MRS.S.S. KADAM 34
Data Communication and Computer Network (22414) UNIT 2
MRS.S.S. KADAM 35
UNIT:3
[12 Marks]
________________________________________________________
Contents:
Course Outcome:
Analyze the transmission errors with respect to IEEE standards
References:
a. www.nptelvideos.in/2012/11/data-communication.html
b.http://www.myreadingroom.co.in/notes-and-studymaterial/68-den/750-analog-to-analog-conversion-
techniques.html
c. http://www.tutorial reports.com/wireless/wlanwifi/wifi_architecture.php
d. http://standards.ieee.org/about/get/802/802.11.html
e. www.tutorialspoint.com/data_communication_computer_network/
f. http://www.studytonight.com/computer-networks/overview-of-computer-networks
➢ Delay Distortion
➢ Attenuation
➢ Noise
In the chapter we will study various errors that can take place during data transmission, and see
how they can be trapped and corrected
Delay distortion is caused because the signal of varying frequencies travels at different
speeds along the medium. We know that any complex signal can be decomposed into different
sinusoidal signals of different frequencies resulting in a frequency bandwidth for every signal. One
property of signal propagation is that the speed of travel of frequency is the highest at the center of
this bandwidth, and lower at the both ends. Therefore at the receiving end, signals with different
frequencies in a given bandwidth will arrive at different times. If the signal received is measured at
a specific time, they will not measure up to the original signal resulting in its misinterpretation
3.1.2 Attenuation
distance and loses its contents beyond a certain distance. Fig 3.1 Attenuation
Attenuation is very small at short distance. The original signal therefore can be recognized as such
without too much of distortion. Attenuation however increases with distance. This is because some
of the signal energy is absorbed by the medium. Attenuation is also higher at higher
frequencies.Techniques are available to equalize the attenuation for a band of frequencies over a
medium. For telephone lines, this is achieved by using loading coils that change the electrical
properties of the wire to smooth out the effects of attenuation. However it cannot be done away
with. One can use amplifiers to boost the signal, but the amplifier boosts not just the signal, but also
the accompanying noise.
Mrs. S.S.kadam 2 DCC (22414)
3.1.3 Noise
Noise is yet another component that poses a problem in receiving the signal accurately. We
know that a signal travels as an electromagnetic signal through any medium. Electromagnetic energy
that gets inserted somewhere during transmission is called noise. Apart from distortion and
attenuation, noise is one of the major limiting factors in the performance of any communication
system.
In conclusion a signal can get changed over a distance leading to the misinterpretation of the signal
(0 to 1 and vice versa). This can be very dangerous in many situations.
Types of Error:
If the signal is carrying binary data there can be two types of errors: Single-Bit errors and burst
errors. This is shown in fig 3.2.In a single-bit error a bit value of 0 changes to 1 or vice versa.In a
burst error, multiple bits of a binary value are changed
Transmission Error
As we mentioned in a single-bit errors, a single bit of the data unit changes. Thus effectively, either
a 0 bit changes to 1, or a 1 bit changes to 0. Single-bit errors are more likely in the case of parallel
transmission because it is possible that one of the eight wires carrying the bits has become noisy
resultinginto corruption of a single bit for each byte. This can happen in the case of a parallel
transmission between the CPU and memory inside a computer.
In case of serial transmission the duration of noise is usually longer than that of a single bit. Hence the
chances of corrupting only a single bit are less. In contrast a burst changes at least two bits during
data transmission because of errors. Note that burst errors can change any two or more bits in a
transmission. These bits need not necessarily be adjacent bits. Burst errors are more likely in serial
transmission, because the duration of noise is longer, which causes multiple bits to be corrupted
The Vertical Redundancy Check (VRC), also known as parity check, is quite simple. It is the
least expensive technique as well as in this method, the sender appends a single additional bit, called
the parity bit, to the message before transmission it. There are two schemes in this odd parity and
even parity. In the odd parity scheme, given some bits, an additional parity bit is addedin such a
way that the number of 1s in the bit inclusive of the parity bit is odd. In the even parity scheme, the
parity bit is added such that the number of 1s inclusive of the parity bit is even.
For example consider a message string 1100011 that needs to be transmitted. Let us assume the
even parity scheme. The following will now happen.
1) The sender examines this message string and notes that the number of bits containing a value 1
in this message string is 4. Therefore it adds an extra 0 to the end of this message. This extra bit
is called parity bit. This is done by the hardware itself, which is why it is very fast.
2) The sender sends the original bits 1100011 and the additional parity bit 0 together to the receiver.
3) The receiver separates the parity bit from the original bits and it also examines the original bits.
Its sees the original bits as 1100011, and notes that the number of 1s in the message is four i.e.
even.
4) The receiver now computes the parity bit again and compares this computed parity bit with the
0 parity bit received from the sender, it notes that are equal and accepts the bit string as correct.
This is also done by the hardware itself. The process shown in the fig 3.3
In contrast, if the original message was 1010100 the number of 1s in the message would have been
three (old), and therefore, the parity bit would contain a 1.
There is one problem with this scheme. This scheme can only catch a single bit error. If two bits
reverse, this scheme will fail. For instance, if the first two bits in the bit stream shown in fig 3.3
change, we will get a stream 0000011, yielding a parity bit of 0 again, fooling us!
1100011 1100011
Original bit string parity bit Original bit string parity bit Recomputed
parity bit
Recomputed the parity
bit and compares it with
Computes and appends
the one received. A
the parity bit
mismatch indicates
error
Clearly, parity checking can detect single bit errors. However if multiple bits of a message are
changed due to an error (burst), parity checking would not work.Better schemes are required to trap
burst errors.
A block of bits is organized in the form of a list (as rows) in the Longitudinal Redundancy Check
(LRC). Here, for instance, if we want to send 32 bits, we arrange them into a list of four rows. Then
the parity bit for each column is calculated and a new row of eight bits is created. These become the
parity bits for the whole block. An example of LRC is shown in fug 3.4.
Original Data
Mathematical
Sender process on the data
to calculate the CRC
Data CRC
Sender Receiver
Data CRC
(b) Sender sends data and CRC together as a single frame to the receiver
Same Mathematical
Receiver process on the data
to calculate the CRC
Data CRC
(c) Receiver computes its own CRC using the same formula as used by the sender on the data
received by the receiver
Received B Computed
Are these two
Yes ok Accept data as correct
Receiver CRCs the same?
No
The transmission has some errors. Retransmission is required
(d) if the two CRCs match the receiver accepts the transmission, else rejects it
Fig 3.5 The Logical Process of CRC Computation
1) CRC is a very sturdy and better error detection method compared to others. Why? As in the
case of VRC, if two adjacent bits change will the CRC be the same, fooling us? The answer is no. The
algorithm to compute the CRC is so chosen that given the length of the data block in bits there are
only a few and finite number of permutations and combinations for which the CRC is the same. The
possibilities are also normally such that you have to inverse a number of specific and distant bits(e.g.
1, 43, and 91) to get the same CRC (which can fool us). As we know, normally, errors occurs in a
burst, causing many consecutive bits and rarely will exactly the bits required to get the same CRC
change.
2) CRC is normally implemented in hardware rather than in software. This makes this
operation very fast, though a little more expansive. Depending on the method of CRC used,the
corresponding type of modem has to be used. For computing the CRC, two simple hardware
components are used an XOR gate and a shift register using a combination of these two, we can
calculate the CRC for any data.
3) The data to be transmitted is divided into a number of blocks consisting of several bits each.
