Data Communications Introduction
Data Communications Introduction
Introduction to Data
Communications
Table of Contents
1. Introduction 12
2.
Acknowledgement
s 12
3. Revision List 13
4. Data
Communications 15
5. Why
Telecommunicatio
ns? 15
a. Voice
Channels 15
b. Data Channels 16
6. Introduction to
Networking 17
a. The Big
Picture 17
b.
Telecommunicati
ons Components
of The Big
Picture 20
c. ISO OSI 20
7. Breaking The
Big Picture up! 22
a. The Local
Loop 22
b. LANs 23
c. MANs 24
d. WANs. 26
2
8. Trade
Magazines 27
9. The Role of
Telecommunicatio
ns in Networking 29
a. LANs 29
b. MANs 29
c. WANs 30
10. Brief History
of Networking 31
11. Data
Communication
Network 34
a. Performance 34
b. Consistency 34
c. Reliability, 35
d. Recovery 36
e. Security 36
f. Applications 36
g. Basic
Components 38
12. Data Flow 40
13. Modems 43
a. Basic
Definition 43
b. Digital
Connection 43
c. Analog
Connection 45
d.
External/Internal
Modems 45
e. Modem Types 47
f. Features of
Modems 49
g. Modem
Speeds /
Standards 50
h. Transfer Rate
versus PC Bus
Speed 51
3
h. V.90 56 kbps
Modems 51
14. Physical
Connection 52
15. Transmission
Media - Guided 53
a. Open Wire 53
b. Twisted Pair 55
c. Coaxial Cable 57
d. Optical Fibre 57
i. Optical
Transmission
Modes 59
ii. Step Index
Mode 61
iii. Grade Index
Mode 61
iv. Single Mode 61
v. Comparison
of Optical
Fibres 63
vi. Advantages
of Optical Fibre 64
vii.
Disadvantages
of Optical Fibre 65
e. Media versus
Bandwidth 65
16. Transmission
Media - Unguided 65
a. RF
Propagation 66
i. Ground Wave
Propagation 66
ii. Ionospheric
Propagation 67
iii. Line of Sight
Propagation 67
b. Radio
Frequencies 68
c. Microwave 69
d. Satellite 70
e. Iridium 72
4
Telecom System
17. RS-232D 74
Serial Interface
Standard
a. Mechanical
Characteristics of
the RS-232D 74
b. Electrical
Characteristics of
the RS-232D 74
c. Function of
Each Signal 76
d. Subsets of
Signals for
Certain
Applications 78
18. RS-232D Flow
Control 80
a. Hardware
Handshaking 81
b. Hardware Null
Modems 88
c. Software
Handshaking
(Xon/Xoff) 89
d. Software Null
Modem 89
e. Terminals &
PCs 91
19. Timing 92
a. Asynchronous
vs. Synchronous
Transmission 93
20. Asynchronous
Communications 95
a. Start/Stop bits 95
b. 7/8 Bit Codes 99
c. Parity Bits 101
21. Line Encoding 104
a. Unipolar
Encoding 104
5
b. Polar
Encoding 106
c. Bipolar Line
Encoding 108
d. Manchester
Line Encoding 108
22. Standard
Digital Codes 110
a. EBCDIC -
Extended Binary
Coded Decimal
Interchange Code110
b. ASCII -
American
Standard Code
for Information
Interchange 116
23. Voice Channel
Communications 121
a. Voice Channel
Specification 121
b. Voice Channel
Constraints 122
c. Nyquist
Theorem 123
24. Telephone
Networks 125
a. POTS - Plain
Old Telephone
Set 125
b. Local Loops 129
c. Central Office 131
d. Hierarchical
Phone Networks 131
25. Telephone
Line
Characteristics 135
a. Attenuation
Distortion 135
b. Propagation
Delay 137
c. Envelope 139
6
Delay Distortion
26. Line
Impairments 140
a. Crosstalk 140
b. Echo or Signal
Return 140
c. Frequency
Shift 142
d. Non-Linear
Distortion 142
e. Jitter:
Amplitude and
Phase 143
f. Transients: 144
Impulse Noise,
Gain Hits,
Dropouts &
Phase Hits
27. Modulation
Techniques 147
a. AM -
Amplitude
Modulation 147
b. FM -
Frequency
Modulation 149
c. PM - Phase
Modulation 149
28. Modem
Modulation 151
a. FSK -
Frequency Shift
Keying 151
b. QPSK -
Quadrature Phase
Shift Keying 155
c. QAM -
Quadrature
Amplitude
Modulation 157
29. AT Command
Set 159
7
a. Basic AT
commands 160
30. Multiplexing 161
a. FDM -
Frequency
Division
Multiplexing 164
b. TDM - Time
Division
Multiplexing 166
c. STDM -
Statistical Time
Division
Multiplexing 168
31.
Telecommunicatio
n Multiplexing 168
a. FDM -
Channel Groups 169
b. TDM - T1
Carrier System 169
32. Introduction to
the ISO - OSI
Model 172
a. OSI Model
Explained 172
b. Layer 7 -
Application
Layer 172
c. Layer 6 -
Presentation
Layer 176
d. Layer 5 -
Session Layer 177
e. Layer 4 -
Transport Layer 177
f. Layer 3 -
Network Layer 179
g. Layer 2 - Data
Link Layer 179
h. Layer 1 -
Physical Layer 180
i. Layer Specific 181
8
Communication
j. OSI Model
Functional
Drawing 183
33. Synchronous
Transmission 185
a. Clocking: Self
& Manchester
Encoding 186
34. Basic Frame
Structure 188
a. Preamble:
Starting
Delimiter/Alert
Burst/Start of
Header 188
b. Address
Field(s): Source
and/or
Destination 188
c. Control Field 190
d. Data/Message
and optional Pad 190
e. CRC/ Frame
Check Sequence 190
f. End Frame
Delimiter 190
35. Physical Layer 192
a. Asynchronous
& Synchronous
Communication 192
36. IEEE-802.3
Protocol 194
a. CSMA/CD
(Carrier Sense
Multiple Access/
Collision Detect) 194
b. IEEE 802.3
Ethernet Media
Types 195
c. IEEE 802.3
10Base5 196
9
d. IEEE 802.3a
10Base2 200
e. IEEE 802.3i
10BaseT 203
f. MAC -
Medium Access
Control 206
g. Total Length
of a MAC Frame 209
h. MAC Frame 211
i. Packet Sniffing 212
j. Packet Sniffing
Block Diagram 216
37. IEEE 802.2
LLC - Logical
Link Control
Layer 217
a. Service Access
Ports (SAPs) 219
b. Types of LLC
Operation 220
c. Classes of
LLC 224
d. LLC PDU
Control Field
Formats 224
38. Network
Interface Cards 229
a. IRQs, DMAs
and Base
Addresses 230
b. Legacy 234
c. NIC
Diagnostic Tools 236
d. Network
Interface Card
Drivers 238
i. NDIS Drivers 241
ii. ODI Drivers 243
iii. Packet
Drivers 245
iv. Software
Interrupts 245
10
g. Collapsed
Backbones 270
42. Routers 272
a. Purpose of
Routers 272
b. Router OSI
Operating Layer 272
c. Router
Segment to
Segment
Characteristics 274
d. Router
Addressing 276
e. Routing
Protocols 276
f. RIP - Routing
Information
Protocol 276
g. EGRP -
Exterior Gateway
Routing Protocol 279
h. OSPF - Open
Shortest Path
First 279
43. Brouters
(Bridge/Routers) 281
44. Gateway 282
a. Gateway's OSI
Operating Layer 282
b. Gateway
Segment to
Segment
Characteristics 283
c. Gateway
Addressing 283
45. Token Ring 284
a. IBM Token
Ring 285
b. IEEE 802.4
Token Bus 286
c. IEEE 802.5
Token Ring 286
12
d. IEEE 802.5
Bus Arbitration 286
e. 4 / 16 Mbps
Transfer Rate 292
f. IEEE 802.5
Topology 292
g. MSAUs 292
i. Token Ring
connectors 294
ii. MSAU Relay 296
iii. Ring In/
Ring Out 296
iv. Wrapping 298
v. Physical Star/
Logical Ring 299
h. IEEE 802.5
and the OSI
Model 299
i. Token Ring
Cabling 302
i. Shielded
Twisted Pair 302
ii. Unshielded
Twisted Pair -
Type 3 302
iii. IBM
Cabling System 303
j. Ring Insertion 304
k. CAUs &
LAMs 305
l. Ring
Calculations 306
i. Maximum
Ring Length 306
ii. Ring Length
Calculations 306
iii. Mixing
Cables and Ring
Length 307
iii. Active
Concentrators
and Ring
Length 309
m. Token Ring
Monitors and
Servers 311
13
i. Active
Monitor (AM) 311
ii. Standby
Monitor (SM) 316
iii. Ring
Parameter
Server (RPS) 318
iv.
Configuration
Report Server
(CRS) 318
v. Ring Error
Monitor (REM) 320
vi. Where are
these Monitors? 324
n. Token Ring
Hierarchy 324
o. IEEE 802.5
Frames 326
46. Linux and
Token Ring 336
47. Source
Routing 342
48. ISDN -
Integrated
Services Digital
Network 344
49. ADSL -
Asymmetrical
Digital Subscriber
Line 347
50. Cable Modems350
51. Quick
Introduction to
Unix 352
a. Basic Unix
Commands 359
b. Access and
Permissions 362
c. Links, 365
14
Instances &
Processes
d. Background
Processing 369
e. Shell Programs371
f.
Communicating
with Other Users 373
g. Creating Users
and Groups 375
52. SAMBA,
Win95, NT and
HP Jetdirect 377
53. The Suite of
TCP/IP Protocols 387
54. Internet
Protocol 389
a. IP Addresses 389
b. IP Address
Classifications 390
i. Class A
addresses 390
ii. Class B
addresses 390
iii. Class C
addresses 391
iv. Class D
addresses 391
v. Class E
addresses 391
c. Reserved IP
Addresses 392
d. Network
Masking 393
e. Domain
Names 398
f. IP Header 401
55. Address
Resolution
Protocol (ARP) 404
56. Reverse 406
15
Address
Resolution
Protocol (RARP)
57. Internet
Control Messaging
Protocol (ICMP) 407
58. Transmission
Control Protocol
(TCP) 416
59. User Datagram
Protocol (UDP) 420
60. Simple
Network
Management
Protocol 422
a. SNMPv2 to
the Rescue 423
b. MIB -
Management
Information Base 423
c. RMON -
Remote Network
Monitoring 423
61. Handy Unix
Network
Troubleshooting
Commands 425
62. X.25 429
a. X.25 OSI
Layers 431
b. X.25 High
overhead 433
c. X.25 Packet
Formats 435
63. Frame Relay 439
a. Decreased
Protocol
Overhead 439
b. LAPD - Link 441
16
Access Protocol
D channel
c. LAN to Frame
Relay
Connection 441
Appendix
a. PC Block
Diagram 442
b. PC Quick ID
Guide 445
c. Ethernet Type
Field 463
d. Ethernet
Address
Assignments 466
e. IP Protocol
Address Space 470
f. IP Multicast
Addresses 472
g. IP Header
Protocols 476
h. IP Hardware
Types 478
i. TCP/IP Well
Known Ports 479
j. AT Command
Set (Partial listing)493
k. ISO 3166
Country Codes 497
l. Token Ring -
Major Vector IDs 499
m. The GNU
General Public
License 502
n. Copyleft Rules
& Regulations 508
Introduction to Data Communications
Previous Top Next
17
Introduction to Data
Communications
4. Data Communications
4. Data
Communications
Data Communications is
the transfer of data or
information between a
source and a receiver.
The source transmits the
data and the receiver
receives it. The actual
generation of the
information is not part of
Data Communications
nor is the resulting action
of the information at the
receiver. Data
Communication is
interested in the transfer
of data, the method of
transfer and the
preservation of the data
during the transfer
process.
5. Why
Telecommunications?
We do use voice
channels for modem
communications to
connect to BBSs
(Bulletin Board
Services) or to connect
to the Internet. We also
use voice channels to
connect LANs using
remote access. Due to
the bandwidth limits on
the Voice Channel, the
data transfer rate is
relatively slow.
communicated in North
America's
telecommunications
system than voice.
