Unit-3 DCN
Unit-3 DCN
Error: -
• if the data sent by the sender does not reach the receiver as intended and instead, some other
data reaches the receiver, we call that a "error.
• A condition when the receiver’s information does not match with the sender’s
information.
• During transmission, digital signals suffer from noise that can introduce errors in the
binary bits travelling from sender to receiver.
• That means a 0 bit may change to 1 or a 1 bit may change to 0.
EG: - 100 change in 101 here one bit has been changed
Error detection
• Error detection is a technique used to identify hidden errors in data.
• In other words, "error detection" is a method employed to detect the presence of noise
(interference) and data loss in data.
• 1- Simple Parity Check: This is a method for detecting errors in data. It is effective in
accurately identifying errors during communication.
• In the simple parity check method, a parity bit is added to the original data. Then, the data is
transferred through the data link. If there is any corruption in the data, it can be detected.
• Blocks of data from the source are subjected to a check bit or parity bit generator
form, where a parity of :
• It is not suitable for detection of errors if the number of bits changed is even.
• If error is noticed, it cannot be corrected.
• It cannot reveal the location of erroneous bit.
• This is a technique for detecting errors in which each line of data is checked. It is
capable of detecting errors hidden in a larger amount of data and provides accurate
data verification.
• In checksum error detection scheme, the data is divided into k segments each of m
bits.
• In the sender’s end the segments are added using 1’s complement arithmetic to get the
sum. The sum is complemented to get the checksum.
• The checksum segment is sent along with the data segments.
• At the receiver’s end, all received segments are added using 1’s complement
arithmetic to get the sum. The sum is complemented.
• If the result is zero, the received data is accepted; otherwise discarded.
• 4- Cyclic Redundancy Check (CRC): CRC, short for cyclic redundancy check, is a
technique based on binary division. In this technique, bits are appended to the end of data
units. CRC is commonly used for error-checking in data transmission and storage systems to
verify the integrity of data.
Framing:
The breaking of bit stream by inserting spaces or time gaps is called framing.
At data link layer, it extracts message from sender and provide it to receiver by
providing sender's and receiver's address.
Framing is a point-to-point connection between two computers or devices consists of a wire
in which data is transmitted as a stream of bits.
Framing is a function of the data link layer.
It provides a way for a sender to transmit a set of bits that are meaningful to the receiver.
Frames have headers that contain information such as error-checking codes.
a. Character Count:
This method uses a field in the header to specify the number of
characters in the frame.
When the data link layer at the destination sees the character count, it
knows how many characters follow, and hence where the end of the
frame is.
Disadvantage of Character Count:
If the header field of the frame gets corrupted during transmission then the
error can change the character count.
This drawback is difficult to overcome. Therefore, this method is not used
now a days.
b. Starting and ending character with Character Stuffing:
In the second method, each frame starts with the ASCII character sequence DLE
STX and ends with the sequence DLE ETX.(where DLE is Data Link Escape,
STX is Start of TeXt and ETX is End of TeXt.)
This method overcomes the drawbacks of the character count method.
If the destination ever loses synchronization, it only has to look for DLE STX and
DLE ETX characters.
c. Starting and ending with Bit Stuffing:
The third method allows data frames to contain an arbitrary number of bits and
allows character codes with an arbitrary number of bits per character.
At the start and end of each frame is a flag byte consisting of the special bit
pattern 01111110.
Whenever the sender's data link layer encounters five consecutive 1s in the data, it
automatically stuffs a zero bit into the outgoing bit stream.
This technique is called bit stuffing.
When the receiver sees five consecutive 1s in the incoming data stream, followed
by a zero bit, it automatically de-stuffs the 0 bit.
The boundary between two frames can be determined by locating the flag pattern
Flow control
Flow control is a technique used to control the flow of data. This technique also
manages the flow of data.
Flow control is an important function of the data link layer, through which the
receiver is sent the correct amount of data.
The primary goal of flow control is to prevent the overload of data sent by the
sender, ensuring that data is not lost or damaged in any way.
