DCS Unit-1
DCS Unit-1
net
DCS Unit-1 Introduction to Data Communications Introduction to Data
Communications:
In Data Communications, data generally are defined as information that is stored
in digital form. Data communications is the process of transferring digital information
between two or more points. Information is defined as the knowledge or intelligence. Data
communications can be summarized as the transmission, reception, and processing of
digital information. For data communications to occur, the communicating devices must
be part of a communication system made up of a combination of hardware (physical
equipment) and software (programs). The effectiveness of a data communications system
depends on four fundamental characteristics: delivery, accuracy, timeliness, and jitter.
A data communications system has five components: 1. Message: The message is the
information (data) to be communicated. Popular forms of
information include text, numbers, pictures, audio, and video. 2. Sender: The sender is
the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on. 3. Receiver: The receiver is
the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on. 4. Transmission medium: The
transmission medium is the physical path by which a message travels from sender to
receiver. Some examples of transmission media include twisted-pair wire, coaxial cable,
fiber-optic cable, and radio waves. 5. Protocol: A protocol is a set of rules that govern
data communications. It represents an
agreement between the communicating
devices.
1
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications for Integrated Services Digital Network
(ISDN) and its extension Broadband ISDN. ITU-T membership consists of government
authorities and representatives from many countries and it is the present standards
organization for the United Nations. 3. Institute of Electrical and Electronics
Engineers (IEEE)
IEEE is an international professional organization founded in United States and is
compromised of electronics, computer and communications engineers. It is currently the
world’s largest professional society with over 200,000 members. It develops
communication and information processing standards with the underlying goal of
advancing theory, creativity, and product quality in any field related to electrical
engineering. 4. American National Standards Institute (ANSI)
ANSI is the official standards agency for the United States and is the U.S voting
representative for the ISO. ANSI is a completely private, non-profit organization
comprised of equipment manufacturers and users of data processing equipment and
services. ANSI membership is comprised of people form professional societies, industry
associations, governmental and regulatory bodies, and consumer goods. 5. Electronics
Industry Association (EIA)
EIA is a non-profit U.S. trade association that establishes and recommends industrial
standards. EIA activities include standards development, increasing public awareness,
and lobbying and it is responsible for developing the RS (recommended standard)
series of standards for data and communications. 6. Telecommunications Industry
Association (TIA)
TIA is the leading trade association in the communications and information technology
industry. It facilitates business development opportunities through market development,
trade promotion, trade shows, and standards development. It represents manufacturers
of communications and information technology products and also facilitates the
convergence of new communications networks. 7. Internet Architecture Board (IAB)
IAB earlier known as Internet Activities Board is a committee created by ARPA
(Advanced Research Projects Agency) so as to analyze the activities of ARPANET
whose purpose is to accelerate the advancement of technologies useful for U.S
military. IAB is a technical advisory group of the Internet Society and its responsibilities
are:
I. Oversees the architecture protocols and procedures used by the Internet. II.
Manages the processes used to create Internet Standards and also serves as an
appeal board for complaints regarding improper execution of standardization
process. III. Responsible for administration of the various Internet assigned
numbers IV. Acts as a representative for Internet Society interest in liaison
relationships with
other organizations. V. Acts as a source of advice and guidance to the board of
trustees and officers of Internet Society concerning various aspects of internet and
its technologies.
2
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications 8. Internet Engineering Task Force
(IETF) The IETF is a large international community of network designers, operators,
vendors and researchers concerned with the evolution of the Internet architecture and
smooth operation of the Internet. 9. Internet Research Task Force (IRTF)
The IRTF promotes research of importance to the evolution of the future Internet by
creating focused, long-term and small research groups working on topics related to
Internet protocols, applications, architecture and technology.
To reduce the design complexity, most of the networks are organized as a series
of layers or levels, each one build upon one below it. The basic idea of a layered
architecture is to divide the design into small pieces. Each layer adds to the services
provided by the lower layers in such a manner that the highest layer is provided a full set
of services to manage communications and run the applications. The benefits of the
layered models are modularity and clear interfaces, i.e. open architecture and
comparability between the different providers' components. A basic principle is to ensure
independence of layers by defining services provided by each layer to the next higher
layer without defining how the services are to be performed. This permits changes in a
layer without affecting other layers. The basic elements of a layered model are services,
protocols and interfaces. A service is a set of actions that a layer offers to another (higher)
layer. Protocol is a set of rules that a layer uses to exchange information with a peer
entity. These rules concern both the contents and the order of the messages used.
Between the layers service interfaces are defined. The messages from one layer to
another are sent through those interfaces.
3
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications With layered architectures, communications
between two corresponding layers requires a unit of data called a protocol data unit
(PDU). A PDU can be a header added at the beginning of a message or a trailer appended
to the end of a message. Data flows downward through the layers in the source system
and upwards at the destination address. As data passes from one layer into another,
headers and trailers are added and removed from the PDU. This process of adding or
removing PDU information is called encapsulation/decapsulation. Between each pair
of adjacent layers there is an interface. The interface defines which primitives operations
and services the lower layer offers to the upper layer adjacent to it. A set of layers and
protocols is known as network architecture. A list of protocols used by a certain system,
one protocol per layer, is called protocol stack.
