CMP 316 Data Communication and Networks WRITEUP Update
CMP 316 Data Communication and Networks WRITEUP Update
KEFFI
FACULTY OF NATURAL AND APPLIED SCIENCES
DEPARTMENT OF COMPUTER SCIENCE
COURSE TITLE: DATA COMMUNICATION/NETWORK
COURSE CODE: CMP 316
Course Lecturer
Y. Kefas
1
OUTLINE
At the end of this study, You Should be able to understand:
Sender
Receiver
Transmission Medium
Protocol
2
OUTLINE
Data Representation
Text
Images
Audio
Video
3
OUTLINE
Data Flow/Mode of Transmission
Simplex
Half Duplex
Full Duplex
Broadcast
Multicast
Networks
Distributed Processing
Network Criteria
Network Structures
Network Models
Network Categories
Network Interconnections
4
OUTLINE
Internet
Internet History
The Internet today
Protocols and Standards
Protocols
Standards
Standard Organizations
5
OUTLINE
Networking Models
OSI Model.
Internet Model(TCP/IP)
Data and Signals
Analog Signals
Digital Signals
Transmission Impairments
Attenuation
Distortion
Noise
Data Rate Limit
Noiseless Channel
Noisy Channel
6
OUTLINE
Network Performance
Bandwidth
Throughput
Latency (Delay)
Jitter
Digital Transmission
Line Coding
Line Coding Schemes
Block Coding
7
OUTLINE
Analog Transmission
Transmission Media
Guided
Unguided
Multiplexing
IP ADRESSING
Circuit Switching and Packet switch networks
Error and Flow Control Mechanism
Introduction to networking using Packet Tracer
8
1-1 DATA COMMUNICATIONS
The term telecommunication means
communication at a distance. The word data
refers to information presented in whatever form
is agreed upon by the parties creating and using
the data. Data communications are the exchange
of data between two devices via some form of
transmission medium such as a wire cable.
1.9
Figure 1.1 Five components of data communication
1.10
Figure 1.1 Five components of data communication
1.Message
Message is the information to be communicated by the sender to the receiver.
2.Sender
The sender is any device that is capable of sending the data (message).
3.Receiver
The receiver is a device that the sender wants to communicate the data
(message).
4.Transmission Medium
It is the path by which the message travels from sender to receiver. It can be
wired or wireless and many subtypes in both.
1.11
Figure 1.1 Five components of data communication
5. Protocol
It is an agreed upon set or rules used by the sender and receiver to
communicate data.
A protocol is a set of rules that governs data communication. A Protocol is
a necessity in data communications without which the communicating
entities are like two persons trying to talk to each other in a different
language without know the other language.
1.12
Data Representation
Text
Image
Sound
Video
1.13
Data Representation
1. Text
Text includes combination of alphabets in small case as well as
upper case.
1.14
Data Representation
2. Numbers
Numbers include combination of digits from 0 to 9.
It is stored as a pattern of bits. Prevalent encoding system : ASCII,
Unicode
3. Images
1.15
Data Representation
Images
The size of an image depends upon the number of pixels (also
called resolution) and the bit pattern used to indicate the value
of each pixel.
Example: if an image is purely black and white (two color)
each pixel can be represented by a value either 0 or 1, so an
image made up of 10 x 10 pixel elements would require only
100 bits in memory to be stored.
On the other hand an image that includes gray may require 2
bits to represent every pixel value (00 - black, 01 – dark gray,
10– light gray, 11 –white). So the same 10 x 10 pixel image
would now require 200 bits of memory to be stored.
Commonly used Image formats : jpg, png, bmp, etc
1.16
Data Representation
4.Audio
Data can also be in the form of sound which
can be recorded and broadcasted. Example:
What we hear on the radio is a source of data
or information.
Audio data is continuous, not discrete.
5.Video
Video refers to broadcasting of data in form of
picture or movie
1.17
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
1.18
1-2 NETWORKS
1.19
Distributed Processing
1.20
Network Criteria
1.21
Network Criteria Cont’d
Reliability
Network reliability is measured by the frequency of failure, the
time it takes a link to recover from a failure, and the network's
robustness in a catastrophe.
