Computer Networks Data Communication PDF
Computer Networks Data Communication PDF
SYLLABUS
Communication model, computer communications architecture, OSI model, TCP/IP, standards, signals, analog
and digital transmission, transmission media, line configuration, topologies, data communications codes, error
detection and correction methods.
Data encoding methods, analog to digital, digital to analog etc., data modulation methods: ASK, FSK, PSK,
QAM, M-ary systems. Data modems: modulation interface, operation on 2 wire, 4 wire and dial up lines.
Data communication interface, line control unit, UART, USRT, Serial interface, terminal types.
Flow control, error detection & control, IBM Bisync protocol, SDLC, HDLC, HDLC line procedures, time
division multiplexing (TDM), FDM, line encoding, carriers.
Switched networks, circuit switching, packet switching, broadcast networks, LAN, WAN topologies, ATM &
Frame relay, cell relay.
Suggested Readings:
COURSE OVERVIEW
This course presents an overview of data communications and detail. The Transport Layer includes the transport service,
computer networks, including network hardware and network elements of transport protocols, and a detailed presentation of
software, as well as reference models, example networks, TCP and UDP internet transport protocols. The Application
example data communication services and network standardiza- Layer issues cover major Internet applications, such as, DNS
tion. The ISO and the Internet (TCP/IP) computer network (Domain Name System), Electronic Mail, FTP and the World
models are discussed in details. The course covers each network Wide Web. It also includes an introduction to the main network
layer in details, starting from the Physical layer to the Applica- security principals.
tion layer. It also includes an overview of network security
topics. The physical network layer covers a guided and wireless
It is now feasible to connect the best of desktops, minis and
transmission media, the telephone system, and Internet access
mainframes, and to bring them in a common orbit with the
networks, such as DSL, ISDN and Cable modem. It also
objective of enhancing organizational productivity. The
presents and overview of ATM networks. The Data Link Layer
dramatic improvement in microprocessor power per dollar and
covers design issues, error detection and correction, elementary
the pressure towards globalization are also accelerating the trend
data link protocols, sliding window protocols and example data
towards distributed and desktop oriented computing. The
link protocols. The Medium Access Sub-layer covers the
ongoing construction of the digital Information Superhighway,
following subjects: the channel allocation problem, multiple
the escalating importance of the Internet, the rush to build
access protocols, IEEE standard 802 for LAN’s and MAN’s,
secure and reliable Internet applications for electronic commerce,
bridges, high-speed and wireless LAN’s. However, with
and the emergence of new computing paradigms such as
phenomenal advances in fields like Local Area Networks
network computing have created a new vista of opportunities
(LANs), client/server architecture and the advent of high speed
and challenges for Information Technology (IT) managers.
technologies such as ADSL, Frame Relay and ATM, the
network has become inseparable from the computers it links
together.
i
COMPUTER NETWORKS AND DATA COMMUNICA TION
COMPUTER NETWORKS AND DATA COMMUNICATION
CONTENT
Lesson 2 3
Lesson 3 6
Lesson 4 8
Lesson 5 10
Lesson 6 Line Configuration, Topologies 12
Data Modem & Modulation
Lesson 7 14
Lesson 8 15
Lesson 9 16
Lesson 10 18
Data Communications Methods
Lesson 11 19
Lesson 14 25
Lesson 15 26
Lesson 16 28
Lesson 17 30
Lesson 18 32
Lesson 19 34
Lesson 20 36
iii
COMPUTER NETWORKS AND DATA COMMUNICA TION
CONTENT
Lesson 21 38
Lesson 22 40
Lesson 23 42
Lesson 24 43
Lesson 25 45
Lesson 26 47
iv
UNIT I
DATA COMMUNICATION FUNDAMENTALS
LESSON 1
Today’s Topics Now how do you make out that the message has correctly
• Explain the basic data communication model The basic model explained above wherein originator and
destination are human beings can be generalized as in Figure
1.1 Communication 1.2. To suit the data communication between two systems
What is communication? exchanging information between them.
You are right! It is just exchange of information between two 1.3 Data Communication
humans. So in data communication who is the sender and the receiver?
Data communication is similarly exchange of information Let us try to understand this along with a few definitions.
between two computers.
1.3.1 Source
We will first see a basic data communication model before we Device that generates the data to be passed on to the
proceed any further. Destination device. It could be a user computer trying to make
1.2 Basic Communication Model a query to a server computer.
Communication defined more technically can be described as 1.3.2 Transmitter
the conveyance of a message from one entity, called the source If the data generated by the Source device has to be transmitted
or transmitter, to another, called the destination or receiver, through Transmission Channel or Transmission System
via a channel of some sort. then it has to be presented in a form that is acceptable to the
A very basic example of such a communication system is Transmission system. This job is done by the Transmitter. For
conversation; people commonly exchange verbal messages, with example, a modem takes a digital bit stream from the attached
the channel consisting of waves of compressed air molecules at computer and transforms that stream of bits into an analog
frequencies, which are audible to the human ear. This is depicted signals which can be handled by the telephone network.
in Figure 1.1. Now that you know that at the sending end the data is
The conveyance of a message could be followed by a reciprocal converted to a form suitable for transmission, naturally what
response message from the original destination (now a source) should be done at the receiving end?
to the original source (now a destination) to complete one cycle
1.3.3 Receiver
in a dialogue between corresponding entities. Depending on the
This receives the signal from the transmission system and
application or need for the information exchange, either atomic
converts it into a form that is suitable to the destination device.
one-way transactions or a two-way dialogue could be appropri-
For example, a modem accepts analog signal from a
ate.
transmission channel and transforms it into digital bit stream.
1.3.4 Destination
Device to which the source device sends data.
1.3.5 Transmission System
What is the role of the transmission system?
This can be a single transmission line connecting the two
systems communicating or a complex network to which
numerous communicating systems are connected.