1- Stop and Wait Flow Control This is the simplest method of flow control. In
this method, data and information are divided into frames, and one frame at a
time is sent to the receiver.
• Slow Transmission: This method operates at a slow pace because it waits for
acknowledgment before sending the next frame.
• Low Efficiency: Only one frame can be sent at a time, which reduces the efficiency of
data transmission.
• Increased Latency: The constant waiting for acknowledgment increases latency in the
transmission process, which may not be suitable for applications requiring low
latency.
2. Sliding Window Flow Control: In this method, the sender can send multiple
frames to the receiver without waiting for acknowledgments.
• Both the sender and receiver have fixed-size buffers called windows.
Advantages of Sliding Window Flow Control:
• Handling Complexity: Managing the transfer of multiple frames in this method can be
complex and requires additional mechanisms for tracking and retransmitting lost
frames.
• Sequence Dependency: The receiver must receive the data frames in the correct
sequence, which can be challenging in case of out-of-order arrivals or lost frames.
ALOHA:
It was designed for wireless LAN but is also applicable for shared medium.
In this, multiple stations can transmit data at the same time and can hence lead to
collision and data being garbled.
1. Pure ALOHA:
When a station sends data it waits for an acknowledgement.
If the acknowledgement doesn’t come within the allotted time then the station
waits for a random amount of time called back-off time (Tb) and re-sends the
data.
Since different stations wait for different amount of time, the probability of
further collision decreases.
Its performance becomes worse as the data traffic on the channel increases.
At high loads, collisions are very frequent.
It requires queuing buffers for retransmission of packets.
Theoretically proven throughput maximum of 18.4%.
Slotted ALOHA:
It is similar to pure aloha, except that we divide time into slots and sending of data is
allowed only at the beginning of these slots.
If a station misses out the allowed time, it must wait for the next slot.
This reduces the probability of collision.
b. CSMA:
Carrier Sense Multiple Access ensures fewer collisions as the station is required to
first sense the medium (for idle or busy) before transmitting data.
If it is idle then it sends data, otherwise it waits till the channel becomes idle.
However there is still chance of collision in CSMA due to propagation delay.
Ethernet
Ethernet is communication protocol which is used to connect computer in different
areas.
Ethernet is LAN technology that is used to control the flow of information from
sender to receiver.
It was developed by Xerox in 1970 and that time it was speed around 2,3 MB.
Advantage of Ethernet
High security
Low cost
Each device has equal responsibility and privileges for sending and receiving data.
Disadvantage of Ethernet
Types of Ethernet
1. Fast Ethernet: This type of Ethernet network uses cables called twisted pair or
CAT5. It can transfer data at a speed of around 100 Mbps (megabits per second).
Fast Ethernet uses both fiber optic and twisted pair cables to enable
communication.
There are three categories of Fast Ethernet: 100BASE-TX, 100BASE-FX, and
100BASE-T4.
2. Gigabit Ethernet: This is an upgrade from Fast Ethernet and is more common
nowadays.
It can transfer data at a speed of 1000 Mbps or 1 Gbps (gigabit per second).
Gigabit Ethernet also uses fiber optic and twisted pair cables for
communication.
It often uses advanced cables like CAT5e, which can transfer data at a speed
of 10 Gbps.
3. Switch Ethernet: This type of network involves using switches or hubs to
improve network performance.
Each workstation in this network has its own dedicated connection, which
improves the speed and efficiency of data transfer.
Switch Ethernet supports a wide range of speeds, from 10 Mbps to 10 Gbps,
depending on the version of Ethernet being used
Token Ring
• A token ring is a data link for a local area network (LAN) in which all devices are
connected in a ring or star topology and pass one or more tokens from host to host.
• A token is a frame of data transmitted between network points. Only a host that holds
a token can send data, and tokens are released when receipt of the data is confirmed.
• Token passing performs better than bus topology under heavy traffic.
• Data packets must pass through all the nodes, slowing routing.
• Token ring networks have suffered from network management problems and poor
network fault tolerance.
