DCN Unit 1
DCN Unit 1
UNIT :1
1. Message :
This is most useful asset of a data communication system. The
message simply refers to data or piece of information which is to
be communicated. A message could be in any form, it may be in
form of a text file, an audio file, a video file, etc.
2. Sender :
To transfer message from source to destination, someone must
be there who will play role of a source. Sender plays part of a
source in data communication system. It is simple a device that
sends data message. The device could be in form of a computer,
mobile, telephone, laptop, video camera, or a workstation, etc.
3. Receiver :
It is destination where finally message sent by source has arrived.
It is a device that receives message. Same as sender, receiver
can also be in form of a computer, telephone mobile, workstation,
etc.
4. Transmission Medium :
In entire process of data communication, there must be something
which could act as a bridge between sender and receiver,
Transmission medium plays that part. It is physical path by which
data or message travels from sender to receiver. Transmission
medium could be guided (with wires) or unguided (without wires),
for example, twisted pair cable, fiber optic cable, radio waves,
microwaves, etc.
5. Set of rules (Protocol) :
To govern data communications, various sets of rules had been
already designed by the designers of the communication systems,
which represent a kind of agreement between communicating
devices. These are defined as protocol. In simple terms, the
protocol is a set of rules that govern data communication. If two
different devices are connected but there is no protocol among
them, there would not be any kind of communication between
those two devices. Thus the protocol is necessary for data
communication to take place.
2.Network Architecture :-
Computer networks are usually developed to fulfil needs of their clients and
users. Network architecture generally refers to design of computer network or
communications network. It simply describes allocation task between all of
computers in network.
It is simply way in which all network devices and services are organized and
managed to connect clients like laptops, tablets, servers, etc. and also how
tasks are allocated to computer.
It also facilitates system-level functionality even robustness, extensibility, and
evolvability. It is basically defined and described as physical and logical
design of software, hardware, protocols, and media of data
transmission. Classification of Network based on use of computer nodes
: Network architecture is classified into following categories :
❖ Peer to Peer networks :-
• Peer network provides basic connectivity between computers but does
not set apart any central computer as a server or provide many of the
security features of a centralized client-server network.
• Peer networks do not centralize data on servers; rather, they connect
individual Computers for purposes of file sharing and e-mails.
• Peer Networks are defined by the absence of the server on a network.
There is no control over the network Users simply share disk space and
other resources Such as printers and faxes.
• Peer networks are organized into workgroups. Workgroups have very little
security control. There is no central login process.
• Access to individual resources can be controlled it the user who shared the
resource requires a password to access it. Peers are not optimized to share
resources Generally, when of users accessing the resource increases, there
is definitely degradation in performance of a peer.
Advantages
1.Easy setup
2.No network administrator
3.No extra cost of server
4.Users can control resource sharing
5.Lower cost for small networks.
Disadvantages
o Client/Server network is a network model designed for the end users called
clients, to access the resources such as songs, video, etc. from a central
computer known as Server.
o The central controller is known as a server while all other computers in the
network are called clients.
o A server performs all the major operations such as security and network
management.
o A server is responsible for managing all the resources such as files, directories,
printer, etc.
o All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to
the server for the permission. The server sends the response to the client 1 to
initiate its communication with the client 2.
❖ Categories Of Network :
o Thomas Zimmerman was the first research scientist to bring the idea of
o Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM,
ISDN, OC-3, ADSL, etc.
• A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
• A Wide Area Network is not limited to a single location, but it spans over a
large geographical area through a telephone line, fibre optic cable or satellite
links.
• A Wide Area Network is widely used in the field of Business, government, and
education.
1)Bus Topology
Computer Network Topologies
• The bus topology is designed in such a way that all the stations
are connected through a single cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop
cable or directly connected to the backbone cable.
• When a node wants to send a message over the network, it puts a
message over the network. All the stations available in the
network will receive the message whether it has been addressed
or not.
• The bus topology Is mainly used in 802.3 (ethernet) and 802.4
standard networks.
• The configuration of a bus topology is quite simpler as compared
to other topologies.
• The backbone cable is considered as a “single lane” through which
the message is broadcast to all the stations.
• The most common access method of the bus topologies is CSMA
(Carrier Sense Multiple Access).
• CSMA: It is a media access control used to control the data flow so
that data integrity is maintained, i.e., the packets do not get lost.
There are two alternative ways of handling the problems that
occur when two nodes send the messages simultaneously.
• CSMA CD: CSMA CD (Collision detection) is an access method used
to detect the collision. Once the collision is detected, the sender
will stop transmitting the data. Therefore, it works on “recovery
after the collision”.
