Computer Networks for Beginners
Computer Networks for Beginners
CONTENTS PAGE
Introduction…………………………………………………….. 1
What You Will Learn in this Course …………………….……. 1
Course Aims …………………………………………………… 1
Course Objectives ……………………………………………... 1
Working through this Course ………………………………….. 2
Course Materials ………………………………………………. 2
Study Units …………………………………………………….. 2
Textbooks and References …………………………………….. 3
Assignment File ……………………………………………….. 4
Presentation Schedule …………………………………………. 4
Assessment …………………………………………………….. 4
Tutor-Marked Assignment ……………………………………... 5
Final Examination and .Grading ………………………………... 5
Course Marking Scheme ……………………………………….. 6
Course Overview ……………………………………………….. 6
How to Get the Best from this Course ………………………… 7
Facilitators/Tutors and Tutorials ………………………………. 8
Summary ……………………………………………………….. 9
Introduction
CIT 852 -Data Communication and Networks is a three [3] credit unit
course of 16 units. The main objective of the course is to deal with
fundamental issues in Computer Networks. It starts with the philosophy
of data communication covering different modulation and multiplexing
techniques. Then, it proceeds to cover MAC layer protocols, several
routing techniques protocols, congestion techniques and several network
layer protocol. The final module of the course takes up issues related to
the transport layer mechanism, such as, addressing, connection,
establishment, flow control and multiplexing issues. It also covers the
transport layer protocol in details. The module ends with the security
issue, which is an important topic today.
This Course Guide gives you a brief overview of the course content,
course duration, and course materials.
Course Aims
iv
CIT 852 DATA COMMUNICATION AND NETWORK
Course Objectives
Certain objectives have been set out to ensure that the course achieves
its aims. Apart from the course objectives, every unit of this course has
set objectives. In the course of the study, you will need to confirm, at the
end of each unit, if you have met the objectives set at the beginning of
each unit. By the end of this course you should be able to:
v
CIT 852 DATA COMMUNICATION AND NETWORK
Course Materials
These include:
1. Course Guide
2. Study Units
3. Recommended Texts
4. A file for your assignments and for records to monitor your
progress.
Study Units
There are sixteen study units in this course:
vi
CIT 852 DATA COMMUNICATION AND NETWORK
Assignments File
These are of two types: the self-assessment exercises and the Tutor-
Marked Assignments. The self-assessment exercises will enable you
monitor your performance by yourself, while the Tutor-Marked
Assignment is a supervised assignment. The assignments take a certain
percentage of your total score in this course. The Tutor-Marked
Assignments will be assessed by your tutor within a specified period.
The examination at the end of this course will aim at determining the
level of mastery of the subject matter. This course includes twelve
Tutor-Marked Assignments and each must be done and submitted
accordingly. Your best scores however, will be recorded for you. Be
sure to send these assignments to your tutor before the deadline to avoid
loss of marks. .
vii
CIT 852 DATA COMMUNICATION AND NETWORK
Presentation Schedule
Assessment
There are two aspects to the assessment of the course. First are the tutor
marked assignments; second, is a written examination.
At the end of the course, you will need to sit for a final three-hour
examination. This will also count for 70% of your total course mark.
There are sixteen tutor marked assignments in this course. You need to
submit all the assignments. The total marks for the best four (4)
assignments will be 30% of your total course mark.
Assignment questions for the units in this course are contained in the
Assignment File. You should be able to complete your assignments
from the information and materials contained in your set textbooks,
reading and study units. However, you may wish to use other references
to broaden your viewpoint and provide a deeper understanding of the
subject.
When you have completed each assignment, send it together with form
to your tutor. Make sure that each assignment reaches your tutor on or
before the deadline given. If, however, you cannot complete your work
on time, contact your tutor before the assignment is due to discuss the
possibility of an extension.
The final examination for the course will carry 70% percentage of the
total marks available for this course. The examination will cover every
viii
CIT 852 DATA COMMUNICATION AND NETWORK
aspect of the course, so you are advised to revise all your corrected
assignments before the examination.
This course endows you with the status of a teacher and that of a learner.
This means that you teach yourself and that you learn, as your learning
capabilities would allow. It also means that you are in a better position
to determine and to ascertain the what, the how, and the when of your
language learning. No teacher imposes any method of learning on you.
The course units are similarly designed with the introduction following
the table of contents, then a set of objectives and then the dialogue and
so on.
The objectives guide you as you go through the units to ascertain your
knowledge of the required terms and expressions.
ix
CIT 852 DATA COMMUNICATION AND NETWORK
Assessment Marks
Assignment 1-4 Four assignments, best three marks of the
four count at 30% of course marks
Final examination 70% of overall course marks
Total 100% of course marks
Course Overview
x
CIT 852 DATA COMMUNICATION AND NETWORK
In distance learning the study units replace the university lecturer. This
is one of the great advantages of distance learning; you can read and
work through specially designed study materials at your own pace, and
at a time and place that suit you best. Think of it as reading the lecture
instead of listening to a lecturer. In the same way that a lecturer might
set you some reading to do, the study units tell you when to read your
set books or other material. Just as a lecturer might give you an in-class
exercise, your study units provide exercises for you to do at appropriate
points.
Each of the study units follows a common format. The first item is an
introduction to the subject matter of the unit and how a particular unit is
integrated with the other units and the course as a whole. Next is a set of
learning objectives. These objectives enable you know what you should
be able to do by the time you have completed the unit. You should use
these objectives to guide your study. When you have finished the units
you must go back and check whether you have achieved the objectives.
If you make a habit of doing this you will significantly improve your
chances of passing the course.
Remember that your tutor's job is to assist you. When you need help,
don't hesitate to call and ask your tutor to provide it.
4. Turn to Unit 1 and read the introduction and the objectives for the
unit.
xi
CIT 852 DATA COMMUNICATION AND NETWORK
6. Work through the unit. The content of the unit itself has been
arranged to provide a sequence for you to follow. As you work
through the unit you will be instructed to read sections from your
set books or other articles. Use the unit to guide your reading.
7. Review the objectives for each study unit to confirm that you
have achieved them. If you feel unsure about any of the
objectives, review the study material or consult your tutor.