Bluetooth:
Less Complicated.
Less Power consumption.
Available at cheaper rates.
Robustness.
a. Piconet:
A Small Bluetooth network is called as Piconet.
It uses a master/slave model to control when and where devices can send data.
In this model, a single master device can be connected to up to seven different slave
devices.
The Master coordinates communication throughout the piconet.
It can send data to any of its slaves and request data from them as well.
Slaves are only allowed to transmit to and receive from their master.
The communication between master and slave may be one to one or one to many
communications.
b. Scatternet:
It is formed by combining various piconets.
A device can be a master of only one piconet.
A slave of a piconet can act as a master in other piconet.
In this way, it receives all messages from the master of its piconet and delivers packets to
its slaves in other piconet.
Applications of Bluetooth:
Wireless mouse and keyboard can communicate with the system unit.
Modern health care devices send signals to monitors in wireless manner.
Almost all the latest mobiles, palmtops use this technology to transfer data rapidly.
The transfer of files, images and MP3 between mobile phones.
Video game systems are using this technology as well as for their wireless controllers.
VLAN
A VLAN, or Virtual Local Area Network, is a network technology that allows you to create
logical, segmented networks within a physical network infrastructure.
VLANs are used to improve network performance, security, and manageability by dividing a
single physical network into multiple isolated virtual networks.
Each VLAN operates as if it were a separate physical network, even though it shares the same
physical infrastructure.
Advantages of VLAN’s:
Reduction in cost.
Reduction in time.
Increased Security.
Increased Performance.
FDDI:
Its full form is “Fiber Distributed Data Interface”.
It provides a standard for data transmission in a local area network.
It is a high performance fiber optic token ring.
It is highly reliable way to transmit data using a dual-ring protocol based on the token
ring protocol.
A token ring network is a local area network where all the computers on the network
are connected in a giant circle and a token-passing setup is employed to prevent data
collision when two computers send data at the same time.
FDDI covers large geographical areas.
It can support thousands of users on the local area network.
A FDDI network contains two fiber rings, one transmitting clockwise and the other
transmitting counter clockwise.
Objectives of FDDI:
Wireless LAN:
A wireless LAN uses wireless transmission medium for data transfer operation.
A wireless local area network (WLAN) is a wireless distribution method for two or more
devices that use high-frequency radio waves and often include an access point to the Internet.
A WLAN allows users to move around the coverage area, often a home or small office, while
maintaining a network connection.
A WLAN is sometimes call a local area wireless network (LAWN).
Characteristics of WLAN
Seamless operation.
Low power for battery use.
Simple management, easy to use for everyone.
Protection of investment in wired networks.
Robust transmission technology.
Advantages of WLAN
Installation speed and simplicity.
Installation flexibility.
Reduced cost of ownership.
Reliability.
Mobility.
Robustness.
Disadvantages of WLAN
Slower bandwidth.
Security for wireless LANs is the prime concern.
Less capacity.
Wireless networks cost four times more than wired network cards.
Network Hardware Components:
1. Connectors:
Connectors are used to connect network cables to terminals or other devices.
The connectors serve as the physical connection between the computer and the
cable media.
Common network connections require cable media and special connectors to link
the medium.
2. Transceivers:
The Transceivers is a device comprising both a transmitter and a receiver which
are combined and share common circuitry or a single housing.
When no circuitry is common between transmit and receive functions, the device
is a transmitter-receiver.
Transceivers are devices used in Ethernet networks to connect nodes to the
physical medium.
They serve as both the physical connection and the electrical interface between a
node and the physical medium, enabling the mode to communicate with the
medium.
3. Repeaters:
A repeater is a device that receives a digital signal on an electromagnetic or
optical transmission medium and regenerates the signal along the next leg of the
medium.
In electromagnetic media, repeaters overcome the attenuation caused by free-
space electromagnetic-field divergence or cable loss.
A series of repeaters make possible the extension of a signal over a distance.
Repeaters remove the unwanted noise in an incoming signal.
Advantages of Repeaters: