0% found this document useful (0 votes)
61 views92 pages

ECE 512L Data Communication: Engr. Adriano Mercedes H. Cano JR

The document outlines the course modules for ECE 512L Data Communication at University of Mindanao - Tagum College, covering topics such as data communication fundamentals, fundamental concepts, data link control protocols, and data communication networking. The course modules will examine communication models, protocols, standards, and networking concepts like the OSI model, TCP/IP, Ethernet, and the Internet. Reference books on advanced electronics communication and data communications and networking are also listed.

Uploaded by

Mind Control
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views92 pages

ECE 512L Data Communication: Engr. Adriano Mercedes H. Cano JR

The document outlines the course modules for ECE 512L Data Communication at University of Mindanao - Tagum College, covering topics such as data communication fundamentals, fundamental concepts, data link control protocols, and data communication networking. The course modules will examine communication models, protocols, standards, and networking concepts like the OSI model, TCP/IP, Ethernet, and the Internet. Reference books on advanced electronics communication and data communications and networking are also listed.

Uploaded by

Mind Control
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 92

ECE 512L

Data Communication
Engr. Adriano Mercedes H. Cano Jr.
Electronics Engineering
College of Engineering Education
University of Mindanao - Tagum College
Course Outline

• Module 1: Data Communications


Fundamentals
– Communication model,
– Data communication network
– Standards,
– Protocol
– OSI model,
– TCP/IP,
Course Outline
• Module 2: Fundamental Concepts of Data
Communications
– Data Communications Circuits
– Data Communications Codes
– Bar Codes
– Line Control Unit
– Error Control
– Error Detection
– Error Correction
– Serial Interfaces
– Data Communications Modems
– ITU-T Modem Recommendations
– Character Synchronization
Course Outline
• Module 3: Data Link Control Protocols
– Data-Link Protocol Functions
– Character- and Bit-Oriented Data-Link
– Protocols
– Asynchronous Data-Link Protocols
– Asynchronous Transfer Mode
– Synchronous Data-Link Protocols
– High-Level Data-Link Control
– Public Switched Data Networks
– CCITT X.25 User-to-Network Interface Protocol
– Integrated Services Digital Network
– Synchronous Data-Link Control
Course Outline
• Module 4: Data Communication Networking
– Introduction to Switched Circuits
– Circuit Switching and Packet Switching
– Local Area Networks, Applications, and Architectures
• Ethernet
• Ring
• Token Ring
• FDDI
– Local Area Networks and Interconnections
• Repeaters
• Bridges and Switches
• Routers and Gateways
– The Internet
• Overview of the Internet
• The Internet Protocol
• Domain Name Systems
• Internet Protocol Over Internet
Reference Books
• Advance Electronics Communication
– Wayne Tomasi
• Data Communications and Networking
– Behrouz A. Forouzan
Module 1:
Data Communications Fundamentals
Introduction

• Data generally are defined as information


that has been processed, organized, and is
stored in digital form
• Information is defined as knowledge or
intelligence.
• Data communications is the process of
transferring digital information (usually in
binary form) between two or more points.
Data Communication
Location A Location B

Standards

Encryption

Network Devices

Header & Trailer


Error detection and correction
Introduction
• Data Transmission
• is the transmission, reception, and
processing of digital information
• Transmission is either parallel or serial
Introduction
• Transmission Modes
– Simplex (SX) mode, data transmission is unidirectional; receive-only,
transmit-only, or one-way-only lines.
• Ex. Commercial radio broadcasting
– Half-duplex (HDX) mode, data transmission is possible in both
directions but not at the same time. Also called two-way-alternate or
either-way lines.
• Ex. Citizens band (CB) radio
– Full duplex (FDX) mode, transmissions are possible in both directions
simultaneously, but they must be between the same two stations. also
called two-way simultaneous, duplex, or both-way lines.
• Ex. A local telephone
– Full/full duplex (F/FDX) mode, transmission is possible in both
directions at the same time but not between the same two stations (i.e.,
one station is transmitting to a second station and receiving from a third
station at the same time).
• Full/full duplex is possible only on multipoint circuits.
• Ex. postal system
Introduction
• Data can be propagated to the network by
either
– Segment
– packet
– frame,
Introduction

• Data communications networks


– are systems of interrelated computers and
computer equipment(called nodes) and
connected together through the public
telephone network.(media links)
– Its purpose is to transfer digital information
from one place to another.
History of Data Communication
• 1753. One of the earliest means of
communicating electrically coded information
through a 26 wire system.
• 1833. Carl Friedrich Gauss developed a system
based on a 5x5 matrix representing 25 letters.
• 1832. The telegraph (the first data
communication system) was invented by Samuel
F.B. Morse.
• 1840. The American patent for the telegraph was
granted.
• 1844. The first telegraph line was established
between Baltimore and Washington D.C.
conveying the first telegraph message “What
hath God wrought!”