1
Now consider a telephone conversation. In this case, the input
COMPUTER NETWORKS AND DATA COMMUNICA TION
2
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 2
3
number of transmission links and network nodes where Transport layer (TCP)
COMPUTER NETWORKS AND DATA COMMUNICA TION
•
routing is carried out. Routing is the process by which a path • Internet layer (IP)
is selected out of many available paths to the destination so
• Network access layer
that data packet reaches the destination fast, efficiently,
reliably as required. This function makes the network most • Physical layer
complex layer in the reference model. Also network layer is The physical layer covers the physical interface between a data
responsible for translating logical addresses, or names, into transmission device (e.g., workstation, computer) and a
physical (or data-link) addresses. It provides flow-control transmission medium or network. This layer is concerned with
functions across the computer-network interface. specifying the characteristics of the transmission medium, the
4. The Transport layer ensures data is successfully sent and nature of the signals, the data rate, and related matters.
received between two end nodes. If data is sent incorrectly, The network access layer is concerned with the exchange of
this layer has the responsibility to ask for retransmission of data between an end system and the network to which it is
the data. Also it ensures data are passed onto the upper attached. The sending computer must provide the network
layers in the same order in which they were sent. Specifically, it with the address of the destination computer, so that the
provides a reliable, network-independent message- network may route the data to the appropriate destination. The
interchange service to the top three application-oriented specific software used at this layer depends on the type of
layers. This layer acts as an interface between the bottom and network to be used; different standards have been developed
top three layers. By providing the session layer (layer 5) with a for circuit switching, packet switching (e.g., X.25), local area
reliable message transfer service, it hides the detailed networks (e.g., Ethernet), and others. Thus, it makes sense to
operation of the underlying network from the session layer. separate those functions having to do with network access into
5. The Session layer decides when to turn communication on a separate layer. By doing this, the remainder of the communi-
and off between two computers. It provides the cations software, above the network access layer, need not be
mechanisms that control the data-exchange process and concerned about the specifics of the network to be used. The
coordinates the interaction between them. It sets up and same higher-layer software should function properly regardless
clears communication channels between two communicating of the particular network to which the computer is attached.
components. Unlike the network layer (layer 3), it deals with The network access layer is concerned with access to and routing
the programs running in each machine to establish data across a network for two end systems attached to the same
conversations between them. Some of the most commonly network. In those cases where two devices are attached to
encountered protocol stacks, including TCP/IP, don’t different networks, procedures are needed to allow data to
implement a session layer. traverse multiple interconnected networks. This is the function
6. The Presentation layer performs code conversion and data of the Internet layer. The Internet Protocol (IP) is used at
reformatting (syntax translation). It is the translator of the this layer to provide the routing function across multiple
network, making sure the data is in the correct form for the networks. This protocol is implemented not only in the end
receiving application. Of course, both the sending and systems but also in routers. A router is a processor that
receiving applications must be able to use data subscribing to connects two or more networks and whose primary function is
one of the available abstract data syntax forms. Most to relay data from one network to the other on its route from
commonly, applications handle these sorts of data the source to the destination end system.
translations themselves rather than handing them off to a Regardless of the nature of the applications that are exchanging
Presentation layer. data, there is usually a requirement that data be exchanged
7. The Application layer provides the interface between the reliably. That is, we would like to be assured that all of the data
software running in a computer and the network. It provides arrive at the destination application and that the data arrive in
functions to the user’s software, including file transfer the same order in which they were sent. As we shall see, the
access and management (FTAM) and electronic mail service. mechanisms for providing reliability are essentially independent
of the nature of the applications. Thus, it makes sense to collect
2.4 TCP/IP Protocol Suite those mechanisms in a common layer shared by all applications;
TCP/IP is a result of protocol research and development this is referred to as the transport layer. The Transmission
conducted on the experimental packet-switched network, Control Protocol (TCP) is the most commonly used
ARPANET, funded by the Defense Advanced Research Projects protocol to provide this functionality. This protocol model
Agency (DARPA) in the U.S, and is generally referred to as the TCP/IP derived its name from the above two protocols.
TC/IP protocol suite. This protocol suite consists of a large
collection of protocols that have been issued as Internet Finally, the application layer contains the logic needed to
standards by the Internet Activities Board (IAB). support the various user applications. For each different type of
application, such as file transfer, separate module is needed that
There is no official TCP/IP protocol model as there is in the is peculiar to that application.
case of OSI. However, based on the protocol standards that
have been developed, we can organize the communication task
for TCP/IP into five relatively independent layers;
• Application layer
4
COMPUTER NETWORKS AND DATA COMMUNICA TION
Figure 2.1 TCP/IP Protocol Architecture Model
Figure 2.1 shows how the TCP/IP protocols are implemented
in end systems. Note that the physical and network access layers
provide interaction between the end system and the network,
whereas the transport and application layers are what is known
as end-to-end protocols; they support interaction between two
end systems. The Internet layer has the flavor of both. At this
layer, the end system communicates routing information to the
network but also must provide some common functions
between the two end systems.
For you to learn and know better here are a few references. You
might be able to find many more.
References and Further Reading
• Data and Network CommunicationMiller, Vikas publishing
house
• Data CommunicationsPrakash C Gupta, Eastern Economy
edition
• www.ctr.kcl.ac.uk/lectures
Notes
5
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 3
Today’s Topics amplitude (A), frequency (f), and phase (ô). The amplitude is
• Standards and organizations to set up standards the peak value of strength of the signal over time; typically, this
value is measured in volts or watts. The frequency is the rate (in
• Signals
cycles per second, or Hertz (Hz)) at which the signal repeats. An
• Analog Signal equivalent parameter is the period (T) of a signal, which is the
• Digital Signal amount of time it takes for one repetition; therefore, T = 1/f.
• Sampling rate and Nyquist Criterion Phase is a measure of the relative position in time within a
single period of a signal, as illustrated below. The general sine
Objectives wave can be written as
Upon completion of this Lesson, you should be able to: S(t) = A sin (2 ï f t + Ô)
• Discuss on Organisations which set standards
• Define an analog and digital signal
• Discuss the limitations of analog signals
• Explain sampling rate and nyquist criterion
3.1 Standards: You Can Answer That
Definitely!
Since standards are necessary in regulating data communication
there are a no: of organizations serving as standards creation
committees. A few of them in this area are
3.1.1 International standards Organization (ISO)
is a well-known multinational standards body. Most members
of ISO are their respective government representatives.
Members from over 80 developed nations actively reperesent
the ISO.
