CN Unit 1
CN Unit 1
• Business Applications
• Home Applications
• Mobile Users
• Social Issues
Data Communications
Delivery:
• The system must deliver data to the correct destination.
• Data must be received by the intended device or user and only
by that device or user.
Accuracy:
• The system must deliver the data accurately.
• Data that have been altered in transmission and left
uncorrected are unusable.
Fundamental Characteristics
Timeliness:
• The system must deliver data in a timely manner.
• Data delivered late are useless.
• In the case of video and audio, timely delivery means delivering
data as they are produced, in the same order that they are
produced, and without significant delay.
• This kind of delivery is called real-time transmission.
Jitter:
• Jitter refers to the variation in the packet arrival time.
• It is the uneven delay in the delivery of audio or video packets.
• For example,
• Let us assume that video packets are sent every 30 ms.
• If some of the packets arrive with 30-ms delay and others with 40-
ms delay, an uneven quality in the video is the result.
Components
Components
• A data communications system has five components.
Message:
• The message is the information (data) to be communicated.
Popular forms of information include text, numbers,
pictures, audio, and video.
Sender:
• The sender is the device that sends the data message. It can
be a computer, workstation, telephone handset, video
camera, and so on.
Receiver:
• The receiver is the device that receives the message. It can
be a computer, workstation, telephone handset, television,
and so on.
Components
Transmission Medium:
• The transmission medium is the physical path by which a
message travels from sender to receiver.
• Some examples of transmission media include twisted-pair
wire, coaxial cable, fiber-optic cable, and radio waves.
Protocol:
• A protocol is a set of rules that govern data communications.
• It represents an agreement between the communicating
devices.
• Without a protocol, two devices may be connected but not
communicating, just as a person speaking French cannot be
understood by a person who speaks only Japanese.
Data Representation
Text:
• In data communications, the text is represented as a bit pattern, a
sequence of bits (0’s or 1’s).
• Different sets of bit patterns have been designed to represent text
symbols.
• Each set is called a code, and the process of representing
symbols is called coding.
Data Representation
Numbers:
• Numbers are also represented by bit patterns.
• However, a code such as ASCII is not used to represent
numbers.
• The number is directly converted to a binary number to
simplify mathematical operations.
Images:
• Images are also represented by bit patterns.
• In its simplest form, an image is composed of a matrix of
pixels (picture elements), where each pixel is a small dot.
• The size of the pixel depends on the resolution. For example,
an image can be divided into 1000 pixels or 10,000 pixels.
• In the second case, there is a better representation of the image
(better resolution), but more memory is needed to store the
image.
Data Representation
Audio:
• Audio refers to the recording or broadcasting of sound or
music.
• Audio is, by nature, different from text, numbers, or images.
• It is continuous, not discrete.
Video :
• Video refers to the recording or broadcasting of a picture or
movie.
• Video can either be produced as a continuous entity (e.g., by
a TV camera), or it can be a combination of images, each a
discrete entity, arranged to convey the idea of motion.
Data Flow
Communication between two devices can be
• Simplex Mode
• Half-duplex Mode
• Full-duplex Mode
Simplex Mode:
• In simplex mode, the communication is unidirectional, as
on a one-way street.
• Only one of the two devices on a link can transmit.
• The other can only receive.
• Keyboards and traditional monitors are examples of simplex
devices.
• The keyboard can only introduce input.
• The monitor can only accept output.
• The simplex mode can use the entire capacity of the channel
to send data in one direction.
Half-Duplex Mode:
• In half-duplex mode, each station can both transmit and
receive, but not at the same time.
• When one device is sending, the other can only receive, and
vice versa.
• The half-duplex mode is like a one-lane road with traffic
allowed in both directions.
• When cars are traveling in one direction, cars going the
other way must wait.
• Examples: Walkie-talkies and CB (citizens band) radios are
both half-duplex systems.
Full Duplex Mode:
• In full-duplex mode (Also called duplex), both stations can
transmit and receive simultaneously.
• One common example of full-duplex communication is the
telephone network.
