CN Module 1 Notes -Data Communications - Networks.docx
CN Module 1 Notes -Data Communications - Networks.docx
CONTENTS: MODULE -1
1. DATA COMMUNICATIONS
1.1. Components
1.2. Data Representation
1.3. Data Flow
2. NETWORKS
2.1. Network Criteria
2.2. Physical Structures
3. NETWORK TYPES
3.1. Local Area Network
3.2. Wide Area Network
3.3. Switching
3.4. The Internet
3.5. Accessing the Internet
4. PROTOCOL LAYERING
4.1. Scenarios
4.2. Principles of Protocol Layering
4.3. Logical Connections
5. TCP/IP PROTOCOL SUITE
5.1. Layered Architecture
5.2. Layers in the TCP/IP Protocol Suite
5.3. Description of Each Layer
5.4. Encapsulation and Decapsulation
5.5. Addressing
5.6. Multiplexing and Demultiplexing
6. TRANSMISSION MEDIA
6.1. GUIDED MEDIA
6.2. Twisted-Pair Cable
6.3. Coaxial Cable
6.4. Fiber-Optic Cable
7. UNGUIDED MEDIA: WIRELESS
7.1. Radio Waves
7.2. Microwaves
7.3. Infrared
8. PACKET SWITCHING
8.1. Datagram Networks
8.2 Virtual-Circuit Networks
MODULE-1: Data Communications & Networks
1. DATA COMMUNICATIONS
Data communication is the process of transferring data from one point to another using a
communication system. It involves several essential components and mechanisms to ensure the
accurate and timely delivery of data.
1.1. Components
A data communication system includes the following components:
1. Message: The data or information being communicated (e.g., text, images, audio).
2. Sender: The device that sends the message, such as a computer or smartphone.
3. Receiver: The device that receives the message, like another computer or a printer.
4. Transmission Medium: The physical path through which the data is transmitted, like
cables or radio waves.
5. Protocol: A set of rules that governs the communication between devices to ensure
proper data exchange.
The performance of a data communication system relies on four key characteristics: delivery,
accuracy, timeliness, and jitter.
1. Delivery: The system must ensure that data reaches the correct destination. Only the
intended recipient—whether a device or a user—should receive the data.
2. Accuracy: Data must be transmitted without errors. If data is altered during transmission
and not corrected, it becomes unusable.
3. Timeliness: Data must be delivered promptly. Delayed data, especially in applications
like video and audio, lose their value. For real-time transmission, data must be delivered
in the same sequence and without significant delays.
4. Jitter: Jitter refers to the inconsistency in packet arrival times. Inconsistent delays, such
as video packets arriving at varying intervals, can degrade the quality of the audio or
video. For instance, if video packets are sent every 30 ms, but some arrive after 40 ms,
the video quality will be affected.
● Numbers: Represented directly in binary form, which allows for efficient computation
and transmission.
● Images: Represented as a matrix of pixels, where each pixel is assigned a bit pattern
based on the image's color or intensity. Color images often use RGB (Red, Green, Blue)
or YCM (Yellow, Cyan, Magenta) encoding.
● Audio: Audio data is captured as a continuous signal, which can be sampled and
digitized for transmission.
● Video: A sequence of images or frames is used to convey motion, with each frame
represented as individual bit patterns.
2. Physical Topology: Refers to how devices are physically arranged in a network. Four
main topologies include:
o Mesh Topology:
o Star Topology:
▪ Each device is connected to a central hub, which manages communication.
▪ Advantages: Easy installation and fault isolation; if a link fails, only that
device is affected.
▪ Disadvantages: Entire system fails if the hub goes down.
▪ Common in local area networks (LANs).
o Bus Topology:
3. NETWORK TYPES
Which is used to connect networks to form an internetwork (a network of networks).
Characteristics:
● Common Cable Connection: In the past, all hosts within a Local Area Network (LAN)
were connected via a single common cable.
o Packet Transmission: When one host sent a packet to another, it was broadcast
to all hosts on the network.
o Packet Filtering: The intended recipient would accept the packet, while all other
hosts would drop it.
o Drawback: This method created significant network congestion, as every packet
was visible to all hosts, even when they weren't the intended recipient.
Modern LAN Setup:
● Switch-Based LAN: Today, most LANs use smart switches to handle packet delivery.
o Address Recognition: A switch is intelligent enough to recognize the destination
address of each packet.
o Selective Packet Forwarding: Instead of broadcasting packets to all hosts, the
switch sends the packet directly to the destination host.
o Benefits:
▪ Reduced Traffic: Since packets are only sent to the intended recipient,
overall network traffic is significantly reduced.
▪ Simultaneous Communication: More than one pair of hosts can
communicate simultaneously as long as they have different source and
destination addresses. This improves network efficiency.
LAN Capacity:
● Flexibility: The term "LAN" does not specify any constraints on the number of hosts. A
LAN can accommodate a wide range of host numbers, depending on the network’s size
and structure.
3.2. Wide Area Network (WAN)
A WAN covers a large geographical area, such as a city, country, or even globally. It connects
multiple LANs.
Characteristics:
Examples: The Internet itself is a WAN, Private networks connecting different company
branches.
A point-to-point WAN:
A Point-to-Point WAN is a network that connects two communication devices directly via
transmission media, such as cables or wireless links. This type of network allows data
transmission between just two endpoints, ensuring a dedicated and private communication link.