10. After completing the last unit, review the course and prepare
yourself for the final examination. Check that you have achieved
the unit objectives (listed at the beginning of each unit) and the
course objectives (listed in this Course Guide).
Your tutor will mark and comment on your assignments, keep a close
watch on your progress and on any difficulties you might encounter and
provide assistance to you during the course. You must mail or submit
your tutor-marked assignments to your tutor well before the due date (at
east two working days are required). They will be marked by your tutor
and returned to you as soon as possible.
xii
CIT 852 DATA COMMUNICATION AND NETWORK
you do not understand any part of the study units or the assigned
readings,
you have difficulty with the self-tests or exercises,
you have a question or problem with an assignment, with your tutor's
comments on an assignment or with the grading of an assignment.
You should try your best to attend the tutorials. This is the only chance
to have face to face contact with your tutor and to ask questions which
are answered instantly. You can raise any problem encountered in the
course of your study. To gain the maximum benefit from course
tutorials, prepare a question list before attending them. You will learn a
lot from participating in discussions actively.
Summary
I wish you success with the course and hope that you will find it both
interesting and useful.
xiii
CIT 852 DATA COMMUNICATION AND NETWORK
xiv
CIT 852 DATA COMMUNICATION AND NETWORK
Abuja Office
5, Dar Es Salaam Street
Off Aminu Kano Crescent
Wuse II, Abuja
Nigeria.
e-mail: [email protected]
URL: www.nou.edu.ng
Published by
National Open University of Nigeria
Printed 2008
ISBN: 978-058-378-5
xv
CIT 852 DATA COMMUNICATION AND NETWORK
CONTENTS PAGE
xvi
CIT 852 DATA COMMUNICATION AND NETWORK
CONTENT
1.0 Introduction
2.0 Objectives
3.0 Main Content
3.1 What is a Computer Network?
3.2 Network Goals and Motivations
3.3 Classification of Networks
3.3.1 Broadcast Networks
3.3.2 Point-to-Point or Switched Networks
3.4 work Topology
3.4.1 Bus Topology
3.4.2 Star Topology
3.4.3 Ring Topology
3.4.4 Tree Topology
3.4.5 Mesh Topology
3.4.6 Cellular Topology
3.5 Applications of Network
3.6 Networking Model
3.6.1 OSI Reference Model
3.6.2 TCP/IP Reference Model
3.7 Network Architecture
3.7.1 Client/Server Architecture
3.7.2 Peer-lo-Peer Architecture
3.8 Example Networks
3.8.1 Novell Netware
3.8.2 ARPANET
3.8.3 Internet
3.8.4 ATM Network
3.9 Types of Computer Networks
3.9.1 Metropolitan Area Network (MAN)
3.9.2 Wide Area Network (WAN)
3.9.3 Comparison between LAN, MAN, WAN and GAN
3.10 Advantages of Networks
4.0 Conclusion
1
CIT 852 DATA COMMUNICATION AND NETWORK
5.0 Summary
6.0 Tutor-Marked Assignment
7.0 References/Further Readings
1.0 INTRODUCTION
Towards t4e end of this unit the concept of Delays in computer networks
is also discussed.
2.0 OBJECTIVES
2
CIT 852 DATA COMMUNICATION AND NETWORK
3
CIT 852 DATA COMMUNICATION AND NETWORK
Some of the basic goals that a Computer network should satisfy are:
4
CIT 852 DATA COMMUNICATION AND NETWORK
Broadcast networks.
5
CIT 852 DATA COMMUNICATION AND NETWORK
time slot comes up. This method is inefficient because the channel
capacity is wasted when a machine has nothing to broadcast during its
allocated slot.
2) Satellite Networks.
6
CIT 852 DATA COMMUNICATION AND NETWORK
Topology
Protocols
The rules and encoding specifications for sending data. The protocols
also determine whether the network uses peer-to-peer or client/server
architecture.
Media
LANs are capable of transmitting data at very fast rates, much faster
than data can be transmitted over a telephone line; but the distances are
limited, and there is also a limit on the number of computers that can be
attached to a single LAN.
High speed.
7
CIT 852 DATA COMMUNICATION AND NETWORK
8
CIT 852 DATA COMMUNICATION AND NETWORK
The first international standard for wide area packet switching networks
was X.25, which was defined when all circuits were digited and
susceptible to noise. Subsequent technologies, such as frame relay and
SMDS were designed for today’s almost-error-free digital lines.
Bus topology
Star topology
Ring topology
Tree topology
Mesh topology
Cellular topology.
9
CIT 852 DATA COMMUNICATION AND NETWORK
In Bus topology, all devices are connected to a central cable, called the
bus or backbone. The bus topology connects workstations using a single
cable. Each workstation is connected to the next workstation in a point-
to-point fashion. All workstations connect to the same cable. Figure 2
shows computers connected using Bus Topology.
10
CIT 852 DATA COMMUNICATION AND NETWORK
Start topology uses a central hub through which, all components are
connected. In a Star topology, the central hub is the host computer, and
at the end of each connection is a terminal as shown in Figure 3.
An advantage of the star topology is, that failure, in one of the terminals
does not affect any other terminal; however, failure of the central hub
affects all terminals. This type of topology is frequently used to connect
terminals to a large time-sharing host computer.
11
CIT 852 DATA COMMUNICATION AND NETWORK
In Ring Topology all devices are connected to one another in the shape
of a closed loop, so that each device is connected directly to two other
devices, one on either side of it, i.e., the ring topology connects
workstations in a closed loop, which is depicted in Figure 4 Each
terminal is connected to two other terminals (the next and the previous),
with the last terminal being connected to the first. Data is transmitted
around the ring in one direction only; each station passing on the data to
the next station till it reaches its destination.
Information travels around the ring from one workstation to the next.
Each packet of data sent on the ring is prefixed by the address of the
station to which it is being sent. When a packet of data arrives, the
workstation checks to see if the packet address is the same as its own, if
it is, it grabs the data in the packet. If the packet does not belong to it, it
sends the packet to the next workstation in the ring.
Faulty workstations can be isolated from the ring. When the workstation
is powered on, it connects itself to the ring. When power is off, it
disconnects itself from the ring and allows the information to bypass the
workstation.