The American National standards Institute: is a private non
profit organization that does not have any direct ties with the
US federal Govt. Professional groups, industry representatives, Fig 3.1
consumer groups etc represent ANSI. Digital signals
3.1.2 The Institute of Electrical and Electronic In contrast to analog O/P instruments that sense continuous
Engineers: variables such as pressure and temperature, many instruments
is the biggest professional engineering body in the world. It provide an output that has one of two states: high or low,
oversees the development of international computer and open or closed. A pressure might be too high or a temperature
communication standards. too low, triggering closure of a switch. Outputs, too, are not
strictly analog-solenoid valves typically are opened or closed,
3.2 Signals many pumps and heaters are simply turned on or off. Pulse
At the core of data communications is the concept of signal signals are another form of digital I/O, with one rotation of a
propagation. Any signal can be classified into one of the two turbine flow meter or tachometer corresponding to a single,
types - analog or digital countable event. Digital I/O also can be used for parallel
3.2.1 Analog Signals communications among plug-in expansion cards, and to
An analog signal is a continuously varying signal, similar to a generate clock and other timing signals.
sinusoidal waveform. For e.g.: if we measure the room Already in the binary language of computers, these types of
temperature continuously and plot its graph with time on the X digital, or discrete, inputs and outputs (I/O) are much easier for
axis and temperature on the Y-axis, we would get a continues microprocessor-based data acquisition systems to deal with than
waveform. This is an example of an analog signal. analog signals. Similar to analog-to-digital converters used for
Therefore an analog signal is smooth and continuous whereas a analog I/O, digital I/O is designed to deal directly with
digital signal represents a sudden jump from one value to transistor-to-transistor logic (TTL) level voltage changes. TTL
another. typically sets the low voltage level between 0 and 0.8 V and the
The sine wave is the fundamental continuous signal. A general high voltage level between 2.0 and 5.0 V. Voltage levels between
sine wave can be represented by three parameters: 0.8 and 2.0 V are not allowed. A voltage change, then, from the
6
high range to the low range (or vice versa) represents a digital
Time
Digital Signal
Fig 3.2
3.4 Why Digital Communication
A transmission system makes use of a physical transmission
media or channel that allows the propagation of
electromagnetic energy in the form of pulses or variations in
voltage, current, or light intensity. In analog communication the Figure 3.3 Analog versus Digital signal transmission
objective is to transmit a signal waveform, which is a function
that varies continuously with time, as shown in Figure 3.3a. For In addition, interference from extraneous sources, such as
example, the electrical signal coming out of a microphone radiation from car ignitions and power lines, as well as noise
corresponds to the variation in air pressure corresponding to inherent in electronic systems result in the addition of random
sound. This function of time must be reproduced exactly at the noise to the transmitted signal. To transmit over long distances,
receiver output of the analog communication system. In it is necessary to introduce repeaters periodically to regenerate
practice, communications channels do not satisfy this condition, the signal, as shown in Figure 3.4. Such signal regeneration is
so some degree of distortion is unavoidable. fundamentally different for analog and digital transmissions.
In digital transmission the objective is to transmit a given
symbol that is selected from some finite set of possibilities. For
example, in binary digital transmission the objective is to
transmit either a 0 or a 1. This can be done, for instance, by
transmitting positive voltage for a certain period of time to
convey a 1 or a negative voltage to convey a 0, as shown in Figure 3.4 Typical long-distance link
Figure 3.3b. The task of the receiver is to determine the input
symbol with high probability. The positive or negative pulses For you to learn and know better here are a few references. You
that were transmitted for the given symbols can undergo a great might be able to find many more.
degree of distortion. Where signaling uses positive or negative References and Further Reading
voltages, the system will operate correctly as long as the receiver • The Data Acquisition Systems Handbook, Omega Press
can determine whether the original voltage was positive or LLC, 1997.
negative.
• New Horizons in Data Acquisition and Computer Interfaces,
The cost advantages of digital transmission over analog Omega Press LLC, 199
transmission become apparent when transmitting over a long
• users.telenet.be/educypedia
distance. Consider, for example, a system that involves trans-
mission over a pair of copper wires. As the length of the pair
of wires increases, the signal at the output is attenuated and the
original shape of the signal is increasingly distorted.
7
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 4
Today’s Topics recovered by repeater will contain some noise. The repeater then
• Repeaters proceeds to send the recovered signal over the next transmis-
sion segment. By the time signal reaches the destination after
• Bandwidth
going through many repeaters as in the case of long distance
• Sampling rate transmission its quality degrades considerably as the noises
• Nyquist Criterion accumulates at each segment.
Objectives Next consider the same copper wire transmission system for
Upon completion of this Lesson, you should be able to: digital communications. Suppose that a string of 0s and 1s is
• Discuss on repeaters conveyed by a sequence of positive and negative voltages. As
the length of the pair of wires increases, the pulses are increas-
• Define bandwidth ingly distorted and more noise is added. A digital repeater is
• Explain sampling rate and nyquist criterion required as shown in Figure 4.2. The sole objective of the
4.1 Repeater repeater is to determine with high probability the original binary
In an analog communication system, the task of the repeater is stream. The repeater also uses an equalizer to compensate for
to regenerate a signal that resembles as closely as possible the the distortion introduced by the channel. However, the repeater
signal at the input of the repeater segment. Figure 4.1 shows does not need to completely regenerate the original shape of the
the basic functions carried out by the analog repeater. transmitted signal. It only needs to determine whether the
original pulse was positive or negative. To do so, the repeater is
organized in the manner shown in Figure 4.2.
8
that is nearly independent of distance. Digital transmission bandwidth of the signal. A formulation of this limitation, due
9
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 5
Today’s Topics fields and currents on a pair of conductors. Magnetic fields arise
• Transmission media around other heavy current-carrying conductors and around
large electric motors. Various grades of copper cables are
• UTP cables
available, with Grade 5 being the best and most expensive.
• STP cables Grade 5 copper, appropriate for use in 100-Mbps applications,
• Coaxial cables has more twists per inch than lower grades. More twists per
• Optic Fiber cables inch means more linear feet of copper wire used to make up a
cable run, and more copper means more money.
Objectives Shielding provides a means to reflect or absorb electric fields
Upon completion of this Lesson, you should be able to: that are present around cables. Shielding comes in a variety of
• Explain the construction of different types of cables forms from copper braiding or copper meshes to aluminized
• Identify the application of each Mylar tape wrapped around each conductor and again around
the twisted pair.
• Discuss the Advantages and Limitations of the different
types of cables
5.1 Transmission Media
When you speak to your friend over the telephone how does
your voice get carried forward? Definitely there is some kind of
media, which carries your voice.
The first layer (physical layer) of the OSI Seven layer model is
dedicated to the transmission media. Fig 5.1 Shielded Twisted Pair Cable
Due to the variety of transmission media and network wiring 5.1.3 Coaxial Cable
methods, selecting the most appropriate media can be confus- Coaxial cable is a two-conductor cable in which one conductor
ing - what is the optimal cost-effective solution??? forms an electromagnetic shield around the other. The two
When choosing the transmission media, what are the conductors are separated by insulation. It is a constant
factors to be considered? impedance transmission cable. This media is used in base band
• Transmission Rate and broadband transmission.
