Chapter 10-Data Communication and Networking
Chapter 10-Data Communication and Networking
Data Transmission/communication:
It is the process of transferring data through networked computers. It involves the
transmission or passing of data and information from one computer (or device) to another.
For transmission to occur, there must be the following:
- Sender
- Transmission media
- Receiver
Transmitted data can be in analogue or in digital form.
- Digital Data: Data is in discrete value, that is, in ones and zeros. Digital data has the
following advantages:
Digital data produces high quality output.
It is easier to represent.
Rebooting is easier
Data is compressed and therefore takes less disc storage space
In some
- Analogue Data: Data is in continuously varying form, e.g. human voice. This is difficult to
handle as it will be in form of waves. Sensors collect data in analogue form, eg. 67, 93 are
all analogue data
Transmission Media
Transmission media refers to the path through which data is transferred from one point to
another. Transmission media can be either guided or unguided.
1. Unshielded Twisted Pair: These are cables with two copper wires of about 1 millimetre
thick. The wires are twisted to avoid crosstalk. Twisted pair is very cheap to buy and offer
good performance over short distances.
Disadvantages of twisted pair: Twisted pair is very cheap to buy. Has big attenuation. Has
low bandwidth
Page 1 of 21
- Has low error rates.
- Can transmit analog and digital signals
- Ensures accurate data transfer.
- However, coaxial cable is expensive to buy and is stiff, making it difficult to handle.
- They are suitable for short distance communication on a LAN
- Application: Used for TV distribution (connecting decoders with the antenna on the
satellite dish); long distance telephone transmission; short run computer system links,
Local area networks
3. Fibre optic: A media that uses light to transmit data. Used in Wan and Man networks. Its
benefits are:-
It has less attenuation and therefore fewer repeaters are needed,
has very high bandwidth and cannot corrode (not affected by corrosion),
it is thin and therefore has less weight.
It allows very fast data transfer,
has no electromagnetic interference,
is physically secure.
Fibre optics is in two forms, multimode and monomode. Multimode fibre optic cable carries 2
or more signals at a time, each at a slightly different reflection angle. This is used over short
distances. Monomode (Single mode) cable carried one signal at a time and is appropriate for
long distance communication.
However, fibre optics is very expensive to buy and is uni-directional (travels in one direction
only). Cable cannot bend around tight corners. It is also difficult to interface with computers.
Unguided Transmission
Wireless Transmission media
1. Bluetooth (Refer to presentations)
Page 2 of 21
2. Radio (refer to presentations)
3. WIFI (Wireless Fidelity)
It is a Wireless LAN(A local area network) that uses high frequency radio signals to
transmit and receive data over distances of a few hundred feet; using Ethernet protocol.
it is a set of standards that set forth the specifications for transmitting data over a
wireless network. There must be a wireless router which enables wireless devices to
connect to the network and to the internet.
- Range: Wi-Fi provides local network access for around a few hundred metres
- Speed: maximum of 54 Mbps,
- Provides local area network
- Limited to one subscriber
- Can be used where cables cannot run
- Wireless network adaptors are inbuilt withion most devices like laptops, therefore
cheaper and easier to get.
- Tend to be slower if more devices are added to the network
-
4. WIMAX (World Wide Inter-operability for Marking Access)
- a single WiMAX antenna is expected to have a range of up to 30 Kilometres
- Speed: with speeds of 70 Mbps or more. As such, WiMAX can bring the underlying
Internet connection needed to service local Wi-Fi networks
- Can accommodate many subscribers
-
5. Infra-red waves: Refers to data transmission in form of waves as through some remote
controls of televisions. It has enormous bandwidth. However, infrared waves do not
travel through obstacles like buildings, they only work for very short distances, affect
eyes and consume a lot of power.
6. Satellite transmission: These include earth stations which communicate with
geostationary satellites (36 000 to 80 000 km above the earth. These have high
bandwidth and support very long distance communication. However, they have big
attenuation and are slow in sending messages.
- This is a method of networking computers and computer devices without the use of cabling,
e.g. using bluetooth, radio, satellite and infra-red.
