0% found this document useful (0 votes)
2 views

COMPUTER NETWORKS 20210-2022

A computer network is a collection of interconnected computers that allows for resource sharing and communication. Networks can be categorized by size (LAN, MAN, WAN) and configuration (peer-to-peer, client/server), with various topologies such as bus, star, and ring. Essential components include network hardware (like NICs and switches), software (network operating systems), and transmission media (cables and wireless signals).

Uploaded by

erickfloriana
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

COMPUTER NETWORKS 20210-2022

A computer network is a collection of interconnected computers that allows for resource sharing and communication. Networks can be categorized by size (LAN, MAN, WAN) and configuration (peer-to-peer, client/server), with various topologies such as bus, star, and ring. Essential components include network hardware (like NICs and switches), software (network operating systems), and transmission media (cables and wireless signals).

Uploaded by

erickfloriana
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 111

COMPUTER NETWORKS

CS 6119/IT6119
NICODEMUS SANGA
COMPUTER NETWORK
What is a computer Network?
A network is any collection of independent computers that
communicate with one another over a shared network
medium.
A computer network is a collection of two or more connected
computers.
When these computers are joined in a network, people can
share files and peripherals such as modems, printers, tape
backup drives, or CD-ROM drives.
Example of a Computer network
Characteristics of a computer network

• Share Resources from one computer to another


• Create files and store them in one computer, access
those files from the other computer(s) connected over
the network
• Connect a printer, scanner, or a fax machine to one
computer within the network and let other computers
of the network use the machines available over
network.
Why do we need Computer Networks?

• Exchange of information between different computers.


• Interconnection of small computers in place of large
computers. (“Specialized work”) i.e. Break down large
work done by large computer to be done by those small
computers.
• Communication tools
• Some applications & technologies E.g. Distributed
systems i.e. Railway Reservation System – Distributed
all over the country
Every network includes:

• At least two computers; Server or Client workstation.


• Networking Interface Card's (NIC)
• A connection medium, usually a wire or cable, although
wireless communication between networked
computers and peripherals is also possible.
• Network Operating system software, such as Microsoft
Windows NT or 2000, Novell NetWare, Unix and Linux.
Standalone (non networked) Computers
If all the computers in a room are standalone, it means they
are not connected to each other.
Disadvantages of Standalone Computers

• They can't send messages to each other


• They can't share a file easily
• They can't share a piece of equipment like a printer
easily
• Users can't work on different machines and easily
access files that were saved on the first computer.
Types of Network

Based on geographical dispersion of computers there are


mainly three types of network:
• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
Local Area Network

In this type of network computers and other communication


devices are in a small area and are connected together
(networked).

The area can be single building, cluster of buildings in the


same campus.

Examples can be Local Area Network of Lab in which you


may be working or a library which you may be using.
Metropolitan Area Network

A Metropolitan Area Network is basically a bigger version of


LAN and normally uses similar technology.

It might cover a group of nearby corporate offices or it can be


in a city. It can be private or public.
Wide Area Network

Computers can be farther apart like covering cities, countries


or even continents.