Used by businesses to link branch offices or remote locations.
Transmission Media:
Advantages:
● Dedicated Line: Since only two devices share the link, there is minimal congestion and
consistent bandwidth.
● Security: Limited exposure to external devices reduces the risk of unauthorized access.
A switched WAN:
A switched Wide Area Network (WAN) is a network infrastructure with multiple endpoints that
are interconnected. Unlike traditional point-to-point WANs, which only connect two endpoints, a
switched WAN allows for dynamic routing between several nodes through switches.
Role in Global Communication: Switched WANs are fundamental in the backbone of modern
global communication systems, facilitating data transfer across vast geographical areas.
● A switched WAN is scalable and can connect many endpoints.
● The switches in the network are responsible for choosing the best path for data to travel.
● It is commonly used in large-scale, high-traffic networks like the internet.
Internetwork
In modern networks, it's uncommon to find a LAN (Local Area Network) or WAN (Wide Area
Network) operating independently. Instead, they are often connected. When two or more
networks connect, they form an internetwork, or internet.
For example, imagine a company with offices on the east and west coasts. Each office has a LAN
where employees can communicate within the office. To allow communication between
employees at both locations, the company leases a dedicated WAN connection from a service
provider. This WAN links the two LANs, creating an internetwork, or a private internet. Now,
employees from both offices can communicate with each other
A heterogeneous network
A heterogeneous network is a system that connects various types of devices and network
architectures. The term "heterogeneous" signifies diversity in the types of networks, which may
include different hardware, operating systems, and communication protocols. When combining
WANs and LANs into a heterogeneous network, the WANs provide the backbone for
long-distance communication, while the LANs allow for local connectivity.
1. Circuit Switching:
In a circuit-switched network, a fixed connection (circuit) is always available between two devices,
like telephones, and it can be activated or deactivated by the network switch.
Two Scenarios:
1. All phones are in use: Four people on one side are talking to four people on the other
side, using the full capacity of the line.
2. One phone in use: Only one pair of phones is talking, using only one-quarter of the
line’s capacity.
2. Packet Switching:
In a computer network, communication between devices is carried out in blocks of data called
packets, rather than as continuous streams, as seen in phone calls. These packets are independent
units, which makes it possible for network switches to store and forward them later if needed.
A packet-switched network where two sets of four computers are connected across two sites. In
this setup, a router queues the packets and sends them when the network is ready.
Consider a scenario where the thick line (the main connection) has twice the capacity of the
smaller data lines that connect computers to routers. If only two computers (one from each site)
are communicating, the packets move without delay. However, if the thick line is busy and more
packets arrive, they are queued and sent in order of arrival.
Disadvantages: This demonstrates the efficiency of packet-switched networks over circuit-
switched networks. However, packet-switching can introduce delays when network traffic is
heavy.
3. Message Switching:
o Entire messages are stored and forwarded from one switch to another (obsolete in
modern networks).
Components:
Methods of Access:
1. Dial-up:
o Connects to the Internet using a telephone line.
o Low-speed, outdated method (up to 56 kbps).
2. DSL (Digital Subscriber Line):
o Uses telephone lines but allows simultaneous voice and data transmission.
o Faster than dial-up (up to 100 Mbps).
3. Cable:
o Uses cable television lines to provide high-speed Internet (up to 1 Gbps).
4. Fiber Optic:
o Uses light to transmit data through optical fibers.
o Extremely high-speed (up to 10 Gbps and beyond).
5. Satellite:
o Provides Internet access via satellite communication, useful in remote areas.
o Slower than fiber or cable but offers wide coverage.
6. Mobile Broadband:
o Wireless Internet access through cellular networks (3G, 4G, 5G).
o Widely accessible but may have data limits.
7. Wi-Fi Access:
● Wireless local area networking technology that allows devices to access the
Internet within the range of a wireless router.
● Common in homes, offices, and public places.
4. PROTOCOL LAYERING
Protocol layering is a design principle in computer networks where communication tasks are
broken down into multiple layers. Each layer performs a specific function, and the layers work
together to enable communication between devices over a network.
4.1. Scenarios
First Scenario: Simple Communication in One Layer
Figure 1.16: A single-layer protocol
In the first scenario, communication is straightforward and occurs in a single layer. Imagine
Maria and Ann, who are neighbors and share many common interests. Their interaction happens
face-to- face, in the same language, as depicted in Figure 1.16. Despite its simplicity, certain
rules govern their communication.
Second Scenario: A three-layer protocol
In this scenario, Ann is offered a promotion requiring her to relocate far from her friend Maria.
Despite the distance, they wish to continue their communication to collaborate on an innovative
project for their future retirement business. To maintain the confidentiality of their exchange,
they decide to use a secure encryption/decryption technique. This technique ensures that their
letters remain unreadable to unauthorized individuals.
The communication between Ann and Maria can be visualized as taking place in three distinct
layers:
1. Third Layer (Plaintext Creation): Maria speaks to the third-layer machine, which
listens and generates the plaintext (the original letter). This plaintext is then handed over
to the second-layer machine.
2. Second Layer (Encryption/Decryption): The second-layer machine encrypts the
plaintext, creating ciphertext (the encrypted letter). This ciphertext is then passed to the
first-layer machine.
