ACMP 271 Data Communication and Networks E-Contents
ACMP 271 Data Communication and Networks E-Contents
THE E-CAMPUS
E-LEARNING COURSE
Peter Kemei
[email protected] or [email protected]
+254727725372
2021
______________________________________________________
COURSE PRELIMINARIES
This course was developed in April 2020 by Mr. Peter Kemei, Phone:
+254727725372; Email: [email protected] Peter Kemei is a Lecturer of
Computer Science in the Department of Computer Science at Egerton
University.
This session, the instructor for this course is Mr. Peter Kemei. My office is
located in the Department Computer Science, Faculty of Science. You may
consult me during the normal working hours between Monday and Friday or
contact me through:Phone: +254727725372; Email: [email protected]
Office: Egerton University, Njoro, E-Campus located off the road leading to
CMRT opposite the new graduation square.
For technical support e.g. lost passwords, broken links etc. please contact tech-
support via e-mail [email protected]. You can also reach learner support
through [email protected].
Assignments/Activities
Topic Time
Interfacing Routing
Flow control
Communicating devices
• Advice must interface with the transmission system
• Once an interface is established, signal generation is required for
communication
Glossary
Data communication refers to the exchange of data between a source and a
receiver.
Review
i) Briefly describe with the help of schematic diagram a digital data
communication main elements and components.
ii) You want your laptop and cell phone to exchange information. What
networking technology might be a requirement as a feature of both your
laptop and phone to accomplish this?
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 20 OF 216
iii) What is the principal application that has driven the design of circuit-switching
networks?
iv) Use a diagram to review main component of internet configuration
Topic Time
Learning Outcomes
By the end of this topic you should be able to:
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 22 OF 216
vi. State the importance Data Communication and Networks
vii. Define “Data Communication and Networks
viii. Explain Data Communication model
ix. Outline types of networks
x. Explain internet elements and configuration.
xi. Discuss packet structure
xii. Explain network addressing
Topic Content
2.1 Introduction
Need for Protocol Architecture
When computers, terminals, and/or other data processing devices exchange
data, the procedures involved can be quite complex. eg. file transfer. There
must be a data path between the two computers. But also need:
Source to activate communications Path or inform network of destination.
Source must check destination is prepared to receive.
File transfer application on source must check destination file management
system will accept and store file for his user. May need file format
translation. Instead of implementing the complex logic for this as a single
module, the task is broken up into subtasks, implemented separately. In a
protocol architecture, the modules are arranged in a vertical stack, each
layer in the stack performs a related subset of the functions. It relies on the
next lower layer to perform more primitive functions. It provides services to
the next higher layer. The peer layers communicate using a set of rules or
conventions known as a protocol.
A TCP packet consists of two sections, header and data. All fields may not be
used in every transmission. A flag field is used to indicate the type of
transmission the packet represents and
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 29 OF 216
how the packet should be interpreted
• Source port—identifies the sending application.
• Destination port- Identifies the destination application.
• Sequence number—Used for assembling segmented data in the proper
order at the receiving end
• Acknowledgement number—The sequence number the sender (the
receiving end) expects next
• Data offset or header length —The size of the TCP header, it is also the
offset from the start of the TCP packet to the data portion.
• Reserved—Reserved for future use, should be set to zero.
• Flags(also known as control bits)—contains 6 1-bit flags
• URG-Urgent pointer field is significant
• ACK-Acknowledgement field is significant.
• PSH-Push function.
• RST-Reset the connection.
• SYN-Synchronize sequence numbers
• FIN-No more data from sender.
Window—The number of bytes the sender is willing to receive starting from the
acknowledgement field value.
Checksum—used for error-checking of the header and data
Urgent pointer—if the URG flag is set, then this 16-bit field is an offset from
the sequence number indicating the last urgent data byte
Options—Additional header fields (called options) may follow the urgent pointer
Primitive Types
2.6 Addressing
Subnet mask
The subnet mask is used by the TCP/IP protocol to determine whether a host is
on the local subnet or on a remote network.
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 40 OF 216
In TCP/IP, the parts of the IP address that are used as the network and host
addresses are not.
The subnet mask follows two rules:
If a binary bit is set to a 1 (or on) in a subnet mask, the corresponding bit in
the address identifies the network.
If a binary bit is set to a 0 (or off) in a subnet mask, the corresponding bit in
the address identifies the host.
Example 1
IP Address: 10011110.01010000.10100100.00000011
Subnet Mask: 11111111.11111111.00000000.00000000
Hosts on the same logical network will have identical network addresses but
not same host addresses since the will be IP conflict and can communicate
freely. For example, the following two hosts are on the same network:
Host A: 158.80.164.100 255.255.0.0
Host B: 158.80.164.101 255.255.0.0
Both share the same network address (158.80), which is determined by the
255.255.0.0 subnet mask.
Example2
Hosts that are on different networks cannot communicate without an
intermediating device. For example:
Host A: 158.80.164.100 255.255.0.0
Host B: 158.85.164.101 255.255.0.0
The subnet mask has remained the same, but the network addresses are now
different (158.80 and 158.85 respectively). Thus, the two hosts are not on the
same network, and cannot communicate without a router between them.
Routing is the process of forwarding packets from one network to
another.
