COMPUTER NETWORKS –
BCS502
Dr. R.N. Uma Mahesh
Associate Professor
Dept. of Computer Science & Engineering
(AI and ML)
ATMECE, Mysuru
Module-1
• Introduction: Data Communications,
Networks, Network Types, Networks
Models: Protocol Layering, TCP/IP
Protocol suite, The OSI model,
Introduction to Physical Layer:
Transmission media, Guided Media,
Unguided Media: Wireless. Switching:
Packet Switching and its types.
Module-2
• Data Link Layer: Error Detection and
Correction: Introduction, Block Coding,
Cyclic Codes. Data link control: DLC
Services: Framing, Flow Control, Error
Control, Connectionless and Connection
Oriented, Data link layer protocols, High
Level Data Link Control. Media Access
Control: Random Access, Controlled Access.
Check Sum and Point to Point Protocol
Module-3
• Network Layer: Network layer Services,
Packet Switching, IPv4 Address, IPv4
Datagram, IPv6 Datagram, Introduction
to Routing Algorithms, Unicast Routing
Protocols: DVR, LSR, PVR, Unicast
Routing protocols: RIP, OSPF, BGP,
Multicasting Routing-MOSPF
Module-4
• Introduction to Transport Layer:
Introduction, Transport-Layer Protocols:
Introduction, User Datagram Protocol,
Transmission Control Protocol: services,
features, segments, TCP connections,
flow control, Error control, Congestion
control.
Module-5
• Introduction to Application Layer:
Introduction, Client-Server Programming,
Standard Client Server Protocols: World
Wide Web and HTTP, FTP, Electronic
Mail, Domain Name System (DNS),
TELNET, Secure Shell (SSH)
Text Books:
1. Behrouz A. Forouzan, Data Communications and Networking,
5th Edition, Tata McGraw-Hill,2013.
Reference books:
2. Larry L. Peterson and Bruce S. Davie: Computer Networks – A
Systems Approach, 4th Edition, Elsevier, 2019.
3. Nader F. Mir: Computer and Communication Networks, 2nd
Edition, Pearson Education, 2015.
4. William Stallings, Data and Computer Communication 10th
Edition, Pearson Education, Inc., 2014.
Course Outcomes
• CO-1 Explain the fundamentals of computer networks.
• CO-2 Apply the concepts of computer networks to
demonstrate the working of various layers and
protocols in communication network.
• CO-3 Analyze the principles of protocol layering in
modern communication systems.
• CO-4 Demonstrate various Routing protocols and their
services using tools such as Cisco packet tracer.
Module-1
OVERVIEW OF DATA
COMMUNICATION
• Data communications are the exchange of data
between two devices via some form of transmission
medium such as a wirecable.
• For Data communication to occur, the data
communication system consists of combination of
hardware and software (program).
Contd..
Fig 1.1 Five components of data communication
The four main characteristics of data communication is
• delivery – how well the message is correctly received by the
receiver.
• accuracy – data should not be altered during transmission.
• Timeliness – data should be received by the receiver at proper time
interval. There should not be any delay while receiving the data.
• Jitter – uneven delay in the transmission. For example, if the audio
or video packets are transmitted, if the first packet arrives at the
proper time duration, and if the second packet is having some
delay, then there is uneven delay in the transmission.
Contd..
• The five main components of data communication
system are
• Message – text, numbers, audio, video, etc…
• Sender- transmits the message. Ex: computer, Phone,
video camera, etc…
• Receiver – receives the message. Ex: computer,
television, phone, etc…
• Transmission medium – twisted pair wire, coaxial
cable, fiber optic cable, etc….
• Protocol – set of rules during transmission. Ex: a
person speaking one language to another person who
may not be knowing that language.
Data Representation
• Text: bit pattern Ex: Unicode, ASCII.
• Numbers: decimal numbers converted directly to
binary.
• Images : divided into a matrix of pixels Ex: binary
image (0’s and 1’s), RGB, and YCM image.
• Audio: representation of sound by an analog or a
digital signal.
• Video: represented by an analog or digital signal.
Data Flow
• Simplex Communication
If the data transmission is taking place in only one direction,
then it is called Unidirectional communication or simplex
communication. Ex: keyboard, monitor.
Fig 1.2 Simplex Communication
Contd..
• Half-Duplex Communication
In half duplex communication, each device can transmit or
receive but not at the same time. i.e if one device is
sending the data, the other device will receive
and if another device is sending the data, the second device
will receive the data. Ex: Walkie talkies.
Fig 1.3 half duplex communication
Contd…
• Full-Duplex Communication
In full duplex communication, both the devices can transmit
or receive simultaneously. Ex: telephone network, if a person
is talking in one line, then another person can simultaneously
receive the information in another line.
Fig 1.4 Full Duplex Communication
Network
• A Network is a set of devices connected by communication links. A device
can be a printer or computer capable of sending or receiving the data
generated by other devices on the network.
• A device can be a router or switch or modem (modulator-demodulator)
which changes the one form of data into another form and so on.
• Most networks use distributed processing.
Fig 1.5 Sample diagram of a Network
Network Criteria
• The most important parameters for network criteria
are
• Performance – transit time and response time,
throughput and delay. Transit time is the time
required for the message or information to travel
from one device to another device. Response time is
the time elapsed between the inquiry and response.
• If we try to send more data to the network, it will
result in increase in throughput and delay. Delay
arises because of traffic congestion in the network.
Contd..
• Reliability – the time needed to recover from
the failure of the device during
transmitting/receiving the data.
• Security – Protection of data from
unauthorized users. Ex : Protection of data
from Gmail account, and email-access.
Types of connection in network
• Point-to-Point Connection
Fig 1.6 point to point communication
A point-to-point connection provides a dedicated link
between the two devices. Ex: Television (TV), While changing
The channels from the remote control, an point-to-point connection is
established between the TV remote control and the television system.
Contd…
• Multi-point connection
In multi-point connection, more than two devices share a single link or a
comman link.
Fig 1.7 Multi-point Connection
Network Topology
Fig 1.8 Categories of Network Topology
Mesh Topology
Fig 1.9 a fully connected mesh topology consisting of five devices.
Contd..
• Every device has a dedicated point to point link to every other
device. The term dedicated means that the link carries traffic only
between the two devices it connects.
• To find the number of physical links in a fully connected mesh
network with n nodes, we first consider that each node must be
connected to every other node.
• i.e node 1 is connected to (n-1) nodes. node 2 is connected to (n-
1) nodes and finally node n must be connected to (n-1) nodes.
Therefore, we need n(n-1) links.
• Since each link performs bi-directional communication (full-
duplex communication) , the total number of links needed is n(n-
1)/2.
Star Topology
Fig 1.10 star topology consisting of four devices.
Contd..
• In a star topology, each device has a dedicated point-
to-point link only to a central controller, usually
called a hub.
• The devices are not directly linked to one another.
Unlike a mesh topology, a star topology does not
allow direct traffic between devices.
• The controller acts as an exchange: If one device
wants to send data to another, it sends the data to the
controller, which then relays the data to the other
connected device.
Categories of Networks
• Local Area Network (LAN) – LAN is a
privately owned network which connects the
devices in a single office, building, or campus.
LAN size is limited to the area less than 2
miles or few kilometres. Ex: sharing two
computers and a printer in one office.
Establishing a lab which consists of 20 pc’s
and one server in a single room or office.
Bus Topology
Fig 1.11 bus topology.
• The star and mesh topology describe point-to-point
connections. A bus topology, on the other hand, is
multipoint.
• One long cable acts as a backbone to link all the devices
in a network. Nodes are connected to the bus cable by
drop lines and taps. A drop line is a connection running
between the device and the main cable.
Contd..
• A tap is a connector that either splices into the
main cable or punctures the sheathing of a cable
to create a contact with the metallic core. As a
signal travels along the backbone, some of its
energy is transformed into heat.
• Therefore, it becomes weaker and weaker as it
travels farther and farther. For this reason there
is a limit on the number of taps a bus can
support and on the distance between those taps.
Ring Topology
Fig 1.11 ring topology.
• In a ring topology, each device has a dedicated point-to-point connection
with only the two devices on either side of it.
• A signal is passed along the ring in one direction, from device to device,
until it reaches its destination.
Contd..
• Each device in the ring incorporates a repeater.
When a device receives a signal intended for
another device, its repeater regenerates the bits
and passes them along.
Hybrid Topology (Combination of bus and star topology)
Fig 1.12 Hybrid topology.
Wide Area Network (WAN)
• A wide area network provides long-distance
transmission of data, image, audio, and video
information over large geographic areas that
may include a country, continent, or even the
whole world.
• There are two kinds of WAN
(a) Switched WAN
(b) point-to-point WAN
Switched WAN
Fig 1.13 Switched WAN (Wide Area Network)
Ex : 1) ATM (Asynchronous transfer mode) Network
2) Wireless WAN
point-to-point WAN
Fig 1.14 point-to-point (Wide Area Network)
Ex: 1) Internet
Metropolitan Area Networks (MAN)
Fig 1.15 – Metropolitan area network (MAN)
Contd..
• A Metropolitan area network (MAN) is a
network with a size between a LAN and a
WAN. It normally covers the area inside a
town or a city. It is designed for customers
who need high-speed connectivity, normally to
the internet, and have endpoints spread over
the city or part of city.
• Ex: Telephone Network, Cable TV Network
Interconnection of Networks: Internetwork or Internet
When two or more networks are connected, they are called as internetwork or internet. Ex: Schools, Colleges,
Fig 1.16 – Internetwork or Internet
Contd..
Fig 1.17 – a) structure of a national ISP b) Interconnection of national ISP
Contd..
• To provide internet to the users, Internet service
Providers (ISP) are used. There are different kinds of
Internet Service Providers namely
• International Internet Service Provider
• National Internet Service Provider Ex: Jio, BSNL,
Airtel, etc..- higher data rate
• Regional Internet Service Provider Ex: Bharat Broad
Band Network Limited (BBNL) in Banglore –smaller
data rate.
• Local Internet Service Provider Ex: College or
The Protocol
• A protocol is a set of rules that governs data communications
• It defines what is communicated, how it is communicated and when it is
communicated.
• The key elements of the protocol are
• Syntax - Structure or format of data, meaning the order in which they are
presented for example, if I have a 24-bits of data, the first 8-bits can be
considered as an address of the sender, the last 8-bits can be considered as an
address of the receiver and the middle 8-bits can be considered as an
message or information.
• Semantics - Refer to the meaning of each section of bits, how a pattern is
interpreted and what action to be taken.
• Timing - Refers to when data should be sent and how fast can they be sent.
For example, if a sender produces data at 100Mpbs, and the receiver has the
capacity to process the data at 1Mbps. The transmission will overload and
some data will be lost.
Standards
• Standards are essential in creating and maintaining an open and
competitive market for equipment manufacturers.
• Required to guarantee national and international interoperability of
data and telecommunications technology and processes.
• Standards provides guidelines to manufacturers, vendors,
government agencies, and other service providers to ensure the kind
of interconnectivity necessary in today’s marketplace.
• Categories of data communications standards
• Defacto (“by fact” or “by convention”) :
• Standards that have not been approved by an organizational body
but have been adopted through wide spread use, eg. model TCP/IP)
• Dejure (“by law” or “by regulation”):
• Those that have been legislated by an official recognized body, eg.
OSI model
Standards Organizations
• Some of the important standards organization are
• International Organization for Standardization (ISO) – ISO is a
multinational body which has drawn membership from standard
creation committees of various governments.
• International Tele Communication Union – Telecommunication
Standards Sector (ITU-T) – the consultative committee for
international telephony and telegraphy (CCITT) – standards for
telecommunication in phone particular.
• American National Standards Institute (ANSI) – it is private
standards institute not affiliated to U.S federal government.
• Institute of Electrical and Electronics Engineers (IEEE) – largest
professional engineering society
• Electronic Industries Association (EIA) - used for promotion of
electronic manufacturing concerns.
Network Models
• Here mainly we are going to discuss different
kinds of network models a) Open System
Interconnect (OSI) Model
• b) Transmission Control Protocol (TCP) /
Internet Protocol (IP) Model
Layered Tasks
• We use the concept of layers in our daily life.
As an example, let us consider two friends
who communicate through postal mail. The
process of sending a letter to a friend would be
complex if there were no services available
from the post office. Fig 1.18 shows the steps
in this task.
Tasks involved in sending a letter
Fig 1.18 – Tasks involved in sending a letter
Contd..
• In Fig 1.18, we have a sender, receiver, and a carrier
that transports the letter.
• At the sender side,
• Higher layer: the sender writes the letter inserts the
letter in the envelope, writes the sender and receiver
addresses, and drops the letter in a mailbox.
• Middle layer: the letter is picked up by a letter carrier
and delivered to the post office.
• Lower Layer: the letter is sorted at the post office, a
carrier transports the letter.
Contd..
• On the way,
• The letter will be transported through the truck, train, airplane,
boat, or a combination of these.
• At the receiver side,
• Lower Layer: the carrier transports the letter to the post
office.
• Middle Layer: the letter is sorted and delivered to the
recipient’s mailbox.
• Higher Layer: the receiver picks up the letter, opens the
envelope, and reads it.
Totally, there are three activities at the sender side, and another three activities
at the receiver side. The task of transporting the letter between the sender and
the receiver is done by the carrier.
The OSI Model
• Established in 1947, the International
Standards Organization(ISO) is a multinational
body dedicated to world wide agreement on
international standards. An ISO standard that
covers all aspects of network communications
is the Open Systems Interconnection(OSI)
model. It was first introduced in the late 1970s.
Layers of the OSI Model
Fig 1.19 – Layers in the OSI Model
The OSI model
Fig 1.20 Complete Representation of the OSI Model
The Physical Layer
Fig 1.21 The Physical Layer
The Physical layer is responsible for movements of individuals bits from one node (hop)
to the next node.
Functionalities of Physical Layer
• Following are the various functions performed by the Physical layer of the OSI model.
• Representation of Bits: Data in this layer consists of stream of bits. The bits must be
encoded into signals for transmission. It defines the type of encoding i.e. how 0's and 1's are
changed to signal.
• Data Rate: This layer defines the rate of transmission which is the number of bits per second.
• Synchronization: It deals with the synchronization of the transmitter and receiver. The
sender and receiver are synchronized at bit level.
• Interface: The physical layer defines the transmission interface between devices and
transmission medium.
• Line Configuration: This layer connects devices with the medium: Point to Point
configuration and Multi point configuration.
• Topologies: Devices must be connected using the following topologies: Mesh, Star, Ring and
Bus.