• Distances Coaxial cables do not produce external electric and magnetic
• Cost and Ease of Installation fields and are not affected by them. This makes them ideally
suited, although more expensive, for transmitting signals.
• Resistance to Environmental Conditions
5.1.1 Unshielded Twisted Pair (UTP)
UTP is the copper media, inherited from telephony, which is
being used for increasingly higher data rates, and is rapidly
becoming the de facto standard for horizontal wiring, the
connection between, and including, the outlet and the
termination in the communication closet.
A Twisted Pair is a pair of copper wires, with diameters of
0.4-0.8 mm, twisted together and wrapped with a plastic
coating. The twisting increases the electrical noise immunity, and
reduces the bit error rate (BER) of the data transmission. A
UTP cable contains from 2 to 4200 twisted pairs.
UTP is a very flexible, low cost media, and can be used for either Coaxial Cable Construction
voice or data communications. Its greatest disadvantage is the
Fig 5.2
limited bandwidth, which restricts long distance transmission
with low error rates. 5.1.4 Fiber Optic Cable
The optical fiber construction:
5.1.2 Shielded Twisted Pair
STP is heavier and more difficult to manufacture, but it can The Fiber Optic Cable contains one or many fibers, each of
greatly improve the signaling rate in a given transmission them wrapped with a plastic tube and an external coating. Its
scheme Twisting provides cancellation of magnetically induced construction includes
10
• CORE - made of glass. should be rated for heating/ ventilation/air conditioning
------------------------------------------------------------
| MEDIA | ADVANTAGES | DISADVANTAGES |
|---------|---------------------|--------------------------|
| Twisted | Inexpensive | Sensitive to noise |
| Pair | Well understood | Short distances |
| Cable | Easy to add nodes | Limited bandwidth |
| | | Security - easily tapped |
|---------|---------------------|--------------------------|
| Coaxial | High bandwidth | Physic dimensions |
| Cable | Long distances | Security - easily tapped |
| | Noise immunity | |
|---------|---------------------|--------------------------|
| Optical | Very high bandwidth | Connections |
| Fiber | Noise immunity | T splitters |
| Cable | Long distances | |
| | High security | |
| | Small size | |
-----------------------------------------------------------|
11
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 6
LINE CONFIGURATION, TOPOLOGIES
12
COMPUTER NETWORKS AND DATA COMMUNICA TION
Star Network Topology
13
UNIT II
DATA MODEM & MODULATION
LESSON 7
• The different data encoding methods spectrum that is more amenable to channels that do not pass
low frequencies. In this method binary 0s are mapped into 0
• NRZ Encoding
voltage, thus making no contribution to the digital signals;
• Bipolar Encoding consecutive 1s are alternately mapped into +A/2 and -A/2.
Objectives Thus a string of consecutive 1s will produce a square wave with
Upon completion of this Lesson, you should be able to: the frequency (1 / 2T) Hz. As a result, the spectrum for the
• Explain the different types of coding bipolar code has its frequency content centered around the
frequency (1/2T) Hz and has small content at low frequencies.
• Compare the relative advantages/ limitations Timing recovery is an important consideration in the selection
7.1 Line Coding of a line code. The timing-recovery circuit in the receiver,
Line coding is the method used for converting a binary monitors the transitions at the edge of the bit intervals to
information sequence into a digital signal in a digital determine the boundary between bits. Long strings of 0s and
communications system. The selection of a line coding 1s in the binary and the polar binary encoding can cause the
technique involves several considerations. Maximizing bit rate is timing circuit to lose synchronization because of the absence of
the main concern in digital transmission when bandwidth is at a transitions. In the bipolar encoding long strings of 1s result in
premium. However, in other situations, such as in LANs, other a square wave that has strong timing content; however, long
concerns are also of interest. For example, another important strings of 0s still pose a problem. To address this problem, the
design consideration is the ease with which the bit timing bipolar line codes used in telephone transmission systems place
information can be recovered from the digital signal. Also, some a limit on the minimum number of 0s that may be encoded
line coding methods have built-in error detecting capabilities, into the digital signal. Whenever a string of N consecutive 0s
and other methods have better immunity to noise and occurs, the string is encoded into a special binary sequence that
interference. Finally, the complexity and the cost of the line code contains 0s and 1s. To alert the receiver that a substitution has
implementations are always factors in the selection for a given been made, the sequence is encoded so that the mapping in the
application. bipolar line code is violated; that is, two consecutive 1s do not
alternate in polarity.
7.1.1 Non Return to Zero (NRZ) Encoding
This is the most common and easiest encoding scheme. A ‘0’ is For you to learn and know better here are a few references. You
transmitted by raising the voltage level to high and a 1 is might be able to find many more.
transmitted using a low voltage. Thus any sequence of 0 s and 1 References and Further Reading
s is transmitted by alternating between high and low. The name
• Data Communications, Prakash C Gupta, Eastern Economy
NRZ refers to the fact that the voltage level remains constant,
Edition
i.e. does not return to zero during the time a bit is transmitted
.If binary 1 is transmitted by sending a +A voltage level, and a 0 • Handbook of data communication, National Computing
is transmitted by sending a 0 voltage and if binary 0s and 1s Center Ltd, Manchester
both occur with probability 1/2, then the average transmitted
power for this line code is
(1/2)A2 + (1/2)02 = A2/2
frequency components because they produce essentially the
same variations in a signal as a function of time. Strings of
consecutive 0s and consecutive 1s lead to periods where the
signal remains constant for long time producing low frequency
components. These strings of 0s and 1s occur frequently
enough to produce a spectrum that has its components
concentrated at the lower frequencies. This situation presents a
problem when the communications channel does not pass low
frequencies. For example, most telephone transmission systems
do not pass the frequencies below about 200 Hz.
7.1.2 Bipolar Encoding Method
Here is another encoding scheme, which may be more suitable
for low frequencies.
14
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 8
Today’s Topics For you to learn and know better here are a few references. You
• Return to Zero Encoding might be able to find many more.
• Manchester Encoding References and Further Reading
• Differential Manchester encoding • Data Communications, Prakash C Gupta, Eastern Economy
Edition
Objectives
Upon completion of this Lesson, you should be able to: • Handbook of data communication, National Computing
Center Ltd, Manchester
• Explain the different types of coding
• www.rhyshaden.com/encoding.htm
• Compare the relative advantages/ limitations
8.1 Return to Zero Encoding
This usually ensures signal patterns for any bit pattern and thus Notes
overcome the limitation of NRZ codes. Two of these
techniques, which are very widely used, are Manchester
Encoding and Differential Manchester Encoding.
