Unit 1 - Introduction
Unit 1 - Introduction
(19UCS08)
LECTURE NOTES
UNIT - 1
V SEMESTER
Introduction
Conference calling
Call waiting
Voice mail
Caller ID
• Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable.
2. Sender: The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
4.Medium: The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial
cable, fiber-optic cable, and radio waves.
5. Protocol: A protocol is a set of rules that govern data communications. It represents an
agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating, just as a person speaking French cannot be understood by a
person who speaks only Japanese.
Data flow (simplex, half-duplex, and full-duplex)
The communication is unidirectional. Only one device on a link can transmit and
the other can only receive. The simplex mode can use the entire capacity of the channel
to send data in one direction. Example: Keyboards, Monitors
2. Half-Duplex (one-lane with two-directional traffic)
Each station can both transmit and receive, but not at the same time. When one
device is sending, the other can only receive, and vice versa. The entire capacity of a
channel is taken over by the transmitting device. Example: Walkie-talkies
3. Full-Duplex (Duplex) (two-way street)
In full-duplex, both stations can transmit and receive simultaneously. One common
example of full-duplex communication is the telephone network. When two people are
communicating by a telephone line, both can talk and listen at the same time. The full-
duplex mode is used when communication in both directions is required all the time.
Example: Telephone network
COMPUTER NETWORKS
• Computer network consists of two or more computers that are linked in order to share
resources, exchange data files or to allow electronic communication.
• The computers on a network may be linked through cables, telephone lines,
radio waves, satellites or infrared light beams.
• There are two aspects of computer networks – hardware and software.
• Hardware includes physical connection between two machines by using adaptors, cables,
routers, bridges etc.
• Software includes a set of protocols. Protocols define a formal language among
various components. It makes hardware usable by applications.
1. Business Applications
A company may have a computer for each worker and use them to design products,
write brochures, and do the payroll. Resource sharing is to make all programs,
equipment, and especially data available to anyone on the network without regard to
the physical location of the user. Networks called VPNs (Virtual Private Networks)
may be used to join the individual networks at different sites into one extended
networks.
Client –Server Model: It is widely used and forms the basis of much network usage.
• Telephone calls between employees may be carried by the computer network instead of
by the phone company. This technology is called IP telephony or Voice over IP (VoIP)
The client-server model involves requests and replies
2. Home Applications
Many people pay their bills, manage bank accounts, and handle their investments
electronically. On-line newspaper which can be personalized. Access to information system like
World Wide Web, which contains information about arts, business, cooking, government, health,
history, science, sports, travel etc. All the above applications involve in interactions between a
person and remote database.
2.Person-to-person communication
3.Interactive entertainment
3. Mobile Users
Mobile computers, such as laptop and handheld computers, are one of the fastest-
growing segments of the computer industry.
Wireless hotspots based on the 802.11 standard are another kind of wireless network for
mobile computers.
Text messaging or texting is allows a mobile phone user type a short message that is
then delivered by the cellular network to another mobile subscriber.
Smart phones, such as the popular iPhone, combine aspects of mobile phones and
mobile computers.
NFC (Near Field Communication) technology the mobile can act as an RFID smartcard
and interact with a nearby reader for payment.
Sensor networks are made up of nodes that gather and wirelessly relay information they
sense about the state of the physical world
4. Social Issues
Network neutrality is the communications that are not differentiated by their content or
source or who is providing the content.
Profiling users is a collection of settings and information associated with a user. It can be
defined as the explicit digital representation of the identity of the user.
Network Hardware
Type of connection
Type of connection
1. Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-
to-point connections use an actual length of wire or cable to connect the two ends, but
other options, such as microwave or satellite links, are also possible. When we change
television channels by infrared remote control, we are establishing a point-to-point
connection between the remote control and the television's control system.
Multipoint (also called multi drop) connection is one in which more than two specific
devices share a single link. In a multipoint environment, the capacity of the channel is
shared, either spatially or temporally. If several devices can use the link simultaneously,
it is a spatially shared connection.
Physical Topology
The term physical topology refers to the way in which a network is laid out physically. Two or
more devices connect to a link; two or more links form a topology. The topology of a network is
the geometric representation of the relationship of all the links and linking devices (nodes) to one
another.