The common implementation of this topology is token ring. A break in
the ring causes the entire network to fail. Individual workstations can be
isolated from the ring.
12
CIT 852 DATA COMMUNICATION AND NETWORK
13
CIT 852 DATA COMMUNICATION AND NETWORK
14
CIT 852 DATA COMMUNICATION AND NETWORK
It is robust.
Cellular topology, divides the area being serviced into cells. In wireless
media each point transmits in a certain geographical area called a cell,
each cell represents a portion of the total network area. Figure 7 shows
computers using Cellular Topology. Devices that are present within the
cell, communicate through a central hub. Hubs in different cells are
interconnected and hubs are responsible for routing data across the
network. They provide a complete network infrastructure. Cellular
topology is applicable only incase of wireless media that does not
require cable connection.
15
CIT 852 DATA COMMUNICATION AND NETWORK
When a hub fails, all devices serviced by the hub lose service (are
affected).
Person-to-person communication.
Interactive entertainment.
16
CIT 852 DATA COMMUNICATION AND NETWORK
These days, many newspapers and digital libraries are available online
and allow users to access news and information which is of interest to
them. Another application is the World Wide Web, which contains
information about a wide variety of subjects like health, sports, science,
recreation, history, government etc.
Person-to-person Communication
Interactive Entertainment
17
CIT 852 DATA COMMUNICATION AND NETWORK
concern the layer in question and not worry about the architecture in a
macro sense.
Data are not directly transferred from layer-n on one computer to layer-n
on another computer. Rather, each layer passes data and control
information to the layer directly below until the lowest layer is reached.
Below layer-1 (the bottom layer), is the physical medium (the hardware)
through which the actual transaction takes place. In Figure 8 logical
communication is shown by a broken-line arrow and physical
communication by a solid-line arrow.
18
CIT 852 DATA COMMUNICATION AND NETWORK
19
CIT 852 DATA COMMUNICATION AND NETWORK
developed by the ISO and other standards bodies. The OSI model
divides the tasks involved with moving information between networked
computers into seven smaller, more manageable task groups. A task or
group of tasks is then assigned to each of the seven OSI layers. Each
layer is reasonably self-contained so that the tasks assigned to each layer
can be implemented independently. This enables the solutions offered
by one layer to be updated without affecting the other layers.
The OSI model is modular. Each successive layer of the OSI model
works with the one above and below it.
Although, each layer of the OSI model provides its own set of functions,
it is possible to group the layers into two distinct categories. The first
four layers i.e., physical, data link, network, and transport layer provide
the end-to-end services necessary for the transfer of data between two
systems. These layers pr9.f1de the protocols associated with the
communications network used to link two computers together. Together,
these are communication oriented.
The top three layers i.e., the application, presentation, and session layers
provide the application services required for the exchange of
information. That is, they allow two applications, each running on a
different node of the network to interact with each other through the
services provided by their respective operating systems. Together, these
are data processing oriented.
The following are the seven layers of the Open System Interconnection
(OSI) reference model:
20
CIT 852 DATA COMMUNICATION AND NETWORK
21
CIT 852 DATA COMMUNICATION AND NETWORK
If data is sent incorrectly, this layer has the responsibility of asking for
retransmission of the data. Specifically, it provides a network-
independent, reliable message-independent, reliable message-
interchange service to the top three application-oriented layers. This
layer acts as an interface between the bottom and top three layers. By
providing the session layer (layer 5) with a reliable message transfer
service, it hides the detailed operation of the underlying network from
the session layer.
The network layer establishes the route between the sending and
receiving stations. The unit of data at the network layer is called a
packet. It provides network routing and flow and congestion functions
across computer-network interface.
The data link layer groups the bits that we see on the Physical layer into
Frames. It is primarily responsible for error-free delivery of data on a
hop. The Data link layer is split into two sub-layers i.e., the Logical
Link Control (LLC) and Media Access Control (MAC).
22
CIT 852 DATA COMMUNICATION AND NETWORK
The main network device found at the Datalink layer is a bridge. This
device works at a higher layer than the repeater and therefore is a more
complex device. It has some understanding of the data it receives and
can make a decision based on the frames it receives as to whether it
needs to let the information pass, or can remove the information from
the network. This means that the amount of traffic on the medium can be
reduced and therefore, the usable bandwidth can be increased.
The data units on this layer are called bits. This layer defines the
mechanical and electrical definition of the network medium (cable) and
network hardware. This includes how data is impressed onto the cable
and retrieved from it.
The physical layer is responsible for passing bits onto and receiving
them from the connecting medium. This layer gives the data-link layer
(layer 2) its ability to transport a stream of serial data bits between two
communicating systems; it conveys the bits that moves along the cable.
It is responsible for ensuring that the raw bits get from one place to
another, no matter what shape they are in, and deals with the mechanical
and electrical characteristics of the cable.
This layer has no understanding 01 the meaning of the bits, but deals
with the electrical and mechanical characteristics of the signals and
signalling methods.
The main network device found the Physical layer is a repeater. The
purpose of a repeater (as the name suggests) is simply to receive the
digital signal, reform it, and retransmit the signal. This has the effect of
increasing the maximum length of a network, which would not be
possible due to signal deterioration if, a repeater were not available. The
repeater, simply regenerates cleaner digital signal so it doesn’t have to
understand anything about the information it is transmitting, and
processing on the repeater is non-existent.
Each layer, with the exception of the physical layer, adds information to
the data as it travels from the Application layer down to the physical
layer. This extra information is called a header. The physical layer does
not append a header to information because it is concerned with sending
and receiving information on the individual bit level.
We see that the data for each layer consists of the header and data of the
next higher layer. Because the data format is different at each layer,
23
CIT 852 DATA COMMUNICATION AND NETWORK
different terms are commonly used to name the data package at each
level. Figure 10 summarises these terms layer by layer.
OSI Protocols
24
CIT 852 DATA COMMUNICATION AND NETWORK
The data frames are finally transmitted to the physical layer. In the
physical layer, the data is in the fond of a stream of bits and this is
placed on the physical network medium and is sent across the medium
to System B.