Introduction to Data Communications
Previous Table of Contents Next
21
Introduction to Data
Communications
4. Data Communications
4. Data
Communications
Data Communications is
the transfer of data or
information between a
source and a receiver.
The source transmits the
data and the receiver
receives it. The actual
generation of the
information is not part of
Data Communications
nor is the resulting action
of the information at the
receiver. Data
Communication is
interested in the transfer
of data, the method of
transfer and the
preservation of the data
during the transfer
process.
5. Why
Telecommunications?
We do use voice
channels for modem
communications to
connect to BBSs
(Bulletin Board
Services) or to connect
to the Internet. We also
use voice channels to
connect LANs using
remote access. Due to
the bandwidth limits on
the Voice Channel, the
data transfer rate is
relatively slow.
communicated in North
America's
telecommunications
system than voice.
Introduction to Data Communications
Previous Table of Contents Next
25
Introduction to Data
Communications
5. Why
Telecommunications?
(cont'd)
5b. Data
Channels
(cont'd)
Data Channels are
special communications
channels provided by the
"common carriers" such
as Telus, Sprint, Bell
Canada, AT&T, etc.. for
transferring digital data.
Data Channels are also
called "Leased Lines".
They are "directly"
connected and you don't
have to dial a connection
number. The connections
are up and running 24
hours per day. They
appear as if there were a
wire running directly
between the source and
destination. Typical
transfer rates for data
communication are: 56
k, 128k, 1.544 M, 2.08
M, 45M and 155 Mbps.
1. the amount of
data transferred
(megabytes per
26
month)
2. the transfer rate
(bits per second)
6. Introduction
to Networking
What is a Network? This
is a difficult question to
answer. A network can
consist of two computers
connected together on a
desk or it can consist of
many Local Area
Networks (LANs)
connected together to
form a Wide Area
Network (WAN) across
a continent.
Circles Network
Operating
Systems
Squares
Communication
& cabling
protocols (OSI
Transport to
Physical Layer)
Storm Clouds
Telecommunicati
ons media or
Information
providers that
connect to the
Internet
Machine symbol
Network "linker"
can be a Bridge,
Router, Brouter
or Gateway
The Internet
jagged haphazard
dotted line
Introduction to Data Communications
Previous Table of Contents Next
Introduction to Data Communications
28
5. Session Layer
4. Transport Layer
3. Network Layer
A basic PC logical flowchart is shown in Fig. 1. The Keyboard & Application are shown as inputs to the CPU that would
request access to the hard-drive. The Keyboard requests accesses to the hard-drive through user enquiries such as "DIR"
commands and the Application through "File Openings" and "Saves". The CPU, through the Disk Operating System,
sends/receives data from the local hard-drive ("C:" in this example).
Introduction to Data Communications
Previous Table of Contents Next
Introduction to Data Communications
32b. Layer 7 - Application Layer
Introduction to Data Communications
Previous Table of Contents Next
Chapter One
Data Communications Basics
Define telecommunications
Talking to your friend over a phone between Kowloon Tong and Shatin. In
this example, at least a single telephone exchange with two telephone sets
are required. The voice signal will be converted and amplified prior to
reaching the called party. In addition, both sides can send/receive voice
signals (Formal definition is full-duplex.)
Writing a mail to overseas relative. In this example, there is no 100%
guarantee that the mail will be correctly received by your relative. The
delivery of letter is done by a third party and acknowledge on the receipt of
letter is usually not provided to ordinary mail. (Formal definition is
simplex.)
Lecturing a course. In this example, the exchange of information is face-to-
face and again is usually a simplex style, unless the student raises question.
Voice, Drawing and Image will be used to deliver a lecture to the student.
Multi-media Data
Multi-media technology is being developed to cover the above signal types into
a single entity. A signle entity means within the network, there is no distinction
on the types of signal. All of them are classifed as digital signals with different
characteristics. For instance, delay on voice is more sensitive than text data
during transmssion. A few more examples regarding the products are given
below:
Looking at the above classification, it is felt that video dominates the future
data communications. Because of the limited bandwidth (data that can be
transmitted per unit time), the video signal is needed to be digitised,
compressed and stored in mutimedia storage warehouse called server . It is
linked by transport networks to allow users to access.
Can you draw a distinction between drawing and image in terms of file size
and supporting software packages if required to produce the picture?
The file size of “Drawing” is less than an image as it uses vector approach. The
graphics also use simple geometric setting such as a circle can be represented
35
by the centre and the radius, not the whole circle picture. This, of course, relies
on the package to reproduce it.
Communication System
Exchange of information relies on a communication system to
convert, amplify and send signal through a common medium.
A very simple communication system may include a sender
(originator or caller) and a receiver as shown in Figure . Of
course, terminals and communication cables are also required.
The description for each item is given in the following table.
Telecommunications
In case, communication involves the sending of information over a significant
distance, it must use telecommunications as an aid. By definition,
Telecommunications refers to the transmission of information between distant
locations by some electromagnetic means. A typical example is the microwave
link currently being used by Hong Kong Electric between Lamma power
station and major zone substations on Hong Kong island. The distance in
between is over several kilometers and the links use extensive electronic based
microwave equipment. Star TV involves Telecommunication by broadcasting
the TV pictures through the satellite called AsiaSAT.
36
Assume that you are using a dial link to access the CityU’s Citylink, can you
list which part involves the use of telecommunications?
A pair of modems used to convert the digital signal from the PC to analogue
signal involves Telecommunications by sending/receiving the data through
telephone network. The telephone network abbreviated as PSTN (Public
Switching Telephone Network) is currently monopolized by Hong Kong
Telecom. It is basically a voice network but can be used with the consent of
Hong Kong Telecom to support data through a pair of modems.
How far does it take for an analog signal travelling over a voice network?
Data Communications
Data communications is defined as the interchange and processing encoded
information between distant locations using Telecommunications. Encoded
information refers to digital information and is nothing just a series of ones and
zeros from one point to another.
Can you draw the distinction amongst data, information and knowledge?
Communications:
Telecommunications:
DataCommunications:
Computer Network
Network by definition refers to a group of interconnected devices
communicating with each other. The device could be telephone exchange. If
the device is a computer, it is called computer network. So, computer network
is defined as a collection of computer systems that are connected together for
the purpose of exchanging and sharing resources.
Remote terminals attaching to the network. The terminal can also classified
into two types namely:
Interactive type such as VT100, IBM 3278.
VT100. When you log into the VAX/VMS, you could use show
terminal to find out the terminal type that you are using.
The link can be physical link such as telephone wire, satellite channel and
telephone wire or logical link formed by software.
A physical wire can be shared by a few users simultaneously, the piece of time
that is shared by user is regarded as software link and the physical wire itself is
physical link. By use of communication software, a few physical wires could be
grouped together to serve two machines is called logical trunk. An X.25
physical path can support up to 4096 logical channels.
Networking Concepts
Advantages of computer Networks
There are a lot of advantages by use of networked computers
such as:
Cluster Network
41
Explain why computer loading is also shared among users a clustered network.
Distributed networks
The network is characterized by connecting multiple processors geographically
distributed within the network as shown in Figure . BITNET, Because It is a
Time NETtwork, is a typical example of distributed network and is established
to provide information transfer to international academic institutions. BITNET
presently links more than 2900 institutional computers over 450 higher
educational institutions and research centres in most countries including Hong
Kong, Australia, Japan, Europe, United States etc. HARNET, Hong Kong
Academic Research Network, is now upgraded with T1 link at the speed of
1.54 M bits per second with Ring configuration instead of Star configuration.
Can you distinguish the difference between Ring and Star network in terms of
network topology?
Flexibility for future growth and expansion. To add a node to the system is
to make a physical connection with appropriate software to the boundary
node.
Versatile and reliable in terms of system down time
Network Topologies
Network topology refers to the way of grouping/linking the communication
nodes to serve particular need. Figure is an older version of HARNET (Hong
Kong Academic Research Network) showing the connections with node names
amongst the higher educational institutions in Hong Kong. The centre node was
HKU’s HKUJNT.
Communication Subnetwork
Arrangement of the computers and the interconnections
between them as shown in Figure with appropriate DCE, DTE
and network boundary. Each computer in a network is called a
node. The connection is known as an arc, path or link. Factors
that should be considered in defining the network topology
include:
Network Topology
Network topology is broadly classified into point-to-point or multi-point
depending on the data transfer within the network.
Point-to-point
Loop ( A message has to pass through several nodes in the system prior to be
received by the targeted node.) The data movement can be either direction.
Complete (Direct connection between two nodes are formed.) This topology
is ideal for military application in which reliability is the prime factor to be
considered.
Broadcast
Failure of any nodes in the bus does not affect the other
nodes. In addition, new nodes can be added easily by
“tapping” into the bus. Accessing to the link is often based on
a contention policy.
Ring topology like IBM Token Ring. All computing devices are connected
in a ring. A device can communicate with any other devices in the ring. The
data flow in such topology is unidirectional. All messages must be
addressed. A special bit pattern called a token, acts like a poll in a multidrop
line, is passed from node to node for regulating data traffic.
Network Applications
There are numerous applications using networked computers
such as:-
Commercial Networks
Abbreviation Description
46
Vendor Network
Type Description
47
Communication Organisations
Communication standards are formulated and designed by
certain International Organizations. A few well known
organizations are:
Type Description
Network Evolution
The evolution of communication networks starts from primitive analogy
telephone exchange to commonly used Local Area Network.
Telephone network
It was originally designed for the transmission of voice and is still the largest
communications network in the world as shown in Figure . You can use this
network to deliver voice, FAX or even low-resolution video image by use of
video telephone, A pair of modems is used to convert the digital signal in
analog form so that the signal will not be distorted after passing through the
telephone network. A dedicated physical channel is required for each telephone
conversation.
Explain why high speed backbone is used. If the network backbone is not a
high speed medium, what is the consequence?
It can support multi-media such as voice and video. If it is not used, it becomes
the bottleneck of the network.
The Internet
The term Internet is used in two contexts. The first one, an internet refes to the
interconnection of two or more networks. The second one, the Internet, refers
to the specific collection of interconnected networks spanning more than 60
49
countries throughout the world. The member networks are both WANs (Wide
Area Networks) and LANs (Local Area Networks), which were initally
academic institutions and research facilities. The internet now, apart form
academia, consists of business organisations, government agenceis and even
household Internet-like service subscriptions. Computers in the Internet fall
into two basic categories: host nodes (servers) and terminals (browser). Host
nodes are used to attach a network to the internet. Non-host nodes, on the other
hand, access the Internet through a host node but are not directly connected to
the Internet. Access to the Internet is provided at three basic levels, namely,
national, regional and local. National providers are commercial entities that sell
access to the Internet. The Internet uses a variety of communications lines. The
backbone nodes use T1 or T3 links to provide transmission from one area to
another. Figure shows a fraction of Internet backbone Network in US. In Hong
Kong, the internal central hub is located at Chinese University of Hong Kong
with a high speed link connected to US Seattle.
What is http?
It is one of the services offered by the Intenrt and is called Hyper Text Transfer
Protocol. This is the protocol used to transfer the Hyper Text in HTML format.
Self-examined Questions
List the definition of data communications.
List two reasons to explain why data communications is getting booming for
the past ten years.
List THREE characteristics of distributed networks.
What are some of the reasons for having networks?
What is the difference between a loop and a ring network?
List two different network topologies.
List the THREE categories of data communication components.
Briefly list the components in a typical banking network in Hong Kong.
(Hint Each branch is equipped with a cluster controller to serve a few
banking terminals.)
When you are using the ICQ, what is the network topology? Point to Point or
Broadcast.
51
Chapter Two
Basic Communications Theory
Understand the basic transmission theory, and figure out the maximum data
rate.
The signal relies on the variation of physical property such as the voltage level
and current value. These varying physical properties can mathematically be
represented as a function of time. Using Fourier transformation, any reasonably
behaved periodic function can be represented as a summation of Sines and
Cosines.
where t stands for time, f = 1/T is the fundamental frequency shown in figure
for the waveform being analyzed, an and bn are the sine and cosine amplitudes
of the nth harmonic, g(t) is the original waveform, and C/2 is the average value
of original signal.