Open Systems Interconnection (OSI)
International standard organization (ISO) established a committee in 1977 to develop
architecture for computer communication and the OSI model is the result of this effort. In
1984, the Open Systems Interconnection (OSI) reference model was approved as an
international standard for communications architecture. The term “open” denotes the
ability to connect any two systems which conform to the reference model and associated
standards. The OSI model describes how information or data makes its way from
application programmes (such as spreadsheets) through a network medium (such as
wire) to another application programme located on another network. The OSI reference
model divides the problem of moving information between computers over a network
medium into SEVEN smaller and more manageable problems. The seven layers are:
4 Mukesh Chinta Asst Prof, CSE, VNRVJIET
Peer –to- peer communications
Peers
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications The lower 4 layers (transport, network, data
link and physical —Layers 4, 3, 2, and 1) are concerned with the flow of data from end to
end through the network. The upper four layers of the OSI model (application,
presentation and session—Layers 7, 6 and 5) are orientated more toward services to the
applications. Data is Encapsulated with the necessary protocol information as it moves
down the layers before network transit.
5
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications As with any layered architecture, overhead
information is added to a PDU in the form of headers and trailers. Each layer provides a
service to the layer above it in the protocol specification. Each layer communicates with
the same layer’s software or hardware on other computers.
Physical Layer {the physical layer is responsible for transmitting individual bits from one node to
the next}
The physical layer is the lowest layer of the OSI hierarchy and coordinates the
functions required to transmit a bit stream over a physical medium. It also defines the
procedures and functions that physical devices and interfaces have to perform for
transmission occur. The physical layer specifies the type of transmission medium and the
transmission mode (simplex, half duplex or full duplex) and the physical, electrical,
functional and procedural standards for accessing data communication networks.
Transmission media defined by the physical layer include metallic cable, optical fiber
cable or wireless radio-wave propagation. The physical layer also includes the carrier
system used to propagate the data signals between points in the network. The carrier
systems are simply communication systems that carry data through a system using either
metallic or optical fiber cables or wireless arrangements such as microwave, satellites
and cellular radio systems.
6
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Data-link Layer {the data link layer is
responsible for transmitting frames from one node to the next}
The data link layer transforms the physical layer, a raw transmission facility, to a
reliable link and is responsible for node-to-node delivery. It makes the physical layer
appear error free to the upper layer (network layer).
The data link layer packages data from the physical layer into groups called blocks,
frames or packets. If frames are to be distributed to different systems on the network, the
data link layer adds a header to the frame to define the physical address of the sender
(source address) and/or receiver (destination address) of the frame. The data-link layer
provides flow-control, access-control, and error-control.
Network Layer {is responsible for the delivery of individual packets from the source host to the
destination host}
The network layer provides details that enable data to be routed between devices
in an environment using multiple networks, subnetworks or both. This is responsible for
addressing messages and data so they are sent to the correct destination, and for
translating logical addresses and names (like a machine name FLAME) into physical
addresses. This layer is also responsible for finding a path through the network to the
destination computer.
The network layer provides the upper layers of the hierarchy with independence from the
data transmission and switching technologies used to interconnect systems. Networking
components that operate at the network layer include routers and their software.
7
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Transport Layer {is responsible for
delivery of a message from one process to another}
The transport layer controls and ensures the end-to-end integrity of the data message
propagated through the network between two devices, providing the reliable,
transparent transfer of data between two endpoints.
Session layer, some times called the dialog controller provides mechanism for
controlling the dialogue between the two end systems. It defines how to start, control and
end conversations (called sessions) between applications.
Session layer protocols provide the logical connection entities at the application layer.
These applications include file transfer protocols and sending email. Session
responsibilities include network log-on and log-off procedures and user authentication.
Session layer characteristics include virtual connections between applications, entities,
synchronization of data flow for recovery purposes, creation of dialogue units and activity
units, connection parameter negotiation, and partitioning services into functional groups.
8
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Presentation Layer {responsible for
translation, compression, and encryption}
The presentation layer translated between different data formats and protocols.
Presentation functions include data file formatting, encoding, encryption and decryption
of data messages, dialogue procedures, data compression algorithms, synchronization,
interruption, and termination.
The application layer is the highest layer in the hierarchy and is analogous to the
general manager of the network by providing access to the OSI environment. The
applications layer provides distributed information services and controls the sequence of
activities within and application and also the sequence of events between the computer
application and the user of another application.
The application layer communicates directly with the user’s application program. User
application processes require application layer service elements to access the networking
environment. The service elements are of two types: CASEs (common application service
elements) satisfying particular needs of application processes like association control,
concurrence and recovery. The second type is SASE (specific application service
elements) which include TCP/IP stack, FTP, SNMP, Telnet and SMTP.
9
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Data Communication
Circuits The underlying purpose of a digital communications circuit is to provide a
transmission path between locations and to transfer digital information from one station
(node, where computers or other digital equipment are located) to another using
electronic circuits. Data communications circuits utilize electronic communications
equipment and facilities to interconnect digital computer equipment. Communication
facilities are physical means of interconnecting stations and are provided to data
communications users through public telephone networks (PTN), public data networks
(PDN), and a multitude of private data communications systems.
The following figure shows a simple two-station data communications circuit. The
main components are:
Source: - This device generates the data to be transmitted; examples are mainframe
computer, personal computer, workstation etc. The source equipment provides a means
for humans to enter data into system.