B receives the bits at its physical layer and passes them on to the Data
link layer, which verifies that no error has occurred. The Network layer
ensures that the route selected for transmission is reliable, and passes the
25
CIT 852 DATA COMMUNICATION AND NETWORK
The data is then passed to the Presentation layer, which mayor may not
reformat it to suit the environment of B and sends it to the Application
layer. Finally the Application layer of System B passes the information
to the recipient Application program to complete the communication
process.
A given layer in the OSI layers generally communicates with three other
OSI layers: the layer directly above it, the layer directly below it, and its
Peer layer in another networked computer system. The data link layer in
System A, for example, communicates with the network layer of System
A, the physical layer of System A, and the data link layer in System B.
One OSI layer communicates with another layer to make use of the
services provided by the second layer. The services provided by
adjacent layers help a given OSI layer communicate with its peer layer
in other computer systems. Three basic elements are involved inlayer
services: the service user, the service provider, and the service access
point (SAP).
In this context, the service user is the OSI layer .that requests services
from an adjacent OSI layer. The service provider is the OSI layer that
provides services to service users. OSI layers can provide services to
multiple service users. The SAP is a conceptual location at which one
OSI layer can request the services of another OSI layer.
26
CIT 852 DATA COMMUNICATION AND NETWORK
Headers, trailers, and data are relative concepts, depending on the layer
that analyses the information unit. At the network layer, an information
unit, for example, consists of a Layer 3 header and data. At the data link
layer, however, all the information passed down by the network layer
(the Layer 3 header and the data) is treated as data. In other words, the
data portion of an information unit at a given OSI layer potentially can
contain headers, trailers, and data from all the higher layers. This is
known as encapsulation.
APPLCIATION LAYER
TRANSPORT LAYER
NETWORK LAYER
LINK/PHYSICAL LAYER
TCP/IP is a layered protocol similar to the ones used in all the other
major networking architectures, including IBM’s SNA, Windows’
NetBIOS, Apple’s AppleTalk, Novell’s NetWare and Digital’s DECnet.
The different layers of the TCP/IP reference model are shown in Figure
13. Layering means that after an application initiates the
communications, the message (data) to be transmitted is passed through
a number of stages or layers until it actually moves out onto the wire.
The data are packaged with a different header at each layer. At the
receiving end, the corresponding programs at each protocol layer unpack
the data, moving it “back up the stack” to the receiving application.
27
CIT 852 DATA COMMUNICATION AND NETWORK
The top layer of the protocol stack is the application layer. It refers to
the programs that initiate communication in the first place. TCP/IP
includes several application layer protocols for mail, file transfer, remote
access, authentication and name resolution. These protocols are
embodied in programs that operate at the top layer just as any custom-
made or packaged client/server application would.
There are many Application Layer protocols and new protocols are
always being developed.
The most widely known Application Layer protocols are those used for
the exchange of user information, some of them are:
28
CIT 852 DATA COMMUNICATION AND NETWORK
TCP/IP does not contain Presentation and Session layers, the services
are performed if required, but they are not part of the formal TCP/IP
stack. For example, Layer 6 (Presentation Layer) is where data
conversion (ASCII to EBCDIC, floating point to binary, etc,) and
encryption/decryption is performed, Layer 5 is the Session Layer, which
is performed in layer 4 in TCP/IP, Thus, we jump from layer 7 of OS I
down to layer 4 of TCP/IP.
The core protocols of the Transport Layer are TCP and the User
Datagram Protocol (UDP).
29
CIT 852 DATA COMMUNICATION AND NETWORK
The Internet Layer is analogous to the Network layer of the OSI model.
30
CIT 852 DATA COMMUNICATION AND NETWORK
The Network Interface Layer encompasses the Data Link and Physical
layers of the OSI Model. Note, that the Internet Layer does not take
advantage of sequencing and acknowledgement services that may be
present in the Data Link Layer. An unreliable Network Interface Layer
is assumed, and reliable communications through session establishment
and the sequencing and acknowledgement of packets is the
responsibility of the Transport Layer.
Both OSI and TCP/IP reference models are based on the concept of a
stack of protocols. The functionality of the layers is almost similar. In
both models the layers are there to provide an end-to-end network-
independent transport service to processes wishing to communicate with
each other.
31
CIT 852 DATA COMMUNICATION AND NETWORK
The OSI reference model was devised before the OSI protocols were
designed. The OSI model was not biased toward one particular set of
protocols, which made it quite general. The drawback of this ordering is
that the designers did not have much experience with the subject, and
did not have a good idea of the type of functionality to put in a layer.
With TCP/IP the reverse was true: the protocols carne first and the
model was really just a description of the existing protocols. There was
no problem with the protocols fitting the model. The only drawback was
that the model did not fit any other protocol stacks.
32
CIT 852 DATA COMMUNICATION AND NETWORK
33
CIT 852 DATA COMMUNICATION AND NETWORK
The client contains the user interface and may perform some or all of the
application processing. Servers can be high-speed microcomputers,
minicomputers or even mainframes. A database server maintains the
databases and processes requests from the client to extract data from or
update the database. An application server provides additional business
processing for the clients.
Non-client/server
34
CIT 852 DATA COMMUNICATION AND NETWORK
Two-tier client/server
Three-tier client/server
35
CIT 852 DATA COMMUNICATION AND NETWORK
design and the people who use them user communities). Here we shall
discuss some of the popular networks, such as, Novell NetWare,
ARPANET, Internet, ATM network etc.
Dedicated file server runs only NetWare and do not run any other
software, such as Windows application. Dedicated file servers are
mostly used in large networks, because, in large networks, one extra
client is less significant and a dedicated server can handle a larger
number of requests more efficiently. In large networks security is one of
the major concerns 3J1d providing a clear distinction between client and
server hardware provides greater security.
Non-dedicated File Server
There are many other servers within a Novell NetWare such as, Print
server, Message server, Database server etc.
36
CIT 852 DATA COMMUNICATION AND NETWORK
Print server
The job of the Print server is to allow users to access shared printers. A
Print server manages both requests and printers.
37
CIT 852 DATA COMMUNICATION AND NETWORK
Here, the Session and Presentation layers do not exist. The Application
layer contains various application protocols like SAP, File server etc.