- The devices that are used in wireless technology include:
3G (Wireless Application Protocol (WAP)) mobile phones / cellphone / remote
keypad/remote control/remote keyboard.
Infra-red mouse.
Multimedia mobile handsets and
Notebooks.
GPRS (general packet radio service) modems.
GPS - A navigational system involving satellites and computers that can determine the latitude
and longitude of a receiver on earth by computing the time difference for signals from different
satellites to reach the receiver
Page 3 of 21
- Ensures fast wireless Internet access, depending on the technology being used.
- Wireless LAN is faster than a modem or mobile.
- Wireless LAN enables working at home.
- Users can create and send multimedia messages to mobiles or e-mail while in transit.
- Users can send greetings from mobiles to mobiles/PCs.
- Ensures instant transmission.
- Users can download e-mail and file attachments while on mobile.
- Users can watch live web cast on mobile.
- Users can listen to streaming video on mobile.
- Users can watch news, weather, sport, games while on the move.
- Users can access information from mobile anytime.
- Users can send, receive, delete e-mail while on the move.
- Users can view business appointments while out of office on mobile.
- Users can send corporate e-mail while out of office - even behind a firewall on mobile.
- Users can use wireless internet connection from chat rooms for discussions with colleagues
while on the move.
Asynchronous Transmission:
- This is whereby data is send character by character over a transmission channel.
- This is much slower as compared to synchronous transmission.
- A start bit and two stop bits marks the beginning and ending of a character
respectively.
- The start and the stop bit are always different.
Page 4 of 21
- The start bit alerts the receiving end and synchronises its clock, ready to receive the
character. The baud rate of the two devices is set to be similar so as to correctly receive
the data.
- A parity bit is included to check against incorrect transmission.
- Each character is send as soon as it becomes available rather than waiting for the clock
pulse
Broadband transmission
- This is a multi-channel system where several channels are combined into one carrier
signal, where the bandwidth is shared by different channels.
- Broadband carries multiple signals on a fixed carrier wave.
- Bandwidth is shared by different channels.
- It offers faster transmission rates
- Enables transmission of voice, video, computer data, etc, simultaneously.
Page 5 of 21
- Broadband is expensive to install and maintain
-
Transmission Modes
Transmission modes include Simplex, Duplex (Full duplex) and Half Duplex
Simplex Mode: This is a mode of data transmission in which data travels only in one direction.
Thus one computer acts as the sender and the other as a receiver at any given time. A good
example is teletext service. See diagram below:
Half Duplex: This is a transmission mode in which data travels in both directions but not
simultaneously. The receiver waits until the sender has finished sending data in order for him
to respond. Examples include police radios, uses ‘Over’ to allows time for other to transmit
Transmission impairments
This refers to change in signal form as it propagates through the transmission channel.
Transmission impairments include:
Attenuation: The loss of signal power as it moves through the transmission channel.
Noise: Occurs when an unwanted signal from other sources than the transmitter enters the
transmission channel.
Distortion – means that the signals are deformed a more or less different signal as it
propagates through the medium
Multiplexing
This is a method of allowing multiple signals to share the same channel, reducing too much
cabling, as shown below:
Page 6 of 21
A multiplexer is used in
multiplexing. A multiplexer is
a device that joins two or
more channels into one
channel while the de-
multiplexer is responsible for
splitting a channel into a
number of them for easy
transmission to the intended
destination.
Bandwidth
Refers to the carrying capacity of a transmission channel. It is generally the volume of data that
a communication channel can carry at a given time. It is the difference between the lowest and
the highest (range) amount of data that a channel can transmit. It determines the amount of
data a channel can transmit at a given period of time. Fibre optic cables have high bandwidth
and therefore transmits data faster than coaxial cables, which have low bandwidth.
Baud rate: the amount of bits that can be send of a channel per second. It is a key measure of
data transfer rate. One baud = one bit per second
Page 7 of 21
o More effective transmission
o Less transmission errors
- Disadvantages Circuit switching (CS)
o Channel reservation for duration of connection even if no data are being
transferred is an inefficient media use process.
o Long delays in call setup.
o Designed for voice traffic (analog).
