CN Unit 1
CN Unit 1
Syllabus :
Introduction: Data communication, Components, Computer networks and its historical
development, distributed processing, Internet.
Network Models: OSI model and TCP/IP Model.
Physical Layer: Physical layer functions, Data Representation, Simplex, Half Duplex and
Full Duplex Transmission, Modulation and Multiplexing, Packet and circuit switching,
Transmission media, Topologies, connectionless and connection-oriented services.
Data Link Layer: Data link layer functions and services, MAC Addressing, Framing, Stop
and Wait, Go back – N ARQ, Selective Repeat ARQ, Sliding Window Protocol.
Section 1 : Introduction
Overview
Data communications is simply the exchange of data between two devices locally or
globally via some form of transmission medium (e.g., wire cable, bluetooth, wifi, etc.) to
share resources with each other. Here, the data refers to information presented or
represented in relevant format.
1. Delivery: The system must ensure that the data reaches the correct destination. It
is important that the data is received by the intended user or device and no one
else.
2. Accuracy: The data must arrive at its destination without any errors. If data is
altered during transmission and goes uncorrected, it becomes unusable.
3. Timeliness: Data needs to be delivered on time. In real-time applications like video
or audio streaming, data must be transmitted in the correct order and without
delays. Late data is often of no use, especially in real-time communication.
4. Jitter: Jitter refers to the variation in the time it takes for data packets to arrive. In
applications like video or audio streaming, inconsistent packet arrival times can
result in poor quality, such as jerky video playback or distorted audio.
1
NotesNeo
Components of Data Communication System
A data communication system is made up of five key components that work together to
transfer information between devices. These are:
1. Message: The information or data that is being sent from one device to another. It
can be text, image, audio, video, or any other type of data.
a. Text: Sent as a sequence of characters, typically encoded using standards
like ASCII or Unicode.
b. Image: Transmitted as a series of pixels, often compressed using formats
like JPEG or PNG to reduce size.
c. Audio: Sent as digital signals, usually compressed using codecs like MP3 or
AAC for efficient transmission.
d. Video: Transmitted as a sequence of frames, compressed using formats like
MP4 or AVI to reduce bandwidth.
e. Other Data: Files or binary data can be sent in raw or compressed formats
depending on the type of data and transmission needs.
2. Sender: The device or computer that sends the message. Examples include a
phone, computer, or any other device that can transmit data.
3. Receiver: The device or computer that gets the message. It could be another
phone, computer, or any other device meant to receive the transmitted data.
4. Transmission Medium: The path or channel through which the message travels
from the sender to the receiver. Examples include cables (wired) or radio waves
(wireless, like Wi-Fi).
5. Protocol: A set of rules that both the sender and receiver follow to ensure the
message is correctly sent and understood. These rules help with things like timing,
data format, and error checking.
Definition
● A computer network is a group of interconnected computers and devices that
communicate and share resources with each other through various transmission
media, such as wires, optical fibers, or wireless links.
● These devices can include computers, servers, routers, switches, and other
networked devices.
● The primary goal of a computer network is to facilitate resource sharing among
different devices.
2
NotesNeo
Network Criteria
For a network to function effectively, it must meet certain key criteria. The three most
important criteria are performance, reliability, and security.
1. Performance:
Performance refers to how efficiently the network operates, and it can be measured by:
● Transit Time: The time it takes for data to travel from one device to another.
● Response Time: The time between sending a request and receiving a response.
Several factors impact network performance, such as the number of users, the type
of transmission medium (e.g., fiber optics, wireless), the hardware capabilities, and
the software's efficiency.
2. Reliability:
Reliability focuses on how dependable the network is, measured by:
● Frequency of Failures: How often the network experiences issues.
● Recovery Time: The time it takes for the network to recover after a failure.
● Robustness: The network’s ability to withstand and recover from major events like
hardware malfunctions or natural disasters.
3. Security:
Security is essential to protect the network from threats. It includes:
● Data Protection: Safeguarding data from unauthorized access.
● Data Integrity: Ensuring that data is not damaged or tampered with.
● Recovery: Implementing measures to recover from data breaches or losses.
The development of computer networks began in the 1960s when researchers started
exploring ways for computers to communicate with each other.
1. 1960s: The ARPANET was created by the U.S. Department of Defense in 1969,
becoming the first packet-switching network and the foundation of the modern
3
NotesNeo
internet. It connected computers at universities and research institutions It
connected four computers at UCLA, SRI, UCSB, and Utah.
2. 1970s: The TCP/IP protocol was developed, allowing different networks to
communicate. This became the standard protocol for networking and remains
crucial today.
3. 1980s: Local Area Networks (LANs), like Ethernet, were introduced, allowing
computers in close proximity to share resources like printers and data.
4. 1990s: The World Wide Web (WWW) was invented by Tim Berners-Lee,
revolutionizing the way people accessed and shared information online. The
internet rapidly expanded globally.
5. 2000s to Present: The rise of wireless networks, Wi-Fi, and mobile technologies
enabled seamless internet access from anywhere. Networks became faster and
more secure, supporting a wide range of applications like social media, cloud
computing, and online services.
2. Hub
● Function: A Hub is a hardware device that acts as a central connection point for
multiple devices in a network. It receives a request for data from one device and
distributes it to all connected devices.
● The process used by the Hub consumes more bandwidth and limits the amount of
communication. Nowadays, the use of hub is obsolete, and it is replaced by more
advanced computer network components such as Switches, Routers.
● Limitation: Broadcasts data to all devices, leading to potential inefficiency and
data collisions.