The information such as digital data between your PC and modem is a periodic
signal where the period depends on the modem speed. Can you figure out the
transmission period for 2400 bps?
Signal analysis
Any Sin or Cos waveforms as given in figure can be measured
by three physical quantities namely Amplitude, Phase, and
Frequency:
Quantity Description
V = f
The speed is close to light speed in the air and is roughly half the speed for
electronics travelling in copper wire. The propagation delay for an electronic
from Tsim Sha Tsui to Shum Chung is therefore around 266 x 10 -9 second,
assume the distance is 40 km and the speed is half the light speed.
Can you figure out the propagation delay between Hong Kong and Peking?
You need to find out the distance between these two locations and use the
simple formula time = distance/velocity
Bandwidth
Any analogue signal is not formed by a single frequency if it is expanded in
terms of Fourier series. In fact, the waveform such as voice produced by human
being consists of waveforms of many different frequencies. The bandwidth as
shown in figure is defined by the difference between the points:
54
Bandwidth = fh - fl
The more bandwidth, the higher the quality of signal to be delivered across
the medium.
Signal outside the bandwidth will be distorted by the transmission medium.
This explains why digital signals generated by computer output port cannot
be directly sent out across a telephone network, as the network will chop off
the signals over 3400 Hz, which is the upper frequency limit produced by
human being.
Examples of harmonics
Signals are usually grouped into broadband or baseband depending on the
signal characteristics. Baseband transmission refers to sending the digital data
along the transmission channel by means of voltage fluctuation such as IEEE
802.3 and IEEE 802.4 and Broadband transmission refers to the sending of data
by modulating with high-frequency carrier wave such as AM or FM radio. Note
that to form a digital waveforms, more harmonic signals are required as shown
in Figure . The square waveform will be distorted after passing through a low
pass filter as shown in the same Figure.
Channel capacity
Channel capacity refers to the maximum data rate for a finite bandwidth
transmission medium in the presence of random noise. It is concerned about the
quality of a specific communications channel and was identified by Shannon.
The relation is governed by:
55
Where:
Practically, this limit is seldom reached. To increase the transmission rate, the
designer should either increase the signal power or use alternative medium with
higher bandwidth.
Note that for a theoretical noiseless channel, the maximum data rate that a
channel can carry is nW symbols/per second. A symbol can be n multiple
digital levels instead of 0 or 1.
Decibel
As the signal to power ratio is usually quite significant, a better representation
in communications is used to express the ratio of two values in logarithmic
format. The values can be power, voltage or current. It is not an absolute unit,
just a relative Figure and is expressed in:
dB = 10 log10 P1/P2
Where:
dB number of decibels
P1 the first value of the power
P2 the second value of the power
is 1K Watt and the noise power is 1m Watt, there is no point to have a ratio
written in 1000,000.
10log(10000) = 40dB
A certain modem’s speed is 2400 bits per second and the equivalent symbols
per second is 600. What is the symbol level?
For a certain equipment, if the S/N is 1000, the bandwidth is 10 KHz and the
maximum speed is up to 9600 bits per second, how many percentage of
bandwidth is not used? (Hint: You should find out the theoretical data rate first
using the formula in section 1.5 .)
The information (data) rate for a two level coding signal with pulse width equal
to 20 ms is calculated by log22/20 ms = 50 bits per second as shown in Figure .
The information (data) rate for a four level coding signal is log 24/20ms = 100
bits per second, twice the former case. Note that the signalling rate (1/20ms) is
the same for both cases.
57
In section 2, if the signalling rate is changed to 40ms, what will be the new data
rate?
For the same question, if the level is extended to 64, what will be the new data
rate?
Type Description
Simplex One party in the communication can send data to the other,
but cannot receive data from the other end such as the radio
58
Serial
The bits are transmitted one after another on the same channel such as terminal
to computer communication. Figure is a series of data stream transmitting from
the right handed side modem to the left.
It is interesting to note that the first bit to be transmitted is B1 which is the least
significant bit , not the most significant one.
Parallel
The bits are transmitted all at once (byte by byte) such as computer to printer
communication as shown in Figure .
59
It is guarded by start and stop bits and the character to character space is
random as shown in Figure . The efficiency is limited to 70% taking the start
bit, stop bit and parity bit into account.
The initial and final states are idle which corresponds to -12 volts in terms of
voltage level. An odd parity bit is appended to the data bits for the detection of
transmission error as shown in Figure .
The voltage level spans between -12 and + 12 volts as measured between either
the transmit (Pin 2 in RS-232-C) or receive (pin 3) with respect to signal return
(for RS232 C is pin 7) as shown in Figure .
The characters are packed together and there is no gap between two characters.
Sync is a special character used to synchronize the data reception as shown in
Figure . Usually for a bisynchronous format, there are four synchronous
characters preceding the data. In case there is no character to be delivered by
the transmitter, a special character such as 7E in hexadecimal is used to pad the
data.
Start, Stop and Parity bits are not required in synchronous transmission. As a
result, the transmission throughput is roughly twice the asynchronous
transmission for the same operating speed.
60
Synchronous data is usually driven by a clock. The clock signals can be either
external provided by the modem or internal provided by the computer port (Pin
number 24 in RS232-D). The clocking signal provided by internal clock is
usually lower than external clock as extra CPU time is required to produce the
clock by the computer as shown in Figure .
Character oriented such as RJE (The computer will process the received
character to determine the meaning of data. This format was developed a
long time ago by IBM and is still widely supported by various computer
manufacturers)
Bit oriented such as X.25 and IBM SDLC (The meaning for the data format
is fixed. The first character is a flag followed by the physical address of
device connected to the network. In terms transmission performance, this
approach is far better than the former one.)
Asynchronous Handshakes
There are two major handshaking methods being used by the
computers for asynchronous data format. The objective of
using handshaking is to protect slow device from being
overrun by fast device.
ENQ/ACK
This method was developed by HP to protect the terminal from the CPU as
shown in Figure .
send an ENQ to the terminal to check whether the terminal is ready (are you
ready?)
62
DC1/DC3 (Xon/Xoff)
It is quite common in industry to provide handshaking between
two communication devices.
DC1/DC2/DC1
It was invented by HP as well to protect the CPU from overloading data from
terminal as shown in Figure .
1 DC1 I am here
DC1 in Hex is 11, DC2 is 12, DC3 is 13, DC4 is 14, ENQ is 05 and ACK is 06
63
List the major difference between section 4.1 and 4.3. (Hints: Data to terminal
or data to computer.)
Modulation
Modulation is used to translate digital signals to analog signals which can be
transmitted over a transmissions medium without distorting the signals. The
original digitals sent by a computer is usually not appropriate for transmission
in a voice-grade channel. A pair of modems is used to generate a carrier in
which the digital data are modulated on to this carrier. Below diagrams are used
to demonstrate the resulting signal after modulated by a high frequency signal.
The envelope is the modulating signal as shown in Figure . The transmission
carrier used to modulate the original signal will be altered corresponding to
digital pattern.
Type of modulation
Modulation can be grouped into two categories:
Analogue
There are THREE basic modulation techniques using the
physical property of sin wave as given below:
Amplitude Modulation
The receiving modem can tell the difference between large and small
amplitudes and can regenerate the signal corresponding to 1 or 0 as shown in
Figure .
Frequency Modulation
If the channel bandwidth is only 3.2 KHZ, what is the requirement for the
frequencies used?
Phase Modulation
Note the change in phase with respect to an original signal waveform as shown
in Figure .
00 +45o
01 +135o
11 -45o
10 -135o
66
Figure shows phasor diagram with two examples and eight phases (0, 45, 90,
135, 180, 225, 270, 335). It provides 16 different signals, each of which can
represent 4 bits. This combination provides a quadbit capability known as
quadrature amplitude modulation (QAM). If it is used on a 9600 baud line, it
can provide transmission of 38400 bps (4x9600).
V29 4WFDX
Type Description
For example, the V22 modem as listed above, the carrier frequency is 600
Hertz. The fundamental signalling rate again is 600 baud and an information
transfer rate is 1200 bits/sec. Note that it carries 2 bits for each operating cycle.
Draw a diagram and explain why bits/sec and baud are quite different?
68
Baud rate refers to the symbol per unit time of which a symbol might consist of
two levels (one bit), four levels (two bits) or even more. Bit/s refers to the
actual measurement of data transmission.
Digital Transmission
With the introduction of digital lines, direct transmission of
digital signals becomes possible without converting to an
appropriate analog signal. The advantages offered by digital
network include:
If the bandwidth for channel 1 and 2 is 3.2KHZ, what will be the minimum
sampling rate without producing contaminated signal?
If the sampling rate is less than the calculated value, what is the resultant
output?
Analog Analog (old telephone switch)
Digital Digital (Internet)
Analog Digital network such as X.25
Different height of pulse trains is used to represent the different signal voltage
level as shown in Figure . The original signal is modulated by a constant pulse
train to produce the modulated signal. Note that the envelope represents the
original signal.
Different duration (length of each pulse) of pulse trains is used to represent the
analog signal as shown in Figure . Again the original signal is modulated by a
constant pulse trains.
70
Explain why the above-mentioned two cases are not appropriate for computer
processing.
Computer has to detect either the height or width and is not accurate.
NICAM samples the voice signal using 213 levels and compress the 13 bits into
8 bit output.
Type Description
Self-examined Questions
Short Questions
71
What is the maximum data rate for a voice-grade line with a bandwidth of
3200-HZ and a S/N ratio of 10000 to 1?
For the above question, what is the maximum data rate if the S/N ratio is 40
dB?
Briefly explain why a pair of modems is required to transmit the digital
signals over a long telephone wire.
What is the purpose of the carrier wave?
When is bits/sec different from baud rate and when they are the same?
How many frequencies are required for a 2-wire full duplex operation using
frequency modulation?
72
For the same question, how about the case for 4-wire full duplex?
True or False
ENQ/ACK is commonly known as XON/XOFF
Chapter Four
Transmission Media and Network Devices
T his chapter covers various transmission media available in Hong Kong for
transferring information, the characteristics and the ways to carry data during
its transmission are also included. Network configurations between two ends
including point-to-point and multi-point are also covered. The final section of
this chapter is about the supporting communications devices in a network to
facilitate the transportation of data. Upon completion of this chapter, you
should
List the different communication devices such as PABX, patch panel, switch,
front-end processor etc.
Transmission Media
Transmission media used to provide a connection between
sender and receiver to exchange information are generally
grouped into two major categories namely guided and
unguided.
Type Description
Unguided
Wire pairs are the most common medium in short distance such as connecting
computer port to modem or telephone set to telephone exchange. The modular
telephone jack installed in your house makes use of telephone wires. The wires
are made of copper and coated with insulating material like PVC. The cable is
highly reliable if it is protected by telephone duct. The transmitted signal relies
on the movement of electronics. It is manufactured in twisted wire pairs in
order to reduce crosstalk. You usually experience this effect while talking to
your friends over the phone and hear a very low background voice. The
bandwidth of an ordinary telephone wire is limited to 10KHz and is further
limited to 3300 Hz if it is used in Public Switching Telephone Network(PSTN).
Higher bandwidth will be chopped by the Switch. That is to say, even the
telhone line can support up to 10 Mbps, the CODER (switch coder and
decoder) will convert the analogue signal into 8K (sampling rate) x 8 bits (256
levels) = 64 Kbps signal internally.
It is the cheapest transmission medium and costs around 2 dollars per meter
depending on the quality, shielding and number of wires. The typical number of
wires in the cable is two (Twist) or four(Quad). To support wider area, Using
the Shannon’s theory, the maximum transmission speed per link can be over
10Mbits per second, which of course depends on the medium bandwidth and
the distance between two end points. Figure shows a few examples of wire
pairs.
Local Area Network (LAN) can support transmission rates over 16 Mbps or
even 100 Mbps over twisted telephone wires. This type of telephone cable is
75
Category 5 cable, which supports this speed at a short distance. If you subscribe
Interactive TV (ITV), they will replace your telephone cable by quad Category
5 cable to support voice and video.
Can you figure out the unused bandwidth compared with a modem operating at
the speed of 56k bps?
