Data Communication and Networks - All Units
Data Communication and Networks - All Units
Computer Technology
Introduction
The main objective of data communication and networking is to enable
seamless exchange of data between any two points in the world.
This exchange of data takes place over a computer network
Data & Information
Data refers to the raw facts that are collected while information refers
to processed data that enables us to take decisions.
Ex. When result of a particular test is declared it contains data of all
students, when you find the marks you have scored you have the
information that lets you know whether you have passed or failed.
The word data refers to any information which is presented in a form
that is agreed and accepted upon by is creators and users
Data Communication
Data Communication is a process of exchanging data or information
In case of computer networks this exchange is done between two
devices over a transmission medium.
This process involves a communication system which is made up of
hardware and software.
The hardware part involves the sender and receiver devices and the
intermediate devices through which the data passes.
The software part involves certain rules which specify what is to be
communicated, how it is to be communicated and when. It is also
called as a Protocol.
The following sections describes the fundamental characteristics that
are important for the effective working of data communication process
and is followed by the components that make up a data
communications system.
Characteristics of Data Communication
The effectiveness of any data communications system depends upon
the following four fundamental characteristics:
1. Delivery: The data should be delivered to the correct destination
and correct user.
2. Accuracy: The communication system should deliver the data
accurately, without introducing any errors. The data may get
B.Sc. Computer Technology
Data Communication and Networks- Unit I
Elements of a Protocol
There are three key elements of a protocol:
Syntax
It means the structure or format of the data.
It is the arrangement of data in a particular order.
Semantics
It tells the meaning of each section of bits and indicates the
interpretation of each section.
It also tells what action/decision is to be taken based on the
interpretation.
Timing
It tells the sender about the readiness of the receiver to receive the data
It tells the sender at what rate the data should be sent to the receiver to
avoid overwhelming the receiver.
Standards In Networking
Standards are necessary in networking to ensure interconnectivity and
interoperability between various networking hardware and software
components.
Without standards we would have proprietary products creating
isolated islands of users which cannot interconnect.
Concept of Standard
Standards provide guidelines to product manufacturers and vendors
to ensure national and international interconnectivity.
Data communications standards are classified into two categories:
1.De facto Standard
These are the standards that have been traditionally used and mean by
fact or by convention
These standards are not approved by any organized body but are
adopted by widespread use.
2.De jure standard
It means by law or by regulation.
These standards are legislated and approved by an body that is
officially recognized.
Standard Organizations in field of Networking
B.Sc. Computer Technology
Data Communication and Networks- Unit I
Frequency
Frequency refers to the number of cycles completed by the wave in one
second.
Period refers to the time taken by the wave to complete one second.
Frequency is measured is hertz(Hz)
Phase
Phase describes the position of the waveform with respect to time
(specifically relative to time O).
Phase indicates the forward or backward shift of the waveform from
the axis
It is measured in degrees or radian
The figure above shows the sine waves with same amplitude and
frequency but different phases
B.Sc. Computer Technology
Data Communication and Networks- Unit I
Bitrate is the bitrate of the channel in bits per second Bandwidth is the
bandwidth of the channel
L is the number of signal levels.
Example
What is the maximum bit rate of a noiseless channel with a bandwidth
of 5000 Hz transmitting a signal with two signal levels.
Solution:
The bit rate for a noiseless channel according to Nyquist Bit rate can be
calculated as follows:
BitRate = 2 x Bandwidth x Log2 L
= 2 x 5000 x log2 2 =10000 bps
Shannon Capacity
The Shannon Capacity defines the theoretical maximum bit rate for a
noisy channel
Nyquist Bit Rate
The Nyquist bit rate formula defines the theoretical maximum bit rate
for a noiseless channel
Where,
Capacity is the capacity of the channel in bits per second
Bandwidth is the bandwidth of the channel SNR is the Signal to Noise
Ratio
Shannon Capacity for calculating the maximum bit rate for a noisy
channel does not consider the number of levels of the signals being
transmitted as done in the Nyquist bit rate.
Example:
Calculate the bit rate for a noisy channel with SNR 300 and bandwidth
of 3000Hz
Solution:
The bit rate for a noisy channel according to Shannon Capacity can be
calculated as follows:
Capacity=bandwidth X log2 (1 +SNR)
= 3000 x log2 (1 + 300)
= 3000 x log2 ( 301)
= 3000 x 8.23
= 24,690bps
B.Sc. Computer Technology
Data Communication and Networks- Unit I
Information Encoding
Introduction
In communications and information processing, encoding is the
process by which information from a source is converted into symbols
to be communicated.
In computer system we have to use encoding to represent the
Information in the format that computer understand i.e. ―binary‖
language.
Encoding enables us to improve the communication in places where
written languages is difficult to use or impossible.
Representing Different Symbols
In information theory and computer science, a code is usually
considered as an algorithm which uniquely represents symbols from
some source alphabet, by encoded strings, which may be in some other
target alphabet.
The purpose of the symbols is to communicate the idea or meaning.
We use the different symbols to represent the Information in computer
understandable format.
There are different symbols available e.g. in English language we have
26 capital letters from ―A to Z‖ and same way we have small letters
from ―a to z‖, we have numeric symbols like (0,1,…9) and special
symbols like (!,@,#,$,%,^,&,*, etc.)
Minimizing Errors
One way to represent the information is to use sound beep. The
different sound intensities can be utilized to represent the around 162
different symbols.
Practically we won‘t be able to distinguish between all 162 sound
levels. So it will lead to errors in identifying a symbol correctly. We
should follow the representation that minimizes the errors.
So another way of doing work is just use two states OFF or ON. With
sound beep we get some sound or none at all. When it is no sound then
the value must be 0. When we hear some sound then value must be 1.
With this beep and no-beep we can represent only two symbols
correctly. We call this system as binary system.
B.Sc. Computer Technology
Data Communication and Networks- Unit I
Multimedia:
Now a day the computers that we use have additional facilities such
as:
1. Drawing, capturing, storing and viewing pictures of different
formats.
2. Recording, storing the sound/songs and playing them back.
3. Capturing, editing, storing the video information and playing
them back.
Since video, pictures are not made of alphabets; we cannot represent
them with the help of the character codes like ASCII (American
Standard Code for Information Interchange) or EBCDIC (Extended
Binary Coded Decimal Interchange Code) etc.
So we use the concept of multimedia in order to code the picture or
videos.
With the help of multimedia technique it‘s possible to use the
computer system to store, play and process the audio, video and
picture information along with the textual data.
Pictures/Images:
We can represent the data in the form of Images / Pictures. Images are
represented by the pixels i.e. the smallest element in the picture.
The basic idea is shown in the following figure:
(a) (b)
01010111101010
10111010110110
01101010111101
10000111010101
01110101101011
11010101011101
01101100110101
Computer screen Computer memory
Video: 0111101100
Animation is used as a basic technique for creating videos.
We get the animation if we show set of pictures rapidly, the human
eye gets an illusion that the picture is in motion.
B.Sc. Computer Technology
Data Communication and Networks- Unit I
The above pictures show the idea behind the video. It shows the
movements of the horse and his rider. If you were shown these four
pictures one after the other very fast, you would believe that the horse
is actually running.
