Unit I - Introduction and Physical Layer
Unit I - Introduction and Physical Layer
CHARACTERISTICS OF A NETWORK
The effectiveness of a network depends on three characteristics.
1. Delivery: The system must deliver data to the correct destination.
2. Accuracy: The system must deliver data accurately.
3. Timeliness: The system must deliver data in a timely manner.
Factors that affect the Factors that affect Factors that affect the
Performance of a network: the Reliability Security of a network:
of a network:
1. Number of users 1. Efficiency of software. 1. Protecting data from
2. Type of transmission 2. Frequency of failure unauthorized access and
medium 3.Recovery time of a viruses.
3. Capabilities of the network after a failure
connected hardware
TRANSMISSION MODES
o The way in which data is transmitted from one device to another device is known as
transmission mode.
o The transmission mode is also known as the communication mode.
o Each communication channel has a direction associated with it, and transmission media
provide the direction. Therefore, the transmission mode is also known as a directional mode.
o The transmission mode is defined in the physical layer.
o Simplex Mode
o Half-duplex Mode
o Full-duplex mode (Duplex Mode)
SIMPLEX MODE
o In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
o A device can only send the data but cannot receive it or it can receive the data but cannot
send the data.
o This transmission mode is not very popular as mainly communications require the two-way
exchange of data. The simplex mode is used in the business field as in sales that do not
require any corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners but never
allows them to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard can only
accept the data from the user and monitor can only be used to display the data on the
screen.
o The main advantage of the simplex mode is that the full capacity of the communication channel
can be utilized during transmission.
HALF-DUPLEX MODE
o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive
the data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a time.
o In half-duplex mode, it is possible to perform the error detection, and if any error occurs,
then the receiver requests the sender to retransmit the data.
o A Walkie-talkie is an example of the Half-duplex mode.
o In Walkie-talkie, one party speaks, and another party listens. After a pause, the other speaks
and first party listens. Speaking simultaneously will create the distorted sound which cannot
be understood.
FULL-DUPLEX MODE
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the
directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a Telephone network. When two
people are communicating with each other by a telephone line, both can talk and listen at
the same time.
Line configuration refers to the way two or more communication devices attach to a link. A link is a
communications pathway that transfers data from one device to another. There are two possible line
configurations:
i. Point to Point (PPP): Provides a dedicated Communication link between two devices. It is simple to
establish. The most common example for Point-to-Point connection is a computer connected by
telephone line. We can connect the two devices by means of a pair of wires or using a microwave or
satellite link.
ii. MultiPoint : It is also called Multidrop configuration. In this connection two or more
devices share a single link.There are two kinds of Multipoint Connections.
Spatial Sharing: If several devices can share the link simultaneously, it is called Spatially shared
line configuration
NETWORK TOPOLOGY
Two or more devices connect to a link. Two or more links form a topology.Topology is
defined as
The way in which a network is laid out physically.
The geometric representation of the relationship of all the links and nodes to one-another.
The various types of topologies are : Bus, Ring, Tree, Star, Mesh and Hybrid.
BUS TOPOLOGY
Bus topology is a network type in which every computer and network device is connected
to single cable.
The long single cable acts as a backbone to link all the devices in a network.
When it has exactly two endpoints, then it is called Linear Bus topology.
It transmits data only in one direction.
RING TOPOLOGY
In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it.
A signal is passed along the ring in one direction, from device to device, until it reaches its
destination.
Each device in the ring incorporates a repeater.
When a device receives a signal intended for another device, its repeater regenerates the
bits and passes them along.
TREE TOPOLOGY
It has a root node and all other nodes are connected to it forming a hierarchy.
It is also called hierarchical topology.
It should at least have three levels to the hierarchy.
Tree topology is ideal if workstations are located in groups.
They are used in Wide Area Network.
Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
4. Error detection is easily done.
STAR TOPOLOGY
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
The devices are not directly linked to one another.
The controller acts as an exchange.
If one device wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device.
MESH TOPOLOGY
In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term dedicated means that the link carries traffic only between the two devices it
connects.
The number of physical links in a fully connected mesh network with n nodes is given by n (n –
1) / 2.
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
HYBRID TOPOLOGY
NETWORK TYPES
A computer network is a group of computers linked to each other that enables the computer
to communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size.
A computer network is mainly of three types:
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
o It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o LAN can be connected using a common cable or a Switch.
Advantages of LAN
Resource Sharing
Software Applications Sharing.
Easy and Cheap Communication
Centralized Data.