Coaxial cable
Optical Fiber
the highest transmission medium in the world. Recently, Hong Kong Telecom
is laying fiber optic cables to provide data superhighway to support personal
video services. It is expected that the future communications network in Hong
Kong will consist of one optical fiber with coaxial cable as the backbone within
the building. The terminator erected around each three stories will provide a
transmission bandwidth to each household at 20 M bps. At that you can use it
to watch movie, shopping, a real e-commerce world.
Figure shows a typical circuit that converts the digital signal to light travelling
along the optical fiber. Here, the electronic signals are converted into light
signals passing along the optical fibre and received by the remote. The remote
then converts the light signals into electronic signals. Note that light emitting
diode and photo diode are used to convert the electronics signal and accept the
light signal.
Satellite
The use of Satellite is to extend the coverage area. Signal is transmitted up and
down between ground stations. The satellite is therefore used as a repeater for
re-generating the signal. Figure shows how it works. Here, a transmit signal is
reflected by the satellite to cover a region on the earth. The characteristics are:
Network Configurations
This is about the network configuration between two or more nodes within a
large network topology. These are commonly used between terminal-to-
computer configurations in order to fully utilize the physical channel.
Point-to-point configuration
This is the simplest way of connecting a terminal to a
computer or computer to computer. It makes use of switched,
leased line or hard-wired service.
Multidrop configuration
In this configuration as shown in Figure , a number of
terminals/computers are connected to the same line at
different locations. A master modem is connected to the main
computer while a few slave modems are connected to other
computers. The characteristics are:
The last slave modem requires different stripping to absorb the reflection of
electronic signals.
Multiplexing
This uses a high speed link to share a few terminals in order to optimize the line
usage and reduce the operating cost of using multiple separate
telecommunication lines as shown in Figure Here, three terminals are shared
with a multiplexer through a common medium.
Cluster/terminal controller
This is also termed terminal multiplexer and is used to increase efficiency of
the high speed line and to offload the terminal handling mechanisms. Logical
connection is introduced rather than physical connection.
Cluster controller maximize the use of high speed relatively expensive to install a
80
line controller
Communications Devices
Modem
Modems are devices that convert a signal into an analog tone for transmission
on an analog network and demodulate that analog signal into a digital signal on
the receiving end as shown in Figure . Modems are broadly classified into
asynchronous and synchronous type.
Asynchronous Modem
If the incoming data rate is 2400 bps and the receiver is configured at 4800 bps,
what will be the result?
Synchronous modem
Other factors to be considered for selecting the right modem include the
following:
4 wire full duplex is usually leased by companies for high speed transmission.
CCITT Description
Type
Asynchronous; 14400 bit/s; Full duplex; 2-wire; dial-up; FAX send and
V.17
receive
V.21 Asynchronous; 300 bit/s; Full duplex; 2-wire; dial-up; low speed
Synchronous; 4800 bit/s; FDX; leased lines; 8 phase @ 1800 HZ; high
V.27
speed
V.29 Synchronous; 9600 bit/s; auto-equalized; FDX; 4-wire lines; high speed
82
V.34 33600 bit/s; FDX; 2-wire; high speed with data compression
The Zoltrix 56K Fax/Data/Voice with Speaker Phone Modem (internal) Models
FMVSP56i3 and FM-VSP56e3 also supports Flash ROM. This means that
whenever there is an update to the modem code, the user can download it from
the internet, and upload the new code into the modems Flash ROM.
The FMVSP56i3 and FM-VSP56e3 also provides 14,400 bps send/receive fax.
The fully-integrated phonebook ensures easy-to-use faxing. The user can even
“broadcast” your faxes to multiple recipients, schedule fax transmission, or
forward them to another number.
The incoming voice call can also be monitored to allow the user an option to
record the message or by a simple click of your mouse, to answer the call. And
with Caller ID, the user can tell who is calling before answering the call. This
kit includes the fax/modem, easy-to-read manuals, a microphone for hands-free
Full Duplex speakerphone operation along with fax, data, voice and
speakerphone software.
The Zoltrix 56K model FM-VSP56i3 and FM-VSP56e3 uses the Rockwell 56
K chipset, and incorporates all of the industry standard protocols (V.90,
K56Flex, V.34+, V.34, V.32bis, V.32, V.22bis, V.22, and V.21) with speeds
ranging from 56,000 bps* down to 300 bps.
On the Fax side it communicates with all ITU-T Group 3 FAX machines and is
compatible with ITU-T V.27ter and V.29, V.17, T.4 and T.30.
The software bundled with the Zoltrix 56K modem includes Cheyenne’s
Bitware lite or Thought Communications Faxtalk. Also with the FREE Internet
Software and extensive on-line service package you’ll be surfing the net,
sending e-mail messages and going on-line in no time at all.
84
Fax Features include" Send and Receive Fax Messages to or from any Group 3
Fax Machine/Fax card", “Automatic Fax/Data Detection” etc. Modem Features
include “Send and receive files, exchange E-mail and access online services”,
“Supports ASCII, Xmodem, Ymodem, Zmodem and Kermit Data transfer
protocols” Voice Mail Features include “Automatically detects and routes
incoming voice, fax and data calls to the proper module of integrated fax, data
or voice”, “Creates up to 999 voice mailboxes, each with a personalized
mailbox greeting” Speaker Phone Features include “Turns your computer into a
full-function speakerphone (speakers required)”, “Places and answers telephone
calls directly from your computer”. Technical specification include “Caller ID
(Requires Caller ID service from the phone compay)”, “Data throughput up to
224,000 bps”, “Max DTE rate of 230,400 bps”, “Modem Operating Modes”,
and
Multiplexers
The function of a multiplexer is to combine several low-speed
data either from terminals to computer ports to a high speed
communication channels over long distance. It is extremely
cost-effective when a pool of terminals are required to connect
to respective computer outputs to run different application
programs through a commonly shared channel as shown in
Figure . The advantages offered by using multiplexing include:
There are currently two types of multiplexing techniques namely time division
multiplexing and frequency division multiplexing.
Figure shows how a pair of TDMs work. The transmssion is divided into a
number frames each of which is used to support different devices.
Both Bit TDM and Character TDM use fixed frame format, which in certain
cases will not optimize the channel usage when the traffic for each device is
significantly different. The Statistical multiplexer is designed to eliminate this
wastage. In this device, the allocation of bandwidth is dynamic. Channels that
are idle are simply skipped as shown in Figure .
Micro/Mainframe Link
Three are three types of micro/mainframe links:
terminal emulation
87
distributed processing
as one can see, there are a number of extra workload when data is to be
communicated; to relieve the host processor of communications-related tasks,
front-end processors or data communications controllers are introduced.
Protocol converter
It is designed to form a bridge between two incompatible communications
protocols. One of the common application is in Synchronous to Asynchronous
conversion. A/S-3 manufactured by Black Box is used for connection of
asynchronous terminals, printers and personal computers onto an IBM BSC or
SNA/SDLC network. Figure shows the connection. Here, three asynchronous
terminals are connected to an IBM Mainframe 3090 through this converter.
Data Switch
This is designed to connect a few terminals to computers. Connections can be
made at each user’s terminal such as Devecon data switch. It is extremely cost-
effective when different brands of incompatible computers are used. Figure
shows how a switch is used to conncet between a printer and two PCs. This is a
manual switch set by the user.
Patch panel
It is principally similar to a data switch except it is operated
manually. The connection has to be made by using a short
wire jumper. By default, the DTE and DCE port is connected
together. The user can also connect any DTE to one of the DCE
ports at will. So long as a wire jumper is presented, the default
connection between two adjacent DTE/DCE connection is
broken.
DCE
Monitor
Figure shows how a patch panel works. Here, a patch panel is connected to a
few terminals locally. The user can change the connection by re-connecting the
short-wire jumpers.
Self-examined Questions
Short questions
90
Power stations are usually linked up with microwave, explain why several
100-pair submarine cables are still required.
List THREE advantages and disadvantages of Frequency Division
Multiplexing.
List TWO advantages and disadvantages of Statistical Time Division
Multiplexing
True or False
Telephone wire can carry more information than a coaxial cable
Multidrop configuration can reduce the line cost for low volume traffic
91
For band limited signal, a guard band is required for timing division
multiplexing
++/
92
Chapter Five
System Architecture
T his chapter is about the ISO/OSI reference model, a seven layer model for
computer communication. Upon completion of this chapter, you should
Network Architecture
Terminologies
Terms Description
Line Protocol
As described, a protocol is a set of rules governing two
communicating parties to exchange information correctly.
Regardless of computer type, if a protocol analyzer is hooked
up in the transmission line to monitor the network traffic. Both
parties must establish a communication session in order to
94
Can you suggest other examples that use the concept as mentioned?
Layered Protocols
Modern communications networks are using the concept of layered approach to
provide more reliable and flexible services. This approach clearly defines the
software and hardware interfaces between two layers using structural design.
Modification to one of the layers will not impact the adjacent layers so long as
the same interfaces are still maintained. The concept of layered design or levels
of abstraction has been widely accepted as a good system structuring practice.
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data Link layer
Physical layer
Layer Description
Physical layer Provides for the transparent bit transmission over the
communications medium such as CCITT (ITU-T) V.24.
Transport layer Provides an end-to-end transport service and is designed to keep the
user isolated from some of the physical and functional aspects of the
network.
Session layer Provides for mechanism that would allow application processes to
establish a session. A formal description is not yet available.
Presentation layer Responsible for the transformation of data such as data encryption
The functions distribution presented above represent a guideline only. Not all
systems conform to such distribution. For example, IBM SNA has its own
definition for each layer.
Passing data from one layer to others, what extra information is added and
where?
99
Header is added by each layer to the Protocol Data Unit(PDU) to identify the
location of each layer. For example, a 3-byte frame header and frame trailer are
added to the frame by data link layer, and a transmssion flag as the frame
delimiter is added by the physical layer.
Self-examined Question
Match OSI seven layers in column A to the description/characteristics in
column B. Each column in A may match a few columns in B.
Column A
Column
B
100
Chapter Six
Physical Layer
T his chapter is about the characteristics of Physical Layer, the lowest layer
in the ISO/OSI reference model. Most of the network problems such as noise
interference, incompatible cable connection and line disconnection come from
this layer. This layer interfaces with outside world through transmission
modem, LAN card, network terminating unit or direct connection with other
computers. Transmission error detection, digital signal conversion and
interfacing with various types of communications equipment are also done in
this layer. Upon completion of this chapter, you should
Physical Layer
No, as full duplex will not check the CTS prior to sending data.
DCE stands for Data Circuit Equipment and is the network boundary.
Therefore, it could be a modem for voice grade network, a network terminating
equipment for digital network or even a minicomputer.
Fill in the blank boxes in Figure using DTE, DCE or Data Link.
This is a 25-pin connector with data, control, timing and ground signal pins as
shown in Figure . Not all of them are used for data transmission as the basic
pins are three only, namely, Transmit (pin 2), Receive (pin 3) and Signal
Ground (pin 7) only.
Not all the signals are required to perform the data transmission in actual
application such as Ring Indicator is needed in dial-up modem.
It is used to detect whether any carrier wave used to carry data is presented in
the transmission line, which indicates whether the transmission line is empty or
occupied by the remote end.
Term Description
104
This signal comes from the modem to the data terminal equipment
to provide the correct timing to clock the data. This is primarily
used in synchronous modem to provide a trigger to the physical
layer to sample the data. Please note that, for asynchronous
transmission, line speed is required to configure the computer port
to sample the data once the start bit is received. On the other
Transmit/Receive hand, for synchronous transmission, there is no such requirement
Clock to provide the line speed for external clock. The line speed is
controlled by the modem which will generate a pair of clocking
signals (Transmit and Receive from pin 24 ETC (External
Transmit Clock) in RS232-D) to trigger the physical layer to
sample the data value. Because of this, a user will dynamically
change the line speed while a file transfer has started without
causing damage to the software.
This wire carries the digital data from the modem to the data
Receive data terminal equipment after demodulating the signal from the carrier.
The idle voltage level is -12 volts.
Receive Timing This signal from the modem to the data terminal equipment
accompanies the data so that the terminal equipment knows when
to sample the incoming data so as correctly interpret the data. This
105
This signal is used to advise the DTE that the modem has locked
Data Carrier Detect
onto the received carrier and that it is ready to demodulate data.
This wire carries the digital data from the DTE to the modem.