After this, a block is treated as a mammoth string of 1s and 0s in a binary number. It is then divided
by a prime number and the remainder is treated as CRC. This is the normal method.
Wireless communication is one of the fastest growing technologies. The demand for connecting
devices without cable is increasing everywhere. Wireless LANs are found on college campuses, office
buildings, and public areas. At home, a wireless LAN can connect roaming devices to the Internet.
IEEE 802.11
IEEE has defined the specification for a wireless LAN, called IEEE 802.11, which covers the
physical and data link layers. But before discussing these layers, we describe the architecture of the
protocol in general.
Architecture
The standard defines two kinds of services: the basic service set (BSS) and the extended
service set (ESS).
IEEE 802.11 defines the basic service set (BSS) as the building block of a wireless LAN. A basic service
set is made of stationary or mobile wireless stations and a possible central base station, known as
the access point (AP). Figure 3.6 shows two sets in this standard.
The BSS without an AP is a stand-alone network and cannot send data to other BSSs. It is what is
called an ad hoc architecture. In this architecture, stations can form a network without the need of
an AP; they can locate each other and agree to be part of a BSS. A BSS with an AP is sometimes
referred to as an infrastructure network.
An extended service set (ESS) is made up of two or more BSSs with APs. In this case, the BSSs
are connected through a distribution system, which is usually a wired LAN. The distribution system
connects the APs in the BSSs. IEEE 802.11 does not restrict the distribution system; it can be any IEEE
LAN such as an Ethernet. Note that the extended service set uses two types of stations: mobile and
stationary. The mobile stations are normal stations inside a BSS. The stationary stations are AP
stations that are part of a wired LAN. Figure 3.7 shows an ESS.
When BSSs are connected, we have what is called an infrastructure network. In this network, the
stations within reach of one another can communicate without the use of an AP. However,
communication between two stations in two different BSSs usually occurs via two APs. The idea is
similar to communication in a cellular network if we consider each BSS to be a cell and each AP to be
a base station. Note that a mobile station can belong to more than one BSS at the same time.
Station Types
IEEE 802.11 defines three types of stations based on their mobility in a wireless LAN:
no-transition, BSS-transition, and ESS-transition.
No-Transition Mobility A station with no-transition mobility is either stationary (not moving) or
moving only inside a BSS.
BSS-Transition Mobility A station with BSS-transition mobility can move from one BSS to another,
but the movement is confined inside one ESS.
ESS-Transition Mobility A station with ESS-transition mobility can move from one ESS to another.
However, IEEE 802.11 does not guarantee that communication is continuous during the move.
Bluetooth was originally started as a project by the Ericsson Company. It is named for Harald
Blaatand, the king of Denmark (940-981) who united Denmark and Norway. Blaatand translates to
Bluetooth in English.
Today, Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15
standard. The standard defines a wireless personal- area network (PAN) operable in an area the size
of a room or a hall.
Architecture
Piconets
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight stations, one
of which is called the master; the rest are called slaves. All the slave stations synchronize their clocks
and hopping sequence with the master slave. Note that a piconet can have only one master station.
The communication between the master and the slaves can be one-to-one or one-to-many.Figure
3.8 shows a piconet.
As indicated earlier, a Bluetooth device can be either a master or a slave and any of the devices
within a piconet can be the master. However, the device that establishes the piconet automatically
becomes the master and all the other devices then become slaves. There can be upto seven active
slave(AS) devices active at a time within a single piconet. In addition, as shown in Figure 3.8 (a), a
device may be a standby slave (SS) or a parked slave (PS). Devices in the standby mode cannot
participate in the piconet. A parked slave, however, cannot actively participate in the piconet but is
known by the master and can be reactivated by it. Typically, these are devices that the master has
switched to a low power state to save the power in the batteries of the device.
To utilize the 80 MHz of bandwidth in an efficient way, multiple piconets can be present in a
room/office at the same time. In addition, multiple piconets can be interconnected together to
provide a wider area of coverage. The resulting configuration is then known as a scatternet and a
simple example is shown in Figure 3.8(b).
As we can see, in this example one of the active slave devices is located in the region of the two
overlapping piconets. However, since each piconet has a different pseudo-random hopping
sequence, both piconets can operate concurrently. Hence the slave can become a member ofeither
piconet but not both at the same time. To change its membership, the slave first informs its current
master that it will be unavailable for a specified time. It then proceeds to synchronize, with the
master of the other piconet in the described way
In practice, creating more piconets in the same area leads to a degradation in the performance of
each piconet. This is because the probability of the same carrier frequency is being used at the same
time increases so resulting in the respective bit in the bit stream being corrupted.
Cellular communication is progressing through different generations. Initially we had first generation (1G),
then second generation (2G). This developed into third generation (3G) and now that has advanced into
fourth generation (4G) and fifth generation (5G). All of the names refer to the generation of wireless
communications that the technology has gone through.
1G ‐ First Generation
This was the first generation of cell phone technology. The very first generation of commercial cellular
network was introduced in the late 70's with fully implemented standards being established throughout the
80's.
1G is an analog technology and the phones generally had poor battery life and voice quality was large
without much security, and would sometimes experience dropped calls. These are the analog
telecommunications standards that were introduced in the 1980s and continued until being replaced by 2G
digital telecommunications. The maximum speed of 1G is 2.4 Kbps.
2G ‐ Second Generation
Cell phones received their first major upgrade when they went from 1G to 2G. The main difference between
the two mobile telephone systems (1G and 2G), is that the radio signals used by 1G network are analog,
while 2G networks are digital. Main motive of this generation was to provide secure and reliable
communication channel. It implemented the concept of CDMA and GSM. Provided small data service like
sms and mms. Second generation 2G cellular telecom networks were commercially launched in 1991.
During 2G Cellular phones are used for data also along with voice. The advance in technology from 1G to
2G introduced many of the fundamental services that we still use today, such as
• SMS
• internal roaming
• conference calls
• call hold and
• billing based on services e.g. charges based on long distance calls and real time billing.
The max speed of 2G with General Packet Radio Service (GPRS) is 50 Kbps or 1 Mbps with Enhanced Data
Rates for GSM Evolution (EDGE).
3G ‐ Third Generation
This generation set the standards for most of the wireless technology we have come to know and love. Web
browsing, email, video downloading, picture sharing and other smartphone technology were introduced in
the third generation. Introduced commercially in 2001, the goals set out for third generation mobile
communication were to facilitate greater voice and data capacity, support a wider range of applications, and
increase data transmission at a lower cost.
3G has Multimedia services support along with streaming are more popular. In 3G, Universal access and
portability across different device types are made possible (Telephones, PDA's, etc.). 3G increased the
efficiency of frequency spectrum by improving how audio is compressed during a call, so more
simultaneous calls can happen in the same frequency range. 3G technology is capable of allowing internet
speeds that can reach 7 Mbps, but this speed is unrealistic and is often approximately 2 to 3 Mbps.
Mrs. S.S.kadam 12 DCC (22414)
People felt that the speeds reached by 3G technology were better, but that speed and access could still be
improved regarding the internet and mobile devices. This encouraged the development of 4G technology,
the 4th generation of mobile communication standard.
4G ‐ Fourth Generation
4G is a very different technology as compared to 3G and was made possible practically only because of the
advancements in the technology in the last 10 years. Its purpose is to provide high speed, high quality and
high capacity to users while improving security and lower the cost of voice and data services, multimedia
and internet over IP. Potential and current applications include;
The development of 4G technology provided two main benefits, increased upload and download speeds and
reduced latency. 4G technology is approximately five times (and sometimes more) faster than 3G technology.