2.7 Network classes
These IP addresses are divided into classes. The most common of these are
classes A, B, and C. Classes D and E exist. Each of the address classes has a
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 41 OF 216
different default subnet masks. You can identify the class of an IP address by
looking at its first octet.
Class A networks
Class A networks use a default subnet mask of 255.0.0.0 and have 0-127 as
their first octet. The address 10.52.36.11 is a class A address. Its first octet is
10, which is between 1 and 126, inclusive.
Class B networks
Class B networks use a default subnet mask of 255.255.0.0 and have 128-191
as their first octet. The address 172.16.52.63 is a class B address. Its first octet
is 172, which is between 128 and 191, inclusive.
Class C networks
Class C networks use a default subnet mask of 255.255.255.0 and have 192-
223 as their first octet. The address 192.168.123.132 is a class C address. Its
first octet is 192, which is between 192 and 223, inclusive.
Default gateways
If a TCP/IP computer needs to communicate with a host on another network, it
will usually communicate through a device called a router.
In TCP/IP terms, a router that is specified on a host, which links the host's
subnet to other networks, is called a default gateway.
When a host attempts to communicate with another device using TCP/IP, it
performs a comparison process using the defined subnet mask and the
destination IP address versus the subnet mask and its own IP address.
The result of this comparison tells the computer whether the destination is a
local host or a remote host.
If the result of this process determines the destination to be a local host, then
the computer will simply send the packet on the local subnet. If the result of
the comparison determines the destination to be a remote host, then the
computer will forward the packet to the default gateway defined in its TCP/IP
properties. It is then the responsibility of the router to forward the packet to the
correct subnet.
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 42 OF 216
2.8 CIDR (Classless Inter-Domain Routing)
Classless Inter-Domain Routing (CIDR) is a simplified method of
representing a subnet mask. CIDR identifies the number of binary bits set to a
1 (or on) in a subnet mask, preceded by a slash.
Example 1
For example, a subnet mask of 255.255.255.240 would be represented as
follows in binary:
11111111.11111111.11111111.11110000
The first 28 bits of the above subnet mask are set to 1. The CIDR
notation for this subnet mask would thus be /28.
Address Classes vs. Subnet Mask
Remember the following three rules:
The first octet on an address dictates the class of that address.
The subnet mask determines what part of an address identifies the
network, and what part identifies the host.
Each class has a default subnet mask. A network using its default
subnet mask is referred to as a classful network.
Example 2
10.1.1.1 is a Class A address and its default subnet mask is255.0.0.0 (/8 in
CIDR).
Default subnet mask is 10.1.1.1.0
Example 3
The CIDR mask is often appended to the IP address. An IP address of
192.168.1.1 and a subnet mask of 255.255.255.0 would be represented
as follows using CIDR notation:
192.168.1.1 /24
2.8.1 Subnet and Broadcast Addresses
On each IP network, two host addresses are reserved for special use:
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 43 OF 216
The subnet (or network) address
The broadcast address
Neither of these addresses can be assigned to an actual host.
The subnet address is used to identify the network itself.
A routing table contains a list of known networks, and each network is
identified by its subnet address.
Subnet addresses contain all 0 bits in the host portion of the address.
Subnet address example
192.168.1.0/24 is a subnet address. This can be determined by looking at
the address and subnet mask in binary:
IP Address: 11000000.10101000.00000001.00000000
Subnet Mask: 11111111.11111111.11111111.00000000
Note that all host bits in the address are set to 0.
The broadcast address example
The broadcast address identifies all hosts on a particular network. A packet
sent to the broadcast address will be received and processed by every host on
that network. Broadcast addresses contain all 1 bits in the host portion of
the address
192.168.1.255/24 is a broadcast address. Note that all host bits are set
to 1:
IP Address: 11000000.10101000.00000001.11111111
Subnet Mask: 11111111.11111111.11111111.00000000
Types of IP broadcast packets
Unicasts are packets sent from one host to one other host
Multicasts are packets sent from one host to a group of hosts
Broadcasts are packets sent from one host to all other hosts on the
local network
2.8.2 Subnetting
Introduction
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 49 OF 216
Welcome to topic one. This topic is aimed at introducing main concepts of analog
& digital signals components, medium, communication links, analog and digital
signal, signal main components, wavelength, frequency domain and bandwidth,
analog and digital data transmission, transmission impairments, channel
capacity, data transmission modes,channel concepts, modulation and
demodulation and broadband transmission.
The topic is, therefore, designed to prepare you to have a clear understanding
of character encoding techniques and factors that affect performance of the
network.
Topic Time
Compulsory online reading, activities, self-assessments and practice
exercises [3 hours]
Optional further reading [1.5 hours]
Total student input [4.5 hours]
Attenuation
Signal strength falls off with distance. Attenuation depends on medium. For
guided media: it is exponential and expressed as a constant number of decibels
per unit distance. For unguided media: it is a complex function of distance and
makeup of the atmosphere. The received signal strength must be: Enough to
be detected by the electronic circuitry in the receiver. Sufficiently higher than
noise to be received without error. It is important to know that attenuation is
an increasing function of frequency.