Transmit data
(From computer port to another computer.)
For Ring Indicator, physical layer will then raise the DTR and expects the DSR
signal from the modem prior to sending or receiving data as shown in Figure
with appropriate sequences.
For a typical asynchronous connection, only Transmit data, Receive data and
Signal ground are required to connect a DTE to DCE. A set of secondary
signals pin 12, 13, 14 & 16 of RS232C connection are used for monitoring
purpose or emergency use in case the primary signals are stuck.
DTE A DTE B
TD 2 2 TD
RD 3 3 RD
RTS 4 4 RTS
CTS 5 5 CTS
DSR 6 6 DSR
SG 7 7 SG
DCD 8 8 DCD
TC 15 15 TC
RC 17 17 RC
DTR 20 20 DTR
ETC 24 24 ETC
Draw the corresponding lines for IBM PC to IBM PC connection. and label the
pin number and explain why only three pins are sufficient in this connection.
DTE-DCE
This is a normal configuration of the V24 interface between the computer port
and modem. It therefore uses the straight through cable. That is to say there is
no cable cross. Figure is a synchronous modem connection, which requires
107
transmit and receive control to drive the signal data. Signal return path (Signal
Ground), other control signals such as RTS are not shown in this connection.
Communication hardware
By definition, computer communication refers to the exchange of data between
computers and terminals. This covers the data transmission to any type of
peripheral equipment (keyboard, disk drive etc.) and through and any type of
internal or external, wired (telephone line) or wireless (satellite link) data path.
The discussion of this section concentrates on the serial port only.
Serial communications
Type
Description
Baud rate
110
50, 110, 300, 600, 1200, 2400, 48000, 9600 and 19200
Data bits
5, 6, 7 or 8
Parity bit
Stop bits
1, 1.5 or 2
Protective
1 B2 G
Ground
Transmit
2 3 A4 TD Output
Data
111
Request to
4 7 A3 RTS Output
send
Data set
6 6 A6 DSR Input
ready
Signal
7 5 B1 SG
Ground
Data terminal
20 4 A2 DTR Output
ready
Ring
22 9 RI Input
indicator
Wiring Diagram
Apart from the conventional wiring diagrams between computer & modem and
computer & computer, Figure in previous page shows the wiring connection
between two PCs. Null modem refers to the connecting scheme between two
DTEs.
The transmitter portion of the controller converts an 8-bit data value placed
112
by the processor in the adapter’s output port, into a serial bit stream
During the transmission, the controller inserts the necessary start, stop and
parity bits.
During the reception operation, the chip uses the start, stop and parity bits to
synchronize the transmission, to identify the data bits and to check for
transmission error
All the serial communications controllers used in the IBM microcomputers are
capable of full duplex operation. That is to say while sending the data, an IBM
PC can also receive the data from the other side.
During the BIOS initialization routines, it stores the base address of the first
serial port at memory locations 400H in the BIOS data area. If two or more
ports are implemented, their base addresses are stored at memory locations
402H, 404H etc.
113
Baud Desired %
Rate Divisor Error
in HEX
Percentage of error will not contribute transmission error during data transfer,
as this minor discrepancy can be tolerated by the receiver.
Type
Description
114
This bit is used to select the parity type. Even parity is selected if
4
this bit is set to 1 else odd parity.
115
The frequency with which the program must monitor the line for new data can
be estimated by dividing the baud rate by the number of bits in each character
transmitted. For a typical 10-bit character (including one start bit, one stop bit,
one parity bit and seven data bit), it takes one-tenth time to monitor the line.
Say for example, 4800 baud rate will have to monitor the communication line
at a minimum frequency of 480 times per second to avoid the reception errors.
This leaves the CPU with less than 1/480 of a second to store, display and
manipulate the data. If interrupt subroutines were written to handle the receipt
of data, it needs to go through extra steps before loading the data into the
memory. A faster method is to use polling routine to repetitively keep check the
116
line status register to process the data. Using this method, the transmission line
speed can be extended beyond 30,000 bits per second.
Using two 386 PCs write a simple C program to perform file transfer and find
out the maximum transmission speed that could be reached using either
Interrupt or Polling method.
Settings made via AT commands are automatically reused by the modem until
another command is received to change them, or the modem is turned off
Basic Commands/H3
With the following basic AT commands, the user can make
calls directly, select the dialing method (tone or pulse), control
the speaker volume, and perform a number of other basic
modem operations. Some are as follows:
Command Description
Making a Call
To place a call use the following dial modifiers
The local modem loses the carrier signal from the remote modem.
The Hang Up command (H) is sent.
The DTR interface signal is dropped between the local DTE and modem
when the &D2 or &D3 command is in effect.
This command restores the factory default settings, dials, using tones, a 9 to
access an outside line, pauses briefly, then pulse dials the number 27888639.
AT &F1DT9,P27888639
Examples
118
The escape sequence causes the modem to go to the off-line command state
from the on-line data state. After this escape sequence, the modem can accept
user’s AT commands. The escape sequence consists of three escape code that
is defined by S-Register 2 (default value: decimal 43(+))
Do not enter any character before and/or after the “+++” for a guard time
specified by S-Register 12 (default: 1 second). The duration between escape
codes must also be within the guard time. After the modem recognizes a valid
escape sequence, an “OK” result code is returned. If an escape sequence is
valid, the escape code is transmitted to a remote modem. The ATO command
is used to go back to on-line data state.
CONNECT 28800
[data] [——]
( 1 sec pause )
( 1 sec pause )
OK
This command resets the modem and recalls the stored configuration as defined
at power on time.
Zn (Modem Reset)
This command displays the current active configuration, stored user profiles,
and the first four stored telephone numbers. Applications may change these
profile.
119
Figure shows the connection to CityU’s Link Plus to access the Internet
service. The AT commands include ATZ, AT10, ATTD2xxxxxx and waits for
the connection..
7 None 2 10
7 Odd 1 10
7 Even 1 10
7 Mark 1 10
7 Space 1 10
8 None 1 10
8 Odd 1 11
8 Even 1 11
The modem also has the capability of automatically adjusting the baud rate to
the internal serial port to physical carrier speed. The user application must
adjust the baud rate of the internal serial port to it by detecting carrier speed
after CONNECT xxxx message. This command setting is valid for reliable
(error corrected) link and normal mode connections. The baud rate adjust
feature is always active for direct mode connection.
120
Other Recommendations
X.20 and X.21 Recommendation
So far, we just mentioned the communication standard over
voice graded network. For digital networks such as X.25
packet switching network, X.20 and X.21 are another interface
standards which have received considerable attention in the
industry since being approved in 1976. Recommendation is
made to define the interface for asynchronous interface which
is similar to V.21. Recommendation X.21 defines the interface
for synchronous operation as shown in Figure . X.21 is a 15-
pin connector. However, only eight lines as shown below are
required. These recommendation will improve the performance
as the ready-for-sending signals which are used in V series are
not required. X.21 is the equivalent physical layer for X.25 and
is enhanced with byte timing to synchronize the receipt of
character. The functions of each pin are:
Signal Description
Control data flow and call request. It is always on for leased line.
C
This signal is equivalent to request to send in RS232D.
EIA RS-449/RS-422/RS-423
As RS-232 standard is limited by the distance and speed, other standards as
given below are later adopted to replace it. RS449 corresponding to CCITT
V.35 is a 37-pin connector and supports transmission rates up to 2Mbps with
cable length to 60 meters. It defines both mechanical (pin and plug
configuration) and procedural (signal descriptions) aspects similar to RS232.
The electrical specifications (balanced or unbalanced circuit) are defined by
RS422 and RS423 respectively.
RS-232 is also an unbalanced electrical circuit as the transmit and receive data
are referenced with respect to the same return path. The use of twisted pair can
cancel the cross talk produced by signal passing through the wire.
Current Loop
Current loop cannot extend the line speed, as it is limited by the processing
power of software program to read the data. Noise immunity is better than
RS232 connection, as it uses a pair of wire to send data. In case there is a noise,
it will be cancelled by this pair of wires.
Example of NT 4.+
To hire a 64K bps leased line from Hong Kong Telecom costs around 2000,
which, of course, depends on the distance and the line speed. The current
modem speed operating locally at 56 Kbps. The use of switched line costs less
than 100 as the cost is simply the rental line cost. However, it has the
disadvantage of line dropping. That is to say, if it is used for server connecting
to ISP, the line might be disconnected as a result of interference on regular
basis. This can be resolved by NT 4.+, as it has the capability of re-dialling to
the remote to recover the line disconnection. It is achieved by regular poll the
remote and in case there is no response, it will drop the line and re-dial. As a
result, it becomes a semi-permanent leased line operating at 56K bps at a cost
of 100, which is less than the hire of leased line as shown in Figure . NT can
support up to four switched lines offering the total speed of 224K bps. The
speed is still less than the IMS service offering a 1.5 M bps using the set-top
box for Interactive TV (ITV).
Why not request the modem to check whether the line is broken?
The modem even can detect whether the line is broken is unable to memorise
the telephone number and redials it. It should be up to higher level, not the
physical level, to decide whether to re-dial or because of disconnection.
123
Self-examined Questions
True or False
The RS-232-D is defined for asynchronous modem only.
For full duplex IBM PC to IBM PC connection, at least four wires are
required.
Short Questions
What is the function of the 150 ms turnaround time for a half duplex modem
(ie. time difference between RTS and CTS going on)?
How to decide which communication device (DTE/DCE) transmits the data
first?
What is the function of Data Terminal Ready or Pin 20 in RS232C
connection?
124
What is the function of Request to Send or Pin 4 in RS232C? Explain why
computer will not check this pin status for full duplex modem.
Explain why four specifications are needed to specify the requirements of the
physical layer.
Can we configure a null modem to have different transmit/receive clocks?
Explain why electrical balanced circuit can support higher transmission rate.
It uses two wires instead of single to transmit or receive data in order to cancel
the crosstalk due to high frequency.
125
Chapter Seven
Data Link Layer
T his chapter is about various protocols being used in data link layer which is
the second lowest layer in ISO/OSI reference model. The protocols are
generally classified into byte oriented and bit oriented protocols. The former
protocol is the oldest technology and has been widely proved to be a reliable
protocol for low speed low volume data transfer while the latter protocol is
more efficient in data processing. Error detection and correction is done in this
layer by re-transmitting the error frame. Upon completion of this chapter, you
should:
Frame Flow control, To prevent the sender from sending too fast. For
example, RNR in SDLC will be sent by the receiver if the receiver hasn’t
finished processing the previously received frames. It is required due to
speed mismatch between two communicating parties as shown in Figure .
126
The data link peer parties may reside in a host-node configuration, or a node-
node configuration as shown in Figure . The host-node refers to the interface
between the Data Terminating Equipment and the network boundary(DCE in
this diagram). The frame size between host-node and node-to-node may be
varied, as a result, the frames may be fragmented (break into a few smaller
frames) and reassembled (combine a few smaller frames into a larger frame)
while traversing along a pre-determined transmission path.
Explain why data link layer is concerned about frames between two adjacent
nodes.
The block diagram indicating the relationship between network layer and
physical layer is shown in Figure .
High Level data Link Control (HDLC: ISO). It is also the superset of SDLC,
LAP and LAPB. That is to say, HDLC covers SDLC (used by IBM), LAP
and LAPB (used by X.25) Fax transmission uses the modified HDLC which
is more complex.
Synchronous Data Link Control (SDLC: IBM) It is the proprietary product
of IBM System Network Architecture (SNA)
Advanced Data Communication Control Procedure (ADCCP: ANSI)
Link Access Protocol (LAP: CCITT)
Hewlett Packard Data Link Control (HPDLC: HP)
Layer 2 frame
Protocol Data Unit (PDU) for data link layer is often called a frame with frame
structure as given below:
The data field is used to carry layer 3 PDU, while the header (also called) PCI
in OSI model) contains control information. E.g. Sequence No.,frame type,
acknowledgment, etc.). Layer 2 passes the entire frame to layer 1 for
transmission.
The internal structure of the frame should be mechanical to the peer layer-2’s
only.
Can you Figure out how many bytes are required for the header and trailer?
Also find out the improvement in utilization if they are not added.