• When two people are communicating by a telephone line,
both can talk and listen at the same time.
• The full-duplex mode is like a two-way street with traffic
flowing in both directions at the same time.
Networks
• A network is a set of devices (often referred to as nodes)
connected by communication links.
• A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by other
nodes on the network.
Distributed Processing
• Most networks use distributed processing, in which a task is
divided among multiple computers.
• Instead of one single large machine being responsible for all
aspects of a process, separate computers (usually a personal
computer or workstation) handle a subset.
Network Criteria
• A network must be able to meet a certain number of criteria.
The most important of these are
• Performance
• Reliability
• Security.
Performance:
• Performance can be measured in many ways, including
transit time and response time.
• Transit time is the amount of time required for a message to
travel from one device to another.
• Response time is the elapsed time between an inquiry and a
response.
Reliability
• In addition to accuracy of delivery, network reliability is
measured by the frequency of failure, the time it takes a link to
recover from a failure, and the network's robustness in a
catastrophe.
Security
• Network security issues include protecting data from
unauthorized access, protecting data from damage and
development, and implementing policies and procedures for
recovery from breaches and data losses.
Physical Structures
Type of Connection:
• A network is two or more devices connected through
links. A link is a communications pathway that
transfers data from one device to another.
Multipoint Connection:
• A multipoint (also called multi drop) connection is one in
which more than two specific devices share a single link
Types of connections: point-to-point and multipoint
Network Hardware:
Network Topologies
Physical Topology
• The term physical topology refers to the way in which a
network is laid out physically.
• Two or more devices connect to a link; two or more links
form a topology.
• The topology of a network is the geometric representation of
the relationship of all the links and linking devices (usually
called nodes) to one another.
Network Topologies
Bus Topology
• The bus topology all the computers are connected through a
single cable known as a backbone cable (bus).
• When a computer wants to send a message over the network,
it puts a message over the network.
• All the stations available in the network will receive the
message whether it has been addressed or not.
• A bus topology is commonly used in LAN(802.3 (ethernet)
and 802.4 standard networks)
• In a bus network the failure of a single computer does not
effect the performance of the rest of the network.
• The configuration of a bus topology is quite simpler as
compared to other topologies.
• The most common access method of the bus topologies is
CSMA (Carrier Sense Multiple Access).
Star Topology
• Star topology is an arrangement of the network in which every
computer device is connected to the central hub, switch or a
central computer.
• The central computer is known as a server, and the peripheral
devices attached to the server are known as clients.
• In a star networks all messages must go through the server.
• When we want to send message from one computer to another,
It is first send to the server which then retract the massage to
the distention computer.
• The disadvantage of star network is the if the server fails the
entire network doesn’t work a good e.g. of star network is
telephone switching computer in the telephone exchange
which is used to connect computers as well as telephones.
Ring Topology
• In ring topology, each host machine(computer) connects to
exactly two other machines, creating a circular network
structure.
• When one host tries to communicate or send message to a
host which is not adjacent to it, the data travels through all
intermediate hosts.
• Each message consists of its distension address and the data
to be transmitted as the message proceeds around the ring
each computer determines whether it is the recipient of the
message.
• If it is not the message is send to the next computer.
• Each station takes an active role in transferring the message.
• Failure of any host results in failure of the whole ring.
Mesh Topology
• Mesh technology is an arrangement of the network in which
computers are interconnected with each other through various
redundant connections.
• There are multiple paths from one computer to another
computer.
• It does not contain the switch, hub or any central computer
which acts as a central point of communication.
• The Internet is an example of the mesh topology.
• Mesh topology is mainly used for WAN implementations where
communication failures are a critical concern.
• Mesh topology is mainly used for wireless networks.
• Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
Device 1
Device 5 Device 2
Device 4 Device 3
Hybrid topology
• The combination of various different topologies is known as
Hybrid topology.
• A Hybrid topology is a connection between different links
and nodes to transfer the data.
• When two or more different topologies are combined
together is termed as Hybrid topology and if similar
topologies are connected with each other will not result in
Hybrid topology.
