Module 1 Final
Module 1 Final
Module 1 Final
(BCS502)
Swathy J
Asst. Professor CSE
Cambridge Institute of Technology
Textbook
• Behrouz A. Forouzan, Data Communications and Networking, 5th
Edition, Tata McGraw-Hill,2013
Reference Books:
1. Larry L. Peterson and Bruce S. Davie: Computer Networks – A
Systems Approach, 4th Edition, Elsevier, 2019.
2. Nader F. Mir: Computer and Communication Networks, 2nd
Edition, Pearson Education, 2015.
3. William Stallings, Data and Computer Communication 10th
Edition, Pearson Education, Inc., 2014
Module 1
Data Communications
• Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable
• Four fundamental characteristics of Data Communication are:
1. Delivery: The system must deliver data to the correct destination. Data must be received by the intended device or user and
only by that device or user.
2. Accuracy: The system must deliver the data accurately. Data that have been altered in transmission and left uncorrected are
unusable.
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are useless. In the case of video and
audio, timely delivery means delivering data as they are produced, in the same order that they are produced, and without
significant delay. This kind of delivery is called real-time transmission.
4. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of audio or video
packets. For example, let us assume that video packets are sent every 30 ms. If some of the packets arrive with 30-ms delay
and others with 40-ms delay, an uneven quality in the video is the result.
Data Communications- Components
Data Communications- Components(Contd...)
1. Message: The message is the information (data) to be communicated. Popular
forms of information include text, numbers, audio, and video.
2. Sender: The sender is the device that sends the data message. It can be a
computer, workstation etc
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation etc.
4. Transmission medium: The transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol: A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices. Without a protocol,
two devices may be connected but not communicating
Data Communications- Data Representation
1. Text:
• Text is represented as a bit pattern, a sequence of bits (0s or 1s)
• Different sets of bit patterns have been designed to represent text symbols. Each set is called a code, and
the process of representing symbols is called coding.
2. Numbers:
• Numbers are also represented by bit patterns and the number is directly converted to a binary number.
3. Images:
• Images are also represented by bit patterns
• In its simplest form, an image is composed of a matrix of pixels (picture elements), where each pixel is a
small dot. The size of the pixel depends on the resolution
• After an image is divided into pixels, each pixel is assigned a bit pattern.
• If the image made only on black and-white dots (0 or 1)
• In the case of Gray scale
• black pixel - 00
• dark gray- 01
• light gray - 10
• white pixel -11
Data Communications- Data Representation
• RGB : Each color is made of a combination of three primary colors:
red, green, and blue
• YCM : color is made of a combination of three other primary colors:
yellow, cyan, and magenta
4. Video:
• Half-duplex
Data Communications-Data Flow
• Full duplex
NETWORKS
• A network is the interconnection of a set of devices capable of
communication
• Connecting device :
• router- which connects the network to other networks
• switch- which connects devices together
• modem (modulator-demodulator)- which changes the form of data
1. Type of Connection:
• Point-to-Point
• Dedicated link between two devices
• Multipoint or multidrop
NETWORKS -Network attributes (Physical Structures)
• Physical Topology : The actual or the physical layout of a network
Find the number of physical links in a fully connected mesh network with n node is n (n
– 1)
If the network
Advantages:
1. Dedicated links
2. Robust
3. Privacy or security
4. Fault identification
Disadvantages:
5. Amount of cabling and the number of I/O ports
6. Installation and reconnection
7. Hardware required to connect each link is expensive
NETWORKS -Network attributes (Physical
Structures)
Star Topology
• Advantages:
1. less expensive than a mesh topology, easy to install and
reconfigure and less cabling needed
2. If one link fails, only that link is affected
• Disadvantage
1. The dependency of the whole topology on one single point,
the hub. If the hub goes down, the whole system is dead.
Bus Topology
• Disadvantage
1. Reconnection and fault isolation
2. Fault or break in the bus cable stops all transmission
3. The damaged area reflects signals back in the direction of
origin, creating noise in both directions.
Ring Topology
• Advantages:
1. Ease of installation , bus uses less cabling than mesh or
star topologies
2. Redundancy is eliminated
• Disadvantage
1. Unidirectional traffic
2. A break in the ring (such as a disabled station) can disable
the entire network
This weakness can be solved by using a dual ring or a
switch capable of closing off the break
Network Types- LAN ( Local Area
Network)
In the past, all hosts in a network were connected Most LANs use a smart connecting switch, which is
through a common cable, which meant that a packet able to recognize the destination address of the packet
sent from one host to another was received by all and guide the packet to its destination without sending
hosts it to all other hosts
The intended recipient kept the packet; the others
dropped the packet
Network Types- WAN ( Local Area Network)
• WAN has a wide geographical
span, spanning a town, a state, a
country, or even the world
• WAN interconnects connecting
devices such as switches, routers, point-to-point WAN
or modems.