3.8.2 Arpanet
Once these smaller networks were connected to the backbone, they were
in effect connected to each other.
38
CIT 852 DATA COMMUNICATION AND NETWORK
Because of the success of the NSFNET, plans were made to phase out
ARPANET. Many of the sites connected to ARPANET were absorbed
by the NSFNE’t and in 1990 ARPANET was officially dissolved.
3.8.3 Internet
The internet is said to have been “officially” born around 1982 when the
different networks (BITNET, EARN, etc.) agreed on using the TCP/IP
protocol as a standard for their interconnections making it a network of
networks and overcoming some of the previous cacophony of standards,
protocols and increasing its coverage.
The word Internet was coined from the words “interconnection” and
“network”, Now Internet is the world’s largest computer network. It is
considered to be the network of networks, and is scattered allover the
world. The computers connected to the Internet may communicate with
each other using fiber optic cables, telephone lines, satellite links and
other media.
39
CIT 852 DATA COMMUNICATION AND NETWORK
The Internet Protocol (IP) gives the physical 32-bit address, which
uniquely identifies an individual computer connected to the Internet,
while Transmission Control Protocol (TCP) is a connection-oriented
protocol, which takes care of the delivery and order of the packages.
TCP also provides the port numbers for individual services within a
computer.
The major information services provided by the Internet are (with the
protocol in parentheses): electronic mail (SMTP), remote file copying
(FTP), remote login, terminal connections (TELNET), menu-based file
access (GOPHER), wide area information servers (W AIS, Z39.50), the
World Wide Web (HlTP), and the Packet Internet Groper (PING).
There are three major ways to connect your computer to the Internet:
Switched circuits are not permanent. They exist only for the duration of
the connection and are switched by the public network (it connects the
circuits). Switched dial-up lines are not generally suited to data
transmission, but are used heavily for some types of services (e.g.,
Bulletin Boards). Using a modem, a user can use their phone line to dial
up a network provider via the phone line and connect to the Internet. At
present speeds upto 56Kbps are possible over standard dial up telephone
circuits.
40
CIT 852 DATA COMMUNICATION AND NETWORK
Leased Lines
Let’s say you want to pay a visit to the IGNOU’s website. First, you
enter the address or URL of the website in your web browser (more
about this in a while). Then your browser requests the web page from
the web server. The IGNOU’s server sends the data over the Internet to
your computer. Your web browser interprets the data and displays it on
your computer screen.
The glue that holds the Web together is called hypertext and hyperlinks.
This feature allows electronic files on the Web to be linked so that you
can easily jump between them. On the Web you can navigate through
41
CIT 852 DATA COMMUNICATION AND NETWORK
ATM technology is used for both local and wide area networks (LANs
and WANs) that support real-time voice and video as well as data. The
topology uses switches that establish a logical circuit from end to end,
which guarantees quality of service (QoS). However, unlike telephone
switches that dedicate circuits end-to-end, unused bandwidth in ATM’s
logical circuits can be utilised when needed. For example, idle
bandwidth in a videoconference circuit can be used to transfer data.
42
CIT 852 DATA COMMUNICATION AND NETWORK
Advantages of ATM
Disadvantages of ATM
43
CIT 852 DATA COMMUNICATION AND NETWORK
44
CIT 852 DATA COMMUNICATION AND NETWORK
Resource Sharing
45
CIT 852 DATA COMMUNICATION AND NETWORK
High Reliability
Saving Money
Scalability
Communication Medium
Increased Productivity
46
CIT 852 DATA COMMUNICATION AND NETWORK
one person can handle accounts receivable, and someone else processes
the profit-and-loss statements.
4.0 CONCLUSION
In this introductory unit, you have learnt about the basic concepts of
Computer Networks. You have not only learnt about Networks, but also
about the different types of Networks, their applications, Network
Topology Network protocols, OST reference mode and the TCP/IP
reference model which is the most commonly used on the Internet today.
Also, the importance of the network protocols and the importance of
using networked system have been extensively discussed.
5.0 SUMMARY
In this unit we have learnt about the basic concepts of Networking. Here
we discussed the different types of networks and the difference between
them. Computer networks are basically classified as LAN, MAN, WAN
depending on the geographical distance covered and depending on the
various ways of interconnecting computers in a network (network
topology) like Star, Bus, Ring, Tree, Mesh and cellular topologies.
We have seen the immense benefits that the computer networks provide
in the form of excellent sharing of computational resources,
computational load, increased level of reliability, economy and efficient
person-to-person communication. Here we have briefly explained some
of the network protocols which define a common set of rules and signals
that computers on the network use to communicate with each other.
47
CIT 852 DATA COMMUNICATION AND NETWORK
48
CIT 852 DATA COMMUNICATION AND NETWORK
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Content
3.1 Data Communication Terminology
3.1.1 Channel
3.1.2 Baud
3.1.3 Bandwidth
3.1.4 Frequency
3.2 Modes of Data Transmission
3.2.1 Serial and Parallel Communication
3.2.2 Synchronous, Asynchronous and Isochronous
Communication
3.2.3 Simplex, Half Duplex and Full Duplex
Communication
3.3 Analog and Digital Data Transmission
3.4 Transmission Impairments
3.4.1 Attenuation
3.4.2 Delay Distortion
3.4.3 Noise
3.4.4 Concept of Delays
3.5 Transmission Media and its Characteristics
3.5.1 Magnetic media
3.5.2 Twisted Pair
3.5.3 Baseband Coaxial Cable
3.5.4 Broadband Coaxial Cable
3.5.5 Optical Fiber
3.5.6 Comparison between Optical Fiber and Copper
wire
3.6 Wireless Transmission
3.6.2 Microwave Transmission
3.6.2 Radio Transmission
3.6.3 Infrared and Millimeter Waves
3.7 Wireless LAN
4.0 Conclusion
5.0 Summary
6.0 Tutor-Marked Assignment
7.0 References/Further Readings
1.0 INTRODUCTION
49
CIT 852 DATA COMMUNICATION AND NETWORK
of information from the sender to the receiver. The transfer of data from
one machine to another machine such that, the sender and the receiver
both interpret the data correctly is known as Data Communication.
