Chapter 1 DCN
Chapter 1 DCN
2
Introduction
The term telecommunication means communication at a distance.
3
Communication Basics
Data communications are the exchange of data between two devices via some
It includes :
5
A Network: A group of devices that can
communicate with each other over links.
It’s a connection between two or more devices.
Which is connected by a communication links.
6
Components of a data communication system
1. protocol
2. Message
3. Medium
4. Sender
5. Receiver
7
Five components of data communication
1. Message: is the information (data) to be communicated. Popular forms of
information include text, numbers, pictures, audio, and video.
2. Sender: is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
Japanese.
Serial vs. parallel communications
In serial communications
A single bit will be transferred at a time using the
communication channel
In parallel communications
Multiple bits (eg. Eight bits) will be transferred
at a time
Needs multiple (parallel) communication
channels
9
Contd.
10
Data Representation Techniques
The type of data to be transmitted can be in the form of text, audio,
An analog signal has infinitely many levels of intensity over a period of
time.
As the wave moves from value A to value B, it passes through and
A digital signal, on the other hand, can have only a limited number of
defined values.
12
Analog Signals
Are Continuous wave that carries information by altering the
characteristics of waves.
Here the signal can take on any value (within the limits set by
the
For instance, Voice and all sounds are analog, traveling to human
Radio, telephone and recording equipment historically have been analog, but
they are beginning to change –due to large to computers to the other types
of signals-digitals
15
Contd.
The advantage of digital signals is that
16
Contd.
The signals from a satellite are digital. They use a system called
Traffic lights
Motor bike c
Water tap
Dimmer switch
Light switch
In Music on a CD
Music on a tape 1
8
Modes of data transmission
computer...).
1
9
Contd.
duplex) is a connection in which the data flows in one direction or the other, but not
With this type of connection, each end of the connection transmits in turn.
The half-duplex mode is used in cases where there is no need for communication
in both directions at the same time; the entire capacity of the channel can be
2
1
Contd.
This sharing can occur in two ways: Either the link must contain two
physically separate transmission paths, one for sending and the other
for receiving; or the capacity of the channel is divided between
signals travelling in both directions.
One common example of full-duplex communication is the telephone
network. When two people are communicating by a telephone line,
both can talk and listen at the same time.
The full-duplex mode is used when communication in both directions
is required all the time.
The capacity of the channel, however, must be divided between the
two directions.
OF-FTI-ALL - Issu
2
18 No e
2
1
Contd.
23
Signal Encoding techniques
Digital data:- information that has discrete states
Analog signal:- has infinitely many levels of intensity over a period of time.
24
Contd.
25
Assignment
Describe the following digital signal encoding formats
(which
3. Bipolar-AMI
4. Pseudoternary
5. Manchester
6. Differential Manchester
26
27
DIGITAL DATA, ANALOG SIGNALS
3. Phase-shift keying
techniques
30
Multiplexing
In data communication, there might be a need to share a single
goals.
multiplexing.
than the bandwidth needs of the devices, the link can be shared.
31
The Basic Types of Multiplexing
• There are four basic approaches to multiplexing that each have a set
of variations and implementations
– Frequency Division Multiplexing (FDM)
– Wavelength Division Multiplexing (WDM)
– Time Division Multiplexing (TDM)
– Code Division Multiplexing (CDM)
• TDM and FDM are widely used
• WDM is a form of FDM used for optical fiber
• CDM is an approach used in cell phone mechanisms
3 32
Contd.
Multiplexing is the set of techniques that allows the (simultaneous)
Multiplexing
networking technology.
36
FD Multiplexing Vs. FD
Demultiplexing Example
37
Time-division multiplexing (TDM)
A multiplexing method for transmitting multiple data streams in a
4
0
Statistical Multiplexing
It is a multiplexing technique that allows information from
42
Dealing with Equipment Failure
The more pieces of equipment that your signal needs to pass through, the
probability of failure.
A crisp light pulse will eventually spread out and overlap with
other pulses.
44
Attenuation
transmitted.
background
45
Dealing With Errors
One way to cope with this is to detect errors and request that
46
Errors in Data
47
Pure Noise
48
Detecting Errors
Usually, noise levels are fairly low and most of the bits are received correctly
by the receiver.