8.2 Manchester Encoding
In the Manchester encoding, there is a transition at the middle
of each bit period. The mid bit transition serves as a clocking
mechanism and also a data. a low to high transition represents
a 1, and a high to low transition represents a zero. The
Manchester encoding can be viewed as the transmission of two
pulses for each binary bit. A binary 1 is mapped into the binary
pair of 10, and the corresponding polar encoding for these two
bits is transmitted: A binary 0 is mapped into 01.
8.3 Differential Manchester Encoding
In differential Manchester, the mid bit transition is used only to
provide clocking. A ‘0’ causes the signal to change at the start of
the interval. A ‘1’ causes the signal to remain where it was at the
end of the previous interval. Thus a ‘0’ may go from low to
high or high to low depending on the initial value of the
signal.
15
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 9
Now that you have learnt how to encode your data, you are There are three basic types of modulation methods for
ready to see how your data travels. transmission of digital signals. These methods are based on the
three attributes of a sinusoidal signal, amplitude, frequency and
Today’s Topics
phase. The corresponding modulation methods are called
• Modulation Amplitude Shift Keying (ASK), Frequency shift keying (FSK),
• Amplitude shift Keying and Phase Shift Keying (PSK). In addition a combination of
• Frequency shift keying ASK and PSK is employed at high bit rates. This method is
• Phase shift Keying called Quadrature Amplitude Modulation(QAM).
We will now see these methods in detail.
Objectives
Upon completion of this Lesson, you should be able to: 9.1.1 Amplitude Phase Shift Keying
• Define Modulation This you can say is the simplest mode of digital modulation. In
ASK the carrier amplitude is multiplied by the binary 1 or 0.The
• Distinguish between different types of Modulation amplitude modulated carrier signal can be written as
• Explain the advantages and disadvantages if any of each type V(t)= d sin (2PI fct)
of modulation
Where fc is the carrier frequency and d is the data bit variable that
9.1 Modulation can take values ‘1’ or ‘0’. depending on the state of the digital
Modulation is the process, or result of the process, of varying a signal.
characteristic of a carrier in accordance with an information-
bearing signal. For the past 100 years, analog transmission 9.1.2 Frequency Shift Keying
has dominated all the communication. In particular, the In FSK the frequency of the carrier is shifted between two
telephone system was originally based entirely on analog discrete values, one representing binary ‘1’ and the other
signaling. With the advance in technology, the long-distance representing binary ‘0’. The carrier amplitude does not change.
trunks between telephone exchanges are converted to digital, FSK is relatively simple to implement. It is used extensively in
but the local loops between a telephone exchange and the low speed modems having bit rates below 1200 bps. The
telephone at the user are still analog. Consequently, when a instantaneous value of the FSK signal is given by
computer wishes to send digital data it produces, over the V(t) = d sin(2Pift(t) + d sin(2Pifot)
telephone line, the data must be first converted to analog form Where f1 and f0 are the frequencies corresponding to binary ‘1’
by a device for transmission over telephone line and at the and ‘0’ respectively and d is the data signal variable.
receiver end this received analog signal must be converted back
9.3 Phase Shift Keying
to digital data.
This is the most efficient of the three modulation methods and
A device that accepts a serial stream of digital bits as input and is used for high bit rates. Inn PSK, phase of the carrier is
produces modulated analog carrier signal as output (or vice modulated to represent the binary values. The simplest for m
versa) is called a modem (for modulator- demodulator). The of PSK is called as BPSK. . In the simplest form of phase
modem is inserted between the digital computer and the analog modulation, the carrier wave is systematically shifted 45, 135,
telephone system. A continuous tone in the 1000 to 2000 Hz 225, or 315 degrees at uniformly spaced intervals. Each phase
range, called a sine wave carrier is modulated according to the shift transmits 2 bits of information.
input digital signal at the transmitting end and at the receiver
The figure below will illustrate to you better the three forms of
end the received modulated signal is converted back to digital
modulation.
stream of bits by the process of demodulation.
16
baud represents 3 bits and with 16 = 24 different combination each
Notes
Fig 9.2
Number of combination used will be a power of 2 and each
sample or baud represents number of bits that is equal to the
power. For example with 8 = 23 different combination each
17
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 10
Today’s Topics direction is separate, the same carrier frequency can be used for
• Data modems both the directions.
• Operation on two wire and four wire A leased two wire connection is cheaper than a 4 wire connection
because only one pair of wires is extended to the subscriber’s
• Dial up lines premises. The data connection established through telephone
Objectives exchanges is also a two-wire connection. For the 2 wire connec-
Upon completion of this Lesson, you should be able to: tions, modems with a 2 wire line interface are required. Such
• Be able to define what is a modem modems use the same pair of wires for outgoing and incoming
• Explain the different types of modem carriers. The same frequency is used for half duplex modems
but for full duplex mode of operation on a two wire connec-
Now that you know the different modulation schemes it is apt tion it is necessary to have two transmission channels, one for
to have a look at data modems transmit direction and the other for the receive direction. This is
Many of you might be having one at home and must be already achieved by frequency division multiplexing of two different
familiar with its use. carrier frequencies.
Try defining what a modem is before you continue. The answer References and Further Reading
is there in the term itself.
• Data Communications, Prakash C Gupta, Eastern Economy
10.1 Modem Edition
The term modem is derived from the words, modulator and • Handbook of data communication, National Computing
demodulator. The digital modulation and demodulation Centre Ltd, Manchester
schemes discussed previously are implemented in the modems.
Most of the modems are designed for utilizing the analog voice
• modems.rosenet.net/
band service offered by the telecommunication network.
Therefore the modulated carrier wave generated by a modem Notes
fits into the 300- 3400 Hz bandwidth of the speech channel.
10.2 Types of Modems
Modems can be of several types and they can be categorized in a
no: of ways.
• Directional Capability – Half Duplex and Full Duplex
Modems
• Connection to the line- 2 wire modem and 4 wire modem
• Transmission mode- Asynchronous modem and
synchronous modem
Half Duplex and full Duplex modems- A half duplex
modem permits transmission in one direction at a time. If a
carrier is detected on the line by the modem, it gives an indica-
tion of the incoming carrier to the DTE (Data terminal
equipment) through a control signal of its digital interface. So
long as the carrier is being received the modem does not give
clearance to the DTE to transmit.