128
Sources of error
This section discusses where the error comes from. Error is mainly caused by
random signal that is unpredictable. Here, random signal refers to the noise.
White Noise
Interference
Crosstalk can be reduced by twisting the telephone wires. This will cancel the
effect of interference.
Human error
Other Errors
129
Figure shows the effect of corrupting the data by the presence of noise. The
binary data being transmitted will be incorrectly altered by the noise. That is
why the protocols available in data link layer must be capable to detect the
correctness of received data. The factors to measure how effective the protocols
to detect the transmission error include the percentage of detecting an error
(single bit, double bit or triple bit errors), and undetected error. BER (bit error
rate = Incorrect Data/Total transmitted Data ) is a measurement of how well the
medium transmission quality. The typical values are 10 -4 for telephone line and
10-10 for optical fiber.
Error Detection
A few codes or bits in association with the data are appended to the frame so
that the receiver can detect the presence of error by using a simple algorithm.
A single bit either ‘1’ or ‘0’ is appended to the end of each character to produce
an odd or even number of ‘1’ bits. This method is commonly used in start/stop
transmission (Asynchronous) as shown in Figure .
130
Type Description
1 start bit + 7 data bits + 1 parity bit + 1 or 2 stop bits = 10 bits, not just 8 bits
Advantages Disadvantages
This method is better than a simple Vertical Redundancy Check. The data is
grouped into blocks of characters, say for example 12 bytes from the Hong
Kong Stock Exchange, each of the character has a parity bit added. A block
check character (BCC) is then appended to the end of each transmission block.
The size of BCC can be 8, 12 or 16 bits depending on the algorithm.
The parity bits at the end of each character are known as Vertical Redundancy
Check (VRC) while the BCC is called the Block Check Character (BCC).
Advantage Disadvantage
The generator polynomial defined by CCITT for use on the switched telephone
is:
X16 + X12 + X5 + X0
X16 + X12 + X2 + X0
Error is measured in terms of Bit Error Rate. Typical value for switched line is
10-5.
What is the FCS if the frame transmitted in decimal is 728 and the generator
polynomial is 13? Assume two digits are used for error checking.
Can you list the dummy character used by SNA/SDLC, when there is no data
being transmitted?
What is the advantage of bit oriented frame compared to byte oriented frame in
terms of data position identification?
The protocol can detect the exact location of control and data filed without
processing the individual characters.
Byte-oriented Protocols
This type of protocols was developed a long time ago. A well known example
is the IBM BISYNC protocol used in Remote Job Entry (RJE). The computer
has to stripe down the character by character within the frame in order to
determine the meaning and action of received data.
Half duplex in Data Link Level ( can have FDX or HDX in physical level.)
Data link Level (not in physical level)
An industry standard
Used in Synchronous modem (Some users may use Sync/Async protocol
converter to fit into his own system such as Reuters.)
Uses either ASCII or EBCDIC as the code sets
Ideal for Low speed and High volume transaction
Uses VRC, CRC or LRC to determine transmission error
Remote Batch
Interactive terminals
134
Type Description
Byte stuffing
There are FOUR line states that BSC will be used to transfer
data. Initially, BSC will be in disconnected state until it
receives an event, it will then change to other state and take
appropriate action.
Type Description
Data Flow
The principal means of flow control is to lay down rules to control if a sender
can transmit a frame. For simplicity, both send and receive party can be
considered to consist of a sender and a receiver as shown in Figure
136
BSC uses simple stop-and-wait protocol. The sender, after sending a frame,
will stop and wait for an acknowledgment frame (from the receiver of the peer
party) before sending another frame. The data link layer frames of such a
protocol may consist of an information and acknowledge frame as shown in
Figure .
Figure shows the normal data flow with acknowledgment frame. The
transmitter initially transmits an ENQ and waits for an ACK0 prior to sending
the test frame.
The receiver uses ACK0 and ACK1 alternatively to inform the transmitter that
the messages are received correctly. Can you explain the reason behind?
After polling the remote for eight times, the sender may assume that the remote
machine is dead (usually power off) and will stop polling. These retried time-
outs can be configured by the user. Figure uses the two seconds as the time-out
value.
If the transmitter cannot receive the acknowledgment from the receiver, it will
send an ENQ instead of data frame and waits for the positive acknowledgment
from the receiver as shown in Figure . Note that there is a 3-second delay for
replying an ENQ.
Similar to Figure , the transmitter will send an ENQ instead. However, the
receiver will send an ACK0 instead of ACK1 after receiving the second ENQ.
If the receiver is busy, it will respond an WACK to temporarily stop the sender
until the busy condition is removed. Once the condition is over, it will send an
ACK0 to inform the sender to re-send data frame.
In this case, the sender is busy, it delays for 2 seconds and sends an TTD to
inform the receiver to suspend the transmission as shown in Figure . The use of
TTD is to maintain the communication link between the sender and receiver.
Duplicated frames
Duplicated frames can be handled by the use of sequence numbe, can you
explain why it can fix this number?
The user can check the correct sequence and remove duplicated frames by just
looking at the sequence number.
138
Bit-oriented Protocols
These protocols interpret the message as a stream of unstructured bits and uses
the relative bit position to determine the control information. This mechanism
is more efficient compared to byte-oriented protocols and is extremely suitable
for simultaneous communications protocols such as HDLC and SDLC. The
entire message is delineated by a Flag whereas the BSC has to use numerous
control fields such as SYNC, STX etc.
Type Description
There are three different formats for this fields, with a few bits assigned to
identify which format is being sent. Figure shows various control formats.
Type Description
Bit stuffing
Bit-oriented protocols use a unique sequence of bits such as 7E H for the start
and end of frame. To avoid an occurrence of this flag bit pattern (01111110)
anywhere, the sending station will automatically insert an extra zero into the
five contiguous ‘1’ bit stream. The receiving station will monitor the bit stream
and delete the extra zero.
0111 1110 address Control Data 0111 FCS FCS 0111 1110
1110
Primary Stations
It is responsible for controlling data link by issuing commands such as
Receive Ready.
Secondary
It receives commands from the primary and return responses.
In IBM SNA/SDLC, if the receiver does not receive any message for longer
than 32 seconds, it will assume that the primary is not functioning and
subsequently disable the line.
Figure shows the three operation modes. Here, Normal response mode support
one primary and a few secondary stations, whereas asynchronous response
mode and asynchronous balanced mode support only one primary and one
secondary.
HDLC
The High-level data link control protocol (HDLC) is a full-duplex bit-oriented
protocol. This protocol has a few configurations as given in Figure .
Type Description
Asynchronous Balance Used in point to point link where the stations behave as
Mode peers. This mode is used by X.25 to establish connection.
Information I I I I
Receive Ready RR RR RR RR
Set Asynchronous
SARM SARM
Response Mode
Set Asynchronous
SABM SABM
Balanced Mode
Sey Initialization Mode SIN SIN
Unnumbered
UI UI
Information
Unnumbered Poll UP UP
Reset RESET
Exchange Identification XID XID
Unnumbered UA UA UA UA
142
Acknowledgment
Disconnect Mode DM DM DM
Request Initialization
RIM RIM
Mode
Frame Reject FRMR FRMR FRMR
Request Disconnect RD RD
Command Reject CMDR
Test Test
Beacon BCN
CFGR
Configure
Based on above table, HDLC is a full specification comprising LAP, LAPB and
SDLC.
Flow Control
There are two methods namely rate control and sliding window to regulate the
flow of frames. Sliding window uses the size of sending window to restrict the
number of frames being sent out.
first rejected message. (Some frames had been receivd by the receiver. As a
result, it is less efficient.)
Selective repeat, just to ask the sender to send the message(S) that was/were
rejected by use of SREJ message. (It is more efficient. However, it needs
buffer to store the previously received frames.)
Explain why selective reject is more efficient in full duplex data link and is the
same in half duplex data link. The physical layer for both cases are full duplex
in nature. That is to say, no need to check the voltage status of CTS.
Link Initialization
Figure shows the methods of establishing a call under three response modes.
UA frame is used to respond to all three cases.
Link Disconnection
Figure shows the methods of terminating a call under three response modes.
Figure shows two examples of using sliding send windows to control the
number of frames to be delivered. In case 1, the transmitter can send out a
series of frame numbered from 0 to 6 and in case, it sends out from 0 to 4.
Data Flow
144
Error Handling
In case various errors as listed below are not caused by transmission, the
receiver will send a FRMR to the transmitter to reset the communication link.
Software error could be one of the following:
Receiver does nothing upon receipt of an invalid frame. It simply reports this
event to higher layer and waits for a link re-initialization.
An REJ signal is sent to A for an invalid frame of sequence 5. Note that A has
to re-send the data frame starting from sequence 5.
Self-examined Questions
HDLC
List the FOUR types of supervisory frames.
List the THREE modes defined by HDLC.
What is the function of the P-bit?
When is a FRMR sent instead of a REJ?
What is a problem of having a large window size?
What is the function of a sending window?
BSC
146
How are frames delineated in BSC? (What character, PAD, STX, ETX...)
How to fix the problem of duplicated frames?
What is the function of the EOT character?
True or False
UA is sent in response to SNRM.
REJ is sent against all the invalid frames for physical layer operating at half
duplex mode.
147
Chapter Eight
Network Control and Monitoring
T his chapter covers the third layer of ISO/OSI reference model. Network
layer is primarily responsible for routing the packets amongst the network
nodes and avoiding network congestion. Upon completion of this module, you
should understand:
Switching Techniques
There are FOUR types of switching techniques available:
Figure is the diagram showing different line speed for various equipment to
communicate through a packet switching network. In this diagram, a terminal
148
operating at different line speed can access the mainframe through the data
network.
Circuit Switching
A dedicated path between the source node and the destination
node is set up for the duration of communication session to
transfer data. A typical example is the use of FAX machine in
telephone network as shown in figure . The characteristics are:
Can you figure out how long it takes to set up a FAX connection?
Message Switching
The user message is forwarded across the network one hop at
a time. The entire message is transmitted and stored as a
whole at each node awaiting for the routing decision to be
made. This switching is sometimes called store-and-forward. A
similar example is to program the electronic mail to send to
different location at different time as shown in figure . The
Characteristics are:
Packet switching
The user messages are split up into packets of a fixed maximum size to be sent
across the network as shown in figure . The whole user messages are
reassembled at the destination node. Packet switching is efficient than message
switching as pipelining effect can be achieved. This can significantly reduce the
transmission time between the sender and receiver. The characteristics are:
Cell Switching
Figure is the diagram showing the use of ATM switches to support multi-media
traffic. These include voice, video, data etc. ATM network uses a cell of 53
bytes divided into 5-byte header and 48-byte payload field. The header contains
the information regarding the destination node and error checking and handling
while the payload field contains the data. The cell size of header is shown in
Figure . Here, it has VPI and VCI both of which refers to the virtual channel
identifier and virtual path identifier. Note that ATM network is ideal for optical
fibre operating speed up to 8G bps, it is more efficient to divide into a number
of physical paths and each path supports different channels.
150
ATM Layer
The ATM layer provides for the transparent transfer of fixed size ATM layer
Service Data Units (53 bytes) between the physical layer and the adaptation
layer. Currently, different headers are added to the data cell between the user
and the network and between nodes. The header field for the network and
network interface (NNI) and user network interface (UNI) comprises the fields
of Generic Flow Control, Virtual Path Identifier, Virtual Channel Identifier,
Header Error Control and Cell Loss Priority (CLP). Figure shows the position
of ATM cell layer.
The cell header error control (HEC) is designed using polynomial convolution
to check against multiple transmission errors and will correct a single bit error
in the header field. The header error protection scheme in this layer was
accepted by the IEEE 802.6 subcommittee and T1S1 in 1989. There is,
however, no error checking on cell contents at this layer and no error protection
or flow control from an ATM terminal onto the network. As the header’s
virtual path identifier and virtual channel identifier are modified by the network
at each hop, the header must be recomputed and checked by each ATM node to
ensure no transmission error.
Virtual Circuits
In this model in figure , the network layer provides the transport layer with a
perfect channel and all packets delivered in order. A virtual path or circuit is
set up so that packets can pass through over this connection. This connection
can be a permanent virtual circuit or switched virtual circuit analog to leased or
switched line. The characteristics are:
Easier for the user host to use as the data is already in correct sequence.