Data Security
Internet Sharing
Disadvantages of LAN
High Setup Cost
Privacy Violations
Data Security Threat
LAN Maintenance Job
Covers Limited Area
WIDE AREA NETWORK (WAN)
o A Wide Area Network is a network that extends over a large geographical area such as states or
countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government, and education.
o WAN can be either a point-to-point WAN or Switched WAN.
INTERNETWORK
Types of Internetwork
Extranet Intranet
An extranet is used for information
An intranet belongs to an organization
sharing. The access to the extranet is
which is only accessible by
restricted to only those users who have
the organization's employee or
login credentials. An extranet is the lowest
members. The main aim of the intranet is
level of internetworking. It can be
to share the information and resources
categorized as MAN, WAN or other
among the organization employees. An
computer networks. An extranet cannot
intranet provides the facility to work in
have a single LAN, atleast it must have
groups and for teleconferences.
one connection to the external network.
A socket is an endpoint for sending and receiving data in a network, used in both TCP and UDP
communication. Mastering socket programming is key for building network applications.
Types of Sockets : There are two types of Sockets: the datagram socket and the stream socket.
1. Datagram Socket : This is a type of network which has connection less point for sending and
receiving packets. It is similar to mailbox. The letters (data) posted into the box are collected and
delivered (transmitted) to a letterbox (receiving socket).
2. Stream Socket In Computer operating system, a stream socket is type of interprocess
communications socket or network socket which provides a connection-oriented, sequenced, and
unique flow of data without record boundaries with well defined mechanisms for creating and
destroying connections and for detecting errors. It is similar to phone. A connection is established
between the phones (two ends) and a conversation (transfer of data) takes place.
Socket Programming
Socket programming is a way to connect two nodes on a network so they can communicate with
each other. It enables the exchange of data between applications running on different devices or
computers. A socket is an endpoint of a two-way communication link between two programs running
on a network. It is bound to a port number so that the TCP layer can identify the application that data
is destined to be sent to.
In simple terms, a socket is like a door between two applications. When you want to send data
from one application to another, you need to open a door (create a socket) on both sides. The sending
application puts the data through its door, and the receiving application picks it up from its own door.
Socket programming involves creating a socket, binding it to a specific address and port, and then
sending or receiving data through that socket. It provides a way for applications to communicate with
each other over a network, regardless of whether they are running on the same device or on different
devices.
In Java, there are two main classes used for connection-less socket programming:
DatagramSocket and DatagramPacket
DatagramSocket
This class represents a socket for sending and receiving datagram packets over a network. It
allows you to send and receive individual packets of data without establishing a dedicated connection.
Let’s see how to create a DatagramSocket:
DatagramSocket socket = new DatagramSocket();
DatagramPacket
This class represents a datagram packet, which is used to encapsulate the data being sent or
received through a DatagramSocket. It contains the data as well as the IP address and port number of
the destination or source. Here's an example of creating a DatagramPacket:
byte[] data = "Hello, world!".getBytes();
InetAddress address = InetAddress.getByName("localhost");
int port = 1234;
DatagramPacket packet = new DatagramPacket(data, data.length, address, port);
In this example, we create a byte array containing the data we want to send, specify the destination
address and port, and then create a DatagramPacket with that information.
These two classes form the foundation of connection-less socket programming in Java. They allow
you to send and receive data packets without establishing a dedicated connection, making them
suitable for scenarios where quick and lightweight communication is needed.
Client
Socket socket = new Socket("localhost", 1234);
InputStream input = socket.getInputStream();
OutputStream output = socket.getOutputStream();
// Read from and write to the server socket
socket.close();
In this example, the server creates a ServerSocket and waits for a client to connect. Once a client
connects, it creates a new Socket to handle the communication. The client creates a Socket and
specifies the server's address and port. Both the server and client use input and output streams to read
from and write to each other.
TCP socket programming provides reliable communication and is suitable for applications that require
ordered and error-free data delivery, such as file transfers or messaging systems.
TRANSMISSION MEDIA
o Transmission media is a communication channel that carries the information from the sender
to the receiver.
o Data is transmitted through the electromagnetic signals.
o The main functionality of the transmission media is to carry the information in the form
of bits (Either as Electrical signals or Light pulses).
o It is a physical path between transmitter and receiver in data communication.
o The characteristics and quality of data transmission are determined by the
characteristics of medium and signal.
o Transmission media is of two types : Guided Media (Wired) and UnGuided Media
(wireless).
o In guided (wired) media, medium characteristics are more important whereas, in unguided
(wireless) media, signal characteristics are more important.
o Different transmission media have different properties such as bandwidth, delay, cost and
ease of installation and maintenance.
o The transmission media is available in the lowest layer of the OSI reference model, i.e.,
Physical layer.