Categories of Networks
Personal Area Network (PAN)
• The interconnection of devices within the range of an
individual person, typically within a range of 10 meters.
• For example, a wireless network connecting a computer
with its keyboard, mouse or printer is a PAN.
• Another example of PAN is a Bluetooth.
• Typically, this kind of network could also be interconnected
without wires to the Internet or other networks.
Local Area Network (LAN)
• Privately-owned networks covering a small geographic area, like
a home, office, building or group of buildings (e.g. campus).
• They are widely used to connect computers in company offices
and factories to share resources (e.g., printers) and exchange
information.
• LANs are restricted in size, which means that the worst-case
transmission time is bounded and known in advance.
• Knowing this bound makes it possible to use certain kinds of
designs that would not otherwise be possible.
• It also simplifies network management.
• Traditional LANs run at speeds of 10 Mbps to 100 Mbps, have
low delay (microseconds or nanoseconds), and make very few
errors. Newer LANs operate at up to 10 Gbps.
Metropolitan Area Network (MAN)
• Covers a larger geographical area than a LAN, ranging from
several blocks of buildings to entire cities.
• MANs can also depend on communications channels of
moderate-to-high data rates.
• A MAN might be owned and operated by a single
organization, but it usually will be used by many individuals
and organizations.
• MANs might also be owned and operated as public utilities.
• They will often provide means for internetworking of
LANs.
• Metropolitan Area Networks can span up to 50km, devices
used are modem and wire/cable.
Wide Area Networks (WAN)
• Computer network that covers a large geographical area,
often a country or continent. (any network whose
communications links cross metropolitan, regional, or
national boundaries).
• A WAN network will have a larger coverage area that can
range up to 100,000 KM and in some cases, stretches
globally or over international borders.
• Less formally, a network that uses routers and public
communications links.
Internetworks
• Many networks exist in the world, often with different
hardware and software.
• People connected to one network often want to
communicate with people attached to a different one.
• The fulfillment of this desire requires that different, and
frequently incompatible, networks be connected.
• A collection of interconnected networks is called an
internetwork or internet.
• These terms will be used in a generic sense, in contrast to
the worldwide Internet (which is one specific internet),
• The Internet uses ISP networks to connect enterprise
networks, home networks, and many other networks.
• Subnets, networks, and internetworks are often confused.
• The term ‘‘subnet’’ makes the most sense in the context of a
wide area network, where it refers to the collection of
routers and communication lines owned by the network
operator.
• As an analogy, the telephone system consists of telephone
switching offices connected to one another by high-speed
lines, and to houses and businesses by low-speed
• lines.
• These lines and equipment, owned and managed by the
telephone company, form the subnet of the telephone
system.
• The telephones themselves (the hosts in this analogy) are
not part of the subnet.
• A network is formed by the combination of a subnet and its
hosts.
• However, the word ‘‘network’’ is often used in a loose sense
as well.
• A subnet might be described as a network, as in the case of
the ‘‘ISP network’’.
• An internetwork might also be described as a network, as in
the case of the WAN.
• We will follow similar practice, and if we are distinguishing
a network from other arrangements, we will stick with our
original definition of a collection of computers
interconnected by a single technology.
Network Software
Protocols and Standards
• We define two widely used terms: Protocols and Standards.
• First, we define protocol, which is synonymous with rule.
• Then we discuss standards, which are agreed-upon rules.
Protocol:
• A protocol is a set of rules that govern data communications.
• A protocol defines what is communicated, how it is
communicated, and when it is communicated.
The key elements of a protocol are
• Syntax
• Semantics
• Timing.
Syntax:
• The term syntax refers to the structure or format of the data,
meaning the order in which they are presented.
• For example, a simple protocol might expect the first 8 bits of
data to be the address of the sender, the second 8 bits to be the
address of the receiver, and the rest of the stream to be the
message itself.
Semantics:
• The word semantics refers to the meaning of each section of
bits.