3. Switch
● Function: A switch is a hardware device that is similar to a hub but more efficient
and advanced. A Switch does not broadcast the message to the entire network like
4
NotesNeo
the Hub. It connects devices within a network and forwards data only to the
specific device for which it is intended.
● Advantage: Reduces unnecessary data traffic and increases the speed of the
network improving network performance.
4. Router
● Function: A router is a hardware device which is used to connect different networks,
including LANs to the internet. It is used to receive, analyze and forward the
incoming data packets to another destination network.
● Layer: A router operates at Layer 3 (Network Layer) of the OSI model.
● Routing Table: A router forwards the packet based on the information available in
the routing table.
● Path Determination: It determines the best path from available routes for packet
transmission.
● Advantages:
○ Security: Only the specified addressed device can read the transmitted data.
○ Reliability: Network reliability is maintained even if one server fails.
○ Performance: Enhances network performance by reducing traffic load
through network segmentation.
5. Modem
● Function: A modem is a hardware device that connects a computer to the internet
over existing telephone lines. A modem is not integrated with the motherboard
rather than it is installed on the PCI slot found on the motherboard.
● Operation: It stands for Modulator/Demodulator. It converts digital data to analog
signals over the telephonic lines.
● Types of MODEM:
○ Standard PC Modem: Also known as Dial-up modem.
○ Cellular Modem: Uses cellular networks.
○ Cable Modem: Uses cable television infrastructure.
5
NotesNeo
1. Local Area Network (LAN):
● Definition: A LAN is a network that typically spans a small geographical area, such
as a single building, office, or campus.
● Characteristics:
○ Size: Covers a small area, usually within a few kilometers.
○ Ownership: Often owned, controlled, and managed by a single organization.
○ Technology: Uses Ethernet or Wi-Fi for communication.
○ Purpose: Facilitates resource sharing (like printers, files, applications) and
communication among devices within the same organization or location.
● Examples: Office networks, school networks, home networks.
● Definition: A WAN is a network that covers a broad area, connecting multiple LANs
and other types of networks over long distances, often across cities, countries, or
continents.
● Characteristics:
○ Size: Spans a large geographic area, potentially worldwide.
○ Connectivity: Relies on public or private telecommunication infrastructures.
○ Speed: Typically slower compared to LANs due to longer distances and
varying technologies.
● Examples: The Internet, global corporate networks connecting branch offices.
● Definition: A MAN is a network that covers a larger geographic area than a LAN
but is smaller than a WAN, typically spanning a city or large campus area.
● Characteristics:
○ Size: Covers a metropolitan area or campus.
○ Connectivity: Provides high-speed connectivity for businesses, universities,
or organizations within the area.
○ Purpose: Supports communication and resource sharing over a larger
geographic region than a LAN.
● Examples: City-wide Wi-Fi networks, university campus networks.
6
NotesNeo
● Examples: Bluetooth connections between a smartphone and a smartwatch,
mobile hotspot, wireless keyboards and mice with a computer.
8. Intranet:
7
NotesNeo
○ Content: Hosts internal websites, document repositories, collaboration tools,
and other resources.
○ Purpose: Enhances internal communication, collaboration, and information
sharing.
● Examples: Corporate intranets used by employees for internal communications and
accessing company resources.
9. Extranet:
1. Communication Speed
● Description: Computer networks facilitate fast and efficient communication.
Technologies like video conferencing and email allow users to exchange
information quickly.
● Example: Video conferencing and instant messaging over the internet.
2. File Sharing
● Description: One of the significant advantages of computer networks is the ability
to share files between users easily.
8
NotesNeo
● Example: Sharing documents, images, and other files across a network.
5. Security
● Description: Networks can implement security measures to control access to files
and applications, ensuring that only authorized users can access certain resources.
● Example: User authentication and access control lists (ACLs) to protect sensitive
data.
6. Scalability
● Description: Networks can be expanded by adding new devices. Although adding
more devices may affect speed and increase the chance of errors, using routing
and switching devices can help manage these issues.
● Example: Expanding an office network to include new computers and devices.
7. Reliability
● Description: Networks can use alternative paths for data communication in case of
hardware failure, ensuring continuous operation and reducing downtime.
● Example: Redundant network paths and failover mechanisms to maintain
connectivity.
9
NotesNeo
Advantages:
● Cost-Effective: No need for a dedicated server reduces costs.
● Resilience: If one computer fails, the others continue to operate.
● Simplicity: Easy to set up and maintain as each computer is self-managed.
Disadvantages:
● Lack of Centralization: No centralized system means backing up data is
challenging, as data is stored in multiple locations.
● Security Issues: Each device manages its own security, which can lead to
vulnerabilities.
Advantages:
● Centralized System: Easier data backup and centralized resource management.
● Enhanced Performance: Dedicated server improves overall system performance.
● Improved Security: Centralized administration enhances security.
● Faster Resource Sharing: Centralized server facilitates quick sharing of resources.
Disadvantages:
● Cost: Requires an expensive server with large memory capacity.
● High Cost of Network Operating System (NOS): Servers need NOS, which can be
costly.
● Need for Network Administrator: Requires a dedicated network administrator to
manage resources.
Key Characteristics
Advantages
Disadvantages
1. Complexity:
○ Managing and coordinating multiple systems can be challenging, requiring
sophisticated algorithms and protocols.
2. Network Dependency:
11
NotesNeo
○ Performance is dependent on network speed and reliability; network issues
can lead to delays.
3. Security Risks:
○ Increased risk of security breaches due to multiple access points and data
transmission across networks.
4. Data Consistency:
○ Maintaining data consistency across distributed systems can be complex,
especially in real-time applications.