Packet switching:
- Data is first split into smaller chunks called packets (or datagrams) which may take
different routes and then reassembles to the original order at their destination.
- Packets are routed to the next (intermediate) node along an appropriate route, which
can store and transmit the packet until the destination.
- Each packet takes its own convenient path and then re-assembled at the receiving end.
- Packets do not necessarily arrive at the same time or in correct order.
- At the destination, packets are re-grouped to the original message.
- Packets can be of fixed size
- Each packet has the following data: source address, destination address, error control
signal, packet size, packet sequence number, etc.
NB: A virtual circuit must be established between the sender and the receiving end. Virtual
circuit – A temporary 'dedicated' pathway between two communicating points on a Packet
Switched System before sending of packets. Bandwidth is allocated for a specific transmission
pathway.
Message Switching
This is whereby the whole message may be routed by any convenient route.
No physical/dedicated path is established in advance between sender and receiver
Data is stored at a hop (which may be router) then forwarded one hop later.
Each block is received in its entity form, inspected for errors
Data is not transmitted in real time.
Blocking cannot occur
Delays are very common
Sender and receiver need not be compatible since sending will be done by routers, which
can change data format, bit rate and then revert it back to original format on receiving or
submit it in different form.
Storing data solves congested networks since data can be stored in queue and forwarded
later when channel becomes free
Page 8 of 21
Priorities can be used to manage networks
Very slow if the number of nodes is many since each node stores before forwarding the
data
In message switching, whole message is routed in its entirety, one hop at a time.
Now implemented over packet or circuit switched data networks.
Each message is treated as a separate entity.
Each message contains addressing information, which is used by switch for transfer to
the next destination.
Also called a store and forward network
Used in e-mails and in telex forwarding
There is often no real limit on the message / block size.
Advantages
• more devices can share network bandwidth
• reduced traffic congestion
• one message can be sent to many destinations through broadcast addresses
Disadvantages
• often costly – must have large storage devices to hold potentially long messages
• not compatible with most real time applications
Transmission protocols
A protocol is a set of rules that govern how data is transferred in a network. It defines the rules
on how network devices communicate, e.g the TCP/IP. This includes:
A network communication protocol: a standard method for transmitting data from one
computer to another across a network. Some of the protocols are:
i. HTTP (HyperText Transfer Protocol)
This is a protocol that defines the process of identifying, requesting and transferring
multimedia web pages over the internet. It is used for transferring data across the
internet, usually between servers and computers on the internet. It is based on the
client –server relationship. It uses TCP/IP to transmit data and messages
ii. FTP (File Transfer Protocol)
it is a protocol used to transfer data from one computer to another. It is often used to
download software from the internet, and it uses the TCP/IP protocol in doing this.
However, FTP has no security to data as the data is not encrypted prior to its
transmission.
iii. TELNET
This is a network protocol that allows a computer user to gain access to another
computer and use its software and data, usually on a LAN and on the Internet. It allows
users to access data stored on servers from their terminals. Telnet allows computers to
connect to each other and allows sharing of data and files. Telnet has security problems
especially on the internet.
iv. VoIP (Voice Over Internet Protocol)
Page 9 of 21
It is a method of using the internet to make ordinary voice telephone calls. Thus it is a
way of having phone conversations using the internet as a way of communication. By
VoIP, international and long distance calls are of the same price as local calls and
sometimes are for free. However, the system does not offer emergency calls. An
example of VoIP is Skype.
At each level, additional information is added to allow service to be provided. This layered
model is also called protocol stack
NETWORKING
Types of networks
Page 10 of 21
i. LAN (Local Area Network
A LAN is a privately owned connection of computers on a very small geographical area for
sharing of data and files by users of the network, for example, within an single room. Usually
connected using cables of radio connections.
Page 11 of 21
WAN refers to connection of computers over a very large geographical area and may cover
the whole world. The internet is part of the WAN. A WAN is created by joining several LANs
together, for example, connecting different branches of a company that are in different
provinces or countries. Computers are usually linked together using fibre optic cables,
satellite links, telephone lines, etc.
Gateways are usually used to bridge the different networks.