We use the same principle to store pictures in the disk / memory of
the computer in their binary form and show them rapidly at the rate
of 24 such pictures or images per second on the screen.
Sound:
A sound wave in its most basic form continuous in nature. It is
continuous in two aspects:
First, the strength (the amplitude) and time.
A typical sound signal takes the form of sine wave as shown in
following figure:
The sound needs to be converted into the digital form in order to store
it in the computer system. Thus if we have to show the zeros and ones
inside a computer‘s memory graphically, then we get the following
figure:
B.Sc. Computer Technology
Data Communication and Networks- Unit I
In order to convert the sound into digital form, we have carry out the
following processes on the analog sound signal:
Sampling
Quantization
Encoding
These processes are collectively called as Pulse Code Modulation
(PCM). The following figure shows all the processes:
Sampling:
When we transfer the signal using pulse code modulation and digital
modulation the signal must be in the discrete time form.
If the message is generated from the computer system or any other
digital source then it is in the proper form for processing by the digital
communication system.
But in real life the signal can be of analog type (e.g. voice). In such a
case it has to be first converted into discrete time signal.
For this we use ―Sampling‖ method. Thus using the sampling process
we convert the continuous time signal (analog) into the discrete time
signal (digital).
The sampling process should satisfy the following requirements:
B.Sc. Computer Technology
Data Communication and Networks- Unit I
Quantization:
Quantization is the process in which we assign the numbers to the
discrete values depending upon their amplitude values.
Quantizer converts the sampled signal into an approximate quantized
signal which consists of only finite number of predecided voltage
levels.
Each sampled value at the input of the quantizer is approximated or
rounded to the nearest standard predecided voltage level
(Quantization levels).
The following figure shows the overview of the process:
B.Sc. Computer Technology
Data Communication and Networks- Unit I
1
B.Sc Computer Technology
Data Communication and Networks- Unit II
The input to the regenerative repeater is a signal which looks like a digital signal. The
repeater measures the signal values at regular intervals to recognize the 0 and 1 in the
signal and regenerates them.
Any line with repeaters placed at the appropriate distance is called a digital line.Such a
line can reproduce the original digital signal at the other end.
The digital line is called a T1 line,which can carry a data rate of 1,54,400 bps (1.54
Mbps)
2
B.Sc Computer Technology
Data Communication and Networks- Unit II
At the other end this signal is fed to another modem where it is converted back into
original digital signal.
Modulation Techniques
Modulation basically uses a coding scheme or a convention. This coding can be achieved
using the three properties of a signal Amplitude ,Frequency and Phase.
There are three techniques
1. Amplitude Shift Keying (ASK)
2. Frequency Shift Keying (FSK)
3. Phase Shift Keying (PSK)
4. Another basic combination technique Quadrate Amplitude Modulation (QAM)
Amplitude Shift Keying (ASK)
In Amplitude Shift Keying (ASK) or amplitude modulation we do not alter the frequency
or phase of the carrier signal. We specify different amplitudes that is we shift the
amplitude values to represent a binary 1 or binary 0.
Example : A bit string 10011010011 modulated as an analog signal , only amplitude of
the signal changes as per the values 0 and 1 , the signal can be sent over the telephone
lines
3
B.Sc Computer Technology
Data Communication and Networks- Unit II
The receiver end , measures the amplitude at regular intervals to decode them as 0 and 1
and then generates a digital signal .The binary bits then can be stored at the destination
node
ASK encoding techniques, noise is the major problem.
Frequency Shift Keying (FSK)
In Frequency Shift Keying (FSK) or frequency modulation techniques the amplitude and
the phase of the carrier signals unaltered. Assign a certain frequency f1 to denote 1 and f2
denote 0.
Both f1 and f2 must be in the bandwidth of the channel that is between 0 to 4000 Hz,
which can be easily carried by the telephone wires
The signal component with slower cycle is f1 and the signal component that show the
rapid cycle portions is f2.The two represents 1 and 0 of the input digital signal
respectively.
Example The bit string 10011010011 sent using frequency shift keying . The phase and
amplitude are same , only frequency varies. But both f1 and f2 are between 0 and
4000Hz.
This technique is less error than ASK.
The bit coming from the computer is examined by the modem and depending upon
whether it is 0 or 1, the carrier signal is modulated at 1200Hz or 2200Hz frequency,
keeping the amplitude and the phase same.
5
B.Sc Computer Technology
Data Communication and Networks- Unit II
We require an equipment called codec (Coder/Decoder) at both the source and the
destination .It is also as A/D (Analog to Digital) converter and D/A (Digital to Analog)
converter
The discrete values of the amplitude shown are : 0.21,0.49,0.83,1.04,1.07,0.68 and 0.78
6
B.Sc Computer Technology
Data Communication and Networks- Unit II
To represent these values to binary number. We approximate these values to the nearest
number such as 0.2,0.5,0.8,1.0,1.1,0.7 and 0.8. We multiply each value by 10 to get the
number 2,5,8,10,11,7 and 8.
To convert into binary values as 0010,0101,1000,1010,1011,0111 and 1000
Send these bits as a long bit stream as 0010010110001010101101111000
At the destination the equipment at that end can now split the received bit stream into
chunks of four bits each , find out its decimal value 2,5,8,10,11,7 and 8 to get the values
0.2,0.5,0.8,1.0,1.1,0.7 and 0.8 by dividing these by 10 and generate an analog signal with
specific values at the time interval t at times 0t,1t,2t,3t,4t and 5t.
This signal is slightly different than the original signal due to the approximation which
we carried out at the source. This difference is known as quantization noise or
quantization error.
PCM would be reduce the quantization noise to a negligible level without increasing the
load on the network.
The current PCM standard assumes eight bits/sample
There are two variations of the basic PCM method:
(1) Adaptive Differential Pulse Code Modulation (ADPCM)
In this model outputting the absolute value of the digitized amplitude. The output
values is the difference between the current amplitude value and the previous
amplitude value
(2) Delta Modulation
Only one bit is reserved for the difference between two successive readings.
But the signal is sliced very rapidly to have a number of samples.
If the next reading is more than the previous one a bit 1 is output. If it is less a
bit 0 is output.
7
B.Sc Computer Technology
Data Communication and Networks- Unit II
Nyquist Theorem
We choose the time interval for sampling or slicing the analog signal , the equipment at
both ends has to be capable of handling that high speed of sampling and reconstructing
the analog signal.
At higher sampling speeds there is less of missing the ups and downs than at lower
speeds.
A signal with very low frequency which changes very slowly and smoothly
A signal with high frequency which changes rapidly
The sampling of both the signals at time interval t.
At low frequency the sampling at that speed is good enough.
At high frequency the sampling rate is low. It misses many ups and downs.
For instance refer to points x,y,z in the figure. If we know the reading at points x and y
there are a number of ways in which these points could be connected.
The sampling speed is related to the highest frequency in a signal. To consist of a number
of sinusoidal signals leading to the concept of bandwidth of a signal.
Nyquist showed that the sampling speed should be 2*fmax where fmax represents the
highest frequency in that signal resulting out of Fourier analysi . This is called Nyquist
theorem.