Applications
The Internet is a vast global network of interconnected computers and devices that
communicate with each other using standardized protocols. It enables the exchange of
information and resources across a wide range of platforms and services, facilitating
various applications, including the World Wide Web, email, file sharing, and more.
Key Characteristics
12
NotesNeo
History of Internet
● Origins: Evolved from ARPANET in the 1960s.
● Expansion: Rapid growth in the 1980s and 1990s with the adoption of TCP/IP and
the development of the World Wide Web.
● Commercial Use: Internet became a major commercial network in the 1990s,
supporting e-commerce and various online services.
Advantages
13
NotesNeo
Disadvantages
14
NotesNeo
2. TCP/IP Model: A four-layer model that is the foundation for the internet and
standardizes communication over various types of networks.
Layered Architecture
The International Organization for Standardization (ISO) developed a layered
approach to simplify network design and implementation.
Key Concepts
1. Services:
○ Actions provided by one layer to the layer above it.
15
NotesNeo
○ Example: Data transport service offered by the transport layer to the
application layer.
2. Protocols:
○ Rules that govern the exchange of information between peer entities in the
same layer on different machines.
○ Example: HTTP, TCP/IP.
3. Interfaces:
○ Mechanisms for passing data between layers.
○ Example: Interface between the transport and network layers for routing
data packets.
Overview
● The OSI (Open Systems Interconnection) Model is a conceptual framework used
to understand and implement network communications between different systems.
● It divides the communication process into seven distinct layers, each with specific
functions and protocols.
● It was developed by the International Organization for Standardization (ISO) in
1984.
● The OSI model outlines how data should be transmitted from a software
application in one computer, through the network medium, to a software
application in another computer.
16
NotesNeo
● Standardized Functions: Each layer performs a defined network function,
facilitating interoperability and standardization.
Key Points
● Encapsulation: Data is wrapped with the necessary protocol information as it
moves down the OSI layers.
● Decapsulation: Removing the protocol information as data moves up the OSI
layers at the receiving end.
● Standardization: The OSI model standardizes network functions to promote
interoperability between diverse communication systems.
Each layer has specific functions that help in data transmission, and each layer serves a
unique purpose in communication. Let’s break down the layers and understand their
working:
The Physical Layer is responsible for the actual transmission of raw bits over a physical
medium, such as cables, radio waves, or fiber optics. Its functions include:
17
NotesNeo
● Signal Transmission: It converts digital data from the higher layers into electrical,
optical, or radio signals that can be transmitted across the physical medium.
● Transmission Medium: It deals with physical media such as copper wires, fiber
optic cables, or wireless signals (radio waves).
● Bit Synchronization: It ensures that the bits are sent and received in proper
synchronization between devices.
Example: In a wired network, the physical layer would manage the transmission of bits
over copper cables using signals, while in a wireless network, it would manage the
transmission of data via radio waves.
The Data Link Layer ensures that data transfers between two devices on the same
network are reliable and error-free. Its functions include:
● Framing: It frames the data into packets and adds header and trailer information
to facilitate transmission over the physical medium.
● Error Detection: It checks for errors in the frames using techniques like cyclic
redundancy check (CRC).
● MAC Addressing: This layer assigns physical addresses (MAC addresses) to devices
on the local network, ensuring the proper identification and communication of
devices.
Example: When a packet is transmitted over Wi-Fi or Ethernet, the data link layer adds
the MAC address of the sender and receiver to ensure that the data reaches the correct
device on the local network.
The Network Layer manages the routing of data from one device to another, even if they
are on different networks. Its functions include:
● Routing: The network layer determines the best route for data to take through the
network using routing protocols like RIP, OSPF, or BGP.
● Logical Addressing: This layer assigns unique logical addresses (such as IP
addresses) to devices to distinguish them on the network.
● Packet Forwarding: It encapsulates data into packets and forwards them based
on the destination IP address.
Example: When you send an email, the network layer ensures that the data is routed
through various devices and networks until it reaches the destination device.
18
NotesNeo
● Segmentation and Reassembly: It divides large chunks of data into smaller
segments and reassembles them at the destination.
● Error Detection and Correction: The transport layer checks for errors in data
transmission and requests retransmission if errors are found.
● Flow Control: It ensures that data is sent at a rate that the receiving device can
handle, preventing network congestion.
● End-to-End Communication: It ensures that data is transferred between the
sender and receiver using protocols such as TCP (Transmission Control Protocol) or
UDP (User Datagram Protocol).
Example: When you download a file from the internet, the transport layer ensures that the
file is properly broken down into packets, transmitted, and reassembled correctly at the
receiving end.
The Session Layer manages sessions or connections between applications or two devices.
It is responsible for:
Example: When you log into a website, the Session Layer keeps the session active while
you browse pages.
Example: In a video conference, the session layer ensures that each participant's video
and audio streams are synchronized.
The Presentation Layer acts as a translator between the data format used by the sender
and the format understood by the receiver. Its main functions include:
● Data Translation: It translates data from the application layer into a format that
the network can understand. For example, converting a text file from a Unicode
format to ASCII.
● Data Encryption and Decryption: It ensures that sensitive data can be encrypted
before transmission and decrypted upon reception.
● Data Compression: It can also compress data before transmission to reduce
bandwidth usage and decompress it at the destination.
Example: If you are sending an encrypted message, it is the presentation layer's job to
encrypt that message before transmission and decrypt it when received.
19
NotesNeo
7. Application Layer (Layer 7)
The Application Layer is the closest layer to the user. It provides the interface for users
and applications to interact with the network. It is responsible for:
● User Interface: This is where applications such as web browsers, email clients, and
FTP programs operate.