A full duplex modem allows transmission in both directions.
Thus there are two carriers on the line, one outgoing and the
other incoming.
10.2.1 2W – 4W Modems
The line interface of the modem can have a 2 wire or a 4 wire
connection to the transmission medium. In a 4 wire
connection, one pair of wires is used for the outgoing carrier
and the other is used for the incoming carrier. Full duplex and
half duplex modes of data transmission are possible on a 4
wire connection. As the physical transmission path for each
18
UNIT III
DATA COMMUNICATIONS METHODS
LESSON 11
Today’s Topics in the transmitter. These two clocks must be accurate enough to
19
UNIT IV
DATA LINK CONTROL & MULTIPLEXING
LESSON 12
Today’s Topics standard was born. It specified signal voltages, signal timing,
COMPUTER NETWORKS AND DATA COMMUNICA TION
• Data interface standards signal function, a protocol for information exchange, and
mechanical connectors.
• RS 232
• EIA 232E 12.1 EIA 232E Standard
Over the 40+ years since this standard was developed, the
There is usually a special purpose device that handles the
Electronic Industries Association published three
interface between the computer and the transmission line. This
modifications, and the most the recent is EIA232E standard
may take the form of a card that plugs into the motherboard
introduced in 1991. Besides changing the name from RS232 to
(internal) or as an external device connected to the computer by
EIA232, some signal lines were renamed and various new ones
a cable. If it is internal, it communicates with the computer
were defined, including a shield conductor.
using the computer’s bus communication protocols; if external,
If the full EIA232 standard is implemented, the equipment at
it likely communicates through a serial communications port on
the far end of the connection named the DTE device (Data
the back of the computer. Either way there is a standardized
Terminal Equipment, usually a computer or terminal), has a
interface that the device (modem, network card, etc.) presents to
male DB25 connector, and utilizes 22 of the 25 available pins
the computer that allows it to be configured and controlled.
for signals or ground. Equipment at the near end of the
A number of standards exist. These usually cover 4 areas connection (the telephone line interface) named the DCE device
relating to the interface: (Data Circuit-terminating Equipment, usually a modem), has a
• Mechanical specifies connectors (e.g. plugs and jacks), wire female DB25 connector, and utilizes the same 22 available pins
(circuit) connections between connectors, wire type and for signals and ground. The cable linking DTE and DCE
gauge, etc. devices is a parallel straight through cable with no crossover or
• Electrical specifies voltage levels, current, etc. on the various self-connects in the connector hoods. If all devices exactly
circuits. followed this standard, all cables would be identical, and there
would be no chance that an incorrectly wired cable could be
• Functional specifies functions of the circuits (e.g. data, used. This drawing shows the orientation and connector types
control, timing, ground, etc.). One trend to note is that
for DTE and DCE devices:
increasingly, control and timing are embedded in the data
circuit. This simplifies the interface at the expense of
increasing the logic in the transmission device. For example,
RS-232, a common standard for serial communications (e.g.
modems, etc.), has 16 control lines, 4 data lines, 3 timing
lines and a ground, whereas ISDN has only 4 data lines and
2 power lines.
• Procedural specifies the use of the functions to accomplish
transmission and reception.
RS 232 Standard
In the early 1960s, a standards committee, today known as the
Electronic Industries Association, developed a common
interface standard for data communications equipment. At that
time, data communications was thought to mean digital data
exchange between a centrally located mainframe computer and a
remote computer terminal, or possibly between two terminals
without a computer involved. These devices were linked by
telephone voice lines, and consequently required a modem at
each end for signal translation. While simple in concept, the
many opportunities for data error that occur when transmitting
data through an analog channel require a relatively complex
design. It was thought that a standard was needed first to
ensure reliable communication, and second to enable the
interconnection of equipment produced by different
manufacturers, thereby fostering the benefits of mass
production and competition. From these ideas, the RS232
20
COMPUTER NETWORKS AND DATA COMMUNICA TION
21
Limitations of EIA 232 D
COMPUTER NETWORKS AND DATA COMMUNICA TION
Notes
22
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 13
23
contain an odd number of 1s. Therefore, the single parity bit
COMPUTER NETWORKS AND DATA COMMUNICA TION
24
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 14
25
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 15
Today’s Topics jointly on ensuring the correct and orderly delivery of the
• Stop-and-wait-ARQ sequence of packets provided by the sender.
• Go-back-N ARQ 15.2 Stop-and-Wait ARQ
• Selective-reject ARQ The first protocol considered is Stop-and-Wait ARQ where
the transmitter and receiver work on the delivery of one frame
There are three version of ARQ, which are standardized.
at a time through an alternation of actions. Figure 15.2a shows
• Stop-and-wait-ARQ how ACKs and time-outs can be used to provide recovery from
• Go-back-N ARQ transmission errors, in this case a lost frame. At the initial point
• Selective-reject ARQ in the figure, stations A and B are working on the transmission
of frame 0. Note that each time station A sends an I-frame, it
In the data transmission model, which covers the typical case it
starts an I-frame timer that will expire after some time-out
is assumed that a user generates a sequence of information
period. The time-out period is selected so that it is greater than
blocks for transmission. The ARQ mechanism requires the
the time required to receive the corresponding ACK frame.
block to contain a header with control information that is
Figure 15.2 a shows the following sequence of events:
essential to proper operation, as shown in Figure 15.1
1. Station A transmits frame 0 and then waits for an ACK
frame from the receiver.
2. Frame 0 is transmitted without error, so station B transmits
an ACK frame.
3. The ACK from station B is also received without error, so
station A knows the frame 0 has been received correctly.
4. Station A now proceeds to transmit frame 1 and then resets
the timer.
5. Frame 1 undergoes errors in transmission. It is possible that
station B receives frame 1 and detects the errors through the
CRC check; it is also possible that frame 1 was so badly
garbled that station B is unaware of the transmission. In
either case station B does not take any action.
6. The time-out period expires, and frame 1 is retransmitted.
26
15.2 b shows the situation that begins as in Figure 15.2 a, but The delay-bandwidth product is the product of the bit rate
27
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 16
28
COMPUTER NETWORKS AND DATA COMMUNICA TION
Figure 16.3 Selective Repeat ARQ
Notes
29
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 17
30
• Normal Response Mode (NRM). Used with an unbalanced
Notes
31
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 18
32
the frame could split it in two. However these errors will be
Notes
33
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 19
Today’s Topics disconnect (DISC) frame. The other side must accept the
• HDLC Operation disconnect by replying with an acknowledgement.
