DCCN Notes
DCCN Notes
POLYTECHNIC
ROURKELA
LECTURE NOTES
1) To apply knowledge of E&TC Engg. and principles of basic science & mathematics for analyzing
the circuit of different electronics devices.
2) To compete for employment both in public and private sector.
3) To pursue higher study in E&TC as well as any other related branch for carrier enhancement.
4) To establish own assembly or service section with innovative, entrepreneurial ideas.
5) To work with team spirit and social ethics.
1.1.1 Components
1.1.2 Characteristics
1.1.3 Data representation
1.1.4 Data flow
1.2 Networks
1.2.1 Network topology
1.2.2 Types of computer networks
1.3 Protocol & Architecture
1.4.1 OSI
1.4.1 TCP/IP
Unit-2. Data Transmission & Media
2.1 Data transmission Concepts and Terminology
4.6 Multiplexing
4.7 FDM
4.8 TDM
PO1: Basic and Discipline specific knowledge- Apply knowledge of basic mathematics, science
and engineering fundamentals and engineering specialization to solve the engineering problems.
PO2: Problem Analysis- Identify and analyze well defined engineering problems using codified
standard methods.
PO3: Design/ development of solutions- Design solutions for well-defined technical problems
and assist with the design of systems components or processes to meet specified needs.
PO4: Engineering Tools, Experimentation and Testing- Apply modern engineering tools and
appropriate technique to conduct standard tests and measurements.
PO5: Engineering Practices for society, sustainability and environment- Apply appropriate
technology in context of society, sustainability, environment and ethical practices.
PO7: Life-long learning- Ability to analyze individual needs and engage in updating in the context
of technological changes.
COURSE OUTCOME
After the completion of the course the students will be able to
CO1- Analyze the function of different layers of layered architecture.
CO2- Compare the various transmission media & data and identify the transmission
impairments.
CO3- Draw the electrical signals for data transmission using various encoding
techniques.
CO4- Apply different techniques for solving the problems of error correction and
detection.
CO5- Select the suitable switching & routing technique and internetworking device
and explain its operation.
UNIT-1: NETWORK & PROTOCOL
1.1 Data communication refers to the exchange of data between a source and a receiver via form of
transmission media such as a wire cable. Data communication is said to be local if communicating
devices are in the same building or a similarly restricted geographical area.
The meanings of source and receiver are very simple. The device that transmits the data is
known as source and the device that receives the transmitted data is known as receiver. Data
communication aims at the transfer of data and maintenance of the data during the process but not
the actual generation of the information at the source and receiver.
1. Delivery:
The system must deliver data to the exact destination. Data must not be received by other
devices than the target device.
2. Accuracy:
The system must deliver data to the destination in a way that the target device receives the
data accurately. If the protocol needs to alter the while in transmission, it must alter it back
to its original form before representing it to the target device. The accuracy must be
maintained.
3. Timeliness:
The system must deliver data in timely manner. Data delivered late can become useless. Data
must be delivered as they are produced, in the order they are produced and without any
significant delay.
4. Jitter:
Jitter refers to the variation of packet arrival time. Data is sent as packets, that is, a fixed
amount of the whole data is sent in each to turn. These packets get joined back in the target
device to represent the complete data as it is. Each packet is sent with a predefined delay or
acceptable amount delay. If packets are sent without maintaining the predefined delay then
an uneven quality in the data might result.
Information can be in the form of text, numbers, images, audio, and video.
Text
Text symbols are represented with a sequence of bits 0 or 1. Each sequence is called a code,
and the process is called coding.
Number
Numbers are also represented with a sequence of 0 and 1. ASCII is not used for number
representation
Images
An image is also represented with a sequence of 0 and 1. A digital image is made up of small
units called pixels. Each pixel is assigned a bit pattern whose size depends on the nature of
the image.
Audio
A sound which lies within the human hearing frequency range of 20 to 20000 Hertz is called
audio. The sound is recorded with a microphone and then digitized to represent in the form
of bit-patterns. Its transmitted form is called an audio signal.
Video
Flashing a sequence of images on the display screen which gives us a sensation of moving
objects is called a video. A video is recorded with a camera and transmitted as a video signal.
1.1.4 Data Flow-
1. Simplex
2. Half duplex
3. Full duplex
1. Simplex:
In simplex data flow only in one direction. Its mean in simplex if two devices are
connected only one device will send data the other device will only receive data it cannot
send.
In this type channel will use all of its capacity only in sending data.
Example of this type is: Mouse (it can only input data etc)
2. Half duplex:
In this type of data flow, data will flow in both directions but not at the same time.
For example: If two devices are connected both of them can send information to each other
but not at the same time. When one device will send data the other will receive it cannot send
back at the same time after receiving it can send data.
In half duplex channel will use all of its capacity for each direction. So this type will be used
in the communication in which there is no need of response at the same time. Example of
this type is Walkie Talkies.
3. Full Duplex:
In Full Duplex data will flow in both directions at the same time. For Example: If two
devices are connected in communication both of them can send and receive data at the same
time.
In Full Duplex channel will divide all of its capacity in both directions. Full Duplex is
used when communication is required in both directions at the same time. Example of Full
Duplex is calling on mobile phone etc.
1.2 NETWORK-
A network consists of two or more computers that are linked in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The
computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.
The term topology refers that way in which the end points, or stations, attached to the
network are interconnected or it is the arrangements of systems in a computer network. It
can be either physical or logical. The physical topology refers that, how a network is placed
in a physical way and it will include the devices, installation and location. Logical topology
refers that how a data transfers in a network as opposed to its design.
The network topology can be categorized into bus, ring, star, tree and mesh.
Hybrid networks (They are the complex networks, which can be built of two or more
topologies together).
Bus Topology
A bus topology is characterized by the use of a multi-point medium. A long and single cable
acts as a backbone to connect all the devices in a network. In a bus topology, all computers
are stations attaching through the tap (an interfacing hardware to connect to the network)
and it connects directly to the bus network. Data’s are transmitting and receiving to the bus,
by the duplex actions between the tap and the device. Devices in the bus topology send a
broadcast message to the other device for communications. But the proposed device can only
accepts and processes the messages.
Advantages
Disadvantages
The cable length will limited and there by limits the number of stations.
The main cable (backbone cable) fails, and then the entire network will fail.
It is very difficult to trouble shoot.
Maintenance cost is very high in a long run.
Terminators are required for both the ends of the cable.
Ring topology
The ring topology is the network consists of dedicated point to point connection. Signals
passing through ring in a single direction until they reach to its final destination. It may be
clock wise or anti clock wise. Data’s are transmitted in the form of frames. These topologies
are used in school campuses and some office buildings.
Advantages
Disadvantages
Star Topology
Star topology is the network in which each station is directly connected to a central
connecting node called hub. In star topology all the devices are not directly connected to one
another. All the devices are connecting to the central server (switching hub). This topology
does not enable the direct traffic between the devices in the network. A controller act as the
interface between the devices. This type of topology is used in local area networks (LAN) and
sometimes high speed LAN often uses a star topology with central hub.
Advantages
If anyone connection is fails in the network, it will not affect the entire network.
Only that connection or link affected.
It is easy to identify the fault and fault isolation.
Easy to expand the network in the star topology.
No failure to the network when connecting or removing devices.
It is very easy to manage because of its simplicity in the function.
Disadvantages
In a star topology, if the central connecting device goes down, the entire network
will fails.
It requires more cable length compared to the linear bus topology.
Star topology is more expensive than bus topology because of the connection ports
like hub.
Tree Topology
The layout of the tree topology is beginning at the head end. These layouts have many
branches and these are quite complex layouts in the topology. Any transmission from the
device is going through the medium and it can receive by all other devices in the tree
topology network. Tree Topology will give the expansion of the existing network.
Advantages
Disadvantages
It is more expensive because more hubs are required to install the network.
Tree topology is entirely depends upon the backbone line, if it fails then the entire
network would fail.
It is very difficult to configure and wire than other network topologies.
In a tree topology, the length of network depends on the type of cable being used.
Mesh Topology
In a mesh topology, every device has connected to each other or a dedicated point to point
link to every other device. (Dedicated term means that the traffic links only between the two
devices it connects).
To find the number of physical links in a fully connected mesh network with n nodes, we first
consider that each node must be connected to other node. Node 1 must be connected to n-
1nodes, node 2 must be connected to n-1nodes, and finally node n must be connected n-1
nodes. If each physical link in the network can allow the communication in both directions,
we can divide the number of links by 2. In other words we can say that in a mesh topology,
we need n (n-1)/2.
Suppose if we are connecting 15 nodes in a mesh topology, then the number of cables
required;
= 15*14/2
= 15*7
= 105
Therefore, the total number of cables required for connecting 15 nodes = 105.
Advantages
There is no traffic problem because of the dedicated link in the mesh network.
Mesh topology is very strong. If any link becomes not active it does not deactivate
the entire system.
Point-to-point links make full identification and fault isolation easy.
Security or privacy for data travels along the dedicated line.
Network can be expanded without any disruptions to the users.
Disadvantages
Hybrid Topology
It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Advantages
Reliable as Error detecting and troubleshooting is easy.
Effective.
Scalable as size can be increased easily.
Flexible.
Disadvantages
Complex in design.
Costly.
Applications
One of the computer in a network can become a server serving all the remaining
computers called clients. Software can be stored on the server and it can be used by
the remaining clients.
Connecting locally all the workstations in a building to let them communicate with
each other locally without any internet access.
Sharing common resources like printers etc. are some common applications of LAN.
Advantages
1. Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and hard
disks can be shared with the help of local area networks. This reduces cost and hardware
purchases.
2. Software Applications Sharing: It is cheaper to use same software over network instead
of purchasing separate licensed software for each client a network.
3. Easy and Cheap Communication: Data and messages can easily be transferred over
networked computers.
4. Centralized Data: The data of all network users can be saved on hard disk of the server
computer. This will help users to use any workstation in a network to access their data.
Because data is not stored on workstations locally.
5. Data Security: Since, data is stored on server computer centrally, it will be easy to manage
data at only one place and the data will be more secure too.
6. Internet Sharing: Local Area Network provides the facility to share a single internet
connection among all the LAN users. In Net Cafes, single internet connection sharing
system keeps the internet expenses cheaper.
Disadvantages
1. High Setup Cost: Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
2. Privacy Violations: The LAN administrator has the rights to check personal data files of
each and every LAN user. Moreover he can check the internet history and computer use
history of the LAN user.
3. Data Security Threat: Unauthorized users can access important data of an organization
if centralized data repository is not secured properly by the LAN administrator.
4. LAN Maintenance Job: Local Area Network requires a LAN Administrator because, there
are problems of software installations or hardware failures or cable disturbances in Local
Area Network. A LAN Administrator is needed at this full time job.