● Protocols: It includes protocols like HTTP, FTP, SMTP, POP3, and IMAP, which allow
different software applications to communicate.
● Data Handling: The application layer ensures that data is in the correct format for
the receiving application and establishes the communication interface for users.
Example: When you use a web browser to visit a website, the Application Layer handles
the request and response using the HTTP protocol.
In practical communication, data flows from the application layer (Layer 7) on the
sending device to the physical layer (Layer 1) for transmission over the network. When the
data reaches the receiving device, it travels up from the physical layer to the application
layer.
● Sending Data:
○ At the sender's side, the data starts at the application layer and is passed
down layer by layer.
○ The data is segmented and each layer adds its own header or trailer to the
data.
○ At the physical layer, the data is transmitted over the network medium.
● Receiving Data:
○ On the receiving device, the data starts at the physical layer and moves up
to the application layer.
○ Each layer processes the data, removes its corresponding header/trailer,
and passes it to the next higher layer.
Overview
● The TCP/IP model is simpler than the OSI model, with its four layers often mapped
to the seven layers of the OSI model. It's widely used as the basis for the internet
and most modern networking systems.
● The TCP/IP (Transmission Control Protocol/Internet Protocol) Model is a simplified
and more practical model used to standardize the internet and network
communications.
● Developed before the OSI model, TCP/IP is practical and protocol-oriented,
focusing on the suite of protocols essential for Internet operations.
20
NotesNeo
● Unlike the OSI model, which has seven layers, the TCP/IP model has four layers:
Application, Transport, Internet and Network Access. The TCP/IP model integrates
several OSI layers into single layers, making it simpler and more streamlined for
real-world networking.
The Network Access Layer is the lowest layer and is responsible for the physical
transmission of data over a network medium and manages the interface between the
device and the physical network.
Functions:
21
NotesNeo
● Data Framing: Encapsulates data into frames for transmission.
● Media Access Control (MAC): Determines how devices on the network share the
physical medium.
● Error Detection: Ensures data integrity over the transmission medium.
Protocols:
● Ethernet
● Wi-Fi (IEEE 802.11)
● PPP (Point-to-Point Protocol)
Example: When you connect to the Internet using Wi-Fi, the Network Access Layer
manages the actual transmission of data over the wireless network.
2. Internet Layer
The Internet Layer is responsible for logical addressing, routing, and ensuring that data
packets travel across networks to their destination. It determines the best path for data
transmission.
Functions:
Protocols:
Example: When you send an email, the Internet Layer ensures that the email data is
routed correctly across the Internet to reach the recipient’s email server.
3. Transport Layer
Functions:
22
NotesNeo
● Segmentation and Reassembly: Divides data into smaller packets for transmission
and reassembles them at the destination.
● Reliability: Ensures data integrity using acknowledgments and retransmissions.
● Port Management: Identifies applications using port numbers.
Protocols:
Example: When you download a file, the Transport Layer ensures that each part of the file
is delivered correctly and in the right sequence.
4. Application Layer
The Application Layer (top-most) in the TCP/IP model combines the functions of the
Application, Presentation, and Session Layers of the OSI model. It is responsible for user
interaction, data formatting, and application-specific communication. This layer
directly interacts with software applications to provide communication services.
Functions:
Protocols:
Example: When you browse a website, the HTTP protocol in the Application Layer enables
communication between your browser and the web server.
1. At the sender's side, the data is generated by an application (e.g., an email client).
2. The Application Layer prepares the data for transmission using protocols like HTTP
or FTP.
3. The Transport Layer breaks the data into segments and adds control information
(e.g., TCP headers).
23
NotesNeo
4. The Internet Layer encapsulates these segments into packets, adding logical
addresses.
5. The Network Access Layer converts these packets into frames for physical
transmission.
6. At the receiver’s side, the process is reversed layer by layer until the data reaches
the application.
24
NotesNeo
Overview
● The physical layer is the first and lowest layer of the OSI model, responsible for the
physical connection between devices and the transmission and reception of raw bit
streams over a physical medium.
Key Functions
● Transmission of Raw Bits: Converts digital data into electrical, optical, or radio
signals suitable for transmission over the chosen medium.
● Data Encoding and Signaling: Defines how data is encoded into signals and how
these signals are transmitted and interpreted.
● Transmission Medium: Specifies the physical medium used for data transfer, such
as cables, fiber optics, or wireless signals.
● Bit Rate Control: Manages the rate at which data is transmitted, ensuring
synchronization between sender and receiver.
● Physical Topology: Describes the physical layout of network devices and cables.
● Transmission Mode: Defines whether data transmission is simplex, half-duplex, or
full-duplex.
Signal Representation
● Analog Signals: Continuous signals that vary over time and can represent a range
of values.
● Digital Signals: Discrete signals that represent binary data (0s and 1s).
25
NotesNeo
Data can be represented in either analog or digital form. Computers use the digital form
to store information. Therefore, data must be converted into digital form to be processed
by computers. Digital transmission involves converting and encoding data into a digital
format that can be transmitted over a communication medium.
Digital-to-Digital Conversion
Unipolar Encoding
Polar Encoding
● Characteristics: Uses two voltage levels, one positive and one negative.
● Types:
○ NRZ (Non-return to zero):
■ NRZ-L (NRZ-Level): Signal level depends on the bit (positive for 0,
negative for 1).
■ NRZ-I (NRZ-Inversion): Voltage inversion represents a 1 bit, while no
change represents a 0 bit.