3. First Layer (Mailing): The first-layer machine puts the ciphertext in an envelope, adds
the sender's and receiver's addresses, and mails it.
Protocol layering is useful in various scenarios, such as:
● Data transmission over the internet where multiple types of data (emails, videos, web
pages) are transmitted using different protocols at each layer.
● Device communication between a computer and a printer, where layered protocols
manage data transfer and error detection.
● Telecommunication systems, where layered protocols ensure voice signals are
transmitted efficiently and correctly.
● Multimedia streaming, where protocols manage data buffering, synchronization, and
error correction to deliver seamless audio and video streams.
Advantages of Protocol Layering:
1. Modularity: Each layer is independent, allowing for changes in one layer without
affecting others. For example, if Ann and Maria decide that the encryption needs to be
upgraded, they can replace only the second-layer machine without altering the other
layers.
2. Service Separation: Protocol layering separates the services from their implementation.
Maria could perform the tasks of the first layer herself if needed, as long as she provides
the required services.
3. Intermediate Systems: In more complex networks, intermediate systems only need to
handle specific layers, making the overall system less complex and less expensive.
Disadvantages of Protocol Layering:
1. Complexity in Layer Integration: While modularity offers flexibility, it can add
complexity. A single machine performing all tasks could simplify the setup, but if there
are issues, the entire system might need to be replaced rather than just one layer.
Third Layer: Responsible for listening in one direction and transmitting in the other.
Second Layer: Handles encryption in one direction and decryption in the other.
First Layer: Manages sending and receiving mail.
Each layer must be capable of performing its specific function for both incoming and outgoing
data.
In protocol layering, the objects processed by each layer at both communicating sites must be
identical. For instance:
Consistency in the objects at each layer ensures proper communication and processing across
different layers.
This means there is communication from one layer to the next. Imagine that Maria and Ann view
each layer as having a logical (or imaginary) connection that allows them to transmit objects
created at that layer. Understanding these logical connections will enhance your comprehension
of layering in data communication and networking.
In a layered model, logical connections refer to virtual connections established between the
same layers in different devices. For example:
● The application layers of two computers communicate as though they are directly
connected, even though physical transmission occurs across multiple lower layers.
● Logical connections provide the abstraction necessary to hide the complexities of the
underlying transmission methods, giving the appearance that communication occurs at a
single layer.
Logical connections ensure that communication protocols at each layer, such as TCP (Transport
Layer) or HTTP (Application Layer), interact correctly without the user needing to understand
the intricacies of network transmission.
To understand how the layers in the TCP/IP protocol suite work during communication between
two hosts, let's consider a small network composed of three local area networks (LANs), each
connected by a link-layer switch. These LANs are also interconnected through a router. Figure
1.20 illustrates this setup.
In this scenario, imagine that Host A (the source) communicates with Host B (the destination).
The communication process involves five devices:
Each of these devices operates at different layers of the TCP/IP protocol stack, depending on its
role in the network:
Both Host A and Host B are involved in all five layers of the TCP/IP model:
● Application Layer: The source host (Host A) creates a message at the application layer
and sends it down through the stack.
● Transport Layer: The message is passed to the transport layer, which ensures reliable
delivery.
● Network Layer: At the network layer, the message is encapsulated into packets for
transmission across the network.
● Data Link Layer: The packets are then prepared for transmission over the physical
network in the data-link layer.
● Physical Layer: Finally, the message is sent through the physical medium (wires, cables,
etc.) to reach the destination host.
At the destination, Host B receives the message at the physical layer and passes it up through the
layers until it reaches the application layer for processing.
2. Router
A router plays a different role and operates at three layers of the TCP/IP model:
● Network Layer: The router’s primary function is routing packets across networks. It
forwards packets based on their destination IP address.
● Data Link Layer & Physical Layer: A router is connected to multiple links, and each
link may use a different data-link and physical-layer protocol. For instance, if a packet
arrives from LAN 1 (Link 1) using one set of protocols, the router must handle it and
forward it to LAN 2 (Link 2) using another set of protocols.
Importantly, the router does not deal with the transport or application layers, as its role is solely
to move packets between networks.
3. Link-Layer Switch
● Data Link Layer: The switch processes the data frames and ensures they are forwarded
to the correct device within the same LAN.
● Physical Layer: The switch forwards the data through the physical medium.
Unlike routers, link-layer switches do not need to handle different sets of protocols for different
links. They operate within a single LAN, using a single protocol set for the data-link and
physical layers.
To grasp the role of each layer, it's helpful to visualize the logical connections between them.
Figure 1.21 in the book illustrates these connections in a simple internet model.
This distinction is key: the top three layers operate across the entire internet, while the lower
two layers manage communication on individual network segments or "links."
Another important way to understand these connections is by considering the data units created
at each layer.
● In the top three layers, the data units (referred to as packets) are not modified by routers
or link-layer switches.
● In the bottom two layers, however, the packet created by the host can be modified
by routers but not by link-layer switches.
Figure 1.21: Logical connections between layers of the TCP/IP protocol suite
Figure 1.22 shows a second principle of protocol layering: identical objects exist below
each layer for connected devices.
● At the network layer, even though there's a logical connection between two hosts,
a router might fragment packets into smaller units.
● The link between two hops does not alter these packets.