• WANs today:
• point-to-point WANs
• switched WANs
Switched WAN
Network Types- Internetwork
• Two or more networks are
connected, they make an
internetwork, or internet
PROTOCOL LAYERING
• When communication is simple, we may need only one simple protocol;
when the communication is complex, we may need to divide the task
between different layers, in which case we need a protocol at each layer
Scenarios:
First Scenario:
PROTOCOL LAYERING
• Second Scenario :
Principles of Protocol Layering
• First Principle :
• Example: the third layer task is to listen (in one direction) and talk (in the other
direction). The second layer needs to be able to encrypt and decrypt. The first layer needs
to send and receive mail
• Second Principle :
• Example : Under layer 3 at both sites should be a plaintext letter. The object under layer
2 at both sites should be a ciphertext letter. The object under layer 1 at both sites should
be a piece of mail
Logical Connections
TCP/IP PROTOCOL SUITE (Transmission
Control Protocol/Internet Protocol )
• It is a hierarchical protocol made up of interactive modules, each of
which provides a specific functionality
Layered Architecture:
Description of Each Layer
Application Layer:
• Communication at the application layer is between two processes (two programs running at
this layer).
• To communicate, a process sends a request to the other process and receives a response.
• Process-to-process communication is the duty of the application layer
• Protocols:
• Hypertext Transfer Protocol (HTTP) - Accessing the World Wide Web (WWW)
• Simple Mail Transfer Protocol (SMTP) - Electronic mail (e-mail) service
• File Transfer Protocol (FTP) - Used for transferring files from one host to another
• Terminal Network (TELNET) and Secure Shell (SSH) - Accessing a site remotely
• Simple Network Man_x0002_agement Protocol (SNMP) - used by an administrator to
manage the Internet at global and local levels
• Domain Name System (DNS) : Used by other protocols to find the network-layer address of
a computer
• Internet Group Management Protocol (IGMP) :Used to collect membership in a group
Description of Each Layer
• Transport Layer:
• The transport layer at the source host gets the message from the application layer,
encapsulates it in a transport layer packet (called a segment or a user datagram in
different protocols) and send
• Protocol:
• Transmission Control Protocol (TCP) - connection-oriented protocol that first
establishes a logical connection between transport layers at two hosts before
transferring data
• TCP provides :
• Flow control
• Error Control
• congestion control
Description of Each Layer
• Protocol:
• User Datagram Protocol (UDP) :
• connectionless protocol that transmits user datagrams without first creating a logical
connection
• UDP does not provide
• flow, error, or congestion control
• Stream Control Transmission Protocol (SCTP)
• Designed to respond to new applications that are emerging in the multimedia
Description of Each Layer
Network Layer:
• Creating a connection between the source computer and the destination computer
• Communication at the network layer is host-to-host
• several routers from the source to the destination, the routers in the path are
responsible for choosing the best route for each packet
• Protocols :
• Internet Protocol (IP) :
• Defines the format of the packet
• IP is also responsible for routing a packet from its source to its destination
• IP is a connectionless protocol that provides no flow control, no error control, and no congestion control
services
• Internet Control Message Protocol (ICMP) : Helps IP to report some problems
when routing a packet
• Internet Group Management Protocol (IGMP) : Helps IP in multitasking
Description of Each Layer
• Protocols :
• Dynamic Host Configuration Protocol (DHCP) : Helps IP to get the network-
layer address for a host
• Address Resolution Protocol (ARP): Helps IP to find the link-layer address of a
host or a router when its network-layer address is given
• Data-link Layer:
• Data-link layer is responsible for taking the datagram and moving it across the
link. The link can be a wired LAN with a link-layer switch, a wireless LAN, a
wired WAN, or a wireless WAN
• The data-link layer takes a datagram and encapsulates it in a packet called a frame
• TCP/IP does not define any specific protocol for the data-link layer.
Description of Each Layer
• Physical Layer:
• Physical layer is responsible for carrying individual bits in a frame across
the link
• Bits received in a frame from the data-link layer are trans_x0002_formed
and sent through the transmission media
Description of Each Layer
Description of Each Layer
Description of Each Layer
Encapsulation and Decapsulation
Encapsulation and Decapsulation
Video1-https://www.youtube.com/watch?v=0y6FtKsg6J4
Video2 https://www.youtube.com/watch?v=aaJ1KcCDz-c
Encapsulation and Decapsulation
• Encapsulation at the Source Host:
2. The transport layer takes the message as the payload, the load that the transportlayer
should take care of. It adds the transport layer header to the payload, which contains
the identifiers of the source and destination application programs that want to
communicate plus some more information that is needed for the end-to-end delivery of
the message, such as information needed for flow, error control, or congestion
control. The result is the transport-layer packet, which is called the segment (in TCP)
and the user datagram (in UDP). The transport layer then passes the packet to the
network layer.