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the signal decreases
with increasing the distance which causes the loss of energy.
o Distortion: Distortion occurs when there is a change in the shape of the signal. This type of
distortion is examined from different signals having different frequencies. Each frequency
component has its own propagation speed, so they reach at a different time which leads to
the delay distortion.
o Noise: When data is travelled over a transmission medium, some unwanted signal is added
to it which creates the noise.
GUIDED MEDIA
It is defined as the physical medium through which the signals are transmitted.
It is also known as Bounded media.
Types of Guided media: Twisted Pair Cable, Coaxial Cable , Fibre Optic Cable
Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable.
The frequency range for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral pattern.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows the
higher transmission rate.
Advantages :
o The cost of the shielded twisted pair cable is not very high and not very low.
o Installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages:
o It is more expensive as compared to UTP and coaxial cable.
o It has a higher attenuation rate.
COAXIAL CABLE
o Coaxial cable(Coax) is a very commonly used transmission media, for example, TV wire
is usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to each
other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh.
o The middle core is made up of non-conductive cover that separates the inner
conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
o Common applications of coaxial cable are Cable TV networks and traditional
Ethernet LANs.
Disadvantages :
o It is more expensive as compared to twisted pair cable.
o If any fault occurs in the cable causes the failure in the entire network.
FIBRE OPTIC CABLE
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used to
send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Advantages:
o Greater Bandwidth
o Less signal attenuation
o Immunity to electromagnetic interference
o Resistance to corrosive materials
o Light weight
o Greater immunity to tapping
Disadvantages :
o Requires Expertise for Installation and maintenance
o Unidirectional light propagation.
o Higher Cost.
Multimode Propagation
Multimode is so named because multiple beams from a light source move through the core in
different paths.
How these beams move within the cable depends on the structure of the core.
Single-Mode Propagation
Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal.
The single-mode fiber itself is manufactured with a much smaller diameter than
that of multimode fiber, and with substantially lower density (index of refraction).
The decrease in density results in a critical angle that is close enough to 90° to
make the propagation of beams almost horizontal.
In this case, propagation of different beams is almost identical, and delays are
negligible. All the beams arrive at the destination “together” and can be
recombined with little distortion to the signal.
UNGUIDED MEDIA
o An unguided transmission transmits the electromagnetic waves without using any
physical medium. Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy
can flow easily.
RADIO WAVES
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o The range in frequencies of radio waves is from 3Khz to 1Khz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e.,
the wave sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
MICROWAVES
Terrestrial Microwave
o Terrestrial Microwave transmission is a technology that transmits the focused beam
of a radio signal from one ground-based microwave transmission antenna to
another.
o Microwaves are the electromagnetic waves having the frequency in the range from
1GHz to 1000 GHz.
o Microwaves are unidirectional as the sending and receiving antenna is to be
aligned, i.e., the waves sent by the sending antenna are narrowly focused.
o In this case, antennas are mounted on the towers to send a beam to another antenna
which is km away.
o It works on the line of sight transmission, i.e., the antennas mounted on the towers
are at the direct sight of each other.
Satellite Microwave
o A satellite is a physical object that revolves around the earth at a known height.
o Satellite communication is more reliable nowadays as it offers more flexibility
than cable and fibre optic systems.
o We can communicate with any point on the globe by using satellite
communication.
o The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth station.
INFRARED WAVES
SWITCHING
Advantages of Switching:
o Switch increases the bandwidth of the network.
o It reduces the workload on individual PCs as it sends the information to only that
device which has been addressed.
o It increases the overall performance of the network by reducing the traffic on the
network.
o There will be less frame collision as switch creates the collision domain for each
connection.
Disadvantages of Switching:
o A Switch is more expensive than network bridges.
o A Switch cannot determine the network connectivity issues easily.
o Proper designing and configuration of the switch are required to handle multicast
packets.
CIRCUIT SWITCHING
2. Data transfer - Once the circuit has been established, data and voice are transferred
from the source to the destination. The dedicated connection remains as long as
the end parties communicate.
Advantages
It is suitable for long continuous transmission, since a continuous transmission
route is established, that remains throughout the conversation.
The dedicated path ensures a steady data rate of communication.
No intermediate delays are found once the circuit is established. So, they are
suitable for real time communication of both voice and data transmission.
