Unit 1
Unit 1
Unit 1
BHILAI
UNIT-1
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The
switching technique will decide the best route for data transmission.
o In case of circuit switching technique, when any user wants to send the data,
voice, video, a request signal is sent to the receiver then the receiver sends
back the acknowledgment to ensure the availability of the dedicated path.
After receiving the acknowledgment, dedicated path transfers the data.
o Circuit establishment
o Data transfer
o Circuit Disconnect
Circuit Switching can use either of the two technologies:
o Space Division Switching has high speed, high capacity, and nonblocking
switches.
o Crossbar Switch
o Multistage Switch
Crossbar Switch
The Crossbar switch is a switch that has n input lines and n output lines. The
crossbar switch has n2 intersection points known as crosspoints.
Disadvantage of Crossbar switch:
Multistage Switch
o Multistage Switch is made by splitting the crossbar switch into the smaller
units and then interconnecting them.
o Once the dedicated path is established, the only delay occurs in the speed of
data transmission.
Message Switching
o Message switches are programmed in such a way so that they can provide
the most efficient routes.
o Each and every node stores the entire message and then forward it to the
next node. This type of network is known as store and forward network.
o Data channels are shared among the communicating devices that improve
the efficiency of using available bandwidth.
o The size of the message which is sent over the network can be varied.
Therefore, it supports the data of unlimited size.
o The Long delay can occur due to the storing and forwarding facility
provided by the message switching technique.
Packet Switching
o The message splits into smaller pieces known as packets and packets are
given a unique number to identify their order at the receiving end.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend
the message.
o Call request and call accept packets are used to establish the connection
between sender and receiver.
o In this case, the path is fixed for the duration of a logical connection.
o In the above diagram, A and B are the sender and receiver respectively. 1
and 2 are the nodes.
o Call request and call accept packets are used to establish a connection
between the sender and receiver.
Node takes routing decisions to Node does not take any routing decision.
forward the packets.
Congestion cannot occur as all the Congestion can occur when the node is busy, and
packets travel in different directions. it does not allow other packets to pass through.
o Reliable: If any node is busy, then the packets can be rerouted. This ensures
that the Packet Switching technique provides reliable communication.
o The protocols used in a packet switching technique are very complex and
requires high implementation cost.
What is Multiplexing?
Multiplexing is a technique used to combine and send the multiple data streams
over a single medium. The process of combining the data streams is known as
multiplexing and hardware used for multiplexing is known as a multiplexer.
Why Multiplexing?
o The transmission medium is used to send the signal from sender to receiver.
The medium can only have one signal at a time.
o If there are multiple signals to share one medium, then the medium must be
divided in such a way that each signal is given some portion of the available
bandwidth. For example: If there are 10 signals and bandwidth of medium
is100 units, then the 10 unit is shared by each signal.
History of Multiplexing
Concept of Multiplexing
o The 'n' input lines are transmitted through a multiplexer and multiplexer
combines the signals to form a composite signal.
o The composite signal is passed through a Demultiplexer and demultiplexer
separates a signal to component signals and transfers them to their respective
destinations.
Advantages of Multiplexing:
Multiplexing Techniques
o It is an analog technique.
o Frequency Division Multiplexing is a technique in which the available
bandwidth of a single transmission medium is subdivided into several
channels.
o The input signals are translated into frequency bands by using modulation
techniques, and they are combined by a multiplexer to form a composite
signal.
o The main aim of the FDM is to subdivide the available bandwidth into
different frequency channels and allocate them to different devices.
o Using the modulation technique, the input signals are transmitted into
frequency bands and then combined to form a composite signal.
o The carriers which are used for modulating the signals are known as sub-
carriers. They are represented as f1,f2..fn.
Disadvantages Of FDM:
Applications Of FDM:
o It is used to utilize the high data rate capability of fibre optic cable.
o Optical signals from different source are combined to form a wider band of
light with the help of multiplexer.
o It is a digital technique.
o It can be used to multiplex both digital and analog signals but mainly used to
multiplex digital signals.
o Synchronous TDM
o Asynchronous TDM
Synchronous TDM
o If the device does not have any data, then the slot will remain empty.
o In Synchronous TDM, signals are sent in the form of frames. Time slots are
organized in the form of frames. If a device does not have data for a
particular time slot, then the empty slot will be transmitted.
In the above figure, the Synchronous TDM technique is implemented. Each device
is allocated with some time slot. The time slots are transmitted irrespective of
whether the sender has data to send or not.
o The capacity of the channel is not fully utilized as the empty slots are also
transmitted which is having no data. In the above figure, the first frame is
completely filled, but in the last two frames, some slots are empty.
Therefore, we can say that the capacity of the channel is not utilized
efficiently.
o The speed of the transmission medium should be greater than the total speed
of the input lines. An alternative approach to the Synchronous TDM is
Asynchronous Time Division Multiplexing.