1. Mesh Topology
In a mesh topology, every device has a dedicated point-to-point link to every other device. The
term dedicated means that the link carries traffic only between the two devices it connects. To
link n devices fully connected mesh has: n ( n - 1) / 2 physical channels (Full-Duplex). Every
Device on the network must have n - 1 ports
Example Problem:
Mesh : Advantages
Each connection carry its own data load (no traffic problems)
A mesh topology is robust
Privacy or security
Fault identification and fault isolation.
Mesh: Disadvantages
2. Star Topology
In a star topology, each device has a dedicated point-to-point link only to a central controller,
usually called a hub. The devices are not directly linked to one another. Unlike a mesh topology,
a star topology does not allow direct traffic between devices. The controller acts as an exchange:
If one device wants to send data to another, it sends the data to the controller, which then relays
the data to the other connected device.
Star : Advantages
Star : Disadvantages
Dependency of the whole topology on one single point (hub)
More cabling than other topologies ( ring or bus)
Practical Example : It is used in LAN.
3. Bus Topology
A bus topology is multipoint. One long cable acts as a backbone to link all the devices in a
network. Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable. A tap is a connector that either splices into the
main cable or joined in cable to create a contact with the metallic core.
Bus : Advantages
Ease of installation
Less cables than mesh, star topologies
Bus : Disadvantages
4. Ring Topology
Each device has dedicated point-to-point connection with only the two devices on either side of
it. A signal is passed along the ring in one direction from device to device until it reaches its
destination. Each devices incorporates a Repeater
Ring : Advantages
Ring : Disadvantage
Unidirectional
One broken device can disable the entire network. This weakness can be solved by using a dual
ring or a switch capable of closing off the break
5. Hybrid Topology
It is an integration of two or more different topologies to form a new topology. Example: having
a main star topology with each branch connecting several stations in a bus topology.
Advantages
It can be utilize the strongest aspects of other networks, e.g., signal strength.
Disadvantages
Categories of Networks
Network Category depends on its size and it is divided into 5 categories. The primary categories
are :
5. Internetworks
A metropolitan area network (MAN) is a network with a size between a LAN and a WAN. It
normally covers the area inside a town or a city. It is designed for customers who need a high-
speed connectivity, normally to the Internet, and have endpoints spread over a city or part of city.
A good example of a MAN is the part of the telephone company network that can provide a
high-speed DSL line to the customer. Another example is the cable TV network.
A wide area network (WAN) provides long-distance transmission of data, image, audio, and
video information over large geographic areas that may comprise a country, a continent, or even
the whole world.
Two types OF WAN
Switched WAN
Backbone of the Internet
Dialup line point-to-point WAN
Leased line from a telephone company
5. Internetworks
1. Protocol hierarchies
2. Design issues for the layers
3. Connection-oriented versus connectionless service
4. Service primitives
5. Relationship of services to protocols
1. Protocol Hierarchies
To reduce the design complexity, most networks are organized as a series of layers or
levels. Each one built upon the one below it.
The number of layers, name of each layer, contents of each layer and the function of each
layer differ from network to network.
Layer n on one machine carries on a conversation with layer n on another machine.
The rules and conventions used in this conversation are collectively known as the layer n
protocol.
4. Service Primitives
The OSI model has seven layers. The principles that were applied to arrive at the seven
layers are
1. A layer should be created where a different level of abstraction is needed.
2. Each layer should perform a well defined function.
3. The function of each layer should be chosen with an eye toward defining internationally
standardized protocols.
4. The layers boundaries should be chosen to minimize the information flow across the
interfaces.
5. The number of layers large enough that distinct functions need not be thrown together in
the same layer out of necessity, and small enough that the architecture does not become
unwieldy.
1. Physical layer
It Converts bits into electronic signals for outgoing messages and Converts electronic signals
into bits for incoming messages. The physical layer is concerned with transmitting raw bits over
a communication channel. The design issues have to do with making sure that when one side
sends a 1 bit, it is received by the other side as a 1 bit, not as a 0 bit.
The functions of the physical layer are :
1. Bit synchronization: The physical layer provides the synchronization of the bits by providing
a clock. This clock controls both sender and receiver thus providing synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits
sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes are
arranged in a network i.e. bus, star or mesh topolgy.
4. Transmission mode: Physical layer also defines the way in which the data flows between the
two connected devices. The various transmission modes possible are: Simplex, half-duplex and
full-duplex.