2.0 OBJECTIVES
The transfer of data from one machine to another machine such that, the
sender and the receiver both interpret the data correctly is known as
Data Communication.
3.1.1 Channel
50
CIT 852 DATA COMMUNICATION AND NETWORK
3.1.2 Baud
3.1.3 Bandwidth
The amount of data or signals that the transmission media can carry in a
fixed amount of time is called Bandwidth. The Bandwidth depends upon
the length, media and signaling technique used. A high bandwidth
allows increased throughput and better performance. A medium that has
a high capacity has a high bandwidth. A medium that has limited
capacity has a low bandwidth. It is calculated using the difference
between the highest and the lowest frequencies that the medium can
carry. For digital devices, the bandwidth is usually expressed in bits per
second (bps) or bytes per second. For analog devices, the bandwidth is
expressed in cycles per second, or Hertz (Hz).
51
CIT 852 DATA COMMUNICATION AND NETWORK
3.1.4 Frequency
Serial communication.
Parallel communication.
Serial Communication
In Serial data transmission, bits are transmitted serially, one after the
other, as shown in Figure J. The least significant bit (LSB) is usually
transmitted first. While sending data serially, characters or bytes have to
52
CIT 852 DATA COMMUNICATION AND NETWORK
Parallel Communication
Asynchronous Communication
53
CIT 852 DATA COMMUNICATION AND NETWORK
Synchronous Communication
Isochronous Communication
Asynchronous Communication
1) A start bit: Signals the starting a frame and enables the receiving
device to synchronise itself with the message.
54
CIT 852 DATA COMMUNICATION AND NETWORK
As start, stop and parity bits must be added to each character that
is to be transmitted, this adds a high overhead to transmission.
This wastes the bandwidth; as a result, asynchronous
transmission is undesirable for transmitting large amounts of
data.
Synchronous Communication
Sync signals, generally utilise a bit pattern that cannot appear elsewhere
in the messages, ensuring that they will always be distinct and easy for
the receiver to recognise. As the transmitter and receiver remain in
synchronisation for the duration of the transmission, frames can be of
longer length.
As frames are longer the parity method of error detection is not suitable
because, if multiple bits are affected, then, the parity technique will not
report error accurately. Hence, the technique used with synchronous
transmission is the Cyclic Redundancy Check (CRC).
An end bit pattern indicates the end of the frame. Like sync the bit
pattern for end is such that, it will not appear elsewhere in the messages,
ensuring that they will always be distinct and easy for the receiver to
recognise at the end of the frame.
55
CIT 852 DATA COMMUNICATION AND NETWORK
Isochronous Communication
56
CIT 852 DATA COMMUNICATION AND NETWORK
Simplex.
Half Duplex
Full Duplex, sometimes called Duplex.
Simplex
Half Duplex
57
CIT 852 DATA COMMUNICATION AND NETWORK
Half duplex refers to two-way communication where, only one party can
transmit data at a time. Unlike, the Simplex mode here, both devices can
transmit data though, not at the same time, that is Half duplex provides
Simplex communication in both directions in a single channel as shown
in Figure 4. When one device is sending data, the other device must
only receive it and vice versa. Thus, both sides take turns at sending
data. This requires a definite turn around time during which, the device
changes from the receiving mode to the transmitting mode. Due to this
delay, half duplex communication is slower than simplex
communication. However, it is more convenient than simplex
communication as both the devices can send and receive data.
Most modems contain a switch that lets you select between half-duplex
and full-duplex modes. The correct choice depends on which program
you are using to transmit data through the modem.
Full Duplex
58
CIT 852 DATA COMMUNICATION AND NETWORK
Most modems have a switch that lets you choose between full-duplex
and half-duplex modes. The choice depends on which communications
program you are running.
We know that the two major types of signals are Analog and Digital.
The manner in which these two types of signals can be transmitted from
source to destination is of the same two types that is:
Analog Signal
59
CIT 852 DATA COMMUNICATION AND NETWORK
attenuation that the signal suffers on its way. The drawback is that
amplifiers amplify noise along with the original signal and hence, if the
signal gets distorted, it cannot be reconstructed and it is a permanent
loss. Due to this reason, this type of transmission is not used where a
high level of accuracy is needed. This is used in telephony where a
slight distortion in human communication does not matter.
The ability to capture the subtle nature of the real world is the single
advantage of analog techniques. However, once captured, modern
electronic equipment, no matter how advanced, cannot copy analog
signals perfectly. Third and fourth generations of audio and video
recordings show marked deterioration.
60
CIT 852 DATA COMMUNICATION AND NETWORK
When information, music, voice and video are turned into binary digital
form, they can be electronically manipulated, preserved and regenerated
perfectly at high speed. The millionth copy of a computer file is exactly
the same as the original. This is, nevertheless, a major advantage of
digital processing.
Attenuation.
Delay distortion.
Noise.
3.4.1 Attenuation
If the attenuation is high, the receiver may not be able to detect the
signal at all, or the signal may fall below the noise level. In many cases,
the attenuation properties of a medium are known, so amplifiers can be
put in place to try to compensate for the frequency-dependent
attenuation. This approach helps but can never restore the signal exactly
back to its original shape.
61
CIT 852 DATA COMMUNICATION AND NETWORK
3.4.3 Noise
A large delay is disastrous for data transfer. The total delay can be
categorised into two types. The first type is fixed delay. This is the total
delay which is always present due to buffering, link capacity etc. The
second type is variable delay. This is the delay component which is
caused by packets queuing in the routers, congestions etc. Among the
different types of delays, here, we shall discuss Transmission delay and
Propagation delay.
62
CIT 852 DATA COMMUNICATION AND NETWORK
Transmission delay
Propagation delay is the time between the last bit transmitted at the head
node of the link and the time the last bit is received at the tail node. This
is proportional to the physical distance between the transmitter and the
receiver; it can be relatively substantial, particularly for a satellite link or
a very high-speed link.
One of the most common ways to transport data from one computer to
another is to write them onto magnetic tape or floppy disks, physically
transport the tape or disks to the destination machine, and read them
back in again. While, this method is not as sophisticated as using a
63
CIT 852 DATA COMMUNICATION AND NETWORK
Twisted pairs can be used for either analog or digital transmission. The
bandwidth depends on the thickness of the wire and the distance
travelled, but several megabits/sec can be achieved for a few kilometers
in many cases.