• How is a particular pattern to be interpreted, and what action
is to be taken based on that interpretation? For example, does
an address identify the route to be taken or the final
destination of the message?
Timing:
• The term timing refers to two characteristics: when data
should be sent and how fast they can be sent.
• For example, if a sender produces data at 100 Mbps but the
receiver can process data at only 1 Mbps, the transmission
will overload the receiver and some data will be lost.
Standards
• Standards are essential in creating and maintaining an open and
competitive market for equipment manufacturers and in
guaranteeing national and international interoperability of data
and telecommunications technology and processes.
• Standards provide guidelines to manufacturers, vendors,
government agencies, and other service providers to ensure the
kind of interconnectivity necessary in today's marketplace and
in international communications.
• Data communication standards fall into two categories:
De facto (meaning "by fact" or "by convention")
De jure (meaning "by law" or "by regulation")
De facto standard : (meaning "by fact" or "by convention")
• These are the standard s that have not been approved by any
Organization, but have been adopted as Standards because
of it’s widespread use. Also , sometimes these standards are
often established by Manufacturers.
• For example : Apple and Google are two companies
which established their own rules on their products which
are different. Also they use some same standard rules for
manufacturing for their products.
De jure standard: (meaning "by law" or "by regulation")
• Thus , these are the standards that have been approved by
officially recognized body like ANSI , ISO , IEEE etc.
These are the standard which are important to follow if it is
required or needed.
• For example : All the data communication
standard protocols like SMTP , TCP , IP , UDP etc. are
important to follow the same when we needed them.
Standards Organizations:
Standards are developed through the cooperation of
• Standards creation committees
• Forums
• Government regulatory agencies
Standards creation committees:
• International Organization for Standardization (ISO)
• International Telecommunication Union-Telecommunication
Standards Sector (ITU-T).
• American National Standards Institute (ANSI)
• Institute of Electrical and Electronics Engineers (IEEE)
• Electronic Industries Association (EIA)
Connection-Oriented Versus Connectionless Service:
• Layers can offer two different types of service to the layers
above them: connection- oriented and connectionless.
• In this section we will look at these two types and examine
the differences between them.
Connection-oriented service :
• Connection-oriented service is modeled after the telephone
system. To talk to someone, you pick up the phone, dial the
number, talk, and then hang up.
• Similarly, to use a connection-oriented network service, the
service user first establishes a connection, uses the
connection, and then releases the connection.
• The essential aspect of a connection is that it acts like a
tube: the sender pushes objects (bits) in at one end, and the
receiver takes them out at the other end.
• In most cases the order is preserved so that the bits arrive in
the order they were sent.
• In some cases when a connection is established, the sender,
receiver, and subnet conduct a negotiation about the
parameters to be used, such as maximum message size,
quality of service required, and other issues.
• Typically, one side makes a proposal and the other side can
accept it, reject it, or make a counterproposal.
• A circuit is another name for a connection with associated
resources, such as a fixed bandwidth.
• This dates from the telephone network in which a circuit
was a path over copper wire that carried a phone
conversation.
Connectionless service
• In contrast to connection-oriented service, connectionless
service is modeled after the postal system.
• Each message (letter) carries the full destination address,
and each one is routed through the intermediate nodes
inside the system independent of all the subsequent
messages.
• There are different names for messages in different
contexts; a packet is a message at the network layer.
• When the intermediate nodes receive a message in full
before sending it on to the next node, this is called store-
and-forward switching.
Reference Models
• We will discuss two important network architectures:
• The OSI reference model
• The TCP/IP reference model
• Although the protocols associated with the OSI model are not
used any more, the model itself is actually quite general and
still valid, and the features discussed at each layer are still
very important.
• The TCP/IP model has the opposite properties: the model
itself is not of much use but the protocols are widely used.
• For this reason we will look at both of them in detail.
• Also, sometimes you can learn more from failures than from
successes.
OSI Reference model :
• Established in 1947,
• The International Standards Organization (ISO) is a
multinational body dedicated to worldwide agreement on
international standards.
• An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model.
• It was first introduced in the late 1970s.