This meant that the speed at which files could be downloaded was significantly increased. This increase in
speed meant that files could be downloaded in a much faster time. Typically, with 3G technology, a 2GB file
could take approximately 30 minutes to download. However, with 4G technology that download time could
be potentially cut to approximately 3–4 minutes. This significantly improved the experience of mobile devices
and internet usage for the user.
5G ‐ Fifth Generation
5G is a generation currently under development, that's intended to improve on 4G. 5G promises significantly
faster data rates, higher connection density, much lower latency, among other improvements. Some of the
plans for 5G include device‐to‐device communication, better battery consumption, and improved overall
wireless coverage.
5G technology is set to dramatically affect the use of mobile internet. In order to provide 5G access there is
a major restructure occurring on parts of the radio network that is used to transmit data. This restructure is
reported to allow data to be transmitted approximately 100 times faster.
The development from 3G to 4G technology and further developments into 5G technology will enable a
number of advancements. These may include:
UNIT: 4
Course Outcome:
4.2 Network Connecting devices: Hub, Switch, Router, Repeater, Bridge, Gateway, Modem,
Wireless infrastructure Components
References:
a. www.nptelvideos.in/2012/11/data-communication.html
b.http://www.myreadingroom.co.in/notes-and-studymaterial/68-den/750-analog-to-analog-
conversion-techniques.html
c. http://www.tutorial reports.com/wireless/wlanwifi/wifi_architecture.php
d. http://standards.ieee.org/about/get/802/802.11.html
e. www.tutorialspoint.com/data_communication_computer_network/
f. http://www.studytonight.com/computer-networks/overview-of-computer-networks
1
DCC (22414) MRS. S.S.KADAM
Depending on the manner of connecting the computers, we can have different network
topologies:
1.Bus Topology:
2
DCC (22414) MRS. S.S.KADAM
Bus topology is very simple and temporary. All computers are connected to central cable called
as bus. Bus acts as a backbone to link all the devices in a network.
All nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable. Tap is nothing but a connector that connects
the node to bus via drop line. When one computer sends a signal up the cable, all the computers
on the network receive the information, but one with the address that matches that one encoded
in the message accept the information while all the other reject the message.
Bus topology is also called as linear topology because the computers are connected in a straight
line.
Bus topology is passive topology network. Termination is an important issue in bus network.
The electrical signal from a transmitting computer is free to travel the entire length of the cable.
Without the termination, when the signal reaches the end of the wire, it bounces back and
travels back up the wire. When a signal echoes back and forth along an unterminated bus, it is
called ringing. The terminator absorbs the electrical energy and stops the reflections.
The speed of bus topology is slow because only one computer can send a message at a time. A
computer must wait until the bus is free before it can transmit. Bus topology is suitable for a
small network.
In this topology, signal travels along the backbone (bus). Some of its energy is transformed
into heat. Therefore, it becomes weaker and weaker as it has to travel farther and farther. For
this reason, there is a limit on the number of taps a bus can support and on the distance between
those taps.
Advantages:
Disadvantages
i.Only one can transmit at a time, hence communication becomes slightly slow.
3
DCC (22414) MRS. S.S.KADAM
ii.If there is problem with the cable, the entire network breaks down.
iii.Proper termination is required.
iv.Limited cable length and number of stations.
v.Performance degrades as additional computers are added or on heavy traffic.
vi.It is suitable for temporary or small network (It works best with limited number of nodes).
2. Ring Topology
In ring topology, each computer is connected to the next computer, with the last one connected
to the first. It means that, all nodes are connected to each other in such a way that they make a
closed loop.
Data travels around the network, in one direction. There is no termination because there is no
end to the ring.
Ring topology uses token passing concept. Short message called as token sending and
receiving data takes place with the help of Token. Token is passed around the ring until a
computer wishes to send information to another computer. Token contains a piece of
information which along with data is sent by the source computer.
This token then passes to the next node, which checks if the signal is intended for it. If yes, it
receives it and passes the empty token into the network, otherwise passes token along with the
data to next node. This process continues until the signal reaches its intended destination.
The nodes with token are only allowed to send data. Other nodes have to wait for an empty
token to reach them. This network is usually found in offices, schools and small buildings.
Ring topology is active network, because each computer retransmits what it receives from the
previous computer. In ring topology, data is transferred in a sequential manner bit by bit around
a ring. Then each repeater regenerates and retransmits each bit.
Repeater acts as the device attachment point. Data insertion, data reception and data removal,
all these functions are performed by the repeater. The failure of a single node can disturb
network operation. To implement a ring network, one typically uses FDDI, SONET or token
Ring technology.
Advantages:
i.This type of network topology is very organized. Each node gets to send the data when it
receives an empty token. This helps to reduces chances of collision.
ii.Requires less cable.
4
DCC (22414) MRS. S.S.KADAM
iii.Less expensive.
iv.The ring topology works well where there is no central-site computer system.
v.Easy to identify the problem, even if the entire network shuts down.
vi.Suitable for small network.
Disadvantages
i.The failure of one machine will cause the entire network to fail.
ii.Only one machine can transmit on the network at a time.
iii.Traffic flow is only in one direction.
iv.Speed is very slow.
v.Adding/removing the computers, disturbs the network activity.
3. Star Topology:
In star topology, each computer is connected to a central unit called hub. Each computer on a
star network communicates with a central hub that resends the message either to all the
computers or to the destination computer.
If one device wants to send data to another, it sends the data to the hub (controller), which then
relays the data to the other connected device.
It means that, the data is transmitted in the form of electronic signal, the signal is transferred
from the PC to the HUB and then the hub is responsible for broadcasting the data.
Thus, the source computer sends the data to the hub. A hub broadcasts the data which is
received by all the computers except the source computer, then the destination address is
checked. If the address gets matched, then that PC accepts the data otherwise it rejects the data.
The hub in star network can be active or passive. An active hub generates the electrical signal
and sends it to all the computers connected to it. Active hub is also called as multiport repeater.
Active hub requires external power supply.
A passive hub is a wiring panel or punch down block which acts as a connection point. It does
not amplify or regenerate the signal. Passive hub does not require electrical power supply.
5
DCC (22414) MRS. S.S.KADAM
All traffic that traverses the network passes through the central hub. The star topology is
considered the easiest topology to design and implement.
Star topology is an active network because it uses hub which can be of intelligent and passive
types. The intelligent hubs need external power supply, electronic components for regeneration
of signal as well as routing it to the required computer.
Star expansion is possible by placing another hub as shown in figure. This arrangement allows
several more computers or hubs to be connected to that hub.
Advantages
i. It is very easy to install, manage and reconfigure.
ii. Cabling cost is very less.
iii. Robustness: If one link fails, only that link is affected.
iv. Easy to add new computer to a star network without disturbing the rest of the network.
iv. Single computer failure does not necessarily bring down the whole star network.
v. Star topology eliminates traffic problem.
vi. It is fast as compared to ring topology.
Disadvantages
i. If central node (hub) goes down, then the entire network goes down.
ii. Cost of network is high, because of hub.
iii. Hubs are difficult to install.
iv. More expensive than bus topology.
Star topology degrades most gracefully in high network load situation. The reason is that with
increased load, there will be a large increase in the number of messages travelling on the
network. There would be a large number of collisions and delays possible for the bus and ring
topologies. Mesh is not suitable for large network.