16
History of Data Communication
• 1849. The first slow-speed telegraph printer was
invented.
• 1850. Western Union Telegraph Company was
formed in Rochester, New York, for the purpose
of carrying coded messages from person to
another.
• 1860. “High-speed” printers (15 bps) became
available.
• 1874. Emile Baudot invented the a telegraph
multiplexer that allowed signals from up to six
different telegraph machines to be transmitted
simultaneously over a single wire.
• 1875. The telephone was invented by Alexander
Graham Bell.

17
History of Data Communication
• 1899. Guglielmo Marconi succeeded in sending
radio (wireless) telegraph messages.
• 1920. The first commercial radio stations carrying
voice information were installed.
• 1930s. Konrad Zuis, a German engineer,
demonstated a computing machine.
• 1940. Bell Laboratories developed the first
special purpose computer using
electromechanical relays for performing logical
operations.
• 1946. The first modern-day computer (ENIAC)
was developed by J. Presper Eckert and John
Mauchley at the University of Pennsylvania.
18
History of Data Communication
• 1949. The U.S. National Bureau of Standards
developed the first all-electronic diode based
computed capable of executing stored-programs.
• 1950s. “Batch processing” computers used
punched cards as an input interface, printers as
an output interface, and magnetic tape reels for
data storage.
The first general purpose computer in
the form of an automatic sequence-controlled
calculator was developed jointly by Harvard
University and IBM Corporation.
• 1951. Remington Rand Corporation built the first
mass-produced electronic computer (UNIVAC).
19
History of Data Communication
• 1960s. Batch-processing systems were
replaced by on-line processing systems with
terminals connected directly to the
computer through serial or parallel
communication lines.
• 1968. The landmark US Supreme Court
Carterfone decision allowed non-Bell (non
AT&T) equipment to be connected to the
vast AT&T network.
• 1969. The internet began to evolve at the
Advanced Research Projects Agency (ARPA)
through the ARPANET.
• 1970s. Microprocessor-controlled
microcomputers were developed.
20
History of Datacom
• 1980s. Personal computers became an
essential item in the home and the
workplace. Since then, the need to
exchange digital information, and
consequently, the need for data
communication circuits, networks, and
systems increased exponentially.
• 1983. AT&T agreed in a court settlement to
divest itself of operating companies that
provide basic local telephone service to
various geographic regions of the US as a
result of an anti-trust suit filed by the federal
government.

21
History of Data Communication
• Mid 1980s to 1995. The United Stated National Science
Foundation (NSF) funded a high-speed backbone called
the NSFNET.
• 1989. Tim Berners-Lee and Robert Cailliau build the
prototype system which became the World Wide Web at
CERN.
• 1991. Anders Olsson transmits solitary waves through
an optical fiber with a data rate of 32 billion bits per
second.
• 1992. Neil Papworth sends the first SMS
Internet2 organization is created.
• 1994. Internet radio broadcasting is born.

22
History of Data Communication
• 1999. 45% of Australians have a mobile phone.
Sirius satellite radio is introduced.
• 2001. First digital cinema transmission by satellite
in Europe of a feature film by Bernard Pauchon
and Philippe Binant is undertaken.
• 2003. Apple launches the iTunes Music Store and
sells one million songs in its first week.
MySpace is launched.
• 2004. What would become the largest social
networking site in the world, Facebook is
launched.
• 2005. YouTube, the video sharing site is launched.
.

23
History of Data Communication
• 2006. Twitter, microblogging is
introduced.

24
Network Architecture

outline the Design of


products and communication
services network

Network Architecture

is a framework for
is a set of layers the specification
and protocols
Network Architecture

• General classifications:
– Current: include the most modern and
sophisticated networks and protocols
available.
– Legacy: no one really wants to use it, but for
some reason it just will not go away.
– Legendary: Old and No longer in use
Network Architecture

• can be classified in two different ways:


– Broadcast :
• messages are intended for all subscribers on the
network
• all stations and devices on the network share a single
communication channel
– Point to point:
• All transmissions from one station are intended for and
received by the other station.
– multicasting:
• when messages are intended for a specific group of
subscribers.
Network Architecture

Company A A Company YA

Protocol
layers of functional responsibility
hardware arrangements
electrical specifications
Transmission media
software procedures

Company X A
Company BA
Network Protocols
how much data can be sent?
what procedure will be used to

how it will be sent? how much data can be sent?

sets of rules that allows two


hardware or software
processes to work together

ensure that there are no undetected errors? how it will be addressed?