The computers are connected by telephone lines or radio


waves or optical fibers.
Broadly speaking, there are two types of network
configuration, which are:
• peer-to-peer networks and
• client/server networks.
Peer-to-peer networks
Peer-to-peer networks are more commonly implemented
where less than ten computers are involved and where strict
security is not necessary.
All computers have the same status, hence the term 'peer',
and they communicate with each other on an equal footing.
Files, such as word processing or spreadsheet documents,
can be shared across the network and all the computers on
the network can share devices, such as printers or scanners,
which are connected to any one computer.
Client/server networks
Client/server networks are more suitable for larger networks.
A central computer, or 'server', acts as the storage location for
files and applications shared on the network.
Usually the server is higher than average performance
computer.
The server also controls the network access of the other
computers which are referred to as the 'client' computers.
Typically, teachers and students in a school will use the client
computers for their work and only the network administrator
(usually a designated staff member) will have access rights to
the server.
Network Topologies
Topology refers to the shape of a network or network’s layout.
How different nodes in a network are connected to each other
and how they communicate is determined by the network’s
topology.
May be depicted physically or logically.
Physical topology is the placement of the various components
of a network, including device location and cable installation.
Logical topology illustrates how data flows within a network,
regardless of its physical design.
The common network topologies:
• Bus Topology
• Star Topology
• Ring Topology
• Mesh Topology
• Wireless
Bus Topology
Each node is connected to a single cable, by the help of
interface connectors. This central cable is the backbone of
the network and is known as the bus (thus the name).
A signal from the source travels in both directions to all
machines connected on the bus cable until it finds the
intended recipient. If the machine address does not match
the intended address for the data, the machine ignores the
data. Alternatively, if the data matches the machine address,
the data is accepted.
Star Topology
In this topology, every node is connected to a central node
called hub, router or switch. The network does not
necessarily have to resemble a star to be classified as a star
network, but all of the nodes on the network must be
connected to one central device.
• Each device requires a single cable
• point-to-point connection between the device and hub
or Switch..
• Most widely implemented
• Hub/Switch is the single point of failure
Ring Topology
All devices are connected to one another in the shape of a
closed loop, so that each device is connected directly to two
other devices, one on either side of it.
When a message is sent, it is put on the cable.

All stations can read all the messages on the cable and this
means that someone who has access to the network with the
right software can 'grab' packets of information that they are
not entitled to!
Mesh Topology or Point to Point Network

A network setup where each computer and network device is


interconnected with one another, allowing for most
transmissions to be distributed, even if one of the
connections go down.

This topology is not commonly used for most computer


networks as it is difficult and expensive to have redundant
connection to every computer. However, this topology is
commonly used for wireless networks.
Wireless networking

• Do not require physical cabling


• Particularly useful for remote access for laptop users
• Eliminate cable faults and cable breaks.
• Signal interference and security issue.
Components of a Network
A computer network comprises the following main
components:
• A minimum of at least 2 computers
• Cables that connect the computers to each other, although
wireless communication is becoming more common.
• A network interface device on each computer (this is called
a network interface card or NIC)
• A ‘Switch’ used to switch the data from one point to
another. Hubs are outdated and are less used for new
installations.
• Network operating system software
The following are essential components for computer
networking.
• Network hardware
• Transmission media
• Network software
Network Hardware
The basic component of computer network hardware is a
computer.
Computers on a network can be divided into two categories,
1) Server and
2) Clients or nodes.
Server is the computer of higher power, and speed. It costs
more. To this computer resources are attached.
And the clients, also known as nodes access, are the
resources which are attached to server. In peer to peer
computer networks there are no servers.
Network Interface Card (NIC)

• A NIC (pronounced 'nick') is also known as a network


card.

• It connects the computer to the cabling, which in turn


links all of the computers on the network together.

• Each computer on a network must have a network card.


Hubs
• A hub is a device that provides a central connection
point for cables from workstations, servers and
peripherals
• Hubs are multi-slot concentrators
• The function of a hub is to direct information around
the network, facilitating communication between all
connected devices.
Switches
• hubs provide an easy way to scale up and shorten the
distance that the packets must travel to get from one
node to another
• they do not break up the actual network into discrete
segments. That is where switches come in
A vital difference between a hub and a switch is:
• All the nodes connected to a hub share the bandwidth
among themselves.
• While a device connected to a switch port has the full
bandwidth all to itself.
• Think of a switch as a ‘clever’ hub
Repeaters

• A signal loses strength as it passes along a cable, so it is


often necessary to boost the signal with a device called
a repeater
• A repeater might be a separate device, or might be part
of a concentrator
Bridges
A bridge is a device that allows you to segment a large
network into two smaller, more efficient networks
An example of a network with a bridge
Routers
• A router translates information from one network to
another
• The router directs traffic to prevent “head-on” collisions
• If you have a LAN that you want to connect to the
Internet, you will need a router to serve as the translator
between information on your LAN and the Internet
Modems

Modem is a construction of the terms modulator and


demodulator.