This theorem proves to reproduce the analog signal into its equivalent digital form with
minimum loss.
Video signal have a higher bandwidth with signals at very high frequencies than voice
signals.
The sampling for digitizing video signals has to be done at higher rate than for voice
signals. This lead to a demand for higher data rate and storage volume for video signals.
The human voice has various frequency components in the range of 0 to 20000 HZ.
8
B.Sc Computer Technology
Data Communication and Networks- Unit II
The frequency range of 300 -3300 Hz is sufficient to recognize the voice in the telephone
conversation. Telephone company provide for 0-4000 Hz.
The frequencies 0-300 Hz and 3300-4000 Hz act as guard bands, so multiplexing of
many signals in a single wire is possible.
The following equation for the bandwidth required of the telephone lines to carry
digitized human voice:
9
B.Sc Computer Technology
Data Communication and Networks- Unit II
To avoid this problem, it is used only for a very short distance. This method is used for
data transmission within the computer system, such as cpu register to the memory or data
bus.
Serial Communication
At the destination all the bits are collected, measured and puts together as bytes in the
memory of the destination .This requires conversion from serial to parallel.
In serial data transmission we have to identify where the character starts, also identify the
middle position of each bit interval
10
B.Sc Computer Technology
Data Communication and Networks- Unit II
The transmitter and the receiver have two different clocks. The point is to synchronize
the clock of the receiver exactly with that of the transmitter, so the correct readings will
result and the bit values are understood correctly.
This is the problem of Synchronization.
Example: To send 8 bit sb0 to b7.Two arms A1 and A2 at point X and Y rotate in clock
wise directions. When both A1 and A2 point to the bit b0 at X and Y respectively.
Two arms A1 and A2 have to be perfectly synchronized and have to rotate at the same
speed in order to succeed in sending/receiving all the bits accurately.
11
B.Sc Computer Technology
Data Communication and Networks- Unit II
Synchronous communication:
In synchronous communication the whole block of data bits is transferred at once, instead
of one character at a time.
The block of bits may or may not consist of different characters.
We need a bit oriented protocol between the sender and the receiver.
If the block consist of different characters the receiver needs to known the beginning of
the first bit of the first character
It needs a byte oriented protocol between the sender and the receiver
To perform this synchronous each data block is preceded with a unique synchronizing bit
pattern. Use the SYN transmission control character for this.
SYN has a bit pattern of 0010110. This SYN character can be reserved for indicating the
start of the block.
Problem in this scheme:
The transmitter will not send a SYN character as a part of the data. The bit pattern of two
characters could be such that if sent one after the other, they can constitute a SYN
character thereby fooling the receiver.
12
B.Sc Computer Technology
Data Communication and Networks- Unit II
If the ASCII character b and a are sent one after the other, a bit combination of 4 bits
from the character b and 3 bit from the character a to constitute the SYN character
At the receiving end , if the receiver is looking for SYN character , it can get fooled.
In this reason two SYN bytes are sent consecutively. The bit combination of two SYN
bytes that is 00101100010110 cannot be obtained by concatenating any character.
When the clock starts measuring the bit values the counter within a receiver is
incremented for every bit received and measured and pushed into the character
assembler.
After a character assembler the character is moved to separate buffer and the bit counter
is set to 0 to prepare for the next character.
Synchronous communication is used when large amount of data is to be sent from one
place to the other.
Asynchronous Communication
Assume that for each character of 8 bits , 1 start bit and 1 stop bit are sent. At 2 bits
/character as overhead , to send an overhead of
13
B.Sc Computer Technology
Data Communication and Networks- Unit II
Synchronous Communication
Assume that the file of 100,000 characters is broken into blocks of 1200 characters =9600
bits.
Assume that 48 overhead bits are sent along with each block
For SYN – Synchronize, STX- start of transmission , ETX-end of transmission
Overhead is now computed as :
Isochronous Communication
This method combines the approaches of asynchronous and synchronous
communications.
In the asynchronous method each character has both the start and stop bits. However the
idle period between the two characters is not random.
All idle periods of no transmission consist of an exact multiple of one character time
interval. If the time to transmit character is t the time interval between character cannot
be random as in the asynchronous method. It is also not 0 as in synchronous method. It
has to be t,2t,3t,…,nt where n is a positive integer in isochronous communication
The isochronous communication to asynchronous method transmission speed is high.
In asynchronous communication data rate is 2,400 bits per second but in isochronous
communication the data rate up to 19,200 bits per second.
14
B.Sc Computer Technology
Data Communication and Networks- Unit II
Half-Duplex Communication
In the half duplex mode both devices can transmit data though not at the same time.
When one device is sending data, the other must only receive it and vice versa
This requires a definite turnaround time during which the device change from the
receiving mode to the transmitting modes. Due to this delay, it is slower than simplex
communication.
It is implemented by using a two-wire circuit : one for data and one for ground.
Example : Conversations over walkie-talkie
15
B.Sc Computer Technology
Data Communication and Networks- Unit II
Full-Duplex Communication:
In this mode both the devices can transmit data at the same time.It means that both
devices are capable of sending as well as receiving data at the same time.
Example: Telephone conversation
This can be done using a two-wire circuit or a four –wire circuit.
In two wire circuit one wire is used for data and one for ground as in half duplex
In four wire circuit , there are two wires for data and two for ground.
Multiplexing:
Multiplexing divides the physical line or a medium into logical segment called channels
In multiplexing different channels carry data simultaneously over the same physical
medium
Hardware equipment called multiplexer or mux combine the inputs from different
sources and load them on different channels of a medium.
At the destination a de-multiplexer separates the signals and sends them to their different
destinations
Types of Multiplexing
There are two types
1. Frequency Division Multiplexing (FDM)
2. Time Division Multiplexing(TDM)
16
B.Sc Computer Technology
Data Communication and Networks- Unit II
17
B.Sc Computer Technology
Data Communication and Networks- Unit II
The frequencies of the human voice that are carried by the telephone system are in the
range of 0 to 4000 Hz. To carry a single voice conversation over telephone a bandwidth
of 4 KHz is sufficient.
The capacity of the medium such as twisted wire pair or coaxial cable is higher.
At an exchange, signals from multiple sources can be combined or multiplexing and then
sent to a higher or different exchange. At the other end they are de-multiplexed and sent
to the appropriate destinations.
18
B.Sc Computer Technology
Data Communication and Networks- Unit II
19
B.Sc Computer Technology
Data Communication and Networks- Unit II
20
B.Sc Computer Technology
Data Communication and Networks- Unit II
FDM Vs TDM:
FDM TDM
Analog Transmission Technique Digital transmission Technique
It is not flexible , because intermix terminals It is more flexible because intermix terminal
and synchronous method is not possible with different speed and synchronous method
FDM is simpler system to implement, cost is Implementation cost is more
minimum
FDM is analog transmission not suitable for all It is more popular because digital transmission
types of information for all types of information
21
B.Sc Computer Technology
Data Communication and Networks- Unit II
Noise
Noise is another component that poses a problem in receiving the signal accurately.
A signal travels as an electromagnetic signal through any medium.
Electromagnetic energy that gets inserted during transmission is called noise.