A router is very intelligent. It uses network addresses and IP addresses of other routers
to create routes between two networks. They keep tables of addresses that will be used
in routing information. Routers are thus used for:
Determining the path of data packets using destination addresses of the packets.
Used for packet switching
Gateway: - a device used to connect different kinds of networks. Thy act as link to
different WANs. A gateway is a device that connects networks with different
architectures and different protocols. When packets arrive at a gateway, the software
strips all networking information from the packet, leaving only the raw data. The
gateway translates the data into the new format and sends it on using the networking
protocols of the destination system. Thus it becomes a protocol converter.
Modem (MOdulator DEModulator):- This is a device that converts digital signal received
from a computer into an analogue signal that can be sent along ordinary telephone
lines, and back to digital at the receiving end. Mostly used to connect to the internet
using the ordinary telephone line. The speed of modems is measured in bits per second
e.g. 56K bps. The following parameters must be specified when a modem is installed:
the telephone number of the ISP
baud rate of modem
number of data bits per block
number of stop bits
whether odd or even parity is used
Cable modems - employ broadband transmission across regular cable television wires
Integrated Services Digital Network (ISDN) line – it is a digital telephone service that
provides fast, accurate data transmission over existing copper telephone wiring, for
internet connection. It is a set of communication standards for simultaneous digital
Page 12 of 21
transmission of voice, video, data, and other network services over the traditional
circuits of the public switched telephone network. ISDN is a line that allows the
transmission of digital signals without them being changed into analogue which leads to
improved quality for the user. It requires a network adapter and a network termination
device (no modem required)
Asymmetric Digital Subscriber Line (ASDL) - offers Internet connection up to 30 times
faster than dial-up modems still using traditional copper wires but allocating more
bandwidth to the data flow from the ISP to the PC than is allocated from the PC to the
ISP
Dial-up networking: user pays for the amount of time spent using the telephone link. It
is less expensive. more appropriate for low-volume applications requiring only
occasional transmission
Dedicated/leased line: the line is continually available for transmission and the user
pays a flat rate for total access to the line. It transmits data at higher speeds. It is more
appropriate for high volume transmission
Electronic data interchange (EDI):-e.g. transmitting A level results to schools using BT's
CampusConnect . virtually instantaneous electronic transmission of business data from
one firm's computerised information to that of another firm. It increases accuracy and
eliminates delays.
Internetwork:- This is created when two or more independent networks are connected
but continue to function separately e.g. Internet. In larger networks it is common to
supply multiple paths through the network to provide fault tolerance
Page 13 of 21
This refers to the shape/configuration of the network. This may refer to logical or physical
configuration. The shape of the cabling layout used to link devices is called the physical
topology of the network. This refers to the layout of cabling, the locations of nodes, and the
interconnections between the nodes and the cabling. The physical topology of a network is
determined by the capabilities of the network access devices and media, the level of control or
fault tolerance desired, and the cost associated with cabling or telecommunications circuits.
The logical topology is the way that the signals act on the network media, or the way that the
data passes through the network from one device to the next without regard to the physical
interconnection of the devices. Logical topology is not necessarily the same as its physical
topology. For example, the original twisted pair Ethernet using repeater hubs was a logical bus
topology with a physical star topology layout. Token Ring is a logical ring topology, but is
wired a physical star from the Media Access Unit.
Common network topologies are Ring, bus, star, mesh and hybrid network topologies.
Page 14 of 21
Token passing
a small packet called a token is passed around the ring to each computer in turn
to send information, a computer modifies the token, adds address information and
sends it down the ring
information travels around the ring until it reaches its destination or returns to the
sender
when a packet is received by the destination computer, it returns a message to the
sender indicating its arrival
2. Star Network:
Computers form a star shape with host computer at the centre.
The Server (host computer) manages all other computers/terminals on the network.
If the terminals are not intelligent, they have to rely on the host computer for everything.
This network is as shown below:
Page 15 of 21
computers connected by cable segments to a central hub/switch
a signal sent from a computer is received by the hub and retransmitted down every
other cable segment to all other computers on the network
only the computer the signal is addressed to acts upon the data
if one computer fails, the others are unaffected
if the hub goes down, the whole network goes down
3. Mesh Network
- A network in which each computer serves as a relay point for directly sending information
to any other computer on the network.