Security
Network security issues include protecting data from unauthorized
access, protecting data from damage and development, and
implementing policies and procedures for recovery from breaches
and data losses.
1.22
Figure 1.3 Types of connections: point-to-point and multipoint
1.23
Figure 1.4 Categories of topology
1.24
Figure 1.5 A fully connected mesh topology (five devices)
1.26
Disadvantages of Mesh a Topology
1.28
Advantages of a Star Topology
1.30
Figure 1.7 A bus topology connecting three stations
1.31
Advantages of a Bus Topology
1.33
Figure 1.8 A ring topology connecting six stations
1.34
Ring Topology
1.36
Hybrid Topology
1.38
Categories of Networks Cont’d
There are two primary categories of Networks:
Local-area networks and
Wide-area networks.
The category into which a network falls is
determined by its size.
A LAN normally covers an area less than 2
miles;
A WAN can be worldwide. Networks of a
size in between are normally referred
to as metropolitan area networks and
span tens of miles.
1.39
Categories of Networks: Local Area Network (LAN)
1.41
Categories of Networks: Wide Area Network (WAN)
1.43
Interconnection of Networks: Internetwork
1.45
1-3 THE INTERNET
The Internet has revolutionized many aspects of
our daily lives. It has affected the way we do
business as well as the way we spend our leisure
time. The Internet is a communication system that
has brought a wealth of information to our
fingertips and organized it for our use.
1.46
A Brief History
The Internet came in to being in the 1969
In the mid-1960s, mainframe computers in
research organizations were standalone devices
The Advanced Research Projects Agency (ARPA)
in the Department of Defence (DoD) was interested in
finding a way to connect computers so that the
researchers they funded could share their findings,
thereby reducing costs and eliminating duplication of
effort.
In 1967, at an Association for Computing Machinery
(ACM) meeting, ARPA presented its ideas for
ARPANET, a small network of connected computers.
47
A Brief History Cont’d
49
A Brief History Cont’d
50
The Internet Today (ISPs)
There are:
International service providers
National service providers
Regional service providers and
Local service providers.
The Internet today is run by private
companies, not the government
1.52
The Internet Today (ISPs)
1.54
1-4 PROTOCOLS AND STANDARDS
1.55
PROTOCOLS
Protocol is synonymous with rule
For communication to occur, the entities must agree on a
protocol.
An entity is anything capable of sending or receiving
information.
The key elements of a protocol are:
syntax
semantics and
timing.
Syntax refers to the structure or format of the data, meaning
the order in which they are presented
Semantics refers to the meaning of each section of bits.
Timing refers to two characteristics:
when data should be sent and
1.56
how fast they can be sent
STANDARDS
1.57
Standards Organizations
Standards are developed through the cooperation of:
Standards creation committees
Forums and
Government regulatory agencies.
Standards Creation Committees
International Organization for Standardization (ISO) is active
in developing cooperation in the realms of scientific,
technological, and economic activity.
International Telegraphy and Telephony (CCITT) was
devoted to research and establishment of standards for
telecommunications in general and for phone and data
systems in particular.
International Telecommunication Union-Telecommunication
Standards Sector (ITU-T) which was formally CCIT is a
standard
1.58
for communication
Standards Organizations
1.60
Regulatory Agencies
All communications technology is subject to regulation by
government agencies such
as the Federal Communications Commission (FCC) in the
United States and National Communications Commission
(NCC) in Nigeria.
The purpose of these agencies is to protect the public
interest by regulating:
radio
television and
wire/cable communications.
The FCC has authority over interstate and international
commerce as it relates to communications
1.61
Internet Standards
An Internet standard is a thoroughly tested specification
that is useful to and adhered to by those who work with the
Internet.
There is a strict procedure by which a specification attains
Internet standard status.
A specification begins as an Internet draft.
An Internet draft is a working document (a work in
progress) with no official status and a 6-month lifetime.
Upon recommendation from the Internet authorities, a draft
may be published as a Request for Comment (RFC).
Each RFC is edited, assigned a number, and made
available to all interested parties.
RFCs go through maturity levels and are categorized
according to their requirement level.