26
NotesNeo
○ RZ (Return to zero):
■ Uses three values: positive, negative, and zero.
■ Signal returns to zero halfway through each bit interval.
■ Disadvantage: Requires more bandwidth due to two signal changes
per bit.
○ Biphase Encoding:
■ Manchester: Signal changes at the middle of the bit interval;
negative-to-positive for binary 1 and positive-to-negative for binary
0.
■ Differential Manchester: Signal change at the middle of the bit
interval for synchronization; transition at the beginning of the interval
represents binary 0, no transition represents binary 1.
Bipolar Encoding
Analog-to-Digital Conversion
Analog signals need to be digitized for use by digital devices. This conversion involves
transforming continuous waveforms into discrete digital pulses. Two primary techniques
for analog-to-digital conversion are PAM and PCM.
● Process: Samples the analog signal and generates a series of pulses based on the
amplitude of the signal at regular intervals.
● Disadvantage: Not inherently digital; requires further processing to become
suitable for digital communication.
27
NotesNeo
● Process:
○ Sampling (PAM): Measures the amplitude of the analog signal at regular
intervals.
○ Quantization: Assigns discrete integral values to the sampled amplitudes.
○ Binary Encoding: Converts quantized values into binary format.
○ Digital-to-Digital Encoding: Encodes the binary data into a format suitable
for transmission.
● Advantages: Standard method for converting analog signals to digital, widely used
in digital communication systems.
Transmission media are part of the Physical Layer (Layer 1) of the OSI model. They are
responsible for the actual transmission of raw bitstreams over the physical medium.
28
NotesNeo
1. Twisted-Pair Cable:
Twisted pair cables consist of pairs of insulated copper wires twisted together. This
twisting helps to reduce electromagnetic interference and crosstalk between pairs. The
degree of noise reduction depends on the number of twists per foot; more twists typically
result in less noise interference.
● Does not contain a shielding (metal mesh) around the twisted wires.
● Categories:
○ Category 1: Used for low-speed data and telephone lines.
○ Category 2: Supports up to 4 Mbps.
○ Category 3: Supports up to 16 Mbps.
29
NotesNeo
○ Category 4: Supports up to 20 Mbps, suitable for long-distance
communication.
○ Category 5: Supports up to 100 Mbps to 1 Gbps.
● Advantages:
○ Inexpensive
○ Easy to install
○ Suitable for high-speed LANs
● Disadvantages:
○ Limited to shorter distances due to attenuation
● Contains a shielding (metal mesh) around the twisted wires, reducing interference
and allowing for higher data transmission rates.
● Advantages:
○ Higher capacity than UTP
○ Provides better noise protection
● Disadvantages:
○ More expensive than UTP and coaxial cable
● Higher attenuation rate
2. Coaxial Cable:
30
NotesNeo
3. Fiber-Optic Cable:
Fiber optic cables use light pulses to transmit data, providing higher speeds and greater
bandwidth compared to copper cables. They consist of a core (light transmission area),
cladding (concentric layer of glass that reflects light back into the core), and a protective
jacket.
● Basic Elements:
○ Core: The glass or plastic center where light signals travel.
○ Cladding: Concentric layer of glass that causes reflection within the core,
enabling light wave transmission.
○ Jacket: Protective plastic coating that absorbs shock and protects the
fibers.
● Types:
○ Single-mode fibers: For long-distance transmission.
○ Multi-mode fibers: For shorter distances.
● Advantages:
○ Higher bandwidth and faster speeds.
○ Can carry data over longer distances.
○ More reliable and durable than copper cables.
● Disadvantages:
○ More expensive to install and maintain.
○ Requires specialized knowledge to work with.
1. Local Area Networks (LANs): Twisted pair and coaxial cables are commonly used
to connect computers and devices within a confined area.
2. Wide Area Networks (WANs): Optical fiber cables are preferred due to their high
bandwidth and ability to transmit data over long distances.
3. Internet Backbone Networks: Optical fiber forms the backbone of the internet,
allowing for high-capacity data transmission across large geographical areas.
4. Telecommunication Networks: Optical fibers and coaxial cables are widely used to
handle large-scale data transfer for phone and internet services.
31
NotesNeo
Advantages of Guided Transmission Media
1. Reliability: Guided media, such as twisted pair and fiber optics, offer stable and
secure communication with minimal signal loss.
2. Security: More secure than wireless alternatives, guided media reduce the risk of
signal interception.
3. Higher Bandwidth: Especially with fiber optics, guided media allow for high-speed
data transfer, meeting the needs of data-intensive applications.
4. Less Susceptible to Interference: Twisted pair and coaxial cables are less affected
by electromagnetic interference, ensuring better signal integrity.
5. Predictable Performance: Guided media offer consistent and controlled
performance, making them ideal for applications that require stable
communication.
6. Long-Distance Communication: Optical fibers have low signal attenuation,
enabling them to transmit data over long distances with minimal signal loss.
7. Cost-Effective for Short Distances: Twisted pair cables are an economical choice
for short-distance connections, especially in local area networks.
1. Limited Mobility: Devices connected through wired media have restricted
movement, making them unsuitable for mobile communications.
2. Vulnerability to Physical Damage: Guided media are prone to physical damage,
such as cuts and environmental factors, which can disrupt communication.
3. High Initial Costs for Long Distances: Installing optical fiber networks, especially
for long distances, can be expensive due to infrastructure costs.
4. Bandwidth Limitations in Some Media: Twisted pair cables have lower bandwidth
compared to optical fibers, limiting their use in high-speed applications.
5. Infrastructure Dependency: Network upgrades or changes can require substantial
infrastructure modifications, leading to downtime and increased costs.