6
DCC (22414) MRS. S.S.KADAM
4. Mesh Topology
Mesh topology is a network where all the nodes are connected to each other and is a complete
network. It means that each device in mesh topology has a dedicated point-to-point link to
every other device. The term dedicated means that the link carries traffic only between two
devices it connects.
Every node not only sends its own signals but also relays data from other nodes. Mesh topology
is very expensive as there are many redundant connections, thus it is not mostly used in
computer networks. It does not have traffic congestion problem because dedicated links are
being used.
This topology is difficult and expensive, as there are a number of to have redundant connections
to every computer. If one network cable fails, the data always has an alternative path to get its
destination.
7
DCC (22414) MRS. S.S.KADAM
Advantages
i. The use of dedicated link guarantees that each connection can carry its own data load.
Thus, it eliminates traffic problems.
ii. Even if one of the computers fails, there is always an alternative present. So data transfer
doesn’t get affected.
iii. It provides privacy and security when every message travels along a dedicated line, only
the intended recipient sees it. Physical boundaries prevent other users from gaining access to
message.
iv.Point-to-point links make fault identification and fault isolation easy.
v.Expansion and modification in topology can be done without disturbing nodes.
Disadvantages
i.Requires more cable than the other LAN topologies (cabling cost is more).
ii.It is suitable for small network.
iii.Installation and reconnection are difficult.
iv.The hardware required to connect each link (I/O ports and cable) is expensive.
5. Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It is a variation of
a star-topology. It consists of groups of star configured workstations connected to a linear bus
backbone cable. This topology allows for the expansion of an existing network.
The signals that are being transmitted by the root node are received by all the nodes at the
same time. This increases the efficiency of the overall functioning of the network. The tree
network topology can be extended easily to function and there are no limitations to how big it
can be extended. Additional root nodes can be added, and they can be interconnected within
one single network.
Tree has a hierarchy of various hubs, like you have branches in a tree.
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how in
Physical Star network Topology, computers (nodes) are connected by each other through
central hub. And we also saw in Bus Topology, work station devices are connected by the
8
DCC (22414) MRS. S.S.KADAM
common cable called Bus. After understanding these two network configurations, we can
understand tree topology better. In Tree Topology, the number of Star networks is connected
using Bus. This main cable seems like a main stem of a tree, and other star networks as the
branches. It is also called Expanded Star Topology. Ethernet protocol is commonly used in this
type of topology. The diagram below will make it clear.
5. Hybrid Topology:
Hybrid networks use a combination of any two or more topologies, in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
For example a tree network connected to a tree network is still a tree network topology. A
hybrid topology is always produced when two different basic network topologies are
connected. Two common examples for Hybrid network are: star ring network and star bus
network
9
DCC (22414) MRS. S.S.KADAM
1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.
2) Scalable: It’s easy to increase the size of network by adding new components, without
disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given to nodes
where traffic is high as well as where chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can
design it in such a way that strengths of constituent topologies are maximized while there
weaknesses are neutralized. For example we saw Ring Topology has good data reliability
(achieved by use of tokens) and Star topology has high tolerance capability (as each node is
not directly connected to other but through central device), so these two can be used
effectively in hybrid star-ring topology.
1) Complexity of Design: One of the biggest drawbacks of hybrid topology is its design. Its
not easy to design this type of architecture and it’s a tough job for designers. Configuration and
installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These
hubs are different from usual hubs as they need to be intelligent enough to work with different
architectures and should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a
lot of cables; cooling systems, sophisticate network devices, etc.
In network, many computers are connected to one another or to the internet. For such
connections, we need to use the connecting devices. These connecting devices are also called
as network control devices. Network control devices can operate on different layers of the
internet model (OSI Reference model). Different network control devices are connector,
transceivers, hubs, switches, repeaters, bridges, routers, modem and gateways.
10
DCC (22414) MRS. S.S.KADAM
1. Connector:
To connect different computers or devices, we need some transmission medium, such as cable
and to connect these cables between two computers we have to use connectors on both ends of
a cable.
The cables are of different types such as twisted pair cables, co-axial cables or fiber optic
cables. Connectors are totally dependent upon types of cables used in network. Connectors can
be distinguished according to their physical appearance and mating properties, such as jacks
and plugs (mate connectors) or sockets and ports (female connectors).
Network Interface Card is a major factor in determining the speed and performance of a
network. If comes in three basic varieties: 8-bit, 16-bit, and 32 bit. If we increase the number
of bits on NIC, the faster the NIC can transfer data to the network cable.
3. Repeater:
11
DCC (22414) MRS. S.S.KADAM
LAN. It does not connect two LAN or cannot connect two LAN’s of different protocols. As
the distance between two computers increases, it requires long cable. Thus, longer the cable,
the weaker is the signal. This weakening is called attenuation. Repeater installed on a link,
receives the signal before it becomes too weak or corrupted, regenerates original signal and
puts the refreshed copy back onto the link. Repeater is used to expand the boundaries of a Local
Area Network (LAN). Repeater is regenerator, not an amplifier. An amplifier cannot intend
signal and noise. It amplifies equally everything fed into it. Repeater forwards every frame, it
does not filter it.
Advantages
i. It can extend network.
ii. It regenerates desired information.
iii. It is less expensive for expanding network.
Disadvantages
i. It has no filtering capability.
ii. It does not support different network architectures.
iii. It can operate only at the physical layer.
iv. It cannot connect two LAN’s. It connects two segments of the same LAN.
Types of Repeaters
Types of repeaters are as follows:
i. Single port repeater: This repeater has one input and one output. One segment sends signal
to repeater, it boosts and passes to the next signal that is it operates with only two segments.
ii. Multi-port repeater: This repeater has one input and multiple output ports. One segment
sends signal and another connects to cable segments.
iii. Smart repeater: It is similar to a bridge in functionality. In smart repeater packet filtering
is done. It is a hybrid device.
iv. Optical repeater: The repeater which operates optical signal is called optical repeater.
Today multiport repeater is mostly used, and is called as hub.
4. Hub:
12
DCC (22414) MRS. S.S.KADAM
Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When
a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can
see all packets.
Hub serves as a central connection for all of your network equipment and handles a data type
known as frames. Frames carry your data. When a frame is received, it is amplified and then
transmitted on to the port of the destination PC.
In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that
the frame is only destined for one port. The hub has no way of distinguishing which port a
frame should be sent to. Passing it along to every port ensures that it will reach its intended
destination. This places a lot of traffic on the network and can lead to poor network response
times
Types of Hub:
On the basis of its working methods, the Hubs can be divided into three types, given as:
• Active Hub
• Passive Hub
• Intelligent Hub
Active Hub: As its name suggests, Active Hub is a hub which can amplify or regenerate the
information signal. This type of bus has an advantage as it also amplifies the incoming signal
as well as forwards it to multiple devices. This Bus is also known as Multiport Repeater. It can
upgrade the properties if incoming signal before sending them to destination.
Passive Hub: Passive Hub works like a simple Bridge. It is used for just creating a connection
between various devices. It does not have the ability to amplify or regenerate any incoming
signal. It receives signal and then forward it to multiple devices.
Intelligent Hub: This is the third and last type of Bus. It can perform tasks of both Active and
Passive buses. Also, it can perform some other tasks like Bridging and routing. It increases the
speed and effectiveness of total network thus makes the performance of whole network fast
and efficient.