This layering approach allows for a structured, predictable method of managing data as it moves
across the network.
● The physical layer focuses on transmitting the bits from the data-link layer as electrical or
optical signals over a physical medium (such as cables or wireless channels).
● It converts bits from the data-link layer into signals that can travel through the medium
connecting the devices.
Transmission Media:
● The physical connection between two devices is made through a transmission medium,
which can be either cables (like twisted-pair, fiber-optic cables) or air (wireless
communication).
● The transmission medium does not directly carry bits; instead, it transmits signals
(electrical or optical) that represent the bits.
Logical Communication:
● Despite being the lowest layer, the physical layer enables logical communication
between devices by ensuring that signals are accurately transmitted and interpreted.
● From a logical perspective, the unit of data at this layer is the bit, even though the actual
signals sent over the medium are different in nature.
Signal Transformation:
● The physical layer converts bits into appropriate forms of signals (either electrical or
optical) depending on the medium used.
● Protocols at this layer define how these bits are transformed into signals to be carried
over the medium.
Data-link Layer:
In an internet, multiple links (LANs and WANs) are connected by routers. There are often
multiple paths that a datagram can take from the host to its destination. Routers are responsible
for determining the most efficient route. Once the next link is chosen by a router, the data-link
layer manages the process of transmitting the datagram across that link.
The TCP/IP model does not mandate a specific protocol for the data-link layer. Instead, it
accommodates a wide range of both standard and proprietary protocols. Any protocol that can
encapsulate a datagram and move it across a link is considered acceptable.
At the data-link layer, the datagram is encapsulated into a packet, referred to as a frame.
● Some link-layer protocols offer both error detection and correction, ensuring that
transmitted data is free from errors.
Network Layer:
The network layer is crucial for establishing communication between the source and destination
computers. It manages host-to-host communication across multiple devices (routers) in the
path. Each router ensures that packets are directed along the most efficient route. The main role
of the network layer is to enable communication between hosts and determine the best path for
data transmission.
The primary protocol of the network layer is the Internet Protocol (IP), which defines the
structure and format of data packets, known as datagrams at this level. IP also determines the
addressing system, ensuring each packet is sent from its source to its destination. The forwarding
of packets from router to router is a fundamental part of IP's function.
Several additional protocols work alongside IP to assist in the routing and delivery process:
● ICMP (Internet Control Message Protocol): Helps IP report issues encountered during
packet routing.
● IGMP (Internet Group Management Protocol): Supports IP with multicast
communication.
● DHCP (Dynamic Host Configuration Protocol): Assigns network-layer addresses to
hosts.
● ARP (Address Resolution Protocol): Converts a network-layer address into a link-layer
address for communication with a specific host or router.
These protocols ensure efficient routing and network management, enabling seamless
host-to-host communication in complex networks.
Transport Layer:
The Transport Layer plays a crucial role in ensuring end-to-end communication between
hosts in a network. It handles the transfer of data between the application layer on one device
and the corresponding application layer on another device, making sure that messages are
transmitted reliably and efficiently.
Key Functions:
● Encapsulation and Transmission: The transport layer at the source host takes messages
from the application layer, encapsulates them into transport layer packets (called
segments in TCP or user datagrams in UDP), and transmits them to the destination
transport layer.
● End-to-End Communication: Even though the application layer provides an end-to-end
connection, the transport layer separates tasks, handling data transmission independently
from the application. This separation allows flexibility by providing multiple protocols
suited for different needs.
Application Layer:
The application layer in a network facilitates end-to-end communication between two application
layers. It appears as though a direct bridge exists between them, but in reality, communication
passes through all layers of the networking model.
At this layer, the communication happens between two processes (programs running on separate
machines). One process sends a request, and the other process responds. This process-to-process
communication is the core responsibility of the application layer. While many predefined
protocols exist at this level, users can also create their own custom processes to communicate
across hosts.
● HTTP (Hypertext Transfer Protocol): Used for accessing the World Wide Web
(WWW).
● SMTP (Simple Mail Transfer Protocol): The primary protocol for sending and
receiving email.
● FTP (File Transfer Protocol): Enables the transfer of files between hosts.
● TELNET and SSH (Secure Shell): Facilitate remote access to a site.
● SNMP (Simple Network Management Protocol): Allows administrators to manage
Internet resources both globally and locally.
● DNS (Domain Name System): Helps find the network-layer address (IP address) of a
computer for other protocols.
● IGMP (Internet Group Management Protocol): Collects information on group
membership for multicast communication.
In the context of the Internet and network protocol layering, addressing is a key concept that
ensures logical communication between pairs of layers. For any communication between two
parties, there must be two essential addresses: a source address and a destination address.
Although it might seem like each layer of the protocol model would require a separate pair of
addresses, in practice only four are needed, as the physical layer does not use addresses. The
physical layer deals with bits, and individual bits do not have addresses.
Addressing at Different Layers
Each layer in the protocol stack uses specific types of addresses, which relate to the type of
communication and the name of the data unit used at that layer. Here's a breakdown:
1. Application Layer:
o At this layer, addresses are typically names, such as a domain name (e.g.,
someorg.com) or an email address (e.g., [email protected]). These names
represent the service or resource being accessed.