Types of Errors:
22
B.Sc Computer Technology
Data Communication and Networks- Unit II
23
B.Sc Computer Technology
Data Communication and Networks- Unit II
The data to be transmitted is divided into a number of blocks consisting of several bits
each. It is then divided by a prime number and the remainder is treated as CRC.
\
24
B.Sc Computer Technology
Data Communication and Networks- Unit II
There are schemes which improves the efficiency of the transmisison by sending multiple
frames say 1-8 at time. If it is OK the receiver can send an ACK in one shot of all the
frames.
Go-back-n:
Go-back-n which is used when more than one frame is sent at a time
The sender starts the retransmission with the last unacknowledged frame even if the
subsequent frames have arrived correctly at the receiver.
The sender send 5 frame to the receiver , the frames 0,1,2 arrive correctly at the receiver
but frame 3 is an error. The receiver sends NAK for frame 3 . By the time NAK reaches
the sender the sender may have already sent frames 4 and 5
After receiving the NAK the sender now retransmits frame and all frames transmitted
after frame 3 ie frame 4 and frame 5 to the receiver
This retransmission is successful the receiver acknowledge this correct transmission of
frames 3,4 and 5 after discarding the duplicates for frames 4 and 5
Another situtation where the sender has transmitted all its frames and is actually waiting
for an acknowledgement that has been lost on the way.
The sender waits for some time and then retransmits the unacknowledged frames. The
receiver detects this duplication sends another acknowledgement and discards the
redundant data
Another possibilty is when a damaged frame is received. Frame 0 and 1 arrive correclty,
but the receiver dose not immediately acknowledge them. It receives frame 2 which is
erro.It returns NAK2. This informs the sender that frames 0 and 1 have been received
correclty but that frame2 must be resent.
In this case the receiver keeps accepting new frames and does not reject them.In this
scheme the receiver needs lot of memory and processing logic to keep a track of all the
frames.
25
B.Sc Computer Technology
Data Communication and Networks- Unit II
26
B.Sc Computer Technology
Data Communication and Networks- Unit II
Sliding Window
The sliding window technique is a variation of the Go-back-n technique
The sender must send a frame wait for its acknowledge and only after it receives that
acknowledgement , send the next frame in stop and wait.
To improve the efficiency would be to send multiple frame at a time, check CRC of all
the frames one by one and send the acknowledgement for all and request for the next set
of frames. The sliding window technique is based on this technique
A Sliding window o size of 8 frames that is the sender can send eight frames before it
must wait to receive an acknowledgement from the receiver.
Transmission mechanism uses two buffers and on window to control the flow of data.
27
B.Sc Computer Technology
Data Communication and Networks- Unit II
The sender has a buffer for storing data coming from the sending application program.
The application program creates the data to be sent and writes it to this buffer. The sender
imposes a window on this buffer, and sends frames till all the frames have been sent.
The receiver also has a buffer. The receiver receives the data, checks it for any errors and
stores the correct ones in this buffer.
The application program at the receivers end then pick up data from this receive buffer
Assuming that the sender’s window size is 8 ,if frames 1 to 4 are sent and no
acknowledgement has been received , the sender’s window shall contain four frames
numbered 5 to 8.
After an acknowledgement number 5 arrives, the sender knows that the receiver has
correctly received frames 1 to 4. The sender ‘s window in now expanded to include the
next four frame making the window consist of framed 5,6,7,8,1,2,3,4.The sender window
shrinks form the left when it sends data frame s and expand to the right when it receives
acknowledgement from the receiver
The receiver window shrinks from the left when frames are received and expand to the
right when it sends acknowledgement to the receiver
28
B.Sc Computer Technology
Data Communication and Networks – Unit III
TRANSMISSION MEDIA
Transmission media are the physical infrastructure components that
carry data from one computer to another
1
B.Sc Computer Technology
Data Communication and Networks – Unit III
2
B.Sc Computer Technology
Data Communication and Networks – Unit III
OPTICAL FIBER
Optical fibers use light instead of electrical signals as a means of
signal propagation. It is made of glass fibers that are enclosed in a
plastic jacket.
A laser at one device sends pulse of light through this cable to other
device. These pulses translated into “1’s” and “0’s” at the other end.
The transmitter at the senders end of the optical fiber sends a light
emitting diode (LED) or laser to send pulses of light across the fiber .
A receiver end makes use of a light sensitive transistor to detect the
absence or presence of light to indicate a 0 or 1
In the center of fiber cable is a glass stand or core. The light from the
laser moves through this glass to the other device around the
internal core is a reflective material known as CLADDING.
The outer jacket can be made of Teflon ,plastic or metal
Optical fiber has bandwidth more than 2 gbps (Gigabytes per Second)
4
B.Sc Computer Technology
Data Communication and Networks – Unit III
Propagation Modes
There are different modes of propagation , depending upon the
physical characteristics of the fiber and the light source
Multimode
LED is mostly used as a light source.
Multiple beams pass through the core in different path
Step Index
The core has one density and the cladding has another.
Therefore at the interface there is a sudden change. Multiple beams
take different paths on reflection.
The beam that strikes the core at a smaller angle has to be reflected
many more times than the beam that shifted the core at a larger
angle to reach the other end.
At the destination all beams do not reach simultaneously creating
diffusion and confusion in terms of interpretation
5
B.Sc Computer Technology
Data Communication and Networks – Unit III
Graded Index
The core itself is made of a material of varying densities .The density
is the highest at the core and gradually decrease towards the edge
A beam goes through gradual refraction giving rise to a curve, except
that the horizontal beam travels unchanged
Different beams result in different curves or waveforms
Single Mode
This uses a highly focused light beam travels more or less
horizontally.
The fiber core diameter in this case is smaller than multimode and
lower density
This decrease results in critical angle close to 90 degree to make the
propagation of different beams very close to horizontal
6
B.Sc Computer Technology
Data Communication and Networks – Unit III
UNGUIDED MEDIA
It is also called wireless communication , transport electromagnetic
waves without using physical conductor
Radio Communication
7
B.Sc Computer Technology
Data Communication and Networks – Unit III
Microwave Communication
Microwaves use the line of sight method of propagation , as the
signals do not travel along the surface of the earth.
Two antennas must be in a straight line, able to look at each other
without any obstacle in between
The antennas are positioned on mountain tops to avoid obstacles.
Microwave signal travel only in one direction at a time
This means that for two-way communication such as telephony two
frequencies need to be allocated.
At both ends a transceiver is used which is a combination of a
transmitter and a receiver operating at the two respective
frequencies
Repeaters are used along with the antennas to enhance the signal.
The data rates offered are 1Mbps- 10 Gbps
Microwave is also relatively inexpensive
Satellite Communication
Introduction
Satellite communication is similar to the terrestrial microwave except
that the satellite acts as of the stations
It’s function like an antenna and repeater together
Ground station A can send the information to ground station B via
the satellite
If the earth along with its ground stations is revolving and the
satellite is stationery the sending and receiving earth station and the
satellite can be out of sync over time
8
B.Sc Computer Technology
Data Communication and Networks – Unit III
9
B.Sc Computer Technology
Data Communication and Networks – Unit III
10
B.Sc Computer Technology
Data Communication and Networks – Unit III
11
B.Sc Computer Technology
Data Communication and Networks – Unit III
12
B.Sc Computer Technology
Data Communication and Networks – Unit III
It used two frequencies, one frequency used for sending and the
other for receiving. This full duplex system had 23 channels.
