Data Communication - CHAPTER-3
Data Communication - CHAPTER-3
MWU-IT@2023
3.1. Network line configuration
MWU-IT@2023
• The entire capacity of the channel is reserved for transmission between
those two devices.
• Most point-to-point line configurations use an actual length of wire or
cable to connect the two ends, but other options, such as microwave or
satellite links, are also possible.
• Point to point network topology is considered to be one of the easiest
and most conventional network topologies. It is also the simplest to
establish and understand. To visualize, one can consider point to point
network topology as two phones connected end to end for a two way
communication.
MWU-IT@2023
Multipoint Configuration
MWU-IT@2023
3.2. Networking and Internetworking devices
• Hub
• Hubs work in the physical layer of the OSI model.
• A hub is a device for connecting multiple Ethernet devices and making
them act as a single network segment.
• It has multiple inputs and output ports in which a signal introduced at the
input of any port appears at the output of every port except the original
incoming port.
• A hub can be used with both digital and analog data. Hubs do not perform
packet filtering or addressing function, they send the data packets to all the
connected devices.
MWU-IT@2023
Repeater
MWU-IT@2023
Bridge
• A bridge operates at the data link layer of the OSI model. It can read only
the outmost hardware address of the packet but cannot read the IP address.
It reads the outmost section of the data packet to tell where the message is
going. It reduces the traffic on other network segments. It does not send all
the packets. So, a bridge can be programmed to reject packets from a
particular network.
7
Switch
• Switches may operate at one or more layers of the OSI model. They may
operate in the data link layer and network layer; a device that operates
simultaneously at more than one of these layers is known as a multilayer
switch.
• A Switch can check the errors before forwarding the data, which makes it
more efficient and improves its performance. A switch is the better version
of a hub. It is a multi-port bridge device.
8
Router
• Routers are small physical devices that operate at the network layer to join
multiple networks together.
• A router is a device like a switch that routes data packets based on their IP
addresses.
• Routers normally connect LANs and WANs and have a dynamically
updating routing table based on which they make decisions on routing the
data packets.
• A Router divides the broadcast domains of hosts connected through it.
• Routers perform the traffic directing functions on the Internet.
• A data packet is typically forwarded from one router to another through the
networks that constitute the internetwork until it reaches its destination
code.
9
Gateway
10
3.3. Network Topologies
MWU-IT@2023
Network Topologies …continued
12
MWU-IT@2023
Bus Topology
• The Bus topology consists of a single cable that runs to every work-station.
• In other words, all the nodes (computers and servers) are connected to the
single cable (called bus), by the help of interface connectors.
• This central cable is the back bone of the network and every workstation
communicates with the other device through this bus.
13
MWU-IT@2023
Bus Topology
Advantage Disadvantage
1) It is easy to set-up and extend 1) There is a limit on central cable length
and number of nodes that can be
bus network.
connected.
2) Cable length required for this 2) If the main cable (i.e. bus) encounters
topology is the least compared to some problem, whole network breaks
other networks. down.
3) Proper termination is required to dump
3) Bus topology very cheap. signals. Use of terminators is must.
4) Linear Bus network is mostly 4) Efficiency of Bus network reduces, as the
used in small networks. number of devices connected to it
increases.
5) It is not suitable for networks with heavy
traffic.
6) Security is very low because all the
computers receive the sent signal from
the source. 14
Ring Topology
15
MWU-IT@2023
Ring Topology
Advantage Disadvantage
1) This type of network topology is very 1) Each packet of data must pass
organized. Each node gets to send the data
through all the computers between
when it receives an empty token. This helps
to reduces chances of collision. Also in ring source and destination. This makes it
topology all the traffic flows in only one slower than Star topology.
direction at very high speed.
2) If one workstation or port goes
2) Even when the load on the network
increases, its performance is better than that of
down, the entire network gets
Bus topology. affected.
3) There is no need for network server to 3) Network is highly dependent on
control the connectivity between workstations. the wire which connects different
4) Additional components do not affect the components.
performance of network.
5) Each computer has equal access to 4) MAU‟s and network cards are
resources. expensive as compared to Ethernet
cards and hubs. 16
Star Topology
17
MWU-IT@2023
Star Topology
18
MWU-IT@2023
Star Topology
Advantage
Disadvantage
1) As compared to Bus topology it gives
far much better performance, signals 1) Too much dependency on
don’t necessarily get transmitted to all central device has its own
the workstations. A sent signal reaches drawbacks. If it fails whole
the intended destination after passing
through no more than 3-4 devices and 2- network goes down.