3. Network Layer:
o The network layer uses global addresses, which are known as IP addresses
(45.113.122.159). These uniquely identify a device's connection to the Internet
and allow data to be routed across networks.
o Packet name: Datagram.
4. Link Layer:
o At this layer, link-layer addresses (also known as MAC addresses 78-45-C4-29-
17-E8) are used. These are local addresses that uniquely identify specific devices
on a network (such as a LAN or WAN), ensuring that data reaches the correct
physical machine.
o Packet name: Frame.
6. TRANSMISSION MEDIA
Transmission media are essentially the physical substances through which information travels.
They operate at a level below the physical layer of the OSI model, often referred to as "layer
zero." Essentially, transmission media can be considered as a fundamental layer that directly
interfaces with the physical layer.
3. Fiber-Optic Cable: Unlike twisted-pair and coaxial cables, fiber-optic cables use light
signals to transmit data. They consist of thin strands of glass or plastic that carry light
pulses over long distances with minimal signal loss.
Twisted pair cables are designed to minimize the impact of interference (noise) and crosstalk.
When the wires are parallel, noise or crosstalk can affect each wire differently due to their
varying distances from the sources of interference. By twisting the wires, the cable maintains a
balance. In each twist, the relative positions of the wires to the noise source change, helping to
ensure that both wires experience similar levels of interference. This twisting reduces the impact
of unwanted signals, as the receiver calculates the difference between the wires, canceling out
most of the noise.
Shielded vs. Unshielded Twisted-Pair Cables
● Unshielded Twisted-Pair (UTP): The most common type used in communications, UTP
cables do not have additional shielding. They are less expensive and less bulky but can be
more susceptible to interference.
● Shielded Twisted-Pair (STP): STP cables have an additional metal foil or braided mesh
covering each pair of conductors. This shielding reduces interference and improves signal
quality but makes the cables bulkier and more costly. STP is primarily used by IBM and
is less common outside of their applications.
Data
Category Specification Rate Use
(Mbps)
1 Unshielded twisted-pair used in telephone lines 2 Telephone
2 Unshielded twisted-pair originally used in T1 lines 10 T1 Lines
3 Improved Category 2 used in LANs 20 LANs
Token
4 Improved Category 3 used in Token Ring networks 100 Ring
Networks
Cable wire is normally 24 AWG with a jacket and
5 125 LANs
outside sheath
An extension of Category 5 with additional features
5E 125 LANs
to minimize crosstalk and electromagnetic
interference
New category with matched components from the
6 200 LANs
same manufacturer; cable tested at a 200-Mbps data
rate
Sometimes called SSTP (Shielded Screen Twisted-
7 Pair); each pair is wrapped in helical metallic foil 600 LANs
followed by a metallic foil shield
Figure 1.30: UTP connector
Performance
The performance of twisted-pair cables is often assessed by measuring attenuation (signal loss)
in relation to frequency and distance. Although twisted-pair cables can handle a broad range of
frequencies, attenuation increases significantly at frequencies above 100 kHz. Attenuation is
measured in decibels per kilometer (dB/km), and higher frequencies result in greater signal loss.
Applications
Twisted-pair cables are widely used in various applications:
● Telephone Lines: Used for voice and data transmission in the local loop connecting
subscribers to telephone offices.
● DSL Lines: Provide high-data-rate connections by utilizing the high bandwidth of UTP
cables.
● Local-Area Networks (LANs): Employed in networks such as 10Base-T and 100Base-T
for data transmission.
● Central Core Conductor: A solid or stranded copper wire, responsible for carrying the
signal.
● Insulating Sheath: Surrounds the core conductor, separating it from the outer conductor.
● Outer Conductor: Made of metal foil, braid, or both, which serves two purposes:
o Acts as a shield against external noise.
o Functions as the second conductor to complete the circuit.
● Additional Insulation: Encases the outer conductor for further protection.
● Plastic Cover: Provides external protection for the entire cable.
Figure 1.31 Coaxial cable
This design helps coaxial cables transmit signals with less interference and at higher frequencies
compared to twisted-pair cables.
Coaxial cables are classified based on Radio Government (RG) ratings. Each RG number
specifies certain physical characteristics of the cable, such as:
These RG-rated cables are suited for different specialized applications, as indicated by their
specifications.
Table 1.2: RG-rated cables are suited for different specialized applications.
Category Use
RG-59 75 Ω Cable TV
RG-58 50 Ω Thin Ethernet
RG-11 50 Ω Thin Ethernet
Coaxial cables provide higher bandwidth compared to twisted-pair cables, allowing them to
carry more data. However, their attenuation (signal weakening) is greater, meaning the signal
degrades over distance and requires frequent use of repeaters to maintain signal strength.
Applications
● Analog Telephone Networks: Coaxial cables were used to carry large amounts of voice
signals, with one cable supporting up to 10,000 voice channels.
● Digital Telephone Networks: Coaxial cables were capable of transmitting digital data at
speeds up to 600 Mbps.
Today, fiber optic cables have largely replaced coaxial cables in telephone networks due to their
superior performance.
● If light passes from one substance into another with a different density, the direction
changes (refraction).
● Critical Angle: The angle of incidence at which light bends along the boundary between
two materials. If the angle is greater than the critical angle, the light reflects instead of
refracting.
Structure of Optical Fibers
Optical fibers guide light through internal reflection. The core (made of glass or plastic) is
surrounded by a cladding with lower density. This ensures that light reflecting off the core-
cladding boundary remains in the core.