Applications of Hub:
Networking Hub is widely used networking connectivity device. It has many advantages over
other connectivity devices. Some Applications of Networking Hub are given below:
13
DCC (22414) MRS. S.S.KADAM
5. Bridge:
i. Simple bridge: The user has to enter the address manually in the table. Simple bridges are
the most primitive and least expensive type of bridge.
Whenever, a new station is added, the table must be modified. If station is removed, its address
must be deleted from the table. It links only two segments (LAN).
iii. Transparent bridge: The Bridge builds its table of station address on its own as it performs
its bridge function, and it is also called learning bridge. Transparent bridge is invisible for the
devices on the network. It performs the function of blocking or forwarding data based on MAC
address. At the time of installation, table of transparent bridge is empty. It uses the source
address in packet to build a table. It checks address in memory to determine where to send the
data. Filtering frames, forwarding and blocking these are the duties of transparent bridge.
iv. Translation bridge: It connects network segment running at different speed or using
different protocols, such as token ring and Ethernet network. This bridge takes data link layer
frame off the packets to be relayed to other segment and packages them in new frame for
transmitting.
14
DCC (22414) MRS. S.S.KADAM
v. Source route bridge: In source Route Bridge, sending station defines the bridges that
should be visited by the frames. In frame the address of these bridges are saved. So frame
contains different addresses like source and destination, and bridge address.
Advantages
Disadvantages
6. Switch:
15
DCC (22414) MRS. S.S.KADAM
Types of switch
There are two types of switch:
i. Store-and-forward switch: It stores the frame in the input buffer until the whole packet has
arrived. This packet is stored in the buffer. Then switch takes the decision about destination
machine with the help of switching table. Then the packet is forwarded towards the appropriate
destination.
ii. Cut-through switch: It forwards the packet to the output buffer as soon as the destination
address is received.
Switches may operate at one or more layers of the OSI model, including the data link and
network layers. A device that operates simultaneously at more than one of these layers is known
as a multilayer switch. In switches intended for commercial use, built-in or modular interfaces
make it possible to connect different types of networks, including Ethernet, Fiber
Channel, ATM, ITU-TG.hn and 802.11. This connectivity can be at any of the layers
mentioned. While layer-2 functionality is adequate for bandwidth-shifting within one
technology, interconnecting technologies such as Ethernet and token ring is easier at layer 3.
Devices that interconnect at layer 3 are traditionally called routers, so layer-3 switches can also
be regarded as (relatively primitive) routers.
Where there is a need for a great deal of analysis of network performance and security, switches
may be connected between WAN routers as places for analytic modules. Some vendors
provide firewall, network intrusion detection,[7] and performance analysis modules that can
plug into switch ports. Some of these functions may be on combined modules.[8]
In other cases, the switch is used to create a mirror image of data that can go to an external
device. Since most switch port mirroring provides only one mirrored stream, network hubs can
be useful for fanning out data to several read-only analyzers, such as intrusion detection
systems and packet sniffers.
7. Router:
16
DCC (22414) MRS. S.S.KADAM
Routers are small physical devices that join multiple networks together. Router operates at the
network layer of the OSI model. Home networks typically use a wireless or wired Internet
Protocol (IP) router, IP being the most common OSI network layer protocol. An IP router such
as a DSL or cable modem broadband router joins the home's local area network (LAN) to
the wide-area network (WAN) of the Internet.
Router operates on network layer of OSI reference model. Router is a combination of hardware
and software. The hardware can be a network server, computer or special device and the
software in a router is the operating system and routing protocol. The hardware includes the
physical interfaces to the various network in the inter network. These interfaces can be token,
ring, Ethernet, T1, ATM, frame, relay, etc. Router is an intelligent device, because it is more
capable than the rest of the devices like bridge or repeater. Router has to find out the best
possible path among several others.
Router is an efficient device which performs the task of delivering and forwarding information.
When computer on one network wants to transmit data to a computer on another network, the
computer sends its packet to a router, which then forwards them to destination network. Router
forwards a packet based on the destination address in the network layer protocol header. Each
router consists of routing table, which determines the best way for the data to reach the
destination. Routers use the software configured network address (IP address) to make a
decision. To find out the shortest path, router used some routing algorithms. These routing
algorithms determine the routing decisions, i.e., how to forward a packet on to its next journey.
Types of router
i. Static router: It can manually set up and configure all routes. This router uses the same route
determined by a routing entry. Static router is more secure because the administrator
specifies each route. An administrator is required to maintain the routing table and the router.
Static router can work well for small inter networks, but do not scale well for large or
dynamically changing inter network due to their manual administrator.
ii. Dynamic router: It manually configures the first route. It automatically detects additional
networks and routers. Dynamic routing consists of routing tables that are built and maintained
automatically through an ongoing communication between routers. This communication is
facilitated by a routing protocol, a series of periodic or on-demand messages containing routing
information that is exchanged between routers.
In dynamic router, security can be improved by manually configuring the router. An
administrator is required to maintain the router.
Advantages
i. Router can connect dissimilar LANs and WANs running at different transmission speeds.
ii. Routers are used to interconnect network.
iii. It is a multiport device, i.e., router with multiple slots that can hold different cable and other
devices.
Disadvantages
i. Routers are slower than other devices because of decision making.
ii. They do not have ability to stop broadcast packets from being forwarded to other networks.
17
DCC (22414) MRS. S.S.KADAM
8. Gateway:
Gateway is a network device which connects two dissimilar networks. It is a network point that
acts as an entrance to another network. A gateway is required to convert data packets from one
protocol format to another, format. It operates on all seven layers of OSI reference model.
Gateways are application specific interfaces that link all seven layers of the OSI model. They
are dissimilar at any or all levels.
The term gateway is applied to any device, system or software applications that can perform
the function of translating data from one format to another. A gateway not only has the ability
to translate between different frame formats but also between different protocols.
The gateway works with protocols used by each network connected to a router. It can translate
from one to the other. Gateway must take care of differing frame sizes, data rates, formats,
acknowledgement schemes, priority schemes, etc. That means the task of the gateway is very
tough. A gateway is a very powerful device as compared to a bridge or a router. It is typically
used to connect huge and incompatible networks.
Example:
i. If network A is a token ring network using TCP/IP and network B is a Novell network, a
gateway can relay frames between the two.
ii. Many companies use an e-mail system such as Microsoft exchange or Novell group wise.
These systems transmit mail internally in a certain format. When an e-mail is sent across the
internet to users using a different e-mail system, the e-mail must be converted to another
format, usually to Simple Mail Transfer Protocol (SMTP). This conversion is performed by
software gateway.
Advantage:
18
DCC (22414) MRS. S.S.KADAM
9. Modem:
A modem is a network device that both modulates and demodulates analog carrier signals
(called sine waves) for encoding and decoding digital information for processing. Modems
accomplish both of these tasks simultaneously and, for this reason, the term modem is a
combination of "modulate" and "demodulate."
A modem modulates outgoing digital signals from a computer or other digital device to analog
signals for a conventional copper twisted pair telephone line and demodulates the incoming
analog signal and converts it to a digital signal for the digital device.
Modems are available both as internal modem and external modem. Internal modems are
installed in the computer’s expansion slot or in the motherboard circuit. External modem is a
small box that is connected to a computer by a RS-232 cable. RS-232 cable is used to connect
a PC to its modem. Twisted pair wires and RJ-45 connectors are used to connect two modems.
Functions of Modem
i. Converts the binary data into analog signal at sending side and converts the analog signal
into binary data at the receiving side.
ii. Takes the data from the RS-232 interface.
iii. Send dialing signals.
iv. Performs line control and signaling to the other end of phone line.