• Transmission Modes: Physical Layer defines the direction of transmission between two
devices: Simplex, Half Duplex, Full Duplex.
Data Link Layer
Fig 1.22 The Data Link Layer
The Data Link layer is responsible for moving frames from one node (hop) to the next
node.
Functionalities of Data link Layer
• Following are the various functions performed by the Data link layer of the OSI model.
• Framing: Frames are the streams of bits received from the network layer into manageable
data units. This division of stream of bits is done by Data Link Layer.
• Physical Addressing: The Data Link layer adds a header to the frame in order to define
physical address of the sender or receiver of the frame, if the frames are to be distributed to
different systems on the network.
• Flow Control: If the rate at which the data are absorbed by the receiver is less than the rate
at which data are produced in the sender, the data link layer imposes a flow control
mechanism to avoid overwhelming the receiver.
• Error Control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism. Data Link Layers adds
mechanism to prevent duplication of frames.
• Access Control: Protocols of this layer determine which of the devices has control over the
link at any given time, when two or more devices are connected to the same link.
Data Link Layer Contd..
Fig 1.23 The Data Link Layer node-to-node delivery
Network Layer
Fig 1.24 The Network Layer
The Network Layer is responsible for the delivery of individual packets from the source
host to the destination host.
Functionalities of Network Layer
• Following are the various functions performed by the network
layer of the OSI model.
• It translates logical network address into physical address.
Concerned with circuit, message or packet switching.
• Routers and gateways operate in the network layer. Mechanism is
provided by Network Layer for routing the packets to final
destination.
• Connection services are provided including network layer flow
control, network layer error control and packet sequence control.
• Breaks larger packets into small packets.
Network Layer Contd..
Fig 1.25 The Network Layer Contd..
Transport Layer
Fig 1.26 The Transport Layer
The transport layer is responsible for the delivery of a message from one process to the
another process.
Functionalities of Transport Layer
• Following are the various functions performed by the Transport layer of the OSI model.
• Service Point Addressing : Transport Layer header includes service point address which is
port address. This layer gets the message to the correct process on the computer unlike
Network Layer, which gets each packet to the correct computer.
• Segmentation and Reassembling : A message is divided into segments; each segment
contains sequence number, which enables this layer in reassembling the message. Message
is reassembled correctly upon arrival at the destination and replaces packets which were lost
in transmission.
• Connection Control : It includes 2 types:
• Connectionless Transport Layer : Each segment is considered as an independent packet and
delivered to the transport layer at the destination machine.
• Connection Oriented Transport Layer : Before delivering packets, connection is made with
transport layer at the destination machine.
• Flow Control: In this layer, flow control is performed end to end.
• Error Control: Error Control is performed end to end in this layer to ensure that the
complete message arrives at the receiving transport layer without any error. Error
Correction is done through re transmission.
Process to Process delivery of a message
Fig 1.27 Process to Process delivery of a message
Session Layer
Fig 1.28 Session Layer
The session layer is responsible for dialog control and synchronization.
Functionalities of Session Layer
• Following are the various functions performed by the session layer of the OSI
model.
• Dialog Control: This layer allows two systems to start communication with each
other in half-duplex or full-duplex.
• Token Management: This layer prevents two parties from attempting the same
critical operation at the same time.
• Synchronization:This layer allows a process to add check points which are
considered as synchronization points into stream of data. Example: If a system is
sending a file of 800pages, adding check points after every 50pages is
recommended. This ensures that 50 page unit is successfully received and
acknowledged. This is beneficial at the time of crash as if a crash happens at page
number110; there is no need to retransmit 1 to100 pages.
Presentation Layer
Fig 1.29 Presentation Layer
The presentation layer is responsible for translation, compression, and encryption.
Functionalities of Presentation Layer
• Following are the various functions performed by the presentation layer
of the OSI model.
• Translation: Before being transmitted, information in the form of
characters and numbers should be changed to bit streams. The
presentation layer is responsible for interoperability between encoding
methods as different computers use different encoding methods. The
presentation layer at the sender changes the information from it’s
sender-dependent format into a comman format. The presentation layer
at the receiving machine changes the comman format into it’s receiver
dependent format.
Contd..
• Encryption: It carries out encryption at the
transmitter and decryption at the receiver.
• Compression: It carries out data compression to
reduce the bandwidth of the data to be transmitted.
The primary role of Data compression is to reduce
the number of bits to be transmitted. It is important
in transmitting multi media such as audio, video, text
etc.
Application Layer
Fig 1.30 Application Layer
The application layer is responsible for providing services to the users.
Functionalities of Application Layer
• Following are the various functions performed by the application layer of the
OSI model.
• Mail Services: This layer provides the basis for E-mail forwarding and storage.
• Network Virtual Terminal: It allows a user to log on to a remote host. The
application creates software emulation of a terminal at the remote host. User's
computer talks to the software terminal which in turn talks to the host and vice
versa. Then the remote host believes it is communicating with one of its own
terminals and allows user to log on.
• Directory Services: This layer provides access for global information about
various services.
• File Transfer, Access and Management (FTAM):It is a standard mechanism to
access files and manages it. Users can access files in a remote computer and
manage it. They can also retrieve files from a remote computer.
Summary of the layers
Fig 1.31 summary of layers
TCP/IP Protocol Suite
• The layers in the TCP/IP protocol suite do not
exactly match those in the OSI model. The
original TCP/IP protocol suite was defined as
having four layers: host-to-network, internet,
transport, and application. However, when
TCP/IP is compared to OSI, we can say that
the TCP/IP protocol suite is made of five
layers: physical, data link, network, transport,
and application.
TCP/IP and OSI Model
Fig 1.32 TCP/IP Model and OSI Model
Contd..
• At the transport layer, TCP/IP defines three
protocols : Transmission Control Protocol
(TCP), User Datagram Protocol (UDP), and
Stream Control Transmission Protocol
(STCP).
• At the network layer, the main protocol
defined by TCP/IP model is the
Internetworking protocol (IP).
Contd..
• Physical and Data Link Layers -
• At the physical and data link layers, TCP/IP does not define any
specific protocol. It supports all the standard and proprietary
protocols.
• Network Layer –
• At the network layer, TCP/IP supports the internetworking
protocol (IP). In turn, TCP/IP model supports four supporting
protocols namely ARP, ICMP, IGMP, RARP.
Contd..
• Internetworking Protocol (IP) –
• The Internetworking protocol is the transmission mechanism
used by TCP/IP protocols. It is an unreliable and connectionless
protocol – a best effort delivery service. The term best effort
means that IP Provides no error checking or tracking.
• IP transports data in packets called datagrams, each of which is
transported separately. Datagrams can travel along different
routes and can arrive out of sequence or be duplicated. IP does
not keep track of the routes and has no facility for reordering
datagrams once they arrive at their destination.
Contd..
• Address Resolution Protocol (ARP) –
• The ARP is used to find the physical address of the
node when its internet address is known. On a typical
physical network, such as LAN, each device on a link
is identified by physical address, usually imprinted on
the network interface card (NIC).
• Reverse Address Resolution Protocol (RARP) –
• The RARP allows a host to discover it’s internet
address when it knows only the physical address. It is
used when it is connected to a computer for the first
time or when a diskless computer is booted.
Contd..
• Internet Control Message Protocol (ICMP) –
• The ICMP is a mechanism used by hosts and
gateways to send notification of datagram
problems back to the sender. ICMP sends query
and error reporting messages.
• Internet Group Message Protocol (IGMP) –
• IGMP is used to facilitate the simultaneous
transmission of the message to a group of
recipients.
Contd..
• Transport layer –
• The transport layer in the TCP/IP model is
represented by two protocols namely a)
Transmission Control Protocol (TCP) b) User
Datagram Protocol (UDP).
• IP is a host-to-host protocol meaning that it can
deliver a packet from one physical device to another
physical device.
• UDP and TCP are transport level protocols
responsible for delivery of a message from one
process to another process.
Contd..
• User Datagram Protocol (UDP) –
• The UDP is the simpler of the two standard TCP/IP transport protocols. It
is a process-to-process protocol that adds only port addresses, checksum
error control, and length information to the data from the upper layer.
• Transmission Control Protocol (TCP) –
• The TCP provides full transport-layer services to applications. TCP is a
reliable stream transport protocol.
• For each transmission, TCP divides a stream of data into smaller units
called segments. Each segment includes a sequence number for reordering
after receipt, together with an acknowledgement number for the segments
received. Segments are carried across the internet inside of IP datagrams.
At the receiving end, TCP collects each datagram as it comes in and
reorders the transmission based on sequence numbers.
Contd..
• Stream Control Transmission Protocol (SCTP) –
• The SCTP provides support for newer
applications such as voice over the Internet. It is a
transport layer protocol the combines the best
features of UDP and TCP.
• Application Layer –
• The application layer in TCP/IP is equivalent to
the combined session, presentation, and
application layers in the OSI model.
Application Layer Contd..
• The several protocols used in the application
layer are
• i) Simple mail transfer protocol (SMTP)
• ii) File Transfer Protocol (FTP)
• iii) Hyper Text Transfer Protocol (HTTP)
• iv) Domain Name System (DNS)
• v) Simple Network Management Protocol
(SNMP)
• vi) Teletype Network (TelNet)
Difference between TCP/IP and OSI
Addressing
• Four levels of addresses are used in an internet
employing the TCP/IP protocols : physical,
logical, port, and specific.
• Topics discussed in this section :
• Physical Addresses
• Logical Addresses
• Port Addresses
• Specific Addresses
Addresses in TCP/IP
Fig 1.33 Addresses in TCP/IP
Physical Address
• The physical address, also known as the link address, is the
address of a node as defined by its LAN or WAN.
• The size and format of these addresses vary depending on the
network. For example, Ethernet uses a 6-byte (48-bit) physical
address.
• Physical addresses can be either unicast (one single recipient),
multi cast (a group of recipients), or broadcast (to be received by
all systems in the network.
• Example: Most local area networks use a 48-bit (6-byte) physical
address written as 12 hexa decimal digits; every byte (2
hexadecimal digits) is separated by a colon, as shown below: A6-
byte (12 hexadecimal digits) physical address 07:01:02:01:2C:4B
Logical Addresses
• Logical addresses are used by networking software to allow packets to be independent of
the physical connection of the network, that is, to work with different network topologies
and types of media.
• A logical address in the Internet is currently a 32-bit/128-bit address that can uniquely
define a host connected to the Internet. An internet address in IPv4 in decimal
numbers132.24.75.9
• No two publicly addressed and visible hosts on the Internet can have the same IP address.
• The physical addresses will change from hop to hop, but the logical addresses remain the
same.
• The logical addresses can be either unicast (one single recipient), multicast (a group of
recipients),or broadcast (all systems in the network). There are limitations on broad cast
addresses.
Port Addresses
• There are many application running on the computer. Each application run
with a port no.(logically)on the computer.
• A port number is part of the addressing information used to identify the
senders and receivers of messages.
• Port numbers are most commonly used with TCP/IP connections.
• These port numbers allow different applications on the same computer to
share network resources simultaneously.
• The physical addresses change from hop to hop, but the logical and port
addresses usually remain the same.
• Example: a port address is a 16-bit address represented by one decimal
number 753
Specific Address
• Some applications have user-friendly addresses
that are designed for that specific application.
• Examples include the e-mail address (for
example,narayan@daffodilvarsity.edu.bd)and
the Universal Resource Locator(URL) (for
example,www.daffodilvarsity.edu.bd). The first
defines the recipient of an e-mail; the second is
used to find a document on the World Wide Web.
Introduction to Switching
Fig 1.34 Switched network
Introduction to Switching Contd..
• A switched network consists of a series of interlinked
nodes, called switches.
• Switches are devices capable of creating temporary
connections between two or more devices linked to
the switch.
• In a switched network, some of these nodes are
connected to the end systems (computers or
telephones, for example). Others are used only for
routing. The end systems (communicating devices)
are labeled A, B, C, D, and so on, and the switches
are labeled I, II, III, IV, and V. Each switch is
connected to multiple links.
Categories in Switching
Fig 1.35 Taxonomy of switched networks
Circuit Switched Networks
• A circuit-switched network is made of a set of switches
connected by physical links, in which each link is
divided into n channels.
Fig 1.36 Circuit Switched Network
Circuit Switched Networks Contd..
• Fig 1.36 shows a trivial circuit-switched network with four switches and
four links. Each link is divided into n (n is 3 in the figure) channels by
using FDM or TDM.
• We have explicitly shown the multiplexing symbols to emphasize the
division of the link into channels even though multiplexing can be
implicitly included in the switch fabric.
• The end systems, such as computers or telephones, are directly connected
to a switch. We have shown only two end systems for simplicity. When
end system A needs to communicate with end system M, system A needs
to request a connection to M that must be accepted by all switches as
well as by M itself. This is called the setup phase; a circuit (channel) is
reserved on each link, and the combination of circuits or channels defines
the dedicated path. After the dedicated path made of connected circuits
(channels) is established, data transfer can take place. After all data have
been transferred, the circuits are tom down.
Circuit Switched Networks Contd…
• Circuit switching takes place at the physical layer.
• Before starting communication, the stations must make a reservation for the
resources to be used during the communication. These resources, such as
channels (bandwidth in FDM and time slots in TDM), switch buffers, switch
processing time, and switch input/output ports, must remain dedicated during
the entire duration of data transfer until the teardown phase.
• Data transferred between the two stations are not packetized (physical layer
transfer of the signal). The data are a continuous flow sent by the source station
and received by the destination station, although there may be periods of
silence.
• There is no addressing involved during data transfer. The switches route the
data based on their occupied band (FDM) or time slot (TDM).
• In circuit switching, the resources need to be reserved during the setup phase;
the resources remain dedicated for the entire duration of data transfer until the
teardown phase.
• Three Phases in Circuit Switched Network
• The actual communication in a circuit-switched network requires three phases: connection setup, data
transfer, and connection teardown.
• Setup Phase
• Before the two parties (or multiple parties in a conference call) can communicate, a dedicated
circuit (combination of channels in links) needs to be established.
• The end systems are normally connected through dedicated lines to the switches, so
connection setup means creating dedicated channels between the switches. For example, in
Figure 1.36, when system A needs to connect to system M, it sends a setup request that
includes the address of system M, to switch I. Switch I finds a channel between itself and
switch IV that can be dedicated for this purpose.
• Switch I then sends the request to switch IV, which finds a dedicated channel between itself
and switch III. Switch III informs system M of system A's intention at this time. In the next
step to making a connection, an acknowledgment from system M needs to be sent in the
opposite direction to system A.