3 links. 2) The use of hub, a router or a
2) Easy to connect new nodes or devices. switch as central device
In star topology new nodes can be added
increases the overall cost of the
easily without affecting rest of the
network. Similarly components can also network.
be removed easily. 3) Performance and as well number
3) Centralized management. It helps in of nodes which can be added in
monitoring the network.
such topology is depended on
4) Failure of one node or link doesn’t
affect the rest of network. At the same
capacity of central device.
time it is easy to detect the failure and 19
troubleshoot it.
Mesh Topology
20
MWU-IT@2023
Mesh Topology
Advantage Disadvantage
• Data can be transmitted from
• There are high chances of
different devices simultaneously.
redundancy in many of the
This topology can withstand high
network connections.
traffic.
• Overall cost of this network is
• Even if one of the components
way too high as compared to other
fails there is always an alternative
network topologies.
present. So data transfer doesn’t
get affected. • Set-up and maintenance of this
topology is very difficult. Even
• Expansion and modification in
administration of the network is
topology can be done without
tough.
disrupting other nodes.
21
Hybrid Topology
MWU-IT@2023
Hybrid Topology
MWU-IT@2023
Hybrid Topology
24
MWU-IT@2023
Hybrid Topology
Advantage Disadvantage
1) Reliable: The part in which fault is detected 1) Complexity of Design: One of the biggest
can be isolated from the rest of network and drawbacks of hybrid topology is its design.
required corrective measures can be taken, It is not easy to design this type of
WITHOUT affecting the functioning of rest of the architecture and it’s a tough job for
network. designers. Configuration and installation
2) Scalable: It’s easy to increase the size of process needs to be very efficient.
network by adding new components, without 2) Costly Hub: The hubs used to connect
disturbing existing architecture. two distinct networks, are very expensive.
3) Flexible: Hybrid Network can be designed These hubs are different from usual hubs
according to the requirements of the organization as they need to be intelligent enough to
and by optimizing the available resources. Special work with different architectures and
care can be given to nodes where traffic is high as should be function even if a part of
well as where chances of fault are high. network is down.
4) Effective: Hybrid topology is the combination 3) Costly Infrastructure: As hybrid
of two or more topologies, so we can design it in architectures are usually larger in scale,
such a way that strengths of constituent topologies
they require a lot of cables; cooling
are maximized while there weaknesses are
systems, sophisticate network devices, etc
neutralized.
25
3.4. Connection Oriented and connectionless Services
• There are two ways to establish a connection before sending data from
one device to another, that are:
– Connection-Oriented and
– Connectionless Service.
• Connection-oriented service involves the creation and termination of the
connection for sending the data between two or more devices.
• In contrast, connectionless service does not require establishing any
connection and termination process for transferring the data over a
network.
26
MWU-IT@2023
Connection-Oriented Service
27
MWU-IT@2023
Connection-Oriented Service
• What is a TCP?
• TCP (Transmission Control Protocol) is a connection-oriented protocol
that allows communication between two or more computer devices by
establishing connections in the same or different networks. It is the most
important protocol that uses internet protocol to transfer the data from
one end to another. Hence, it is sometimes referred to as TCP/IP. It
ensures that the connection is established and maintained until the data
packet is transferring between the sender and receiver is complete.
28
MWU-IT@2023
Connectionless Service
29
MWU-IT@2023
Connectionless Service
• For example, a sender can directly send any data to the receiver without
establishing any connection because it is a connectionless service. Data
sent by the sender will be in the packet or data streams containing the
receiver's address. In connectionless service, the data can be travelled
and received in any order. However, it does not guarantee to transfer of
the packets to the right destination.
• What is UDP?
• The UDP (User Datagram Protocol) is a connectionless protocol that
allows communication between two or more devices without
establishing any connection. In this protocol, a sender sends the data
packets to the receiver that holds the destination address. A UDP does
not ensure to deliver the data packets to the correct destination, and it
does not generate any acknowledgment about the sender's data.
Similarly, it does not acknowledge the receiver about the data. Hence, it
is an unreliable protocol. 30
MWU-IT@2023
End of Chapter-3
MWU-IT@2023