64
CIT 852 DATA COMMUNICATION AND NETWORK
65
CIT 852 DATA COMMUNICATION AND NETWORK
bit stream to an analog signal, and the incoming analog signal to a bit
stream. Depending on the type of electronics, 1 bps may occupy
roughly, 1 Hz of bandwidth. At higher frequencies, many bits per Hz are
possible using advanced modulation techniques.
Fiber optic cable is made of fine strands of silicon glass fiber (thinner
than a human hair), and is coated with a refractive surface. The signals
are converted to light pulses before being sent. When light (provided by
a laser or LED) is show into the strand, it travels along the fiber strand
(the refractive layer prevents it from escaping). Each fiber optic strand
can support thousands of speech channels and multiple TV channels
simultaneously. It is used for long haul telecommunications links, for
providing high-speed data communications links for computers, and
information services to homes (e.g., PAY TV).
costly,
difficult to join, and
expensive to install and greater skill is required.
66
CIT 852 DATA COMMUNICATION AND NETWORK
Optical fiber has many advantages over copper wire. The advantages
are:
Optical fiber can handle much higher bandwidths than copper wire. Due
to the low attenuation, repeaters are needed only about every 30 km on
long lines, whereas, copper wires require repeaters every 5 km, which, is
substantial sayings in cost. Optical fiber also has the advantage of not
being affected by power surges, electromagnetic interference, or power
failures. Neither, is it affected by corrosive chemicals in the air, making
it ideal for harsh factory environments.
Finally, optical fibers do not leak light and are quite difficult to tap. This
gives them excellent security against potential wire trappers.
67
CIT 852 DATA COMMUNICATION AND NETWORK
The reason that optical fiber is better than copper wire is inherent in
underlying physics. When electrons move in a wire, they affect one
another and are themselves affected by electrons outside the wire.
Photons in a fiber do not affect one another (they have no electric
charge) and are not affected by stray photons outside the fiber.
Radio wave,
Microwave, and
Infrared.
68
CIT 852 DATA COMMUNICATION AND NETWORK
Above 100 MHz, the waves travel in straight lines and can therefore, be
narrowly focused upon. Concentrating all the energy into a small beam,
using a parabolic antenna (like the familiar satellite TV dish) gives a
much higher signal to noise ratio, but the transmitting and receiving
antennas must be accurately aligned with each other. In addition, this
directionality allows, multiple transmitters lined up in a row to
communicate with multiple receivers in a row without interference.
Before fiber optics, microwaves formed the heart of long distance
telephone transmission system.
Since, microwaves travel in straight lines, if, the towers are too far apart,
the earth will get in the way. Consequently, repeaters are needed
periodically. The higher the towers are, the further apart they can be.
The distance between repeaters increases roughly, with the square root
of the tower height. For 100-m high towers, repeaters can be spaced 80
km apart.
69
CIT 852 DATA COMMUNICATION AND NETWORK
medium capacity,
medium cost, and
can go long distances.
noise interference,
geographical problems due to line of sight requirements, and
becoming outdated.
Terrestrial Microwave
70
CIT 852 DATA COMMUNICATION AND NETWORK
Satellite Microwave
As all signals must travel 36,000 miles to the satellite and 36,000 miles
when returning to the receiver, the time required to transmit a signal is
independent of the distance. The time required for the signal to arrive at
its destination is called propagation delay. The delay encountered with
satellite transmissions is about 0.5 seconds.
71
CIT 852 DATA COMMUNICATION AND NETWORK
Satellite links operate in the low-giga hertz range, typically at 4-6 GHz.
Attenuation depends on transmitter power, frequency and atmospheric
conditions. Rain and atmospheric conditions may cause attenuation at
higher frequencies.
Short wave,
VHF (Very High Frequency) used for television and FM radio,
and
UHF (Ultra High Frequency) used for television.
Radio waves are easy to generate, can travel long distances, and
penetrate buildings easily, so they are widely used for communication,
both indoors and outdoors. Radio waves also are omni directional,
meaning that they travel in all directions from the source, so that the
transmitter and receiver do not have to be carefully aligned physically
and that the signal can be received by all the radios within the broadcast
area.
Unguided infrared and millimeter waves are widely used for short-range
communication. The remote controls used on televisions, VCR’s, and
stereos all use infrared communication. The remote control transmits
pulses of infrared light that carry coded instructions to the receiver on
the TV. They are relatively directional, cheap, and easy to build, but
72
CIT 852 DATA COMMUNICATION AND NETWORK
they have a major drawback, that is, they do not pass through solid
objects (try standing between your remote control and your television
and see if it still works). In general, as we go from long-wave radio
toward visible light, the waves behave more and more like light and less
and less like radio.
Infrared waves do not pass through solid walls well, as a result of which,
an Infrared system in one room of a building, will not interfere with a
similar system in adjacent rooms, which is a great advantage. Due to this
nature, security of infrared systems against eavesdropping is better than
that of radio systems. Because of these reasons, no government license
is needed to operate an infrared system, in contrast to radio systems,
which must be licensed.
These properties have made infrared suitable for indoor wireless LANS.
For example, the computers and offices in a building can be equipped
with relatively unfocused (i.e., somewhat omni directional), infrared
transmitters and receivers. In this way, portable computers with infrared
capability can be on the local LAN without having to physically connect
to it. During a meeting where several people use their portables, they
can just sit down in the conference room and be fully connected, without
having to plug in. Infrared communication cannot be used outdoors
because the sun shines as brightly in the infrared as in the visible
spectrum.
Point-to-point
High power laser transmitters can be used in order to transmit data for
several thousand yards when the line of sight communication is
possible.
The cost of Point-to-point infrared equipment is higher than the cost for
a comparable cabled network. When systems use transmitters that are
based on LED technology and hardware cost is moderate, but, when
long distance systems use high powered laser transmitters then the cost
is very high.
73
CIT 852 DATA COMMUNICATION AND NETWORK
Broadcast Infrared
When the receiver is within the range of two active transmitters, the
resulting signal will usually be grab led and hence, useless.