Encapsulation and Decapsulation
• Encapsulation at the Source Host:
3. The network layer takes the transport-layer packet as data or payload and adds its
own header to the payload. The header contains the addresses of the source and
destination hosts and some more information used for error checking of the
header, fragmentation information, and so on. The result is the network-layer
packet, called a datagram. The network layer then passes the packet to the data-link
layer.
4. The data-link layer takes the network-layer packet as data or payload and adds its
own header, which contains the link-layer addresses of the host or the next hop
(the router). The result is the link-layer packet, which is called a frame. The frame is
passed to the physical layer for transmission.
Encapsulation and Decapsulation
• Decapsulation and Encapsulation at the Router
1. After the set of bits are delivered to the data-link layer, this layer decapsulates the
datagram from the frame and passes it to the network layer
2. The network layer only inspects the source and destination addresses in the datagram
header and consults its forwarding table to find the next hop to which the datagram is
to be delivered. The contents of the datagram should not be changed by the network
layer in the router unless there is a need to fragment the datagram if it is too big to be
passed through the next link. The datagram is then passed to the data-link layer of the
next link
3. The data-link layer of the next link encapsulates the datagram in a frame and passes it
to the physical layer for transmission.
Encapsulation and Decapsulation
• Efficiency
• Delay
TRANSMISSION MEDIA
RJ - Registered Jack
Unshielded Twisted-Pair Cable-
Connectors
Twisted-Pair Cable- Performance
Twisted-Pair Cable -Applications
• Twisted-pair cables are used in telephone lines to provide voice and data
channels
Guided Media - Coaxial Cable
Guided Media - Coaxial Cable
Guided Media - Coaxial Cable - Standards
Guided Media - Coaxial Cable -
Connectors
• To connect coaxial cable to devices,
we need coaxial connectors
• Most common type of connector is
Bayonet Neill-Concelman (BNC)
Guided Media - Coaxial Cable -
Connectors
BNC T BNC
Connector
Guided Media - Coaxial Cable -
Performance
• Coaxial cable has a much higher
bandwidth the signal weakens
rapidly and requires the frequent
use of repeaters
Guided Media - Coaxial Cable -
Applications
• Coaxial cable was widely used in analog telephone networks where a
single coaxial network could carry 10,000 voice signals
• Digital telephone networks where a single coaxial cable could carry
digital data up to 600 Mbps
• Cable TV networks also use coaxial cables.
• Traditional Ethernet LANs
• Coaxial cable in telephone networks has largely been replaced today
with fiberoptic cable.
Guided Media - Fiber- Optic Cable
• Fiber-optic cable is made of glass
or plastic and transmits signals in
the form of light
• Light travels in a straight line as
long as it is moving through a
single uniform substance
• If a ray of light traveling through
one substance suddenly enters
another substance(of a different
density), the ray changes direction
Guided Media - Fiber- Optic Cable
• I - Angle of incidence
Fiber- Optic Cable - Propagation Modes
Fiber- Optic Cable - Fiber Size
Fiber-Optic Cable Connectors
• Subscriber channel (SC) connector -
• Used for cable TV
• uses a push/pull locking system
• Straight-tip (ST) connector
• used for connecting cable to
networking devices
• uses a bayonet locking system and is
more reliable than SC
• MT-RJ is a connector that is the same
size as RJ45
Fiber-Optic Cable - Performance
Fiber-Optic Cable - Applications
• Fiber-optic cable is often found in backbone networks because its wide
bandwidth is cost-effective
Applications:
Microwaves are used for unicast communication such as cellular telephones, satellite networks, and
wireless LANs
UNGUIDED MEDIA: Infrared
• Frequencies from 300 GHz to 400 THz can be used for short-range
communication
• Having high frequencies, cannot penetrate walls
Advantages:
• A short-range communication system in one room cannot be affected
by another system in the next room
• We use our infrared remote control, we do not interfere with the use
of the remote by our neighbors.
UNGUIDED MEDIA: Infrared
• Disadvantages:
We cannot use infrared waves outside a building because the sun’s
rays contain infrared waves that can interfere with the communication.
Applications:
Infrared signals can be used for short-range communication in a closed
area using line-of-sight propagation