• Bisync protocol 19.2 Bisync Protocol
Bisync is an abbreviation shortened from “binary
Objectives
synchronous”. Sometimes you may also see the acronym BSC.
• Describe the operation of high level data link control Bisync is a block-oriented, error-correcting, synchronous data
• Describe the bisync protocol communications protocol introduced by IBM back in 1964 with
19.1 HDLC Operation the introduction of a product called the 270X Transmission
HDLC operation consists of the exchange of I-frames, S- Control Unit.
frames, and U-frames between two stations. In describing To be precise, 2780 and 3780 were model numbers of IBM
HDLC operation, we will discuss these three types of frames. remote job entry (RJE) data terminals — namely the. IBM 2780
The operation of HDLC involves three phases. First, one side Data Communications Terminal and theIBM 3780 Data
or another initializes the data link so that frames may be Communications Terminal .These terminals used punch cards
exchanged in an orderly fashion. During this phase, the options and consisted of a card reader, a card punch, and a line printer.
that are to be used are agreed upon. After initialization, the two They used the bisync protocol to transmit and receive data with
sides exchange user data and the control information to exercise an IBM mainframe computer. Usually dial-up or leased
flow and error control. Finally, one of the two sides signals the telephone lines and 2400 bps Bell 201C modems and then later
termination of the operation. 4800 bps Bell 208B modems were used to connect the terminal
to the mainframe.RJE was how programs, often referred to as
19.1.1 Initialization jobs, were submitted to be run on mainframe computers back
Initialization may be requested by either side by issuing one of in the 1960 and 1970s. That was the era of keypunch machines
the six set-mode commands. This command serves three and punched cards. The statements for a computer program,
purposes: usually COBOL or FORTRAN, and the input data for the
1. It signals the other side that initialization is requested. programs were punched onto cards using a keypunch machine.
2. It specifies which of the three modes (NRM, ABM, ARM) is The resulting card deck was carried, often wheeled over on carts,
requested. to an RJE terminal, placed into a card reader hopper, a button
was pushed, and the card images were transmitted to the
3. It specifies whether 3- or 7-bit sequence numbers are to be
mainframe.
used.
An immediate response may have come back to printer,
If the other side accepts this request, then the HDLC module
exchange, or card punch devices of the terminal. This output
on that end transmits an unnumbered acknowledged (UA)
might have been the result of program just submitted, or from
frame back to the initiating side. If the request is rejected, then a
some previous run. Very frequently, the program and data were
disconnected mode (DM) frame is sent.
held at the mainframe for execution at a later time. This is
19.1.2 Data Transfer known as batch processing.
When the initialization has been requested and accepted, then a The 3780 terminal was a later model than the 2780 terminal and
logical connection is established. Both sides may begin to send used a more robust version of the bisync protocol — hence the
user data in I-frames, starting with sequence number 0. The terms “3780 bisync” vs. “2780 bisync”. Virtually all bisync in use
N(S) and N(R) fields of the I-frame are sequence numbers that today conforms with the 3780 version.
support flow control and error control. An HDLC module
While it is true that “real” IBM 3780 and 2780 terminals are not
sending a sequence of I-frames will number them sequentially,
in use today, the underlying bisync protocol became the defacto
modulo 8 or 128, depending on whether 3- or 7-bit sequence
standard file transfer protocol for a wide array of devices in the
numbers are used, and place the sequence number in N(S).
days before the PC revolutionized computing. Much like
N(R) is the acknowledgment for I-frames received; it enables the
Zmodem and FTP today, if you needed to get a file from one
HDLC module to indicate which number I-frame it expects to
machine to another during that time, very often bisync was
receive next. S-frames are also used for flow control and error
protocol used.
control.
And bisync wasn’t solely used in “true” computers. The bisync
19.1.3 Disconnect
protocol ended up in ATM machines, check sorting machines,
Either HDLC module can initiate a disconnect, either on its
radar systems, cash registers, radio dispatching systems,
own initiative if there is some sort of fault, or at the request of
telephone switches, and countless other devices.
its higher-layer user. HDLC issues a disconnect by sending a
34
This massive array of hardware is not about to disappear
Notes
35
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 20
Today’s Topics For example in Figure 20.2 each user has a signal of W Hz and
• Multiplexing the channel that is available is greater than 3W Hz. In such a case
available bandwidth can be shared by the individual users and
• TDM each user will have the required bandwidth at his disposal for
• FDM the complete duration of allotment.
Objectives
Upon completion of this Lesson, you should be able to:
• Define Modulation
• Distinguish between different types of Modulation
• Exlpain the advantages and disadvantages if any of each type
of modulation
20.1 Multiplexing
involves the sharing of expensive network resources by several
connections or information flows. The network resource of
primary importance is bandwidth of the communication
channel, which is measured in Hertz for analog transmission
system and bits/second for digital transmission system. Here
we consider multiplexing techniques that are used to share a set
of transmission lines among a community of users.
36
treated as an individual signal. Ten supergroups can then be
37
UNIT V
DATA COMMUNICATION NETWORKING
LESSON 21
38
Node B receives the connection request and identifies a path to
Notes
39
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 22
Today’s Topics
• Packet Switching
• Message Switching
Objectives
Upon completion of this Lesson, you should be able to:
• Explain what is packet switching
• Explain what is message switching
• Compare packet and message switching
22.1 Packet Switching
A quite different approach is used in a packet-switched network.
In this case, it is not necessary to dedicate transmission capacity
along a path through the network. Rather, data are sent out in a
sequence of small chunks, called packets. Each packet is passed
through the network from node to node along some path
leading from source to destination. At each node, the entire
packet is received, stored briefly, and then transmitted to the
next node. Packet-switched networks are commonly used for
terminal-to-computer and computer-to-computer
communications.
Packet switching is similar to message switching using short
messages. Any message exceeding a network-defined maximum
length is broken up into shorter units, known as packets, for
transmission; the packets, each with an associated header, are
then transmitted individually through the network. The
fundamental difference in packet communication is that the data
is formed into packets with a pre-defined header format, and Packet-switched communication between systems A and D
well-known “idle” patterns which are used to occupy the link (The message in this case has been broken into three parts
when there is no data to be communicated. labeled 1-3)
A packet network equipment discards the “idle” patterns 22.1.1 There are two Important Benefits from Packet
between packets and processes the entire packet as one piece of Switching
data. The equipment examines the packet header information 1. The first and most important benefit is that since packets are
(PCI) and then either removes the header (in an end system) or short, the communication links between the nodes are only
forwards the packet to another system. If the out-going link is allocated to transferring a single message for a short period
not available, then the packet is placed in a queue until the link of time while transmitting each packet. Longer messages
becomes free. A packet network is formed by links which require a series of packets to be sent, but do not require the
connect packet network equipment. link to be dedicated between the transmission of each packet.