19
DCC (22414) MRS. S.S.KADAM
1. Radio NICs
2. Access points
3. Routers
4. Repeaters
5. Antenna
1.Radios NICs:
• Radio NIC operates inside the computer and provides wireless connectivity
• Radio NIC is also called as radio card and implements the 802.11 wireless LAN Standard
• Radio NICs generally implements one particular physical layer i.e. 802.11a or 802.11 b/g
• Access point is a device that allows a Wi-Fi device to connect to a wired network
20
DCC (22414) MRS. S.S.KADAM
3.Wireless Router:
4.Wireless Repeater:
• Wireless repeater is used for extending the range of a wireless LAN, instead of adding more Aps
• It receives the radio signals from an AP, end users or other repeaters, regenerates the signals
and retransmits it.
• We can overcome the signal impairment caused by RF attenuation with the help of repeater.
21
DCC (22414) MRS. S.S. KADAM
UNIT-5
Reference Model
[20 Marks]
_____________________________________________________
Contents:
5.1 OSI Reference Model: Layered Architecture, Peer To Peer Processes- Interfaces between Layer,
Protocols, Organization of the Layers, Encapsulation ,Layer, Network Layer, Layers of the OSI
Reference Model(Functions and features of each Layer)-Physical Layer, Data-Link Layer, Transport
Layer, Session Layer, Presentation Layer, Application Layer.
5.2 TCP/IP Model : Layered architecture, Data Link Layer: Nodes and Links, services, two categories
of links, two sub layers, Link layer addressing: three types of addresses, address resolution
protocol(ARP) ,
Network Layer: Addresses: address space, classful and classless addressing, dynamic host
configuration protocol(DHCP),network address resolution (NAT).
Transport layer Protocol: Transport services, connectionless and connection oriented protocol
5.3 Introduction-Addressing mechanism in Internet IP Addressing-IP Address classes, classless IP
addressing, Subnetting, Supernetting, Masking,
5.4 IPV4 and IPV6,
5.5 OSI and TCP / IP Network Model.
Course Outcome:
Configure different TCP/IP services
References:
a. www.nptelvideos.in/2012/11/data-communication.html
b.http://www.myreadingroom.co.in/notes-and-studymaterial/68-den/750-analog-to-analog-conversion-
techniques.html
c. http://www.tutorial reports.com/wireless/wlanwifi/wifi_architecture.php
d. http://standards.ieee.org/about/get/802/802.11.html
e. www.tutorialspoint.com/data_communication_computer_network/
f. http://www.studytonight.com/computer-networks/overview-of-computer-networks
1
DCC (22414) MRS. S.S. KADAM
2
DCC (22414) MRS. S.S. KADAM
• Now assume that Ann has to move to another town because of her job.
• Although both are sad, Maria opens a packet that contains two small machines.
• The first machine can scan and transform a letter in English to a secret code or
vice versa.
• The other machine can scan and translate a letter in Spanish to the same secret
code or vice versa.
• Ann takes the first machine; Maria keeps the second one.
•
• The two friends can still communicate using the secret code, as shown in Figure.
• ISO –OSI Open Systems Interconnection Model
computers over a network medium into SEVEN smaller and more manageable
problems is known as layering.
• The OSI model is a theoretical blueprint that helps us understand how data gets
from one user’s computer to another.
• It is also a model that helps develop standards so that all of our hardware and
software talks nicely to each other.
• It aids standardization of networking technologies.
• It provides an organized structure for hardware and software developers to follow,
to insure their products are compatible with current and future technologies.
• ISO is the organization; OSI is the model.
5
DCC (22414) MRS. S.S. KADAM
Data Encapsulation
• The outgoing information will travel down through the layers to the lowest layer.
• While moving down on the source machine, it acquires all the control information
which is required to reach the destination machine.
• The control information is in the form of Headers and Trailer which surrounds the
data received from the layer above.
• This process of adding headers and trailers to the data is called as data
encapsulation.
• The information added by each layer is in the form of headers or trailers.
• At layer 1 the entire package is converted to a form that can be transferred to the
receiving machine.
• At the receiving machine, the message is unwrapped layer by layer, with each
process receiving and removing the data meant for it.
• For example, layer 2 removes the data meant for it, then passes the rest to layer 3.
• Layer 3 then removes the data meant for it and passes the rest to layer 4, and so on.
• The headers and trailers contain control information. The headers and trailers form
the envelope which carries the message to the desired destination.
6
DCC (22414) MRS. S.S. KADAM
The figure shows the example of five layer stack for data encapsulation.
• The fifth layer of sending machine wants to send a message M to the fifth layer of
destination machine.
• The message M is produced by layer 5 of machine 1 and given to layer 4 for transmission.
7
DCC (22414) MRS. S.S. KADAM
The physical layer is responsible for the movement of individual bits from one hop
(node) to the next.
8
DCC (22414) MRS. S.S. KADAM
The data link layer is responsible for moving frames from one hop (node) to the next.
9
DCC (22414) MRS. S.S. KADAM
• Access control-
• Determine which device has control over the link at any given time.
• Link establishment and termination:
• Establishes and terminates the logical link between two nodes.
• Frame sequencing:
• Transmits/receives frames sequentially.
• Frame acknowledgment:
• Provides/expects frame acknowledgments.
DLL is divided into two Sub-Layers
• LLC Sub Layer
• MAC Sub Layer
10
DCC (22414) MRS. S.S. KADAM
• The MAC sub layer determines where one frame of data ends and the next one starts
- frame synchronization.
• There are four means of frame synchronization:
• Time based,
• Character counting,
• Byte stuffing and
• Bit stuffing.
3. Network Layer
• It is responsible for source to destination delivery of individual packets across
multiple networks.
• Defines the most optimum path the packet should take from the source to the
destination
• Defines logical addressing so that any endpoint can be identified.
• Handles congestion in the network.
• Facilitates interconnection between heterogeneous networks (Internetworking).
• The network layer also defines how to fragment a packet into smaller packets to
accommodate different media.
The network layer is responsible for the delivery of individual packets from the
source host to the destination host.
11
DCC (22414) MRS. S.S. KADAM
Que: With the help of neat sketch describe the working of router. Describe in detail the
operation of router considering OSI model.
Answer: Router is a device that connects two or more computer network together this allows two
or more disparate computer network to send data to each other.
The figure shows a router connecting to two networks viz: A (Token Ring) and B
(Ethernet) at points X and Y respectively. This means that the router must have two interfaces
and also two Network interface cards (NICs) one to interact with network A at point X, and
the other to interact with network B at point Y. this enable it to send data between the two
networks A and B. A router connect more than two networks.
A router operates at a the physical, data link and network layer of the OSI model, as
shown in fig a router is termed as an intelligent device. A router is useful for interconnecting
two or more networks. These networks can be heterogeneous, which means that they can
differ in their physical characteristics such as frame size, transmission rates, topologies,
addressing etc. thus, if a router has to connect such different networks, it has to consider all
these issues. A router has to determine the best possible transmission path among several
available.
4. Transport Layer
• Purpose of this layer is to provide a reliable mechanism for the exchange of data
between two processes in different computers.
• Ensures that the data units are delivered error free.
• Ensures that data units are delivered in sequence.
• Ensures that there is no loss or duplication of data units.
• Provides connectionless or connection oriented service.
12
DCC (22414) MRS. S.S. KADAM
The transport layer is responsible for the delivery of a message from one process to another.
