Module 1
Module 1
Definition: Data communication is the exchange of data between two devices via a
transmission medium like a wire cable.
Communication System: For data communication to occur, devices must be part of a
system combining hardware and software.
Key Characteristics of an Effective System:
Delivery: Data must reach the correct, intended destination.
Accuracy: Data must be delivered without alteration; corrupted data is unusable.
Timeliness: Data must arrive promptly; late data is useless. Real-time transmission,
for audio and video, means data is delivered as produced, in order, and without
significant delay.
Jitter: This refers to the variation in packet arrival time, particularly uneven delays in
audio or video packet delivery, which can result in uneven quality.
Components of Data Communication
A data communication system consists of five main components:
Message: The information to be communicated, such as text, numbers, pictures,
audio, or video.
Sender: The device originating the data message (e.g., computer, workstation,
telephone handset, video camera).
Receiver: The device receiving the message (e.g., computer, workstation, telephone
handset, television).
Transmission Medium: The physical path connecting the sender and receiver (e.g.,
twisted-pair wire, coaxial cable, fiber-optic cable, radio waves).
Protocol: A set of rules governing data communications, ensuring agreement between
communicating devices.
Data Representation
Diagram:
Half-Duplex: Each station can transmit and receive, but not simultaneously. It's like a
one-lane road where traffic flows in one direction at a time. The entire channel capacity
is used by whichever device is transmitting. Examples include walkie-talkies and CB
radios. This mode is used when simultaneous communication isn't needed.
Full-Duplex: Both stations can transmit and receive simultaneously. This is similar to
a two-way street with traffic flowing in both directions at once. Signals share the link's
capacity, either through two separate physical paths or by dividing the channel
capacity. A common example is a telephone network where both parties can talk and
listen at the same time. It's used when continuous bidirectional communication is
required, with the channel capacity divided.
1.2 Networks
Connection: Devices are connected via wired or wireless transmission media (e.g.,
cable, air). Even connecting two home computers with a router creates a small
network.
Reliability: Assessed by failure frequency, recovery time from failures, and robustness
during catastrophes.
Type of Connection:
Point-to-Point: A dedicated link between two devices, with the entire capacity
reserved for their transmission. This can involve physical wires, microwave, or satellite
links. An infrared remote control to a TV is an example.
Multipoint (Multidrop): More than two devices share a single link. The channel
capacity is shared either spatially (multiple devices simultaneously) or temporally
(users take turns).
Diagram:
Physical Topology: Refers to the physical layout of a network. Two or more links
form a topology. It's the geometric representation of the relationship between links and
nodes (linking devices).
Mesh Topology: Every device has a dedicated point-to-point link to every other
device.
Number of Links: For n nodes, a fully connected mesh network requires n(n-1)/2
duplex-mode links. Each device needs n-1 I/O ports.
Advantages: Dedicated links eliminate traffic problems, robust (one link failure doesn't
incapacitate the system), offers privacy/security (messages travel dedicated lines),
and simplifies fault identification and isolation.
Disadvantages: Requires extensive cabling and I/O ports, making installation and
reconfiguration difficult. The sheer volume of wiring can be prohibitive.
Star Topology: Each device connects via a dedicated point-to-point link to a central
controller (hub). Devices don't link directly to each other; the hub relays data.
Advantages: Less expensive than mesh, each device needs only one link/port easy
to install and reconfigure], robust (single link failure only affects that link), and facilitates
fault identification/isolation.
Disadvantages: Entire system depends on the hub; if the hub fails, the whole system
is down. [cite_start]Can require more cabling than ring or bus topologies due to direct
links to the central hub.
Diagram:
Bus Topology: A multipoint connection where a single long cable acts as a backbone
linking all devices.
Components: Nodes connect via drop lines (connection from device to main cable)
and taps (connectors that splice into or puncture the cable).
Signal Degradation: Signals weaken as they travel due to energy transformation into
heat. This limits the number and distance of taps.
Advantages: Easy installation, uses less cabling than mesh or star topologies as only
the backbone cable spans the entire facility.
Disadvantages: Difficult to add new devices after optimal installation. Signal reflection
at taps can degrade quality. A fault or break in the bus cable stops all
transmission,creating noise in both directions.
