Unit 1
Unit 1
A Data Communication system has five components as shown in the diagram below:
2. Sender The sender is any device that is capable of sending the data (message).
3. Receiver The receiver is a device that the sender wants to communicate the data (message).
4. Transmission Medium It is the path by which the message travels from sender to receiver. It can be
wired or wireless and many subtypes in both.
5. Protocol It is an agreed upon set or rules used by the sender and receiver to communicate data. A
protocol is a set of rules that governs data communication. A Protocol is a necessity in data
communications without which the communicating entities are like two persons trying to talk to each
other in a different language without know the other language.
DATA REPRESENTATION:
1. Text includes combination of alphabets in small case as well as upper case. It is stored as a
pattern of bits. Prevalent encoding system : ASCII, Unicode
2. Numbers combination of digits from 0 to 9. It is stored as a pattern of bits. Prevalent encoding
system : ASCII, Unicode
3. Images ―In computers images are digitally stored.
4. Audio Data can also be in the form of sound which can be recorded and broadcasted
5. Video refers to broadcasting of data in form of picture or movie.
DATA FLOW
The data can flow between the two devices in the following ways.
Simplex
In Simplex, communication is unidirectional Only one of the devices sends the data and the other one
only receives the data.
Example: in the above diagram: a cpu send data while a monitor only receives data.
Half Duplex
In half duplex both the stations can transmit as well as receive but not at the same time. When one device
is sending other can only receive and viceversa (as shown in figure above.) Example: A walkie-talkie.
Full Duplex
In Full duplex mode, both stations can transmit and receive at the same time.
Computer Networks
Computer Networks are used for data communications Definition: A computer network can be defined as
a collection of nodes. A node can be any device capable of transmitting or receiving data. The
communicating nodes have to be connected by communication links.
A Compute network should ensure reliability of the data communication process, should c security of the
data performance by achieving higher throughput and smaller delay times
Categories of Network
Networks are categorized on the basis of their size.
A.Local Area Networks (LAN) is usually limited to a few kilometers of area. It may be privately
owned and could be a network inside an office on one of the floor of a building or a LAN could
be a network consisting of the computers in a entire building.
B.Wide Area Network (WAN) is made of all the networks in a (geographically) large area. The
network in the entire state of Maharashtra could be a WAN
C.Metropolitan Area Network (MAN) is of size between LAN & WAN. It is larger than LAN but
smaller than WAN. It may comprise the entire network in a city like Mumbai.
Network Topology
Topology defines the structure of the network of how all the components are interconnected to each
other. There are two types of topology: physical and logical topology.
1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
Bus Topology: The simplest type of topology is called a bus topology, in which network
communication takes place over a single bus or channel.
Economical to implement.
The bus's limited length means that only a certain number of nodes can connect to it.
As messages are broadcast to all nodes, there are more security concerns and risks.
Ring Topology: When two computers are connected to form a ring, the topology is known as a ring
topology. The message passing is circular and unidirectional. A fixed amount of time is allotted for each
computer to access the network for transmission in this deterministic network topology. Each node is a
part of a closed loop.
Simple installation
Star Topology: A computer network topology known as a star topology connects each node to a
central hub. The hub or switch acts as a bridge between the nodes. Any node making a service request or
offering a service must first get in touch with the hub. The other connected devices function as clients in
a star topology, while the hub and switch serve as a server.
Centralized management.
Simple to scale.
Mesh Topology: Mesh technology is a network configuration in which computers are linked to
one another by numerous redundant connections. There are numerous methods for transferring from one
computer to another. It lacks a switch, hub, or any other central computer that acts as a communication
hub.
Due to each node having its own dedicated path, fault tolerance is good.
Quick communication.
Implementation is expensive.
Very Dependable.
Implementation is costly.
Tree Topology: A computer network topology known as a "tree topology" is one in which all
nodes are either directly or indirectly connected to the main bus cable. Bus and Star topologies are
combined to create tree topology.
Computer networks are dependent on protocols and standards which plays a vital role, which
enables communication between different devices and systems with one another and share data
seamlessly. Network protocol ensures that different technologies and components of the network are
compatible with one another, reliable, and able to function together.
Protocols and standards enable secure and efficient computer network communication. They regulate
data exchange, formatting, endpoints, and reliable device communication.These protocols and standards
ensure network security and performance. Complying can prevent data breaches and system
breakdowns.
There are n numbers of users who use computer network and are located over the world. So to
ensure, national and worldwide data communication, systems must be developed which are compatible to
communicate with each other ISO has developed a standard. ISO stands for International organization of
Standardization. This is called a model for Open System Interconnection (OSI) and is commonly known
as OSI model. The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a
complete communication system.