• Only after system A receives this acknowledgment is the connection established. Note that
end-to-end addressing is required for creating a connection between the two end systems.
These can be, for example, the addresses of the computers assigned by the administrator in a
TDM network, or telephone numbers in an FDM network.
• Data Transfer Phase
• After the establishment of the dedicated circuit (channels),
the two parties can transfer data.
• Teardown Phase
• When one of the parties needs to disconnect, a signal is sent
to each switch to release the resources.
Circuit Switched Networks Example(1)
• As a trivial example, let us use a circuit-switched network to connect
eight telephones in a small area. Communication is through 4-kHz
voice channels. We assume that each link uses FDM to connect a
maximum of two voice channels. The bandwidth of each link is then 8
kHz. Fig 1.37 shows the situation. Telephone 1 is connected to
telephone 7; 2 to 5; 3 to 8; and 4 to 6. Of course the situation may
change when new connections are made. The switch controls the
connections.
Fig 1.37 Circuit Switched Network Example Problem Solution
Datagram Networks
• In data communications, we need to send messages from one end
system to another. If the message is going to pass through a packet-
switched network, it needs to be divided into packets of fixed or
variable size. The size of the packet is determined by the network and
the governing protocol.
• In packet switching, there is no resource allocation for a packet. This
means that there is no reserved bandwidth on the links, and there is no
scheduled processing time for each packet. Resources are allocated on
demand. The allocation is done on a firstcome, first-served basis.
When a switch receives a packet, no matter what is the source or
destination, the packet must wait if there are other packets being
processed.
• As with other systems in our daily life, this lack of reservation may
create delay. For example, if we do not have a reservation at a
restaurant, we might have to wait.
• In a packet-switched network, there is no resource
reservation; resources are allocated on demand.
• In a datagram network, each packet is treated
independently of all others. Even if a packet is part
of a multi packet transmission, the network treats it
as though it existed alone. Packets in this approach
are referred to as datagrams.
• Datagram switching is normally done at the network
layer.
• Fig 1.38 shows how the datagram approach is used to
deliver four packets from station A to station X.
Fig 1.38 Datagram network with four switches
A
• In this example, all four packets (or datagrams) belong
to the same message, but may travel different paths to
reach their destination. This is so because the links may
be involved in carrying packets from other sources and
do not have the necessary bandwidth available to carry
all the packets from A to X. This approach can cause the
datagrams of a transmission to arrive at their destination
out of order with different delays between the packets.
Packets may also be lost or dropped because of a lack of
resources. In most protocols, it is the responsibility of an
upper-layer protocol to reorder the datagrams or ask for
lost datagrams before passing them on to the application.
Routing Table in Datagram Networks
Fig 1.39 Routing table in a datagram network
A switch in a datagram network uses a routing table that is based on the destination
address.
• Destination Address
• Every packet in a datagram network carries a header that contains,
among other information, the destination address of the packet.
When the switch receives the packet, this destination address is
examined; the routing table is consulted to find the corresponding
port through which the packet should be forwarded. This address,
unlike the address in a virtual-circuit-switched network, remains
the same during the entire journey of the packet.
• The destination address in the header of a packet in a datagram
network remains the same during the entire journey of the packet.
Virtual Circuit Networks
• A virtual-circuit network is a cross between a circuit-switched network
and a datagram network. It has some characteristics of both.
• As in a circuit-switched network, there are setup and teardown phases
in addition to the data transfer phase.
• Resources can be allocated during the setup phase, as in a circuit-
switched network, or on demand, as in a datagram network.
• As in a datagram network, data are packetized and each packet carries
an address in the header. However, the address in the header has local
jurisdiction (it defines what should be the next switch and the channel
on which the packet is being carried), not end-to-end jurisdiction. The
reader may ask how the intermediate switches know where to send the
packet if there is no final destination address carried by a packet.
• 4. As in a circuit-switched network, all packets follow the same path
established during the connection.
• 5. A virtual-circuit network is normally implemented in the data link layer,
while a circuit-switched network is implemented in the physical layer and a
datagram network in the network layer.
Fig 1.40 Circuit diagram of Virtual Circuit Network
• Figure 1.40 is an example of a virtual-circuit network. The network has
switches that allow traffic from sources to destinations. A source or destination
can be a computer, packet switch, bridge, or any other device that connects
other networks.
• The identifier that is actually used for data transfer is called the virtual-circuit
identifier (VCI). A VCI, unlike a global address, is a small number that has only
switch scope; it is used by a frame between two switches. When a frame arrives
at a switch, it has a VCI; when it leaves, it has a different VCl. Figure 1.41
shows how the VCI in a data frame changes from one switch to another. Note
that a VCI does not need to be a large number since each switch can use its own
unique set of VCls.
Fig 1.41 Virtual Circuit Identifier
• Three Phases
• As in a circuit-switched network, a source and destination need to go
through three phases in a virtual-circuit network: setup, data transfer,
and teardown. In the setup phase, the source and destination use their
global addresses to help switches make table entries for the connection.
In the teardown phase, the source and destination inform the switches to
delete the corresponding entry. Data transfer occurs between these two
phases. We first discuss the data transfer phase, which is more
straightforward; we then talk about the setup and teardown phases.
• Data Transfer Phase
• To transfer a frame from a source to its destination, all switches need to
have a table entry for this virtual circuit. The table, in its simplest form,
has four columns. This means that the switch holds four pieces of
information for each virtual circuit that is already set up. We show later
how the switches make their table entries, but for the moment we
assume that each switch has a table with entries for all active virtual
circuits. Figure 1.42 shows such a switch and its corresponding table.
• Figure 1.42 shows a frame arriving at port 1 with
a VCI of 14. When the frame arrives, the switch
looks in its table to find port 1 and a VCI of 14.
When it is found, the switch knows to change the
VCI to 22 and send out the frame from port 3.
Fig 1.42 Switch and tables in a virtual-circuit network
Fig 1.43 Source-to-destination data transfer in a virtual circuit network
Figure 1.43 shows how a frame from source A reaches destination B and how its VCI changes
during the trip. Each switch changes the VCI and routes the frame. The data transfer phase is
active until the source sends all its frames to the destination. The procedure at the switch is the
same for each frame of a message. The process creates a virtual circuit, not a real circuit,
between the source and destination.
• Setup Phase :
Fig 1.44 Setup-Phase in a virtual circuit network
• Setup Request :
• A setup request frame is sent from the source to the destination.
• Figure 1.44 shows the process.
• a. Source A sends a setup frame to switch 1.
• b. Switch 1 receives the setup request frame. It knows that a frame going from A to B
goes out through port 3. The switch creates an entry in its table for this virtual circuit,
but it is only able to fill three of the four columns.The switch assigns the incoming port
(1) and chooses an available incoming VCI (14) and the outgoing port (3). It does not yet
know the outgoing VCI, which will be found during the acknowledgment step. The
switch then forwards the frame through port 3 to switch 2.
• c. Switch 2 receives the setup request frame. The same events happen here as at switch
1; three columns of the table are completed: in this case, incoming port (l), incoming
VCI (66), and outgoing port (2).
• d. Switch 3 receives the setup request frame. Again, three columns are completed:
incoming port (2), incoming VCI (22), and outgoing port (3).
• e. Destination B receives the setup frame, and if it is ready to receive frames from A, it
assigns a VCI to the incoming frames that come from A, in this case 77. This VCI lets
the destination know that the frames come from A, and not other sources.
• Acknowledgment
• A special frame, called the acknowledgment frame, completes the entries in the
switching tables. Figure 1.45 shows the process.
• a. The destination sends an acknowledgment to switch 3. The acknowledgment
carries the global source and destination addresses so the switch knows which
entry in the table is to be completed. The frame also carries VCI 77, chosen by
the destination as the incoming VCI for frames from A. Switch 3 uses this VCI to
complete the outgoing VCI column for this entry. Note that 77 is the incoming
VCI for destination B, but the outgoing VCI for switch 3.
• b. Switch 3 sends an acknowledgment to switch 2 that contains its incoming VCI
in the table, chosen in the previous step. Switch 2 uses this as the outgoing VCI
in the table.
• c. Switch 2 sends an acknowledgment to switch 1 that contains its incoming VCI
in the table, chosen in the previous step. Switch 1 uses this as the outgoing VCI
in the table.
• d. Finally switch 1 sends an acknowledgment to source A that contains its
incoming VCI in the table, chosen in the previous step.
• e. The source uses this as the outgoing VCI for the data frames to be sent to
destination B.
Fig 1.45 Setup-Acknowledgement in a virtual circuit network
Transmission media
Fig 1.46 Transmission medium and physical layer
• A transmission medium can be broadly defined as anything that can carry information from
a source to a destination.
• For example, the transmission medium for two people having a dinner conversation is the
air. The air can also be used to convey the message in a smoke signal or semaphore. For a
written message, the transmission medium might be a mail carrier, a truck, or an airplane.
• In data communications the definition of the information and the transmission medium is
more specific. The transmission medium is usually free space, metallic cable, or fiber-optic
cable.
• The information is usually a signal that is the result of a conversion of data from another
form.
Transmission media Contd..
• In telecommunications, transmission media can be divided
into two broad categories: guided and unguided. Guided media
include twisted-pair cable, coaxial cable, and fiber-optic cable.
Unguided medium is free space.
Fig 1.47 Classes of transmission media
Transmission media Contd..
• GUIDED MEDIA
• Guided media, which are those that provide a conduit from
one device to another, include twisted-pair cable, coaxial
cable, and fiber-optic cable.
• A signal traveling along any of these media is directed and
contained by the physical limits of the medium.
• Twisted-pair and coaxial cable use metallic (copper)
conductors that accept and transport signals in the form of
electric current.
• Optical fiber is a cable that accepts and transports signals in
the form of light.
Transmission media Contd..
• Twisted-Pair Cable
• A twisted pair consists of two conductors
(normally copper), each with its own plastic
insulation, twisted together, as shown in Fig
1.48.
Fig 1.48 twisted pair cable
Twisted-Pair Cable
contd..
• One of the wires is used to carry signals to the receiver, and the
other is used only as a ground reference.
• The receiver uses the difference between the two. In addition to the
signal sent by the sender on one of the wires, interference (noise)
and crosstalk may affect both wires and create unwanted signals.
• If the two wires are parallel, the effect of these unwanted signals is
not the same in both wires because they are at different locations
relative to the noise or crosstalk sources (e,g., one is closer and the
other is farther). This results in a difference at the receiver.
• By twisting the pairs, a balance is maintained. For example,
suppose in one twist, one wire is closer to the noise source and the
other is farther; in the next twist, the reverse is true.
Twisted-Pair Cable
contd..
• Unshielded Versus Shielded Twisted-Pair Cable
• The most common twisted-pair cable used in communications
is referred to as unshielded twisted-pair (UTP). IBM has also
produced a version of twisted-pair cable for its use called
shielded twisted-pair (STP).
• STP cable has a metal foil or braided mesh covering that
encases each pair of insulated conductors.
• Although metal casing improves the quality of cable by
preventing the penetration of noise or crosstalk, it is bulkier
and more expensive.
• Fig 1.49 shows the difference between UTP and STP.
UTP versus STP
Fig 1.49 UTP versus STP
Twisted-Pair Cable
contd..
• Categories
• The Electronic Industries Association (EIA)
has developed standards to classify unshielded
twisted-pair cable into seven categories.
Categories are determined by cable quality,
with 1 as the lowest and 7 as the highest.
• Each EIA category is suitable for specific uses.
Table 1.1 shows these categories.
Twisted-Pair Cable
contd..
Table 1.1 Categories of unshielded twisted-pair cables
Twisted-Pair Cable
contd..
• Connectors
• The most common UTP connector is RJ45 (RJ stands
for registered jack), as shown in Fig 1.50.
• The RJ45 is a keyed connector, meaning the
connector can be inserted in only one way.
Fig 1.50 UTP connector
Twisted-Pair Cable
contd..
• Performance
• One way to measure the performance of twisted-pair cable
is to compare attenuation versus frequency and distance.
• A twisted-pair cable can pass a wide range of frequencies.
• However, Fig 1.52 shows that with increasing frequency,
the attenuation measured in decibels per kilometer
(dB/km), sharply increases with frequencies above
100kHz.
• Note that gauge is a measure of the thickness of the wire.
Twisted-Pair Cable
contd..
Fig 1.52 UTP performance
Applications of twisted pair cables
• Twisted-pair cables are used in telephone lines to provide
voice and data channels. The local loop-the line that connects
subscribers to the central telephone office---commonly
consists of unshielded twisted-pair cables.
• The DSL lines that are used by the telephone companies to
provide high-data-rate connections also use the high-
bandwidth capability of unshielded twisted-pair cables.
• Local-area networks, such as lOBase-T and lOOBase-T, also
use twisted-pair cables.
Coaxial Cable
• Coaxial cable (or coax) carries signals of higher frequency
ranges than those in twisted pair cable, in part because the two
media are constructed quite differently.
• Instead of having two wires, coax has a central core conductor of
solid or stranded wire (usually copper) enclosed in an insulating
sheath, which is, in turn, encased in an outer conductor of metal
foil, braid, or a combination of the two.
• The outer metallic wrapping serves both as a shield against noise
and as the second conductor, which completes the circuit. This
outer conductor is also enclosed in an insulating sheath, and the
whole cable is protected by a plastic cover (see Fig 1.53).
Coaxial Cable Contd..
Fig 1.53 Coaxial cable
Coaxial Cable Contd..
• Coaxial Cable Standards
• Coaxial cables are categorized by their radio
government (RG) ratings. Each RG number denotes
a unique set of physical specifications, including the
wire gauge of the inner conductor, the thickness and
type of the inner insulator, the construction of the
shield, and the size and type of the outer casing.
Each cable defined by an RG rating is adapted for a
specialized function, as shown in Table 1.2.
Coaxial Cable Contd..
Coaxial Cable Contd..
• Coaxial Cable Connectors
• To connect coaxial cable to devices, we need coaxial
connectors. The most common type of connector used today
is the Bayone-Neill-Concelman (BNe), connector. Fig 1.54
shows three popular types of these connectors: the BNC
connector, the BNCT connector, and the BNC terminator.
The BNC connector is used to connect the end of the cable
to a device, such as a TV set. The BNC T connector is used
in Ethernet networks to branch out to a connection to a
computer or other device. The BNC terminator is used at the
end of the cable to prevent the reflection of the signal.
Coaxial Cable Contd..
Fig 1.54 BNC Connectors
Performance
As we did with twisted-pair cables, we can measure the performance of a coaxial cable.