• CSMA CA: CSMA CA (Collision Avoidance) is an access method
used to avoid the collision by checking whether the transmission
media is busy or not. If busy, then the sender waits until the
media becomes idle. This technique effectively reduces the
possibility of the collision. It does not work on “recovery after the
collision”.
Advantages of Bus topology:
o Low-cost cable: In bus topology, nodes are directly connected to the cable without
passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
o Limited failure: A failure in one node will not have any effect on other nodes.
2) Ring Topology
o Ring topology is like a bus topology, but with connected ends.
o The node that receives the message from the previous computer will retransmit to the next
node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from one
node to another node.
o Token: It is a frame that circulates around the network.
3) Star Topology
o Star topology is an arrangement of the network in which every node is connected to the
central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are interconnected
with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central point
of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication failures
are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
o Full Mesh Topology: In a full mesh topology, each computer is connected to all the
computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are
connected to those computers with which they communicate frequently.
Reliable: The mesh topology networks are very reliable as if any link breakdown will not
affect the communication between connected computers.
Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
Transmission Media:
• HighSpeed
• Secure
• Used for comparatively shorter distances
⇢ Least expensive
⇢ Easy to install
⇢ High-speed capacity
Disadvantages:
Applications:
Advantages:
⇢ Eliminates crosstalk
⇢ Comparatively faster
Disadvantages:
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
⇢ Bulky
Applications:
The shielded twisted pair type of cable is most frequently used in extremely
cold climates, where the additional layer of outer covering makes it perfect for
withstanding such temperatures or for shielding the interior components.
Advantages:
• High Bandwidth
• Better noise Immunity
• Easy to install and expand
• Inexpensive
Disadvantages:
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for cable
television signal distribution, digital audio (S/PDIF), computer network
connections (like Ethernet), and feedlines that connect radio transmitters and
receivers to their antennas.
Advantages:
Disadvantages:
• Difficult
to install and maintain
• High cost
• Fragile
Applications:
(iv) Stripline
(v) Microstripline
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No
physical medium is required for the transmission of electromagnetic signals.
Features:
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need
to be properly aligned with each other. The distance covered by the signal is
directly proportional to the height of the antenna. Frequency Range:1GHz –
300GHz. These are majorly used for mobile phone communication and
television distribution.
Microwave Transmission
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems.
Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless
mouse, keyboard, printer, etc.
Multiplexing is the sharing of a medium or bandwidth. It is the
process in which multiple signals coming from multiple sources
are combined and transmitted over a single
communication/physical line.
Types of Multiplexing :-
1. Frequency Division Multiplexing (FDM)
2. Time-Division Multiplexing (TDM)
3. Wavelength Division Multiplexing (WDM)
Synchronous TDM :
Synchronous TDM is not efficient because if the input frame has no data to
send, a slot remains empty in the output frame.
Statistical TDM is a type of Time Division Multiplexing where the output frame
collects data from the input frame till it is full, not leaving an empty slot like in
Synchronous TDM.
Switching :
In large networks, there can be multiple paths from sender to receiver. The
switching technique will decide the best route for data transmission.
1. Circuit Switching
2. Packet Switching
3. Message Switching
Circuit Switching
o Circuit switching is a switching technique that establishes a dedicated path
between sender and receiver.
o In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
o A complete end-to-end path must exist before the communication takes place.
o In case of circuit switching technique, when any user wants to send the data,
voice, video, a request signal is sent to the receiver then the receiver sends
back the acknowledgment to ensure the availability of the dedicated path. After
receiving the acknowledgment, dedicated path transfers the data.
o Circuit establishment
o Data transfer
o Circuit Disconnect
o The Crossbar switch is made by using the semiconductor. For example, Xilinx
crossbar switch using FPGAs.
o Space Division Switching has high speed, high capacity, and nonblocking
switches.
o Once the dedicated path is established, the only delay occurs in the speed of
data transmission.
o The message splits into smaller pieces known as packets and packets are given
a unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend
the message.
o Call request and call accept packets are used to establish the connection
between sender and receiver.
o In this case, the path is fixed for the duration of a logical connection.
o Reliable: If any node is busy, then the packets can be rerouted. This ensures
established path prior to the transmission, and many users can use the same
communication channel simultaneously, hence makes use of available
bandwidth very efficiently.
o The protocols used in a packet switching technique are very complex and
requires high implementation cost.
o Data channels are shared among the communicating devices that improve the efficiency
of using available bandwidth.
o Traffic congestion can be reduced because the message is temporarily stored in the nodes.
o Message priority can be used to manage the network.
o The size of the message which is sent over the network can be varied. Therefore, it supports
the data of unlimited size.
o The message switches must be equipped with sufficient storage to enable them to store
the messages until the message is forwarded.
o The Long delay can occur due to the storing and forwarding facility provided by the
message switching technique.