Modems performs a simple function:


• They translate digital signals from a computer into
analog signals that can travel across conventional
phone lines.
• The modem modulates the signal at the sending end
and demodulates at the receiving end.
Often communications between computers use the telephone
system for at least part of the channel.
A device is needed to translate between the analog phone line and
the digital computer.
Such a device is the modem, which comes from
Modulate/Demodulate, which is what a modem does.
It modulates a digital signal from the computer into an analog one to
send data out over the phone line.
Then for an incoming signal it demodulates the analog signal into a
digital one.
Wireless Access Point (WAP)

Wireless access points, referred to as WAPs or wireless APs,


are a transmitter and receiver (transceiver) device used for
wireless LAN (WLAN) radio signals.
Network Software

Network Operating Software


Network operating systems co-ordinate the activities of
multiple computers across a network.
The two major types of network OS are:
• Peer-to-peer
• Client/server
Peer to peer network OS
• In peer to peer network OS, there is
no file server or central
management source; all computers
are considered equal
• Peer to peer networks are designed
primarily for small to medium LANS
• AppleShare and Windows for
Workgroups are examples of
programs that can function as peer
to peer
Client/Server network OS
• Client/server network OS
centralize functions and
applications in one or more
dedicated file servers.
• The file server provides access to
resources and provides security
• Novelle Netware and Windows
NT Server are examples of
client/server network operating
systems
Firewall

A dedicated software (may be with hardware support), which


inspects network traffic passing through it, and denies or
permits passage based on a set of rules.
Transmission media

Communication of data propagation and processing of


signals is called transmission.
Signals travel from transmitter to receiver via a path.
This path is called medium.
Medium can be guided or unguided.
Guided Media

In guided media, data is sent along a physical path i.e. cables.


There are several types of cables used in network.
The type of cable chosen for a network is related to the
network’s topology, protocol and size.
Different types of cables are
1) Coaxial cables,
2) Twisted pair copper wire, and
3) Optical fiber cable.
Twisted Pair Cable

Twisted-pair cable is the most common type of cabling you


can see in today’s LAN networks.
A pair of wires forms a circuit that can transmit data.
The pairs are twisted for the purposes of canceling out
electromagnetic interference to provide protection against
crosstalk, the noise generated by adjacent pairs.
Two Types of Twisted Pairs are:
• Shielded Twisted Pair (STP) and
• Unshielded Twisted Pair (UTP).
Unshielded twisted-pair (UTP)
Unshielded twisted-pair (UTP) cable is the most common
networking media. Unshielded twisted-pair (UTP) consists of
four pairs of thin, copper wires covered in color-coded plastic
insulation that are twisted together.
Unshielded twisted pair cable with different twist rates
UTP cabling has different categories.
Each category of UTP cabling was designed for a specific
type of communication or transfer rate.
The most popular categories in use today is 5, 5e and 6,
which can reach transfer rates of over 1000 Mbps (1 Gbps).
The following table shows different UTP categories and
corresponding transfer rate.
Shielded twisted pair

Shielded twisted pair is a special kind of copper telephone


wiring used in some business installations. An outer covering
or shield is added to the ordinary twisted pair telephone
wires; the shield functions as a ground
Coaxial cable