5. Covers Limited Area: Local Area Network covers a small area like one office, one building
or a group of nearby buildings.
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN
and uses the similar technology as LAN. It is designed to extend over the entire city. It can be
means to connecting a number of LANs into a larger network or it can be a single cable. It is
mainly hold and operated by single private company or a public company.
Characteristics of MAN
It generally covers towns and cities (50 km)
Communication medium used for MAN are optical fibers, cables etc.
Advantages of MAN
1. Extremely efficient and provide fast communication via high-speed carriers, such as fiber
optic cables.
2. It provides a good back bone for large network and provides greater access to WANs.
The dual bus used in MAN helps the transmission of data in both directions simultaneously.
3. A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
1. More cable required for a MAN connection from one place to another.
2. It is difficult to make the system secure from hackers and industrial espionage (spying)
graphical regions.
Characteristics
1. It generally covers large distances (states, countries, continents).
2. Communication medium used are satellite, public telephone networks which are
connected by routers.
Advantages
1. It covers a large geographical area. Suppose if the branch of our office is in a different city
then we can connect with them through WAN. The internet provides a leased line through
which we can connect with another branch.
2. Shares software and resources with connecting workstations.
3. Messages can be sent very quickly to anyone else on the network. These messages can
have picture, sounds or data included with them (called attachments).
4. Expensive things (such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
Disadvantages
1. Need a good firewall to restrict outsiders from entering and disrupting the network.
2. Setting up a network can be an expensive, slow and complicated. The bigger the network
the more expensive it is.
3. Once set up, maintaining a network is a full-time job which requires network supervisors
and technicians to be employed.
4. Security is a real issue when many different people have the ability to use information
from other computers. Protection against hackers and viruses adds more complexity and
expense.
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply
using wireless technologies such as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
o OSI stands for Open System Interconnection is a reference model that describes
how information from a software application in one computer moves through a
physical medium to the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues,
and they are implemented only in the software.
o The lower layer of the OSI model deals with the data transport issues. The data link
layer and the physical layer are implemented in hardware and software. The
physical layer is the lowest layer of the OSI model and is closest to the physical
medium. The physical layer is mainly responsible for placing the information on the
physical medium.
There are the seven OSI layers. Each layer has different functions. A list of seven layers are
given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical layer
o The main functionality of the physical layer is to transmit the individual bits from
one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
Functions of a Physical layer:
o Line Configuration: It defines the way how two or more devices can be connected
physically.
o Data Transmission: It defines the transmission mode whether it is simplex, half-
duplex or full-duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the information.
Data-Link Layer
o Framing: The data link layer translates the physical's raw bit stream into packets
known as Frames. The Data link layer adds the header and trailer to the frame. The
header which is added to the frame contains the hardware destination and source
address.
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned
in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so
that no data get corrupted. It ensures that the transmitting station such as a server
with higher processing speed does not exceed the receiving station, with lower
processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occur, then
the receiver sends the acknowledgment for the retransmission of the corrupted
frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to determine
which device has control over the link at a given time.
Network Layer
o It is a layer 3 of OSI model. It works for the transmission of data from one node to
the other located in different networks.
o It takes care of packet routing i.e, selection of the shortest path to transmit the
packet, from the number of routers available.
o The sender and receiver’s IP address are placed in the header of the packet.
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order
in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
Session Layer
o Dialog control: The session layer allows two systems to start communication with
each other in half duplex or full duplex.
o Synchronization: Session layer adds some checkpoints when transmitting the data
in a sequence. If some error occurs in the middle of the transmission of data, then the
transmission will take place again from the checkpoint. This process is known as
Synchronization and recovery.
Presentation Layer
The presentation layer is a Layer 6 of OSI model. The processes in two systems exchange
the information in the form of character strings, numbers and so on.
Application Layer
The application layer is a Layer 7 of OSI model. Application layer is implemented by the
network applications. These applications produce the data, which has to be transferred
over the network.
1.4.2 TCP/IP-
TCP/IP model
Here, hierarchical means that each upper-layer protocol is supported by two or more
lower-level protocols.
Functions of TCP/IP layers:
Internet Layer
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
ARP Protocol
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data
which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
Application Layer
Transmission Terminology-
Guided media- In guided media, the waves are guided along a physical path, examples of
guided media are twisted pair, coaxial cable and optical fiber.
Unguided media- Unguided media also called wireless, provide means for transmitting
electromagnetic waves but do not guide them.
Point to Point- A guided transmission medium is point to point if it provides a direct link
between two devices and those are the only two devices sharing the medium.
Multipoint- A guided transmission medium is multipoint if more than two devices share the
same medium.
Simplex- In simplex transmission signals are transmitted in only one direction. One
transmitter and the other is receiver.
Half duplex- In half duplex operation both station may transmit or receive, but only one at
a time.
Full duplex- In full duplex operation both stations may transmit simultaneously.
An analog signal is one in which the signal intensity varies in a smooth fashion over
time. In other words there are no breaks or discontinuities in the signal.
A digital signal is one in which the signal intensity maintains a constant level for
some period of time and then abruptly changes to another constant level.
Periodic signal is a signal in which the same signal pattern repeats over time.
Where the constant T is the period of the signal otherwise, a signal is aperiodic.
Absolute Bandwidth- The absolute bandwidth of a signal is the width of the spectrum.
Effective Bandwidth- The band of frequencies which contains most of the energy of the
signal.
Consider the case binary data is encoded into digital signal, and to be transmitted by a
transmission medium.
Digital signal contains an infinite bandwidth but a real transmission medium has a finite
bandwidth, which can limit the data rate that can be carried on the transmission
medium.
Limited bandwidth creates distortions of the input signal, which makes the task of
interpreting the received signal more difficult.
The more limited bandwidth, the greater the distortion and the greater the potential
for error by the receiver.
The high the data rate of a signal, the greater is its effective bandwidth.
The greater the bandwidth of a transmission system, the higher is the data rate that can
be transmitted.
ANALOG AND DIGITAL DATA
Analog data take on continuous values in some interval. For example, voice and
video are continuously varying patterns of intensity. Most data collected by sensors, such as
temperature and pressure, are continuous valued.
Digital data take on discrete values; examples are text and integers. The most
familiar example of analog data is audio, which, in the form of acoustic sound waves, can be
perceived directly by human beings
Another common example of analog data is video. Here it is easier to characterize the
data in terms of the TV screen (destination) rather than the original scene (source) recorded
by the TV camera. To produce a picture on the screen, an electron beam scans across the
surface of the screen from left to right and top to bottom. For black-and-white television, the
amount of illumination produced (on a scale from black to white) at any point is proportional
to the intensity of the beam as it passes that point. Thus at any instant in time the beam takes
on an analog value of intensity to produce the desired brightness at that point on the screen.
Analog and Digital Signals
In a communications system, data are propagated from one point to another by means of
electromagnetic signals.
An analog signal is a continuously varying electromagnetic wave that may be
propagated over a variety of media, depending on spectrum; examples are wire media, such
as twisted pair and coaxial cable; fiber optic cable; and unguided media, such as atmosphere
or space propagation.
A digital signal is a sequence of voltage pulses that may be transmitted over a wire
medium; for example, a constant positive voltage level may represent binary 0 and a constant
negative voltage level may represent binary 1. The principal advantages of digital signaling
are that it is generally cheaper than analog signaling and is less susceptible to noise
interference. The principal disadvantage is that digital signals suffer more from attenuation
than do analog signals.
Data and Signals
Analog signals used to represent analog data and digital signals used to represent
digital data. Generally, analog data are a function of time and occupy a limited frequency
spectrum; such data can be represented by an electromagnetic signal occupying the same
spectrum. Digital data can be represented by digital signals, with a different voltage level for
each of the two binary digits.
Digital data can also be represented by analog signals by use of a modem
(modulator/demodulator). The modem converts a series of binary (two-valued) voltage
pulses into an analog signal by encoding the digital data onto a carrier frequency. The
resulting signal occupies a certain spectrum of frequency centered about the carrier and may
be propagated across a medium suitable for that carrier. The most common modems
represent digital data in the voice spectrum and hence allow those data to be propagated
over ordinary voice-grade telephone lines.
At the other end of the line, another modem demodulates the signal to recover the
original data. In an operation very similar to that performed by a modem, analog data can be
represented by digital signals. The device that performs this function for voice data is a codec
(coder-decoder). In essence, the codec takes an analog signal that directly represents the
voice data and approximates that signal by a bit stream. At the receiving end, the bit stream
is used to reconstruct the analog data.
Both analog and digital signals may be transmitted on suitable transmission media.
Analog transmission is a means of transmitting analog signals without regard to
their content; the signals may represent analog data (e.g., voice) or digital data (e.g., binary
data that pass through a modem). In either case, the analog signal will become weaker
(attenuate) after a certain distance. To achieve longer distances, the analog transmission
system includes amplifiers that boost the energy in the signal. Unfortunately, the amplifier
also boosts the noise components. With amplifiers cascaded to achieve long distances, the
signal becomes more and more distorted. For analog data, such as voice, quite a bit of
distortion can be tolerated and the data remain intelligible. However, for digital data,
cascaded amplifiers will introduce errors.
Digital transmission, in contrast, assumes a binary content to the signal. A digital
signal can be transmitted only a limited distance before attenuation, noise, and other
impairments endanger the integrity of the data. To achieve greater distances, repeaters are
used. A repeater receives the digital signal, recovers the pattern of 1s and 0s, and retransmits
a new signal. Thus the attenuation is overcome.
2.3 TRANSMISSION IMPAIRMENT
In the data communication system, analog and digital signals go through the transmission
medium. Transmission media are not ideal. There are some imperfections in transmission
mediums. So, the signals sent through the transmission medium are also not perfect. This
imperfection cause signal impairment.
It means that signals that are transmitted at the beginning of the medium are not the same
as the signals that are received at the end of the medium that is what is sent is not what is
received. These impairments tend to deteriorate the quality of analog and digital signals.
Consequences
Causes of impairment
1. Attenuation
2. Distortion
3. Noise
1) Attenuation
The strength of a signal falls off with distance over any transmission medium. For
guided medium, this reduction in strength or attenuation is generally exponential and
thus expressed as a constant number of decibels per unit distance.
For unguided medium, attenuation is a complex function of distance.
Attenuation introduces three considerations for the transmission engineer-
o A received signal must have sufficient strength so that the electronic circuitry
in the receiver can detect the signal.
o The signal must maintain a level sufficiently higher than noise to be received
without error.
o Attenuation varies with frequency.
The first and second problems are dealt with by attention to signal strength and the
use of amplifiers or repeaters.
The third problem is noticeable for analog signals. Because the attenuation varies as
a function of frequency. To overcome this problem, techniques are available for
equalizing attenuation across a band of frequencies. This is commonly done for voice
grade telephone lines by using loading coils.