Circuit setup and disconnection is required each time.
151
Sophisticated user may want to do their own error and flow control schemes.
Datagram
In this type of service as shown in figure , each message in the network is not
related to any other messages. There is no connection between the sender and
receiver. Also the transport layer of the receiver must handle error and flow
control on its own. As there is no dedicated path between the sender and
receiver, the subnetwork accepts packets (often called datagrams) which
contain sufficient addressing information so that the packets can be individually
routed within he network. Basically, the user supplies the packets and the
subnet transports them to the destination.
The packets are routed individually and there are usually no delivery assurance
between the sender and receiver.
X.25 uses virtual circuit approach while TCP/IP Internet Protocol uses
datagram.
Can you list a few more discrepancies in terms of packet processing, error
handling, end-to-end flow control or efficiency?
Example of IP Protocol
TCP/IP is the protocol used in the Internet. It consists of five layers and the
network layer consists of four protocols. The commonly used protocol is
Internet protocol (IP) which uses Datagram to transmit data. Apart from this, it
has three more protocols for signalling and control purpose as follows:
It is used to collect and distribute the information for mapping tables and is
used to find out the corresponding physical address of destination node for an
IP address.
Internet protocol
The transport layer takes messages and breaks them up into datagrams of up
to 64K bytes each.
When all the pieces finally get to the destination machine, they are
reassembled by the gateway or transport layer to reform the original message
based on the fields of IP identification and offset in the IP header as shown
in Figure . The IP header has a 20-byte fixed part and a variable length as
shown below:
32 bits
Identification Fragment
DF MF offset
Source address
Destination address
Options
155
Chapter Nine
Transport Layer
The transport layer is the first layer that always resides in the end DTE’s. Also
note that the transport layer uses the services of the network layer and shields
156
the upper layers from the details of the network connections and types of
network used.
Type
Description
Type A
This type of network refers to the connection with both acceptable error rate
and acceptable rate of signalled failures. Packet delivery assurance and
sequencing are guaranteed. In this type of network, the transport layer needs
not worry about the quality and mis-sequencing of packets from the underlying
network. A network with virtual circuit services is a typical example.
Type B
This type of network refers to the connections with acceptable error rate but
unacceptable rate of signaled errors. The transport layer for this type of
network must provide capability to recover from signalled errors.
Type C
This type of network refers to the connections with unacceptable error rate. The
transport layer must be capable to recover from signalled failures and also
handle the mis-sequenced packets from the underlying network. Internet
protocol of TCP/IP, datagram based networks and certain Local area networks
are typical example of this type of network services.
157
Transport Services
The transport services are broadly classified into connection management and
data transfer as shown in figure . The data transfer is further classified into
normal data transfer and urgent data transfer (Expedited). The expedited data is
equivalent to sending control characters to abort a remote program. Error
detection and handling are also supported by means of message checksum and
message sequencing.
Connection establishment
Primitive Parameters
Term Description
Data transfer
Primitive Parameters
Expedited data (Max 16 octets of user data) bypasses normal data end-to-end
flow control. The transport layer ensures that expedited data will not be
delivered to the receiving transport user later than any normal data sent after it.
Connection termination
Protocol Operation
EA,,expedited data
0010 none
acknowledgement**
up to maximum value of
UD,,unit data 0100 network service data data
unit (NSDU)
Figure depicts the four conceptual layers that build on a hardware. The
application layer is the highest layer to allow users to invoke application
programs that access services available across a TCP/IP internet. The duty of
transport layer (TCP) is to provide end-to-end communication from one
application program to another using port number. It is connection oriented
protocol and regulates the flow of information and provide reliable message
162
Application Telnet FTP TFTP SMTP DNS LPR RouteD NFS/RPC REXEC POP2 T
Sockets
Data
link/Phusical
Token-ring, Ethernet V2, IEE 802.3, IBM PC network, Asynchronous
Token Ring
Ethernet V2
IEE 802.3
IBM PC Network
Serial Line such as City Link Plus through COM1 or COM.
Transport protocols
163
TCP
A TCP transport entity accepts arbitrarily long messages from user processes,
breaks them up into pieces not exceeding 64K byes, and sends each piece as a
separate datagram. the network layer gives no guarantee that datagrams will be
delivered properly, so it is up to TCP to time out and re-transmit them as
needed. Datagrams that do arrive may well do so in the wrong order; it is also
up to reassemble them into messages in the proper sequence.
Bit Position
1 32
Sequence Number
TCP Window
header URG ACK EOM RST SYN FIN
length
Options
User data.............
165
Chapter Ten
X.25 and Network Management
T his chapter is about the Wide Area Network using X.25 packet switching.
The functions and characteristics together with the networking components and
network management are also included. Upon completion of this chapter, you
should understand
Modem diagnosis
Network design
X.25
Defines three layers only not the whole seven layers including:
Physical layer
Data link layer
Network layer
Does not define internal subnet protocols.
166
Figure depicts the X.25 (DTE to DCE) interface and link connection through
Data Switching Exchange.
X.25 Level 1
This definition is consistent with OSI layer 1 and is classified
into two categories (Analog and digital) depending on the
network type to be connected.
X.21 bis
Interface to analog network
Equivalent to RS-232C - V.24. Referring to Figure .
X.21
Interface to digital network (may also support X.21 bis/ RS232C to those
which does not support). Deatils of connection, pleas refer to Figure .
Limited Support in Hong Kong
X.25 Level 2
This is consistent with OSI layer 2. The function of this level is
to ensure reliable communication between DTE and DCE as
shown in Figure . The protocols used include:
Figure shows the comparsion between the OSI and X.25 protocol structure.
Note that above layer 3 in X.25 is not defined.
X.25 uses virtual circuit approach and is only responsible for delivering the
packets from source to destination in a reliable manner. There, X.25 does not
conform exactly to OSI reference model, only the lowest three layers. The main
difference is in the interpretation of the services provided by the network.
X.25 Level 3
167
Packet assembler-disassembler
The X.25 as specified can only communicate with terminals or
computers that are intelligent using synchronous transmission
mode (LAP or LAPB). However, a lot of terminals such as
teleprinter are dummy terminals. CCITT therefore specified a
particular protocol converter that can support terminals of :
Basically the same except that X.28 is for digital network such as X.25 and
V.24 is for analog network such as PSTN.
The description for each field is attached for reference only. The details should
be covered in a later course entitled “Wide Area Networking” in Year 3.
Type Description
Calling DTE address It indicates the lengths of the calling DTE address. The
length format is Binary Coded Decimal (BCD) digits.
Called DTE address Same as calling DTE address length, it refers to the address
Length length of called DTE address.
DTE (called/calling) The format is specified by X.121. The first four digits are
170
X.25 protocol
It makes use of the concept of logical channel. A logical channel is a
conceptual path between a DTE and the network. Multiple logical channels are
multiplexed on an X.25 interface between the DTE and the network. Each
logical channel, when active, supports an active virtual circuit as given in
Figure .
Logical channel numbers for Virtual circuits are assigned at call set up time.
When you use the dial-in service to remotely log into CityU’s network, you
already make use of X.25.
Network Management
Once a network has been established, it is a good idea if one
can control it; monitor its performance; diagnose faults;
reconfigure in the event of failure; etc. All of these involve
network management. An efficient and reliable network
depends on:
Type Description
is less than 3 seconds after you have pressed any key strokes and wait for the
response.
Availability
It means that all necessary components are operable and accessible. For a
connection to CityU through the CityU Link Plus, it includes your PC,
Windows 95, Browser, modem, telephone exchange, remote server etc.
Accessibility means the user can make use of the component when needed. In
the same configuration, assume that 300 channels are used. However, it is all
occupied when you want to use it. Three more scientific factors to measure the
performance are: Mean Time Between failures (MTBF), and Mean time to
Repair (MTTR). For instance, a modem with MTBF of 1000 hours that
operates an average of three days a day, 20 days a month, would be expected to
fail once every 1000/(3 x 20 ) = 16 months. These figures are provided by the
manufacturers to indicate the reliability of that product. MTTR is the average
amount of time required to restore the failure into normal service such as
replacing faculty modem using 30 minutes. Availability is defined as:
A(t) = a / (a + b) + b /( a + b) e-(a + b) t
Given a modem having an MTBF of 2000 hours and an MTTR of 1 hour, the
availability for an 8-hour period is
Reliability
It is concerned with the probability that the system will continue to function
over a given operating period. It a transaction requires 1 second for a response
to be received, then the reliability of the system is the probability that the
system will not fail during that second. Reliability includes the error
173
If the MTBF for a modem is 1000 hours, and a transaction requires 1 minute,
the reliability is R(1) = e-1/1000 =
System components
For a typical IBM environment, faults are usually classified into four areas as
shown below:
As shown in Figure for an IBM SNA network, which part is the role of a
network engineer?
Circuit problem
Use of the telephone system for data transmission can cause problems for the
user in a number of ways. The four main categories of problem include:
Line Errors
Type Cause
Background noise
Frequency shift - Sudden change of frequency change
Phase distortion
Non-linear distortion
Transmission breaks
Contention
Software consideration
Statistics collection
The principal reasons for collecting event statistics on a
cumulative basis include:
The detailed statistics logging and analysis should be decided by the network
engineer based on the systems he is working on and actual operational
experience.
Performance Statistics
Statistical information can be collected in the following IBM
devices:-
Host (3090)
Front End Processor (3725)
Intelligent Terminal Control Unit (3174)
External Equipment (3278/3279)
Type Description
Character in/out This indicates the loading on the system and the traffic
177
Response
time
Trouble Shooting
Goals of Datacomm Testing
The goals of datacommunication testing are to:
Testing domain
Analog testing
Transmission impairment and continuity
Measuring sets include voltmeter
Digital
Bit Error Rate Tester. It is used to measure the ratio between the error bits
against the totally received bits including the error bit.
Protocol
Serial Data Analyzer (It captures the status of every V24 interface lead for
every bit time on the interface. Data can be stored on tape or diskette for
later analysis.)
LAN Protocol Analyzer (To measure the network loading, performance and
traffic pattern.)
179
Breakout box
Figure shows the use of break-put box to diagnose the
network connection between a modem and terminal. A break-
put box is
Protocol Analyzer
Figure shows the use of protocol analyzer to monitor the
contents of data movement between a computer and a
modem. The characteristics of protocol analyzer include:
Modem diagnostics
As shown in Figure , by looping the analog side, the messages sent by DTE
will be returned and processed by DTE to ensure that the analog and digital
side of modem, and data link between two modems are working properly.
End-to-end Test
180
The text messages will be sent by one of the computers and be captured by
another to verify the communication is in proper condition as shown in Figure .
However, this procedure can only detect a single direction of data flow.
It uses a machine to perform loop-back text by looping the remote digital side
(by twisting transmit and receive pins.) This can detect the send/return path as
shown in Figure .
The types of terminal and the software under which they are to
work, will determine some of the network options such as:
Synchronous or asynchronous?
Contention or polled protocol? This will determine whether a point to point
or multipoint structure is required.
Does the software monitor and/or transmission control unit support dial-up
links?
Network or standalone?
Redundancy
Fallback arrangements for networks of private circuits usually
take the form of standby facilities. There are three broad
approaches to redundancy in the communications network as
given below:
Standby modem
As shown in Figure , a single standby modem is installed to replace the
defective modem once a hardware problem is found.
182
Self-examined Questions
Short Questions
What is bit error rate?
Which loopback test verifies the whole information channel?
What are some of the reasons for having networks?
What is the idea of local digital loopback?
183
What is the function of PAD?
X.21__________________________________________________
V.24__________________________________________________
X.28__________________________________________________
What are some advantages of X.25 packet switching networks?
List the components required to design a reliable network.
List three redundancy methods and point out the cheapest method.
True or False
X.25 defines the first five layers of the ISO model.
X.28 defines the interface between the terminal and the PAD.
Chapter Eleven
Signalling
T2, T3 and T4
T2 provides a data rate of 6.312M bps and is derived from multiplexing 96
channels of 64K bps. T3 provides a data rate of 44.736M bps and is derived
185
Application
If 28.8K bps is used for T2 digital link, how many channels can this link
support?
If a compressed voice 8K bps is used for T1 digital link between two telephone
exchanges, one in Hong Kong and the other in Sydney, how many users can
this link support?