10
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications accept an analog signal coming from a
network or transmission line and convert it into a digital bit stream. Destination: - Takes
the incoming data from the receiver and can be any kind of digital equipment like the
source.
Serial and Parallel Data Transmission
There are two methods of transmitting digital data namely parallel and serial
transmissions. In parallel data transmission, all bits of the binary data are transmitted
simultaneously. For example, to transmit an 8-bit binary number in parallel from one unit
to another, eight transmission lines are required. Each bit requires its own separate data
path. All bits of a word are transmitted at the same time. This method of transmission can
move a significant amount of data in a given period of time. Its disadvantage is the large
number of interconnecting cables between the two units. For large binary words, cabling
becomes complex and expensive. This is particularly true if the distance between the two
units is great. Long multiwire cables are not only expensive, but also require special
interfacing to minimize noise and distortion problems. Serial data transmission is the
process of transmitting binary words a bit at a time. Since the bits time-share the
transmission medium, only one interconnecting lead is required.
While serial data transmission is much simpler and less expensive because of the
use of a single interconnecting line, it is a very slow method of data transmission. Serial
data transmission is useful in systems where high speed is not a requirement. Parallel
communication is used for short-distance data communications and within a computer,
and serial transmission is used for long-distance data communications.
11
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Data Communication
Circuit Arrangements A data communications circuit can be described in
terms of circuit configuration and transmission mode.
Circuit
Configurations
The major components of a network are end stations, applications and a network that will
support traffic between the end stations. Computer networks all share common devices,
functions, and features, including servers, clients, transmission media, shared data,
shared printers and other peripherals, hardware and software resources, network
interface card (NIC), local operating system (LOS) and the network operating system
(NOS).
Servers: Servers are computers that hold shared files, programs and the network
operating system. Servers provide access to network resources to all the users of the
network and different kinds of servers are present. Examples include file servers, print
servers, mail servers, communication servers etc.
Clients: Clients are computers that access and use the network and shared network
resources. Client computers are basically the customers (users) of the network, as they
request and receive service from the servers.
Shared Data: Shared data are data that file servers provide to clients, such as data
files, printer access programs, and e-mail.
13
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Shared Printers and other peripherals:
these are hardware resources provided to the users of the network by servers. Resources
provided include data files, printers, software, or any other items used by the clients on
the network.
Network interface card: Every computer in the network has a special expansion card
called network interface card (NIS), which prepares and sends data, receives data, and
controls data flow between the computer and the network. While transmitting, NIC passes
frames of data on to the physical layer and on the receiver side, the NIC processes bits
received from the physical layer and processes the message based on its contents.
Local operating system: A local operating system allows personal computers to access
files, print to a local printer, and have and use one or more disk and CD drives that are
located on the computer. Examples are MS-DOS, PC-DOS, UNIX, Macintosh, OS/2,
Windows 95, 98, XP and Linux.
Network operating system: the NOS is a program that runs on computers and servers
that allows the computers to communicate over a network. The NOS provides services to
clients such as log-in features, password authentication, printer access, network
administration functions and data file sharing.
Network Models
Computer networks can be represented with two basic network models: peer-to-peer
client/server and dedicated client/server. The client/server method specifies the way in
which two computers can communicate with software over a network.
Peer-to-peer client/server network: Here, all the computers share their resources, such
as hard drives, printers and so on with all the other computers on the network. Individual
resources like disk drives, CD-ROM drives, and even printers are transformed into
shared, collective resources that are accessible from every PC. Unlike client-server
networks, where network information is stored on a centralized file server PC and made
available to tens, hundreds, or thousands client PCs, the information stored across peer-
to-peer networks is uniquely decentralized. Because peer-to-peer PCs have their own
hard disk drives that are accessible by all computers, each PC acts as both a client
(information requestor) and a server (information provider). The peer-to-peer network is
an appropriate choice when there are fewer than 10 users on the network, security is not
an issue and all the users are located in the same general area.
14
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Dedicated client/server network: Here,
one computer is designated as server and the rest of the computers are clients. Dedicated
Server Architecture can improve the efficiency of client server systems by using one
server for each application that exists within an organization. The designated servers
store all the networks shared files and applications programs and function only as servers
and are not used as a client or workstation. Client computers can access the servers and
have shared files transferred to them over the transmission medium. In some client/server
networks, client computers submit jobs to one of the servers and once they process the
jobs, the results are sent back to the client computer.
Network Topologies
In computer networking, topology refers to the layout of connected devices, i.e. how the
computers, cables, and other components within a data communications network are
interconnected, both physically and logically. The physical topology describes how the
network is actually laid out, and the logical topology describes how the data actually flow
through the network. Two most basic topologies are point-to-point and multipoint. A point-
to-point topology usually connects two mainframe computers for high-speed digital
information. A multipoint topology connects three or more stations through a single
transmission medium and some examples are star, bus, ring, mesh and hybrid.
Star topology: A star topology is designed with each node (file server, workstations, and
peripherals) connected directly to a central network hub, switch, or concentrator. Data on
a star network passes through the hub, switch, or concentrator before continuing to its
destination. The hub, switch, or concentrator manages and controls all functions of the
network. It also acts as a repeater for the data flow.