2) Distortion
Each component of frequency has its propagation speed traveling through a medium
and therefore, different components have different delay in arriving at the final
destination.
It means that signals have different phases at the receiver than they did at the source.
This figure shows the effect of distortion on a composite signal:
3) Noise
Noise is another problem. There are some random or unwanted signals mix up with the
original signal is called noise. Noises can corrupt the signals in many ways along with the
distortion introduced by the transmission media.
a. Thermal noise
b. Intermodulation noise
c. Crosstalk
d. Impulse noise
a) Thermal noise
The thermal noise is random motion of electrons in a conductor that creates an extra signal
not originally sent by the transmitter.
It is also known as white noise because it is distributed across the entire spectrum (as the
frequency encompass over a broad range of frequencies).
b) Intermodulation noise
When more than one signal share a single transmission channel, intermodulation noise is
generated.
For instance, two signals S1 and S2 will generate signals of frequencies (S1 + S2) and (s1 -
S2), which may interfere with the signals of the same frequencies sent by the sender. Due to
If nonlinearity present in any part of the communication system, intermodulation noise is
introduced.
c) Cross talk
Just like in telephone system, it is a common experience to hear conversation of other people
in the background. This is known as cross talk.
d) Impulse noise
Impulse noise is irregular pulses or spikes( a signal with high energy in a very short period)
generated by phenomena like that comes from power lines, lightning, spark due to loose
contact in electric circuits and so on.
It is defined as the physical medium through which the signals are transmitted. It is also
known as Bounded media.
1. TWISTED PAIR:
Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable.
The frequency range for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
One of the wires is used to carry signals to the receiver and other is used only as a
ground reference. The receiver uses the difference between the two.
Twisted pair cables are used in telephone lines to provide voice and data channels.
Shielded twisted pair has a metal casing. It improves the quality of cable by
preventing the penetration of noise or cross talk. It is bulkier and more expensive.
2. COAXIAL CABLE
o Coaxial cable carries signals of higher frequency ranges than those in twisted pair
cable.
o Coaxial cable has a central core conductor of solid or stranded wire enclosed in an
insulating sheath, which is encased in an outer conductor of metal foil.
o The outer metallic wrapping serves both as a shield against noise and as the second
conductor, which completes the circuit.
o This outer conductor is also enclosed in an insulating sheath and the whole cable is
protected by a plastic cover.
o Coaxial cable was widely used in analog telephone networks where a single coaxial
network could carry 10,000 voice signals.
o Cable TV also use coaxial cables and it is also used in LANs.
3. FIBRE OPTIC
o A fiber optic cable is made of glass or plastic and transmits signals in form of light.
o A glass or plastic core is surrounded by a cladding of less dense glass or plastic. A
protective coating given on the cladding consisting of plastic is known as a jacket.
o Fiber optics provide faster data transmission than copper wires.
o It supports two modes for propagating light along optical channels i.e, Single mode
and multi-mode.
o Single mode is so named because single beam from a light source move through the
core.
o Multimode is so named because multiple beams from a light source move through
the core in different paths.
o Greater Bandwidth: The fiber optic cable provides more bandwidth as compared
copper. Therefore, the fiber optic carries more data as compared to copper cable.
o Faster speed: fiber optic cable carries the data in the form of light. This allows the
fiber optic cable to carry the signals at a higher speed.
o Longer distances: The fiber optic cable carries the data at a longer distance as
compared to copper cable.
o Better reliability: The fiber optic cable is more reliable than the copper cable as it is
immune to any temperature changes while it can cause obstruct in the connectivity
of copper cable.
o Thinner and sturdier: fiber optic cable is thinner and lighter in weight so it can
withstand more pull pressure than copper cable.
Disadvantages-
o Installation and maintenance is difficult.
o Cost is high.
1. Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all the directions
of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.
o The range in frequencies of radio waves is from 3 KHz to 1 GHz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e.,
the wave sent by the sending antenna can be received by any receiving antenna.
o Radio waves can penetrate walls. It is an advantage because an AM radio can receive
signal inside a building.
Applications:
o A Radio wave is useful for multicasting when there is one sender and many
receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
2. Microwaves-
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves.
Microwaves are unidirectional. When an antenna transmits microwaves, they can be
narrowly focused. This means that the sending and receiving antenna need to be
aligned.
Microwave propagation is line of sight. Since the towers with the mounted antenna
need to be in direct sight of each other. Repeaters are often needed for long distance
communication.
Very high frequency microwaves cannot penetrate walls. This characteristic can be a
disadvantage of receivers that are inside buildings.
Two types of antennas are used for microwave communications i.e, the Parabolic dish
and the horn.
Applications-
Microwaves due to their unidirectional properties are very useful when
unicast communication is needed between the sender and receiver.
3. Infrared
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication
in one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
UNIT- 3: DATA ENCODING
3.1 DATA ENCODING-
Encoding is the process of converting the data or a given sequence of characters,
symbols, alphabets etc. into a specified format, for the secured transmission of data.
The data encoding technique is divided into the following types, depending upon the
type of data conversion.
Digital data to digital signal
Analog data to digital signal
Digital data to analog signal
Analog data to analog signal
To convert digital data into digital signals it can be done in two ways, line coding and block
coding. For all communications, line coding is necessary whereas block coding is optional.
Unipolar scheme –
In this scheme, all the signal levels are either above or below the axis.
Non return to zero (NRZ) –
It is unipolar line coding scheme in which positive voltage defines bit 1 and the
zero voltage defines bit 0. Signal does not return to zero at the middle of the bit thus it is
called NRZ. For example: Data = 10110.
But this scheme uses more power as compared to polar scheme to send one bit per unit
line resistance. Moreover for continuous set of zeros or ones there will be self-
synchronization and base line wandering problem.
Polar schemes –
In polar schemes, the voltages are on the both sides of the axis.
NRZ-L and NRZ-I –
These are somewhat similar to unipolar NRZ scheme but here we use two levels of
amplitude (voltages). For NRZ-L(NRZ-Level), the level of the voltage determines the value
of the bit, typically binary 1 maps to logic-level high, and binary 0 maps to logic-level low,
and for NRZ-I(NRZ-Invert), two-level signal has a transition at a boundary if the next bit
that we are going to transmit is a logical 1, and does not have a transition if the next bit that
we are going to transmit is a logical 0.
Note – For NRZ-I we are assuming in the example that previous signal before starting of
data set “01001110” was positive. Therefore, there is no transition at the beginning and
first bit “0” in current data set “01001110” is starting from +V. Example: Data = 01001110.
Comparison between NRZ-L and NRZ-I: Baseline wandering is a problem for both of them,
but for NRZ-L it is twice as bad as compared to NRZ-I. This is because of transition at the
boundary for NRZ-I (if the next bit that we are going to transmit is a logical 1). Similarly
self-synchronization problem is similar in both for long sequence of 0’s, but for long
sequence of 1’s it is more severe in NRZ-L.
Return to zero (RZ) –
One solution to NRZ problem is the RZ scheme, which uses three values positive,
negative and zero. In this scheme signal goes to 0 in the middle of each bit.
Note – The logic we are using here to represent data is that for bit 1 half of the signal is
represented by +V and half by zero voltage and for bit 0 half of the signal is represented by
-V and half by zero voltage. Example: Data = 01001.
In this scheme there are three voltage levels positive, negative, and zero. The
voltage level for one data element is at zero, while the voltage level for the other element
alternates between positive and negative.
Alternate Mark Inversion (AMI) – A neutral zero voltage represents binary 0.
Binary 1’s are represented by alternating positive and negative voltages.
Pseudo ternary – Bit 1 is encoded as a zero voltage and the bit 0 is encoded as
alternating positive and negative voltages i.e., opposite of AMI scheme. Example: Data
= 010010.
The bipolar scheme is an alternative to NRZ. This scheme has the same signal rate as NRZ,
but there is no DC component as one bit is represented by voltage zero and other
alternates every time.
Multilevel Scheme-
2BIQ-
In two binary one quaternary, uses data patterns of size two and encodes the two bit
patterns as one signal element belonging to a four level signal.
Ex.- Data- 0011011001
3.2.3. SCRAMBLING-
Scrambling is a technique that does not increase the number of bits and does provide
synchronization. Problem with technique like Bipolar AMI (Alternate Mark Inversion) is that
continuous sequence of zero’s create synchronization problems one solution to this is
Scrambling.
There are two common scrambling techniques:
1. B8ZS(Bipolar with 8-zero substitution)
2. HDB3(High-density bipolar3-zero)
B8ZS (Bipolar with 8-zero substitution) –
This technique is similar to Bipolar AMI except when eight consecutive zero-level voltages
are encountered they are replaced by the sequence,”000VB0VB”.
Note –
V (Violation), is a non-zero voltage which means signal have same polarity as the
previous non-zero voltage. Thus it is violation of general AMI technique.
B (Bipolar), also non-zero voltage level which is in accordance with the AMI rule (i.e.,
opposite polarity from the previous non-zero voltage).
Example: Data = 100000000
Note – Both figures (left and right one) are correct, depending upon last non-zero voltage
signal of previous data sequence (i.e., sequence before current data sequence “100000000”).
HDB3(High-density bipolar3-zero) –
In this technique four consecutive zero-level voltages are replaced with a sequence “000V”
or “B00V”.
Rules for using these sequences:
If the number of nonzero pulses after the last substitution is odd, the substitution
pattern will be “000V”, this helps maintaining total number of nonzero pulses even.
If the number of nonzero pulses after the last substitution is even, the substitution
pattern will be “B00V”. Hence even number of nonzero pulses is maintained again.
Example: Data = 1100001000000000
Explanation – After representing first two 1’s of data we encounter four consecutive zeros.
Since our last substitutions were two 1’s (thus number of non-zero pulses is even).So, we
substitute four zeros with “B00V”.
1. Amplitude Shift keying – Amplitude Shift Keying is a technique in which carrier signal is
analog and data to be modulated is digital. The amplitude of analog carrier signal is modified
to reflect binary data.
The binary signal when modulated gives a zero value when the binary data represents 0
while gives the carrier output when data is 1. The frequency and phase of the carrier signal
remain constant.
The most common technique to change an analog signal to digital data is called pulse code
modulation (PCM). A PCM encoder has the following three processes:
1. Sampling
2. Quantization
3. Encoding
Low pass filter:
The low pass filter eliminates the high frequency components present in the input analog
signal to ensure that the input signal to sampler is free from the unwanted frequency
components. This is done to avoid aliasing of the message signal.