We notice in Fig 1.55 that the attenuation is much higher in coaxial cables than in twisted-
pair cable. In other words, although coaxial cable has a much higher bandwidth, the signal
weakens rapidly and requires the frequent use of repeaters.
Co-axial Cable Performance
Fig 1.55 Coaxial cable performance
Applications of co-axial cable
• Coaxial cable was widely used in analog telephone networks where a single coaxial network
could carry 10,000 voice signals.
• Later it was used in digital telephone networks where a single coaxial cable could carry digital
data up to 600 Mbps.
• However, coaxial cable in telephone networks has largely been replaced today with fiber-optic
cable.
• Cable TV networks (see Chapter 9) also use coaxial cables. In the traditional cable TV network,
the entire network used is coaxial cable. Later, however, cable TV providers. replaced most of
the media with fiber-optic cable; hybrid networks use coaxial cable only at the network
boundaries, near the consumer premises. Cable TV uses RG-59 coaxial cable.
• Another common application of coaxial cable is in traditional Ethernet LANs . Because of its
high bandwidth, and consequently high data rate, coaxial cable was chosen for digital
transmission in early Ethernet LANs.
• The 10Base-2, or Thin Ethernet, uses RG-58 coaxial cable with BNe connectors to transmit data
at 10 Mbps with a range of 185 m.
• The lOBase5, or Thick Ethernet, uses RG-11 (thick coaxial cable) to transmit 10 Mbps with a
range of 5000 m. Thick Ethernet has specialized connectors.
Fiber-Optic Cable
• A fiber-optic cable is made of glass or plastic and transmits
signals in the form of light.
• To understand optical fiber, we first need to explore several
aspects of the nature of light.
• Light travels in a straight line as long as it is moving
through a single uniform substance.
• If a ray of light traveling through one substance suddenly
enters another substance (of a different density), the ray
changes direction. Fig 1.56 shows how a ray of light
changes direction when going from a more dense to a less
dense substance.
Fiber-Optic Cable contd..
Fig 1.56 Bending of light ray
• As the figure shows, if the angle of incidence I (the angle the ray makes with the line
perpendicular to the interface between the two substances) is less than the critical angle,
the ray refracts and moves closer to the surface.
• If the angle of incidence is equal to the critical angle, the light bends along the interface.
If the angle is greater than the critical angle, the ray reflects (makes a turn) and travels
again in the denser substance.
• Note that the critical angle is a property of the substance, and its value differs from one
substance to another.
Fiber-Optic Cable contd..
Fig 1.57 Optical fiber
• Optical fibers use reflection to guide light through a channel. A glass or plastic core is
surrounded by a cladding of less dense glass or plastic.
• The difference in density of the two materials must be such that a beam of light moving
through the core is reflected off the cladding instead of being refracted into it.
Fiber-Optic Cable contd..
• Propagation Modes
• Current technology supports two modes
(multimode and single mode) for propagating
light along optical channels, each requiring
fiber with different physical characteristics.
Multi mode can be implemented in two forms:
step-index or graded-index.
Fiber-Optic Cable contd..
Fig 1.58 Propagation modes
Fiber-Optic Cable contd..
Figure 1.59 Modes
Fiber-Optic Cable contd..
• Multimode Multi mode is so named because multiple beams from a light source move through the
core in different paths. How these beams move within the cable depends on the structure of the core.
• In multimode step-index fiber, the density of the core remains constant from the center to the edges.
A beam of light moves through this constant density in a straight line until it reaches the interface of
the core and the cladding. At the interface, there is an abrupt change due to a lower density; this
alters the angle of the beam's motion. The term step index refers to the suddenness of this change,
which contributes to the distortion of the signal as it passes through the fiber.
• A second type of fiber, called multi mode graded-index fiber, decreases this distortion of the signal
through the cable. The word index here refers to the index of refraction. As we saw above, the index
of refraction is related to density. A graded-index fiber, therefore, is one with varying densities.
Density is highest at the center of the core and decreases gradually to its lowest at the edge.
• Single-Mode Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal. The single mode fiber itself is
manufactured with a much smaller diameter than that of multimode fiber, and with substantially
lower density (index of refraction). The decrease in density results in a critical angle that is close
enough to 90° to make the propagation of beams almost horizontal. In this case, propagation of
different beams is almost identical, and delays are negligible. All the beams arrive at the destination
"together" and can be recombined with little distortion to the signal.
Cable Composition
Fig 1.60 Fiber construction
Fig 1.60 shows the composition of a typical fiber-optic cable. The outer jacket is made of
either PVC or Teflon. Inside the jacket are Kevlar strands to strengthen the cable. Kevlar
is a strong material used in the fabrication of bullet proof vests. Below the Kevlar is
another plastic coating to cushion the fiber. The fiber is at the center of the cable, and it
consists of cladding and core.
Fiber-Optic Cable Connectors
Fig 1.61 Fiber-optic cable connectors
There are three types of connectors for fiber-optic cables, as shown in Fig 1.61.
The subscriber channel (SC) connector is used for cable TV. It uses a push/pull locking system.
The straight-tip (ST) connector is used for connecting cable to networking devices. It uses a
bayonet locking system and is more reliable than SC. MT-RJ is a connector that is the same
size as RJ45.
Performance of Fiber Optic Cable
• The plot of attenuation versus wavelength in
Fig 1.62 shows a very interesting phenomenon
in fiber-optic cable. Attenuation is flatter than
in the case of twisted-pair cable and coaxial
cable. The performance is such that we need
fewer (actually 10 times less) repeaters when
we use fiber-optic cable.
Performance of Fiber-Optic Cable
Fig 1.62 Optical fiber performance
Applications of Fiber Optic Cable
• Fiber-optic cable is often found in backbone networks
because its wide bandwidth is cost-effective.
• Some cable TV companies use a combination of optical
fiber and coaxial cable, thus creating a hybrid network.
Optical fiber provides the backbone structure while coaxial
cable provides the connection to the user premises.
• This is a cost-effective configuration since the narrow
bandwidth requirement at the user end does not justify the
use of optical fiber. Local-area networks such as 100Base-
FX network (Fast Ethernet) and 1000Base-X also use fiber-
optic cable.
Advantages of Optical Fiber
• Fiber-optic cable has several advantages over metallic cable (twisted pair or
coaxial).
• Higher bandwidth. Fiber-optic cable can support dramatically higher bandwidths
(and hence data rates) than either twisted-pair or coaxial cable. Currently, data rates
and bandwidth utilization over fiber-optic cable are limited not by the medium but
by the signal generation and reception technology available.
• Less signal attenuation. Fiber-optic transmission distance is significantly greater
than that of other guided media. A signal can run for 50 km without requiring
regeneration. We need repeaters every 5 km for coaxial or twisted-pair cable.
• Immunity to electromagnetic interference. Electromagnetic noise cannot affect
fiber-optic cables.
• Resistance to corrosive materials. Glass is more resistant to corrosive materials
than copper.
• Lightweight. Fiber-optic cables are much lighter than copper cables.
• Greater immunity to tapping. Fiber-optic cables are more immune to tapping than
copper cables. Copper cables create antenna effects that can easily be tapped.
Disadvantages of Optical Fiber
• There are some disadvantages in the use of optical fiber.
• Installation and maintenance. Fiber-optic cable is a relatively
new technology. Its installation and maintenance require
expertise that is not yet available everywhere.
• Unidirectional light propagation. Propagation of light is
unidirectional. If we need bidirectional communication, two
fibers are needed.
• Cost. The cable and the interfaces are relatively more
expensive than those of other guided media. If the demand
for bandwidth is not high, often the use of optical fiber
cannot be justified.
UNGUIDED MEDIA: WIRELESS
• Unguided media transport electromagnetic
waves without using a physical conductor.
This type of communication is often referred
to as wireless communication. Signals are
normally broadcast through free space and
thus are available to anyone who has a device
capable of receiving them.
UNGUIDED MEDIA: WIRELESS CONTD..
• Fig 1.63 shows the part of the electromagnetic
spectrum, ranging from 3 kHz to 900 THz,
used for wireless communication.
Fig 1.63 Electromagnetic spectrum for wireless communication
UNGUIDED MEDIA: WIRELESS CONTD..
• Unguided signals can travel from the source to destination in several ways: ground
propagation, sky propagation, and line-of-sight propagation, as shown in Fig 1.64.
• In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth. These low-frequency signals emanate in all directions
from the transmitting antenna and follow the curvature of the planet.
• Distance depends on the amount of power in the signal: The greater the power, the
greater the distance.
• In sky propagation, higher-frequency radio waves radiate upward into the ionosphere
(the layer of atmosphere where particles exist as ions) where they are reflected back to
earth. This type of transmission allows for greater distances with lower output power.
• In line-or-sight propagation, very high-frequency signals are transmitted in straight
lines directly from antenna to antenna. Antennas must be directional, facing each other,
and either tall enough or close enough together not to be affected by the curvature of
the earth. Line-of-sight propagation is tricky because radio transmissions cannot be
completely focused.
UNGUIDED MEDIA: WIRELESS CONTD..
Fig 1.64 Propagation methods
UNGUIDED MEDIA: WIRELESS CONTD..
• The section of the electromagnetic spectrum
defined as radio waves and microwaves is
divided into eight ranges, called bands, each
regulated by government authorities. These
bands are rated from very low frequency
(VLF) to extremely high frequency (EHF).
Table 1.3 lists these bands, their ranges,
propagation methods, and some applications.
Bands of Electromagnetic Spectrum
Table 1.3 Bands of Electromagnetic Spectrum
UNGUIDED MEDIA: WIRELESS CONTD..
• We can divide wireless transmission into three
broad groups: radio waves, micro waves, and
infrared waves.
Fig 1.65 Wireless transmission waves
Radio Waves
• Radio Waves
• Although there is no clear-cut demarcation between radio waves and microwaves, electro magnetic waves
ranging in frequencies between 3 kHz and 1GHz are normally called radio waves;
• waves ranging in frequencies between 1 and 300 GHz are called micro waves. However, the behavior of the
waves, rather than the frequencies, is a better criterion for classification. Radio waves, for the most part, are
omnidirectional.
• When an antenna transmits radio waves, they are propagated in all directions. This means that the
sending and receiving antennas do not have to be aligned. A sending antenna sends waves that can be
received by any receiving antenna. The omnidirectional property has a disadvantage, too. The radio
waves transmitted by one antenna are susceptible to interference by another antenna that may send
signals using the same frequency or band.
• Radio waves, particularly those waves that propagate in the sky mode, can travel long distances. This
makes radio waves a good candidate for long-distance broadcasting such as AM radio. Radio waves,
particularly those of low and medium frequencies, can penetrate walls.
• This characteristic can be both an advantage and a disadvantage. It is an advantage because, for
example, an AM radio can receive signals inside a building. It is a disadvantage because we cannot
isolate a communication to just inside or outside a building. The radio wave band is relatively narrow,
just under 1 GHz, compared to the microwave band. When this band is divided into sub bands, the sub
bands are also narrow, leading to a low data rate for digital communications.
Radio Waves Contd..
• Omnidirectional Antenna
• Radio waves use omnidirectional antennas that
send out signals in all directions. Based on the
wavelength, strength, and the purpose of
transmission, we can have several types of
antennas. Fig 1.65 shows an omnidirectional
antenna.
Radio Waves Contd..
Fig 1.65 Omnidirectional antenna
Radio waves are used for multicast communications, such as radio and television, and
paging systems.
Applications
The omnidirectional characteristics of radio waves make them useful for multicasting, in
which there is one sender but many receivers. AM and FM radio, television, mari time radio,
cordless phones, and paging are examples of multicasting.
Microwaves
• Microwaves
• Electromagnetic waves having frequencies between 1 and 300 GHz are called micro waves.
Microwaves are unidirectional. When an antenna transmits micro waves, they can be narrowly
focused.
• This means that the sending and receiving antennas need to be aligned. The unidirectional
property has an obvious advantage.
• A pair of antennas can be aligned without interfering with another pair of aligned antennas.
The following describes some characteristics of microwave propagation:
• Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to
be in direct sight of each other, towers that are far apart need to be very tall. The curvature of
the earth as well as other blocking obstacles do not allow two short towers to communicate by
using microwaves. Repeaters are often needed for long distance communication.
• Very high-frequency microwaves cannot penetrate walls. This characteristic can be a
disadvantage if receivers are inside buildings.
• The microwave band is relatively wide, almost 299 GHz. Therefore wider sub bands can be
assigned, and a high data rate is possible.
• Use of certain portions of the band requires permission from authorities.
Microwaves Contd..
• Unidirectional Antenna
• Microwaves need unidirectional antennas that send out signals in one direction.
Two types of antennas are used for microwave communications: the parabolic dish
and the horn (see Fig 1.66). A parabolic dish antenna is based on the geometry of a
parabola: Every line parallel to the line of symmetry (line of sight) reflects off the
curve at angles such that all the lines intersect in a common point called the focus.
• The parabolic dish works as a funnel, catching a wide range of waves and directing
them to a common point. In this way, more of the signal is recovered than would be
possible with a single-point receiver. Outgoing transmissions are broadcast through
a horn aimed at the dish. The micro waves hit the dish and are deflected outward in
a reversal of the receipt path. A horn antenna looks like a gigantic scoop. Outgoing
transmissions are broadcast up a stem (resembling a handle) and deflected outward
in a series of narrow parallel beams by the curved head. Received transmissions are
collected by the scooped shape of the horn, in a manner similar to the parabolic
dish, and are deflected down into the stem.
Microwaves Contd..
Fig 1.66 Unidirectional antennas
Microwaves Contd..
• Applications
• Microwaves, due to their unidirectional
properties, are very useful when unicast (one-to-
one) communication is needed between the
sender and the receiver. They are used in cellular
phones, satellite networks, and wireless LANs.
• Microwaves are used for unicast communication
such as cellular telephones, satellite networks,
and wireless LANs.
Infrared waves
• Infrared
• Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths
from 1 mm to 770 nm), can be used for short-range communication.
• Infrared waves, having high frequencies, cannot penetrate walls. This
advantageous characteristic prevents interference between one system
and another; a short-range communication system in one room cannot be
affected by another system in the next room.
• When we use our infrared remote control, we do not interfere with the
use of the remote by our neighbors. However, this same characteristic
makes infrared signals useless for long-range communication. In
addition, we cannot use infrared waves outside a building because the
sun's rays contain infrared waves that can interfere with the
communication.
Infrared waves Contd..