Disadvantages
Circuit switching establishes a dedicated connection between the end parties. This
dedicated connection cannot be used for transmitting any other data, even if the
data load is very low.
Bandwidth requirement is high even in cases of low data volume.
There is underutilization of system resources. Once resources are allocated to a
particular connection, they cannot be used for other connections.
Time required to establish connection may be high.
It is more expensive than other switching techniques as a dedicated path is required
for each connection.
PACKET SWITCHING
o The packet switching is a switching technique in which the message is sent in one
go, but it is divided into smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as packets and packets are given a
unique number to identify their order at the receiving end.
o Every packet contains some information in its headers such as source address,
destination address and sequence number.
o Packets will travel across the network, taking the shortest path as possible.
o All the packets are reassembled at the receiving end in correct order.
o If any packet is missing or corrupted, then the message will be sent to resend the
message.
o If the correct order of the packets is reached, then the acknowledgment message
will be sent.
In this example, all four packets (or datagrams) belong to the same message, but
may travel different paths to reach their destination.
Routing Table
In this type of network, each switch (or packet switch) has a routing table which is based on the desti
A virtual circuit identifier (VCI) that uniquely identifies the connection at this switch. A
VCI, unlike a global address, is a small number that has only switch scope; it is used by a
frame between two switches. When a frame arrives at a switch, it has a VCI; when it
leaves, it has a different VCI.
Types of Virtual Circuits
There are two broad classes of Virtual
Circuits. They are
1. PVC – Permanent Virtual Circuit
Network Administrator will configure the state
The virtual circuit is permanent (PVC)
Delay in Virtual-Circuit
Networks
PACKET SWITCHING
CIRCUIT SWITCHING
Virtual Circuit Datagram Switching
Switching
MESSAGE SWITCHING
Protocol Graph
The set of protocols that make up a network system is called a protocol graph.
The nodes of the graph correspond to protocols, and the edges represent a
dependence relation.
For example, the Figure below illustrates a protocol graph consists of protocols
RRP (Request/Reply Protocol) and MSP (Message Stream Protocol) implement
two different types of process-to-process channels, and both depend on the HHP
(Host-to- Host Protocol) which provides a host-to-host connectivity service
OSI MODEL
o OSI stands for Open System Interconnection.
o It is a reference model that describes how information from a software application
in one computer moves through a physical medium to the software application in
another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
The physical layer coordinates the functions required to transmit a bit stream
over a physical medium.
The physical layer is concerned with the following functions:
Physical characteristics of interfaces and media - The physical layer defines the
characteristics of the interface between the devices and the transmission medium.
Representation of bits - To transmit the stream of bits, it must be encoded to
signals. The physical layer defines the type of encoding.
Signals: It determines the type of the signal used for transmitting the information.
Data Rate or Transmission rate - The number of bits sent each second –is also
defined by the physical layer.
Synchronization of bits - The sender and receiver must be synchronized at the bit
level. Their clocks must be synchronized.
Line Configuration - In a point-to-point configuration, two devices are connected
together through a dedicated link. In a multipoint configuration, a link is shared
between several devices.
Physical Topology - The physical topology defines how devices are connected to
make a network. Devices can be connected using a mesh, bus, star or ring
topology.
3. NETWORK LAYER
This layer is responsible for the delivery of packets from source to destination.
It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
The other responsibilities of this layer are
Logical addressing - If a packet passes the network boundary, we need another
addressing system for source and destination called logical address. This
addressing is used to identify the device on the internet.
Routing – Routing is the major component of the network layer, and it determines
the best optimal path out of the multiple paths from source to the destination.
4. TRANSPORT LAYER
5. SESSION LAYER
6. PRESENTATION LAYER
7. APPLICATION LAYER
This layer enables the user to access the network. It handles issues such as network
transparency, resource allocation, etc. This allows the user to log on to remote user.
The other responsibilities of this layer are
FTAM (File Transfer, Access, Management) - Allows user to access files in a
remote host.
Mail services - Provides email forwarding and storage.
Directory services - Provides database sources to access information about
various sources and objects.
APPLICATION LAYER
An application layer incorporates the function of top three
OSI layers. An application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
Protocols such as FTP, HTTP, SMTP, POP3, etc running in the application layer
provides service to other program running on top of application layer
TRANSPORT LAYER
The transport layer is responsible for the reliability, flow control, and correction of
data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
o UDP – UDP provides connectionless service and end-to-end delivery of
transmission. It is an unreliable protocol as it discovers the errors but not
specify the error.
o TCP – TCP provides a full transport layer services to applications. TCP is a
reliable protocol as it detects the error and retransmits the damaged frames.