Delay Distortion
Occurs because the velocity of propagation of a signal through a guided medium
varies with frequency. The velocity tends to be highest near the center
frequency and fall off toward the two edges of the band. Critical for digital data,
consider that a sequence of bits is being transmitted. Some of the signal
components of one bit position will spill over into other bit positions, causing
intersymbol interference. This is a major limitation to maximum bit rate over a
transmission channel.
Noise
Additional unwanted signals inserted somewhere between transmitter and
receiver. It is the major limiting factor in communication system performance.
Noise may be divided into four categories:
i) Thermal noise:
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 56 OF 216
Is due to thermal agitation of electrons.
Uniformly distributed across the bandwidth and called white noise.
Cannot be eliminated and therefore places an upper bound on
communications system performance
ii) Intermodulation noise
Signals that are the sum and difference of original frequencies
sharing a medium
iii) Crosstalk
A signal from one line is picked up by another
e.g. while using telephone, hear another conversation.
iv) Impulse noise
Irregular pulses or spikes
e.g. External electromagnetic interference (lightning)
Short duration and relatively high amplitude
3.5 Channel capacity
Define the channel capacity is the data rate which can be transmitted over a
given channel reliably.
Shannon Equation:
Use R = H log2(1+S/N)
(S/N)dB = 10log Power-in/Power-out
Example
Given that a copper twisted pair cable link is able to attain a maximum data
rate of 56kbps at a bandwidth of 3000Hz estimate the S/N ratio for the cable
in dB,
R = H log2(1+S/N)
Where R =Maximum data rate, S = signal power, N= noise power, H=
bandwidth
R/H =Log2 (1+S/N)
1+ S/N = 2R/H
S/N = 2R/H -1
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 57 OF 216
(S/N)dB = 10log10(2R/H -1) multiply the result by 2 since it is two way
communication
(S/N)dB = 112.4dB
Parallel Transmission
In Parallel Transmission, data consisting of 1s and 0s, may be organized into
groups of n bits each. Computers produce and consume data in groups of bits.
By grouping, we can send data n bits at a time instead of 1bit. This is called
parallel transmission. In parallel transmission we use n wires to send n bits at
one time. That way each bit has its own wire, and all n bits of one group can be
transmitted with each clock tick from one device to another. The following figure
shows how parallel transmission works for n =8. Typically, the eight wires are
bundled in a cable with a connector at each end.
The sender puts its data onto the line as one long string. If the sender wishes
to send data in separate bursts, the gaps between bursts must be filled with a
0 2 4 6 8 10 12 14
Fig: baseband signal starting from 0Hz
3.7.2 Broadband Transmission (Using Modulation)
Broadband transmission or modulation means changing the digital signal to an
analog signal for transmission. Modulation allows us to use a band pass channel-
a channel with a bandwidth that does not start from zero. This type of channel
is more available than a low-pass channel. The following figure shows a band
pass channel.
Figure show Delta Modulation where the staircase function is overlaid on the
original analog waveform. A 1 is generated if the staircase function is to go up
during the next interval; a 0 is generated otherwise. The transition (up or down)
that occurs at each sampling interval is chosen so that the staircase function
tracks the original analog waveform as closely as possible. There are two
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 72 OF 216
important parameters in a DM scheme: the size of the step assigned to each
binary digit, δ, and the sampling rate.
4. Analog data to analog signals
Analog data can be modulated by a carrier frequency to produce an analog
signal in a different frequency band, which can be utilized on an analog
transmission system. The basic techniques are
1) Amplitude modulation (AM): Amplitude modulation (AM) is the
simplest form of modulation, and involves the multiplication of the input
signal by the carrier fc.
Modifies the amplitude of the carrier to represent 1s or 0s
i) A 1 is represented by the presence of the carrier for a predefined
period of 3 cycles of carrier.
ii) Absence or no carrier indicates a 0
• Pros
– Simple to design and implement
• Cons
– Noise spikes on transmission medium interfere with the carrier
signal.
– Loss of connection is read as 0s.
v) Transmission time
In data communications we don't send just 1 bit, we send a message. The first
bit may take a time equal to the propagation time to reach its destination; the
last bit also may take the same amount of time. However, there is a time
between the first bit leaving the sender and the last bit arriving at the receiver.
The first bit leaves earlier and arrives earlier; the last bit leaves later and arrives
later. The time required for transmission of a message depends on the size of
the message and the bandwidth of the channel. Transmission time =Message
size / Bandwidth
vi) Queuing Time
The third component in latency is the queuing time, the time needed for each
intermediate or end device to hold the message before it can be processed. The
queuing time is not a fixed factor; it changes with the load imposed on the
network. When there is heavy traffic on the network, the queuing time
increases. An intermediate device, such as a router, queues the arrived
messages and processes them one by one. If there are many messages, each
message will have to wait.
vii) Jitter :
Another performance issue that is related to delay is jitter. Jitter is a problem
if different packets of data encounter different delays and the application using
the data at the receiver site is time- sensitive (audio and video data, for
example). If the delay for the first packet is 20 ms, for the second is 45 ms,
and for the third is 40 ms, then the real-time application that uses the packets
endures jitter.
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 77 OF 216
In summary, you learned that;
i) Main concepts of analog & digital signals components,
ii) Types of communication links,
iii) Analog signal, digital signal and signal main components
iv) Analog and digital data transmission,
v) Transmission impairments,
vi) Channel capacity
vii) Data transmission modes, and channel concepts,
viii)Modulation and demodulation concepts
ix) Character encoding techniques
x) Factors that determine performance of the network.