• Applications
• The infrared band, almost 400 THz, has an excellent potential for data
transmission. Such a wide bandwidth can be used to transmit digital data
with a very high data rate.
• The Infrared Data Association (IrDA), an association for sponsoring the
use of infrared waves, has established standards for using these signals for
communication between devices such as keyboards, mice, PCs, and
printers. For example, some manufacturers provide a special port called the
IrDA port that allows a wireless keyboard to communicate with a PC. The
standard originally defined a data rate of 75 kbps for a distance up to 8 m.
• The recent standard defines a data rate of 4 Mbps. Infrared signals defined
by IrDA transmit through line of sight; the IrDA port on the keyboard
needs to point to the PC for transmission to occur.
Thank You

Module cdcdcdcdcdcdcdcdcdcdcdcdcdcdcd.pptx

  • 1.
    COMPUTER NETWORKS – BCS502 Dr.R.N. Uma Mahesh Associate Professor Dept. of Computer Science & Engineering (AI and ML) ATMECE, Mysuru
  • 2.
    Module-1 • Introduction: DataCommunications, Networks, Network Types, Networks Models: Protocol Layering, TCP/IP Protocol suite, The OSI model, Introduction to Physical Layer: Transmission media, Guided Media, Unguided Media: Wireless. Switching: Packet Switching and its types.
  • 3.
    Module-2 • Data LinkLayer: Error Detection and Correction: Introduction, Block Coding, Cyclic Codes. Data link control: DLC Services: Framing, Flow Control, Error Control, Connectionless and Connection Oriented, Data link layer protocols, High Level Data Link Control. Media Access Control: Random Access, Controlled Access. Check Sum and Point to Point Protocol
  • 4.
    Module-3 • Network Layer:Network layer Services, Packet Switching, IPv4 Address, IPv4 Datagram, IPv6 Datagram, Introduction to Routing Algorithms, Unicast Routing Protocols: DVR, LSR, PVR, Unicast Routing protocols: RIP, OSPF, BGP, Multicasting Routing-MOSPF
  • 5.
    Module-4 • Introduction toTransport Layer: Introduction, Transport-Layer Protocols: Introduction, User Datagram Protocol, Transmission Control Protocol: services, features, segments, TCP connections, flow control, Error control, Congestion control.
  • 6.
    Module-5 • Introduction toApplication Layer: Introduction, Client-Server Programming, Standard Client Server Protocols: World Wide Web and HTTP, FTP, Electronic Mail, Domain Name System (DNS), TELNET, Secure Shell (SSH)
  • 7.
    Text Books: 1. BehrouzA. Forouzan, Data Communications and Networking, 5th Edition, Tata McGraw-Hill,2013. Reference books: 2. Larry L. Peterson and Bruce S. Davie: Computer Networks – A Systems Approach, 4th Edition, Elsevier, 2019. 3. Nader F. Mir: Computer and Communication Networks, 2nd Edition, Pearson Education, 2015. 4. William Stallings, Data and Computer Communication 10th Edition, Pearson Education, Inc., 2014.
  • 8.
    Course Outcomes • CO-1Explain the fundamentals of computer networks. • CO-2 Apply the concepts of computer networks to demonstrate the working of various layers and protocols in communication network. • CO-3 Analyze the principles of protocol layering in modern communication systems. • CO-4 Demonstrate various Routing protocols and their services using tools such as Cisco packet tracer.
  • 9.
  • 10.
    OVERVIEW OF DATA COMMUNICATION •Data communications are the exchange of data between two devices via some form of transmission medium such as a wirecable. • For Data communication to occur, the data communication system consists of combination of hardware and software (program).
  • 11.
    Contd.. Fig 1.1 Fivecomponents of data communication The four main characteristics of data communication is • delivery – how well the message is correctly received by the receiver. • accuracy – data should not be altered during transmission. • Timeliness – data should be received by the receiver at proper time interval. There should not be any delay while receiving the data. • Jitter – uneven delay in the transmission. For example, if the audio or video packets are transmitted, if the first packet arrives at the proper time duration, and if the second packet is having some delay, then there is uneven delay in the transmission.
  • 12.
    Contd.. • The fivemain components of data communication system are • Message – text, numbers, audio, video, etc… • Sender- transmits the message. Ex: computer, Phone, video camera, etc… • Receiver – receives the message. Ex: computer, television, phone, etc… • Transmission medium – twisted pair wire, coaxial cable, fiber optic cable, etc…. • Protocol – set of rules during transmission. Ex: a person speaking one language to another person who may not be knowing that language.
  • 13.
    Data Representation • Text:bit pattern Ex: Unicode, ASCII. • Numbers: decimal numbers converted directly to binary. • Images : divided into a matrix of pixels Ex: binary image (0’s and 1’s), RGB, and YCM image. • Audio: representation of sound by an analog or a digital signal. • Video: represented by an analog or digital signal.
  • 14.
    Data Flow • SimplexCommunication If the data transmission is taking place in only one direction, then it is called Unidirectional communication or simplex communication. Ex: keyboard, monitor. Fig 1.2 Simplex Communication
  • 15.
    Contd.. • Half-Duplex Communication Inhalf duplex communication, each device can transmit or receive but not at the same time. i.e if one device is sending the data, the other device will receive and if another device is sending the data, the second device will receive the data. Ex: Walkie talkies. Fig 1.3 half duplex communication
  • 16.
    Contd… • Full-Duplex Communication Infull duplex communication, both the devices can transmit or receive simultaneously. Ex: telephone network, if a person is talking in one line, then another person can simultaneously receive the information in another line. Fig 1.4 Full Duplex Communication
  • 17.
    Network • A Networkis a set of devices connected by communication links. A device can be a printer or computer capable of sending or receiving the data generated by other devices on the network. • A device can be a router or switch or modem (modulator-demodulator) which changes the one form of data into another form and so on. • Most networks use distributed processing. Fig 1.5 Sample diagram of a Network
  • 18.
    Network Criteria • Themost important parameters for network criteria are • Performance – transit time and response time, throughput and delay. Transit time is the time required for the message or information to travel from one device to another device. Response time is the time elapsed between the inquiry and response. • If we try to send more data to the network, it will result in increase in throughput and delay. Delay arises because of traffic congestion in the network.
  • 19.
    Contd.. • Reliability –the time needed to recover from the failure of the device during transmitting/receiving the data. • Security – Protection of data from unauthorized users. Ex : Protection of data from Gmail account, and email-access.
  • 20.
    Types of connectionin network • Point-to-Point Connection Fig 1.6 point to point communication A point-to-point connection provides a dedicated link between the two devices. Ex: Television (TV), While changing The channels from the remote control, an point-to-point connection is established between the TV remote control and the television system.
  • 21.
    Contd… • Multi-point connection Inmulti-point connection, more than two devices share a single link or a comman link. Fig 1.7 Multi-point Connection
  • 22.
    Network Topology Fig 1.8Categories of Network Topology
  • 23.
    Mesh Topology Fig 1.9a fully connected mesh topology consisting of five devices.
  • 24.
    Contd.. • Every devicehas a dedicated point to point link to every other device. The term dedicated means that the link carries traffic only between the two devices it connects. • To find the number of physical links in a fully connected mesh network with n nodes, we first consider that each node must be connected to every other node. • i.e node 1 is connected to (n-1) nodes. node 2 is connected to (n- 1) nodes and finally node n must be connected to (n-1) nodes. Therefore, we need n(n-1) links. • Since each link performs bi-directional communication (full- duplex communication) , the total number of links needed is n(n- 1)/2.
  • 25.
    Star Topology Fig 1.10star topology consisting of four devices.
  • 26.
    Contd.. • In astar topology, each device has a dedicated point- to-point link only to a central controller, usually called a hub. • The devices are not directly linked to one another. Unlike a mesh topology, a star topology does not allow direct traffic between devices. • The controller acts as an exchange: If one device wants to send data to another, it sends the data to the controller, which then relays the data to the other connected device.
  • 27.
    Categories of Networks •Local Area Network (LAN) – LAN is a privately owned network which connects the devices in a single office, building, or campus. LAN size is limited to the area less than 2 miles or few kilometres. Ex: sharing two computers and a printer in one office. Establishing a lab which consists of 20 pc’s and one server in a single room or office.
  • 28.
    Bus Topology Fig 1.11bus topology. • The star and mesh topology describe point-to-point connections. A bus topology, on the other hand, is multipoint. • One long cable acts as a backbone to link all the devices in a network. Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the device and the main cable.
  • 29.
    Contd.. • A tapis a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone, some of its energy is transformed into heat. • Therefore, it becomes weaker and weaker as it travels farther and farther. For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
  • 30.
    Ring Topology Fig 1.11ring topology. • In a ring topology, each device has a dedicated point-to-point connection with only the two devices on either side of it. • A signal is passed along the ring in one direction, from device to device, until it reaches its destination.
  • 31.
    Contd.. • Each devicein the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along.
  • 32.
    Hybrid Topology (Combinationof bus and star topology) Fig 1.12 Hybrid topology.
  • 33.
    Wide Area Network(WAN) • A wide area network provides long-distance transmission of data, image, audio, and video information over large geographic areas that may include a country, continent, or even the whole world. • There are two kinds of WAN (a) Switched WAN (b) point-to-point WAN
  • 34.
    Switched WAN Fig 1.13Switched WAN (Wide Area Network) Ex : 1) ATM (Asynchronous transfer mode) Network 2) Wireless WAN
  • 35.
    point-to-point WAN Fig 1.14point-to-point (Wide Area Network) Ex: 1) Internet
  • 36.
    Metropolitan Area Networks(MAN) Fig 1.15 – Metropolitan area network (MAN)
  • 37.
    Contd.. • A Metropolitanarea network (MAN) is a network with a size between a LAN and a WAN. It normally covers the area inside a town or a city. It is designed for customers who need high-speed connectivity, normally to the internet, and have endpoints spread over the city or part of city. • Ex: Telephone Network, Cable TV Network
  • 38.
    Interconnection of Networks:Internetwork or Internet When two or more networks are connected, they are called as internetwork or internet. Ex: Schools, Colleges, Fig 1.16 – Internetwork or Internet
  • 39.
    Contd.. Fig 1.17 –a) structure of a national ISP b) Interconnection of national ISP
  • 40.
    Contd.. • To provideinternet to the users, Internet service Providers (ISP) are used. There are different kinds of Internet Service Providers namely • International Internet Service Provider • National Internet Service Provider Ex: Jio, BSNL, Airtel, etc..- higher data rate • Regional Internet Service Provider Ex: Bharat Broad Band Network Limited (BBNL) in Banglore –smaller data rate. • Local Internet Service Provider Ex: College or
  • 41.
    The Protocol • Aprotocol is a set of rules that governs data communications • It defines what is communicated, how it is communicated and when it is communicated. • The key elements of the protocol are • Syntax - Structure or format of data, meaning the order in which they are presented for example, if I have a 24-bits of data, the first 8-bits can be considered as an address of the sender, the last 8-bits can be considered as an address of the receiver and the middle 8-bits can be considered as an message or information. • Semantics - Refer to the meaning of each section of bits, how a pattern is interpreted and what action to be taken. • Timing - Refers to when data should be sent and how fast can they be sent. For example, if a sender produces data at 100Mpbs, and the receiver has the capacity to process the data at 1Mbps. The transmission will overload and some data will be lost.
  • 42.
    Standards • Standards areessential in creating and maintaining an open and competitive market for equipment manufacturers. • Required to guarantee national and international interoperability of data and telecommunications technology and processes. • Standards provides guidelines to manufacturers, vendors, government agencies, and other service providers to ensure the kind of interconnectivity necessary in today’s marketplace. • Categories of data communications standards • Defacto (“by fact” or “by convention”) : • Standards that have not been approved by an organizational body but have been adopted through wide spread use, eg. model TCP/IP) • Dejure (“by law” or “by regulation”): • Those that have been legislated by an official recognized body, eg. OSI model
  • 43.
    Standards Organizations • Someof the important standards organization are • International Organization for Standardization (ISO) – ISO is a multinational body which has drawn membership from standard creation committees of various governments. • International Tele Communication Union – Telecommunication Standards Sector (ITU-T) – the consultative committee for international telephony and telegraphy (CCITT) – standards for telecommunication in phone particular. • American National Standards Institute (ANSI) – it is private standards institute not affiliated to U.S federal government. • Institute of Electrical and Electronics Engineers (IEEE) – largest professional engineering society • Electronic Industries Association (EIA) - used for promotion of electronic manufacturing concerns.
  • 44.
    Network Models • Heremainly we are going to discuss different kinds of network models a) Open System Interconnect (OSI) Model • b) Transmission Control Protocol (TCP) / Internet Protocol (IP) Model
  • 45.
    Layered Tasks • Weuse the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a friend would be complex if there were no services available from the post office. Fig 1.18 shows the steps in this task.
  • 46.
    Tasks involved insending a letter Fig 1.18 – Tasks involved in sending a letter
  • 47.
    Contd.. • In Fig1.18, we have a sender, receiver, and a carrier that transports the letter. • At the sender side, • Higher layer: the sender writes the letter inserts the letter in the envelope, writes the sender and receiver addresses, and drops the letter in a mailbox. • Middle layer: the letter is picked up by a letter carrier and delivered to the post office. • Lower Layer: the letter is sorted at the post office, a carrier transports the letter.
  • 48.
    Contd.. • On theway, • The letter will be transported through the truck, train, airplane, boat, or a combination of these. • At the receiver side, • Lower Layer: the carrier transports the letter to the post office. • Middle Layer: the letter is sorted and delivered to the recipient’s mailbox. • Higher Layer: the receiver picks up the letter, opens the envelope, and reads it. Totally, there are three activities at the sender side, and another three activities at the receiver side. The task of transporting the letter between the sender and the receiver is done by the carrier.
  • 49.
    The OSI Model •Established in 1947, the International Standards Organization(ISO) is a multinational body dedicated to world wide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection(OSI) model. It was first introduced in the late 1970s.
  • 50.
    Layers of theOSI Model Fig 1.19 – Layers in the OSI Model
  • 51.
    The OSI model Fig1.20 Complete Representation of the OSI Model
  • 52.
    The Physical Layer Fig1.21 The Physical Layer The Physical layer is responsible for movements of individuals bits from one node (hop) to the next node.
  • 53.