Coaxial cable looks similar to the cable used to carry TV


signal.
A solid-core copper wire runs down the middle of the cable.
Around that solid-core copper wire is a layer of insulation,
and covering that insulation is braided wire and metal foil,
which shields against electromagnetic interference.
A final layer of insulation covers the braided wire.
The bandwidth for coaxial cable is 10 mbps (mega bits per
second).
Optical Fiber Cabling
Optical Fiber cables use optical fibers that carry digital data signals in
the form of modulated pulses of light. An optical fiber consists of an
extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding.
There are two types of fiber optic cable: Single Mode Fiber (SMF) and
Multi Mode Fiber (MMF).
1. Single Mode Fiber (SMF) uses a single ray of light to carry
transmission over long distances.
2. Multi Mode Fiber (MMF) uses multiple rays of light simultaneously
with each ray of light running at a different reflection angle to
carry the transmission over short distances
Unguided Media

• Unguided media are natural parts of the Earth’s


environment that can be used as physical paths to carry
electrical signals.

• The atmosphere and outer space are examples of


unguided media that are commonly used to carry signals.

• These media can carry such electromagnetic signals as


microwave, infrared light waves, and radio waves.
Homework
1. Explain each of the following terms:
2. microwave, infrared light waves, and radio waves.
2. What are the advantages and disadvantages of (a)
Unshielded twisted pair cable (b) Coaxial cable (c) Fiber
optical cable
3. Mention advantages and disadvantages of (a)
Client/Server networks (b) Peer-to- Peer networks

Assignment 1.
Explain how network impact our daily lives
Network signals are transmitted through all transmission
media as a type of waveform.
When transmitted through wire and cable, the signal is an
electrical waveform. When
transmitted through fiber-optic cable, the signal is a light
wave: either visible or infrared light. When transmitted
through Earth’s atmosphere or outer space, the signal can
take the form of waves in the radio spectrum, including VHF
and microwaves, or it can be light waves, including infrared
or visible light (for example, lasers).
NEXT NETWORK PROTOCOL
Network protocol

What is a Network protocol?


A protocol is a set of rules that governs the communications
between computers on a network.
Protocols make it possible for the various components of a
network to communicate with each other.
These rules include guidelines that regulate the following
characteristics of a network:
access method, allowed physical topologies, types of cabling,
and speed of data transfer.
Types of Network Protocols

The most common network protocols are:


 Ethernet
 Local Talk
 Token Ring
 FDDI
 ATM
Ethernet

This is a system where each computer listens to the cable


before sending anything through the network.

If the network is clear, the computer will transmit. If some


other node is already transmitting on the cable, the computer
will wait and try again when the line is clear.
Data can be transmitted over wireless access points, twisted
pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to
1000 Mbps.
Local Talk

Local Talk is a network protocol that was developed by Apple


Computer, Inc. for Macintosh computers.

The Local Talk protocol allows for linear bus, star, or tree
topologies using twisted pair cable.

A primary disadvantage of Local Talk is speed. Its speed of


transmission is only 230 Kbps.
Token Ring

The Token Ring protocol was developed by IBM in the mid-


1980s.
The access method used involves token-passing. In Token
Ring, the computers are connected so that the signal travels
around the network from one computer to another in a
logical ring.
A single electronic token moves around the ring from one
computer to the next.
It can operate at transmission speeds of 4 Mbps or 16 Mbps.
FDDI

Fiber Distributed Data Interface (FDDI) is a network protocol


that is used primarily to interconnect two or more local area
networks, often over large distances.

The access method used by FDDI involves token-passing.

It operates over fiber optic cable at 100 Mbps.


ATM

Asynchronous Transfer Mode (ATM) is a network protocol


that transmits data at a speed of 155 Mbps and higher
Compare the Network Protocols
Internet Protocol

IP (Internet Protocol) specifies the technical format of


packets and the addressing scheme for computers to
communicate over a network.

It is the primary protocol that establishes the Internet.


TCP/IP

TCP/IP is the communication protocol for communication


between computers on the Internet.

TCP/IP stands for Transmission Control Protocol / Internet


Protocol.