Glossary
An analog signal is a continuously varying electromagnetic wave that may be
propagated over a variety of media:
A digital signal is a sequence of voltage pulses that can be transmitted over a
wire medium:
Modulation is defined as the process of combining an input signal m(t) and a
carrier at frequency fc to produce a signal s(t) whose bandwidth is (usually)
centered on fc. Reversing the process is demodulation.
Further Reading
Data & Computer networks, Prakash Gupta
William Stallings, Data & Computer networks 10th edition
Any other data communication and networking relevant books, journals, articles
e.t.c
TOPIC ACTIVITIES
Activity
In your own place of residence identify communication systems which used full
duplex communication modes. At the same time which should communication
systems like early TV set were connected through a decoder.
Tips
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 78 OF 216
Use internet search to review the roles of encoder as well as decoder.
Review
i) Given a channel with an intended capacity of 20 Mbps, the bandwidth of
the channel is 3 MHz. Assuming white thermal noise, what signal-to-noise
ratio is required to achieve this capacity?
ii) Consider a stream of data consisting of a long sequence digital data
equivalent to fifty six decimal value encoded to digital signal. Draw the
waveform using the following techniques:-
a. Manchester
b. Differential Manchester
iii) In synchronous time division multiplexing, it is possible to interleave bits,
one bit from each channel participating in a cycle. If the channel is using
a self-clocking code to assist synchronization, might this bit interleaving
introduce problems because there is no continuous stream of bits from
one source?
iv) Latency or delay defines how long it takes for an entire message to
completely arrive at the destination from the time the first bit is sent out
from the source. Explain the four main components of latency.
v) What does the sampling theorem states concerning the rate of sampling
required for an analog signal? Discuss two techniques used to encode
analog data to digital signal briefly.
Introduction
Welcome to topic one. This topic is aimed at introducing main concepts of Digital
Service Unit(DSU), Channel Service Unit (CSU),Ethernet Wiring,Patch
Panels,Network interfaces Cards(NIC),Hubs/ concentrators or Repeaters,
Switches, Routers, Servers, Gateways, Modem and Firewall
The topic is, therefore designed to prepare you to have a clear understanding
of types of transmission media, Network Address Translation (NAT) as well.
Topic Time
Compulsory online reading, activities, self-assessments and practice
exercises [3 hours]
Optional further reading [1.5 hours]
Total student input [4.5 hours]
Guided media, which are those that provide a channel from one device to
another, include twisted-pair cable, coaxial cable, and fiber-optic cable. A signal
traveling along any of these media is directed and contained by the physical
limits of the medium. Twisted-pair and coaxial cable use metallic (copper)
conductors that accept and transport signals in the form of electric current.
Optical fiber is a cable that accepts and transports signals in the form of light.
Twisted-Pair Cable
A twisted pair consists of two conductors (normally copper), each with its
own plastic insulation, twisted together, as shown in the following figure.
One of the wires is used to carry signals to the receiver, and the other is used
only as a ground reference. The receiver uses the difference between the two.
In addition to the signal sent by the sender on one of the wires, interference
(noise) and crosstalk may affect both wires and create unwanted signals.
If the two wires are parallel, the effect of these unwanted signals is not the
same in both wires because they are at different locations relative to the noise
or crosstalk sources (e,g., one is closer and the other is farther). This results
in a difference at the receiver. By twisting the pairs, a balance is maintained.
For example, suppose in one twist, one wire is closer to the noise source and
the other is farther; in the next twist, the reverse is true. Twisting makes it
probable that both wires are equally affected by external influences (noise or
crosstalk).
Applications
Twisted-pair cables are used in telephone lines to provide voice and data
channels and Local- area networks, such as lOBase-T and lOOBase-T, also use
twisted-pair cables.
Coaxial Cable:
Coaxial cable (or coax) carries signals of higher frequency ranges than those
in twisted pair cable. Coax has a central core conductor of solid or stranded
wire (usually copper) enclosed in an insulating sheath, which is, in turn,
encased in an outer conductor of metal foil, braid, or a combination of the
two. The outer metallic wrapping serves both as a shield against noise and as
the second conductor, which completes the circuit. This outer conductor is
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 96 OF 216
also enclosed in an insulating sheath, and the whole cable is protected by a
plastic cover which is shown as follows.
Coaxial cables are categorized by their Radio Government (RG) ratings. Each
RG number denotes a unique set of physical specifications, including the wire
gauge of the inner conductor, the thickness and type of the inner insulator, the
construction of the shield, and the size and type of the outer casing. Different
categories are like RG-59, RG-58 and RG-11.
Performance:
The attenuation is much higher in coaxial cables than in twisted-pair cable. In
other words, although coaxial cable has a much higher bandwidth, the signal
weakens rapidly and requires the frequent use of repeaters.
Applications:
The different applications of Coaxial cable are as follows.
As the figure shows, if the angle of incidence I (the angle the ray makes with
the line perpendicular to the interface between the two substances) is less than
the critical angle, the ray refracts and moves closer to the surface. If the angle
of incidence is equal to the critical angle, the light bends along the interface. If
the angle is greater than the critical angle, the ray reflects (makes a turn) and
travels again in the denser substance. Note that the critical angle is a property
of the substance, and its value differs from one substance to another.