The third development was Advanced Mobile Phone
System(AMPS).In England It is called TACS and in Japan MCS-L1
The area covered is conceptually divided in small regions known as
cells called cellular phones
Each cell has an antenna and a cell office to control the cell.
A Mobile Telephone Switching office (MTSO) controls various cell
office and coordinates the communication between them and the
Telephone Central Office (TCO) or a telephone exchange.
Bands in Cellular Telephony
Analog transmission is used for cellular telephony
Frequency modulation is used for communication between the
mobile phone and cell office.
Two frequency bands are allocated , one for the communication by
the mobile phone and other for the land phone. The two bands are
typically 824-849 MHz and 869-894 MHz
Each channel requires a full duplex dialog. For preventing
interference adjacent channels are rarely allocated
The same frequency band can be used for multiple non-adjacent cells
In USA channel available for each cell is 40.
13
B.Sc Computer Technology
Data Communication and Networks – Unit III
After this, it send this number to the closet cell office which in turn
sends it’s to MTSO in turn sends it to the CTO. MTSO allocates an
empty voice channel to the cell to establish the connection
Paging: When a land phone places a call to mobile, the telephone
central office sends the number to the MTSO. The MTSO performs a
look up to see where the mobile is currently placed by sending
appropriate query signals t all the cells. This process is called paging
Transmitting /Receiving/Handoff Operations
During the conversation, if the mobile phone crosses the cell, the
signal can become weak.
The MTSO constantly checks the signal level and if it finds it low it
immediately seeks a new cell. The MTSO then changes the cell
carrying channel.
The process of handling the signal off from the old channel to the
new one is called handoff.
Step 1: Cell A senses that the user of cell 50 is moving to cell B and that its
signal is becoming weaker. So it alerts the MTSO.
Step2: The MTSO wants to check if any of the adjacent units can take up
the responsibility of unit 50
Cell C responds by saying that it cannot do so, as unit 50 is weak in cell C,
too.
14
B.Sc Computer Technology
Data Communication and Networks – Unit III
New Developments
Three developments
1. Digital cellular telephone
2. Integration of cellular phones with satellite communication
3. Integration of the mobile telephony with the PC. This is called Mobile
Phone Communication
15
B.Sc Computer Technology
Data Communication and Networks – Unit III
Shannon Capacity
Claude Shannon introducing a formula that determines the maximum
data rate of a channel .This is called as the Shannon capacity
Determine the maximum data rate of a transmission medium the
formula reads:
16
B.Sc Computer Technology
Data Communication and Networks – Unit III
Mesh Topology
Mesh topology is also called complete topology
Each node is connected to every other node by direct links
For m node there would be m(m-1)/2 physical links .This means that
every node must have (m-1) I/O port
Mesh topology does not have traffic congestion problems there are
dedicated link.
The link are not shared a special Media access Control(MAC) protocol
a part of the data link layer of the OSI model is not needed to decide
who should communicate to whom and for how long.
17
B.Sc Computer Technology
Data Communication and Networks – Unit III
Merits :
1. If one link is down the rest of the network can still continue.
2. Fault identification also easy.
3. Robust
The main demerit is the cable length.
Example : 1000 nodes one will require 1000(1000-
1)/2=1000X999/2=499500 cable or links
Star Topology
Star topology have a central node often called a hub
If a node wants to send some data to another node it send it to this
hub.
The hub sends it to the appropriate node
Merits :
1. Cheaper than mesh topology.
2. If one link goes bad all other node and that link continue to
function
3. Easier to install, maintain and reconfigure.
4. Robust
Demerit : If the hub goes down , the entire network become defunct
Tree Topology
It can be derived from the star topology.
Tree has a hierarchy of various hubs like branches in tree.
18
B.Sc Computer Technology
Data Communication and Networks – Unit III
Ring Topology
Each node is directly connected to only its two adjacent neighbours
If a node wants to send something to a distant node on a ring, it has
to go through many intermediate nodes which act like repeaters
,reproducing the incoming bit stream with full signals on the
outgoing line.
Merit :
1. Easy to reconfigure and install
2. A node not receiving any signal for a long time indicates a fault
Demerit :
1. If a node in a ring fails the whole ring cannot function
2. The traffic is only in one direction
19
B.Sc Computer Technology
Data Communication and Networks – Unit III
Bus Topology
Bus topology uses multipoint philosophy
A Long cable bus forms the backbone to all the nodes
A node wanting to send some data to some other node pushes the
data on the bus which carries it to the other node.
A Tap is connector that connects that node with the metallic core of
the bus via drop line
Merit :
Easy to install and uses less cable
Demerit:
1. Difficult to add new nodes to a bus because of a node changes
number of tap and the average distance between them.
2. It more inflexible
3. Fault isolation is very difficult
4. If a portion of the bus breaks down the whole bus cannot function
20
B.Sc Computer Technology
Data Communication and Networks – Unit III
Hybrid Topology
Hybrid topology is one that uses two or more of the topologies
together
In this case the bus, star and ring topologies are used to create this
hybrid topology
Topology refers to the logical arrangement of the nodes and not the
physical appearance
Switching Basics
Switching refers to the technique of connecting computers to a
central node called a switch which can then be used to connect to
other nodes
A switched network is made up of a number of interlinked nodes
called switches
A switch is a hardware as well as software device that allows a
connection to be established between two or more devices which
are linked to it
Example : Switched Network
21
B.Sc Computer Technology
Data Communication and Networks – Unit III
Switching Methods
1. Circuit Switching
2. Packet Switching
3. Message Switching
Circuit Switching
A direct physical connection path is established between two
computers.
Example: Telephone call
It is more suitable for human communications
When a computer wants to communicate with another computer a
dedicated connection is established between them over the
switches.
The computer can then communicate using the connection , when
the communication is over either computer cab send a request for
terminating this connection and only at that stage would the
connection be released.
The two computers communicate over this dedicated connection no
other computer can use this portion of the connection.
The total transmission line is exclusively reserved for the two
computers using that connection
Computer A wants to send some data to computer D .The dark line
shows the dedicated channel between computers A and D.
A circuit switch is a device with m inputs and n outputs where m and
n need not be equal.
It creates a temporary dedicated connection between an input
device and output device
22
B.Sc Computer Technology
Data Communication and Networks – Unit III
Packet Switching
Packet Switching has emerged switching technology for computer-to-
computer communications
Most of the protocols such as x.25,TCP/IP ,Frame Relay ,ATM etc use
packet switching
In Packet switching data to be sent is divided into discrete blocks
called packets which are variable length
The maximum size of data called packet size or packet length
Each packet contains data to be transferred and also control
information such as sender address and destination address
Packet switching can be classified into two types
Datagram Approach
Each packet or datagram is considered as a totally independent
packet from all others
When there are multiple packets sent by the same source to the
same destination for the same message each packet is independent
of all other packets can take different routes or path
Computer A is sending four packets to another computer D
These four packets belong to the same original message but travel
via different routes and also can arrive at the destination D in a
different order than how the source A sent them
The destination node needs to have a buffer memory to store all the
packets and at the end to re-sequence them to form the original
message
Each packet must have a header containing at different routes is that
the routing decisions are taken for every packet ,each time at every
node as the packets move from one node to the next.