1. Sampling – The first step in PCM is sampling. Sampling is a process of measuring the
amplitude of a continuous-time signal at discrete instants, converting the continuous
signal into a discrete signal. There are three sampling methods:
(i) Ideal Sampling: In ideal sampling also known as Instantaneous sampling pulses
from the analog signal are sampled. This is an ideal sampling method and cannot be
easily implemented.
Nyquist Theorem:
One important consideration is the sampling rate or frequency. According to the
Nyquist theorem, the sampling rate must be at least 2 times the highest frequency
contained in the signal. It is also known as the minimum sampling rate and given by:
Fs =2*fm
2. Quantization –
The result of sampling is a series of pulses with amplitude values between the
maximum and minimum amplitudes of the signal. The set of amplitudes can be infinite
with non-integral values between two limits.
The following are the steps in Quantization:
1. We assume that the signal has amplitudes between Vmax and Vmin
2. We divide it into L zones each of height d where,
d= (Vmax- Vmin)/ L
3. The value at the top of each sample in the graph shows the actual amplitude.
4. The normalized pulse amplitude modulation (PAM) value is calculated using the
formula amplitude/d.
5. After this we calculate the quantized value which the process selects from the
middle of each zone.
6. The Quantized error is given by the difference between quantized value and
normalized PAM value.
7. The Quantization code for each sample based on quantization levels at the left of
the graph.
3. Encoding–
The digitization of the analog signal is done by the encoder. After each sample is
quantized and the number of bits per sample is decided, each sample can be changed
to an n bit code. Encoding also minimizes the bandwidth used.
b. DELTA MODULATION:
Since PCM is a very complex technique, other techniques have been developed to reduce
the complexity of PCM. The simplest is delta Modulation. Delta Modulation finds the change
from the previous value.
Modulator – The modulator is used at the sender site to create a stream of bits from an
analog signal. The process records a small positive change called delta. If the delta is
positive, the process records a 1 else the process records a 0. The modulator builds a
second signal that resembles a staircase. The input signal is then compared with this
gradually made staircase signal.
1. AMPLITUDE MODULATION:
The modulation in which the amplitude of the carrier wave is varied according to the
instantaneous amplitude of the modulating signal keeping phase and frequency as constant.
The figure below shows the concept of amplitude modulation:
2. FREQUENCY MODULATION –
The modulation in which the frequency of the carrier wave is varied according to the
instantaneous amplitude of the modulating signal keeping phase and amplitude as constant.
The figure below shows the concept of frequency modulation:
FM bandwidth:
1. The bandwidth of a frequency modulated signal varies with both deviation and
modulating frequency.
If modulating frequency (Mf) 0.5, wide band Fm signal.
2. For a narrow band Fm signal, bandwidth required is twice the maximum frequency of
the modulation, however for a wide band Fm signal the required bandwidth can be very
much larger, with detectable sidebands spreading out over large amounts of the
frequency spectrum.
3. PHASE MODULATION:
The modulation in which the phase of the carrier wave is varied according to the
instantaneous amplitude of the modulating signal keeping amplitude and frequency as
constant. The figure below shows the concept of frequency modulation:
There are two types of serial transmission-synchronous and asynchronous both these
transmissions use 'Bit synchronization'
Bit Synchronization is a function that is required to determine when the beginning and end
of the data transmission occurs.
Bit synchronization helps the receiving computer to know when data begin and end during
a transmission. Therefore bit synchronization provides timing control.
Asynchronous Transmission
• Asynchronous transmission sends only one character at a time where a character is either
a letter of the alphabet or number or control character i.e. it sends one byte of data at a time.
• Bit synchronization between two devices is made possible using start bit and stop bit.
• Start bit indicates the beginning of data i.e. alerts the receiver to the arrival of new group
of bits. A start bit usually 0 is added to the beginning of each byte.
• Stop bit indicates the end of data i.e. to let the receiver know that byte is finished, one or
more additional bits are appended to the end of the byte. These bits, usually 1s are called
stop bits.
Addition of start and stop increase the number of data bits. Hence more bandwidth is
consumed in asynchronous transmission.
• There is idle time between the transmissions of different data bytes. This idle time is also
known as Gap
• The gap or idle time can be of varying intervals. This mechanism is called Asynchronous,
because at byte level sender and receiver need not to be synchronized. But within each byte,
receiver must be synchronized with the incoming bit stream.
1. Asynchronous transmission is well suited for keyboard type-terminals and paper tape
devices. The advantage of this method is that it does not require any local storage at the
terminal or the computer as transmission takes place character by character.
2. Asynchronous transmission is best suited to Internet traffic in which information is
transmitted in short bursts. This type of transmission is used by modems.
4. The transmission can start as soon as data byte to be transmitted becomes available.
1. This method is less efficient and slower than synchronous transmission due to the
overhead of extra bits and insertion of gaps into bit stream.
2. Successful transmission inevitably depends on the recognition of the start bits. These bits
can be missed or corrupted.
Synchronous Transmission
• In this method bit stream is combined into longer frames that may contain multiple bytes.
• Since the various bytes are placed on the link without any gap, it is the responsibility of
receiver to separate the bit stream into bytes so as to reconstruct the original information.
• In order to receive the data error free, the receiver and sender operates at the same clock
frequency.
1. This method is faster as compared to asynchronous as there are no extra bits (start bit &
stop bit) and also there is no gap between the individual data bytes.
2. The sender and receiver have to operate at the same clock frequency. This requires proper
synchronization which makes the system complicated.
Whenever a message is transmitted, it may get scrambled by noise or data may get
corrupted. To avoid this, we use error-detecting codes which are additional data added to a
given digital message to help us detect if any error has occurred during transmission of the
message.
Basic approach used for error detection is the use of redundancy bits, where additional bits
are added to facilitate detection of errors.
Some popular techniques for error detection are:
1. Simple Parity check
2. Two-dimensional Parity check
3. Checksum
4. Cyclic redundancy check
1. Simple Parity check
Blocks of data from the source are subjected to a check bit or parity bit generator form,
where a parity of :
1 is added to the block if it contains odd number of 1’s, and
0 is added if it contains even number of 1’s
This scheme makes the total number of 1’s even, that is why it is called even parity checking.
2. Two-dimensional Parity check
Parity check bits are calculated for each row, which is equivalent to a simple parity check
bit. Parity check bits are also calculated for all columns, then both are sent along with the
data. At the receiving end these are compared with the parity bits calculated on the
received data.
3. Checksum
In checksum error detection scheme, the data is divided into k segments each of m bits.
In the sender’s end the segments are added using 1’s complement arithmetic to get the
sum. The sum is complemented to get the checksum.
The checksum segment is sent along with the data segments.
At the receiver’s end, all received segments are added using 1’s complement arithmetic
to get the sum. The sum is complemented.
If the result is zero, the received data is accepted; otherwise discarded.
Error Correction
Error Correction codes are used to detect and correct the errors when data is transmitted
from the sender to the receiver.
o Backward error correction: Once the error is discovered, the receiver requests the
sender to retransmit the entire data unit.
o Forward error correction: In this case, the receiver uses the error-correcting code
which automatically corrects the errors.
A single additional bit can detect the error, but cannot correct it.
For correcting the errors, one has to know the exact position of the error. For example, If
we want to calculate a single-bit error, the error correction code will determine which one
of seven bits is in error. To achieve this, we have to add some additional redundant bits.
Suppose r is the number of redundant bits and d is the total number of the data bits. The
number of redundant bits r can be calculated by using the formula:
2r>=d+r+1
The value of r is calculated by using the above formula. For example, if the value of d is 4,
then the possible smallest value that satisfies the above relation would be 3.
To determine the position of the bit which is in error, a technique developed by R.W
Hamming is Hamming code which can be applied to any length of the data unit and uses the
relationship between data units and redundant units.
Hamming Code
Parity bits: The bit which is appended to the original data of binary bits so that the total
number of 1s is even or odd.
Even parity: To check for even parity, if the total number of 1s is even, then the value of
the parity bit is 0. If the total number of 1s occurrences is odd, then the value of the parity
bit is 1.
Odd Parity: To check for odd parity, if the total number of 1s is even, then the value of
parity bit is 1. If the total number of 1s is odd, then the value of parity bit is 0.
o An information of 'd' bits are added to the redundant bits 'r' to form d+r.
o The location of each of the (d+r) digits is assigned a decimal value.
o The 'r' bits are placed in the positions 1,2,.....2k-1.
o At the receiving end, the parity bits are recalculated. The decimal value of the parity
bits determines the position of an error.
The number of redundant bits is 3. The three bits are represented by r1, r2, r4. The position
of the redundant bits is calculated with corresponds to the raised power of 2. Therefore,
their corresponding positions are 1, 21, 22.
1. The position of r1 = 1
2. The position of r2 = 2
3. The position of r4 = 4
The r1 bit is calculated by performing a parity check on the bit positions whose binary
representation includes 1 in the first position.
We observe from the above figure that the bit positions that includes 1 in the first position
are 1, 3, 5, 7. Now, we perform the even-parity check at these bit positions. The total
number of 1 at these bit positions corresponding to r1 is even, therefore, the value of the
r1 bit is 0.
Determining r2 bit
The r2 bit is calculated by performing a parity check on the bit positions whose binary
representation includes 1 in the second position.
We observe from the above figure that the bit positions that includes 1 in the second
position are 2, 3, 6, 7. Now, we perform the even-parity check at these bit positions. The
total number of 1 at these bit positions corresponding to r2 is odd, therefore, the value of
the r2 bit is 1.
Determining r4 bit
The r4 bit is calculated by performing a parity check on the bit positions whose binary
representation includes 1 in the third position.
We observe from the above figure that the bit positions that includes 1 in the third position
are 4, 5, 6, 7. Now, we perform the even-parity check at these bit positions. The total number
of 1 at these bit positions corresponding to r4 is even, therefore, the value of the r4 bit is
0.
Suppose the 4th bit is changed from 0 to 1 at the receiving end, then parity bits are
recalculated.
R1 bit
We observe from the above figure that the binary representation of r1 is 1100. Now, we
perform the even-parity check, the total number of 1s appearing in the r1 bit is an even
number. Therefore, the value of r1 is 0.
R2 bit
R4 bit
We observe from the above figure that the binary representation of r4 is 1011. Now, we
perform the even-parity check, the total number of 1s appearing in the r4 bit is an odd
number. Therefore, the value of r4 is 1.
o The binary representation of redundant bits, i.e., r4r2r1 is 100, and its
corresponding decimal value is 4. Therefore, the error occurs in a 4th bit position.
The bit value must be changed from 1 to 0 to correct the error.
Point-to-Point
A Point to Point Line Configuration Provide dedicated link between two devices use
actual length of wire or cable to connect the two end including microwave & satellite link.
Infrared remote control & tvs remote control.
The entire capacity of the channel is reserved for transmission between those two devices.
Most point-to-point line configurations use an actual length of wire or cable to connect the
two ends, but other options, such as microwave or satellite links, are also possible.