Optical fibers use reflection to guide light through a channel. A glass or plastic
core is surrounded by a cladding of less dense glass or plastic. The difference
in density of the two materials must be such that a beam of light moving
through the core is reflected off the cladding instead of being refracted into it
as shown in the following figure.
Applications
Fiber-optic cable is often found in backbone networks because its wide
bandwidth is cost-effective.
Some cable TV companies use a combination of optical fiber and coaxial
cable, thus creating a hybrid network. Optical fiber provides the
backbone structure while coaxial cable provides the connection to the
user premises. This is a cost-effective configuration since the narrow
bandwidth requirement at the user end does not justify the use of optical
fiber.
Local-area networks such as 100Base-FX network (Fast Ethernet) and
1000Base-X also use fiber-optic cable.
Radio Waves:
Radio waves, for the most part, are omnidirectional. The electromagnetic
waves ranging in frequencies between 3 kHz and 1 GHz are normally called
radio waves. Radio waves, for the most part, are omnidirectional. When an
antenna transmits radio waves, they are propagated in all directions. This
means that the sending and receiving antennas do not have to be aligned. A
sending antenna sends waves that can be received by any receiving antenna.
The omnidirectional property has a disadvantage, too.
The radio waves transmitted by one antenna are susceptible to interference
by another antenna that may send signals using the same frequency or band.
Radio waves, particularly those waves that propagate in the sky mode, can
travel long distances. This makes radio waves a good candidate for long-
distance broadcasting such as AM radio.
Radio waves, particularly those of low and medium frequencies, can penetrate
walls. This characteristic can be both an advantage and a disadvantage. It is
an advantage because, for example, an AM radio can receive signals inside a
building. It is a disadvantage because we cannot isolate a communication to
just inside or outside a building.
Omnidirectional Antenna
Radio waves use omnidirectional antennas that send out signals in all
directions. Based on the wavelength, strength, and the purpose of
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 105 OF 216
transmission, we can have several types of antennas. The following figure
shows an omnidirectional antenna.
Applications
The omnidirectional characteristics of radio waves make them useful for
multicasting, in which there is one sender but many receivers. AM and FM radio,
television, maritime radio, cordless phones, and paging are examples of
multicasting.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves. Microwaves are unidirectional. When an antenna transmits
microwave waves, they can be narrowly focused. This means that the sending
and receiving antennas need to be aligned. The unidirectional property has an
obvious advantage. A pair of antennas can be aligned without interfering with
another pair of aligned antennas. The following describes some characteristics
of microwave propagation:
Microwave propagation is line-of-sight. Since the towers with the
mounted antennas need to be in direct sight of each other, towers that
are far apart need to be very tall. The curvature of the earth as well as
other blocking obstacles does not allow two short towers to
communicate by using microwaves. Repeaters are often needed for long
distance communication.
Very high-frequency microwaves cannot penetrate walls. This
characteristic can be a disadvantage if receivers are inside buildings.
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 106 OF 216
The microwave band is relatively wide, almost 299 GHz. Therefore wider
sub bands can be assigned, and a high data rate is possible
Use of certain portions of the band requires permission from authorities.
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction.
Two types of antennas are used for microwave communications: the parabolic
dish and the horn which are shown in the following figure.
Glossary
Network Terminal (NT) devices is device which ends a telecommunications
link and is the point at which a signal enters or leaves a network.
Data Terminal Equipment (DTE) (DTE) is an end instrument that converts
user information into signals or reconverts received signals.
A channel service unit (CSU) is a line Bridging device for use with T-carrier.
Data Terminal Equipment (DTE) is an end instrument that converts user
information into signals or reconverts received signals
Hubs/ concentrators or Repeaters is small box that gathers the signals from
each individual device, optionally amplifies each signal, and then sends the
signal out to all other connected devices.
Switch is a device that gathers the signals from devices that are connected to
it, and then regenerates a new copy of each signal.
Routers are devices whose primary purpose is to connect two or more networks
and to filter network signals so that only desired information travels between
them.
A server is a system (software and suitable computer hardware) that responds
to requests across a computer network to provide, or help to provide, a network
service.
A gateway device provides communication to a remote network or an
autonomous system that is out of bounds for the host network nodes.
Modem (Modulator and Demodulator) is device that translate digital signals
from a computer into analog signals that can travel across conventional phone
lines.
Welcome to topic one. This topic is aimed at introducing main concepts of Open
Systems Interconnection (OSI) reference model, roles of OSI and functions of
each OSI layer.
The topic is, therefore designed to prepare you to have a clear understanding
of responsibilities of each OSI layer as well.
Topic Time
Compulsory online reading, activities, self-assessments and practice
exercises [3 hours]
Optional further reading [1.5 hours]
Total student input [4.5 hours]
Topic Contents
5.1 Introduction
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 113 OF 216
The Open Systems Interconnection model (OSI) is a conceptual model that
characterizes and standardizes the internal functions of a communication
system by partitioning it into abstraction layers. The model groups
communication functions into seven logical layers. A layer serves the layer
above it and is served by the layer below it.