Asynchronous TDM
o In Asynchronous TDM, total speed of the input lines can be greater than the
capacity of the channel.
o In Asynchronous TDM, each slot contains an address part that identifies the
source of the data.
o The difference between Asynchronous TDM and Synchronous TDM is that
many slots in Synchronous TDM are unutilized, but in Asynchronous TDM,
slots are fully utilized. This leads to the smaller transmission time and
efficient utilization of the capacity of the channel.
o In Synchronous TDM, if there are n sending devices, then there are n time
slots. In Asynchronous TDM, if there are n sending devices, then there are m
time slots where m is less than n (m<n).
In the above diagram, there are 4 devices, but only two devices are sending the
data, i.e., A and C. Therefore, the data of A and C are only transmitted through the
transmission line.
Demultiplexing –
Delivering received segments at the receiver side to the correct app layer
processes is called demultiplexing.
Multiplexing
Demultiplexing
Delivering the received segments at the receiver side to the correct app layer
processes is called demultiplexing.
The destination host receives the IP datagrams; each datagram has a source
IP address and a destination IP address.
Each datagram carries 1 transport layer segment.
Each segment has the source and destination port number.
The destination host uses the IP addresses and port numbers to direct the
segment to the appropriate socket.
Multiplexing and demultiplexing are just concepts that describe the process of the
transmission of data generated by different applications simultaneously. When the
data arrives at the Transport layer, each data segment is independently processed
and sent to its appropriate application in the destination machine.
The main objective of multiplexing and demultiplexing is to allow us to use a
multitude of applications simultaneously.
The above figure shows that the source computer is using Google, Outlook,
and Chat applications at the same time.
All the data is forwarded to a destination computer.
Each application has a segment put on a wire to be transmitted. It signifies
that all applications are running simultaneously.
Without multiplexing/demultiplexing exists, a user can use only one
application at a time because only the segments of that application are put
on the wire and transmitted. For clarification, see the figure below −
In the above figure, the Application layer has generated data, and then passed it
down to the Transport layer to be segmented.
After segmenting the data, port numbers are given to each segment to be
ready for transmission.
Then the segments are put on a wire to travel across the network to the
destination. This process is called "multiplexing".
When the transmitted segments reach the Transport layer of the destination,
they are automatically sent up to their appropriate applications. This
process is called "demultiplexing".
OSI Model
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in
one computer moves through a physical medium to the software application
in another computer.
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
o The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application layer
is closest to the end user. Both the end user and the application layer interact
with the software applications. An upper layer refers to the layer just above
another layer.
o The lower layer of the OSI model deals with the data transport issues. The
data link layer and the physical layer are implemented in hardware and
software. The physical layer is the lowest layer of the OSI model and is
closest to the physical medium. The physical layer is mainly responsible for
placing the information on the physical medium.
There are the seven OSI layers. Each layer has different functions. A list of seven
layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer
o The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
o Line Configuration: It defines the way how two or more devices can be
connected physically.
o Signals: It determines the type of the signal used for transmitting the
information.
2) Data-Link Layer
o Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer to
the frame. The header which is added to the frame contains the hardware
destination and source address.
o Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer.
It is the technique through which the constant data rate is maintained on both
the sides so that no data get corrupted. It ensures that the transmitting station
such as a server with higher processing speed does not exceed the receiving
station, with lower processing speed.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
3) Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices
on the network.
o It determines the best path to move data from source to the destination based
on the network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to
provide the routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer
protocols. Examples of protocols are IP and Ipv6.
o Packetizing: A Network Layer receives the packets from the upper layer
and converts them into packets. This process is known as Packetizing. It is
achieved by internet protocol (IP).
4) Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o When data is sent over the TCP connection, then the TCP protocol
divides the data into smaller units known as segments. Each segment
travels over the internet using multiple routes, and they arrive in
different orders at the destination. The transmission control protocol
reorders the packets in the correct order at the receiving end.
o Flow control: The transport layer also responsible for flow control but it is
performed end-to-end rather than across a single link.
o Error control: The transport layer is also responsible for Error control.
Error control is performed end-to-end rather than across the single link. The
sender transport layer ensures that message reach at the destination without
any error.
5) Session Layer
o Dialog control: Session layer acts as a dialog controller that creates a dialog
between two processes or we can say that it allows the communication
between two processes which can be either half-duplex or full-duplex.
o Synchronization: Session layer adds some checkpoints when transmitting
the data in a sequence. If some error occurs in the middle of the transmission
of data, then the transmission will take place again from the checkpoint. This
process is known as Synchronization and recovery.
6) Presentation Layer
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
7) Application Layer
o An application layer serves as a window for users and application processes
to access network service.