INTERNET LAYER
The internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Internet layer handle the transfer of information across multiple networks through
router and gateway .
IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
7 All packets are reliably delivered TCP reliably delivers packets, IP does
not reliably deliver packets
NETWORK PERFORMANCE
Network performance is measured in using:
Bandwidth, Throughput, Latency, Jitter, RoundTrip Time
BANDWIDTH
The bandwidth of a network is given by the number of bits that can be transmitted
over the network in a certain period of time.
Bandwidth can be measured in two different values: bandwidth in hertz and
bandwidth in bits per second.
Bandwidth in Hertz
o Bandwidth in hertz refers to the range of frequencies contained in a composite
signal or the range of frequencies a channel can pass.
o For example, we can say the bandwidth of a subscriber telephone line is 4 kHz.
Relationship
o There is an explicit relationship between the bandwidth in hertz and bandwidth in
bits per second.
o Basically, an increase in bandwidth in hertz means an increase in bandwidth
in bits per second.
THROUGHPUT
Throughput is a measure of how fast we can actually send data through a network.
Bandwidth in bits per second and throughput may seem to be same, but they are
different.
A link may have a bandwidth of B bps, but we can only send T bps through this
link. (T always less than B).
In other words, the bandwidth is a potential measurement of a link; the throughput
is an actual measurement of how fast we can send data.
For example, we may have a link with a bandwidth of 1 Mbps, but the devices
connected to the end of the link may handle only 200 kbps. This means that we
cannot send more than 200 kbps through this link.
Problem :
A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames
per minute with each frame carrying an average of 10,000 bits. What is the
throughput of this network?
Solution
We can calculate the throughput as
LATENCY (DELAY)
The latency or delay defines how long it takes for an entire message to travel
from one end of a network to the other.
Latency is made up of four components: Propagation time, Transmission time,
Queuing time and Processing delay.
Propagation Time
o Propagation time measures the time required for a bit to travel from the source to
the destination.
o The propagation time is calculated by dividing the distance by the propagation
speed.
o The propagation speed of electromagnetic signals depends on the medium and on
the frequency of the signal.
Transmission Time
o In data communications we don’t send just 1 bit, we send a message.
o The first bit may take a time equal to the propagation time to reach its destination.
o The last bit also may take the same amount of time.
o However, there is a time between the first bit leaving the sender and the last bit
arriving at the receiver.
o The first bit leaves earlier and arrives earlier.
o The last bit leaves later and arrives later.
o The transmission time of a message depends on the size of the message and the
bandwidth of the channel.
Queuing Time
o Queuing time is the time needed for each intermediate or end device to hold the
message before it can be processed.
o The queuing time is not a fixed factor. It changes with the load imposed on the
network. When there is heavy traffic on the network, the queuing time increases.
o An intermediate device, such as a router, queues the arrived messages and
processes them one by one.
o If there are many messages, each message will have to wait.
Processing Delay
o Processing delay is the time that the nodes take to process the packet header.
o Processing delay is a key component in network delay.
o During processing of a packet, nodes may check for bit-level errors in the packet
that occurred during transmission as well as determining where the packet's next
destination is.
JITTER
o RTT refers to how long it takes to send a message from one end of a network to the
other and back, rather than the one-way latency. This is called as round-trip time
(RTT) of the network.
Problem 1:
What is the propagation time if the distance between the two points is 12,000 km?
Assume the propagation speed to be 2.4 × 108 m/s .
Solution :
Propagation time = (12000 * 1000) / (2.4 × 108) = 50 ms
Problem 2:
What are the propagation time and the transmission time for a 2.5-KB (kilobyte)
message (an email) if the bandwidth of the network is 1 Gbps? Assume that the
distance between the sender and the receiver is 12,000 km and that light travels at
2.4 * 108 m/s.
Solution:
Propagation time = (12000 * 1000) / (2.4 * 108 ) = 50 ms
Transmission time = (2500 * 8) / 109 = 0.02 ms
Problem 3:
What are the propagation time and the transmission time for a 5-MB (megabyte)
message (an image) if the bandwidth of the network is 1 Mbps? Assume that the
distance between the sender and the receiver is 12,000 km and that light travels at
2.4 * 108m/s.
Solution:
Propagation time = (12000 * 1000) / (2.4 * 108 ) = 50 ms
Transmission time = (5000000 * 8) / 106 = 40 s