Point to point network topology is considered to be one of the easiest and most
conventional network topologies. It is also the simplest to establish and understand. To
visualize, one can consider point to point network topology as two phones connected end
to end for a two way communication
Multipoint Configuration
Multipoint Configuration also known as Multidrop line configuration one or more than
two specific devices share a single link capacity of the channel is shared.
More than two devices share the Link that is the capacity of the channel is shared now.
With shared capacity, there can be two possibilities in a Multipoint Line Config:
Spatial Sharing: If several devices can share the link simultaneously, its called
Spatially shared line configuration
Temporal (Time) Sharing: If users must take turns using the link , then its called
Temporally shared or Time Shared Line Configuration
When a data frame (Layer-2 data) is sent from one host to another over a single medium, it
is required that the sender and receiver should work at the same speed. That is, sender
sends at a speed on which the receiver can process and accept the data. What if the speed
(hardware/software) of the sender or receiver differs? If sender is sending too fast the
receiver may be overloaded, (swamped) and data may be lost.
• In this method of flow control, the sender sends a single frame to receiver & waits for an
acknowledgment.
• The next frame is sent by sender only when acknowledgment of previous frame is received.
• This process of sending a frame & waiting for an acknowledgment continues as long as the
sender has data to send.
• To end up the transmission sender transmits end of transmission (EOT) frame.
• The main advantage of stop & wait protocols is its accuracy. Next frame is transmitted only
when the first frame is acknowledged. So there is no chance of frame being lost.
• The main disadvantage of this method is that it is inefficient. It makes the transmission
process slow. In this method single frame travels from source to destination and single
acknowledgment travels from destination to source. As a result each frame sent and received
uses the entire time needed to traverse the link. Moreover, if two devices are distance apart,
a lot of time is wasted waiting for ACKs that leads to increase in total transmission time.
SLIDING WINDOW-
• In sliding window method, multiple frames are sent by sender at a time before needing an
acknowledgment.
• Multiple frames sent by source are acknowledged by receiver using a single ACK frame.
• Sliding window refers to an imaginary boxes that hold the frames on both sender and
receiver side.
• It provides the upper limit on the number of frames that can be transmitted before
requiring an acknowledgment.
• Frames may be acknowledged by receiver at any point even when window is not full on
receiver side.
• Frames may be transmitted by source even when window is not yet full on sender side.
• The windows have a specific size in which the frames are numbered modulo- n, which
means they are numbered from 0 to n-l. For e.g. if n = 8, the frames are numbered 0,
1,2,3,4,5,6, 7, 0, 1,2,3,4,5,6, 7, 0, 1, ....
• The size of window is n-1. For e.g. In this case it is 7. Therefore, a maximum of n-l frames
may be sent before an acknowledgment.
• When the receiver sends an ACK, it includes the number of next frame it expects to receive.
For example in order to acknowledge the group of frames ending in frame 4, the receiver
sends an ACK containing the number 5. When sender sees an ACK with number 5, it comes
to know that all the frames up to number 4 have been received.
• Therefore, the sliding window of sender shrinks from left when frames of data are sending.
The sliding window of the sender expands to right when acknowledgments are received.
• The sliding window of the receiver shrinks from left when frames of data are received. The
sliding window of the receiver expands to the right when acknowledgement is sent.
Error control in data link layer is the process of detecting and correcting data frames
that have been corrupted or lost during transmission.
In case of lost or corrupted frames, the receiver does not receive the correct data-frame and
sender is ignorant about the loss. Data link layer follows a technique to detect transit errors
and take necessary actions, which is retransmission of frames whenever error is detected or
frame is lost. The process is called Automatic Repeat Request (ARQ).
Phases in Error Control
The error control mechanism in data link layer involves the following phases:
Detection of Error − Transmission error, if any, is detected by either the sender or
the receiver.
Acknowledgment − acknowledgment may be positive or negative.
o Positive ACK − on receiving a correct frame, the receiver sends a positive
acknowledge.
o Negative ACK − on receiving a damaged frame or a duplicate frame, the
receiver sends a negative acknowledgment back to the sender.
Retransmission − the sender maintains a clock and sets a timeout period. If an
acknowledgment of a data-frame previously transmitted does not arrive before the
timeout, or a negative acknowledgment is received, the sender retransmits the frame.
Error Control Techniques
There are three main techniques for error control:
Go-Back-N ARQ
The working principle of this protocol is:
o The sender has buffers called sending window.
o The sender sends multiple frames based upon the sending-window size, without
receiving the acknowledgment of the previous ones.
o The receiver receives frames one by one. It keeps track of incoming frame’s sequence
number and sends the corresponding acknowledgment frames.
o After the sender has sent all the frames in window, it checks up to what sequence
number it has received positive acknowledgment.
o If the sender has received positive acknowledgment for all the frames, it sends next set
of frames.
o If sender receives NACK or has not receive any ACK for a particular frame, it retransmits
all the frames after which it does not receive any positive ACK.
Multiplexing is a technique used to combine and send the multiple data streams over a single
medium. The process of combining the data streams is known as multiplexing and hardware
used for multiplexing is known as a multiplexer.
Multiplexing is achieved by using a device called Multiplexer (MUX) that combines n input
lines to generate a single output line. Multiplexing follows many-to-one, i.e., n input lines and
one output line.
Why Multiplexing?
The transmission medium is used to send the signal from sender to receiver. The
medium can only have one signal at a time.
If there are multiple signals to share one medium, then the medium must be divided
in such a way that each signal is given some portion of the available bandwidth. For
example: If there are 10 signals and bandwidth of medium is100 units, then the 10
unit is shared by each signal.
When multiple signals share the common medium, there is a possibility of collision.
Multiplexing concept is used to avoid such collision.
Transmission services are very expensive.
Concept of Multiplexing
The 'n' input lines are transmitted through a multiplexer and multiplexer combines
the signals to form a composite signal.
The composite signal is passed through a Demultiplexer and demultiplexer
separates a signal to component signals and transfers them to their respective
destinations.
Advantages of Multiplexing:
Multiplexing Techniques
Advantages of FDM:
Disadvantages of FDM:
Applications of FDM:
It is a digital technique.
In Frequency Division Multiplexing Technique, all signals operate at the same time
with different frequency, but in case of Time Division Multiplexing technique, all
signals operate at the same frequency with different time.
In Time Division Multiplexing technique, the total time available in the channel is
distributed among different users. Therefore, each user is allocated with different
time interval known as a Time slot at which data is to be transmitted by the sender.
A user takes control of the channel for a fixed amount of time.
In Time Division Multiplexing technique, data is not transmitted simultaneously
rather the data is transmitted one-by-one.
In TDM, the signal is transmitted in the form of frames. Frames contain a cycle of
time slots in which each frame contains one or more slots dedicated to each user.
It can be used to multiplex both digital and analog signals but mainly used to
multiplex digital signals.
Synchronous TDM
Asynchronous TDM
The capacity of the channel is not fully utilized as the empty slots are also transmitted
which is having no data. In the above figure, the first frame is completely filled, but in
the last two frames, some slots are empty. Therefore, we can say that the capacity of
the channel is not utilized efficiently.
The speed of the transmission medium should be greater than the total speed of the
input lines. An alternative approach to the Synchronous TDM is Asynchronous Time
Division Multiplexing.
The difference between Asynchronous TDM and Synchronous TDM is that many
slots in Synchronous TDM are unutilized, but in Asynchronous TDM, slots are fully
utilized. This leads to the smaller transmission time and efficient utilization of the
capacity of the channel.
In Synchronous TDM, if there are n sending devices, then there are n time slots. In
Asynchronous TDM, if there are n sending devices, then there are m time slots
where m is less than n (m<n).
The number of slots in a frame depends on the statistical analysis of the number of
input lines.
Concept Of Asynchronous TDM
In the above diagram, there are 4 devices, but only two devices are sending the data, i.e., A
and C. Therefore, the data of A and C are only transmitted through the transmission line.
The above figure shows that the data part contains the address to determine the source of
the data.
2. The time division multiplexing technique is more flexible than frequency division
multiplexing.
Working In Synchronous TDM data flow of In Statistical TDM slots are allotted
each input connection is divided dynamically. i.e. input line is given
into units and each input occupies slots in output frame if and only if it
one output time slot. has data to send.
No. of Slots In Synchronous TDM no. of slots in In Statistical TDM, No. of slots in
each frame are equal to no. of input each frame are less than the no. of
lines. input lines.
Buffers Buffering is not done, frame is sent Buffering is done and only those
after a particular interval of time inputs are given slots in output
whether someone has data to send frame whose buffer contains data
or not. to send.
Addressing Slots in Synchronous TDM carry Slots in Statistical TDM contain
data only and there is no need of both data and address of the
addressing. Synchronization and pre destination.
assigned relationships between
input and outputs that serve as an
address.
Synchronization Synchronization bits are used at the No synchronization bits are used
beginning of each frame.
Capacity Max. Bandwidth utilization if all The capacity of link is normally is
inputs have data to send. less than the sum of the capacity of
each channel.
Data Separation In Synchronous TDM de-multiplexer In Statistical TDM de-multiplexer at
at receiving end decomposes each receiving end decomposes each
frame, discards framing bits and frame by checking local address of
extracts data unit in turn. This each data unit. This extracted data
extracted data unit from frame is unit from frame is then passed to
then passed to destination device. destination device.
UNIT-5: SWITCHING & ROUTING
In large networks, there can be multiple paths from sender to receiver. The switching
technique will decide the best route for data transmission.
Switching technique is used to connect the systems for making one-to-one communication.
In space division switching, the paths in the circuit are separated with each other
spatially, i.e. different ongoing connections at a same instant of time, uses different
switching paths.
This was originally developed for the analog environment and has been carried over
to the digital domain. The space switches are crossbar switches and multi stage
switches.
Crossbar switch-
1. Basic building block of the switch is a metallic cross points or semiconductor
gate that can be enabled or disabled by a control unit.
2. The number of cross points grows with the square of the number of attached
stations.
3. Costly for a large switch.
4. The failure of a cross point prevents connection between the two devices whose
lines intersect at that cross point.
5. The cross points are inefficiently utilized.
6. Only a small fraction of cross points are engaged even if all of the attached
devices are active.
Time Division switching uses Time Division Multiplexing (TDM) inside a switch. The
most popular technology is called the Time Slot Interchange (TSI).
o Once the dedicated path is established, the only delay occurs in the speed of data
transmission.
o It takes a long time to establish a connection approx. 10 seconds during which no
data can be transmitted.
o It is more expensive than other switching techniques as a dedicated path is required
for each connection.
o It is inefficient to use because once the path is established and no data is
transferred, then the capacity of the path is wasted.
o In this case, the connection is dedicated therefore no other data can be transferred
even if the channel is free.