The main task of the data link layer is to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer. It accomplishes this task by
having the sender break up the input data into data frames (typically a few hundred or a few
thousand bytes) and transmits the frames sequentially. At the receiving end, this layer
packages raw data from the physical layer into data frames for delivery to the Network layer. At
the sending end this layer handles conversion of data into raw formats that can be handled by the
Physical Layer. If the service is reliable, the receiver confirms correct receipt of each frame by
sending back an acknowledgement frame. The physical layer accepts and transmits stream of
bits, the data link layer should create and recognize frame boundaries. This can be accomplished
by attaching special bit patterns to the beginning and ending of frame. A duplicate frame
could be sent if the acknowledgement frame from receiver back to the sender were lost.
The functions of the data Link layer are :
1. Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by attaching
special bit patterns to the beginning and end of the frame.
2. Physical addressing: After creating frames, Data link layer adds physical addresses (MAC
address) of sender and/or receiver in the header of each frame.
3.Error control: Data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
4.Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus , flow control coordinates that amount of data that can be sent before receiving
acknowledgement.
5.Access control: When a single communication channel is shared by multiple devices, MAC
sub-layer of data link layer helps to determine which device has control over the channel at a
given time.
Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host
machines.
Switch & Bridge are Data Link Layer devices.
3.Network layer
The network layer controls the operation of the subnet.The network layer is responsible for the
delivery of individual packets from the source host to the destination host. The network layer
controls the operation of the subnet. A key design issue is determining how packets are routed
from source to destination. Routes can be based on static tables that are ''wired into'' the network
and rarely changed. They can also be determined at the start of each conversation. If too many
packets are present in the subnet at the same time, they will get in one another's way, forming
bottlenecks. The control of such congestion also belongs to the network layer. When a packet
has to travel from one network to another to get to its destination, many problems can arise. The
addressing used by the second network may be different from the first one. The second one may
not accept the packet at all because it is too large. The protocols may differ, and so on. It is up to
the network layer to overcome all these problems.
1. Routing: The network layer protocols determine which route is suitable from source to
destination. This function of network layer is known as routing.
2. Logical Addressing: In order to identify each device on internetwork uniquely, network layer
defines an addressing scheme. The sender & receiver’s IP address are placed in the header by
network layer. Such an address distinguishes each device uniquely and universally.
4. Transport layer
It Manages the transmission of data across a network. Manages the flow of data between parties
by segmenting long data streams into smaller data chunks (based on allowed “packet” size for a
given transmission medium). Reassembles chunks into their original sequence at the receiving
end. It Provides acknowledgements of successful transmissions and requests resends for packets
which arrive with errors. The basic function of the transport layer is to accept data from above,
split it up into smaller units if need be, pass these to the network layer, and ensure that the
pieces all arrive correctly at the other end. The transport layer is responsible for the delivery of a
message from one process to another. If transport connection requires a high throughput, the
transport layer might create multiple network connections. (if expensive multiple several
transport connections onto the same network connection). The transport layer also determines
what type of service to provide to the session layer, and, ultimately, to the users of the network.
The most popular type of transport connection is an error-free point-to-point channel that
delivers messages or bytes in the order in which they were sent. The type of service is
determined when the connection is established. The transport layer is a true end-to-end layer, all
the way from the source to the destination.
1. Segmentation and Reassembly: This layer accepts the message from the (session) layer,
breaks the message into smaller units. Each of the segment produced has a header associated
with it. The transport layer at the destination station reassembles the message.
2. Service Point Addressing: In order to deliver the message to correct process, transport layer
header includes a type of address called service point address or port address. Thus by specifying
this address, transport layer makes sure that the message is delivered to the correct process
5. Session layer
The session layer allows users on different machines to establish sessions between them.
Sessions offer various services, including dialog control (keeping track of whose turn it is to
transmit), token management (preventing two parties from attempting the same critical
operation at the same time), and synchronization (check pointing long transmissions to allow
them to continue from where they were after a crash).
1. Session establishment, maintenance and termination: The layer allows the two processes to
establish, use and terminate a connection.
2. Synchronization : This layer allows a process to add checkpoints which are considered as
synchronization points into the data. These synchronization point help to identify the error so
that the data is re-synchronized properly, and ends of the messages are not cut prematurely and
data loss is avoided.