An ordinary telephone line can support data rate up to 16M bps for IBM Token
ring. Thin rate (thin coaxial cable) usually support 10M bps for Ethernet. If
coaxial cable or optical fibre is used, it can support up to 152M or even higher.
Two standards are defined for the physical interface to ISDN, namely the Basic
Rate Interface (BRI) defined in CCITT/ITU ISDN I.430 (1993), and the
Primary Rate Interface (PRI) in CCITT/ITU I.431 (1993). Both standards
define the electrical coding and frame formats. ISDN has been further
elaborated since the 1984 recommendations to support a 16 Kbps channel
known as D channel for signalling purposes and two 64 Kbps channels known
as B channels for basic access. It was also proposed to support higher rates,
known as H channels, for primary access which had different configurations
for North America (1544 Kbps) and Europe (2048 Kbps). ISDN is a circuit-
switched type network but can access packet-switched services by D channels.
Two major benefits offered to users are:
187
In summary, the signalling rate for ISDN from the user viewpoint is two 64K
bps amounting to to 144K bps. However, the basic transmission rate requires
192K bps of digital transmission capacity. The original intend is to provide
voice and data to the desktop terminal/PC at home at this rate without
considering the rapid development of high bandwidth network to support multi-
media services. We can hire this service from Hong Kong Telecom to support
data transfer.
However, there are still many issues regarding the types (H and B) and the
number of channels incorporated into B-ISDN. ITU-T Recommendation I.120
(1993) further enhanced B-ISDN to support different kinds of applications and
customer categories:
188
The first term Asynchronous refers to the sending of data on the network as it
arrives. The second term transfer refers to both transmission and switching
aspects. Transfer mode is therefore a specific way of transmitting and switching
information. The basic transmission unit, according to the definition in I.113
(1991), is: a cell is a fixed length 53-byte packet, which contains a 5-byte
header and a 48-byte information field. The header is used for identification by
the ATM nodes and the information field is used by the user to carry
information. Data is packed into the cells and sent out onto the network to
support multiplexed transmission in an irregular pattern. ATM is therefore
sometimes called label multiplexing in which the label is used by the receiver
to verify which connection the cell is to be associated with. The allocation of
cells contrasts with STM which allocates the data in a regular time slot. Cosmas
(1994) pointed out that the main benefit of cell switching is statistical
multiplexing, which is the simultaneous use of the same communications
circuits by many sources on a demand basis.
189
The main limitation of current networks is that they are designed only to
support one type of traffic or service. For example, a telephone network makes
use of circuit mode to support voice service whilst a data network makes use of
packets to transport messages. However, ATM is designed to support a mixture
of different kinds of services and combines these two extremes to optimise the
bandwidth usage. This method is more efficient compared to the traditional
communication mode. In addition, ATM handles the traffic based on demand,
which means no traffic, no bandwidth drain. This is in contrast to STM
(Synchronous Transfer Mode) which partitions the fixed bandwidth into fixed
slot times and wastes the slots when there is no data.
Currently, 44.736 Mbps (DS3), 100 Mbps (Multimode fibre) and two 155.52
Mbps (Based on Synchronous Optical Network and ITU-T Recommendation
I.432 (1992) interfaces are specified in ATM Forum (1993).
ATM is the underlying transmission system for B-ISDN and provides the
subscriber with communications services over a wide range of bit rates. These
include services at a bit rate of the order of 50 bps to 100 Mbps. The current
ATM standard allows a user to access telephone networks at speeds over 622
Mbps and will eventually go up to gigabit speeds.
Dependent
Sublayer
Line coding Based on ANSI o o o o
X3T9.5 (FDDI)
committee to use
the 5-bit symbol
Physical o o o o
Medium
available
ITU-T I Series
An ITU-T committee formerly known as the CCITT was renamed as the
Telecommunications standardisation sector. This is a United Nations sponsored
treaty organisation and has published approved recommendations in the form of
a set of books. The B-ISDN/ATM standards were classified into I and Q series.
Figure shows the application scope of I series recommendations.
Bellcore
As early ATM implementations served as a backbone networks,
it is able to support the existing Switched MultiMegabit Data
Service (SMDS) proposed by Bellcore for the Regional Bell
Operating Companies. SMDS is a high-speed connectionless
data service at current bit rates up to 155 Mbps intended to be
a Metropolitan Area Network (MAN), which can evolve into a
country-wide service (Le Boudec 1992). It uses the ITU-T
recommendation E.164 global addressing to connect to
customer premises network via the Subscriber-Network
Interface (SNI) and Network Node Interface (NNI) as shown in
Figure A.. SNI is first based on the IEEE 802.6 Distributed
Queue Dual Bus (DQDB) MAC protocol and uses a protocol
called Subscriber Interface Protocol (SIP) containing roughly
three levels up to AAL connectionless data service of ITU-T. It
is now run on top of an ATM network. The functions of three
levels are summarised below:
The level 1 of SIP is for data transmission and uses DS-1 signaling
providing digital transmission rates of 1.544 Mbps or DS-3 at the
transmission rates of 54 Mbps. As the need for speed increases to support
full motion video, higher speed services like DS-3 are becoming more
common.
The level 2 of SIP is equivalent to the ATM cell layer and part of the
Transmission Convergence Sublayer (TC).
The level 3 of SIP is equivalent to AAL of CCITT and switches the frames
which cross the interface to their destination.
ATM Forum
192
Self-examined Questions
Short Questions
What is data rate for T1, T2 and T3?
T1
T2
T3
What is the data rate for ATM switch using optical fibre?
Chapter Twelve
PC Software Characteristic
The easiest way to interact with the user is by presenting a few simple
choices or an introductory menu on the screen. This has been adopted by
most communication S/W.
As the number of choices displayed on the screen is limited to between 15 &
20, the programme can display additional menus after the initial selection.
A menu-driven programme assumes only a minimal knowledge on the part
of the user, as choices are always displayed on the screen, but it has
195
limitation.
On-line “help” facilities are usually available.
A large number of choices leads to hierarchical menus which may make a
menu-driven program very cumbersome.
Command Driven
Instead of choosing from a limited number of options displayed on the screen
in a menu, most communication S/Ws can also be driven by issuing short
commands as well. The user then gains considerable flexibility at the expenses
of having to remember the various commands, through on-line “HELP”
facilities. For instance, the popular Crosstalk and Mirror programmes combine
menu-driven and command driven approaches by responding to large
dictionary of user commands and by displaying the most important ones in a
menu on the screen.
Programmability
Crosstalk
Procomm
It is a general asynchronous communication software using serial card. It has
strong terminals emulation capability and supports a lot of file transfer
protocols. The programming language available is called ASPECT. It includes
a fast text editor called PCEDIT. The Script language supports HOST mode
that lets remote user log on to an unattended computer and use it like a Bulletin
Board System. It also supports background operation in Multitasking
environments.
Mirror
197
Smartcom
It supports asynchronous communication software using serial card. It is
specifically designed to work with Hayes smartmodem products or V-series
system products. It supports common terminals emulation and limited file
transfer protocols. It provides remote access capability, which requires both the
originating and answering system. It allows the originator of a call to take
control of the answer’s programme from a remote location. It has a pre-
configured communication sets available to access the popular information
services such as CompuServe, DJN/R etc.
Example of Hyperterminal
Windows 95/98 provide a list of software for terminal emulation. Simply click
the menu of accessories, you will find the diagram as shown in Figure . Here, it
has four icons with different terminal characteristics. If you click AT&T mail
(a big telecommunication corporation in US), and select the mail properties,
you need to configure your PC which port you need to connect to the modem,
the phone number of the remote site and its area code. The area code for Hong
Kong is 852. The diagram is shown in Figure
You can emulate the type of terminal characteristics as shown in Figure . Here,
you an specify the type of emulation such as ANSI, TTY, VT100 etc. Each of
them has similar characteristics with slight variation.
You can perform the file transfer by clicking the send icon as shown in Figure .
Here, you have to specify one of the PC transfer protocols, namely, Xmodem,
Ymodem, Ymodem-G, Zmodem and Kermit. They are the commonly used
protocols in PC environment with different message size and handshaking. Of
198
course, both sides must configure the same protocol. Otherwise, it cannot
communicate.
Figure shows the how to configure a modem including the port number,
maximum speed and the volume of speaker. .
Figure shows the data bit (7 bits), parity bit and also the stop bit in your data
format. here, the stop bit can be 1, 1.5 and 2 bits. 2-bit stop bit means it has to
wait the duration of 2 bits before it receives a new one. .
199
Chapter Thirteen
Future Data Communications
New technologies and industries are being created as a result of people striving
to find solutions to communication needs. The solutions address such problems
as traffic jams on the spectrum, reduced orbital space for satellites, and
pollution of the air waves.
Can you think of another place where a cellular phone is not allowed? Briefly
explain why.
Health concerns for the users of these products have also been an issue.
Although it is not scientifically proven, there have been some cases where
individuals feel that they developed a brain tumor from constant use of a
cellular phone.
Digital radio will provide consumers with clear, almost-noise-free radio sound.
It takes up less spectrum space and will use a range of spectrum that is not
cluttered like AM and FM radio spectrums. The frequency range used by
digital radio is known as the L-band.
Search to find information about this new technology and share it with your
fellow students in the conferencing sessions or using ICQ.
PCS and digital radio are just two of the new emerging technologies. There are
many others. DTHS (Direct-to-Home Satellite), and satellite modems are
examples of what is coming that will have a major impact on society.
Collect information about future technologies. Use the Internet search engines
and locate the wireless gallery. Use your lesson Resources file for other
sources.
Example
Networks are used for moving large files between the mass storage
peripherals on these systems.
Computers are loosely coupled to each other by use of communications
lines.
The file size is usually from kilobytes upward and the response time is in the
order of seconds for small files and minutes for large files as shown in
Figure .
The only choice available for long haul transfer is the existing
telecommunication system which is connected oriented, a connection is
202
Figure is the diagram showing the relationship between the size of end-user and
the needed response time.
Traffic from the terminal to the computer is often a few bytes at a time
representing a few characters at a speed typed by the user.
Average bit rate is not likely to exceed 200 bits per second averaged over a
minute.
Asynchronous line speed of 1200 or 2400 bits per second are adequate for
this type of communication. In Hong Kong, the commonly achievable line
speed is 56K bits per second.
Traffic from the computer to the terminal is more demanding with up to a
full screen such as 25x80 bytes or 20,000 bits burst to the screen at a few
seconds.
As the terminals are dumb, a communication connection is mandatory.
Traffic from the station to the computer may range from a few bytes to an
entire screen of information.
Usually, the station handles most human interaction and periodically sends
updated and validated information to the main frame.
Station to computer work units range from a few tens of bytes to 25x132
bytes or 33,000 bits burst in a few seconds.
203
Client-server Model
A typical example of client server model is the Internet (User to
Business)/Intranet (user to Business with limited location) or Extranet
(Business to Business). Currently, the line speed is limited to 56K bps for
ordinary telephone line but can be extend to 1.5M bps for IMS service or Cable
modem for (Cable TV) for 10M bps, it is expected that wireless data
communication will soon (by 2002) provides a data rate up to 2M bps or even
up to 20M bps. This means that any mobile phone can hook up to a Latop
computer to visualise graphics, video, voice etc. through the Internet. The
currently line speed provided by mobile phone is 9600 bps and will reach to
14.4 k bps this year. that it
Systems Software
While single task operating systems such as MSDOS will be obsolete except
for old development because of the huge embedded base of application
software (a certain large bank in Hong Kong still uses self-developed MSDOS-
based e-mail system), multitasking operating systems such as UNIX, OS/2, NT
will be getting popularity. This will also be accelerated by factors of
demanding more user-friendly end users interface such as windowing systems.
Figure shows the MIPS and the size of Real Memory against the size of CPU
chips.
Self-examined Question
Once data has been converted to digital code, it can be easily altered by the
user. For example, photographs can be scanned, digitalized then transmitted
and altered. Knowing this, can we assume photographs are proof of anything?
Can they still be valid sources of court documentation? In terms of news
reporting, what ethics are involved here?
Think of the jobs and professions that benefit from pagers and mobile phones.
What are the disadvantages?