TCP/IP defines how electronic devices (like computers)


should be connected to the Internet, and how data should be
transmitted between them.
TCP/IP provides end-to-end connectivity specifying how data should be
formatted, addressed, transmitted, routed and received at the
destination.
It has four abstraction layers, each with its own protocols. From lowest
to highest, the layers are:
• The link layer (commonly Ethernet) contains communication
technologies for a local network.
• The internet layer (IP) connects local networks, thus establishing
internetworking.
• The transport layer (TCP) handles host-to-host communication.
• The application layer (for example HTTP) contains all protocols for
specific data communications services on a process-to-process level
(for example how a web browser communicates with a web server).
THE OSI REFERENCE MODEL
The concept of how a modern network operates can be understood by dissecting it into
seven layers.
This seven layer model is known as the OSI Reference Model and defines how the vast
majority of the digital networks on earth function.
OSI is the acronym for Open Systems Interconnection, which was an effort formed by
the International Organization for Standardization (ISO) in 1982 with the goal of
producing a standard reference model for the hardware and software connection of
digital equipment.
The important concept to realize about the OSI Reference Model is that it does not
define a network standard, but rather provides guidelines for the creation of network
standards.
The purpose of the OSI reference model is to guide vendors and developers so the
digital communication products and software programs they create
can interoperate, and to facilitate a clear framework that describes the functions of
a networking or telecommunication system.
LAYER 1 - PHYSICAL LAYER

The physical layer is responsible for establishing, maintaining


and ending physical connections (point to point) between
computers.
This layer is concerned with the actual interpretation of the
bit stream into an electrical signal that can be carried across a
physical medium. The protocols at this layer deal with the
binary transmission, voltage levels, and data rates.
This layer also specify physical medium properties such as
cables and network cards.
LAYER 2 - DATA LINK LAYER
The data link layer defines the format of data on the network. All
of the data sent through the network are made into a frame
which is performed at this level. The frame is a uniform way of
sending the data along with address information and error
checking capabilities.
Cyclic Redundancy Check (CRC) is used for the error detection at
this level. If at the receiving end the CRC fails at this level there is
a request back to the sender for retransmission of this packet.
Note: CRC, is a technique for detecting errors in digital data,
but not for making corrections when errors are detected.
LAYER 3 - THE NETWORK LAYER
The network layer basically handles all of the addressing issues.
This layer addresses packets, determines the best path or route,
and manages network problems such as data congestion.
There are three ways in which the packets are routed to their
destinations. First, there could be a static route through the
entire network that will never be changed. Second, there could
be a static line only used during a particular session between the
sender and receiver. Finally, the packets could be dynamically
sent through the network using changing paths in order to
prevent bottlenecks.
LAYER 4 - THE TRANSPORT LAYER
The basic function of the transport layer is to accept data
from the session layer, break up the data into smaller units if
there will be a need, and send these manageable data
packets to the network layer.
At the destination this layer is responsible for combining the
packets into their original state.
This layer also checks to see if the layers are in the right order
when received and not in duplicated form. If there is an error
in one of the packets there is a request for that packet's
retransmission.
LYER 5 - THE SESSION LAYER

This layer sets up, coordinates and terminates conversations.


Its services include authentication and reconnection after an
interruption.

Layer 5 protocols are responsible for ensuring that the data is


synced and consistent before transmitted.