23
B.Sc Computer Technology
Data Communication and Networks – Unit III
24
B.Sc Computer Technology
Data Communication and Networks – Unit III
25
B.Sc Computer Technology
Data Communication and Networks – Unit III
Message Switching
It is known as store-and-forward approach for an entire message
A Computer receives a message stores it on its disk until the
appropriate route is free, and then sends it along the route
There is no direct link between the source and destination
In message switching the computer stores the packet to be
forwarded on its route in its main memory until it can be forwarded
The message switching approach is now replaced by message queue
technologies such as Microsoft Message Queue (MSMQ) and IBM
MQ series
26
B.Sc Computer Technology
Data Communication and Networks – Unit III
27
B.Sc Computer Technology
Data Communication and Networks – Unit III
There are two main categories of routing algorithms used to calculate the
shortest path between two routers:
1. Distance Vector Routing
2. Link State Routing
Distance Vector Routing
Introduction
28
B.Sc Computer Technology
Data Communication and Networks – Unit III
29
B.Sc Computer Technology
Data Communication and Networks – Unit III
Routing Table
For storing information about the network and keeping it updated
each router uses a routing table
The routing table has at least 3 columns
1. Network id : This is the final destination of the packet
2. Cost : This is the number of hops that a packet must take to reach
the final destination
3. Next router : This is the router to which the packet must be delivered
on its way to a particular final destination .The network id of the
destination is mentioned in the network id field of the table
30
B.Sc Computer Technology
Data Communication and Networks – Unit III
31
B.Sc Computer Technology
Data Communication and Networks – Unit III
Created the temporary routing table router A now adds the contents
of this temporary routing table to its own routing table and sorts it
on Destination network id to get a combined sorted table
32
B.Sc Computer Technology
Data Communication and Networks – Unit III
The routing tables of all the routers get updated with the information
33
B.Sc Computer Technology
Data Communication and Networks – Unit III
Packet Cost
The cost is not directly based on the hop count .It is weighted based on a
number of factors such as security levels, traffic and the state of the link
How Does Link State Routing Work?
The Link state routing works with the help of the same internet. Each
router sends its knowledge only about its neighbours to every other
router in the internet
Link state packet
Each router sends a very small greeting packets to each of its
neighbours and expects a response in return
If the neighbor replies the original router considers that the neighbor
is up and running and determine the cost based on the factors
Using this information the original router then sends information
about all its neighbours to the entire internet in a process called
flooding
34
B.Sc Computer Technology
Data Communication and Networks – Unit III
It sends special packet called as Link State Packet (LSP) to all other
routers via its neighbours
General Format of the LSP
35
B.Sc Computer Technology
Data Communication and Networks – Unit III
Dijkstra Algorithm
The Link state database each router executes an algorithm called as
dijkstra algorithm to create its routing table
This algorithm considers the internet as a graph and find the distance
along a shortest path from a single node of the graph to all other
nodes in the graph
A routing table is created to compute the shortest path
Approaches to Routing
S.No Static Routing Dynamic Routing
1 Static routing manually sets up the The dynamic routing uses dynamic
optimal paths between the source and protocols to update the routing table
the destination and to find the optimal path between
the source and the destination
2 Static routing algorithm do not have Dynamic routers can sense a faulty
any controlling mechanism if any faults router in the network
in the routing paths
3 Static routing is suitable for very small Dynamic routing is used for larger
networks networks
4 The static routing is the simplest way of dynamic routing uses complex
routing the data packets algorithms for routing the data packets
5 Static routing requires minimal memory Dynamic routing a few memory
overheads
6 Network administrator finds out the The algorithm and the protocol is
optimal path and makes the changes in responsible for routing the packets and
the routing table making the changes accordingly in the
routing table
36
B.Sc Computer Technology
Data Communication and Networks – Unit III
37
B.Sc Computer Technology
Data Communication and Networks – Unit III
38
B.Sc Computer Technology
Data Communication and Networks – Unit III
39
B.Sc Computer Technology
Data Communication and Networks – Unit III
40
B.Sc Computer Technology
Data Communication and Networks – Unit III
41
B.Sc Computer Technology
Data Communication and Networks – Unit III
Physical Layer
42
B.Sc Computer Technology
Data Communication and Networks – Unit III
43
B.Sc Computer Technology
Data Communication and Networks – Unit III
44
B.Sc Computer Technology
Data Communication and Networks – Unit III
45
B.Sc Computer Technology
Data Communication and Networks – Unit III
46
B.Sc Computer Technology
Data Communication and Networks – Unit III
47
B.Sc Computer Technology
Data Communication and Networks – Unit III
48
B.Sc Computer Technology
Data Communication and Networks – Unit III
49
B.Sc Computer Technology
Data Communication and Networks – Unit III
50
B.Sc Computer Technology
Data Communication and Networks – Unit III
51
B.Sc Computer Technology
Data Communication and Networks – Unit IV
1
B.Sc Computer Technology
Data Communication and Networks – Unit IV
The speed mismatch between the speaker and the listener, error
control and flow control take cake of this issues
The Data link layer is responsible for error control and flow control
This layer also decides by a convention , who is going to speak when ,
who has a control of the medium. This is called media access control.
Exactly at the same time the other party also can start speaking ,
thinking that you want the other party to speak. This results in a
collision
The electrical signals in the telephone wires change .This is a physical
layer
Protocols in Computer Communications
The next node find out whether the file or message was received
correctly or not
The OSI Model
Introduction
Host X wants to send a message to another host Y. This message
would travel via a number of intermediate nodes.
These intermediate nodes as well as X and Y are concerned with the
three lowermost OSI layers ie physical , data link and network
The other four layers are used by the sender X and the receiver Y
only, they are called end-to-end layers
3
B.Sc Computer Technology
Data Communication and Networks – Unit IV
4
B.Sc Computer Technology
Data Communication and Networks – Unit IV
5
B.Sc Computer Technology
Data Communication and Networks – Unit IV
When this data unit (DN) is passes from the network layer at node A
to the data link layer at node A the following happens
1. The routing table is consulted, which mentions the next node to
which the frame sent for a specific destination node
2. The data link layer at node A form a data unit DD
6
B.Sc Computer Technology
Data Communication and Networks – Unit IV
6. This continues until the data unit at data link layer DD reaches node
D. The physical addresses are removed to get the original DN which is
passes on to the network layer at node D
The data link layer also perform the flow control function, based on
the speeds of the CPU, transmission ,buffer size and congestion
control
If the connection is a multipoint type then the problem of who
should send how much data and at what times has to be solved. This
problem arises in Local Area Networks(LAN) and is solved by the
Media Access Control(MAC) protocol.
In LAN the data link layer is split into two sub layers
LLC – takes care of normal data link layer functions such as error
control and flow control etc.