3. Dialog Controller : The session layer allows two systems to start communication with each
other in half-duplex or full-duplex.
6. Presentation layer
The presentation layer is concerned with the syntax and semantics of the information transmitted.
In order to make it possible for computers with different data representations to communicate,
the data structures to be exchanged can be defined, along with a standard encoding to be used
''on the wire.'' The presentation layer manages these abstract data structures and allows higher-
level data structures (e.g., banking records), to be defined and exchanged.
2. Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the cipher text and the decrypted data is known as plain text. A key
value is used for encrypting as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on the network.
7. Application layer
The application layer is responsible for providing services to the user. The application layer
contains a variety of protocols that are commonly needed by users.
One widely-used application protocol is HTTP (Hypertext Transfer Protocol), which is the basis
for the World Wide Web. When a browser wants a Web page, it sends the name of the page it
wants to the server using HTTP. The server then sends the page back. Other application
protocols are used for file transfer, electronic mail, and network news.
1. Magnetic Media
2. Twisted Pairs
3. Coaxial Cable
4. Power Lines
5. Fiber Optics
1. Magnetic Media
One of the most common ways to transport data from one computer to another is to write them
onto magnetic tape or removable media (e.g., recordable DVDs). Write data onto magnetic
media
• Disks
• Tapes
• Never underestimate the bandwidth of a station wagon full of tapes hurtling down
the highway.
2. Twisted Pairs
A twisted pair consists of two conductors (normally copper), each with its own plastic insulation,
twisted together. One of the wires is used to carry signals to the receiver, and the other is used
only as a ground reference.
Unshielded Versus Shielded Twisted-Pair Cable
The most common UTP connector is RJ45 (RJ stands for registered jack)
Applications. Twisted-pair cables are used in telephone lines to provide voice and data channels.
Local-area networks, such as l0Base-T and l00Base-T, also use twisted-pair cables.
3. Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted pair
cable. coax has a central core conductor of solid or stranded wire (usually copper) enclosed in an
insulating sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a
combination of the two. The outer metallic wrapping serves both as a shield against noise and as
the second conductor, which completes the circuit. This outer conductor is also enclosed in an
insulating sheath, and the whole cable is protected by a plastic cover.
The most common type of connector used today is the Bayone-Neill-Concelman (BNe),
connector.
Applications
Coaxial cable was widely used in analog telephone networks, digital telephone networks
Cable TV networks also use coaxial cables.
Another common application of coaxial cable is in traditional Ethernet LANs
4. Power Lines
Power lines deliver electrical power to houses, and electrical wiring within houses distributes the
power to electrical outlets. Power lines have been used by electricity companies for low-rate
communication such as remote metering for many years, as well in the home to control devices.
The convenience of using power lines for networking should be clear. Simply plug a TV and a
receiver into the wall, which you must do anyway because they need power, and they can send
and receive movies over the electrical wiring.
A fiber-optic cable is made of glass or plastic and transmits signals in the form of light. Light
travels in a straight line as long as it is moving through a single uniform substance. If a ray of
light traveling through one substance suddenly enters another substance (of a different density),
the ray changes direction.
Optical fibers use reflection to guide light through a channel. A glass or plastic core is
surrounded by a cladding of less dense glass or plastic.
Propagation Modes
.
i) Multimode:
Multimode is so named because multiple beams from a light source move through the core in
different paths. How these beams move within the cable depends on the structure of the core, as
shown in below Figure.
In multimode step-index fiber, the density of the core remains constant from the center to the
edges. A beam of light moves through this constant density in a straight line until it reaches the
interface of the core and the cladding. The term step index refers to the suddenness of this
change, which contributes to the distortion of the signal as it passes through the fiber.
A second type of fiber, called multimode graded-index fiber, decreases this distortion of the
signal through the cable. The word index here refers to the index of refraction.
ii) Single-Mode:
Single-mode uses step-index fiber and a highly focused source of light that limits beams to a
small range of angles, all close to the horizontal
The subscriber channel (SC) connector, The straight-tip (ST) connector, MT-RJ(mechanical
transfer registered jack) is a connector
Applications
1. Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-
effective.
2. Some cable TV companies use a combination of optical fiber and coaxial cable,thus creating a
hybrid network.
3. Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-X also use
fiber-optic cable
Advantages
Fiber-optic cable has several advantages over metallic cable (twisted pair or coaxial).
1. Higher bandwidth.
2. Less signal attenuation. Fiber-optic transmission distance is significantly greater than that of
other guided media. A signal can run for 50 km without requiring regeneration. We need
repeaters every 5 km for coaxial or twisted pair cable.
4. Resistance to corrosive materials. Glass is more resistant to corrosive materials than copper.
5. Light weight. Fiber-optic cables are much lighter than copper cables.
6. Greater immunity to tapping. Fiber-optic cables are more immune to tapping than copper
cables. Copper cables create antenna effects that can easily be tapped.
Disadvantages
3. Cost. The cable and the interfaces are relatively more expensive than those of other guided
media. If the demand for bandwidth is not high, often the use of optical fiber cannot be justified.
Wireless Transmission
2. Radio Transmission
3. Microwave Transmission
5. Lightwave Transmission
The number of oscillations per second of a wave is called its frequency, f, and is
measured in Hz (in honor of Heinrich Hertz). The distance between two consecutive maxima (or
minima) is called the wavelength, which is universally designated by the Greek letter λ (lambda).
In a vacuum, all electromagnetic waves travel at the same speed, no matter what their frequency.
This speed, usually called the speed of light, c, is approximately 3 × 108 m/sec, or about 1 foot
(30 cm) per nanosecond.
2. Radio Transmission
Radio waves are the electromagnetic waves that are transmitted in all the directions of
free space. Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.
The range in frequencies of radio waves is from 3Khz to 10 khz. In the case of radio waves, the
sending and receiving antenna are not aligned, i.e., the wave sent by the sending antenna can be
received by any receiving antenna. An example of the radio wave is FM radio.
Radio transmission is mainly used for wide area networks and mobile cellular phones.
Radio waves cover a large area, and they can penetrate the walls.
Radio transmission provides a higher transmission rate.
1. Very Low Frequency (VLF) waves propagate as surface waves, usually through air, but
sometimes also through water. VLF waves do not suffer attenuation, but atmospheric noise
affects them. VLF waves are usually used for long-range radio navigation and submarine
communication.
2. Low Frequency (LF) waves also propagate as surface waves. Attenuation is higher during the
daytime. These wave are used for long MCA-301 92 range radio navigation or navigation
locators.
3. Middle Frequency (MF) waves rely on line-of-sight antennas to increase and control
absorption problems. These waves are used for AM radio, radio direction finding and emergency
frequencies.
4. High Frequency (HF) waves are used for amateur radio, citizen's band radio, international
broadcasting, military communication, telephone, telegraph and facsimile communication.
5. Very High Frequency (VHF) waves use line-of-sight propagation, and are used for VHF
television, FM radio, aircraft AM radio and aircraft navigation.
6. Ultra High Frequency (UHF) waves use line-of-sight propagation. They are used for
television, mobile phone, cellular radio, paging and microwave links.
7. Super High Frequency (SHF) waves are transmitted as either line-ofsight or into the space.
They are used for terrestrial and satellite microwave and radar communication.
8. Extreme high Frequency (EHF) waves are transmitted into space, and are used for scientific
applications such as radar, satellite and experimental communication.
3. Microwave Transmission
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves. Microwaves are unidirectional. The sending and receiving antennas need to be
aligned. The unidirectional property has an obvious advantage. A pair of antennas can be aligned
without interfering with another pair of aligned antennas
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction. Two
types of antennas are used for microwave communications: the parabolic dish and the horn
Applications:
Microwaves are used for unicast communication such as cellular telephones, satellite networks,
and wireless LANs
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to
770 nm), can be used for short-range communication. Infrared waves, having high frequencies,
cannot penetrate walls. This advantageous characteristic prevents interference between one
system and another; a short range communication system in one room cannot be affected by
another system in the next room.
When we use our infrared remote control, we do not interfere with the use of the remote
by our neighbors. Infrared signals useless for long-range communication. In addition, we cannot
use infrared waves outside a building because the sun's rays contain infrared waves that can
interfere with the communication.
Applications:
Infrared signals can be used for short-range communication in a closed area using line-of-sight
propagation.