5.1.2 PACKET SWITCHING
o The packet switching is a switching technique in which the message is sent in one
go, but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given a
unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend the
message.
o If the correct order of the packets is reached, then the acknowledgment message
will be sent.
o In the above diagram, A and B are the sender and receiver respectively. 1 and 2 are
the nodes.
o Call request and call accept packets are used to establish a connection between the
sender and receiver.
o When a route is established, data will be transferred.
o After transmission of data, an acknowledgment signal is sent by the receiver that the
message has been received.
o If the user wants to terminate the connection, a clear signal is sent for the
termination.
In circuit switching, each data unit know the In Packet switching, each data unit just know
entire path address which is provided by the the final destination address intermediate path
source is decided by the routers.
In Circuit switching, data is processed at source In Packet switching, data is processed at all
system only intermediate node including source system.
Delay between data units in circuit switching is Delay between data units in packet switching is
uniform. not uniform.
5.3 X.25-
X.25 is an ITU-T standard that specifies an interface between a host system and a packet
switching network.
The functionality of X.25 is specified on three levels:
(a) Physical level
(b) Link level
(c) Packet level
The physical level deals with the physical interface between an attached station
(computer) and the link that attaches that station to the packet switching node.
The link level provides for the reliable transfer of data across the physical link, by
transmitting the data as a sequence of frames.
The link level standard is referred to as LAPB (Link Access Protocol- Balanced)
The packet level provides a virtual circuit service. This service enables any subscriber to
the network to set up logical connections, called virtual circuits to other subscribers.
The term virtual circuit refers to the logical connection between two stations through the
network.
The above diagram shows the relationship among the levels of X.25. User data are passed
down to X.25 level 3, which appends control information as a header, creating a packet.
This control information serves several purposes including-
1) Identifying by number a particular virtual circuit with which this data is to be
associated.
2) Providing sequence numbers that can be used for flow and error control.
The entire X.25 packet is then passed down to the LAPB entity, which appends control
information at the front and back of the packet forming a LAPB frame.
X.25 permits a DTE user on an X.25 network to communicate with a number of remote
DTE’s simultaneously. Connections occur on logical channels of two types:
Switched virtual circuits (SVC‘s) – SVC’s are very much like telephone calls; a
connection is established, data are transferred and then the connection is released.
Each DTE on the network is given a unique DTE address which can be used much like
a telephone number.
Permanent virtual circuits (PVC‘s) – a PVC is similar to a leased line in that the
connection is always present. The logical connection is established permanently by
the Packet Switched Network administration. Therefore, data may always be sent,
without any call setup.
To establish a connection on an SVC, the calling DTE sends a Call Request Packet, which
includes the address of the remote DTE to be contacted.
The destination DTE decides whether or not to accept the call (the Call
Request packet includes the sender’s DTE address, as well as other information that the
called DTE can use to decide whether or not to accept the call).
A call is accepted by issuing a Call Accepted packet, or cleared by issuing a Clear
Request packet.
Once the originating DTE receives the Call Accepted packet, the virtual circuit is established
and data transfer may take place. When either DTE wishes to terminate the call, a Clear
Request packet is sent to the remote DTE, which responds with a Clear
Confirmation packet.
Advantages:
1. X.25 is a protocol designed for data transfer over public telephone lines. It was first
developed in the 1960s to support host-to-host data transfer over noisy lines.
2. To provide redress for the problems with noisy transmission, X.25 performs extensive
error checking and error recovery.
3. In a switching network, X.25 checks packets from each switch. Packets are only forwarded
when a positive acknowledgment is received. Thus the X.25 protocol achieves high reliability
at the expense of low data transfer speed.
Disadvantages:
1. The disadvantages of X.25 become apparent when we look at how it differs from frame
relay.
2. The area of error checking shows the main differences with the two protocols. As
mentioned earlier, X.25 provides error correction and retransmission functions.
3. The link layer peer protocol specified in X.25 is called LAP-B (Link Access Procedure-
Balanced).
4. The LAP-B provides link management, error control, flow control and failure recovery.
These operations take place in the Data Link and Network layers.
5. A high level of guarantee is given to the originator that the data is received with no errors
and in the correct sequence.
5.4 ROUTING IN PACKET SWITCHING NETWORKS-
Characteristics-
The primary function of a packet-switching network is to accept packets from a
source station and deliver them to a destination station. To accomplish this, a path or route
through the network must be determined; generally, more than one route is possible. Thus,
a routing function must be performed. The requirements for this function include
• Correctness
• Fairness
• Simplicity
• Optimality
• Robustness
• Efficiency
• Stability
The first two items on the list, correctness and simplicity, are self-explanatory.
Robustness has to do with the ability of the network to deliver packets via some route in the
face of localized failures and overloads. Ideally, the network can react to such contingencies
without the loss of packets or the breaking of virtual circuits.
The designer who seeks robustness must cope with the competing requirement for
stability. Techniques that react to changing conditions have an unfortunate tendency to
either react too slowly to events or to experience unstable swings from one extreme to
another. For example, the network may react to congestion in one area by shifting most of
the load to a second area.
Now the second area is overloaded and the first is underutilized, causing a second
shift. During these shifts, packets may travel in loops through the network. A tradeoff also
exists between fairness and optimality. Some performance criteria may give higher priority
to the exchange of packets between nearby stations compared to an exchange between
distant stations. This policy may maximize average throughput but will appear unfair to the
station that primarily needs to communicate with distant stations. Finally, any routing
technique involves some processing overhead at each node and often a transmission
overhead as well, both of which impair network efficiency. The penalty of such overhead
needs to be less than the benefit accrued based on some reasonable metric, such as increased
robustness or fairness.
Performance Criteria
The simplest criterion is to choose the minimum-hop route (one that passes through the
least number of nodes) through the network.
Minimum-hop criterion is least-cost routing.
The least cost route should provide the highest throughput.
The least cost route should minimize delay.
Decision Time and Place
Routing decisions are made on the basis of some performance criterion. Two key
characteristics of the decision are the time and place that the decision is made.
Decision time is determined by whether the routing decision is made on a packet or virtual
circuit basis.
The term decision place refers to which node or nodes in the network are responsible for
the routing decision. Most common is distributed routing, in which each node has the
responsibility of selecting an output link for routing packets as they arrive.
For centralized routing, the decision is made by some designated node, such as a network
control center.
5.5 ROUTING STRATEGIES-
In most of the situations, packets require multiple hops to make a journey towards the
destination. Routing is one of the most complex and crucial aspects of packet switched
network design.
Routing Strategies:
1. Fixed Routing
2. Flooding
3. Random Routing
4. Adaptive Routing
Fixed Routing –
For fixed routing a single permanent route is configured for each source-destination
pair of nodes in the network.
The routes are fixed or at least only change when there is a change in the topology of
the network.
A central routing matrix is created based on the least cost path which is stored in the
network control center.
The matrix shows for each source –destination route, the identity of the next node on
the route.
With fixed routing, there is no difference between routing for datagrams and virtual
circuits. All packets from a given source to a given destination follow the same route.
Flooding –
This technique requires no network information like topology, load condition, cost of
diff. paths.
A packet is sent by a source node to every one of its neighbors.
At each node, an incoming packet is retransmitted on all outgoing links except for the
link on which it arrived.
All nodes which are directly or indirectly connected are visited. So, there are no chances
for any node to be left out. This is a main criteria in case of broadcast messages.
Flooding tends to create an infinite number of duplicate data packets.
Random Routing:
Random routing has the simplicity and robustness of flooding with far less traffic load.
With random routing, a node selects only one outgoing path for retransmission of an
incoming packet.
The outgoing link is chosen at random, excluding the link on which the packet arrived.
If all links are equally likely to be chosen, then a node may simply utilize outgoing links
in a round-robin fashion.
Like flooding, random routing technique requires the use of no network information.
Because the route taken is random.
Adaptive Routing:
The routing decisions that are made change as conditions on the network change is known as
adaptive routing.
The conditions that influence routing decisions are-
1) Failure: When a node or link fails, it can no longer be used as part of a route.
2) Congestion: When a particular portion of the network is heavily congested.
The routing decision is more complex.
Adaptive strategies depend on status information that is collected at one place but used at
another.
An adaptive strategy may react too quickly causing congestions or too slowly.
This strategy can improve performance, as seen by the network user.
This strategy helps in congestion control.
5.6 CONGESTION
Congestion is an important issue that can arise in packet switched network.
Congestion is a situation in Communication Networks in which too many packets are
present in a part of the subnet, performance degrades.
Congestion in a network may occur when the load on the network (i.e. the number of
packets sent to the network) is greater than the capacity of the network (i.e. the number
of packets a network can handle.).
Network congestion occurs in case of traffic overloading.
In other words when too much traffic is offered, congestion sets in and performance
degrades sharply
There are two buffers or queues at each port one to accept arriving packets and one to hold
packets that are waiting to depart. There might be two fixed size buffers associated with each
port.
As packets arrive they are stored in the input buffer of the corresponding port. The node
examines each incoming packet, makes a routing decision and then moves the packet to the
appropriate output buffer.
Packets queued for output are transmitted as rapidly as possible. If packets arrive too fast
for the node to process them or faster than packets can be cleared from the outgoing buffers,
then eventually packets will arrive for which no memory is available.
When such a saturation point is reached, one of two strategies can be adopted.
The first strategy is to discard any incoming packet for which there is no available buffer
space.
The alternative is the node that is experiencing these problems to exercise some sort of flow
control over its neighbors so that the traffic flow remains manageable.
Congestion Control refers to techniques and mechanisms that can either prevent
congestion, before it happens, or remove congestion, after it has happened.
Congestion control mechanisms are divided into two categories, one category
prevents the congestion from happening and the other category removes congestion
after it has taken place.
Acknowledgement Policy
• The acknowledgement policy imposed by the receiver may also affect congestion.
• If the receiver does not acknowledge every packet it receives it may slow down the sender
and help prevent congestion.
• Acknowledgments also add to the traffic load on the network. Thus, by sending fewer
acknowledgements we can reduce load on the network.
Discarding Policy
• A router may discard less sensitive packets when congestion is likely to happen.
• Such a discarding policy may prevent congestion and at the same time may not harm the
integrity of the transmission.
Admission Policy
• An admission policy, which is a quality-of-service mechanism, can also prevent congestion
in virtual circuit networks.
• Switches in a flow first check the resource requirement of a flow before admitting it to the
network.
• A router can deny establishing a virtual circuit connection if there is congestion in the
"network or if there is a possibility of future congestion.
• Backpressure can be selectively applied to logical connections, so that the flow from one
node to the next is only restricted or halted on some connections, generally the ones with
the most traffic.
• It can be used in a connection oriented network.