Usage: One of the first topologies for early LANs, but less popular now.
Diagram:
Ring Topology: Each device has a dedicated point-to-point connection with only its
two immediate neighbors. Signals pass in one direction around the ring until they reach
their destination. Each device includes a repeater to regenerate and pass along
signals.
Advantages: Relatively easy to install and reconfigure (only two connections change
for additions/deletions). Simplifies fault isolation; a device not receiving a signal can
issue an alarm indicating the problem location.
Usage: Prevalent with IBM's Token Ring LAN, but less popular today due to the need
for higher-speed LANs.
Diagram:
1.3 Network Types
Characteristics: Usually privately owned and connects hosts within a single office,
building, or campus. Can range from two PCs and a printer to a company-wide network
including audio/video devices. Each host has a unique identifier/address within the
LAN.
Evolution:
Past: Hosts connected via a common cable; all hosts received packets, with only the
intended recipient keeping it.
Today: Most LANs use a smart connecting switch that recognizes the destination
address and directs the packet only to its intended recipient, reducing traffic and
allowing multiple simultaneous communications.
Current Usage: LANs are rarely isolated now; they connect to each other and to
WANs for wider communication.
Diagram:
1.3.2 Wide Area Network (WAN)
Characteristics: Has a wider geographical span than a LAN, covering a town, state,
country, or the world. WANs interconnect connecting devices (switches, routers,
modems), while LANs interconnect hosts.WANs are typically created and run by
communication companies and leased by organizations.
Types of WANs:
Diagram:
Switched WAN: A network with more than two ends, used in the backbone of global
communication.It's a combination of several point-to-point WANs connected by
switches.
Diagram:
Internetwork
Definition: When two or more networks are connected, they form an internetwork, or
internet (lowercase 'i').
Example: An organization with two LANs (east and west coast offices) connected by
a leased point-to-point WAN forms a private internet, enabling inter-office
communication.
Packet Routing: Within the same office, a router blocks messages for hosts outside
the LAN, and a switch directs them locally.For cross-office communication, routers
route packets between LANs via the WAN.
Diagram:
1.3.3 Switching
An internet is a switched network where a switch connects at least two links. Switches
forward data between networks. The two main types of switched networks are circuit-
switched and packet-switched.
Circuit-Switched Network:
Mechanism: A dedicated connection (circuit) is always available between two end
systems; the switch activates or deactivates it.
Example (Telephones): In a network connecting telephones, a high-capacity line can
handle multiple simultaneous voice communications.
Efficiency: Efficient only when working at full capacity, often inefficient due to partial
capacity usage. Capacity is made high to prevent communication failure when all lines
are busy.
Diagram:
Packet-Switched Network:
Diagram:
Definition: The Internet (uppercase 'I') is the most notable internet (lowercase 'i'),
composed of thousands of interconnected networks.
Structure: Conceptually consists of backbones, provider networks, and customer
networks.
Backbones: Large networks owned by communication companies (e.g., Sprint,
Verizon, AT&T, NTT), connected via complex switching systems called peering points.
Also known as international ISPs.
Provider Networks: Smaller networks that use backbone services for a fee.
Connected to backbones and sometimes other provider networks. Also known as
national or regional ISPs.
Customer Networks: Networks at the edge of the Internet that consume services
provided by the Internet, paying fees to provider networks.
Diagram:
1.3.5 Accessing the Internet
A protocol defines rules for effective communication between sender, receiver, and
intermediate devices.
For complex communication, tasks are divided into layers, with a protocol at each
layer, known as protocol layering.
2.1.1 Scenarios
Simple communication can occur in one layer, e.g., Maria and Ann talking face-to-
face.
Even in this simple scenario, rules are followed: greeting, appropriate vocabulary, not
interrupting, having a dialogue, and exchanging farewells.
This differs from a formal lecture where communication is mostly a monologue, with
specific rules for student questions (e.g., raising hand).
Diagram:
When communication is complex, such as Maria and Ann communicating via mail over
a distance and needing privacy, layering is introduced.
They agree on an encryption/decryption technique to protect their ideas.