PSTN (Public Switched Telephone Network), were usually designed many years ago,
with a completely different goal in mind: transmitting the human voice in a more-or-less
recognizable form. Their suitability for use in computer-computer communication is often
marginal at best. To see the size of the problem, consider that a cheap commodity cable running
between two computers can transfer data at 1 Gbps or more. In contrast, typical ADSL, the
blazingly fast alternative to a telephone modem, runs at around 1 Mbps. The difference between
the two is the difference between cruising in an airplane and taking a leisurely stroll.
In the following sections we will describe the telephone system and show how it works.
Alexander Graham Bell patented the telephone in 1876 , there was an enormous demand
for his new invention. The initial market was for the sale of telephones, which came in pairs. It
was up to the customer to string a single wire between them. If a telephone owner wanted to talk
to n other telephone owners, separate wires had to be strung to all n houses. Within a year, the
cities were covered with wires passing over houses and trees in a wild jumble. It became
immediately obvious that the model of connecting every telephone to every other telephone, as
shown in Fig.(a), was not going to work.
To his credit, Bell saw this problem early on and formed the Bell Telephone Company,
which opened its first switching office in 1878. The company ran a wire to each customer’s
house or office. To make a call, the customer would crank the phone to make a ringing sound in
the telephone company office to attract the attention of an operator, who would then manually
connect the caller to the callee by using a short jumper cable to connect the caller to the callee.
The model of a single switching office is illustrated in Fig.(b).
Pretty soon, Bell System switching offices were springing up everywhere and people
wanted to make long-distance calls between cities, so the Bell System began to connect the
switching offices. The original problem soon returned: to connect every switching office to every
other switching office by means of a wire between them quickly became unmanageable, so
second-level switching offices were invented. After a while, multiple second-level offices were
needed, as illustrated in Fig. (c). Eventually, the hierarchy grew to five levels
By 1890, the three major parts of the telephone system were in place: the switching
offices, the wires between the customers and the switching offices (bynow balanced,
insulated, twisted pairs instead of open wires with an earth return), and the long-distance
connections between the switching offices.
If a subscriber attached to a given end office calls another subscriber attached to the same
end office, the switching mechanism within the office sets up a direct electrical connection
between the two local loops. This connection remains intact for the duration of the call.
If the called telephone is attached to another end office, a different procedure has to be
used. Each end office has a number of outgoing lines to one or more nearby switching centers,
called toll offices (or, if they are within the same local area, tandem offices). These lines are
called toll connecting trunks. The number of different kinds of switching centers and their
topology varies from country to country depending on the country’s telephone density.
If both the caller’s and callee’s end offices happen to have a toll connecting trunk to the
same toll office (a likely occurrence if they are relatively close by), the connection may be
established within the toll office. A telephone network consisting only of telephones (the small
dots), end offices (the large dots), and toll offices (the squares) is shown in Fig. (c).
If the caller and callee do not have a toll office in common, a path will have to be
established between two toll offices. The toll offices communicate with each other via high-
bandwidth intertoll trunks (also called interoffice trunks). Prior to the 1984 breakup of
AT&T, the U.S. telephone system used hierarchical routing to find a path, going to higher levels
of the hierarchy until there was a switching office in common. This was then replaced with more
flexible, nonhierarchical routing. Figure below shows how a long-distance connection might be
routed.
3. Switching offices (where calls are moved from one trunk to another).
• All the circles are LEC switching offices. Each hexagon belongs to the IXC whose
number is on it.
Telephone Modems
A device that converts between a stream of digital bits and an analog signal that represents
the bits is called a modem, which is short for ‘‘modulator demodulator.’’ Modems come in many
varieties: telephone modems, DSL modems, cable modems, wireless modems, etc. The modem
may be built into the computer (which is now common for telephone modems) or be a separate
box (which is common for DSL and cable modems). Logically, the modem is inserted between
the (digital) computer and the (analog) telephone system, as seen in Figure below.
Telephone modems are used to send bits between two computers over a voice-grade
telephone line, in place of the conversation that usually fills the line. The main difficulty in doing
so is that a voice-grade telephone line is limited to 3100 Hz, about what is sufficient to carry a
conversation.
At the other end of the wire, on the end office side, a corresponding splitter is installed.