5.1.1 Encapsulation and Decapsulation
At each level (N), two entities (layer N peers) exchange protocol data units
(PDUs) by means of a layer-N protocol. A service data unit (SDU) is the payload
of a PDU, transmitted unchanged to a peer. The SDU is a unit of data that has
been passed down from an OSI layer to the next-lower layer, and which the
lower layer encapsulates into a PDU. Layer N-1 adds a header or footer, or both,
to the SDU, composing a PDU of layer N-1. The added framing makes it possible
to get the data from a source to a destination. The PDU at a layer N becomes
the SDU of layer N-1 process is refers as decapsulation
2.3 OSI Layers
Where many application services available, the figure shows only three: XAOO
(message-handling services), X.500 (directory services), and file transfer,
access, and management (FTAM). The user in this example employs XAOO to
send an e-mail message. Specific services provided by the application layer
include the following:
i) Network virtual terminal: A network virtual terminal is a software
version of a physical terminal, and it allows a user to log on to a remote
host. To do so, the application creates a software emulation of a terminal
at the remote host. The user's computer talks to the software terminal
which, in turn, talks to the host, and vice versa. The remote host believes
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 123 OF 216
it is communicating with one of its own terminals and allows the user to
log on.
ii) File transfer, access and management: This application allows a user
to access files in a remote host (to make changes or read data), to retrieve
files from a remote computer for use in the local computer, and to manage
or control files in a remote computer locally.
iii) Mail services: This application provides the basis for e-mail forwarding
and storage. Directory services. This application provides distributed
database sources and access for global information about various objects
and services.
In summary, you learned the;
i) Concepts of Open Systems Interconnection (OSI) Reference Model
ii) Roles of OSI
iii) Functions of each OSI layer
iv) Responsibilities of each OSI layer
Glossary
OSI is a conceptual model that characterizes and standardizes the internal
functions of a communication system by partitioning it into abstraction layers.
The physical layer coordinates the functions required to carry a bit stream
over a physical medium.
The data link layer is responsible for moving frames from one hop (node) to
the next.
The network layer is responsible for the delivery of individual packets from
the source host to the destination host possibly across multiple networks (links).
The transport layer is responsible for process-to-process delivery of the
entire message.
The session layer is the network dialog controller. It establishes, maintains,
and synchronizes the interaction among communicating systems.
The presentation layer is concerned with the syntax and semantics of the
information exchanged between two systems.
Topic Contents
Name Space
The names assigned to machines must be selected from a name space with
complete control over the binding between the names and IP addresses.
Flat Narne Space
A name in this space is a sequence of characters without structure.
Hierarchical Narne Space
Each name is made of several parts. The first part can define the nature of the
organization. The second part can define the name of an organization .The third
part can define departments in the organization and so on
Simple Network Management Protocol (SNMP).
Topic Content
7.1 Introduction
Multiplexing is the set of techniques that allows the simultaneous transmission
of multiple signals across a single data link. Whenever the bandwidth of a
medium linking two devices is greater than the bandwidth needs of the devices,
the link can be shared.
In a multiplexed system, n lines share the bandwidth of one link. The following
figure shows the basic format of a multiplexed system. The lines on the left
direct their transmission streams to a multiplexer (MUX), which combines them
into a single stream (many-toone). At the receiving end, that stream is fed into
a demultiplexer (DEMUX), which separates the stream back into its component
transmissions (one-to-many) and directs them to their corresponding lines.
The first output frame has three slots filled, the second frame has two slots
filled, and the third frame has three slots filled. No frame is full.
7.4.1 Data Rate Management
One problem with TDM is how to handle a disparity in the input data rates. If
data rates are not the same, three strategies, or a combination of them, can be
used. The three different strategies are multilevel multiplexing, multiple-
slot allocation, and pulse stuffing.
i) Multilevel Multiplexing: Multilevel multiplexing is a technique used
when the data rate of an input line is a multiple of others. For example,
in the following figure, we have two inputs of 20 kbps and three inputs of
40 kbps. The first two input lines can be multiplexed together to provide
a data rate equal to the last three. A second level of multiplexing can
create an output of 160 kbps.
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 147 OF 216
ii) Multiple-Slot Allocation: Sometimes it is more efficient to allot more
than one slot in a frame to a single input line. For example, we might have
an input line that has a data rate that is a multiple of another input. In
the following figure, the input line with a SO-kbps data rate can be given
two slots in the output. We insert a serial-to-parallel converter in the line
to make two inputs out of one.
iii) Pulse Stuffing: Sometimes the bit rates of sources are not multiple
integers of each other. Therefore, neither of the above two techniques can
be applied. One solution is to make the highest input data rate the
dominant data rate and then add dummy bits to the input lines with lower
rates. This will increase their rates. This technique is called pulse stuffing,
bit padding, or bit stuffing as shown in the following figure. The input with
a data rate of 46 is pulse-stuffed to increase the rate to 50 kbps. Now
multiplexing can take place.
Addressing
The above figure also shows a major difference between slots in synchronous
TDM and statistical TDM. An output slot in synchronous TDM is totally occupied
by data, in statistical TDM; a slot needs to carry data as well as the address of
the destination.
In synchronous TDM, there is no need for addressing. Synchronization and
reassigned relationships between the inputs and outputs serve as an address.