74
CIT 852 DATA COMMUNICATION AND NETWORK
4.0 CONCLUSION
5.0 SUMMARY
We also discussed the two major types of signals that is Analog and
Digital and, the manner in which these two types of signals can be
transmitted from the source to the destination.
When, data is transmitted from the source to the destination, there is,
always a scope for transmission errors and the data may not reach in
exactly the same form as it was sent. We have seen that these
transmission errors are classified into three main categories that is Delay
distortion, Attenuation and Noise. Delay distortion is caused because,
signals at different frequencies, travel at different speeds along the
transmission medium. As the signal travels along the transmission
medium, its strength decreases over distance, this is known as
Attenuation. Usually, some unwanted electromagnetic energy gets
inserted during the course of transmission and this is called Noise. The
concept of Delays and how to reduce them were also discussed.
75
CIT 852 DATA COMMUNICATION AND NETWORK
media uses physical cable for data transmission. Twisted pair, co-axial
cable and optical fiber are the three main types of guided media; they
differ in their physical characteristics as well as transmission capacities.
In case of unguided media, the transmission medium is air. Unguided
media can be Radio, Microwave or Infrared. Security is a major concern
when using unguided media for transmission.
Towards the end, Wifeless LAN’s were also discussed. Here, we saw
that Wireless LAN’s make use of Radio transmission and their main
objective is to provide high speed communication among computers that
are located in relatively close proximity. In the next unit, we will be
studying, the different Data encoding and communication techniques.
76
CIT 852 DATA COMMUNICATION AND NETWORK
CONTENTS
1.0 Introduction
2.0 Objectives
3.0 Main Content
3.1 Encoding
3.2 Analog to Analog Modulation
3.3 Analog to Digital Modulation
3.4 Digital to Analog Modulation
3.5 Digital to Digital Encoding
4.0 Conclusion
5.0 Summary
6.0 Tutor-Marked Assignment
7.0 References/Further Readings
1.0 INTRODUCTION
You might be aware from the description in the previous blocks, how
data is transmitted through a channel (wired or wireless) in the form of
an analog or digital signal. In this unit, we will elaborate on the
techniques to produce these types of signals from analog or digital data.
We will look at, in brief, on the following encoding techniques
[Figure1]:
77
CIT 852 DATA COMMUNICATION AND NETWORK
2.0 OBJECTIVES
3.1 Encoding
You know that there are two kinds of signals: analog and digital.
Likewise, there are two types of information that we may want to
transmit, again analog and digital. So, we get four basic combinations of
78
CIT 852 DATA COMMUNICATION AND NETWORK
Let us first look at a situation where our signal and information are both
of the analog type. The act of charging or encoding the information in
the signal is known as modulation. A good example of such encoding is
radio broadcasting. Here we primarily want to send sound in some form
over the atmosphere to the receiving radio gets. The sound is converted
into an analog electrical signal at the source and is used to encode the
signal which is the base frequency at which the transmission is being
done. The reverse process is performed at the radio set to recover the
information in electrical form, which is then converted back to sound so
that, we hear what was being said at the radio station.
79
CIT 852 DATA COMMUNICATION AND NETWORK
Therefore, there are three different ways in which this encoding of the
analog signal with analog information is performed. These methods are:
Amplitude Modulation
Now, let us go into the details. In this type of modulation the frequency
and phase of the carrier or base signal are not altered. Only the
amplitude changes and we can see that the information is contained in
the envelope of the carrier signal. It can be proud/demonstrated that, the
bandwidth of the composite signal is twice that of the highest frequency
in the information signal that modulates the carrier.
80
CIT 852 DATA COMMUNICATION AND NETWORK
AM Bandwidth
Frequency Modulation
This method is the less susceptible to noise and gives the best
performance of all data encoding types as far as the quality of the
transmitted signal is concerned. Although digital encoding methods may
give better performance over multiple hops (because in their case, the
original signal can be accurately reconstructed at each hop), Frequency
Modulation (PM) is the best as far as single hop transmission goes.
81
CIT 852 DATA COMMUNICATION AND NETWORK
Phase Modulation
82
CIT 852 DATA COMMUNICATION AND NETWORK
Natural phenomena are analog in nature and can take on any of the
potentially infinite number of values. For example, the actual
frequencies contained in a sound made by a human is an analog signal,
as is the amplitude or loudness of the sound. One example of coding
analog data in digital form is when, we want to record sound on digital
media such as a DVD or in other forms such as MP3 or as a “.wav” file.
Here, the analog signal, that is, the musical composition or the human
voice is encoded in digital form. This is an example of analog to digital
encoding.
The first step in PCM is, to convert the analog signal into a series of
pulses (Figure 3). This is called Pulse Amplitude Modulation (PAM).
To do this the analog signal is sampled at fixed intervals and the
amplitude at each sample decides the amplitude of that pulse. You can
see that at this step, the resulting signal is still actually an analog signal
because the pulse can have any amplitude, equal to the amplitude of the
original signal at the time the sample was taken. In PAM, the sampled
value is held for a small time so that the pulse has a finite width. In the
original signal the value occurs only for the instant at which it was
sampled.
One question that arises here is, how many samples do we have to take?
We would not want to take too many samples as that would be wasteful.
83
CIT 852 DATA COMMUNICATION AND NETWORK
At the same time, if, we take too few samples, we may not be able to
reconstruct the original signal properly. The answer comes from
Nyqist’s theorem, which states that, to be able to get back the original
signal, we must sample at a rate, that is, at least twice that of the highest
frequency contained in the original signal.
The above discrete value~ are now represented as 8 binary digits with, I
bit giving the sign while the other 7 bits represent the value of the
sample.
In the final stage of the encoding, the binary digits are then transformed
into a digital signal using any of the digital to digital encoding
mechanisms discussed later in this unit. This digital signal is now the
representation of the original analog signal.
84
CIT 852 DATA COMMUNICATION AND NETWORK
but instead of quantising them into 256 or more levels, only the
direction of change is retained. If the sample is larger in value than the
previous one, it is considered a 1 while otherwise it is considered a o bit.
So the sequence above would be encoded as:
85