Communication happens in three layers, with each friend having "machines" (or
robots) for each layer.
Diagram:
Layer 3 (Listen/Talk): Maria talks to the Layer 3 machine, which creates the plaintext
(the original letter in English).
Layer 2 (Encrypt/Decrypt): The Layer 2 machine encrypts the plaintext to create
ciphertext.
Layer 1 (Send mail/receive mail): The Layer 1 machine puts the ciphertext in an
envelope, adds addresses, and mails it.
Ann's Side (Receiver):
Layer 1: Picks up the mail, recognizes Maria's address, and takes out the ciphertext.
Layer 2: Decrypts the ciphertext to create the plaintext.
Layer 3: Reads the plaintext as if Maria is speaking.
Modularity: Divides complex tasks into smaller, simpler ones.]If a change is needed
(e.g., better encryption), only that specific layer's "machine" needs to be changed, not
the entire system. A layer acts as a "black box" with defined inputs/outputs, allowing
for independent implementation or replacement.
One could argue that a single layer might be simpler. However, if an issue arises (e.g.,
code broken), the entire single "machine" would need replacement instead of just one
layer.
First Principle (Bidirectional Communication): Each layer must perform two opposite
tasks, one for each direction of communication.
Layer 3: Listen and Talk.
Layer 2: Encrypt and Decrypt.
Layer 1: Send and Receive mail.
Second Principle (Identical Objects): The objects "under" each corresponding layer at
both communicating sites must be identical.
Under Layer 3: Plaintext letter.
Under Layer 2: Ciphertext letter.
Under Layer 1: Piece of mail.
Diagram:
2.2 TCP/IP Protocol Suite
Diagram:
2.2.2 Layers in the TCP/IP Protocol Suite (Logical Connections and Data Units)
Logical Connections:
Diagram:
Physical Layer:
Data-Link Layer:
Responsible for moving a datagram across a single link (e.g., wired LAN, wireless
LAN, wired WAN, wireless WAN).
Encapsulates a datagram into a frame.
TCP/IP supports all standard and proprietary link-layer protocols.
Some protocols offer complete error detection and correction, while others offer only
error correction.
Network Layer:
Responsible for creating a connection between the source and destination computers
(host-to-host communication).
Routers in the path are responsible for choosing the best route for each packet.
This layer is separate from the transport layer due to the principle of separating tasks
and because intermediate systems (routers) only need this layer, not higher ones.
Transport Layer:
Common Protocols:
2.3 Addressing
Every device on the Internet has at least one address. There are four levels of
addresses in the TCP/IP protocol suite: physical (link) address, logical (IP) address,
port address, and specific address.
Diagram:
Note: The physical address identifies the connection of a host or router to a link.
Note: A logical address (IP address) defines the connection of a host to the internet.
1.5 Standards
Definition: Standards are guidelines that specify the procedures and rules for communication.
Types of Standards:
De facto: "By fact" or "by convention." These standards have not been officially approved by
an organized body but have been widely adopted due to their widespread use or historical
precedence. An example is the TCP/IP protocol suite, which was initially a de facto standard
before becoming formalized.
De jure: "By law" or "by regulation." These standards are legally enforced or have been
officially approved by an authorized standards organization.
Several organizations are involved in developing and promoting standards for data
communications:
Areas of Work: Creates standards for telephone and data communication, covering areas
like modulation, multiplexing, and network interfaces.
1.5.2 Forums
Although, when speaking of the Internet, everyone talks about the TCP/IP protocol
suite, this suite is not the only suite of protocols defined.
An open system is a set of protocols that allows any two different systems to com-
municate regardless of their underlying architecture.
The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware
and software.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.
It consists of seven separate but related layers, each of which defines a part of the
process of moving informationacross a network (see Figure 2.11).
Conclusion
This overview of data communications and networks provides the foundational
knowledge for understanding more complex topics in networking. It has covered the
basic concepts of data communication, network components, data flow types, network
criteria, physical topologies, different types of networks (LAN, WAN, internet), and the
importance of standards and the organizations that create them. The TCP/IP protocol
suite, with its layered architecture and addressing scheme, serves as the fundamental
model for Internet communication.