Network Protocols
• Protocol stack
– The list of protocols used by a system, which
generally includes only one protocol per layer
Consist of two or
more independent
levels.
Each level has a
specific set of
responsibilities and
functions

Layered Network
Reduce Complexity Architecture data transfer,
Standardizes interfaces flow control,
Facilitates modular data segmentation
engineering
reassembly,
Ensure Interoperable
sequence control,
engineering
error detection and
Accelerates evolution
correction,
simplifies teaching and
learning notification
Network Protocols
Connection- oriented protocol Connectionless protocol

1. Establishes handshake before any 1. Send data with a source and


data are actually transmitted between destination address without a
two stations. handshake .
2. Require s acknowledgement of the 2. Do not support error control or
data as they are being transmitted. acknowledgment procedures,
(ensure reliability)
making them
3. Provide some means of error control
3. Data being transmitted usually do
not have extra overhead
4. When a connection is no longer
needed, a specific handshake drops the
connection.

Connections are sometimes referred to


as sessions, virtual circuits, or logical
connections.
Network Protocols

Connection-oriented protocol

Connectionless protocol
Network Protocols

reliability
Network Protocols

• Syntax
– refers to the structure or format of the data within
the message, which includes the sequence in
which the data are sent.
• Ex: the first byte of a message might be the address of
the source and the second byte the address of the
destination.
• Semantics
– refers to the meaning of each section of data.
• Ex: does a destination address identify only the
location of the final destination, or does it also identify
the route the data takes between the sending and
receiving locations?
Data Comm. Standards

• Standard
– is an object or procedure considered by an authority
or by general consent as a basis of comparison
• Data communications standards are not laws,
however—they are simply suggested ways of
implementing procedures and accomplishing
results
• Guidelines that have been generally accepted by
the data communications industry

Copyright 2005 John Wiley & Sons, Inc 1 - 37


Data Comm. Standards

• Importance
– Compatibility of hardware and/or software systems among
different companies
– Help promote competition and decrease the price
• Types of Standards
– Formal standards
• Developed by an industry or government standards-making
body
– De-facto standards
• Emerge in the marketplace and widely used
• Lack official backing by a standards-making body

Copyright 2005 John Wiley & Sons, Inc 1 - 38


Standardization Processes

• Specification
– Developing the nomenclature and identifying
the problems to be addressed
• Identification of choices
– Identifying solutions to the problems and
choose the “optimum” solution
• Acceptance
– Defining the solution, getting it recognized by
industry so that a uniform solution is accepted

Copyright 2005 John Wiley & Sons, Inc 1 - 39


Some Data Comm. Standards
Layer Common Standards
HTTP, HTML (Web)
5. Application layer MPEG, H.323 (audio/video)
IMAP, POP (e-mail)
TCP (Internet)
4. Transport layer
SPX (Novell LANs)
3. Network layer IP (Internet)
IPX (Novell LANs)
Ethernet (LAN)
2. Data link layer Frame Relay (WAN)
PPP (dial-up via modem for MAN)
RS-232c cable (LAN)
1. Physical layer Category 5 twisted pair (LAN)
V.92 (56 kbps modem)

Copyright 2005 John Wiley & Sons, Inc 1 - 40


Major Standards Bodies

• ISO (International Organization for Standardization)


– Technical recommendations for data communication interfaces
– Composed of each country’s national standards orgs.
– Based in Geneva, Switzerland (www.iso.ch)
• ITU-T (International Telecommunications Union –
Telecom Group
– Technical recommendations about telephone, telegraph and
data communications interfaces
– Composed of representatives from each country in UN
– Based in Geneva, Switzerland (www.itu.int)

Copyright 2005 John Wiley & Sons, Inc 1 - 41


Major Standards Bodies

• ANSI (American National Standards Institute)


– Coordinating organization for US (not a standards- making
body)
– www.ansi.org
• IEEE (Institute of Electrical and Electronic Engineers)
– Professional society; also develops mostly LAN standards
– standards.ieee.org
• IETF (Internet Engineering Task Force)
– Develops Internet standards
– No official membership (anyone welcomes)
– www.ietf.org