Propagation Modes
1. Multimode: Multiple light beams travel through the core along different paths.
o Step-Index Fiber: The core has uniform density, and light changes direction
abruptly at the core-cladding interface.
o Graded-Index Fiber: The core's density gradually decreases from the center,
reducing signal distortion.
2. Single-Mode: Uses step-index fiber but has a smaller core and tightly focused light. The
beams travel nearly parallel, minimizing delay and distortion.
Figure 1.36: Modes
Fiber Sizes
Optical fibers are classified by the ratio of core diameter to cladding diameter (both measured in
micrometers). Single-mode fibers typically have a smaller core diameter compared to multimode
fibers.
Fiber-Optic Cable Composition
A typical fiber-optic cable consists of:
● Outer jacket (PVC or Teflon)
● Kevlar strands for strength
● Plastic coating for cushioning
● Core and cladding for light transmission
Fiber-Optic Connectors
There are three types of connectors:
1. SC (Subscriber Channel): Push/pull locking, used in cable TV.
2. ST (Straight Tip): Bayonet locking, used in networking.
3. MT-RJ: Same size as RJ45, used for data networks.
Figure 1.37: Fiber-optic cable connectors
Performance
Fiber-optic cables experience less signal attenuation than twisted-pair or coaxial cables, requiring
fewer repeaters. They also support higher data transfer rates, especially with
wavelength-division multiplexing (WDM).
Applications
● Backbone Networks: Due to their wide bandwidth, fiber-optic cables are used in
backbone networks, such as SONET.
● Hybrid Networks: Some cable TV companies use a mix of fiber-optic and coaxial cables.
● Local Area Networks (LANs): Fiber-optic cables are used in networks like 100Base-FX
and 1000Base-X.
Advantages of Optical Fiber
1. Higher Bandwidth: Supports higher data rates.
2. Less Signal Attenuation: Can transmit over longer distances without needing repeaters.
3. Immunity to Electromagnetic Interference: Not affected by electromagnetic noise.
4. Resistance to Corrosive Materials: More durable in harsh environments.
5. Lightweight: Lighter than copper cables.
6. Greater Immunity to Tapping: More secure than copper cables.
Disadvantages of Optical Fiber
1. Installation and Maintenance: Requires specialized skills.
2. Unidirectional Light Propagation: Requires two fibers for bidirectional communication.
3. Cost: More expensive than other cables, especially if bandwidth demand is low.
Fiber-optic cables offer numerous benefits, particularly in high-bandwidth and long-distance
applications, but their costs and technical requirements must be carefully considered.
7. UNGUIDED MEDIA: WIRELESS
Unguided media refers to communication channels that use wireless signals to transmit data.
These signals travel through the air without any physical conductor. Common types of wireless
transmission include radio waves, microwaves, and infrared.
Wireless communication involves transmitting electromagnetic waves without using physical
conductors like cables or wires. Instead, signals are broadcast through free space, making them
accessible to any device equipped to receive them.
Electromagnetic Spectrum for Wireless Communication
Wireless communication utilizes a portion of the electromagnetic spectrum, ranging from 3 kHz
to 900 THz, as shown in Figure 1.38. This spectrum includes a variety of frequencies that allow
different methods of signal transmission.
Types of Propagation
Unguided signals, such as radio waves, can travel from the source to the destination in three
main ways, illustrated in Figure 1.40:
1. Ground Propagation:
o In this method, low-frequency radio waves travel close to the Earth’s surface,
following the curvature of the planet.
o These signals radiate from the transmitting antenna in all directions, and the
distance they cover depends on the power of the signal—the higher the power, the
farther the signal can travel.
2. Sky Propagation:
o Higher-frequency radio waves are transmitted upward into the ionosphere, where
they are reflected back to Earth.
o This method enables long-distance communication with relatively low power.
3. Line-of-Sight Propagation:
o The antennas must be properly aligned and either tall enough or close enough to
avoid being affected by the curvature of the Earth. This method is more complex
because radio waves can’t be perfectly focused.
Frequency Bands
The electromagnetic spectrum for wireless communication is divided into eight different ranges
or "bands." These bands are classified based on frequency and are regulated by government
authorities. The ranges extend from Very Low Frequency (VLF) to Extremely High Frequency
(EHF). Each band has specific propagation characteristics and applications, as summarized in
Table 1.3.
Table 1.3: Frequency Bands for Applications
Limitations:
● The radio wave band is relatively narrow, just under 1 GHz. When divided into sub
bands, the limited width of these sub bands results in low data rates for digital
communications.
● Most of the radio wave spectrum is regulated by government authorities, like the FCC in
the United States and Department of Telecommunications (DoT) & Telecom Regulatory
Authority of India (TRAI) in India. Any use of this spectrum requires official
permission.
● Licensed Frequency Bands: FM band is licensed between 88-108 MHz for radio
broadcasting and Unlicensed Frequency Bands: Wi-Fi: 2.4 GHz, 5 GHz band.
Omnidirectional Antenna:
Radio waves typically utilize omnidirectional antennas, which transmit signals in all directions.
These antennas come in various types, depending on factors like wavelength, signal strength,
and the intended purpose of transmission.