5. Session Layer
• Session layer provides mechanism for controlling the dialogue between the two
end systems.
• It defines how to start, control and end conversations (called sessions) between
applications.
• This layer requests for a logical connection to be established on an end-user’s
request.
• Any necessary log-on or password validation is also handled by this layer.
Functions of Session Layer
• Dialog control
• Synchronization, session and sub session
• Session closure
6. Presentation Layer
• Presentation layer defines the format in which the data is to be exchanged between
the two communicating entities.
• Also handles data compression and data encryption (cryptography).
13
DCC (22414) MRS. S.S. KADAM
7. Application Layer
• Application layer interacts with application programs and is the highest level of OSI
model.
• Application layer contains management functions to support distributed
applications.
• Examples of application layer are applications such as
• File Transfer,
• Electronic Mail,
• Remote Login Etc.
Functions of Application layer:
1. Network virtual terminal
2. File transfer access and management
3. Mail services and directory services
Horizontal communication
14
DCC (22414) MRS. S.S. KADAM
1. The horizontal communication is the logical connection between the layers, there is
no direct communication between them.
2. Information included in each protocol header by the transmitting system is a message
that will be carried to the same protocol in the destination system.
3. For two computers to communicate over a n/w, the protocol used at each layer of the
OSI model in the transmitting system must be duplicated at the receiving system.
4. The packet travels up through the protocol stack and each successive header is
stripped of by the appropriate protocol & processed.
5. When the packet arrived at its destination, the process by which the headers are
applied at the source is repeated in server.
Vertical communication:
1. In addition to communicating horizontally with the same protocol in the other
system, the header information also enables each layer to communicate with the layer
above & below it.
Eg. The n/w layer will communicate with the data link layer & transport layer.
2. This interlayer communication is called communication vertical.
3. When a system receives a packet & passes it up through various layers the data link
layer protocol header includes a field which specifies the name of n/w layer protocol
to be used to process the packet.
4. The n/w layer protocol header will specify the name of transport layer protocol to be
used to process the packet.
5. Due to vertical communication, it becomes protocol at each layer simultaneously.
15
DCC (22414) MRS. S.S. KADAM
Summery
Devices
Devices - Layer 7 Hosts PC Servers Mobile Phones, gateways
Devices - Layer 3 Routers
Devices - Layer 2 Bridges, Switches, NIC (Layers 1 & 2)
Devices - Layer 1 Hubs, repeaters NIC (Layers 1 & 2) Media: Coax, Fiber,
Twisted Pair, Wireless
16
DCC (22414) MRS. S.S. KADAM
Layered Architecture:
The TCP/IP protocol suite was developed prior to the OSI model.
Therefore, the layers in the TCP/IP protocol suite do not exactly match those in the
OSI model.
The original TCP/IP protocol suite was defined as having four layers: host-to-
network, internet, transport, and application.
18
DCC (22414) MRS. S.S. KADAM
ARP takes the IP address of a host as input & gives its corresponding physical
address as the output.
◼ The Internet is based on IP addresses
◼ Data link protocols (Ethernet, FDDI, ATM) may have different (MAC)
addresses
The ARP and RARP protocols perform the translation between IP addresses and
MAC layer addresses.
ARP sends the IP broadcast message to all the computer on the network.
The computer whose IP address matches the broadcast IP address sends a reply and
along with, its physical address to the broadcasting computer.
All other computers ignore the broadcast message.
19
DCC (22414) MRS. S.S. KADAM
Address Translation with ARP
Example:
ARP request: Argon broadcasts an ARP request to all stations on the network: “What is
the hardware address of Router137?”
ARP Reply: Router137 responds with an ARP Reply which contains the hardware address
Ethernet II header
28
* Note: The length of the address fields is determined by the corresponding address length fields
20
DCC (22414) MRS. S.S. KADAM
IP Header Format
Fields Of IP Header:
Version (4 bits): current version is 4.
Header length (4 bits): length of IP header, in multiples of 4 bytes
DS/ECN field (1 byte): This field was previously called as Type-of-Service (TOS)
field.
Differentiated Service (DS) (6 bits): Used to specify service level (currentlynot
supported in the Internet)
Explicit Congestion Notification (ECN) (2 bits):New feedback mechanism
used by TCP.
Identification (16 bits): Unique identification of a datagram from a host.
Incremented whenever a datagram is transmitted.
Flags (3 bits):
First bit always set to 0
21
DCC (22414) MRS. S.S. KADAM
DF bit (Do not fragment)
MF bit (More fragments)
Time To Live (TTL) (1 byte): Specifies longest paths before datagram is dropped.
Role of TTL field: Ensure that packet is eventually dropped when a routing
loop occurs.
Used as follows:
Sender sets the value (e.g., 64)
Each router decrements the value by 1
When the value reaches 0, the datagram is dropped
Protocol (1 byte):
Specifies the higher-layer protocol.
Functions of the IP
1. Addressing:
◼ In order to perform the job of delivering datagrams, IP must know where to
deliver them to. For this reason, IP includes a mechanism for host addressing.
22
DCC (22414) MRS. S.S. KADAM
23
DCC (22414) MRS. S.S. KADAM
24
DCC (22414) MRS. S.S. KADAM
6.IPsec support is optional 6.IPsec support is required in a full IPv6
implementation.
7. No identification of payload for QoS 7. Payload identification for QoS handling By
Handling by routers is present within routers is included in theIPv6 header using
the IPv4 header. the Flow Label field.
8. Address must be configured either 8. Addresses can be automatically assigned
manually or through DHCP. using stateless address auto configuration,
assigned using DHCPv6, or manually
configured.
9. IP address represented in decimal 9. IP address is represented in hexadecimal
number system number system
10. “.” used as seperator 10. ‘ : ‘ used as separator .
11. Uses host address (A) resource 11. Uses host address (AAAA) resource
records in the domain name system to records in the domain name system to map
map host names to IPv4 addresses. host names to IPv6 addresses.
25
DCC (22414) MRS. S.S. KADAM
➢ TCP is Reliable-
Reliable means that every transmission of data is acknowledged by the receiver.
Reliable does not mean that things don't go wrong, it means that we find out when
things go wrong.
If the sender does not receive acknowledgement within a specified amount of time,
the sender retransmits the data.
➢ Stream delivery service:
◼ TCP is a stream oriented protocol.
◼ It allows the sending and receiving process to obtain as a stream of bytes.
◼ TCP creates a working environment in such a way that the sending and
receiving processes seem to be connected by an imaginary “tube” This is
called as stream delivery service.
➢ TCP : Flow Control
◼ Sending and receiving buffers:
◼ The sending and receiving process may not produce and receive data at
the same speed.
◼ Hence TCP needs buffers for storage.
◼ There are two types of buffers used in each direction:
1) Sending buffer
2) Receiving buffer
➢ Full duplex service:
◼ TCP offers full duplex service where the data can flow in both the direction
simultaneously.
◼ The TCP segments are sent both the directions.
2. UDP
UDP is user datagram protocol.
It is connectionless protocol because data is sent without establishing a connection
between sender and receiver before sending the data.
UDP is unreliable because data is delivered without acknowledgement.
26
DCC (22414) MRS. S.S. KADAM
UDP does not perform Auto retransmission.
UDP does not use flow control .
UDP has high transmission speed.