Copyright 2005 John Wiley & Sons, Inc 1 - 42


Standards
• Proprietary
– are generally manufactured and controlled by one
company.
– Ex: Apple Macintosh.
– Advantages
• are tighter control, easier consensus, and a monopoly.
– Disadvantages
• include lack of choice for the customers, higher
financial investment, overpricing, and reduced customer
protection against the manufacturer going out of
business.
Standards
• Open System
– any company can produce compatible equipment or
software; however, often a royalty must be paid to the
original company.
– Ex: IBM’s personal computer.
– Advantages
• customer have a choice, compatibility between venders, and
competition by smaller companies.
– Disadvantages
• less product control and increased difficulty acquiring
agreement
• between vendors for changes or updates.
• In addition, standard items are not always as
• compatible as we would like them to be.
STANDARDS ORGANIZATIONS

• A consortium of organizations, governments,


manufacturers, and users meet on a regular basis to
ensure an orderly flow of information within data
communications networks and systems by establishing
guidelines and standards.
• The intent is that all data communications equipment
manufacturers and users comply with these standards.
• Standards organizations generate, control, and
administer standards.
• Often, competing companies will form a joint
committee to create a compromised standard that is
acceptable to everyone.
Layered network architecture
• Each layer adds value to services provided by sets of
lower layers.
• The highest level is offered the full set of services
needed to run a distributed data application.
• Each layer is essentially independent of every other
layer.
• Advantages
– facilitates peer-to-peer communications protocols
• where a given layer in one system can logically communicate
with its corresponding layer in another system.
• allows different computers to communicate at different levels.
• Disadvantage
– tremendous amount of overhead required
In case of more >1 destination: service access point (SAP) address is
used to define which entity the service is intended.
Protocol Data Unit

• communications between two corresponding


layers requires PDU.
• can be a header added at the beginning of a
message or a trailer appended to the end of
a message.
• As data passes from one layer into another,
headers and trailers are added and removed
from the PDU.
• The process of adding or removing PDU
information is called encapsulation
/decapsulation
Protocol Data Unit
OPEN SYSTEMS INTERCONNECTION

• In 1983, the ISO and ITU-T (CCITT)


adopted a seven-layer communications
architecture reference model.
• The primary purpose is to serve as a
structural guideline for exchanging
information between computers,
workstations, and networks.
• Each layer consists of specific protocols for
communicating.
OPEN SYSTEMS INTERCONNECTION

• was developed to facilitate the


intercommunications of data processing
equipment by separating network
responsibilities into seven distinct layers.
• As with any layered architecture, overhead
information is added to a PDU in the form of
headers and trailers.
• In fact, if all seven levels of the OSI model are
addressed, as little as 15% of the transmitted
message is actually source information, and
the rest is overhead.
Open Systems Interconnection

54
Please Do Not Touch Steve’s Pet Alligator
Open Systems Interconnection
LAYERS FUNCTIONS
 User networking applications and
interfacing to the network
 Encoding language used in transmission

 Job management tracking

 Data tracking as it moves through a


network

 Network addressing and packet


transmission on the network
 Frame formatting for transmitting data
across a physical communications link
 Transmission method used to propagate
bits through a network
56
Open Systems Interconnection
TCP/IP

57
OSI and its Protocol Data Units

ECE @Saint Louis University, Baguio City 58


Physical layer
Data Link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer

• Layered network
• architectures consist of two or more
independent levels
DoD: Department of Defense
TCP/IP

• Transmission Control Protocol/Internet


protocol
• TCP at the transport layer and IP at the
network layer
• Designed by Vinton G. Cerf and Robert E.
Kahn
• developed by the United States Defense
Advanced Research Projects
Agency (DARPAor ARPA)
TCP

• Reliable, full-duplex, connection-oriented,


stream delivery
– Interface presented to the application doesn’t
require data in individual packets
– Data is guaranteed to arrive, and in the
correct order without duplications
• Or the connection will be dropped
– Imposes significant overheads
Applications of TCP

• Most things!
– HTTP, FTP, …

• Saves the application a lot of work, so


used unless there’s a good reason not to
TCP implementation

• Connections are established using a


three-way handshake
• Data is divided up into packets by the
operating system
• Packets are numbered, and received
packets are acknowledged
• Connections are explicitly closed
– (or may abnormally terminate)
TCP Packets

• Source + destination ports


• Sequence number (used to order packets)
• Acknowledgement number (used to verify
packets are received)
TCP Segment
0 4 10 16 19 24 31
Source Port Destination Port
Sequence Number
Acknowledgment Number
Len Reserved Flags Window
Checksum Urgent Pointer
Options... Padding
Data...
Field Purpose
Source Port Identifies originating application
Destination Port Identifies destination application
Sequence Number Sequence number of first octet in the segment
Acknowledgment # Sequence number of the next expected octet (if ACK flag set)
Len Length of TCP header in 4 octet units
Flags TCP flags: SYN, FIN, RST, PSH, ACK, URG
Window Number of octets from ACK that sender will accept
Checksum Checksum of IP pseudo-header + TCP header + data
Urgent Pointer Pointer to end of “urgent data”
Options Special TCP options such as MSS and Window Scale