    Functionalities of PhysicalLayer • Following are the various functions performed by the Physical layer of the OSI model. • Representation of Bits: Data in this layer consists of stream of bits. The bits must be encoded into signals for transmission. It defines the type of encoding i.e. how 0's and 1's are changed to signal. • Data Rate: This layer defines the rate of transmission which is the number of bits per second. • Synchronization: It deals with the synchronization of the transmitter and receiver. The sender and receiver are synchronized at bit level. • Interface: The physical layer defines the transmission interface between devices and transmission medium. • Line Configuration: This layer connects devices with the medium: Point to Point configuration and Multi point configuration. • Topologies: Devices must be connected using the following topologies: Mesh, Star, Ring and Bus. • Transmission Modes: Physical Layer defines the direction of transmission between two devices: Simplex, Half Duplex, Full Duplex.
  • 54.
    Data Link Layer Fig1.22 The Data Link Layer The Data Link layer is responsible for moving frames from one node (hop) to the next node.
  • 55.
    Functionalities of Datalink Layer • Following are the various functions performed by the Data link layer of the OSI model. • Framing: Frames are the streams of bits received from the network layer into manageable data units. This division of stream of bits is done by Data Link Layer. • Physical Addressing: The Data Link layer adds a header to the frame in order to define physical address of the sender or receiver of the frame, if the frames are to be distributed to different systems on the network. • Flow Control: If the rate at which the data are absorbed by the receiver is less than the rate at which data are produced in the sender, the data link layer imposes a flow control mechanism to avoid overwhelming the receiver. • Error Control: Error control is achieved by adding a trailer at the end of the frame. Duplication of frames are also prevented by using this mechanism. Data Link Layers adds mechanism to prevent duplication of frames. • Access Control: Protocols of this layer determine which of the devices has control over the link at any given time, when two or more devices are connected to the same link.
  • 56.
    Data Link LayerContd.. Fig 1.23 The Data Link Layer node-to-node delivery
  • 57.
    Network Layer Fig 1.24The Network Layer The Network Layer is responsible for the delivery of individual packets from the source host to the destination host.
  • 58.
    Functionalities of NetworkLayer • Following are the various functions performed by the network layer of the OSI model. • It translates logical network address into physical address. Concerned with circuit, message or packet switching. • Routers and gateways operate in the network layer. Mechanism is provided by Network Layer for routing the packets to final destination. • Connection services are provided including network layer flow control, network layer error control and packet sequence control. • Breaks larger packets into small packets.
  • 59.
    Network Layer Contd.. Fig1.25 The Network Layer Contd..
  • 60.
    Transport Layer Fig 1.26The Transport Layer The transport layer is responsible for the delivery of a message from one process to the another process.
  • 61.
    Functionalities of TransportLayer • Following are the various functions performed by the Transport layer of the OSI model. • Service Point Addressing : Transport Layer header includes service point address which is port address. This layer gets the message to the correct process on the computer unlike Network Layer, which gets each packet to the correct computer. • Segmentation and Reassembling : A message is divided into segments; each segment contains sequence number, which enables this layer in reassembling the message. Message is reassembled correctly upon arrival at the destination and replaces packets which were lost in transmission. • Connection Control : It includes 2 types: • Connectionless Transport Layer : Each segment is considered as an independent packet and delivered to the transport layer at the destination machine. • Connection Oriented Transport Layer : Before delivering packets, connection is made with transport layer at the destination machine. • Flow Control: In this layer, flow control is performed end to end. • Error Control: Error Control is performed end to end in this layer to ensure that the complete message arrives at the receiving transport layer without any error. Error Correction is done through re transmission.
  • 62.
    Process to Processdelivery of a message Fig 1.27 Process to Process delivery of a message
  • 63.
    Session Layer Fig 1.28Session Layer The session layer is responsible for dialog control and synchronization.
  • 64.
    Functionalities of SessionLayer • Following are the various functions performed by the session layer of the OSI model. • Dialog Control: This layer allows two systems to start communication with each other in half-duplex or full-duplex. • Token Management: This layer prevents two parties from attempting the same critical operation at the same time. • Synchronization:This layer allows a process to add check points which are considered as synchronization points into stream of data. Example: If a system is sending a file of 800pages, adding check points after every 50pages is recommended. This ensures that 50 page unit is successfully received and acknowledged. This is beneficial at the time of crash as if a crash happens at page number110; there is no need to retransmit 1 to100 pages.
  • 65.
    Presentation Layer Fig 1.29Presentation Layer The presentation layer is responsible for translation, compression, and encryption.
  • 66.
    Functionalities of PresentationLayer • Following are the various functions performed by the presentation layer of the OSI model. • Translation: Before being transmitted, information in the form of characters and numbers should be changed to bit streams. The presentation layer is responsible for interoperability between encoding methods as different computers use different encoding methods. The presentation layer at the sender changes the information from it’s sender-dependent format into a comman format. The presentation layer at the receiving machine changes the comman format into it’s receiver dependent format.
  • 67.
    Contd.. • Encryption: Itcarries out encryption at the transmitter and decryption at the receiver. • Compression: It carries out data compression to reduce the bandwidth of the data to be transmitted. The primary role of Data compression is to reduce the number of bits to be transmitted. It is important in transmitting multi media such as audio, video, text etc.
  • 68.
    Application Layer Fig 1.30Application Layer The application layer is responsible for providing services to the users.
  • 69.
    Functionalities of ApplicationLayer • Following are the various functions performed by the application layer of the OSI model. • Mail Services: This layer provides the basis for E-mail forwarding and storage. • Network Virtual Terminal: It allows a user to log on to a remote host. The application creates software emulation of a terminal at the remote host. User's computer talks to the software terminal which in turn talks to the host and vice versa. Then the remote host believes it is communicating with one of its own terminals and allows user to log on. • Directory Services: This layer provides access for global information about various services. • File Transfer, Access and Management (FTAM):It is a standard mechanism to access files and manages it. Users can access files in a remote computer and manage it. They can also retrieve files from a remote computer.
  • 70.
    Summary of thelayers Fig 1.31 summary of layers
  • 71.
    TCP/IP Protocol Suite •The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application.
  • 72.
    TCP/IP and OSIModel Fig 1.32 TCP/IP Model and OSI Model
  • 73.
    Contd.. • At thetransport layer, TCP/IP defines three protocols : Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Stream Control Transmission Protocol (STCP). • At the network layer, the main protocol defined by TCP/IP model is the Internetworking protocol (IP).
  • 74.
    Contd.. • Physical andData Link Layers - • At the physical and data link layers, TCP/IP does not define any specific protocol. It supports all the standard and proprietary protocols. • Network Layer – • At the network layer, TCP/IP supports the internetworking protocol (IP). In turn, TCP/IP model supports four supporting protocols namely ARP, ICMP, IGMP, RARP.
  • 75.
    Contd.. • Internetworking Protocol(IP) – • The Internetworking protocol is the transmission mechanism used by TCP/IP protocols. It is an unreliable and connectionless protocol – a best effort delivery service. The term best effort means that IP Provides no error checking or tracking. • IP transports data in packets called datagrams, each of which is transported separately. Datagrams can travel along different routes and can arrive out of sequence or be duplicated. IP does not keep track of the routes and has no facility for reordering datagrams once they arrive at their destination.
  • 76.
    Contd.. • Address ResolutionProtocol (ARP) – • The ARP is used to find the physical address of the node when its internet address is known. On a typical physical network, such as LAN, each device on a link is identified by physical address, usually imprinted on the network interface card (NIC). • Reverse Address Resolution Protocol (RARP) – • The RARP allows a host to discover it’s internet address when it knows only the physical address. It is used when it is connected to a computer for the first time or when a diskless computer is booted.
  • 77.
    Contd.. • Internet ControlMessage Protocol (ICMP) – • The ICMP is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages. • Internet Group Message Protocol (IGMP) – • IGMP is used to facilitate the simultaneous transmission of the message to a group of recipients.
  • 78.
    Contd.. • Transport layer– • The transport layer in the TCP/IP model is represented by two protocols namely a) Transmission Control Protocol (TCP) b) User Datagram Protocol (UDP). • IP is a host-to-host protocol meaning that it can deliver a packet from one physical device to another physical device. • UDP and TCP are transport level protocols responsible for delivery of a message from one process to another process.
  • 79.
    Contd.. • User DatagramProtocol (UDP) – • The UDP is the simpler of the two standard TCP/IP transport protocols. It is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer. • Transmission Control Protocol (TCP) – • The TCP provides full transport-layer services to applications. TCP is a reliable stream transport protocol. • For each transmission, TCP divides a stream of data into smaller units called segments. Each segment includes a sequence number for reordering after receipt, together with an acknowledgement number for the segments received. Segments are carried across the internet inside of IP datagrams. At the receiving end, TCP collects each datagram as it comes in and reorders the transmission based on sequence numbers.
  • 80.
    Contd.. • Stream ControlTransmission Protocol (SCTP) – • The SCTP provides support for newer applications such as voice over the Internet. It is a transport layer protocol the combines the best features of UDP and TCP. • Application Layer – • The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model.
  • 81.
    Application Layer Contd.. •The several protocols used in the application layer are • i) Simple mail transfer protocol (SMTP) • ii) File Transfer Protocol (FTP) • iii) Hyper Text Transfer Protocol (HTTP) • iv) Domain Name System (DNS) • v) Simple Network Management Protocol (SNMP) • vi) Teletype Network (TelNet)
  • 82.
  • 83.
    Addressing • Four levelsof addresses are used in an internet employing the TCP/IP protocols : physical, logical, port, and specific. • Topics discussed in this section : • Physical Addresses • Logical Addresses • Port Addresses • Specific Addresses
  • 84.
    Addresses in TCP/IP Fig1.33 Addresses in TCP/IP
  • 85.
    Physical Address • Thephysical address, also known as the link address, is the address of a node as defined by its LAN or WAN. • The size and format of these addresses vary depending on the network. For example, Ethernet uses a 6-byte (48-bit) physical address. • Physical addresses can be either unicast (one single recipient), multi cast (a group of recipients), or broadcast (to be received by all systems in the network. • Example: Most local area networks use a 48-bit (6-byte) physical address written as 12 hexa decimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: A6- byte (12 hexadecimal digits) physical address 07:01:02:01:2C:4B
  • 86.
    Logical Addresses • Logicaladdresses are used by networking software to allow packets to be independent of the physical connection of the network, that is, to work with different network topologies and types of media. • A logical address in the Internet is currently a 32-bit/128-bit address that can uniquely define a host connected to the Internet. An internet address in IPv4 in decimal numbers132.24.75.9 • No two publicly addressed and visible hosts on the Internet can have the same IP address. • The physical addresses will change from hop to hop, but the logical addresses remain the same. • The logical addresses can be either unicast (one single recipient), multicast (a group of recipients),or broadcast (all systems in the network). There are limitations on broad cast addresses.
  • 87.
    Port Addresses • Thereare many application running on the computer. Each application run with a port no.(logically)on the computer. • A port number is part of the addressing information used to identify the senders and receivers of messages. • Port numbers are most commonly used with TCP/IP connections. • These port numbers allow different applications on the same computer to share network resources simultaneously. • The physical addresses change from hop to hop, but the logical and port addresses usually remain the same. • Example: a port address is a 16-bit address represented by one decimal number 753
  • 88.
    Specific Address • Someapplications have user-friendly addresses that are designed for that specific application. • Examples include the e-mail address (for example,narayan@daffodilvarsity.edu.bd)and the Universal Resource Locator(URL) (for example,www.daffodilvarsity.edu.bd). The first defines the recipient of an e-mail; the second is used to find a document on the World Wide Web.
  • 89.
    Introduction to Switching Fig1.34 Switched network
  • 90.
    Introduction to SwitchingContd.. • A switched network consists of a series of interlinked nodes, called switches. • Switches are devices capable of creating temporary connections between two or more devices linked to the switch. • In a switched network, some of these nodes are connected to the end systems (computers or telephones, for example). Others are used only for routing. The end systems (communicating devices) are labeled A, B, C, D, and so on, and the switches are labeled I, II, III, IV, and V. Each switch is connected to multiple links.
  • 91.
    Categories in Switching Fig1.35 Taxonomy of switched networks
  • 92.
    Circuit Switched Networks •A circuit-switched network is made of a set of switches connected by physical links, in which each link is divided into n channels. Fig 1.36 Circuit Switched Network
  • 93.
    Circuit Switched NetworksContd.. • Fig 1.36 shows a trivial circuit-switched network with four switches and four links. Each link is divided into n (n is 3 in the figure) channels by using FDM or TDM. • We have explicitly shown the multiplexing symbols to emphasize the division of the link into channels even though multiplexing can be implicitly included in the switch fabric. • The end systems, such as computers or telephones, are directly connected to a switch. We have shown only two end systems for simplicity. When end system A needs to communicate with end system M, system A needs to request a connection to M that must be accepted by all switches as well as by M itself. This is called the setup phase; a circuit (channel) is reserved on each link, and the combination of circuits or channels defines the dedicated path. After the dedicated path made of connected circuits (channels) is established, data transfer can take place. After all data have been transferred, the circuits are tom down.
  • 94.
    Circuit Switched NetworksContd… • Circuit switching takes place at the physical layer. • Before starting communication, the stations must make a reservation for the resources to be used during the communication. These resources, such as channels (bandwidth in FDM and time slots in TDM), switch buffers, switch processing time, and switch input/output ports, must remain dedicated during the entire duration of data transfer until the teardown phase. • Data transferred between the two stations are not packetized (physical layer transfer of the signal). The data are a continuous flow sent by the source station and received by the destination station, although there may be periods of silence. • There is no addressing involved during data transfer. The switches route the data based on their occupied band (FDM) or time slot (TDM). • In circuit switching, the resources need to be reserved during the setup phase; the resources remain dedicated for the entire duration of data transfer until the teardown phase.
  • 95.
    • Three Phasesin Circuit Switched Network • The actual communication in a circuit-switched network requires three phases: connection setup, data transfer, and connection teardown. • Setup Phase • Before the two parties (or multiple parties in a conference call) can communicate, a dedicated circuit (combination of channels in links) needs to be established. • The end systems are normally connected through dedicated lines to the switches, so connection setup means creating dedicated channels between the switches. For example, in Figure 1.36, when system A needs to connect to system M, it sends a setup request that includes the address of system M, to switch I. Switch I finds a channel between itself and switch IV that can be dedicated for this purpose. • Switch I then sends the request to switch IV, which finds a dedicated channel between itself and switch III. Switch III informs system M of system A's intention at this time. In the next step to making a connection, an acknowledgment from system M needs to be sent in the opposite direction to system A. • Only after system A receives this acknowledgment is the connection established. Note that end-to-end addressing is required for creating a connection between the two end systems. These can be, for example, the addresses of the computers assigned by the administrator in a TDM network, or telephone numbers in an FDM network.