We know, for example, that input 1 always goes to input 1. If the multiplexer
and the demultiplexer are synchronized, this is guaranteed. In statistical
multiplexing, there is no fixed relationship between the inputs and outputs
because there are no pre-assigned or reserved slots. We need to include the
address of the receiver inside each slot to show where it is to be delivered.
The addressing in its simplest form can be n bits to define N different output
lines with n =log2 n. For example, for eight different output lines, we need a 3-
bit address.
Slot Size
Further Reading
Data & Computer networks, Prakash Gupta
William Stallings, Data & Computer networks 10th edition
Any other data communication and networking relevant books, journals, articles
e.t.c
TOPIC ACTIVITIES
Activity
Use the concepts of multiplexing you have learnt figure out which types of
multiplexing does mobile telecommucation implement in achieve it main
application such as calls, SMS, video streaming, e-mail, what-up, Facebook,
twitter e.t.c
Tips
Refer to these multiplexing terms and apply to figure out how to apply in the
topic activity:-
a) Frame synchronizing,
b) Addressing,
c) Interleaving and
d) Bandwidth
Review
a) Whenever the bandwidth of a medium linking two devices is greater than the
bandwidth needs of the devices, the link can be shared. One approach used
is multiplexing.
i) Describe one goal of multiplexing
ii) List three main multiplexing techniques
Introduction
Welcome to topic eight. This topic is aimed at introducing main concepts of
layering of networks as discuss in topic two and five, network technologies,
network design and network topologies
The topic is, therefore designed to prepare you to have a clear understanding
network control access method
Topic Time
Compulsory online reading, activities, self-assessments and practice
exercises [3 hours]
Optional further reading [1.5 hours]
Total student input [4.5 hours]
Topic Learning Requirements
Participation in one chat (at least 5 entries)
At least two elaborate contributions to the discussion topic. You may also
start your own discussion thread.
Timely submission of the assignments
Learning Outcomes
By the end of this topic you should be able to:
i) Explain the roles of layering a networks
ii) Discuss existing network technologies
iii) Describe Hierarchical LAN design and converged network
iv) Describe common network topologies
v) Discuss network control access methods
Advantages:
The different advantages of Mesh topology are as follows:
i) The dedicated links guarantees that each connection can carry its own
data load, thus eliminating the traffic problems that can occur when links
must be shared by multiple devices.
ii) A mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
iii) Another advantage of Mesh topology is advantage of privacy or security.
When every message travels along a dedicated line, only the intended
recipient sees it. Physical boundaries prevent other users from gaining
access to messages.
Demand-Priority Contention
As in CSMA/CD, two computers using the demand-priority access method can
cause contention by transmitting at exactly the same time. However, with
demand priority, it is possible to implement a scheme in which certain types of
data will be given priority if there is contention. If the hub or repeater receives
two requests at the same time, the highest priority request is serviced first. If
The three different attacks( passive intruder ailter messages and active intruder
insert messages need to protect against these forms of attacks for which
encryption helps by used of Cryptography
8.11 Secure Channels
Secure communication requires authentication of the communicating parties,
but also ensuring message integrity and possibly confidentiality as well. A secure
channel protects senders and receivers against interception, modification, and
fabrication of messages. It does not necessarily protect against
interruption.Protecting messages against interception is done by ensuring
confidentiality. Protecting messages against modification and fabrication is done
through protocols for mutual authentication and message integrity.
8.11.1 Authentication
Authentication and message integrity cannot do without each other.
The combination works as follows:-
Alice starts by sending a message to Bob to set up a channel.
Once the channel has been set up, Alice knows for sure that she is talking
to Bob, and Bob knows for sure that he is talking to Alice, they can
exchange messages.
Tweaking an existing protocol to improve its performance, can easily affect its
correctness
Controlling the access to an object is all about protecting the object against
invocations by subjects that are not allowed to have specific methods carried
out
Also, protection may include object management issues
8.13.2 Access Control Matrix
A common approach to modeling the access rights of subjects with respect to
objects, is to construct an access control matrix M[s,o]={m1,m2,…}
Access Control List: The matrix is distributed columnwise
Capabilities: The matrix is distributed row-wise
The two access control matrix are shown below (a) Access Control List (b)
Capabilities
(b) Capabilities
TOPIC ACTIVITIES
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 188 OF 216
Activity
Read and make briefly on
i) SONET network architecture, define, implementation, protocol use,
access control method, application
ii) HIPPI network architecture define, implementation, protocol use, access
control method, application.
TIPS
Refer to these network architecture terms and apply to figure out how to apply
in the topic activity:-
i) Network architecture
ii) Protocol
iii) Access control method
Review
i) The basic rate interface (BRI) is the service for homes and small
businesses, while the primary rate interface (PRI) is the service for larger
businesses. Compute the full capacity of the following service types.
i) BRI= 2B+D
ii) PRI=23B+D
ii) Fibre distributed data interface (FDDI) is used as backbone to connect
copper LANs to connect many link. Explain which network topology,
network access control and network device is used to share a common
link.
iii) An airline seat reservation system is being designed in a new airport. One
problem that existed in the old location is that some of fast computers on
the network could monopolize the bandwidth, causing agents with slower
computer to miss seating opportunities Recommend and explain network
topology could you use that creates a far environment in which all
computer have equal access to the available bandwidth?
iv) A secure channel protects senders and receivers against the types of
threats. Discuss types of security threats
v) Explain mechanisms use to build secure channels
vi) Discuss main protocols used in securing traffic
vii) Describe approaches used by the receiver to verify the sender traffic.