You just need to know port numbers, seq and ack are added
TCP : Data transfer
Client Host

Send Packet 1
Start Timer Packet Lost Packet should arrive
Timer ACK should be sent
ACK would normally
Arrive at this time

Time Expires

Retransmit Packet1
Timer Start Timer Receive Packet 1
Send AXK 1
Receive ACK 1
Cancel Timer
IP

• IP : Internet Protocol
– UDP : User Datagram Protocol
• RTP, traceroute
– TCP : Transmission Control Protocol
• HTTP, FTP, ssh
OSI Model TCP/IP Hierarchy Protocols

7th
Application Layer

6th
Presentation Layer Application Layer

5th
Session Layer

4th
Transport Layer
Transport Layer

3rd
Network Layer
Network Layer

2nd
Link Layer
Link Layer
1st
Physical Layer

Link Layer : includes device driver and network interface card


Network Layer : handles the movement of packets, i.e. Routing
Transport Layer : provides a reliable flow of data between two hosts
Application Layer : handles the details of the particular application
IP

• Responsible for end to end transmission


• Sends data in individual packets
• Maximum size of packet is determined
by the networks
– Fragmented if too large
• Unreliable
– Packets might be lost, corrupted,
duplicated, delivered out of order
IP addresses

• 4 bytes
– e.g. 163.1.125.98
– Each device normally gets one (or more)
– In theory there are about 4 billion available

• But…
Routing

• How does a device know where to send


a packet?
– All devices need to know what IP
addresses are on directly attached
networks
– If the destination is on a local network,
send it directly there
Routing (cont)

• If the destination address isn’t local


– Most non-router devices just send
everything to a single local router
– Routers need to know which network
corresponds to each possible IP address
Allocation of addresses

• Controlled centrally by ICANN


– Fairly strict rules on further delegation to
avoid wastage
• Have to demonstrate actual need for them
• Organizations that got in early have
bigger allocations than they really need
IP packets

• Source and destination addresses


• Protocol number
– 1 = ICMP, 6 = TCP, 17 = UDP
• Various options
– e.g. to control fragmentation
• Time to live (TTL)
– Prevent routing loops
0 4
IP Datagram
8 16 19 24 31
Vers Len TOS Total Length
Identification Flags Fragment Offset
TTL Protocol Header Checksum
Source Internet Address
Destination Internet Address
Options... Padding
Data...

Field Purpose Field Purpose


Vers IP version number TTL Time To Live - Max # of hops
Len Length of IP header (4 octet units) Protocol Higher level protocol (1=ICMP,
TOS Type of Service 6=TCP, 17=UDP)
T. Length Length of entire datagram (octets) Checksum Checksum for the IP header
Ident. IP datagram ID (for frag/reassembly) Source IA Originator’s Internet Address
Flags Don’t/More fragments Dest. IA Final Destination Internet Address
Frag Off Fragment Offset Options Source route, time stamp, etc.
Data... Higher level protocol data

We only looked at the IP addresses, TTL and protocol #


Source IP Routing Destination
Application Application
Transport Router Transport
Network Network Network
Link Link Link

• Routing Table
Destination IP address
IP address of a next-hop router
Flags
Network interface specification
UDP
User Datagram Protocol)

• Thin layer on top of IP


• Adds packet length + checksum
– Guard against corrupted packets
• Also source and destination ports
– Ports are used to associate a packet with a
specific application at each end
• Still unreliable:
– Duplication, loss, out-of-orderness possible
UDP datagram
0 16 31
Source Port Destination Port
Length Checksum
Application data

Field Purpose
Source Port 16-bit port number identifying originating application
Destination Port 16-bit port number identifying destination application
Length Length of UDP datagram (UDP header + data)
Checksum Checksum of IP pseudo header, UDP header, and data
Typical applications of UDP
– Where packet loss etc is better handled by
the application than the network stack
– Where the overhead of setting up a
connection isn’t wanted

• VOIP
• NFS – Network File System
• Most games
IPv6

• 128 bit addresses


– Make it feasible to be very wasteful with
address allocations
• Lots of other new features
– Built-in autoconfiguration, security options,

• Not really in production use yet
Network Standard

ITU-T
ISO Network
Architecture
TCP/IP
OSI

HTTP

Network Protocol

WIFI/WIMAX Protocols

You might also like