Here, the voice portion of the signal is filtered out and sent to the normal voice switch. The
signal above 26 kHz is routed to a new kind of device called a DSLAM (Digital Subscriber Line
Access Multiplexer), which contains the same kind of digital signal processor as the ADSL
modem. Once the bits have been recovered from the signal, packets are formed and sent off to
the ISP. This complete separation between the voice system and ADSL makes it relatively easy
for a telephone company to deploy ADSL. All that is needed is buying a DSLAM and splitter
and attaching the ADSL subscribers to the splitter. Other high-bandwidth services (e.g., ISDN)
require much greater changes to the existing switching equipment
Pulse Code Modulation (PCM) is the heart of the modern telephone system
A analog signal is sampled, quantized and coded
Each channel has 8bits, 24 channels and one framing bit form a frame of 125 µsec
SONET/SDH
When the wavelengths are spaced closer, e.g. 0.1 nm, the system is referred to as Dense WDM
(DWDM)
v) Switching techniques
In large networks, there can be multiple paths from sender to receiver. The switching technique
will decide the best route for data transmission.
Switching technique is used to connect the systems for making one-to-one communication.
1. Circuit Switching
Circuit switching is a switching technique that establishes a dedicated path between sender
and receiver.
In the Circuit Switching Technique, once the connection is established then the dedicated path
will remain to exist until the connection is terminated.
Circuit switching in a network operates in a similar way as the telephone works.
A complete end-to-end path must exist before the communication takes place.
In case of circuit switching technique, when any user wants to send the data, voice, video, a
request signal is sent to the receiver then the receiver sends back the acknowledgment to ensure
the availability of the dedicated path. After receiving the acknowledgment, dedicated path
transfers the data.
Circuit switching is used in public telephone network. It is used for voice transmission.
Fixed data can be transferred at a time in circuit switching technology.
Circuit establishment
Data transfer
Circuit Disconnect
Circuit Switching can use either of the two technologies:
i) Crossbar Switch
ii) Multistage Switch
i) Crossbar Switch
The Crossbar switch is a switch that has n input lines and n output lines. The crossbar switch has
n2 intersection points known as crosspoints.
Once the dedicated path is established, the only delay occurs in the speed of data
transmission.
It takes a long time to establish a connection approx 10 seconds during which no data can be
transmitted.
It is more expensive than other switching techniques as a dedicated path is required for each
connection.
It is inefficient to use because once the path is established and no data is transferred, then the
capacity of the path is wasted.
In this case, the connection is dedicated therefore no other data can be transferred even if the
channel is free.
2. Message Switching
Data channels are shared among the communicating devices that improve the efficiency of
using available bandwidth.
Traffic congestion can be reduced because the message is temporarily stored in the nodes.
Message priority can be used to manage the network.
The size of the message which is sent over the network can be varied. Therefore, it supports
the data of unlimited size.
The message switches must be equipped with sufficient storage to enable them to store the
messages until the message is forwarded.
The Long delay can occur due to the storing and forwarding facility provided by the message
switching technique.
3.Packet Switching
The packet switching is a switching technique in which the message is sent in one go, but it is
divided into smaller pieces, and they are sent individually.
The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
Every packet contains some information in its headers such as source address, destination
address and sequence number.
Packets will travel across the network, taking the shortest path as possible.
All the packets are reassembled at the receiving end in correct order.
If any packet is missing or corrupted, then the message will be sent to resend the message.
If the correct order of the packets is reached, then the acknowledgment message will be sent.
In the above diagram, A and B are the sender and receiver respectively. 1 and 2 are the nodes.
Call request and call accept packets are used to establish a connection between the sender and
receiver.
When a route is established, data will be transferred.
After transmission of data, an acknowledgment signal is sent by the receiver that the message
has been received.
If the user wants to terminate the connection, a clear signal is sent for the termination.
Node takes routing decisions to forward the packets. Node does not take any routing decision.
Congestion cannot occur as all the packets travel in Congestion can occur when the node is busy, and
different directions. it does not allow other packets to pass through.
It is more flexible as all the packets are treated as an It is not very flexible.
independent entity.
Packet Switching technique cannot be implemented in those applications that require low
delay and high-quality services.
The protocols used in a packet switching technique are very complex and requires high
implementation cost.
If the network is overloaded or corrupted, then it requires retransmission of lost packets.
It can also lead to the loss of critical information if errors are nor recovered.