15
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Bus topology: Bus networks use a common
backbone to connect all devices. A single cable, (the backbone) functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message. The bus topology is the simplest and most common
method of interconnecting computers. The two ends of the transmission line never touch
to form a complete loop. A bus topology is also known as multidrop or linear bus or a
horizontal bus.
Ring topology: In a ring network (sometimes called a loop), every device has exactly two
neighbours for communication purposes. All messages travel through a ring in the same
direction (either "clockwise" or "counter clockwise"). All the stations are interconnected in
tandem (series) to form a closed loop or circle. Transmissions are unidirectional and must
propagate through all the stations in the loop. Each computer acts like a repeater and the
ring topology is similar to bus or star topologies.
Mesh topology: The mesh topology incorporates a unique network design in which each
computer on the network connects to every other, creating a point-to-point connection
between every device on the network. Unlike each of the previous topologies, messages
sent on a mesh network can take any of several possible paths from source to destination.
A
16
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications mesh network in which every device
connects to every other is called a full mesh. A disadvantage is that, a mesh network with
n nodes must have n(n-1)/2 links and each node must have n-1 I/O ports (links).
Hybrid topology: This topology (sometimes called mixed topology) is simply combining
two or more of the traditional topologies to form a larger, more complex topology. Main
aim is being able to share the advantages of different topologies.
Network
Classifications
One way to categorize the different types of computer network designs is by their scope
or scale. Common examples of area network types are: ➢ LAN - Local Area Network ➢
WLAN - Wireless Local Area Network ➢ WAN - Wide Area Network ➢ MAN -
Metropolitan Area Network ➢ SAN - Storage Area Network, System Area Network,
Server Area Network, or sometimes
Small Area Network ➢ CAN - Campus Area Network, Controller Area Network, or
sometimes Cluster Area
Network ➢ PAN - Personal
Area Network ➢ DAN - Desk
Area Network
17
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Local area network: A local area network
(LAN) is a network that connects computers and devices in a limited geographical area
such as home, school, computer laboratory, office building, or closely positioned group of
buildings. LANs use a network operating system to provide two-way communications at
bit rates in the range of 10 Mbps to 100 Mbps. In addition to operating in a limited space,
LANs are also typically owned, controlled, and managed by a single person or
organization. They also tend to use certain connectivity technologies, primarily Ethernet
and Token Ring.
Advantages of LAN: ✓ Share resources efficiently ✓ Individual workstation might
survive network failure if it doesn’t rely upon others ✓ Component evolution
independent of system evolution ✓ Support heterogeneous hardware/software ✓
Access to other LANs and WANs ✓ High transfer rates with low error rates
Metropolitan area network: A MAN is optimized for a larger geographical area than a LAN,
ranging from several blocks of buildings to entire cities. Its geographic scope falls between
a WAN and LAN. A MAN might be a single network like the cable television network or it
usually interconnects a number of local area networks (LANs) using a high- capacity
backbone technology, such as fiber-optical links, and provides up-link services to wide
area networks and the Internet. MANs typically operate at speeds of 1.5 Mbps to 10 Mbps
and range from five miles to a few hundred miles in length. Examples of MANs are FDDI
(fiber distributed data interface) and ATM (asynchronous transfer mode).
18
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Wide area network: Wide area networks are
the oldest type of data communications network that provide relatively slow-speed, long-
distance transmission of data, voice and video information over relatively large and widely
dispersed geographical areas, such as country or entire continent. WANs interconnect
routers in different locations. A WAN differs from a LAN in several important ways. Most
WANs (like the Internet) are not owned by any one organization but rather exist under
collective or distributed ownership and management. WANs tend to use technology like
ATM, Frame Relay and X.25 for connectivity over the longer distances.
Global area network: A GAN provides connections between countries around the entire
globe. Internet is a good example and is essentially a network comprised of other
networks that interconnect virtually every country in the world. GANs operate from 1.5
Mbps to 100 Gbps and cover thousands of miles.
Campus Area Network: - a network spanning multiple LANs but smaller than a MAN, such as
on a university or local business campus.
Storage Area Network: - connects servers to data storage devices through a technology like
Fibre Channel.
Camus backbone: - It is a network connection used to carry traffic to and from LANs located in
various buildings on campus. It normally uses optical fiber cables for the transmission media
between buildings and operates at relatively high transmission rates.
Enterprise networks: - It includes some or all of the above networks and components
connected in a cohesive and manageable fashion.
Alternate Protocol Suites The protocols other than OSI that are in wide
spread used are TCP?IP and the Cisco three- layer hierarchical model.
The U.S. Department of Defense (DoD) created the TCP/IP reference model because it
wanted a network that could survive any conditions, even a nuclear war. Transmission
Control Protocol/Internet Protocol (TCP/IP) {commonly known as internet suite} model is
a set of communication protocols that allow communication across multiple diverse
networks. TCP/IP is a hierarchical protocol comprised of either three or four layers. The
19
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications three-layer version of TCP/IP contains the
network, transport and application layers. Four layer version specifies the host to
network layer.
The designers of TCP/IP felt that the higher level protocols should include the
session and presentation layer details. They simply created an application layer that
handles high- level protocols, issues of representation, encoding, and dialog control. The
TCP/IP combines all application-related issues into one layer, and assures this data is
properly packaged for the next layer.