Introduction
Welcome to topic nine. This topic is aimed an overview packet and circuit
switching and packet switching techniques.
The topic is, therefore designed to prepare you to have a clear understanding
of circuit switching, packet switching, datagram and virtual circuit approaches.
Topic Time
Compulsory online reading, activities, self-assessments and practice
exercises [3 hours]
Optional further reading [1.5 hours]
Total student input [4.5 hours]
Topic Learning Requirements
Participation in one chat (at least 5 entries)
At least two elaborate contributions to the discussion topic. You may also
start your own discussion thread.
Timely submission of the assignments
Learning Outcomes
By the end of this topic you should be able to:
Switching nodes
i) Circuit switching
ii) Packet switching
9.4.1 Datagram
Each packet is treated independently, with no reference to packets that have
gone before. Each node chooses the next node on a packet’s path. Packets can
take any possible route and may arrive at the receiver out of order. Also packets
may go missing. It is up to the receiver to re-order packets and recover from
missing packets. Good example of this approach of switching is Internet.
Example of datagram illustrations of how 3 packets are sent over network
Call request
Signal CCall request
SSignal
AAcknownledge
-ment
S Signal
nn
AAcknownl
edge-
ment
S Signal
nn
i) Circuit switching
ii) Packet switching
iii) Switched communications networks
iv) Packet switching techniques
v) Datagram approach
vi) Virtual circuit approach
vii) Comparison between the network switching approaches
Further Reading
Data & Computer networks, Prakash Gupta
William Stallings, Data & Computer networks 10th edition
Any other data communication and networking relevant books, journals, articles
e.t.c
Glossary
Circuit switching: is a dedicated communication path between two stations
(end-to-end)
Circuit switching is a connected sequence of links between network nodes. On
each physical link, a logical channel is dedicated to the connection.
Packet switching is switching where data are transmitted in short packets,
routing (addressing) info, so as to be routed to the intended destination and On
each switching node, packets are received, stored briefly (buffered) and passed
on to the next node.
Datagram approach each packet is treated independently, with no reference
to packets that have gone before.
Virtual circuit is preplanned route is established before any packets are sent,
then all packets follow the same route.
Datagram End-to-end
TIPS
Review the three switching techniques
Review
i) Compare and contrast a circuit-switched network and a packet-switched
network.
ii) What is the principal application that has driven the design of circuit-
switching networks?
iii) Datagram and virtual-circuit are packet switching techniques. There need
a routing or switching table to find the output port from which the
information belonging to a destination should be sent out, but a circuit-
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 204 OF 216
switched network has no need for such a table. Give reasons as to why
there is this difference between the two switching techniques.
Two promising wireless technologies for LANs: IEEE 802.11 wireless LANs,
sometimes called wireless Ethernet, and Bluetooth, a technology for small
wireless LANs.
10.2 IEEE 802.11
IEEE has defined the specifications for a wireless LAN, called IEEE 802.11,
which covers the physical and data link layers.
Architecture
i) IEEE 802.11 is devoted to wireless LANs.
— Consists of MAC and physical layer protocols for wireless LANs
ii) The Wi-Fi Alliance (Wi-Fi: Wireless Fidelity)
— An industry consortium
— To certify interoperability for 802.11 products
iii) IEEE 802.11 Architecture
— The smallest building block is Basic Service Set (BSS)
• A number of stations executing the same MAC protocol
• Shared wireless medium
• BSS corresponds to a cell
— A BSS may be isolated, or may connect to a Backbone
Distribution System (DS) through an Access Point (AP)
• AP functions as a bridge and a relay point
ACMP271: DATA COMMUNICATION AND NETWORKS PAGE 207 OF 216
• AP could be a station which has the logic to provide DS
services
• AP corresponds to a Control Module (CM)
• DS can be a switch, wired network, or wireless network
— An Extended Service Set (ESS) consists of two or more BSSs
interconnected by a DS.
The standard defines two kinds of services: the basic service set
(BSS) and the extended Service set (ESS).
10.3 Basic Service Set
IEEE 802.11 defines the basic service set (BSS) as the building block of a
wireless LAN. A basic service set is made of stationary or mobile wireless
stations and an optional central base station, known as the access point (AP).
The BSS without an AP is a stand-alone network and cannot send data to other
BSSs. It is called an ad hoc architecture. In this architecture, stations can form
a network without the need of an AP; they can locate one another and agree
to be part of a BSS. A BSS with an AP is sometimes referred to as an
infrastructure network.
10.4 Extended Service Set
An extended service set (ESS) is made up of two or more BSSs with APs. In
this case, the BSSs are connected through a distribution system, which is
usually a wired LAN. The distribution system connects the APs in the BSSs.
IEEE 802.11 does not restrict the distribution system; it can be any IEEE LAN
such as an Ethernet. Note that the extended service set uses two types of
stations: mobile and stationary. The mobile stations are normal stations inside
a BSS. The stationary stations are AP stations that are part of a wired LAN.
Figure below shows an ESS.
END
THANKS