They are:
1. Application Layer 2. Presentation Layer 3. Session Layer 4. Transport Layer
5. Network Layer 6. Datalink Layer 7. Physical Layer
Below we have the complete representation of the OSI model, showcasing all the layers and
how they communicate with each other.
Feature of OSI Model:
Big picture of communication over network is understandable through this OSI model.
We see how hardware and software work together.
We can understand new technologies as they are developed.
Troubleshooting is easier by separate networks.
Can be used to compare basic functional relationships on different networks.
TCP/IP architecture
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used
in the current Internet architecture as well. Protocols are set of rules which govern every possible
communication over a network. These protocols describe the movement of data between the source and
destination or the internet. They also offer simple naming and addressing schemes.
Protocols and networks in the TCP/IP model
TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by Department of
Defence's Project Research Agency (ARPA, later DARPA) as a part of a research project of network
interconnection to connect remote machines. The features that stood out during the research, which led to
making the TCP/IP reference model were:
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact until the source and destination
machines were functioning.
The overall idea was to allow one application on one computer to talk to(send data packets) another
application running on different computer.Below we have discussed the 4 layers that form the TCP/IP
reference model:
Layer 1: Host-to-network Layer:
Lowest layer of the all.
Protocol is used to connect to the host, so that the packets can be sent over it.
Varies from host to host and network to network.
Layer 2: Internet layer
Selection of a packet switching network which is based on a connectionless internetwork layer is
called a internet layer.
It is the layer which holds the whole architecture together.
It helps the packet to travel independently to the destination.
Order in which packets are received is different from the way they are sent.
IP (Internet Protocol) is used in this layer.
The various functions performed by the Internet Layer are:
Delivering IP packets
Performing routing
Avoiding congestion
Layer 3: Transport Layer
It decides if data transmission should be on parallel path or single path.
Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.
The applications can read and write to the transport layer.
Transport layer adds header information to the data.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
Transport layer also arrange the packets to be sent, in sequence.
Layer 4: Application Layer
The TCP/IP specifications described a lot of applications that were at the top of the protocol stack. Some
of them were TELNET, FTP, SMTP, DNS etc.
TELNET is a two-way communication protocol which allows connecting to a remote machine
and run applications on it.
FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.
SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport electronic mail
between a source and destination, directed via a route.
DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
It allows peer entities to carry conversation.
It defines two end-to-end protocols: TCP and UDP
TCP(Transmission Control Protocol): It is a reliable connection-oriented protocol which handles
byte-stream from source to destination without error and flow control.
UDP(User-Datagram Protocol): It is an unreliable connection-less protocol that do not want
TCPs, sequencing and flow control. Eg: One-shot request-reply kind of service.
Merits of TCP/IP model
It operated independently.
It is scalable.
Client/server architecture.
Supports a number of routing protocols.
Can be used to establish a connection between two computers.
Demerits of TCP/IP
In this, the transport layer does not guarantee delivery of packets.
The model cannot be used in any other application.
Replacing protocol is not easy.
It has not clearly separated its services, interfaces and protocols.
Transmission Media
Transmission media is a communication channel that transmits information from the
source/transmitter to the receiver. It is a physical path for data transfer through electromagnetic signals.
Guided Transmission Media:
Guided media are also known as wired or bounded media. These media consist of wires through
which the data is transferred. Guided media is a physical link between transmitter and recipient. These
media types are used for shorter distances since physical limitation limits the signal that flows through
these transmission media.
In this type of transmission media, two insulated conductors of a single circuit are twisted
together to improve electromagnetic compatibility. These are the most widely used transmission medium
cables. These are packed together in protective sheaths. They reduce electromagnetic radiation from pairs
and crosstalk between the neighboring pair. Overall, it improves the rejection of external electromagnetic
interference. These are further subdivided into unshielded and shielded twisted pair cables.
Unshielded Twisted Pair Cable(UTP): These consist of two insulated copper wires that
are coiled around one another.
Shielded Twisted Pair (STP): This twisted cable consisted of a foil shield to block
external interference.
Optical Fibre Cable: These are thin strands of glass that guide light along their length. These contain
multiple optical fibers and are very often used for long-distance communications.
Coaxial cable :These guided transmission media contain an insulation layer that transmits information
in baseband mode and broadband mode.
Stripline : This is a transverse electromagnetic (TEM) transmission media that is built on the inner
layers of multi-layer printed circuit boards. These are used in high or low-level RF signals that require
isolation from surrounding circuitry.
Microstripline : Microstripline is simiar to stripline, it is not sandwiched and are present above the
ground plane. These can be fabricated with any technology where the conductor is separated from the
ground plane by a dielectric layer called subtrated.