6. Environmental Impact: The production and disposal of physical media,
particularly cables, can have environmental consequences.
1. Radio Waves:
Radio waves are electromagnetic waves transmitted in all directions. The frequency
range of radio waves spans from 3 kHz to 1 GHz. They are omnidirectional, meaning
signals can propagate everywhere in free space.
32
NotesNeo
2. Microwaves:
Microwaves have frequencies ranging from 1 GHz to 1000 GHz and are used in
point-to-point communication systems. Microwaves are further divided into two types:
Terrestrial Microwaves and Satellite Microwaves.
● Description: Uses focused beams of radio signals from one ground-based antenna
to another. Microwaves are unidirectional, meaning the sending and receiving
antennas must be aligned.
● Frequency Range: Microwaves operate within 1 GHz to 1000 GHz.
● Line-of-Sight Transmission: Antennas are mounted on towers and must be in
direct sight of each other for signal transmission.
33
NotesNeo
Advantages of Terrestrial Microwave Transmission:
3. Infrared Waves:
● Usage: Common in devices like TV remotes, data transfers between cell phones,
and compute peripherals communication.
● Characteristics of Infrared:
○ High Bandwidth: Supports a high data rate due to a larger bandwidth.
○ Infrared waves cannot penetrate walls, ensuring that communication is
confined to a single room.
○ Offers better security with minimal interference.
● Disadvantages of Infrared:
○ Limited range: Infrared transmission is ineffective over longer distances.
34
NotesNeo
○ Infrared signals are unreliable in outdoor environments due to interference
from sunlight.
1. Simplex Mode
● Description: One-way or unidirectional communication where data is transmitted
in only one direction. A device can either send or receive data, but not both. This
transmission mode is not very popular as mainly communications require the
two-way exchange of data.
● Example:
○ Television broadcasting, where signals travel only from the transmitter to the
receiver, Radio stations (broadcast to listeners), Keyboard (inputs data),
Monitor (displays data).
● Advantages:
○ Station can utilize the entire bandwidth of the communication channel, so
that more data can be transmitted at a time.
● Disadvantages:
○ Lack of inter-communication between devices due to unidirectional
communication.
2. Half-Duplex Mode
● Description: Two-way communication, but not simultaneously. Data can be sent
and received, but only one direction at a time. The entire bandwidth of the
communication channel is utilized in one direction at a time.
35
NotesNeo
● In half-duplex mode, it is possible to perform the error detection, and if any error
occurs, then the receiver requests the sender to retransmit the data.
● Example: Walkie-talkies (only one person can speak at a time and one party
speaks, then the other responds).
● Advantages:
○ Utilization of entire bandwidth in one direction at a time.
○ Possible error detection and retransmission.
● Disadvantages:
○ Communication delay due to waiting for turn to transmit.
● Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.
● Example: Telephone conversations, where both peoples can talk and listen at the
same time.
● Advantages:
○ Simultaneous data transmission and reception.
○ Fastest mode of communication between devices.
● Disadvantages:
○ Communication channel capacity is divided if no dedicated path exists.
Send/Receive Device can only Devices can send and Devices can send
send or receive receive data, but not and receive data
data simultaneously simultaneously
36
NotesNeo
3.5 Modulation
Definition
Modulation is the process of altering a carrier signal (such as radio waves) to transmit
data. Since digital signals can’t be easily sent over long distances without loss, modulation
helps convert the data into a form suitable for transmission over communication mediums
like radio, telephone lines, or optical fiber.
● This is the original signal containing the information we want to transmit, such as
audio, video, or digital data.
Carrier Signal:
37
NotesNeo
○ Allows different types of data (audio, video, digital) to be transmitted over
the same medium.
Types of Modulation
Modulation can be broadly classified into analog and digital modulation, depending on
the type of signal being modulated.
Analog Modulation
Analog modulation involves modulating an analog signal onto an analog carrier wave.
The primary types of analog modulation are:
● How It Works: In AM, the amplitude (strength) of the carrier wave is varied in
proportion to the amplitude of the information signal.
● Characteristics:
○ The frequency remains constant while the amplitude changes.
○ Used in AM radio broadcasting.
● Advantages:
○ Simple and cost-effective to implement.
○ Provides a reasonable quality of sound over long distances.
● Disadvantages:
○ More susceptible to noise and interference.
○ Requires a larger bandwidth compared to other modulation techniques.
● How It Works: In FM, the frequency of the carrier signal is varied according to the
information signal.
● Characteristics:
○ The amplitude remains constant while the frequency changes.
○ Commonly used in FM radio broadcasting.
● Advantages:
○ Better sound quality and resistance to noise and interference than AM.
○ More efficient use of bandwidth.
● Disadvantages:
○ More complex and expensive to implement.
○ Requires larger bandwidth than AM.
● How It Works: In PM, the phase of the carrier signal is changed according to the
information signal.
● Characteristics:
○ The amplitude and frequency of the carrier remain constant while the phase
changes.
38
NotesNeo
● Applications: Often used in digital communication systems, such as GPS and Wi-Fi.
● Advantages:
○ Provides better noise immunity than AM.
○ Efficient for transmitting digital data.
Digital Modulation
Digital modulation involves modulating a digital signal onto an analog carrier wave. The
primary types of digital modulation are:
Advantages of Modulation
1. Efficient Transmission: Allows signals to travel long distances with minimal loss.
2. Multiplexing: Enables multiple signals to share the same channel without
interference.
3. Better Signal Quality: Reduces susceptibility to noise and interference, enhancing
signal clarity.