7
B.Sc Computer Technology
Data Communication and Networks – Unit IV
Network Layer
It is responsible for routing a packet within the subnet that is from the
source to the destination nodes across multiple nodes in the same
network or across multiple networks.
This layer is ensures the successful delivery of a packet to the
destination node.
This layer is also responsible for tackling the congestion problem at a
node
This layer has to carry out the accounting function to facilitate this
billing based on how many packets are routed, when etc.
A router can connect two networks with different protocols ,packet
length and formats
Transport Layer
The transport layer is the first end-to-end layer . All the lower layers were
the protocols between the adjacent nodes
8
B.Sc Computer Technology
Data Communication and Networks – Unit IV
The transport layer ensures that the complete message arrives at the
destination .
The transport layer receives data from the session layer on the source
computer which need to be send across to the other computer.
The transport layer on the source computer breaks the data into smaller
packet and gives them to the lower layer. It adds sequence number to
the packets.
It also establish a logical connection between the source and destination
The connection consist of three phases : Establishment , Data transfer
and Connection release
9
B.Sc Computer Technology
Data Communication and Networks – Unit IV
Session Layer
The main function of the session layer is to establish, maintain and
synchronize the interaction between two communicating hosts.
Example: To send a big document consisting of 1000 pages to
another user on a different computer. Suppose that after the first
105 pages have been sent the connection between two hosts is
broken for some reason. These issues are the concerns of the session
layer
To avoid complete retransmissions from the first page the session
layer between the two hosts could create sub-session. After each
sub-session is over a checkpoint can be taken.
The connection breaks after the first 105 pages haven been
transmitted after the connection is restored the transmission would
start at the 101st page. This is because the last checkpoint would
have been taken after the 100th page was transmitted
10
B.Sc Computer Technology
Data Communication and Networks – Unit IV
Presentation Layer
When two host are communicating with each other , they might be
using different coding standards and character sets for
representation data internally
One host using ASCII code for character representation the other
host using EBDCDIC
The presentation layer has to take care of such differences
It is also responsible for data encryption and decryption for security
and data compression and decompression for more efficiency in data
transmission
Application Layer
It is the topmost layer in the OSI model, enables a user to access the
network.
The application programs using the network services also reside at
this layer
11
B.Sc Computer Technology
Data Communication and Networks – Unit IV
12
B.Sc Computer Technology
Data Communication and Networks – Unit IV
Modems are used to modulate the digital data arriving from the
computer at the senders end into analog signal which are then
carried over by the traditional analog telephone network (Central
Office or CO) to the receiver’s end.
Digital Communication
In digital communication telephone companies started to provide
digital communication backbones.
This means that the communication between the Central Office(CO)
and the telephone network became digital
13
B.Sc Computer Technology
Data Communication and Networks – Unit IV
14
B.Sc Computer Technology
Data Communication and Networks – Unit IV
ISDN Architecture
Digital Bit Pipe
The fundamental concept in ISDN is the digital bit pipe.
This is a conceptual pipe through which bits flow between the end
user and the CO.
The bit pipe is bi-directional .Bits can originate at the customer
premises or at the ISDN exchange
The digital bit pipe supports time division multiplexing technique to
provide for multiple independent channels
There are two primary sets of users of ISDN services
1. Home users – low bandwidth standard
2. Business users – high bandwidth standard, need multiple
channels provided by a single business bit pipe
ISDN Channel Types
ISDN offers three separate digital channels
15
B.Sc Computer Technology
Data Communication and Networks – Unit IV
16
B.Sc Computer Technology
Data Communication and Networks – Unit IV
Functional Grouping
Introduction
The device used to access ISDN are grouped to form functional
grouping.
A functional grouping clubs various device, depending on their
functionalities.
17
B.Sc Computer Technology
Data Communication and Networks – Unit IV
18
B.Sc Computer Technology
Data Communication and Networks – Unit IV
Reference Points
A reference points defines the interface between two functional groupings.
19
B.Sc Computer Technology
Data Communication and Networks – Unit IV
Physical Layer
ISDN Protocol use two interfaces at the physical layer : Basic Rate
Interface (BRI) and Primary Rate Interface(PRI)
Physical Layer – BRI
It consist of 2B channels and 1D channels (2B+D).
A subscriber can connect to a BRI interface using the R,S,U reference
points.
20
B.Sc Computer Technology
Data Communication and Networks – Unit IV
The B channel consists of two sub channels,B1 and B2. Each B1 and
B2 is 8 bit and occurs twice, making a total of 16 bit B1 and 16 bit B2.
Overall the B channel contains 32 bits. The D channel contains 4 bits.
There are 12 bits reserved as overhead bits.
There are two overhead bits before the first B1 etc. A BRI frame
consist totally 48 bits.
Physical Layer – PRI
The PRI interface supports 23B channels and 1D channel. The PRI
frame format is identical to the T-1 frame format.
The bit size of each PRI frame is 193 bits. PRI frames are sampled at a
rate of 8000 per second.
An effective transmission rate of 193 bits per frame X 8000 samples
per second = 1.544Mbps
Data Link Layer
The B channel consists of the Frame Relay and LAPB protocols .The D
channel consists of the Link Access Procedure for the D Channel
(LAPD) protocol.
21
B.Sc Computer Technology
Data Communication and Networks – Unit IV
22
B.Sc Computer Technology
Data Communication and Networks – Unit IV
ISDN Addressing
ISDN is based on the concept of the telephone network ,its
numbering (ie addressing) scheme is also based on that of the
worldwide telephone network
23
B.Sc Computer Technology
Data Communication and Networks – Unit IV
24
B.Sc Computer Technology
Data Communication and Networks – Unit V
Overview of ATM
ATM is a packet network
ATM support multiplexing of multiple logical connections over a single physical
channel.
The information over a logical ATM connection flows in the form of cells
1
B.Sc Computer Technology
Data Communication and Networks – Unit V
A cell is a fixed-size packet, ATM itself is sometimes called relay.ATM does not
provide any flow control or error control at the data link layer
ATM is a modern WAN switching technique devised by telephone companies to
deliver voice, data and even video
ATM network uses switches .Multiple hosts connect to each switch. In central
ATM switch to create a star topology
If a host on the ATM network goes down or the connection between a host and
the switch breaks, only the host is disabled without affecting the other hosts on
the ATM network
Each ATM switch connects to many other switches or hosts
ATM network is highly scalable , more and more hosts are added to a network
ATM is designed to offer extremely high data rates. ATM connection between a
host and switch can offer a data rate of 155 Mbps
ATM uses optical fiber, rather than copper wire
ATM is designed to be a full duplex data transmission network it uses two optical
fibers one for each direction of data transmission
Challenges for ATM
1. It is devised to carry computer voice ,audio and video data
Packet Size
The key issue in ATM networks is the packet size
2
B.Sc Computer Technology
Data Communication and Networks – Unit V
Small packets must wait for large packets in case of variable length packets
A Multiplexer that accepts packets from many source routes and sends it
to a single outbound route
A Large packet P arrives before three small packets X,Y and Z arrive at the
multiplexer from the other route packets x,y and z must wait until the
whole of packet P is transmitted
The ATM Solution
The packet size cannot be too high or variable in ATM networks
ATM uses a fixed packet size of 53 octates
Each 53 octate ATM packet is called as cell.