Choke Packet
• In this method of congestion control, congested router or node sends a special type of
packet called choke packet to the source to inform it about the congestion.
• Here, congested node does not inform its upstream node about the congestion as in
backpressure method.
• In choke packet method, congested node sends a warning directly to the source
station i.e. the intermediate nodes through which the packet has traveled are not warned.
Implicit Signaling
• In implicit signaling, there is no communication between the congested node or nodes and
the source.
• The source guesses that there is congestion somewhere in the network when it does not
receive any acknowledgment. Therefore the delay in receiving an acknowledgment is
interpreted as congestion in the network.
• On sensing this congestion, the source slows down.
• This type of congestion control policy is used by TCP.
Explicit Signaling
• In this method, the congested nodes explicitly send a signal to the source or destination to
inform about the congestion.
• Explicit signaling is different from the choke packet method. In choke packed method, a
separate packet is used for this purpose whereas in explicit signaling method, the signal is
included in the packets that carry data.
• Explicit signaling can occur in either the forward direction or the backward direction.
• In backward signaling, a bit is set in a packet moving in the direction opposite to the
congestion. This bit warns the source about the congestion and informs the source to slow
down.
• In forward signaling, a bit is set in a packet moving in the direction of congestion. This bit
warns the destination about the congestion. The receiver in this case uses policies such as
slowing down the acknowledgements to remove the congestion.
5.9 TRAFFIC MANAGEMENT-
Congestion control is concerned with efficient use of a network at high load. There
are a number of issues related to congestion control that might be included under the general
category of traffic management.
1) Fairness
2) Quality of Service
3) Reservations
Fairness-
As congestion develops, flows of packets between sources and destinations will experience
increased delays and, with high congestion, packet losses.
Simply to discard on a last-in-first-discarded basis may not be fair.
As an example of a technique that might promote fairness, a node can maintain a separate
queue for each logical connection or for each source-destination pair.
If all of the queue buffers are of equal length, then the queues with the highest traffic load
will suffer discards more often, allowing lower-traffic connections a fair share of the
capacity.
Quality of Service-
Quality of Service (QoS) refers to any technology that manages data traffic to reduce packet
loss, latency and jitter on the network.
Quality of Service controls and manages network resources by setting priorities for specific
types of data on the network.
For example, a node might transmit higher-priority packets ahead of lower-priority packets
in the same queue.
Reservations-
One way to avoid congestion and also to provide assured service to applications is to use a
reservation scheme. Such a scheme is an integral part of ATM networks.
When a logical connection is established, the network and the user enter into a traffic
contract, which specifies a data rate and other characteristics of the traffic flow.
The network agrees to give a defined QoS so long as the traffic flow is within contract
parameters; excess traffic is either discarded or handled on a best-effort basis, subject to
discard.
If the current outstanding reservations are such that the network resources are inadequate
to meet the new reservation, then the new reservation is denied.
Passive hubs don't amplify the electrical signal of incoming packets before broadcasting them
out to the network.
Active hubs perform amplification, much like a repeater.
Intelligent hubs add extra features to an active hub that are of particular importance to
businesses. An intelligent hub is typically stackable, meaning that it's built in such a way that
multiple units can be placed one on top of the other to conserve space. Intelligent Ethernet hubs
often include remote management capabilities via SNMP and virtual LAN (VLAN) support.
6.6 SWITCHES-
A switch is a multiport bridge with a buffer and a design that can boost its efficiency
(a large number of ports imply less traffic) and performance. A switch is a data link layer
device. The switch can perform error checking before forwarding data that makes it very
efficient as it does not forward packets that have errors and forward good packets selectively
to correct port only. In other words, switch divides collision domain of hosts, but broadcast
domain remains same.
• Store-and-forward switch: The layer 2 switch accepts a frame on an input line, buffers it
briefly, and then routes it to the appropriate output line.
• Cut-through switch: The layer 2 switch takes advantage of the fact that the destination
address appears at the beginning of the MAC (medium access control) frame. The layer 2 switch
begins repeating the incoming frame onto the appropriate output line as soon as the layer 2
switch recognizes the destination address.
The cut-through switch yields the highest possible throughput but at some risk of
propagating bad frames, because the switch is not able to check the CRC prior to
retransmission. The store-and-forward switch involves a delay between sender and receiver
but boosts the overall integrity of the network. A layer 2 switch can be viewed as a full-duplex
version of the hub. It can also incorporate logic that allows it to function as a multiport bridge.
Lists the following differences between layer 2 switches and bridges:
• Bridge frame handling is done in software. A layer 2 switch performs the address
recognition and frame forwarding functions in hardware.
• A bridge can typically only analyze and forward one frame at a time, whereas a layer 2
switch has multiple parallel data paths and can handle multiple frames at a time.
Because a layer 2 switch has higher performance and can incorporate the functions of a
bridge, the bridge has suffered commercially. New installations typically include layer 2
switches with bridge functionality rather than bridges.
To overcome these problems, it seems logical to break up a large local network into a
number of subnetworks connected by routers (Layer3 Switch). A router is a device like a
switch that routes data packets based on their IP addresses. Router is mainly a Network
Layer device. Routers normally connect LANs and WANs together and have a dynamically
updating routing table based on which they make decisions on routing the data packets.
Router divide broadcast domains of hosts connected through it.
6.7 ETHERNET:-
Ethernet is most widely used LAN Technology, which is defined under IEEE standards
802.3.
The reason behind its wide usability is Ethernet is easy to understand, implement, maintain
and allows low-cost network implementation. Also, Ethernet offers flexibility in terms of
topologies which are allowed.
Ethernet operates in two layers of the OSI model, Physical Layer, and Data Link Layer.
For Ethernet, the protocol data unit is Frame.
In order to handle collision, the Access control mechanism used in Ethernet is CSMA/CD.
CSMA (Carrier Sense Multiple Access)
CSMA Protocols stands for Carrier Sense Multiple Access Protocols.
CSMA is a network access method used on shared network topologies such as Ethernet to
control access to the network.
Devices attached to the network cable listen (carrier sense) before transmitting.
If the channel is in use, devices wait before transmitting.
MA (Multiple Access) indicates that many devices can connect to and share the same
network.
All devices have equal access to use the network when it is clear.
1-Persistant CSMA
1-persistent CSMA is an aggressive version of Carrier Sense Multiple Access (CSMA) protocol
that operates in the Medium Access Control (MAC) layer. Using CSMA protocols, more than
one users or nodes send and receive data through a shared medium that may be a single
cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum.
In 1-persistent CSMA, when a transmitting station has a frame to send and it senses a busy
channel, it waits for the end of the transmission, and transmits immediately. Since, it sends
with a probability 1, the name 1 – persistent CSMA is given.
It is used in CSMA/CD (Carrier Sense Multiple Access with Collision Detection) systems
including Ethernet.
CSMA/CD Procedure:
Fig. Shows a flow chart for the CSMA/CD protocol.
Explanation:
The station that has a ready frame sets the back off parameter to zero.
Then it senses the line using one of the persistent strategies.
If then sends the frame. If there is no collision for a period corresponding to one
complete frame, then the transmission is successful.
Otherwise the station sends the jam signal to inform the other stations about the
collision.
The station then increments the back off time and waits for a random back off time
and sends the frame again.
If the back off has reached its limit then the station aborts the transmission.
CSMA/CD is used for the traditional Ethernet.
CSMA/CD is an important protocol. IEEE 802.3 (Ethernet) is an example
of CSMNCD. It is an international standard.
The MAC sublayer protocol does not guarantee reliable delivery. Even in absence
of collision the receiver may not have copied the frame correctly.
6.9 FIBER CHANNEL-
Fiber channel is a high speed networking technology primarily used for transmitting data
among data centers, computer servers, switches and storage at data rates of upto 128
Gbps.
Fiber channel suited for connecting servers to shared storage devices and interconnecting
storage controllers and drives.
Fiber channel devices can be as far as 10 Km apart if multimodal optical fiber is used as
the physical medium.
Optical fiber is not required for shorter distances. Fiber channel also works using coaxial
cable and ordinary telephone twisted pair.
The key elements of a fiber channel network are the end systems, called nodes and the
network itself, which consists of one or more switching elements.
The collection of switching elements is referred to as a fabric.
These elements are interconnected by point to point links between ports on the individual
nodes and switches.
The fiber channel protocol architecture is organized into five levels. Each level defines a
function or set of related functions. The layers are as follows-
1) FC-0 Physical Media-It includes optical fiber for long distance applications, coaxial
cable for high speeds over short distances and shielded twisted pair for lower speeds
over short distances.
2) FC-1 Transmission Protocol- It defines the signal encoding scheme
3) FC-2 Framing Protocol- It deals with defining topologies, frame format, flow and
error control and grouping of frames into logical entities called sequences.
4) FC-3 common services- It includes multicasting.
5) FC-4 Mapping- It defines the mapping of various channel and network protocols to
fiber channel.
Fiber Channel Elements
The key elements of a Fiber Channel network are the end systems, called nodes, and the
network itself, which consists of one or more switching elements. The collection of
switching elements is referred to as a fabric. These elements are interconnected by
point-to-point links between ports on the individual nodes and switches.
Communication consists of the transmission of frames across the point-to-point links.
6.10 WIRELESS LAN TECHNOLOGY-
Wireless LANs are generally categorized according to the transmission technique that
is used. All current wireless LAN products fall into one of the following categories:
• Infrared (IR) LANs
• Spread spectrum LANs
Infrared LANs
Infrared LANs use infrared signals to transmit data. This is same technology used in
products like remote controls for televisions and VCRs.
These LANs can be setup using a point to point configuration is known as Directed- Beam
IR.
An omnidirectional configuration involves a single base station that is within Line of Sight
of all other stations on the LAN. This station is mounted on the ceiling. The ceiling
transmitter broadcasts an omnidirectional signal that can be received by all of the other
IR Tran receivers in the area. These other Trans receivers transmit a directional beam
aimed at the ceiling base unit.
In a diffused configuration, all of the IR transmitters are focused and aimed at a point on
a diffusely reflecting ceiling. IR radiation striking the ceiling is reradiated Omni
directionally and picked up by all of the receivers in the area.
Infrared equipment is inexpensive and simple.
Many indoor environments experience rather intense infrared background radiation,
from sunlight and indoor lighting.
Spread Spectrum LANs
Spread spectrum is currently the most widely used transmission technique for wireless
LANs.
It was initially developed by the military to avoid jamming.
This is done by spreading the signal over a range of frequencies that consist of the
industrial, scientific and medical bands of the electromagnetic spectrum.
The first type of spread spectrum developed is known as frequency hopping spread
spectrum.
The other type of spread spectrum is called direct sequence spread spectrum.
Frequency hopping radios currently use less power than direct sequence radios and
generally cost less.