Thanks to their omnidirectional nature, radio waves are widely used for multicasting, where one
sender transmits to many receivers. Common examples include:
● AM and FM radio
● Television broadcasting
● Maritime radio
● Cordless phones
● Paging systems
7.2. Microwaves
7.3. Infrared
Frequency Range: From 300 GHz to 400 THz.
Characteristics: Infrared signals are used for short-range communication and do not penetrate
walls, making them suitable for indoor use. They are highly directional and require line-of-sight
transmission.
Applications: Remote controls, short-range data transmission (such as between computers and
peripherals), and infrared sensors for detecting heat in security systems or medical devices.
8. PACKET SWITCHING
In data communication, when a message needs to be sent from one end system to another
through a packet-switched network, it must be divided into smaller units called packets. These
packets can be of either fixed or variable sizes, depending on the network and the protocol being
used.
Key Features of Packet Switching:
1. No Resource Allocation:
o Unlike circuit-switched networks, packet switching does not reserve any specific
resources like bandwidth or processing time for the packets.
o Resources are allocated only when needed, and packets are processed on a first-
come, first-served basis.
2. Possible Delays:
o Since there is no dedicated path or reserved resources, packets might experience
delays. For instance, if a switch is busy processing other packets, newly arrived
packets must wait their turn, which can increase transmission time.
In a datagram network, each switch uses a routing table based on destination addresses to forward
packets. These tables are dynamic and updated regularly.
Every packet in a datagram network has a header containing a destination address. Upon
receiving a packet, the switch checks this address and uses the routing table to determine the
appropriate forwarding port. This destination address remains unchanged throughout the packet's
journey.
Delay
Despite their efficiency, datagram networks can experience higher delays compared to virtual-
circuit networks. Although there are no setup or teardown phases, each packet may encounter
waiting times at switches. Additionally, since packets from the same message may travel through
different routes, delays are not uniform. Figure 1.45, illustrates the delay for a packet traveling
through two switches, including transmission times (3T), propagation delays (3τ), and waiting
times (w1 + w2). The total delay is given by:
● Transmission Time: The time to send a packet from one point to another.
● Propagation Delay: The time it takes for the signal to travel through the medium.
● Waiting Time: Time spent at routers before being forwarded.
Advantages:
1. Connection Phases:
o A VCN has three distinct phases: setup, data transfer, and teardown.
▪ Setup Phase: A path is established between the sender and receiver before
data transmission.
▪ Data Transfer Phase: Data is sent along the established path in packets.
▪ Teardown Phase: After data transmission, the connection is terminated,
and resources are released.
2. Resource Allocation:
o Resources can either be allocated during the setup phase (as in a circuit-switched
network) or dynamically during data transmission (similar to a datagram
network).
o Data is divided into packets, each of which carries an address. However, unlike in
a datagram network, the address is not end-to-end but local, meaning it only tells
the next switch where to send the packet.
4. Consistent Path for Packets:
o Once a connection is established, all packets follow the same predetermined path.
This ensures a predictable route for all the packets between the sender and
receiver, akin to a circuit-switched network.
5. Layer of Operation:
1. Global Addressing:
o A global address is used to uniquely identify the source and destination during the
setup phase. This address is typically unique within the network or globally if the
network is part of a larger system.
1. Setup Phase:
o The source and destination use their global addresses to establish a connection.
During this phase, switches along the path create table entries to store information
about the virtual circuit. This phase ensures that each switch is prepared to route
the data properly.
2. Data Transfer Phase:
o After the setup phase, data is transferred between the source and destination. The
switches use the table entries created during the setup phase to route the frames.
The switches maintain information like the incoming and outgoing ports and
Virtual Circuit Identifiers (VCI). Each frame is processed the same way, with the
VCIs changing at each switch to ensure the data follows the correct path. This
phase continues until all frames are transferred.
3. Teardown Phase:
o Once the data transfer is complete, the source and destination send signals to the
switches to remove the corresponding table entries, effectively ending the virtual
circuit.
Data-Transfer Phase
During data transfer, the key action is switching the frames between the source and destination.
Each switch in the path must have a table with entries corresponding to the virtual circuit. A
table typically consists of four columns: incoming port, incoming VCI, outgoing port, and
outgoing VCI.
● When a frame arrives at a switch, the switch looks for the entry that matches the
incoming port and VCI.
● After identifying the entry, the switch updates the VCI to the new value and forwards the
frame to the next switch via the outgoing port.
For example, if a frame arrives at switch 1 with VCI 14 on port 1, the switch finds this entry in
its table, updates the VCI to 22, and forwards the frame through port 3. This process repeats at
each switch, ensuring the frame reaches its destination.
Setup Phase
In the setup phase, a virtual circuit is established between the source and destination by creating
table entries at each switch. This phase consists of two main steps:
1. Setup Request:
o A setup request frame is sent from the source (A) to the destination (B). As the
frame passes through each switch, the switch creates an entry in its table.
o For example, when the setup frame reaches switch 1, it identifies that the
outgoing port for the connection is port 3 and assigns an incoming VCI (14) for
the frame coming from port 1. At this point, the outgoing VCI remains unknown.
2. Acknowledgment:
o Once the setup request reaches the destination, the destination assigns a VCI (e.g.,
77) for incoming frames from the source. The acknowledgment is sent back to the
source, and each switch updates its table to complete the missing outgoing VCI
information.