The question is, how can the receiver know when an error has occurred?
We could try sending the data twice and comparing the two transmissions to see
Even when we detect an error, the next question is: what to do about it?
49
Parity Checking (Vertical Redundancy
Check (VRC))
number.
If the received character does not have an even (or odd) number of bits
Both the sender and receiver must know which form of parity to use.
50
Contd.
51
Hamming Distance
The Hamming distance between two bit patterns is the number
of dissimilar bits.
One error in the wrong place can turn an ‘A’ into a ‘C’.
52
Hamming Distance
It would take two errors in the wrong place to turn an ‘A’ into a ‘B’.
53
Checksum
Another simple way of checking if there has been an error in a block
of data is to find a checksum.
Imagine we send the data 121, 17, 29 and 47. Adding these
numbers
up, we get 214.
The receiver can total up the first numbers and compare it to the last
one.
54
Contd.
55
Cyclic Redundancy Code (CRC)
56
Contd.
The mathematical procedure for performing a CRC is specified by the
International Telecommunication Union (ITU) and involves applying
a 16-bit polynomial to the data being transmitted by the packet for
packets of 4 KB of data or less, or a 32-bit polynomial for packets
larger than 4 KB.
57
Model for data communication
Source
•Carries data
58
Receiver
•Converts received signal into suitable data
form
Destination
•Takes incoming data
59
Simplified Data Communications Model
Protocols and architectures used in data
communication OSI and TCP/IP
61
Why Data Communication Protocols
and Standards are required?
62
Standardized protocol architecture:
It standardizes network devices and software:
Ensures compatibility (interoperability) between devices
from different vendors.
It prevents changes in one layer from affecting the other layers:
Layers are developed quickly.
Accelerates the evolution of networks.
Simplifies the learning process.
Fosters competition because products from different vendors can
work together.
Prevents technology or capability changes in one layer from
affecting other layers above and below.
Provides a common language to describe networking functions
and capabilities
63
Elements of a Protocol
There are three key elements of a protocol:
the interpretation.
be sent to the
receiver to avoid overwhelming the receiver.
64
Rules are defined for each step and process during
communication between two or more computers.
Networks have to follow these rules to successfully
transmit data.
Protocols are needed in every field like society, science &
technology, Data Communication, media and etc.
65
In order for computers to exchange information, there must be a pre-
existing agreement as to how the information will be structured and
how each side will send and receive it.
66
Perhaps the most important computer protocol is OSI
(Open Systems Interconnection), a set of guidelines for
implementing networking communications between
computers.
67
Levels of a Protocol
There are mainly three levels of a protocol, they are as
follows:
69
Types of Protocols
Protocols can be broadly divided into the following two
types:
Standard Protocols
Proprietary Protocols
• Standard Protocols:
A standard protocol is a
mandated protocol for
all devices.
It supports multiple
devices and acts as a
standard.
Standard protocols
are not vendor-
specific 70
i.e. they are not specific to a particular company or organization.
different organizations .
These protocols are publicly available, and we need not pay for them.
71
FTP(File transfer protocol): is basically used for transferring
files to different networks.
There may be a mass of files such as text files, multimedia files, etc.
This way of file transfer is quicker than other methods.
72
Proprietary Protocols:
Proprietary protocols are developed by an individual organization
for their specific devices.
73
Concept of Layered Task
74
The figure shows
a. Sender, Receiver & Carrier
b. Hierarchy of layers
At the sender site, the activities take place in the following
descending order:
c.Higher Layer: The sender writes the letter along with the
sender and receivers address and put it in an envelope and drop it
in the mailbox.
d. Middle Layer: The letter is picked up by the post man and
delivered to the post office
c.Lower Layer: The letters at the post office are sorted and are
ready to be transported through a carrier.
75
The figure shows
76
At the Receiver site, the activities take
place in the following ascending
order:
a.Lower Layer: The carrier delivers the letter to
the destination post office
b.Middle Layer: After sorting, the letter is delivered
to the receiver’s mail box
c. Higher Layer: The receiver picks up the letter,
opens
the envelope and reads it.