The TCP/IP transport layer deals with the quality-of-service issues of reliability,
flow control, and error correction. One of its protocols, the transmission control protocol
(TCP), provides excellent and flexible ways to create reliable, well-flowing, low-error
network communications. TCP is a connection-oriented protocol. The other protocol is
User Datagram Protocol (UDP) which is a connection less protocol.
20
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications The purpose of the Internet layer is to send
source packets from any network on the internetwork and have them arrive at the
destination independent of the path and networks they took to get there. The specific
protocol that governs this layer is called the Internet protocol (IP). Best path
determination and packet switching occur at this layer.
The network access layer also called the host-to-network layer is concerned
with all of the issues of physically delivering data packets using frames or cells.
➢ TCP/IP combines the presentation and session layer issues into its application layer
➢ TCP/IP combines the OSI data link and physical layers into one layer ➢ TCP/IP
appears simpler because it has fewer layers ➢ TCP/IP protocols are the standards
around which the Internet developed, so the TCP/IP model gains credibility just because
of its protocols. In contrast, typically networks aren't built on the OSI protocol, even
though the OSI model is used as a guide.
Cisco has defined a hierarchical model known as the hierarchical internetworking model.
This model simplifies the task of building a reliable, scalable, and less expensive
hierarchical internetwork because rather than focusing on packet construction; it focuses
on the three functional areas, or layers, of your network.
Core layer: This layer is considered the backbone of the network and includes the high-
end switches and high-speed cables such as fiber cables. This layer of the network does
not route traffic at the LAN. In addition, no packet manipulation is done by devices in this
layer. Rather, this layer is concerned with speed and ensures reliable delivery of packets.
Distribution layer: This layer includes LAN-based routers and layer 3 switches. This
layer ensures that packets are properly routed between subnets and VLANs in your
enterprise. This layer is also called the Workgroup layer. It also provides policy-based
network connectivity, including:
• Packet filtering (firewalling): Processes packets and regulates the transmission of
packets based on its source and destination information to create network borders.
• QoS: The router or layer 3 switches can read packets and prioritize delivery, based on
policies set.
• Access Layer Aggregation Point: The layer serves the aggregation point for the
desktop layer switches.
• Control Broadcast and Multicast: The layer serves as the boundary for broadcast and
multicast domains.
• Application Gateways: The layer allows you to create protocol gateways to and from
different network architectures.
• The distribution layer also performs queuing and provides packet manipulation of the
network traffic.
21
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Access layer: This layer includes hubs and
switches. This layer is also called the desktop layer because it focuses on connecting
client nodes, such as workstations to the network. This layer ensures that packets are
delivered to end user computers. At the access layer, you can:
• Enable MAC address filtering: It is possible to program a switch to allow only certain
systems to access the connected LANs.
• Create separate collision domains: A switch can create separate collision domains for
each connected node to improve performance.
• Share bandwidth: You can allow the same network connection to handle all
data.
• Handle switch bandwidth: You can move data from one network to another to perform
load balancing.
➢ High Performance: You can design high performance networks, where only certain
layers
are susceptible to congestion. ➢ Efficient management & troubleshooting: Allows
you to efficiently organize network
management and isolate causes of network trouble. ➢ Policy creation: You can
easily create policies and specify filters and rules. ➢ Scalability: You can grow the
network easily by dividing your network into functional
areas. ➢ Behavior prediction: When planning or managing a network, the model
allows you
determine what will happen to the network when new stresses are placed on
it.
22
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
Signals, Noise,
DCS Unit-1 Introduction to Data Communications
Digital signals are described as discrete; their amplitude maintains a constant level
for a prescribed period of time and then it changes to another level. If only two levels are
possible, it is called a binary signal. All binary signals are digital, but all digital signals are
not necessarily binary. Converting information signals to a different form is called
modulation and the reverse process is called demodulation. The modulating signal is
the information and the signal being modulated is the carrier.
Two basic types of electronic communications systems are analog and digital. An
analog digital communications system is a communications system in which energy is
transmitted and received in analog form and are also propagated through the system in
analog form. Digital communications covers a broad range of communications techniques
including digital transmission and digital modulation.
Signal Analysis Mathematical signal analysis is used to analyze and predict
the performance of the circuit on the basis of the voltage distribution and frequency
composition of the information signal.
A cycle is one complete variation in the signal, and the period is the time the waveform
takes to complete on cycle. One cycle constitutes 360 degrees (or 2π radians). Sine
waves can be described in terms of three parameters: amplitude, frequency and phase.
23
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Amplitude (A): It is analogous to
magnitude or displacement. The amplitude of a signal is the magnitude of the signal at
any point on the waveform. The amplitude of electrical signal is generally measured in
voltage. The maximum voltage of a signal in respect to its average value is called its peak
amplitude or peak voltage.
Frequency (f): The time of one cycle of a waveform is its period, which is measured in
seconds. Frequency is the number of cycles completed per second. The measurement
unit for frequency is the hertz, Hz. 1 Hz = 1 cycle per second. The frequency of the signal
can be calculated fromT=1/f
Phase (Ø): The phase of the signal is measured in degrees or radians with respect to a
reference point. A phase shift of 180 degrees corresponds to a shift of half a cycle.