3
B.Sc Computer Technology
Data Communication and Networks – Unit V
In ATM if the input is received in the form of large or variable length packets all
these packets are converted into equal cells each of 53 octates.
Using Time Division Multiplexing (TDM) these packets would be delivered in turn
The large packet P is split up into three smaller packets called A,B and C before
transmission
4
B.Sc Computer Technology
Data Communication and Networks – Unit V
5
B.Sc Computer Technology
Data Communication and Networks – Unit V
The virtual circuit can be pre configured in the hardware , it is called Permanent
Virtual Circuit (PVC) or they can be stored in RAM and updated as and when
required in an approach called Switched Virtual Circuit (SVC)
PVC and SVC both use packet switching but set up a connection –oriented path
through the network before data is sent
PVC is provisioned which means that someone places the configuration
information on non-volatile storage, it takes a long time to set up, the PVC
survives power failures
When using PVC the VPI values are set up in the table maintained by ATM
switches
An SVC is created on demand – a computer requests an SVC ,sends data, and
then terminates the SVC
The establish SVC, ATM uses higher layer protocol such as B-ISDN.
These protocols creates an SVC between the two end points on demand , and
AM uses that SVC for transmission during that session
ATM Cells
ATM works with two cell formats
1. User-Network Interface (UNI)
2. Network-Network Interface(NNI)
The user access devices connect to the ATM switches through a UNI.
The switches are connected with other switches using NNI
UNI and NNI uses 53 octate cells
In case of UNI the first four bits are reserved for GFC , and the remaining 8 bits
are reserved for VPI
In case of NNI, the first 12 bits collectively denote the VPI
UNI and NNI
6
B.Sc Computer Technology
Data Communication and Networks – Unit V
Switching
There are two types of switches :
1. VPI switch – that routes packets based only on the VPI values
2. VPC switch – that routes packet based on VPI as well as VCI values
VP Switch
ATM VP switch that has six incoming interfaces and six outgoing interfaces. One
incoming interface (number 2) and two outgoing interfaces (number 10 and 12)
The incoming interface (number 2) has received two packets with VPI values =78
and 121
To determine that a packet arriving at interface 2 with VPI=78 should be routed
to interface 10 with VPI=37
7
B.Sc Computer Technology
Data Communication and Networks – Unit V
8
B.Sc Computer Technology
Data Communication and Networks – Unit V
Physical Layer
It deals with issues related to transmission media,bit transmission
,electrical/optical interface and encoding techniques
This enables transformation of ATM cells into raw bits which can be transmitted
across a transmission medium
transmission medium is optical fiber although it can also be twisted-pair or
coaxial cable
ATM Layer
It deals with cell routing , switching ,multiplexing and traffic management
The core area of the ATM layer is the definition of the ATM cells which is a 53
octates unit
The ATM cell is defined in the ATM Layer
The ATM layer accepts 48 byte AAL segments from the AAL layer and adds the 5
byte cell header to transform the segment into a 53 byte ATM cell that can be
delivered to the physical layer
9
B.Sc Computer Technology
Data Communication and Networks – Unit V
AAL1:
AAL1 supports applications that transfer information at a constant bit rate
Example : data transmission are voice and video
The CS sub-layer divides the incoming bit stream into 47 byte segments and
passes them to the SAR sub layer
The SAR sub layer adds one byte of header making this a 48 byte data unit
AAL1 operations
10
B.Sc Computer Technology
Data Communication and Networks – Unit V
AAL2
It supports variable bit rates such as compressed voice, video and data.
CS sub layer divides the incoming bit stream into 45 byte segments and passes
them to the SAR sub-layer.
The SAR sub layer adds one byte of header and two byte of trailer , making this a
48 byte data unit
AAL2 operation
11
B.Sc Computer Technology
Data Communication and Networks – Unit V
AAL3/4 Operations
AAL3 and AAL4 supports connection-oriented and connectionless data.
The CS sub layer accepts a data packet with a maximum length of 65536 bytes
from an upper layer protocol such as Frame Relay or SMDS
It adds a header and trailer to indicate the start and the end of the message and
only for the last frame, how much is the data and how much is the padding.
It split the packets into 44 byte segments and hands them over to the SAR layer
The CS does not append the header and trailer to every 44 segment , it adds
them to the beginning and end of only the original segment
The SAR sub layer accepts 44 byte segment from the CS sub layer and appends a
two byte header and two –byte trailers to each frames and passes such 48 byte
frames.
AAL3 / 4 Header and Trailer Sub fields:
12
B.Sc Computer Technology
Data Communication and Networks – Unit V
AAL5
The AAL3/4 provides services for flow control and error control that are quite
comprehensive. However all applications do not demand these services
In such situations the AAL5 is useful. It assumes that all the cells belonging to a
single transmission travel sequentially in order and that the upper layers provide
the necessary services for flow control and error control.
AAL5 does not provide any addressing, ordering or other header information
either with the CS or SAR. It is name Simple and Efficient Adaptation Layer (SEAL)
AAL5 Operation
Trailer field Description
User to User ID (UU) This one –byte field is not used currently
Type (T) This one –byte field is not used currently
Length(L) This two byte field indicates the length of the CS data unit
Cyclic Redundancy CRC field serves the same error-detection purpose
Check(CRC)
13
B.Sc Computer Technology
Data Communication and Networks – Unit V
Miscellaneous Topics
1. Service Classes
Four types of Service Classes :
1. Constant Bit Rate (CBR)
2. Variable Bit Rate (VBR)
3. Available Bit Rate (ABR)
4. Unspecified Bit Rate (UBR)
ATM Service Classes
14
B.Sc Computer Technology
Data Communication and Networks – Unit V
Attributes Description
Sustained cell Rate (SCR) This is the average cell rate over a period
of time
Peak Cell Rate(PCR) This is the maximum transmission rate at
a point of time
Minimum Cell Rate(MCR) This is the minimum cell rate that the
network guarantees a user
Cell Variation Delay Tolerance (CVDT) This is a unit that measures the changes
in cell transmission times
Network-related QoS Attributes
Attributes Description
Cell Loss Ratio (CLR) This attributes defines the fraction of the
cells lost/delivered too late during
transmission
Cell Transfer Delay (CTD) This is the average time required for a
cell to travel from source to the
destination
Cell Delay Variation(CDV) This is the difference between the
maximum and minimum values of CTD
Cell Error Ratio (CER) This parameters defines the fraction of
cells that contained errors
3. Characteristics of ATM
Characteristics Description
Asynchronous ATM is an asynchronous network.This means that
the source and the destination do not have to be
coordinated before transmission begins.This also
means that each cell in transmission can travel
independently without regard to other cells in the
same transmission
Virtual Circuit Approach ATM uses the virtual circuit approach the
transmission becomes connection-oriented
Order of Cells Because all cells in a single transmission take the
same route, they always arrive in the same order
Equal Delays Even if there are network problems the delays
apply to all the transmission equally
Automatic error detection and ATM does not provide elaborate retransmission
correction mechanisms
a. Transmission media are very reliable
b. ATM uses small 53 octate cells.
15