A good example situation is the streaming of live multimedia


audio and video, where near perfect synchronization
between video and audio is desired.
LAYER 6 – PRESENTATION
The presentation level is translator between the application
and network format.
Different computers store the data in a different way. In order
to allow these computers to transmit the data to each other
the presentation layer translates the data into a standard
form to be used on the network.
Another function is data compression which can be used to
reduce the number of bits needed to send the packet of
information. Security is also added at this layer by using data
encryption and decryption.
LAYER 7 – APPLICATION
The application level provides services that directly support
the user applications, such as user interface, e-mail, file
transfer, database access, etc.
Advantages of the OSI Model
• It is a generic model and acts as a guidance tool to develop
any network model.
• It is a layered model, Changes of one layer do not affect
other layers.
• It separates services, interfaces, and protocols. Hence, it
is flexible in nature. Protocols in each layer can be
replaced very conveniently depending upon the nature of
the network.
• It supports both connection-oriented services and
connectionless services.
Internet Protocol Address (IP Address)
An Internet Protocol address (IP address) is a logical numeric
address that is assigned to every single computer, printer, switch,
router or any other device that is part of a TCP/IP-based network.
An IP address is a logical address that is used to uniquely identify
every node in the network.
Because IP addresses are logical, they can change. They are
similar to addresses in a town or city because the IP address gives
the network node an address so that it can communicate with
other nodes or networks, just like mail is sent to friends and
relatives.
216.3.128.12 is an example of IP addresses
VERSION OF INTERNET PROTOCOL
• IPv4
• IPv6
What is The Difference between IPv6 and IPv4?
IPv4 (Internet Protocol Version 4) is the fourth Version of the
Internet Protocol (IP) used to identify devices on a network
through an addressing system.
IPv4 is the most widely deployed Internet protocol used to
connect devices to the Internet. IPv4 uses a 32-bit address
scheme allowing for a total of 2^32 addresses (just over 4
billion addresses).
It is written in decimal as four numbers separated by periods.
Each number can be zero to 255. For example, 1.160.10.240
could be an IP address.
With the growth of the Internet it is expected that the
number of unused IPv4 addresses will eventually run out
because every device -- including computers, smart phones
and game consoles -- that connects to the Internet requires
an address.

A new Internet addressing system Internet Protocol version 6


(IPv6) is being deployed to fulfill the need for more Internet
addresses.
What is IPv6 -- Internet Protocol Version 6
IPv6 (Internet Protocol Version 6) is the newest version of
the Internet Protocol to replace the current version of IPv4
(Internet Protocol Version 4).
IPv6 is designed to allow the Internet to grow steadily, both
in terms of the number of hosts connected and the total
amount of data traffic transmitted.
IPv6 addresses are 128-bit IP address written in hexadecimal
and separated by colons. An example IPv6 address could be
written like this: 3ffe:1900:4545:3:200:f8ff:fe21:67cf.
TCP and UDP
TCP and UDP are network protocols that are used to send data
packets. These data packets are just bits of data that travel over
the internet. When you chat with your friend online, send an
email, or send a page request through your browser, you send
online data. This data is transferred in the form of tiny packets.
Both TCP and UDP forward the data packets from your device
using ports to different routers until they reach the final
destination. They are also used to send the packets to the IP
address of the recipient. (An IP address is a special address that is
assigned to each device connected to the internet.)
TCP and UDP
• Transmission Control Protocol (TCP) is a connection-oriented
protocol that computers use to communicate over the
internet. It is one of the main protocols in TCP/IP networks.
TCP provides error-checking and guarantees delivery of data
and that packets will be delivered in the order they were sent.
• User Datagram Protocol (UDP) is a connectionless protocol
that computers use to communicate over the internet. It
assumes that error-checking and recovery services are not
required. Instead, UDP continuously sends datagrams to the
recipient whether they receive them or not.
THE KEY DIFFERENCES Between TCP and UDP.
Connection and connectionless
TCP is a connection-oriented protocol and UDP is a connection-less protocol.
TCP establishes a connection between a sender and receiver before data can
be sent. UDP does not establish a connection before sending data.