A phase shift of 360 degrees corresponds to a shift of one complete cycle. If two
sine waves have the same frequency and occur at the same time, they are said to be in
phase, or they are said to out of phase. The difference in phase can be measured in
degrees, and is called the phase angle,
24
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Varying Sine wave with respect to
frequency and phase
Periodic Signals
Time domain: Time domain is a term used to describe the analysis of mathematical
functions, or physical signals, with respect to time. In the time domain, the signal or
function's value is known for all real numbers, for the case of continuous time, or at various
separate instants in the case of discrete time. An oscilloscope is a time-domain tool
commonly used to visualize real-world signals in the time domain. A time domain graph
shows how a signal changes over time.
25
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Frequency Domain: frequency domain is a
term used to describe the analysis of mathematical functions or signals with respect to frequency,
rather than time. A spectrum analyser is a frequency- domain instrument which displays
amplitude-versus frequency plot (called a frequency spectrum). The horizontal axis represents
frequency and the vertical axis amplitude showing a vertical deflection for each frequency present
in the waveform, which is proportional to the amplitude of the frequency it represents. Examples
nβ
Any periodic waveform is comprised of an average dc component and a series of
harmonically related sines or cosine waves. A harmonic is an integral multiple of the
fundamental frequency. Fundamental frequency is the first harmonic and equal to the
26 Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications frequency (repetition rate) of the
waveform. Second multiple is called second harmonic, third multiple is called third
harmonic and so forth.
Wave symmetry: It describes the symmetry of a waveform in the time domain, i.e., its
relative position with respect to the horizontal (time) and vertical (amplitude) axes.
Even symmetry: If a periodic voltage waveform is symmetric about the vertical axis, it is
said to have axes, or mirror, symmetry and is called an even function. For all even
functions, the β coefficients are zero. Even function satisfy the condition f(t) = f(-t)
Odd symmetry: If a periodic voltage waveform is symmetric about a line midway between
the vertical axis and the negative horizontal axis and passing through the coordinate
origin, it is said to have to point or skew, symmetry and is called an odd function. For all
odd functions, the α coefficients are zero. Odd function satisfies f(t) = -f(-t)
Half-wave symmetry: If a periodic voltage waveform is such that the waveform for the first
half cycle repeats itself except with the opposite sign for the second half cycle, it is called
to have half-wave symmetry. Half-wave symmetry implies that the second half of the wave
is exactly opposite to the first half. A function with half-wave symmetry does not have to
be even or
27
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications odd, as this property requires only that the
shifted signal is opposite. Half-wave functions satisfy the condition f(t) = -f(T+t)/2
Frequency Spectrum and Bandwidth
The frequency spectrum of a waveform consists of all the frequencies contained in the
waveform and their respective amplitudes plotted in the frequency domain.
Bandwidth of an information signal is simply the difference between the highest and
lowest frequencies contained in the information and the bandwidth of a communication
channel is the difference between the highest and lowest frequencies that the channel
will allow to pass through it.
Electrical Noise and Signal-To-Noise Ratio Noise is any
disturbance or distortion that comes in the process of communication. Electrical noise is
defined as any undesirable electrical energy that falls within the passband of the signal.
A noise signal consists of a mixture of frequencies with random amplitudes. Noise can
originate in various ways. The most prevalent and most interfering to data
communication signals are man-made noise, thermal noise, correlated noise, and
impulse noise.
Man-made noise: It is the kind of noise produced by mankind. The main sources are
spark- producing mechanisms like commutators in electric motors, automobile ignition
systems, ac power-generating and switching equipment, and fluorescent lights. It is
impulsive in nature and contains a wide range of frequencies propagated in the free space
like the radio waves. Man-made noise is most intense in more densely populated areas
and sometimes is referred to as industrial noise.
Thermal noise: This is the noise generated by thermal agitation of electrons in a
conductor. It is also referred to as white noise because of its uniform distribution across
the entire electromagnetic frequency spectrum. Noise power density is the thermal noise
power present in a 1-Hz bandwidth and is given by No = KT.
Thermal noise is independent of frequency and thus thermal noise present in any
bandwidth is N = KTB
where N is thermal noise power in watts, K is Boltzmann's constant in joules per Kelvin,
T is the conductor temperature in kelvin (0K = -273oC), and B is the bandwidth in hertz.
Noise power is often measured in dBm. From the equation above, noise power in a
resistor at room temperature, in dBm, is: NdBm = -174 dBm + 10 log B
Correlated noise: this noise is correlated to the signal and cannot be present in a circuit
unless there is a signal. Correlated noise is produced by nonlinear amplification and
includes harmonic distortion and intermodulation distortion. Harmonic distortion occurs
when unwanted harmonics of a signal are produced through nonlinear amplification and
is also
28 Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications called amplitude distortion. Intermodulation
distortion is the generation of unwanted sum and difference frequencies produced when
two or more signals are amplified in a nonlinear device.
29
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Amplitude Modulation
Advantages of AM are simple to implement, needs a circuit with very few components
and inexpensive. The disadvantages include inefficient power usage and use of
bandwidth and also prone to noise. The total bandwidth required for AM can be determined
from the bandwidth of the audio signal: BAM = 2B
30
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Angle Modulation
Angle modulation results whenever the phase angle of a sinusoidal signal is varied with
respect to time and includes both FM and PM. Whenever the frequency of a carrier signal
is varied, the phase is also varied and vice versa. If the frequency of the carrier is varied
directly in accordance with the information signal, FM results, whereas if the phase is
varied directly, PM results.