Figure 1.50: Setup acknowledgment in a virtual-circuit network
3. Teardown Phase
When the communication is finished, the source and destination send a signal to the switches to
remove the corresponding table entries, thus ending the virtual circuit. This process frees up the
resources for future virtual circuits.
Efficiency in Virtual-Circuit Networks
In a virtual-circuit network, resource allocation can happen either during the setup phase or on
demand during the data-transfer phase. When resources are reserved during the setup phase,
each packet experiences the same delay. However, if resources are allocated on demand, packet
delays may vary.
Even when resource allocation is on demand, a significant advantage of virtual-circuit networks
is that the source can check resource availability before data transfer.
In virtual-circuit switching, all packets from the same source to the same destination follow the
same path. However, with on-demand resource allocation, packets may arrive with different
delays depending on resource availability.
Delay in Virtual-Circuit Networks
In a virtual-circuit network, delays occur during the setup and teardown phases. These are one-
time delays. If resources are allocated during setup, there is no additional waiting time for
individual packets during data transfer.
The total delay in such a network includes:
● Three transmission times (3T): the time taken for the packet to be transmitted across
links.
● Three propagation times (3τ): the time taken for the packet to travel across physical
distances.
● Setup delay: includes transmission and propagation in both directions during the setup
phase.
● Teardown delay: includes transmission and propagation in one direction during the
teardown phase.
For simplicity, processing delays at the switches (routers) are ignored in this calculation.
Thus, the total delay for the packet is:
QUESTIONS
1. Data Communications
1. What are the five key components of a data communication system, and what role does
each play in ensuring effective communication?
2. Explain the different forms of data representation used in data communications and
provide examples for each.
3. Describe the three modes of data flow and provide real-world examples where each mode
is used.
2. Networks
1. What are the key criteria used to evaluate the performance, reliability, and security of a
network?
2. Explain the difference between point-to-point and multipoint physical structures in
network connections. Provide advantages and disadvantages of each.
3. Network Types
1. Compare and contrast a Local Area Network (LAN) and a Wide Area Network (WAN) in
terms of characteristics, speed, and geographical coverage.
2. Define packet switching and explain the key differences between circuit switching and
packet switching.
3. Discuss the role of routers and switches in the structure of the Internet. How do they
contribute to efficient data transfer?
4. What are the different ways to access the Internet, and how do factors like speed and
coverage differ between these methods?
4. Protocol Layering
1. Explain the key principles of protocol layering and discuss how these principles ensure
efficient communication between two devices over a network.
2. What are logical connections in the context of protocol layering, and how do they
facilitate communication between peer layers on different devices?
3. Explain the layered architecture of the TCP/IP protocol suite. How does each layer
contribute to overall network communication?
4. Discuss the main functions of the following layers in the TCP/IP protocol suite:
a. Application Layer
b. Transport Layer
c. Network Layer
d. Data Link Layer
e. Physical Layer
5. Describe the process of encapsulation and decapsulation in the TCP/IP protocol suite.
Why are these processes crucial for data communication?
6. Explain the different types of addresses used at each layer of the TCP/IP protocol stack.
Why is addressing critical for network communication?
7. What is multiplexing and demultiplexing in the TCP/IP protocol suite? How do these
processes ensure that data is correctly sent and received by the right application?
5. Transmission Media
1. Define guided media and list and explain three types of guided media used in network
communications.
2. Explain the difference between unshielded twisted-pair (UTP) and shielded twisted-pair
(STP) cables. What are their primary uses?
3. Describe how the twisting of pairs in twisted-pair cables helps to reduce crosstalk.
4. What are the main components of a coaxial cable, and how do they contribute to its
performance?
5. Describe the principle of operation of fiber-optic cables and explain why they provide high-
speed data transmission.
6. Discuss the advantages and disadvantages of fiber-optic cables compared to coaxial and
twisted-pair cables.
7. What are radio waves, and how are they used in wireless communication? Provide an
example of a common application.
8. Explain the concept of frequency allocation in radio wave communication and its importance.
9. Discuss the characteristics of microwave transmission and its typical uses in communication
systems.
10. Describe how infrared communication works and list two common applications where
infrared technology is used.
6. Packet Switching
1. What is a datagram network? Describe its key characteristics and how it handles packet
routing and delivery.
2. Compare and contrast datagram networks with virtual-circuit networks in terms of reliability,
complexity, and overhead.
3. In a datagram network, how does the destination node determine the correct order of
packets? What issues might arise from the unordered delivery of packets?
4. Explain how a datagram network handles packet fragmentation and reassembly. What are the
potential impacts on network performance and reliability?
5. Define a virtual-circuit network and describe the main phases involved in setting up,
maintaining, and tearing down a virtual circuit.
6. Discuss the advantages and disadvantages of virtual-circuit networks compared to datagram
networks. Include aspects such as connection setup, resource allocation, and data transfer
efficiency.
7. How does a virtual-circuit network handle data transfer once the connection is established?
What mechanisms are in place to ensure data integrity and order?
8. Explain the role of signaling in virtual-circuit networks. How does signaling contribute to the
establishment and teardown of virtual circuits?
9. Describe a scenario where virtual-circuit networks would be preferred over datagram
networks. Justify your choice based on factors such as performance requirements and
network management.