The implication is that packets belonging to other messages
may be sent between the packets of the message being sent
from A to D. This provides a much fairer sharing of the
resources of each of the links.
2. Another benefit of packet switching is known as
“pipelining”. Pipelining is visible in the figure above. At the
Communication between A and D using circuits which are time packet 1 is sent from B to C, packet 2 is sent from A to
shared using packet switching. B; packet 1 is sent from C to D while packet 2 is sent from B
to C, and packet 3 is sent from A to B, and so forth. This
simultaneous use of communications links represents a gain
in efficiency, the total delay for transmission across a packet
network may be considerably less than for message
40
switching, despite the inclusion of a header in each packet
41
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 23
42
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 24
Today’s Topics send, it can send only when its time slot comes up, even if all
• Asynchronous Transfer Mode other time slots are empty. However, if a station has nothing to
transmit when its time slot comes up, the time slot is sent
• ATM Devices and the Network Environment
empty and is wasted. Because ATM is asynchronous, time slots
• ATM Cell Basic Format are available on demand with information identifying the source
• ATM Devices of the transmission contained in the header of each ATM cell.
• ATM Network Interfaces 24.3 ATM Cell Basic Format
Objectives ATM transfers information in fixed-size units called cells. Each
Upon completion of this Lesson, you should be able to:Upon cell consists of 53 octets, or bytes. The first 5 bytes contain cell-
completion of this Lesson, you should be able to: header information, and the remaining 48 contain the payload
(user information). Small, fixed-length cells are well suited to
• Explain what is ATM switching
transferring voice and video traffic because such traffic is
• Explain ATM Switches, ATM endpoints UNI,NNI intolerant of delays that result from having to wait for a large
24.1 Asynchronous Transfer Mode data packet to download, among other things. Figure 23-2
Switching illustrates the basic format of an ATM cell.
Asynchronous Transfer Mode (ATM) is an International Figure 24-2: An ATM Cell Consists of a Header and
Telecommunication Union-Telecommunications Standards Payload Data
Section (ITU-T) standard for cell relay wherein information for
multiple service types, such as voice, video, or data, is conveyed
in small, fixed-size cells. ATM networks are connection-
oriented. Figure 24.1 illustrates a private ATM network and a
public ATM network carrying voice, video, and data traffic.
43
COMPUTER NETWORKS AND DATA COMMUNICA TION
Notes
44
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 25
45
• ATM layer—Combined with the ATM adaptation layer, the
COMPUTER NETWORKS AND DATA COMMUNICA TION
Notes
46
COMPUTER NETWORKS AND DATA COMMUNICA TION
LESSON 26
47
4. When the frame gets back to the originator, it sees that the from one router to another via one or more intermediate
COMPUTER NETWORKS AND DATA COMMUNICA TION
token has been changed to 0 and that the message has been routers the packet is received at each intermediate router in its
copied and received. It removes the message from the frame. entirety, stored there until the required output line is free and
The frame continues to circulate as an “empty” frame, ready to then forwarded. A subnet using this principle is called a point
be taken by a workstation when it has a message to send. to point network In contrast to local area networks, which have
a symmetric topology, WANS have irregular topologies.
26.3.3 Arcnet
A second possibility for a WAN is a satellite or ground radio
is a widely-installed local area network (LAN) technology that
system. Each router has an antenna through which it can send
uses a token-bus scheme for managing line sharing among the
and receive. All routers can hear the output from the satellite
workstations and other devices connected on the LAN. The
and in some cases they can also hear the upward transmissions
LAN server continuously circulates empty message frames on a
of their fellow routers to the satellite as well. Sometimes the
bus(a line in which every message goes through every device on
routers are connected to a substantial point-to-point subnet,
the line and a device uses only those with its address). When a
with only some of them having a satellite antenna. Satellite
device wants to send a message, it inserts a “token” (this can be
networks are inherently broadcast and are more useful when the
as simple as setting a token bit to 1) in an empty frame in which
broadcast property is important.
it also inserts the message. When the destination device or LAN
server reads the message, it resets the token to 0 so that the For more information on topics in chapters 15 –26 please refer
frame can be reused by any other device. The scheme is very to
efficient when traffic increases since all devices are afforded the References and Further Reading
same opportunity to use the shared network.
• Data Communications, Prakash C Gupta, Eastern Economy
ARCNET can use coaxial or fibreoptic lines. Edition
26.3.4 FDDI • Handbook of data communication, National Computing
(Fiber Distributed Data Interface) is a set of ANSI and ISO Center Ltd, Manchester
standards for data transmission on fibre optic lines in a local • Comput er Networks- Tannenbaum
area network(LAN) that can extend in range up to 200 km (124
miles). The FDDI protocol is based on the token ring protocol.
In addition to being large geographically, an FDDI local area Notes
network can support thousands of users. FDDI is frequently
used on thebackbone for a wide area network(WAN).
An FDDI network contains two token rings, one for possible
backup in case the primary ring fails. The primary ring offers up
to 100 mbpscapacity. If the secondary ring is not needed for
backup, it can also carry data, extending capacity to 200 Mbps.
The single ring can extend the maximum distance; a dual ring
can extend 100 km .
26.4 WAN
A wide area network spans a large geographical area often a
country or continent. It contains a collection of machines
intended for a country or continent. It contains a collection of
machines intended for running user (application ) programs
called hosts. The hosts are connected by a communication
subnet . The job of the subnet is to carry messages from host
to host , just as the telephone system carries words from
speaker to listener. By separating the pure communication
aspects of the network (subnet) from the application aspects
(hosts) the complete network design is greatly simplified.
In most WANs the subnet consists of two distinct compo-
nents, transmission lines and switching elements. Transmission
lines (also called circuits, channels, or trunks) move bits between
machines. The switching elements are specialized computers
used to connect two or more transmission lines. When data
arrive on an incoming line the switching element must choose
an outgoing line to forward them on.
In most WANs the network contains numerous cables or
telephone lines, each one connecting a pair of routers. If two
routers that do not share a cable wish to communicate they
must do this indirectly via other routers. When a packet is sent
48
“The lesson content has been compiled from various sources in public domain including but not limited to the
internet for the convenience of the users. The university has no proprietary right on the same.”