  • 96.
    • Data TransferPhase • After the establishment of the dedicated circuit (channels), the two parties can transfer data. • Teardown Phase • When one of the parties needs to disconnect, a signal is sent to each switch to release the resources.
  • 97.
    Circuit Switched NetworksExample(1) • As a trivial example, let us use a circuit-switched network to connect eight telephones in a small area. Communication is through 4-kHz voice channels. We assume that each link uses FDM to connect a maximum of two voice channels. The bandwidth of each link is then 8 kHz. Fig 1.37 shows the situation. Telephone 1 is connected to telephone 7; 2 to 5; 3 to 8; and 4 to 6. Of course the situation may change when new connections are made. The switch controls the connections. Fig 1.37 Circuit Switched Network Example Problem Solution
  • 98.
    Datagram Networks • Indata communications, we need to send messages from one end system to another. If the message is going to pass through a packet- switched network, it needs to be divided into packets of fixed or variable size. The size of the packet is determined by the network and the governing protocol. • In packet switching, there is no resource allocation for a packet. This means that there is no reserved bandwidth on the links, and there is no scheduled processing time for each packet. Resources are allocated on demand. The allocation is done on a firstcome, first-served basis. When a switch receives a packet, no matter what is the source or destination, the packet must wait if there are other packets being processed. • As with other systems in our daily life, this lack of reservation may create delay. For example, if we do not have a reservation at a restaurant, we might have to wait.
  • 99.
    • In apacket-switched network, there is no resource reservation; resources are allocated on demand. • In a datagram network, each packet is treated independently of all others. Even if a packet is part of a multi packet transmission, the network treats it as though it existed alone. Packets in this approach are referred to as datagrams. • Datagram switching is normally done at the network layer. • Fig 1.38 shows how the datagram approach is used to deliver four packets from station A to station X.
  • 100.
    Fig 1.38 Datagramnetwork with four switches A
  • 101.
    • In thisexample, all four packets (or datagrams) belong to the same message, but may travel different paths to reach their destination. This is so because the links may be involved in carrying packets from other sources and do not have the necessary bandwidth available to carry all the packets from A to X. This approach can cause the datagrams of a transmission to arrive at their destination out of order with different delays between the packets. Packets may also be lost or dropped because of a lack of resources. In most protocols, it is the responsibility of an upper-layer protocol to reorder the datagrams or ask for lost datagrams before passing them on to the application.
  • 102.
    Routing Table inDatagram Networks Fig 1.39 Routing table in a datagram network A switch in a datagram network uses a routing table that is based on the destination address.
  • 103.
    • Destination Address •Every packet in a datagram network carries a header that contains, among other information, the destination address of the packet. When the switch receives the packet, this destination address is examined; the routing table is consulted to find the corresponding port through which the packet should be forwarded. This address, unlike the address in a virtual-circuit-switched network, remains the same during the entire journey of the packet. • The destination address in the header of a packet in a datagram network remains the same during the entire journey of the packet.
  • 104.
    Virtual Circuit Networks •A virtual-circuit network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. • As in a circuit-switched network, there are setup and teardown phases in addition to the data transfer phase. • Resources can be allocated during the setup phase, as in a circuit- switched network, or on demand, as in a datagram network. • As in a datagram network, data are packetized and each packet carries an address in the header. However, the address in the header has local jurisdiction (it defines what should be the next switch and the channel on which the packet is being carried), not end-to-end jurisdiction. The reader may ask how the intermediate switches know where to send the packet if there is no final destination address carried by a packet.
  • 105.
    • 4. Asin a circuit-switched network, all packets follow the same path established during the connection. • 5. A virtual-circuit network is normally implemented in the data link layer, while a circuit-switched network is implemented in the physical layer and a datagram network in the network layer. Fig 1.40 Circuit diagram of Virtual Circuit Network
  • 106.
    • Figure 1.40is an example of a virtual-circuit network. The network has switches that allow traffic from sources to destinations. A source or destination can be a computer, packet switch, bridge, or any other device that connects other networks. • The identifier that is actually used for data transfer is called the virtual-circuit identifier (VCI). A VCI, unlike a global address, is a small number that has only switch scope; it is used by a frame between two switches. When a frame arrives at a switch, it has a VCI; when it leaves, it has a different VCl. Figure 1.41 shows how the VCI in a data frame changes from one switch to another. Note that a VCI does not need to be a large number since each switch can use its own unique set of VCls. Fig 1.41 Virtual Circuit Identifier
  • 107.
    • Three Phases •As in a circuit-switched network, a source and destination need to go through three phases in a virtual-circuit network: setup, data transfer, and teardown. In the setup phase, the source and destination use their global addresses to help switches make table entries for the connection. In the teardown phase, the source and destination inform the switches to delete the corresponding entry. Data transfer occurs between these two phases. We first discuss the data transfer phase, which is more straightforward; we then talk about the setup and teardown phases. • Data Transfer Phase • To transfer a frame from a source to its destination, all switches need to have a table entry for this virtual circuit. The table, in its simplest form, has four columns. This means that the switch holds four pieces of information for each virtual circuit that is already set up. We show later how the switches make their table entries, but for the moment we assume that each switch has a table with entries for all active virtual circuits. Figure 1.42 shows such a switch and its corresponding table.
  • 108.
    • Figure 1.42shows a frame arriving at port 1 with a VCI of 14. When the frame arrives, the switch looks in its table to find port 1 and a VCI of 14. When it is found, the switch knows to change the VCI to 22 and send out the frame from port 3. Fig 1.42 Switch and tables in a virtual-circuit network
  • 109.
    Fig 1.43 Source-to-destinationdata transfer in a virtual circuit network Figure 1.43 shows how a frame from source A reaches destination B and how its VCI changes during the trip. Each switch changes the VCI and routes the frame. The data transfer phase is active until the source sends all its frames to the destination. The procedure at the switch is the same for each frame of a message. The process creates a virtual circuit, not a real circuit, between the source and destination.
  • 110.
    • Setup Phase: Fig 1.44 Setup-Phase in a virtual circuit network
  • 111.
    • Setup Request: • A setup request frame is sent from the source to the destination. • Figure 1.44 shows the process. • a. Source A sends a setup frame to switch 1. • b. Switch 1 receives the setup request frame. It knows that a frame going from A to B goes out through port 3. The switch creates an entry in its table for this virtual circuit, but it is only able to fill three of the four columns.The switch assigns the incoming port (1) and chooses an available incoming VCI (14) and the outgoing port (3). It does not yet know the outgoing VCI, which will be found during the acknowledgment step. The switch then forwards the frame through port 3 to switch 2. • c. Switch 2 receives the setup request frame. The same events happen here as at switch 1; three columns of the table are completed: in this case, incoming port (l), incoming VCI (66), and outgoing port (2). • d. Switch 3 receives the setup request frame. Again, three columns are completed: incoming port (2), incoming VCI (22), and outgoing port (3). • e. Destination B receives the setup frame, and if it is ready to receive frames from A, it assigns a VCI to the incoming frames that come from A, in this case 77. This VCI lets the destination know that the frames come from A, and not other sources.
  • 112.
    • Acknowledgment • Aspecial frame, called the acknowledgment frame, completes the entries in the switching tables. Figure 1.45 shows the process. • a. The destination sends an acknowledgment to switch 3. The acknowledgment carries the global source and destination addresses so the switch knows which entry in the table is to be completed. The frame also carries VCI 77, chosen by the destination as the incoming VCI for frames from A. Switch 3 uses this VCI to complete the outgoing VCI column for this entry. Note that 77 is the incoming VCI for destination B, but the outgoing VCI for switch 3. • b. Switch 3 sends an acknowledgment to switch 2 that contains its incoming VCI in the table, chosen in the previous step. Switch 2 uses this as the outgoing VCI in the table. • c. Switch 2 sends an acknowledgment to switch 1 that contains its incoming VCI in the table, chosen in the previous step. Switch 1 uses this as the outgoing VCI in the table. • d. Finally switch 1 sends an acknowledgment to source A that contains its incoming VCI in the table, chosen in the previous step. • e. The source uses this as the outgoing VCI for the data frames to be sent to destination B.
  • 113.
    Fig 1.45 Setup-Acknowledgementin a virtual circuit network
  • 114.
    Transmission media Fig 1.46Transmission medium and physical layer • A transmission medium can be broadly defined as anything that can carry information from a source to a destination. • For example, the transmission medium for two people having a dinner conversation is the air. The air can also be used to convey the message in a smoke signal or semaphore. For a written message, the transmission medium might be a mail carrier, a truck, or an airplane. • In data communications the definition of the information and the transmission medium is more specific. The transmission medium is usually free space, metallic cable, or fiber-optic cable. • The information is usually a signal that is the result of a conversion of data from another form.
  • 115.
    Transmission media Contd.. •In telecommunications, transmission media can be divided into two broad categories: guided and unguided. Guided media include twisted-pair cable, coaxial cable, and fiber-optic cable. Unguided medium is free space. Fig 1.47 Classes of transmission media
  • 116.
    Transmission media Contd.. •GUIDED MEDIA • Guided media, which are those that provide a conduit from one device to another, include twisted-pair cable, coaxial cable, and fiber-optic cable. • A signal traveling along any of these media is directed and contained by the physical limits of the medium. • Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals in the form of electric current. • Optical fiber is a cable that accepts and transports signals in the form of light.
  • 117.
    Transmission media Contd.. •Twisted-Pair Cable • A twisted pair consists of two conductors (normally copper), each with its own plastic insulation, twisted together, as shown in Fig 1.48. Fig 1.48 twisted pair cable
  • 118.
    Twisted-Pair Cable contd.. • Oneof the wires is used to carry signals to the receiver, and the other is used only as a ground reference. • The receiver uses the difference between the two. In addition to the signal sent by the sender on one of the wires, interference (noise) and crosstalk may affect both wires and create unwanted signals. • If the two wires are parallel, the effect of these unwanted signals is not the same in both wires because they are at different locations relative to the noise or crosstalk sources (e,g., one is closer and the other is farther). This results in a difference at the receiver. • By twisting the pairs, a balance is maintained. For example, suppose in one twist, one wire is closer to the noise source and the other is farther; in the next twist, the reverse is true.
  • 119.
    Twisted-Pair Cable contd.. • UnshieldedVersus Shielded Twisted-Pair Cable • The most common twisted-pair cable used in communications is referred to as unshielded twisted-pair (UTP). IBM has also produced a version of twisted-pair cable for its use called shielded twisted-pair (STP). • STP cable has a metal foil or braided mesh covering that encases each pair of insulated conductors. • Although metal casing improves the quality of cable by preventing the penetration of noise or crosstalk, it is bulkier and more expensive. • Fig 1.49 shows the difference between UTP and STP.
  • 120.
    UTP versus STP Fig1.49 UTP versus STP
  • 121.
    Twisted-Pair Cable contd.. • Categories •The Electronic Industries Association (EIA) has developed standards to classify unshielded twisted-pair cable into seven categories. Categories are determined by cable quality, with 1 as the lowest and 7 as the highest. • Each EIA category is suitable for specific uses. Table 1.1 shows these categories.
  • 122.
    Twisted-Pair Cable contd.. Table 1.1Categories of unshielded twisted-pair cables
  • 123.
    Twisted-Pair Cable contd.. • Connectors •The most common UTP connector is RJ45 (RJ stands for registered jack), as shown in Fig 1.50. • The RJ45 is a keyed connector, meaning the connector can be inserted in only one way. Fig 1.50 UTP connector
  • 124.
    Twisted-Pair Cable contd.. • Performance •One way to measure the performance of twisted-pair cable is to compare attenuation versus frequency and distance. • A twisted-pair cable can pass a wide range of frequencies. • However, Fig 1.52 shows that with increasing frequency, the attenuation measured in decibels per kilometer (dB/km), sharply increases with frequencies above 100kHz. • Note that gauge is a measure of the thickness of the wire.
  • 125.
  • 126.
    Applications of twistedpair cables • Twisted-pair cables are used in telephone lines to provide voice and data channels. The local loop-the line that connects subscribers to the central telephone office---commonly consists of unshielded twisted-pair cables. • The DSL lines that are used by the telephone companies to provide high-data-rate connections also use the high- bandwidth capability of unshielded twisted-pair cables. • Local-area networks, such as lOBase-T and lOOBase-T, also use twisted-pair cables.
  • 127.
    Coaxial Cable • Coaxialcable (or coax) carries signals of higher frequency ranges than those in twisted pair cable, in part because the two media are constructed quite differently. • Instead of having two wires, coax has a central core conductor of solid or stranded wire (usually copper) enclosed in an insulating sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a combination of the two. • The outer metallic wrapping serves both as a shield against noise and as the second conductor, which completes the circuit. This outer conductor is also enclosed in an insulating sheath, and the whole cable is protected by a plastic cover (see Fig 1.53).
  • 128.
    Coaxial Cable Contd.. Fig1.53 Coaxial cable
  • 129.
    Coaxial Cable Contd.. •Coaxial Cable Standards • Coaxial cables are categorized by their radio government (RG) ratings. Each RG number denotes a unique set of physical specifications, including the wire gauge of the inner conductor, the thickness and type of the inner insulator, the construction of the shield, and the size and type of the outer casing. Each cable defined by an RG rating is adapted for a specialized function, as shown in Table 1.2.
  • 130.
  • 131.
    Coaxial Cable Contd.. •Coaxial Cable Connectors • To connect coaxial cable to devices, we need coaxial connectors. The most common type of connector used today is the Bayone-Neill-Concelman (BNe), connector. Fig 1.54 shows three popular types of these connectors: the BNC connector, the BNCT connector, and the BNC terminator. The BNC connector is used to connect the end of the cable to a device, such as a TV set. The BNC T connector is used in Ethernet networks to branch out to a connection to a computer or other device. The BNC terminator is used at the end of the cable to prevent the reflection of the signal.
  • 132.
    Coaxial Cable Contd.. Fig1.54 BNC Connectors Performance As we did with twisted-pair cables, we can measure the performance of a coaxial cable. We notice in Fig 1.55 that the attenuation is much higher in coaxial cables than in twisted- pair cable. In other words, although coaxial cable has a much higher bandwidth, the signal weakens rapidly and requires the frequent use of repeaters.
  • 133.
    Co-axial Cable Performance Fig1.55 Coaxial cable performance
  • 134.