UDP Datagram Format
UDP Vs TCP
UDP TCP
Complexity UDP is less complex TCP is more complex
Connection UDP is connection less protocol TCP is connection oriented protocol
Reliability It provides unreliable delivery It provides reliable delivery of
of messages messages
Function By using this protocol one As a message makes its way across
program can send a load of the internet from one computer to
packets to another and that another. This is connection based.
would be the end of the
relationship.
layer they exist Transport layer Transport layer
Flow controlling UDP has no flow control TCP has flow control
Overhead Overhead is very low Overhead is low
Which is powerful UDP is less powerful TCP is more powerful.
27
DCC (22414) MRS. S.S. KADAM
avoid duplications.
Address Space:
➢ IPv4 uses 32-bit addresses, which means that the address space is 232 or
4,294,967,296 (more than 4 billion).
➢ This means that, theoretically, if there were no restrictions, more than 4 billion
devices could be connected to the Internet.
Notations
There are two prevalent notations to show an IPv4 address: Binary notation and Dotted
decimal notation.
➢ Binary Notation:
o In binary notation, the IPv4 address is displayed as 32 bits.
o Each octet is often referred to as a byte.
o So it is common to hear an IPv4 address referred to as a 32-bit address or a
4-byte address.
o The following is an example of an IPv4 address in binary notation:
01110101 10010101 00011101 00000010
➢ Dotted-Decimal Notation:
o To make the IPv4 address more compact and easier to read, Internet
addresses are usually written in decimal form with a decimal point (dot)
separating the bytes.
o Each byte is identified by a decimal number in the range [0..255].
o The following is the dotted decimal notation of the above address:
117.149.29.2
o Example:
Example: Change the following IPv4 addresses from binary notation to dotted-
decimal notation.
28
DCC (22414) MRS. S.S. KADAM
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
Solution:
We replace each group of 8 bits with its equivalent decimal number and add dots for
separation.
a. 129.11.11.239
b. 193.131.27.255
IP Address classes
• IPv4 addressing, at its inception, used the concept of classes.
• This architecture is called classful addressing.
• In classful addressing, the address space is divided into five classes: A, B, C, D,
and E.
• Each class occupies some part of the address space.
• We can find the class of an address when given the address in binary notation or
dotted-decimal notation.
• If the address is given in binary notation, the first few bits can immediately tell
us the class of the address.
• If the address is given in decimal-dotted notation, the first byte defines the
class.
29
DCC (22414) MRS. S.S. KADAM
d. 252.5.15.111
Solution:
a. The first bit is O. This is a class A address.
b. The first 2 bits are 1; the third bit is O. This is a class C address.
c. The first byte is 14 (between 0 and 127); the class is A.
d. The first byte is 252 (between 240 and 255); the class is E.
Classes and Blocks
One problem with classful addressing is that each class is divided into a fixed
number of blocks with each block having a fixed size.
Class B:
• Class B addresses are assigned to medium-sized to large-sized networks.
• The two high-order bits in a class B address are always set to binary 1 0.
• The next 14 bits complete the network ID.
• The remaining 16 bits represent the host ID.
• This allows for 16,384 networks and 65,534 hosts per network.
• Class B IP address range includes 128.0.0.0 to 191.255.255.255
Class C:
30
DCC (22414) MRS. S.S. KADAM
• Class C addresses are used for small organizations with a small number of attached
hosts or routers.
• The three high-order bits in a class C address are always set to binary 1 1 0.
• The next 21 bits complete the network ID.
• The remaining 8 bits (last octet) represent the host ID.
• This allows for 2097152 networks and 256 hosts per network.
• Class C IP address range includes 192.0.0.0 to 223.255.255.255.
Class D:
• Class D addresses are reserved for IP multicast addresses.
• The four high-order bits in a class D address are always set to binary 1 1 1 0.
• The remaining bits recognize hosts.
• Class D IP address range includes 224.0.0.0 to 239.255.255.255
Class E:
• Class E is an experimental address that is reserved for future use.
• The high-order bits in a class E address are set to binary 1111.
• Class E IP address range includes 240.0.0.0 to 255.255.255.255
31
DCC (22414) MRS. S.S. KADAM
Mask
• Although the length of the netid and hostid (in bits) is predetermined in classful addressing,
we can also use a mask (also called the default mask/natural masks), a 32- bit number made
of contiguous 1’s followed by contiguous 0’s.
• The masks for classes A, B, and C are shown in Table.
• The concept does not apply to classes D and E.
• The mask can help us to find the netid and the hostid.
• For example, the mask for a class-A address has eight 1s, which means the first 8 bits of
any address in class A define the netid; the next 24 bits define the hostid.
Subnetting
• If an organization was granted a large block in class A or B, it could divide the addresses
into several contiguous groups and assign each group to smaller networks (called subnets)
or, in rare cases, share part of the addresses with neighbors.
• Subnetting increases the number of 1’s in the mask.
• To create multiple logical networks that exist within a single Class A, B, or C network.
• If you do not subnet, you are only able to use one network from your Class A, B, or C
network, which is unrealisticThe subnet mask follows two rules:
o If a binary bit is set to a 1 (or on) in a subnet mask, the corresponding bit in the
address identifies the network.
o If a binary bit is set to a 0 (or off) in a subnet mask, the corresponding bit in the
address identifies the host.
Finding The Subnet Address: We use binary notation for both the address and the maskand
then apply the AND operation to find the subnet address.
Example: What is the subnetwork address if the destination address is 200.45.34.56 andthe
subnet mask is 255.255.240.0?
Solution :
Step 1: Convert given IP and Subnet mask to BinaryStep 2:
Perform AND Operation on these two.
11001000 00101101 00100010 00111000 Binary 200.45.34.56
Example 3:
A company is granted the site address 181.56.0.0 (class B). The company needs 1000
subnets. Design the subnets.
Solution:
34
DCC (22414) MRS. S.S. KADAM
Supernetting
• The most of the class A and class B addresses were exhausted; however, there was still a
huge demand for midsize blocks.
• The size of a class C block with a maximum number of 256 addresses did not satisfy the
needs of most organizations.
• One solution was supernetting.
• In supernetting, an organization can combine several class C blocks to create a larger
range of addresses.
• In other words, several networks are combined to create a supernetwork or a supernet.
• An organization can apply for a set of class C blocks instead of just one.
• For example, an organization that needs 1000 addresses can be granted four contiguous
class C blocks.
• The organization can then use these addresses to create one supernetwork.
• Supernetting decreases the number of 1’s in the mask.
• For example,
o if an organization is given four class C addresses, the mask changes from 24 to 22.
Example:
• We need to make a supernetwork out of 16 class C blocks. What is the supernet mask?
Solution:
• We need 16 blocks.
• For 16 blocks we need to change four 1s to 0s in the default mask. So the mask is
11111111 11111111 11110000 00000000
Or
255.255.240.0
Address Depletion
• The flaws in classful addressing scheme combined with the fast growth of the
Internet lead to the near depletion of the available addresses.
• Yet the number of devices on the Internet is much less than the 232 address
space.
• We have run out of class A and B addresses, and a class C block is too small for
most midsize organizations.
• One solution that has alleviated the problem is the idea of classless addressing.
Classless Addressing
• To overcome address depletion and give more organizations access to the
Internet, classless addressing was designed and implemented.
• In this scheme, there are no classes, but the addresses are still granted in blocks.
35
DCC (22414) MRS. S.S. KADAM
Address Blocks
36
DCC (22414) MRS. S.S. KADAM
9)OSI truly is a general model 9)TCP/IP cannot be used for any other
application
10)It has a problem of protocol 10) The model does not fit any protocol
filtering into a model stack.
37