Hierarchy of layers: The activities in the entire task are
organized into three layers. Each activity at the sender
or receiver side occurs in a particular order at the
hierarchy.
The important and complex activities are organized
into the Higher Layer and the simpler ones into middle
and lower layer. 77
OSI and TCP/IP
78
Each layer of the ISO model has its own protocols and functions.
The OSI protocol stack was later adapted into the Transmission
Control Protocol (TCP)/ internet protocol (IP) stack.
81
82
The following are the OSI protocols used in the seven layers of the
OSI Model:
83
•Transmitting individual bits from one node to the
next. 84
Layer 2, the Data Link Layer
The protocols are used by the Data Link Layer include: ARP,
and PLIP.
85
•It is responsible for node-to-node delivery of data.
86
Layer 3, the Network Layer
This is the most important layer of the OSI model, which performs
Routers and switches are the devices used for this layer that
flow.
87
88
Layer 4, the Transport Layer
The transport layer works on two determined communication
Protocol (SCTP).
89
90
Layer 5, the Session Layer
SAP, NetBIOS.
91
92
Layer 6, the Presentation Layer
this layer.
application layer.
93
94
Layer 7, the Application Layer
This layer works at the user end to interact with user
applications.
QoS (quality of service), file transfer and email are the
major popular services of the application layer.
A few examples of application layer protocols are the
Hypertext Transfer Protocol (HTTP), File Transfer
Protocol (FTP), Post Office Protocol (POP), Simple
Mail Transfer Protocol (SMTP), and Domain Name
System (DNS).
95
96
Difference between TCP/IP and OSI
Model
97
98
Introduction to network devices
A network is a set of devices (often referred to as nodes)
connected by communication links.
99
Network devices, or networking hardware, are physical devices that
are required for communication and interaction between hardware on a
computer network.
Hub
Switch
Router
Bridge
Gateway
Modem
Repeater
Access Point 10
0
Hub
•A Hub is a networking
connector device that aids in
connecting multiple devices to a
single network.
•It is a common connection
•It thata is also
point physical
known as alayer
network
hub.
is network that connects
device a series of
LANs.
101
102
Switch
•A Switch is a networking device that
has the ability to link multiple devices
together on one computer network.
•It uses a data link layer to connect
the devices.
•When it comes to switching, we prefer
the packet switching method to dispatch
the data packet over the web.
103
Router
A router is a device for computer networking devices that helps
in connecting two or more packet-switched networks.
The major role of the router is to perform the two functions.
It supports in handling the traffic between the networks by
dispatching data packets, and permits several devices to use the
same internet connection.
104
105
106
Five Categories of Network
Devices
107
Introduction to layer two (switch) and layer one (hub) device
109
As it is not reliable or we can say that it
is not
an intelligent device because it
does not store the information or data
coming from the source as Switch does.
110
How Hub Works?
Hub is connected through an electric wire and receives the
data from the source device connected to its port and sends it
switch does.
connected to it.
111
112
Hence, there a lot of traffic occurs and the performance
becomes very low and sometimes stuck or shut down the
whole network.
113
Why Hub is a Physical Layer device?
The reason for using a hub as a physical device is that because the hub is
not an intelligent device, it does not store any data in it and doesn’t manage
any table for storing the MAC addresses as the Switch device does.
Hub is connected through a large cable, and just simply forward the data, to
all the devices connected to it.
Two computers cannot send data at the same time, and if they send there
will be collision and hub shutdowns.
114
Types of HUB in Networking
Active Hub
Passive Hub
Intelligent Hub
It uses the priority method for sending data, which data should send first.
115
Passive hubs are simple message connector to devices, they
are a
simple device which receives the data and transmit to next
device.
116
Layer two (switch)
117
A layer 2 switch does not require any configuration and can be used
with any type of network.
118
This is important because devices will only communicate
with one another if they have the same hardware addresses.
119
This feature aids in packet delivery
because it prevents packets from
taking long periods of time to reach
their destination, which can have a
negative impact on performance.
120
Assignment #1(Individual)
b) Router
c) Bridge
d) Modem and
e) Repeater
121