Unguided Transmission Media
Also known as unbounded or wireless media, they help in transmitting electromagnetic signals
without using a physical medium.
Radio Waves : Radio waves are transmitted in every direction throughout free space. Since these are
omnidirectional, sent waves can be received by any antenna.
Infrared : These waves are useful for only very short distance communication. Unlike radio waves, they
do not have the ability to penetrate barriers.
Microwaves : For these waves, it is important for the transmitter and receiver antenna to be aligned.
This is why it is known as line-of-sight transmission. Due to this, they are suitable for shorter distances.
A switched network consists of a series of interlinked nodes, called switches. Switches are devices
capable of creating temporary connections between two or more devices linked to the switch. In a
switched network, some of these nodes are connected to the end systems (computers or telephones, for
example). Others are used only for routing.
The process of moving the data packets towards their destination by forwarding them from one port to the
other port is called as switching.
Message Switching-
In message switching,
Advantages :
Disadvantages:
It requires enough storage at every switch to accommodate the entire message during the
transmission.
It is extremely slow due to store and forward technique.
Also, the message has to wait until sufficient resources become available to transfer it to the next
switch.
Circuit Switching -
1. Establishing a circuit
2. Transferring the data
3. Disconnecting the circuit
After the circuit is established, The entire data travels over the dedicated path from one end to the
other end.
After the data transfer is completed, The circuit is torn down i.e. disconnected.
Total time taken to transmit a message in circuit switched network
= Connection set up time + Transmission delay + Propagation delay + Tear down time
where-
Propagation delay = (Number of hops on way x Distance between 2 hops) / Propagation speed
Advantages-
Disadvantages-
DATAGRAM NETWORKS
If the message is going to pass through a packet-switched network, it needs to be divided into packets of
fixed or variable size. The size of the packet is determined by the network and the governing protocol. In
packet switching, there is no resource allocation for a packet. The allocation is done on a first come, first-
served basis. When a switch receives a packet, no matter what is the source or destination, the packet
must wait if there are other packets being processed.
In datagram switching,
The datagram networks are sometimes referred to as connectionless networks. The term connectionless
here means that the switch (packet switch) does not keep information about the connection state. There
are no setup or teardown phases.switch (or packet switch) has a routing table which is based on the
destination address. The routing tables are dynamic and are updated periodically. The destination
addresses and the corresponding forwarding output ports are recorded in the tables.
VIRTUAL-CIRCUIT NETWORKS
All the packets follow the same dedicated path. All the packets take path independently.
Data appears in order at the destination since all the Data may appear out of order at the destination
packets take the same dedicated path. since the packets take path independently.
It is highly reliable since no packets are discarded. It is not reliable since packets may be discarded.
MULTIPLEXING
Multiplexing is the name given to techniques, which allow more than one message
to be transferred via the same communication channel. The channel in this context could be a
transmission line, e.g. a twisted pair or co-axial cable, a radio system or a fibre optic system etc.
Frequency-Division Multiplexing
Frequency-division multiplexing (FDM) is an analog technique that can be applied when
the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be
transmitted. In FOM, signals generated by each sending device modulate different carrier
frequencies. These modulated signals are then combined into a single composite signal that can
be transported by the link. Carrier frequencies are separated by sufficient bandwidth to
accommodate the modulated signal. These bandwidth ranges are the channels through which the
various
signals travel. Channels can be separated by strips of unused bandwidth-guard bands-to prevent
signals from overlapping. In addition, carrier frequencies must not interfere with the original
data frequencies.
Multiplexing Process
The demultiplexer uses a series of filters to decompose the multiplexed signal into its constituent
component signals. The individual signals are then passed to a demodulator that separates them
from their carriers and passes them to the output lines. Figure 3 is a conceptual illustration of
demultiplexing process.
Time Division Multiplexing (TDM): This is possible when data transmission rate of the
media is much higher than that of the data rate of the source. Multiple signals can be transmitted
if each signal is allowed to be transmitted for a definite amount of time. These time slots are so
small that all transmissions appear to be in parallel.
Synchronous TDM: Time slots are preassigned and are fixed. Each source is given it's time slot
at every turn due to it. This turn may be once per cycle, or several turns per cycle ,if it has a high
data transfer rate, or may be once in a no. of cycles if it is slow. This slot is given even if the
source is not ready with data. So this slot is transmitted empty
Asynchronous TDM: In this method, slots are not fixed. They are allotted dynamically
depending on speed of sources, and whether they are ready for transmission.
Wavelength-Division Multiplexing
WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing
involve optical signals transmitted through fiber-optic channels. The difference is that the
frequencies are very high.