Page 16 of 21
- No central device oversees a mesh network, and no set route is used to pass data back and
forth between computers.
- Thus, if any one computer is damaged or temporarily unavailable, information is
dynamically rerouted to other computers—a process known as self-healing
Page 17 of 21
Definition of Terms
(a) Bus/Backbone: the dedicated and main cable that connects all workstations and other
computer devices like printers.
(b) Nodes: these are connection points for workstations and the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing noise and
prevents data from getting lost.
5. Hybrid
This topology is a combination of two or more different network topologies into one. When
different topologies are connected to one another, they do not display characteristics of any
one specific topology.
Page 18 of 21
Advantages of hybrid topology
1. Flexibility:- adding / removing other peripheral connections is easy.
2. More reliable: it is easier to isolate the different topologies connected to each other and
find the fault with the hybrid topology.
3. Speed: Speed is consistent, combines strengths of each topology and eliminates
weaknesses
4. Effective: The weaknesses of the different topologies connected are neglected and only the
strengths are taken into consideration.
5. Scalable: It is easy to increase the size of network by adding new components, without
disturbing existing architecture.
CSMA/CD control software is relatively simple and produces little overhead. CSMA/CD
network works best on a bus topology with burst transmission
Disadvantages
Page 19 of 21
• CSMA/CD protocols are probabilistic and depends on the network (cable) loading.
• Considered unsuitable for channels controlling automated equipment that must have
certain control over channel access. (This could be OK for different channel access).
• We can set priorities to give faster access to some devices (This is, probably, not an
issue in some applications)
Advantages
• Even though there is more overhead using tokens than using CSMA/CD, performance
differences are not noticeable with light traffic and are considerably better with heavy
loads because CSMA/CD will spend a lot of time resolving collisions.
• A deterministic access method such as Token Ring guarantees that every node will get
access to the network within a given length of time. In probabilistic access method
(such as CSMA/CD) nodes have to check for network activity when they want to access
the network.
Disadvantages
• Components are more expensive than for Ethernet or ARCnet.
• Token Ring architecture is not very easy to extend to wide-area networks (WANs).
Page 20 of 21
• Token Ring network is much more expensive than Ethernet. This is due to the complex
token passing protocol.
d) Contention
• With contention systems, network devices may transmit whenever they want.
• No referee mandates when a device may or may not use the channel.
• This scheme is simple to design
• The scheme provides equal access rights to all stations.
• Stations simply transmit whenever they are ready, without considering what other
stations are doing.
• Unfortunately, the "transmit whenever ready" strategy has one important
shortcoming.
• Stations can transmit at the same time.
• When this happens, the resulting co-mingling of signals usually damages both to the
point that a frame's information is lost.
• This unhappy event is called a "collision."
Polling Access Method
• Polling is an access method that designates one device (called a "controller", "primary",
or "master") as a channel access administrator.
• This device (Master) queries each of the other devices (“secondaries”) in some
predetermined order to see whether they have information to transmit.
• If so, they transmit (usually through the master).
• Secondaries may be linked to the master in many different configurations.
• One of the most common polling topologies is a star, where the points of the star are
secondaries and the master is the hub.
• To get data from a secondary, the master addresses a request for data to the
secondary, and then receives the data from the secondary sends (if secondary sends
any).
• The primary then polls another secondary and receives the data from the secondary,
and so forth.
• System limits how long each secondary can transmit on each poll.
Advantages
• Polling centralizes channel access control.
• Maximum and minimum access times and data rates on the channel are predictable
and fixed.
• Priorities can be assigned to ensure faster access from some secondaries.
• Polling is deterministic and is considered suitable for channels controlling some kinds
of automated equipment.
Disadvantages
• Polling systems often use a lot of bandwidth sending notices and acknowledgments or
listening for messages.
• Line turnaround time on a half- duplex line further increases time overhead.
• This overhead reduces both the channel's data rate under low loads and its
throughput.
Page 21 of 21