Reliability
TCP is reliable. Data sent using a TCP protocol is guaranteed to be delivered to
the receiver. If data is lost in transit it will recover the data and resend it. TCP
will also check packets for errors and track packets so that data is not lost or
corrupted.
UDP is unreliable, it does not provide guaranteed delivery and a datagram
packet may become corrupt or lost in transit.
Acknowledgement

When TCP packets are received by the recipient, it sends


back an acknowledgement to the sender.
If the sender doesn’t receive the acknowledgement, it will
assume that the packets were not delivered or were
delivered corrupted.
It will then proceed to resend the packets.
On the other hand, UDP doesn’t send an acknowledgement
so the sender will not know if the packets were received or
not.
THE KEY DIFFERENCES TCP and UDP

Flow control
TCP uses a flow control mechanism that ensures a sender is not overwhelming
a receiver by sending too many packets at once. TCP stores data in a send
buffer and receives data in a receive buffer. When an application is ready, it will
read the data from the receive buffer. If the receive buffer is full, the receiver
would not be able to handle more data and would drop it. To maintain the
amount of data that can be sent to a receiver, the receiver tells the sender how
much spare room in the receive buffer there is (receive window). Every time a
packet is received, a message is sent to the sender with the value of the current
receive window.
UDP does not provide flow control. With UDP, packets arrive in a continuous
stream or they are dropped.
Ordering
• TCP does ordering and sequencing to guarantee that packets sent from a
server will be delivered to the client in the same order they were sent. On
the other hand, UDP sends packets in any order.
Congestion control
• TCP has provisions for congestion or flow control. Since TCP is connection-
oriented, it ensures that there is no congestion on the data channel that’s
been setup. UDP is connectionless and doesn’t care much about
congestion. Each packet is sent separately and if a packet is lost due to
congestion, the recipient can’t do much about it.
Speed
• TCP is slower than UDP because it has a lot more to do. TCP has to establish
a connection, error-check, and guarantee that files are received in the order
they were sent.
Applications
TCP is best suited to be used for applications that require high
reliability where timing is less of a concern.
• World Wide Web (HTTP, HTTPS)
• File Transfer Protocol (FTP)
• Email (SMTP, IMAP/POP)
UDP is best suited for applications that require speed and
efficiency.
• Streaming videos
• Online games
• Live broadcasts
• Voice over Internet Protocol (VoIP)
Data Terminal Equipment (DTE)
Data Terminal Equipment (DTE) is any equipment that is either a
source or destination for digital data.
DTE do not generally communicate with each other to do so they
need to use DCE (data circuit-terminating equipment) to carry
out the communication.
DTE does not need to know how data is sent or received; the
communications details are left to the DCE.
A typical example of DTE is a computer.
A data circuit-terminating equipment (DCE) is a device that sits
between the data terminal equipment (DTE) and a data
transmission circuit.
Other common DTE examples include:
• Printers
• File and application servers
• PCs
• Dumb Terminals
• Routers
Public Switched Telephone Network – PSTN
The term Public Switched Telephone Network (PSTN) describes
the various equipment and interconnecting facilities that provide
phone service to the public.
The network continues to evolve with the introduction of new
technologies.
PSTN is a network of computers and other electronic equipment
that converts speech into digital data and provides a multitude of
sophisticated phone features, data services, and mobile wireless
access.
PSTN voice facilities transport speech or voice-band data, which
is data that has been modulated to voice frequencies.
Integrated Services Digital Network(ISDN)
Integrated Services Digital Network (ISDN) is a set of
communication standards for simultaneous digital
transmission of voice, video, data, and other network
services over the traditional circuits of the public switched
telephone network.

The key feature of ISDN is that it integrates speech and data


on the same lines, adding features that were not available in
the classic telephone system.
Difference between PSTN and ISDN:

• PSTN lines are analogue while ISDN lines are digital.


• When comparing the two networks, the PSTN lines are used
for small companies and ISDN are used for bigger companies.
• The ISDN provides 128 Kbit/s, which is really good for the
Internet. PSTN has a disadvantage that it does not make the
most possible use of the broadband.
• While PSTN does not allow two simultaneous connections, it
is allowed in ISDN service.
• When using ISDN, one can make faster calls than when using
the PSTN.
END

You might also like