Network Models
Networking engineering is a complicated task, which involves software, firmware,
chip level engineering, hardware, and electric pulses. To ease network engineering,
the whole networking concept is divided into multiple layers. Each layer is
involved in some particular task and is independent of all other layers. But as a
whole, almost all networking tasks depend on all of these layers. Layers share data
between them and they depend on each other only to take input and send output.
Layered Tasks
OSI Model
Open System Interconnect is an open standard for all communication systems. OSI
model is established by International Standard Organization (ISO). This model has
seven layers:
Internet Model
Internet uses TCP/IP protocol suite, also known as Internet suite. This defines
Internet Model which contains four layered architecture. OSI Model is general
communication model but Internet Model is what the internet uses for all its
communication.The internet is independent of its underlying network architecture
so is its Model. This model has the following layers:
Application Layer: This layer defines the protocol which enables user to
interact with the network.For example, FTP, HTTP etc.
Transport Layer: This layer defines how data should flow between hosts.
Major protocol at this layer is Transmission Control Protocol (TCP). This
layer ensures data delivered between hosts is in-order and is responsible
for end-to-end delivery.
Internet Layer: Internet Protocol (IP) works on this layer. This layer
facilitates host addressing and recognition. This layer defines routing.
Link Layer: This layer provides mechanism of sending and receiving actual
data.Unlike its OSI Model counterpart, this layer is independent of
underlying network architecture and hardware.
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.
1) Bus Topology
o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or
directly connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message
over the network. All the stations available in the network will receive the
message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
o The most common access method of the bus topologies is CSMA (Carrier
Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so that data
integrity is maintained, i.e., the packets do not get lost. There are two alternative
ways of handling the problems that occur when two nodes send the messages
simultaneously.
o Low-cost cable: In bus topology, nodes are directly connected to the cable
without passing through a hub. Therefore, the initial cost of installation is
low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in
bus-based networks that support upto 10 Mbps.
o Limited failure: A failure in one node will not have any effect on other
nodes.
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot
of cabling.
2) Ring Topology
o The node that receives the message from the previous computer will
retransmit to the next node.
o It has no terminated ends, i.e., each node is connected to other node and
having no termination point.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination
address matches. Once the token received by the destination device, then it
sends the acknowledgment to the sender.
o Failure: The breakdown in one station leads to the failure of the overall
network.
3) Star Topology
o Limited failure: As each station is connected to the central hub with its own
cable, therefore failure in one cable will not affect the entire network.
o A Central point of failure: If the central hub or switch goes down, then all
the connected nodes will not be able to communicate with each other.
4) Tree topology
o There is only one path exists between two nodes for the data transmission.
Thus, it forms a parent-child hierarchy.
o Easily expandable: We can add the new device to the existing network.
Therefore, we can say that tree topology is easily expandable.
o Error detection: Error detection and error correction are very easy in a tree
topology.
o Limited failure: The breakdown in one station does not affect the entire
network.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main
bus cable will damage the overall network.
5) Mesh topology
o It does not contain the switch, hub or any central computer which acts as a
central point of communication.
o Partial Mesh Topology: In a partial mesh topology, not all but certain
computers are connected to those computers with which they communicate
frequently.
Reliable: The mesh topology networks are very reliable as if any link breakdown
will not affect the communication between connected computers.
o Management: Mesh topology networks are very large and very difficult to
maintain and manage. If the network is not monitored carefully, then the
communication link failure goes undetected.
o Efficiency: In this topology, redundant connections are high that reduces the
efficiency of the network.
6) Hybrid Topology
o The combination of various different topologies is known as Hybrid
topology.
o Reliable: If a fault occurs in any part of the network will not affect the
functioning of the rest of the network.
o Scalable: Size of the network can be easily expanded by adding new devices
without affecting the functionality of the existing network.
o Complex design: The major drawback of the Hybrid topology is the design
of the Hybrid network. It is very difficult to design the architecture of the
Hybrid network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as
these hubs are different from usual Hubs used in other topologies.
Advantages:
⇢ Least expensive
⇢ Easy to install
⇢ High-speed capacity
Disadvantages:
⇢ Susceptible to external interference
⇢ Lower capacity and performance in comparison to STP
Applications:
Used in telephone connections and LAN networks
Shielded Twisted Pair (STP):
This type of cable consists of a special jacket (a copper braid covering or a
foil shield) to block external interference. It is used in fast-data-rate Ethernet
and in voice and data channels of telephone lines.
Advantages:
⇢ Better performance at a higher data rate in comparison to UTP
⇢ Eliminates crosstalk
⇢ Comparatively faster
Disadvantages:
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
⇢ Bulky
Applications:
The shielded twisted pair type of cable is most frequently used in extremely cold
climates, where the additional layer of outer covering makes it perfect for
withstanding such temperatures or for shielding the interior components.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC or
Teflon and 2 parallel conductors each having a separate insulated protection
cover. The coaxial cable transmits information in two modes: Baseband
mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is split
into separate ranges). Cable TVs and analog television networks widely use
Coaxial cables.
Advantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
Single cable failure can disrupt the entire network
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for cable
television signal distribution, digital audio (S/PDIF), computer network
connections (like Ethernet), and feedlines that connect radio transmitters and
receivers to their antennas.
(iii) Optical Fiber Cable –
It uses the concept of refraction of light through a core made up of glass or
plastic. The core is surrounded by a less dense glass or plastic covering called
the cladding. It is used for the transmission of large volumes of data.
The cable can be unidirectional or bidirectional. The WDM (Wavelength
Division Multiplexer) supports two modes, namely unidirectional and
bidirectional mode.
Advantages:
Increased capacity and bandwidth
Lightweight
Less signal attenuation
Immunity to electromagnetic interference
Resistance to corrosive materials
Disadvantages:
Difficult to install and maintain
High cost
Fragile
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for cable
television signal distribution, digital audio (S/PDIF), computer network
connections (like Ethernet), and feedlines that connect radio transmitters and
receivers to their antennas.
(iv) Stripline
Stripline is a transverse electromagnetic (TEM) transmission line medium
invented by Robert M. Barrett of the Air Force Cambridge Research Centre in
the 1950s. Stripline is the earliest form of the planar transmission line. It uses a
conducting material to transmit high-frequency waves it is also called a
waveguide. This conducting material is sandwiched between two layers of the
ground plane which are usually shorted to provide EMI immunity.
(v) Microstripline
In this, the conducting material is separated from the ground plane by a layer of
dielectric.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical
medium is required for the transmission of electromagnetic signals.
Features:
The signal is broadcasted through air
Less Secure
Used for larger distances
There are 3 types of Signals transmitted through unguided media:
(i) Radio waves –
These are easy to generate and can penetrate through buildings. The sending and
receiving antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM
and FM radios and cordless phones use Radio waves for transmission.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems.
Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless mouse,
keyboard, printer, etc.
Network Devices
Hardware devices that are used to connect computers, printers, fax machines and
other electronic devices to a network are called network devices. These devices
transfer data in a fast, secure and correct way over same or different networks.
Network devices may be inter-network or intra-network. Some devices are
installed on the device, like NIC card or RJ45 connector, whereas some are part of
the network, like router, switch, etc. Let us explore some of these devices in
greater detail.
Modem
Modem is a device that enables a computer to send or receive data over telephone
or cable lines. The data stored on the computer is digital whereas a telephone line
or cable wire can transmit only analog data.
The main function of the modem is to convert digital signal into analog and vice
versa. Modem is a combination of two devices − modulator and demodulator.
The modulator converts digital data into analog data when the data is being sent
by the computer. The demodulator converts analog data signals into digital data
when it is being received by the computer.
Types of Modem
Modem can be categorized in several ways like direction in which it can transmit
data, type of connection to the transmission line, transmission mode, etc.
Depending on direction of data transmission, modem can be of these types −
Simplex − A simplex modem can transfer data in only one direction, from
digital device to network (modulator) or network to digital device
(demodulator).
Half duplex − A half-duplex modem has the capacity to transfer data in
both the directions but only one at a time.
Full duplex − A full duplex modem can transmit data in both the directions
simultaneously.
RJ45 Connector
RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack
used by devices to physically connect to Ethernet based local area networks
(LANs). Ethernet is a technology that defines protocols for establishing a LAN.
The cable used for Ethernet LANs are twisted pair ones and have RJ45 connector
pins at both ends. These pins go into the corresponding socket on devices and
connect the device to the network.
Ethernet Card
Router
A router is a network layer hardware device that transmits data from one LAN to
another if both networks support the same set of protocols. So a router is typically
connected to at least two LANs and the internet service provider (ISP). It
receives its data in the form of packets, which are data frames with
their destination address added. Router also strengthens the signals before
transmitting them. That is why it is also called repeater.
Routing Table
A router reads its routing table to decide the best available route the packet can
take to reach its destination quickly and accurately. The routing table may be of
these two types −
Static− In a static routing table the routes are fed manually. So it is suitable
only for very small networks that have maximum two to three routers.
Dynamic − In a dynamic routing table, the router communicates with other
routers through protocols to determine which routes are free. This is suited
for larger networks where manual feeding may not be feasible due to large
number of routers.
Switch
Data transmission speed in switches can be double that of other network devices
like hubs used for networking. This is because switch shares its maximum speed
with all the devices connected to it. This helps in maintaining network speed even
during high traffic. In fact, higher data speeds are achieved on networks through
use of multiple switches.
Gateway
Wi-Fi Card