While direct sequence data rate of 8 Mbps and frequency hopping have a limit of 2 Mbps.
UNIT-7: TCP/IP
The internet protocol suit is the conceptual model and set of communications protocols
used in the internet and similar computer networks. It is known as TCP/IP because the
foundational protocols in the suite are the Transmission Control Protocol (TCP) and the
Internet Protocol (IP).
The Internet Protocol suite provides end to end data communication specifying how
data should be packetized, addressed, transmitted, routed and received.
This functionality is organized into four abstraction layers.
From lowest to highest, the layers are the link layer, containing communication methods
for data that remains within a single network segment, the internet layer, providing
inter networking between independent networks, the transport layer, handling host to
host communication and the application layer, providing process to process data
exchange for application.
• Encapsulation
• Connection control
• Ordered delivery
• Flow control
• Error control
• Addressing
• Multiplexing
• Transmission services
Encapsulation-
For virtually all protocols, data are transferred in blocks, called Protocol Data Units
(PDU).
Each PDU contains not only data but also control information. The control information
falls into three categories: Address, Error detecting code, protocol control.
The addition of control information to data is referred to as encapsulation.
Connection Control
An entity may transmit data to another entity in such a way that each PDU is treated
independently of all prior PDUs. This is known as connectionless data transfer, an
example is the use of the datagram.
Connection-oriented data transfer is preferred (even required) if stations anticipate a
lengthy exchange of data.
A logical association is established between the entities using three phases.
• Connection establishment
• Data transfer
• Connection termination
Ordered Delivery
Flow control is a function performed by a receiving entity to limit the amount or rate of
data that is sent by a transmitting entity.
The simplest form of flow control is a stop-and-wait procedure, in which each PDU must
be acknowledged before the next can be sent.
More efficient protocols involve some form of credit provided to the transmitter, which
is the amount of data that can be sent without an acknowledgment. The HDLC sliding-
window technique is an example of this mechanism.
Error Control
Error control techniques are needed to guard against loss or damage of data and control
information.
Error control is implemented as two separate functions:
1) Error detection
2) Retransmission
Addressing
• Addressing level
• Addressing scope
• Connection identifiers
• Addressing mode
One form of multiplexing is supported by means of multiple connections into a single system.
For example, with frame relay, there can be multiple data link connections terminating in a
single end system; we can say that these data link connections are multiplexed over the
single physical interface between the end system and the network.
Transmission Services
A protocol may provide a variety of additional services to the entities that use it. We mention
here three common examples:
• Priority: Certain messages, such as control messages, may need to get through to the
destination entity with minimum delay. An example would be a terminate-connection
request. Thus, priority could be assigned on a message basis. Additionally, priority could be
assigned on a connection basis.
Internet-
An internet used by a single organization that provides the key internet applications. An
internet operates within the organization for internal purposes.
End System-
A device attached to one of the networks of an internet that is used to support end-user
applications or services.
A device used to connect two networks and permit communication between end systems
attached to different networks. Two types of ISs are bridges and routers.
Bridges-
A bridges at layer 2 of the Open System Interconnection (OSI). An IS used to connect two
LANs that use similar LAN protocols.
Routers-
A router operates at layer 3 of the OSI architecture and routes packets between potentially
different networks.
Requirements
1. Provide a link between networks. At minimum, a physical and link control connection is
needed.
2. Provide for the routing and delivery of data between processes on different networks.
3. Provide an accounting service that keeps track of the use of the various networks and
routers and maintains status information.
4. Provide the services just listed in such a way as not to require modifications to the
networking architecture. These include
• Different addressing schemes: The networks may use different endpoint names and
addresses and directory maintenance schemes.
• Different maximum packet size: Packets from one network may have to be broken up into
smaller pieces for another. This process is referred to as fragmentation.
• Different network access mechanisms: The network access mechanism between station
and network may be different for stations on different networks.
• Error recovery: Network procedures may provide anything from no error recovery up to
reliable end-to-end (within the network) service.
• Status reporting: Different networks report status and performance differently. Yet it must
be possible for the internetworking facility to provide such information on internetworking
activity to interested and authorized processes.
• Routing techniques: Intra network routing may depend on fault detection and congestion
control techniques. The internetworking facility must be able to coordinate these to route
data adaptively between stations on different networks.
• User access control: Each network will have its own user access control technique
(authorization for use of the network).
Connectionless Operation
IP provides a connectionless, or datagram, service between end systems. There are a number
of advantages to this approach:
• A connectionless internet service can be made highly robust. This is basically the same
argument made for a datagram network service versus a virtual circuit service.
At each router, before the data can be forwarded, the router may need to fragment
the datagram to accommodate a smaller maximum packet size limitation on the outgoing
network.
The router may also limit the length of its queue for each network to which it attaches
so as to avoid having a slow network penalize a faster one. Once the queue limit is reached,
additional data units are simply dropped.
The destination end system recovers the IP datagram from its network wrapping.
This service offered by IP is an unreliable one. With the Internet Protocol approach, each unit
of data is passed from router to router in an attempt to get from source to destination.
Design Issues
• Routing
• Datagram lifetime
• Error control
• Flow control
Routing-
For the purpose of routing, each end system and router maintains a routing table that
lists, for each possible destination network, the next router to which the internet
datagram should be sent.
Routing tables may also be used to support other inter-networking services, such as
security and priority.
Another routing technique is source routing.
Datagram lifetime-
Routers may need to fragment incoming datagrams into smaller pieces, called segments
or fragments.
To reassemble a datagram, there must be sufficient buffer space at the reassembly point.
As fragments with the same ID arrive, their data fields are inserted in the proper position
in the buffer until the entire data field is reassembled.
Error control-
When a datagram is discarded by a router, the router should attempt to return some
information to the source.
The source Internet Protocol entity may use this information to modify its
transmission strategy and may notify higher layers.
Flow control-
Internet flow control allows routers and/or receiving stations to limit the rate at which
they receive data.
For the connectionless type of service we are describing, flow control mechanisms are
limited.
The Internet Protocol (IP) is part of the TCP/IP suite and is the most widely used
internetworking protocol. As with any protocol standard, IP is specified in two parts:
• The interface with a higher layer (e.g., TCP), specifying the services that IP provides
IP Services
The services to be provided across adjacent protocol layers (e.g., between IP and TCP) are
expressed in terms of primitives and parameters. A primitive specifies the function to be
performed, and the parameters are used to pass data and control information. The actual
form of a primitive is implementation dependent. An example is a procedure call.
IP provides two service primitives at the interface to the next higher layer. The Send
primitive is used to request transmission of a data unit. The Deliver primitive is used by IP
to notify a user of the arrival of a data unit. The parameters associated with the two
primitives are as follows:
• Type-of-service indicators: Used to specify the treatment of the data unit in its transmission
through component networks.
• Identification: Used in combination with the source and destination addresses and user
protocol to identify the data unit uniquely. This parameter is needed for reassembly and
error reporting.
• Don’t fragment identifier: Indicates whether IP can fragment data to accomplish delivery.
• Time to live: Measured in seconds.
• Route recording: A field is allocated to record the sequence of routers visited by the
datagram.
• Stream identification: Names reserved resources used for stream service. This service
provides special handling for volatile periodic traffic (e.g., voice).
• Timestamping: The source IP entity and some or all intermediate routers add a timestamp
(precision to milliseconds) to the data unit as it goes by.
Internet Protocol
The protocol between IP entities is best described with reference to the IP datagram format.
The fields are as follows:
• Version (4 bits): Indicates version number, to allow evolution of the protocol; the value
is 4.
Internet Header Length (IHL) (4 bits): Length of header in 32-bit words. The minimum
value is five, for a minimum header length of 20 octets.
Type of Service (8 bits): Prior to the introduction of differentiated services, this field was
referred to as the Type of Service field and specified reliability, precedence, delay, and
throughput parameters. This interpretation has now been superseded. The first six bits of
this field are now referred to as the DS (Differentiated Services) field, the remaining 2 bits
are reserved for an ECN (Explicit Congestion Notification) field, currently in the process
of standardization. The ECN field provides for explicit signaling of congestion in a manner
similar to that discussed for frame relay.
Total Length (16 bits): Total datagram length,including header plus data,in octets.
Identification (16 bits): A sequence number that, together with the source
address,destination address,and user protocol,is intended to identify a datagram
uniquely.Thus,this number should be unique for the datagram’s source address,
destination address, and user protocol for the time during which the datagram will remain
in the internet.
• Flags (3 bits): Only two of the bits are currently defined. The More bit is used for
fragmentation and reassembly, as previously explained. The Don’t Fragment bit prohibits
fragmentation when set. This bit may be useful if it is known that the destination does not
have the capability to reassemble fragments. However, if this bit is set, the datagram will
be discarded if it exceeds the maximum size of an enroute network.
Fragment Offset (13 bits): Indicates where in the original datagram this fragment
belongs, measured in 64-bit units. This implies that fragments other than the last
fragment must contain a data field that is a multiple of 64 bits in length.
• Time to Live (8 bits): Specifies how long,in seconds,a datagram is allowed to remain in
the internet.Every router that processes a datagram must decrease the TTL by at least
one,so the TTL is similar to a hop count.
• Protocol (8 bits): Indicates the next higher level protocol that is to receive the data field
at the destination; thus, this field identifies the type of the next header in the packet after the
IP header.
Header Checksum (16 bits): An error-detecting code applied to the header only. Because
some header fields may change during transit (e.g., Time to Live, fragmentation-related
fields), this is reverified and recomputed at each router. The checksum is formed by taking
the ones complement of the 16-bit ones complement addition of all 16-bit words in the
header.
Source Address (32 bits): Coded to allow a variable allocation of bits to specify the
network and the end system attached to the specified network, as discussed subsequently.
Destination Address (32 bits): Same characteristics as source address.
• Padding (variable): Used to ensure that the datagram header is a multiple of 32 bits in
length.
• Data (variable): The data field must be an integer multiple of 8 bits in length. The
maximum length of the datagram (data field plus header) is 65,535 octets.
IP Addresses
The source and destination address fields in the IP header each contain a 32-bit global
internet address, generally consisting of a network identifier and a host identifier.
Network Classes
The address is coded to allow a variable allocation of bits to specify network and host.
This encoding provides flexibility in assigning addresses to hosts and allows a mix of
network sizes on an internet. The three principal network classes are best suited to the
following conditions:
Internet Control Message Protocol (ICMP)- ICMP provides a means for transferring
messages from routers and other hosts to a host.
ARP- The address resolution protocol (ARP) is a protocol used by the Internet Protocol
(IP), specifically IPv4, to map IP network addresses to the hardware addresses used by a
data link protocol. The protocol operates below the network layer as a part of the interface
between the OSI network and OSI data link layer.