4. Bandwidth Utilization: Uses available bandwidth efficiently for various signals.
5. Versatility: Supports the transmission of voice, video, and data.
6. Improved Reception: Higher frequency signals improve reception in obstructed
areas.
Disadvantages of Modulation
39
NotesNeo
2. Bandwidth Requirements: Some techniques require larger bandwidth, limiting
simultaneous signals.
3. Noise and Interference: Certain modulations can still be susceptible to
interference.
4. Equipment Cost: Modulation equipment can be expensive.
5. Signal Distortion: Poor implementation can lead to distortion, affecting quality.
Uses of Modulation
1. Broadcasting: Used in radio and TV to transmit audio and video signals.
2. Telecommunications: Essential for transmitting voice and data in telephone
systems.
3. Data Communication: Employed in modems and broadband for data transfer.
4. Satellite Communication: Transmits signals for services like GPS and satellite TV.
5. Wireless Communication: Facilitates connections in mobile phones, Wi-Fi, and
Bluetooth.
6. Remote Sensing: Used in radar and sonar for object detection and tracking.
3.6 Multiplexing
Definition
Multiplexing is the technique of combining multiple signals into one signal for transmission
over a single shared medium. This allows the efficient use of available bandwidth by
allowing multiple data streams to be transmitted simultaneously over the same
communication link. Multiplexing is the sharing of a medium or bandwidth.
This process is carried out using a device called a multiplexer (MUX), which merges the
data streams. At the receiving end, a demultiplexer (DEMUX) is used to separate the
combined signal back into its original components.
History of Multiplexing
● Multiplexing technique is widely used in telecommunications in which several
telephone calls are carried through a single wire.
● Multiplexing originated in telegraphy in the early 1870s and is now widely used in
communication.
● George Owen Squier developed the telephone carrier multiplexing in 1910.
Concept of Multiplexing
● The 'n' input lines are transmitted through a multiplexer and multiplexer combines
the signals to form a composite signal.
● The composite signal is passed through a Demultiplexer and demultiplexer
separates a signal to component signals and transfers them to their respective
destinations.
40
NotesNeo
1. Efficient Use of Medium: A transmission medium can only carry one signal at a
time. Multiplexing divides the medium's bandwidth among multiple signals,
allowing simultaneous data transmission.
2. Cost Efficiency: Reduces the need for multiple transmission paths, lowering overall
communication costs.
3. Collision Avoidance: By dividing the medium among signals, multiplexing
minimizes the chances of collision, ensuring smoother communication.
Types of Multiplexing:
There are five main types of multiplexing techniques, each suited for different types of
data and communication needs:
1. Frequency Division Multiplexing (FDM)
2. Time Division Multiplexing (TDM)
a. Synchronous TDM
b. Asynchronous or Statistical TDM
3. Wavelength Division Multiplexing (WDM)
a. Dense Wavelength Division Multiplexing (DWDM)
b. Coarse Wavelength Division Multiplexing (CWDM)
4. Code Division Multiplexing (CDM)
5. Space Division Multiplexing (SDM)
● Analog Technique: FDM modulates input signals into different frequency bands
and combines them.
41
NotesNeo
● Applications: FDM is used in radio broadcasting, TV networks, and some
telecommunication systems.
● Guard Bands: To prevent interference (cross-talk) between channels, unused
frequency strips called guard bands are placed between them.
● Advantages:
○ Simple to implement.
○ Supports multiple signals simultaneously.
○ No need for synchronization between sender and receiver.
● Disadvantages:
○ Limited to lower-speed channels.
○ Prone to crosstalk (interference between signals).
○ Requires a large bandwidth and many modulators.
● How It Works: The time on a communication channel is divided into small time
slots. Each user or signal is assigned a specific time slot to transmit their data.
● Digital Technique: TDM divides the total time available for transmission into time
slots.
● Applications: TDM is used in telephone systems, allowing multiple users to share
the same communication line.
Types of TDM:
● Synchronous TDM:
○ Fixed Time Slots: Every device gets a fixed time slot, even if it has no data
to send, which can lead to inefficiencies.
○ Applications: Used in T-1 multiplexing, ISDN, and SONET.
○ Disadvantages:
■ Inefficient when devices have no data to transmit (empty slots).
■ Requires high-speed transmission media.
42
NotesNeo
● How It Works: WDM operates like FDM but with optical signals. It combines
multiple optical signals, each on a different wavelength of light, and sends them
through a single fiber optic cable. WDM increases the capacity of optical fibers by
transmitting multiple optical signals over different wavelengths on the same fiber.
● Analog Technique: Multiple light signals are combined to form a broader light
spectrum.
● Applications: WDM is used in fiber-optic communication to increase data-carrying
capacity.
● Advantages: WDM allows for high data rates, lower power consumption, and easy
network upgrades.
Types of WDM:
● How It Works: CDM allows multiple signals to share the same frequency band by
assigning each signal a unique code. This code ensures that only the intended
receiver can decode the signal.
● Example: CDMA (Code Division Multiple Access), which is used in mobile networks,
where multiple users can share the same frequency band without interfering with
each other.
● Applications: Used in mobile communications, satellite communication, GPS, and
secure military communication.
● Advantages: CDM allows multiple users to share the same frequency band and
offers better security against interception.
Advantages of Multiplexing
1. Efficient Use of Bandwidth: Allows multiple signals to be transmitted over a single
channel, optimizing bandwidth use.
2. Increased Data Transmission: Enhances the amount of data sent simultaneously,
boosting overall capacity.
3. Scalability: Facilitates easy network expansion without major infrastructure
changes.