    Applications of co-axialcable • Coaxial cable was widely used in analog telephone networks where a single coaxial network could carry 10,000 voice signals. • Later it was used in digital telephone networks where a single coaxial cable could carry digital data up to 600 Mbps. • However, coaxial cable in telephone networks has largely been replaced today with fiber-optic cable. • Cable TV networks (see Chapter 9) also use coaxial cables. In the traditional cable TV network, the entire network used is coaxial cable. Later, however, cable TV providers. replaced most of the media with fiber-optic cable; hybrid networks use coaxial cable only at the network boundaries, near the consumer premises. Cable TV uses RG-59 coaxial cable. • Another common application of coaxial cable is in traditional Ethernet LANs . Because of its high bandwidth, and consequently high data rate, coaxial cable was chosen for digital transmission in early Ethernet LANs. • The 10Base-2, or Thin Ethernet, uses RG-58 coaxial cable with BNe connectors to transmit data at 10 Mbps with a range of 185 m. • The lOBase5, or Thick Ethernet, uses RG-11 (thick coaxial cable) to transmit 10 Mbps with a range of 5000 m. Thick Ethernet has specialized connectors.
  • 135.
    Fiber-Optic Cable • Afiber-optic cable is made of glass or plastic and transmits signals in the form of light. • To understand optical fiber, we first need to explore several aspects of the nature of light. • Light travels in a straight line as long as it is moving through a single uniform substance. • If a ray of light traveling through one substance suddenly enters another substance (of a different density), the ray changes direction. Fig 1.56 shows how a ray of light changes direction when going from a more dense to a less dense substance.
  • 136.
    Fiber-Optic Cable contd.. Fig1.56 Bending of light ray • As the figure shows, if the angle of incidence I (the angle the ray makes with the line perpendicular to the interface between the two substances) is less than the critical angle, the ray refracts and moves closer to the surface. • If the angle of incidence is equal to the critical angle, the light bends along the interface. If the angle is greater than the critical angle, the ray reflects (makes a turn) and travels again in the denser substance. • Note that the critical angle is a property of the substance, and its value differs from one substance to another.
  • 137.
    Fiber-Optic Cable contd.. Fig1.57 Optical fiber • Optical fibers use reflection to guide light through a channel. A glass or plastic core is surrounded by a cladding of less dense glass or plastic. • The difference in density of the two materials must be such that a beam of light moving through the core is reflected off the cladding instead of being refracted into it.
  • 138.
    Fiber-Optic Cable contd.. •Propagation Modes • Current technology supports two modes (multimode and single mode) for propagating light along optical channels, each requiring fiber with different physical characteristics. Multi mode can be implemented in two forms: step-index or graded-index.
  • 139.
    Fiber-Optic Cable contd.. Fig1.58 Propagation modes
  • 140.
  • 141.
    Fiber-Optic Cable contd.. •Multimode Multi mode is so named because multiple beams from a light source move through the core in different paths. How these beams move within the cable depends on the structure of the core. • In multimode step-index fiber, the density of the core remains constant from the center to the edges. A beam of light moves through this constant density in a straight line until it reaches the interface of the core and the cladding. At the interface, there is an abrupt change due to a lower density; this alters the angle of the beam's motion. The term step index refers to the suddenness of this change, which contributes to the distortion of the signal as it passes through the fiber. • A second type of fiber, called multi mode graded-index fiber, decreases this distortion of the signal through the cable. The word index here refers to the index of refraction. As we saw above, the index of refraction is related to density. A graded-index fiber, therefore, is one with varying densities. Density is highest at the center of the core and decreases gradually to its lowest at the edge. • Single-Mode Single-mode uses step-index fiber and a highly focused source of light that limits beams to a small range of angles, all close to the horizontal. The single mode fiber itself is manufactured with a much smaller diameter than that of multimode fiber, and with substantially lower density (index of refraction). The decrease in density results in a critical angle that is close enough to 90° to make the propagation of beams almost horizontal. In this case, propagation of different beams is almost identical, and delays are negligible. All the beams arrive at the destination "together" and can be recombined with little distortion to the signal.
  • 142.
    Cable Composition Fig 1.60Fiber construction Fig 1.60 shows the composition of a typical fiber-optic cable. The outer jacket is made of either PVC or Teflon. Inside the jacket are Kevlar strands to strengthen the cable. Kevlar is a strong material used in the fabrication of bullet proof vests. Below the Kevlar is another plastic coating to cushion the fiber. The fiber is at the center of the cable, and it consists of cladding and core.
  • 143.
    Fiber-Optic Cable Connectors Fig1.61 Fiber-optic cable connectors There are three types of connectors for fiber-optic cables, as shown in Fig 1.61. The subscriber channel (SC) connector is used for cable TV. It uses a push/pull locking system. The straight-tip (ST) connector is used for connecting cable to networking devices. It uses a bayonet locking system and is more reliable than SC. MT-RJ is a connector that is the same size as RJ45.
  • 144.
    Performance of FiberOptic Cable • The plot of attenuation versus wavelength in Fig 1.62 shows a very interesting phenomenon in fiber-optic cable. Attenuation is flatter than in the case of twisted-pair cable and coaxial cable. The performance is such that we need fewer (actually 10 times less) repeaters when we use fiber-optic cable.
  • 145.
    Performance of Fiber-OpticCable Fig 1.62 Optical fiber performance
  • 146.
    Applications of FiberOptic Cable • Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-effective. • Some cable TV companies use a combination of optical fiber and coaxial cable, thus creating a hybrid network. Optical fiber provides the backbone structure while coaxial cable provides the connection to the user premises. • This is a cost-effective configuration since the narrow bandwidth requirement at the user end does not justify the use of optical fiber. Local-area networks such as 100Base- FX network (Fast Ethernet) and 1000Base-X also use fiber- optic cable.
  • 147.
    Advantages of OpticalFiber • Fiber-optic cable has several advantages over metallic cable (twisted pair or coaxial). • Higher bandwidth. Fiber-optic cable can support dramatically higher bandwidths (and hence data rates) than either twisted-pair or coaxial cable. Currently, data rates and bandwidth utilization over fiber-optic cable are limited not by the medium but by the signal generation and reception technology available. • Less signal attenuation. Fiber-optic transmission distance is significantly greater than that of other guided media. A signal can run for 50 km without requiring regeneration. We need repeaters every 5 km for coaxial or twisted-pair cable. • Immunity to electromagnetic interference. Electromagnetic noise cannot affect fiber-optic cables. • Resistance to corrosive materials. Glass is more resistant to corrosive materials than copper. • Lightweight. Fiber-optic cables are much lighter than copper cables. • Greater immunity to tapping. Fiber-optic cables are more immune to tapping than copper cables. Copper cables create antenna effects that can easily be tapped.
  • 148.
    Disadvantages of OpticalFiber • There are some disadvantages in the use of optical fiber. • Installation and maintenance. Fiber-optic cable is a relatively new technology. Its installation and maintenance require expertise that is not yet available everywhere. • Unidirectional light propagation. Propagation of light is unidirectional. If we need bidirectional communication, two fibers are needed. • Cost. The cable and the interfaces are relatively more expensive than those of other guided media. If the demand for bandwidth is not high, often the use of optical fiber cannot be justified.
  • 149.
    UNGUIDED MEDIA: WIRELESS •Unguided media transport electromagnetic waves without using a physical conductor. This type of communication is often referred to as wireless communication. Signals are normally broadcast through free space and thus are available to anyone who has a device capable of receiving them.
  • 150.
    UNGUIDED MEDIA: WIRELESSCONTD.. • Fig 1.63 shows the part of the electromagnetic spectrum, ranging from 3 kHz to 900 THz, used for wireless communication. Fig 1.63 Electromagnetic spectrum for wireless communication
  • 151.
    UNGUIDED MEDIA: WIRELESSCONTD.. • Unguided signals can travel from the source to destination in several ways: ground propagation, sky propagation, and line-of-sight propagation, as shown in Fig 1.64. • In ground propagation, radio waves travel through the lowest portion of the atmosphere, hugging the earth. These low-frequency signals emanate in all directions from the transmitting antenna and follow the curvature of the planet. • Distance depends on the amount of power in the signal: The greater the power, the greater the distance. • In sky propagation, higher-frequency radio waves radiate upward into the ionosphere (the layer of atmosphere where particles exist as ions) where they are reflected back to earth. This type of transmission allows for greater distances with lower output power. • In line-or-sight propagation, very high-frequency signals are transmitted in straight lines directly from antenna to antenna. Antennas must be directional, facing each other, and either tall enough or close enough together not to be affected by the curvature of the earth. Line-of-sight propagation is tricky because radio transmissions cannot be completely focused.
  • 152.
    UNGUIDED MEDIA: WIRELESSCONTD.. Fig 1.64 Propagation methods
  • 153.
    UNGUIDED MEDIA: WIRELESSCONTD.. • The section of the electromagnetic spectrum defined as radio waves and microwaves is divided into eight ranges, called bands, each regulated by government authorities. These bands are rated from very low frequency (VLF) to extremely high frequency (EHF). Table 1.3 lists these bands, their ranges, propagation methods, and some applications.
  • 154.
    Bands of ElectromagneticSpectrum Table 1.3 Bands of Electromagnetic Spectrum
  • 155.
    UNGUIDED MEDIA: WIRELESSCONTD.. • We can divide wireless transmission into three broad groups: radio waves, micro waves, and infrared waves. Fig 1.65 Wireless transmission waves
  • 156.
    Radio Waves • RadioWaves • Although there is no clear-cut demarcation between radio waves and microwaves, electro magnetic waves ranging in frequencies between 3 kHz and 1GHz are normally called radio waves; • waves ranging in frequencies between 1 and 300 GHz are called micro waves. However, the behavior of the waves, rather than the frequencies, is a better criterion for classification. Radio waves, for the most part, are omnidirectional. • When an antenna transmits radio waves, they are propagated in all directions. This means that the sending and receiving antennas do not have to be aligned. A sending antenna sends waves that can be received by any receiving antenna. The omnidirectional property has a disadvantage, too. The radio waves transmitted by one antenna are susceptible to interference by another antenna that may send signals using the same frequency or band. • Radio waves, particularly those waves that propagate in the sky mode, can travel long distances. This makes radio waves a good candidate for long-distance broadcasting such as AM radio. Radio waves, particularly those of low and medium frequencies, can penetrate walls. • This characteristic can be both an advantage and a disadvantage. It is an advantage because, for example, an AM radio can receive signals inside a building. It is a disadvantage because we cannot isolate a communication to just inside or outside a building. The radio wave band is relatively narrow, just under 1 GHz, compared to the microwave band. When this band is divided into sub bands, the sub bands are also narrow, leading to a low data rate for digital communications.
  • 157.
    Radio Waves Contd.. •Omnidirectional Antenna • Radio waves use omnidirectional antennas that send out signals in all directions. Based on the wavelength, strength, and the purpose of transmission, we can have several types of antennas. Fig 1.65 shows an omnidirectional antenna.
  • 158.
    Radio Waves Contd.. Fig1.65 Omnidirectional antenna Radio waves are used for multicast communications, such as radio and television, and paging systems. Applications The omnidirectional characteristics of radio waves make them useful for multicasting, in which there is one sender but many receivers. AM and FM radio, television, mari time radio, cordless phones, and paging are examples of multicasting.
  • 159.
    Microwaves • Microwaves • Electromagneticwaves having frequencies between 1 and 300 GHz are called micro waves. Microwaves are unidirectional. When an antenna transmits micro waves, they can be narrowly focused. • This means that the sending and receiving antennas need to be aligned. The unidirectional property has an obvious advantage. • A pair of antennas can be aligned without interfering with another pair of aligned antennas. The following describes some characteristics of microwave propagation: • Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to be in direct sight of each other, towers that are far apart need to be very tall. The curvature of the earth as well as other blocking obstacles do not allow two short towers to communicate by using microwaves. Repeaters are often needed for long distance communication. • Very high-frequency microwaves cannot penetrate walls. This characteristic can be a disadvantage if receivers are inside buildings. • The microwave band is relatively wide, almost 299 GHz. Therefore wider sub bands can be assigned, and a high data rate is possible. • Use of certain portions of the band requires permission from authorities.
  • 160.
    Microwaves Contd.. • UnidirectionalAntenna • Microwaves need unidirectional antennas that send out signals in one direction. Two types of antennas are used for microwave communications: the parabolic dish and the horn (see Fig 1.66). A parabolic dish antenna is based on the geometry of a parabola: Every line parallel to the line of symmetry (line of sight) reflects off the curve at angles such that all the lines intersect in a common point called the focus. • The parabolic dish works as a funnel, catching a wide range of waves and directing them to a common point. In this way, more of the signal is recovered than would be possible with a single-point receiver. Outgoing transmissions are broadcast through a horn aimed at the dish. The micro waves hit the dish and are deflected outward in a reversal of the receipt path. A horn antenna looks like a gigantic scoop. Outgoing transmissions are broadcast up a stem (resembling a handle) and deflected outward in a series of narrow parallel beams by the curved head. Received transmissions are collected by the scooped shape of the horn, in a manner similar to the parabolic dish, and are deflected down into the stem.
  • 161.
    Microwaves Contd.. Fig 1.66Unidirectional antennas
  • 162.
    Microwaves Contd.. • Applications •Microwaves, due to their unidirectional properties, are very useful when unicast (one-to- one) communication is needed between the sender and the receiver. They are used in cellular phones, satellite networks, and wireless LANs. • Microwaves are used for unicast communication such as cellular telephones, satellite networks, and wireless LANs.
  • 163.
    Infrared waves • Infrared •Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770 nm), can be used for short-range communication. • Infrared waves, having high frequencies, cannot penetrate walls. This advantageous characteristic prevents interference between one system and another; a short-range communication system in one room cannot be affected by another system in the next room. • When we use our infrared remote control, we do not interfere with the use of the remote by our neighbors. However, this same characteristic makes infrared signals useless for long-range communication. In addition, we cannot use infrared waves outside a building because the sun's rays contain infrared waves that can interfere with the communication.
  • 164.
    Infrared waves Contd.. •Applications • The infrared band, almost 400 THz, has an excellent potential for data transmission. Such a wide bandwidth can be used to transmit digital data with a very high data rate. • The Infrared Data Association (IrDA), an association for sponsoring the use of infrared waves, has established standards for using these signals for communication between devices such as keyboards, mice, PCs, and printers. For example, some manufacturers provide a special port called the IrDA port that allows a wireless keyboard to communicate with a PC. The standard originally defined a data rate of 75 kbps for a distance up to 8 m. • The recent standard defines a data rate of 4 Mbps. Infrared signals defined by IrDA transmit through line of sight; the IrDA port on the keyboard needs to point to the PC for transmission to occur.
  • 165.