The above figure shows the FM and PM of a sinusoidal carrier by a single-
frequency modulating signal. Both FM and PM waveforms are identical except for their
time relationship (phase). With FM, the maximum frequency deviation occurs during the
maximum positive and negative peaks of the modulating signal. With FM, the maximum
frequency deviation occurs during the zero crossings in the modulating signal.
31
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications 32 Mukesh Chinta Asst Prof, CSE, VNRVJIET
Comparison of FM and PM
An important feature of FM and PM is that they can provide much better protection to the
message against channel noise when compared to AM. Also because of their constant
amplitude nature, they can withstand nonlinear distortion and amplitude fading.
Information Capacity, Bits, Bit Rate, Baud, and M-ARY
Encoding
Information capacity is a measure of how much information can be propagated through
a communication system and a function of bandwidth and transmission time. It represents
the number of independent symbols that can be carried through a system in a given unit
of time. The most basic digital symbol used to represent information is the binary digit,
or bit. Bit rate is simply the number of bits transmitted during 1 second and is expressed
as bits per second (bps).
R.Hartley developed a useful relationship among bandwidth, transmission time and
information capacity called Hartley’s law given by:
I α B × t Where, I is the information capacity in bps, B is bandwidth in hertz and t is transmission
time in sec’s
Relation between information capacity of a communication channel to a bandwidth and
signal-to-noise ratio is given by Claude E. Shannon. The higher the signal-to-noise ratio,
the better the performance and also information capacity is higher. The Shannon limit
of information capacity is
M-ary is a term derived from the word binary. M simply represents a digit that
corresponds to the number of conditions, levels, or combinations possible for a given
number of binary variables. For example, a digital signal with four possible conditions is
an M-ary system where M= 4 and if there are eight possible conditions, then M= 8. The
number of bits necessary to produce a given number of conditions is expressed
mathematically as:
number of conditions, levels or combinations possible with N bits. From the equation, it
can be said that if there is one bit, only 21 or two conditions are possible. For two bits 22
or four conditions are possible.
Baud, like bit rate is a rate of change. Baud refers to the rate of change of the
signal on the transmission medium after encoding and modulation have occurred. Baud
is the reciprocal of the time of one output signalling element, and a signalling element
may represent several information bits. Baud is also transmitted one at a time and a baud
may represent more than one information bit. So, the baud of the data communications
system may be considerably less than the bit rate.
element.
Digital Modulation
Digital modulation is the transmission of digitally modulated analog signals
between two or more points in a communications system. Analog and Digital modulation
systems use analog carriers to transport information through the system, but digital
modulation uses digital modulating (information) signal. Analog systems use analog
signal only. In, v(t) = V sin(2πft + θ), if the information signal is digital and amplitude (V)
of the carrier is varied proportional to the information signal, a digitally modulated signal
called amplitude-shift keying (ASK) is produced. If the frequency (f) is varied proportional
to the information signal, frequency-shift keying (FSK) is produced and if the phase is
varied proportional to the information signal, phase-shift keying (PSK) is produced. If both
amplitude and phase are
33
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications varied proportional to the information
signal, quadrature amplitude modulation (QAM) results.
It is the simplest digital modulation technique where a binary information signal directly
modulates the amplitude of an analog carrier. Only two output amplitudes are possible
and ASK is sometimes called as digital amplitude modulation (DAM). Amplitude shift
keying is given in mathematical terms as:
34
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications In the above equation, for the modulating
signal vm(t), logic 1 is represented by +1V and logic 0 is represented by -1V. So the
modulated wave vask(t) is either Acos(ωct) or 0 i.e., the carrier is either on or off. ASK
is sometimes referred as on-off keying (OOK). The rate of change of the ASK waveform
(baud) is the same as the rate of change of the binary input making bit rate equal to baud.
With ASK, the bit rate is also equal to the minimum Nyquist bandwidth.
35
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Frequency Shift Keying
vm(t)Δf]t }
Where vfsk(t) is binary FSK waveform, Vc is peak analog carrier amplitude in volts,
fc is analog carrier center frequency in hertz, Δf is peak change or shift in the analog
carrier frequency and vm(t) is binary input(modulating) signal in volts. For logic 1,
vm(t) = +1 and for logic 0, vm(t) = -1 reducing the equation to vfsk(t) = Vc cos{ 2π[fc
As the binary signal changes from a logic 0 to a logic 1 and vice versa, the output
frequency shifts between two frequencies: a mark, or logic 1 frequency (fm) and a space
or logic 0 frequency (fs). The mark and space frequencies are separated from the
carrier frequency by the peak frequency deviation (Δf ) and from each other by 2 Δf.
With FSK, frequency deviation is defined as the difference between either the mark or
space frequency and the center frequency or half the difference between the mark and
space frequencies. Frequency deviation can be expressed as Δf = |fm – fs| / 2
B = |(fs - fb) - (fm - fb)| = |fs - fm| + 2fb . But |fs - fm| =
2Δf,
36
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Phase-Shift Keying
Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing,
or modulating, the phase of a reference signal (the carrier wave). PSK uses a finite
number of phases; each assigned a unique pattern of binary digits. Usually, each phase
encodes an equal number of bits. PSK is not susceptible to the noise degradation that
affects ASK or to the bandwidth limitations of FSK.