1.62
Chapter 2
Network
Models
63
OBJECTIVES
Internet layering model
Function of each Layers
OSI Model
64
2.1 Layered Tasks
66
2.2 Internet Model
Peer-to-Peer Processes
Functions of Layers
Summary of Layers
67
Figure 2.2 Internet layers
68
Peer-to-peer processes
The Processes on each machine that communicate at a given layer
are called peer-to-peer processes.
Each layer in the sending device adds its own information to the
message it receives from the layer above it and passes the whole
package to the layer just below it.
At the receiving machine, the message is unwrapped layer by
layer, with each process receiving and removing the data meant for
it.
Passing of the data and network information down through the
layers of the sending device and back up through the layers of the
receiving device is made possible by an interface between each
pair of adjacent layers.
Each interface defines what information and services a layer must
provide for the layer above it. Thus, provide modularity.
69
Figure 2.3 Peer-to-peer processes
70
An exchange using the Internet model
71
• Physical, data link and network are network support layers.
• They deal with the physical aspects of moving data from
one device to another (such as electrical specifications,
physical connections, physical addressing, and transport
timing and reliability).
• Application layer: User support layer; interoperability among
unrelated software systems.
• Transport layer: Links the two subgroups and ensures that
what the lower layers have transmitted is in a form that the
upper layers can use.
• Each layer adds a header; Data link layer adds a header and
a trailer.
• Formatted data is converted into electromagnetic signal and
transported along a physical link. 72
Figure 2.5 Physical Layer
Deals with mechanical and electrical specifications of the interface
and transmission media.
Defines the procedures and functions that physical devices and
interfaces have to perform for transmission to occur.
Physical characteristics of interfaces and media
Representation of bits
Data rate: Transmission rate – number of bits sent per second
Synchronization of bits
The physical layer is responsible for transmitting individual bits from
one node to the next.
73
Figure 2.6 Data link layer
74
Figure 2.7 Node-to-node delivery
75
Example 1
In Figure 2.8 a node with physical address 10 sends a
frame to a node with physical address 87. The two nodes
are connected by a link. At the data link level this frame
contains physical addresses in the header. These are the
only addresses needed. The rest of the header contains
other information needed at this level. The trailer usually
contains extra bits needed for error detection
76
Figure 2.8 Example 1
77
Figure 2.9 Network layer
78
The network layer is responsible for the delivery of packets from
the original source to the final destination.
79
Figure 2.10 Source-to-destination delivery
80
Example 2
In Figure 2.11 we want to send data from a node with
network address A and physical address 10, located on
one LAN, to a node with a network address P and
physical address 95, located on another LAN. Because
the two devices are located on different networks, we
cannot use physical addresses only; the physical
addresses only have local jurisdiction. What we need here
are universal addresses that can pass through the LAN
boundaries. The network (logical) addresses have this
characteristic.
81
Figure 2.11 Example 2
82
Figure 2.12 Transport layer
Process-to-Process delivery
Network layer oversees host-to-destination delivery of
individual packets, it does not recognize any relationship
between those packets.
Ensures that the whole message arrives intact and in order,
overseeing both error control and flow control at the process-
to-process level.
83
The transport layer is responsible for delivery of a message from
one process to another.
84
Figure 2.12 Reliable process-to-process delivery of a message
85
Example 3
Figure 2.14 shows an example of transport layer
communication. Data coming from the upper layers have
port addresses j and k (j is the address of the sending
process, and k is the address of the receiving process).
Since the data size is larger than the network layer can
handle, the data are split into two packets, each packet
retaining the port addresses (j and k). Then in the network
layer, network addresses (A and P) are added to each
packet.
86
Figure 2.14 Example 3
87
Figure 2.15 Application layer
88
The application layer is responsible for
providing services to the user.
• Mail services
• File transfer and access
• Remote log-in
• Accessing the WWW
89
Contd …
Application layer
Network virtual terminal
Logon to a remote host.
Mail services
Basis for email forwarding and storage.
Directory services
Distributed database sources and access for global
information about various objects and services.