• The OSI model has seven layers.
• The principles that were applied to arrive at the seven layers
can be briefly summarized as follows:
1. A layer should be created where a different abstraction is
needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye
toward defining internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the
information flow across the interfaces.
5. The number of layers should be large enough that distinct
functions need not be thrown together in the same layer
out of necessity and small enough that the architecture
does not become unwieldy.
Seven layers of the OSI model
The interaction between layers in the OSI model
An exchange using the OSI model
Summary of layers
Physical Layer
The Physical layer is responsible for movements of individual
bits from one hop (node) to the next.
Network Layer
Packet
Frame
The TCP/IP Reference Model
(Transmission Control Protocol /Internet Protocol)
• The TCPI/IP protocol suite was developed prior to the OSI
model.
• The OSI Model we just looked at is just a reference/logical
model.
• It was designed to describe the functions of the
communication system by dividing the communication
procedure into smaller and simpler components.
• But when we talk about the TCP/IP model, it was designed
and developed by Department of Defense (DoD) in 1960s and
is based on standard protocols.
• It stands for Transmission Control Protocol/Internet Protocol.
The TCP/IP model is a concise version of the OSI model.
• It contains four layers, unlike seven layers in the OSI
model. The layers are:
• Host-to- Network Layer
• Internet Layer
• Transport Layer
• Application Layer
The four layers in the TCP/IP protocol suite are:
Host-to- Network Layer :
• It is the lowest layer that is concerned with the physical
transmission of data.
• TCP/IP does not specifically define any protocol here but
supports all the standard protocols.
Internet Layer :
• It defines the protocols for logical transmission of data over
the network.
• The main protocol in this layer is Internet Protocol (IP) and
it is supported by the protocols ICMP, IGMP, RARP, and
ARP.
Transport Layer :
• It is responsible for error-free end-to-end delivery of data.
• The protocols defined here are Transmission Control Protocol
(TCP) and User Datagram Protocol (UDP).
Application Layer :
• This is the topmost layer and defines the interface of host
programs with the transport layer services.
• This layer includes all high-level protocols like Telnet, DNS,
HTTP, FTP, SMTP, etc.
Comparison of the OSI and TCP/IP Reference Models
Comparison of the OSI and TCP/IP Reference Models
OSI TCP/IP
OSI stands for Open Systems TCP/IP stands for Transmission Control
Interconnection. Protocol/Internet Protocol
It is a generic, protocol independent
This is a protocol-dependent model that
standard that serves as a communication
allows the connection of hosts over a
gateway between the network and the
network.
end-user.
The minimum header size is 5 bytes. The minimum header size is 20 bytes.
Addressing
• Four levels of addresses are used in an internet employing
the TCP/IP protocols: Physical, Logical, Port, and Specific
Addresses in TCP/IP
Relationship of layers and addresses in TCP/IP
Physical addresses
07:01:02:01:2C:4B
2.121
IP addresses
2.122
IP addresses
2.123
Port Address
2.124
A port address is a 16-bit address represented by one decimal
number as shown.
753
A 16-bit port address represented
as one single number.
2.126
Example Networks
• The Internet
• The ARPANET
• NSFNET
• Connection-Oriented Networks
• X.25
• Frame Relay
• ATM
• Ethernet
• Wireless LANs
• 802.11
ARPANET
• ARPANET, in full Advanced Research Projects Agency
Network, experimental computer network that was the
forerunner of the Internet.
• The Advanced Research Projects Agency (ARPA), an arm
of the U.S. Defense Department, funded the development of
the Advanced Research Projects Agency Network
(ARPANET) in the late 1960s.
• Its initial purpose was to link computers at Pentagon-funded
research institutions over telephone lines.
NSFNET
• (National Science Foundation NETwork) The network
funded by the U.S. National Science Foundation, which
linked five supercomputer sites across the country in the
mid-1980s.
• Universities were also allowed to connect. In 1988, NSFnet
was upgraded from its original 56 Kbps lines to T1 circuits.
• By the early 1990s, it was using a T3 line that served as the
primary Internet backbone until 1995, when the Net became
commercialized.
Ethernet
• Ethernet is a family of wired computer networking
technologies commonly used in local area networks (LAN),
metropolitan area networks(MAN) and wide area networks
(WAN).
• It was commercially introduced in 1980 and first
standardized in 1983 as IEEE 802.3.
• Ethernet has since been refined to support higher bit rates,
a greater number of nodes, and longer link distances.
Connection-Oriented Networks
X.25
• X.25 is a protocol suite defined by ITU-T for packet switched
communications over WAN (Wide Area Network).
• It was originally designed for use in the 1970s and became
very popular in 1980s.
• Presently, it is used for networks for ATMs and credit card
verification. It allows multiple logical channels to use the
same physical line.
• It also permits data exchange between terminals with different
communication speeds.
• X.25 has three protocol layers.
• Physical layer, Data link layer, Network layer
Frame relay
• Frame relay is a type of telecommunications technology
that can be used to connect local area networks (LANs) and
to transmit data between endpoints in wide area networks
(WANs).
• Frame relay uses packet switching technology This means
that it breaks data, such as call data, into smaller packets,
also known as frames, to transmit it through a shared frame
relay network.
• These data packets are then reassembled at the data’s
destination.
• Frame relay has long been used as part of many companies’
Integrated Services Digital Network (ISDN) systems.
Asynchronous transfer mode (ATM)
• Asynchronous transfer mode (ATM) is a switching
technique used by telecommunication networks that uses
asynchronous time-division multiplexing to encode data
into small, fixed-sized cells.
• This is different from Ethernet or internet, which use
variable packet sizes for data or frames.
• ATM is the core protocol used over the synchronous optical
network (SONET) backbone of the integrated digital
services network (ISDN).
Wireless LANs
802.11
• 802.11 and 802.11x refers to a family of specifications
developed by the IEEE for wireless LAN (WLAN)
technology.
• 802.11 specifies an over-the-air interface between a wireless
client and a base station or between two wireless clients.
The IEEE accepted the specification in 1997.
Physical Layer
Wired Communication
Modulation
• Modulation is the process of transforming a carrier signal so
that it can carry the information of a message signal.
• It superimposes the contents of the message signal over a
high-frequency carrier signal, which is then transmitted
over communication channels.
• Modulation can be of two types
• Analog Modulation
• Digital Modulation
Analog Modulation
• Here, the analog information signal is transformed to the
analog carrier signal so that it can travel large distances
without substantial loss.
• Analog modulation can be of three types
• Amplitude Modulation
• Frequency Modulation
• Phase Modulation
Digital Modulation
• Digital modulation is the process of converting a digital bit
stream into an analog carrier wave for transmission via a
communication channel.
• Digital modulation is broadly divided into two into two groups
depending on the range of frequencies they use to transmit
information.
• BASEBAND and PASSBAND
• Baseband transmission sends the information signal as it is
without modulation (without frequency shifting) while
passband transmission shifts the signal to be transmitted in
frequency to a higher frequency and then transmits it, where at
the receiver the signal is shifted back to its
original frequency.
BASEBAND
PASSBAND
Multiplexing
What is Multiplexing?
• Multiplexing is a technique used to combine and send the
multiple data streams over a single medium.
• The process of combining the data streams is known as
multiplexing and hardware used for multiplexing is known
as a multiplexer.
• Multiplexing is achieved by using a device called Multiplexer
(MUX) that combines n input lines to generate a single output
line.
• Multiplexing follows many-to-one, i.e., n input lines and one
output line.
• Demultiplexing is achieved by using a device called
Demultiplexer (DEMUX) available at the receiving end.
• DEMUX separates a signal into its component signals (one input
and n outputs).
• Therefore, we can say that demultiplexing follows the
one-to-many approach.
Dividing a link into channels
Categories of multiplexing
• Frequency-Division Multiplexing
• Wavelength-Division Multiplexing
• Time-Division Multiplexing
Frequency-division multiplexing (FDM)