Binary phase-shift keying: The simplest PSK technique is called binary phase-shift
keying (BPSK), where N = 1 and M = 2. Therefore, with BPSK two phases are possible
for the carrier. It uses two opposite signal phases (0 and 180 degrees). The digital signal
is broken up timewise into individual bits (binary digits). The state of each bit is determined
according to the state of the preceding bit. If the phase of the wave does not change, then
the signal state stays the same (0 or 1). If the phase of the wave changes by 180 degrees
-- that is, if the phase reverses -- then the signal state changes (from 0 to 1 or from 1 to
0). Because there are two possible wave phases, BPSK is sometimes called biphase
modulation or phase-reversal keying (PRK).
More sophisticated forms of PSK exist. In M-ary or multiple phase-shift keying (MPSK),
there are more than two phases, usually four (0, +90, -90, and 180 degrees) or eight (0,
+45, -45, +90, -90, +135, -135, and 180 degrees). If there are four phases (m = 4), the
MPSK mode is called quadrature phase-shift keying or quaternary phase-shift keying
(QPSK), and each phase shift represents two signal elements. If there are eight phases
(m = 8), the MPSK mode is known as octal phase-shift keying (OPSK), and each phase
shift represents three signal elements. In MPSK, data can be transmitted at a faster rate,
relative to the number of phase changes per unit time, than is the case in BPSK.
QPSK is an M-ary encoding scheme where N = 2 and M = 4, which has four output phases
are possible for a single carrier frequency needing four different input conditions. With
two bits, there are four possible conditions: 00, 01, 10, and 11. With QPSK, the binary
input data are combined into groups of two bits called dibits.
37
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications The above figure shows the output phase-
versus-time relationship, truth table, and constellation diagram for QPSK. A phase of 0 0
now represents 00; 900 represents 01; 1800 represents 10; and 2700 represents 11. Data
can be transmitted twice as efficiently using 4- PSK than 2-PSK.
With 8-PSK, three bits are encoded forming tribits and producing eight different
output phases. With 8-PSK, N = 3, M = 8, and the minimum bandwidth and baud equal
one third the bit rate (fb /3). 8-PSK is 3 times as efficient as 2-PSK.
38
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications With 16-PSK, four bits called quadbits are
combined, producing 16 different outputs phases. With 16-PSK, N = 4, M = 16, and the
minimum bandwidth and baud equal one-fourth the bit rate (fb /4).
Quadrature Amplitude Modulation (QAM)
PSK is limited by the ability of the equipment to distinguish small differences in phase.
Bandwidth limitations make combinations of FSK with other changes practically useless.
Quadrature amplitude modulation is a combination of ASK and PSK so that a maximum
contrast between each signal unit (bit, dibit, tribit, and so on) is achieved. QAM is used
extensively as a modulation scheme for digital telecommunication systems. The primary
advantage of QAM over PSK is immunity to transmission impairments, especially phase
impairments that are inherent in all communication systems.
In 4-QAM and 8-QAM, number of amplitude shifts is fewer than the number of phase shifts.
Because amplitude changes are susceptible to noise and require greater shift differences than do
phase changes, the number of phase shifts used by a QAM system is always larger than the
number of amplitude shifts.
8-PSK 3N Tribits 3 8 fb /3 fb /3
16-PSK 4N Quadibits 4 16 fb /4 fb /4
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications With 16-QAM, there are 12 phases and
three amplitudes that are combined to produce 16 different output conditions. With QAM,
there are always more phases possible than amplitude.
Bandwidth Efficiency
Bandwidth efficiency is often used to compare the performance of one digital modulation
technique to another. It is the ration of transmission bit rate to the minimum bandwidth
required for a particular modulation scheme. Mathematically represented as:
40
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Dr. Ungerboeck. It combines encoding
and modulation to reduce the probability of error, thus improving the bit error
performance and it uses conventional (tree) codes.
Trellis coding defines the manner in which signal-state transitions are allowed to
occur, and transitions that do not follow this pattern are interpreted as transmission errors.
TCM can improve error performance by restricting the manner in which signals are
allowed to transition. TCM improves on standard QAM by increasing the distance
between symbols on the constellation (called Euclidean distance).
42
Mukesh Chinta Asst Prof, CSE, VNRVJIET
www.jntumaterials.co.in || www.jntu3u.net
DCS Unit-1 Introduction to Data Communications Assignment Questions
1. In QAM amplitude and phase of the transmitted signal are varied - Justify your answer
with a
block diagram and constellation diagram.
2. a. Explain the importance of asynchronous transmission in communication.
b. Write the comparison between asynchronous and synchronous data
transmission
7. Sketch the binary ASK, FSK, PSK, and QPSK waveform for the following sequence
1011.
a) Explain the relationship between bits per second and baud for an FSK system. b)
Determine the bandwidth and baud for an FSK signal with a mark frequency of 24 kHz and
a bit rate of 4 kbps. c) Explain the
relationship between
i) Minimum bandwidth required for an FSK system and the bit rate ii)
Mark and space frequencies