90
Figure 2.16 Summary of duties
91
2.3 OSI Model
A comparison
• Seven-layer model
• Never seriously implemented as a protocol
Stack
• Theoretical model designed to show how a
Protocol stack should be implemented
• Session & Presentation layer
92
Figure 2.17 OSI model
93
Figure 2.17 OSI model: Physical layer
97
OSI Model
Session Layer
Dialog control: Allows two systems to enter into a
dialog, either half or full duplex.
Terminal to mainframe is half duplex.
Synchronization: Add check points (synchronization
points) into a stream of data.
Presentation layer
Translation: Interoperability between these different
encoding methods.
Encryption: For privacy.
Compression: Reduces the number of bits contained in
the information; useful in video, audio, …
98
OSI Model: Application Layer
99
Physical Layer
100
Services
101
Chapters
Chapter 3 Signals
Chapter 4 Digital Transmission
102
Chapter 3
Signals
103
To be transmitted, data must be transformed to electromagnetic
signals
Signals can be analog or digital. Analog signals can have an
infinite number of values in a range; digital signals can have only a
limited number of values.
104
In data communication, we commonly use periodic analog signals
and aperiodic digital signals.
Periodic signal completes a pattern within a measurable time
frame, called a period, and repeats that pattern over subsequent
identical periods. The completion of one full pattern is called a
cycle.
An aperiodic signal changes without exhibiting a pattern or cycle
that repeats over time.
105
Figure 3.2 A sine wave
106
Figure 3.4 Period and frequency
107
Table 3.1 Units of periods and frequencies
METRIC UNITS
108
Example 1
Express a period of 100 ms in microseconds, and express
the corresponding frequency in kilohertz.
Solution
From Table 3.1 we find the equivalent of 1 ms.We make
the following substitutions:
100 ms = 100 10-3 s = 100 10-3 106 ms = 105 ms
110
Example 2
A sine wave is offset one-sixth of a cycle with respect
to time zero. What is its phase in degrees and radians?
Solution
We know that one complete cycle is 360 degrees.
Therefore, 1/6 cycle is
(1/6) 360 = 60 degrees = 60 x 2p /360 rad = 1.046 rad
111
Figure 3.6 Sine wave examples
112
Figure 3.7 Time and frequency domains
113
A single-frequency sine wave is not useful in data
communications; we need to change one or more of its
characteristics to make it useful
When we change one or more characteristics of a
single-frequency signal, it becomes a composite signal
made of many frequencies
According to Fourier analysis, any composite signal
can be represented as a combination of simple sine
waves with different frequencies, phases, and
amplitudes
114
Figure 3.13 Bandwidth
115
Example 3
If a periodic signal is decomposed into five sine waves with
frequencies of 100, 300, 500, 700, and 900 Hz, what is the
bandwidth? Draw the spectrum(range of values), assuming all
components have a maximum amplitude of 10 V.
Solution
B = fh fl = 900 100 = 800 Hz
The spectrum has only five spikes, at 100, 300, 500, 700,
and 900 (see Figure 13.4 )
116
Example 4
A signal has a bandwidth of 20 Hz. The highest frequency
is 60 Hz. What is the lowest frequency? Draw the
spectrum(range of values) if the signal contains all
integral frequencies of the same amplitude.
Solution
B = fh f l
20 = 60 fl
fl = 60 20 = 40 Hz
117
Example 5
A signal has a spectrum(range of values) with frequencies
between 1000 and 2000 Hz (bandwidth of 1000 Hz). A
medium can pass frequencies from 3000 to 4000 Hz (a
bandwidth of 1000 Hz). Can this signal faithfully pass
through this medium?
Solution
The answer is definitely no. Although the signal can have
the same bandwidth (1000 Hz), the range does not
overlap. The medium can only pass the frequencies
between 3000 and 4000 Hz; the signal is totally lost.
118
Wavelength and period
119
Wavelength and period
120
Figure 3.16 A digital signal
121
Example 6
A digital signal has a bit rate of 2000 bps. What is the
duration of each bit (bit interval)
Solution
The bit interval is the inverse of the bit rate.
Bit interval = 1/ 2000 s = 0.000500 s
= 0.000500 x 106 ms = 500 ms
122