4. Flexibility: Different multiplexing types can be applied based on specific
communication system needs.
Disadvantages of Multiplexing
Uses of Multiplexing
Multiplexing has several key applications in data communications that enhance network
efficiency and capacity:
44
NotesNeo
1. Efficient Resource Utilization:
○ By allowing multiple signals to share the same communication channel,
multiplexing maximizes the use of available bandwidth, which is crucial in
limited-bandwidth environments.
2. Telecommunications:
○ In telephone networks, multiplexing enables the simultaneous transmission
of multiple phone calls over a single line, significantly increasing network
capacity.
3. Internet and Data Networks:
○ Multiplexing is used to send data from multiple users over a single network
connection, improving both efficiency and data transfer speed.
4. Satellite Communications:
○ It helps utilize available bandwidth on satellite transponders effectively,
allowing multiple signals to be transmitted and received at the same time.
Switching techniques are crucial in determining the best routes for data transmission
across large networks, enabling one-to-one communication between systems. These
techniques can be broadly classified into three types:
1. Circuit Switching
● A dedicated communication path is established between two devices for the
duration of the transmission. The dedicated path remains until the connection is
terminated.
● Examples: Traditional telephone networks, where a dedicated circuit is established
for each call.
Phases:
Technologies:
Advantages:
Disadvantages:
2. Packet Switching
● Data is divided into smaller packets, each of which is transmitted independently
and can take different paths to the destination. Reassembled at the destination.
Packets take the shortest path available, enhancing network efficiency.
● Employed in modern internet communications.
● Examples: Internet data transfer, where data is sent in IP packets.
Approaches:
Advantages:
Disadvantages:
● Not suitable for applications requiring low delay and high-quality service.
● Complex protocols with high implementation costs.
46
NotesNeo
● Potential loss of critical information if packets are lost or corrupted during
transmission.
Congestion Less likely as packets take Can occur if nodes are busy
different paths
Reliability and More flexible and efficient in Reliable for planned routes
Efficiency diverse conditions but less flexible
3. Message Switching:
● Entire messages are sent from the source to the destination as complete units,
which are routed through intermediate nodes that store and forward them. No
dedicated path between sender and receiver.
● An early form of data transmission in computer networks.
● Now largely obsolete due to the inefficiencies in handling large volumes of data.
Advantages:
Disadvantages:
Importance of Switching
Advantages of Switching
47
NotesNeo
● Increased Bandwidth: Enhances network capacity by efficiently managing data
transmission.
● Reduced Workload on PCs: Directs data only to the addressed device, minimizing
unnecessary data processing.
● Improved Network Performance: Reduces traffic congestion, leading to faster
and more reliable communication.
● Minimized Frame Collision: Each connection has its collision domain, significantly
lowering the chances of data collisions.
Disadvantages of Switching
● Cost: Switches are more expensive than simpler network devices like bridges.
● Troubleshooting: Identifying network connectivity issues can be more complex.
● Configuration: Proper design and configuration are necessary to manage
multicast packets and ensure optimal performance.
Layer 2 switches operate on the Data Link layer of the OSI model, facilitating data
transmission by forwarding packets based on MAC addresses. They perform error
checking on transmitted and received frames, using different switching modes to enhance
efficiency and reliability. The primary switching modes are:
1. Store-and-Forward Switching
Process:
Advantages:
● High level of security: Corrupted frames are discarded, preventing them from
affecting the destination network.
● Reliability: Collided frames are not forwarded.
Disadvantages:
● High latency: The switch waits for the entire frame to be received before
forwarding, resulting in higher latency.
48
NotesNeo
● High wait time: The entire frame must be stored and checked before forwarding.
2. Cut-Through Switching
Process:
● The switch forwards the packet as soon as the destination address is identified,
without waiting for the entire frame.
● The first six bytes of the frame (following the preamble) are checked to determine
the destination address.
● The frame is forwarded to the outgoing interface port specified in the switching
table.
Advantages:
● Low latency: The switch forwards the packet immediately after identifying the
destination MAC address.
● Low wait time: Frames are forwarded without storing the entire packet.
Disadvantages:
3. Fragment-Free Switching
Process:
● The switch reads at least 64 bytes of the frame before forwarding to the next node.
● Combines the speed of cut-through switching with error-checking functionality.
● The first 64 bytes are checked for errors and collision information.
Advantages:
● Balanced approach: Combines the low latency of cut-through switching with the
error-checking benefits.
● Collision detection: Frames with collisions within the first 64 bytes are not
forwarded, enhancing transmission quality.
Disadvantages:
● Moderate latency: Slightly higher latency than cut-through but lower than
store-and-forward.
49
NotesNeo
Frame Waits until the entire frame is Checks the first 6 bytes following
Processing received. the preamble to identify the
destination address.
Latency High latency due to waiting for Low latency as only the initial
the entire frame. bytes are checked.
Wait Time High wait time as the whole Low wait time; frames are
frame must be received before forwarded without waiting for the
forwarding. entire packet.
1. Bus Topology
Structure:
● In bus topology, all network nodes (computers, printers, etc.) are connected to a
single central cable known as the backbone or bus.
● Nodes can be connected to the backbone cable either directly or through drop lines
and taps.
● The backbone acts as a shared communication medium that every node in the
network can use to transmit data.
50
NotesNeo
Communication:
● When a node wants to send data, it transmits a broadcast message onto the
backbone cable.
● All nodes in the network receive this message, but only the intended recipient
processes it; others discard the message.
● Data transmission is typically controlled by a media access control method like
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) or CSMA/CA
(Carrier Sense Multiple Access with Collision Avoidance).
Access Methods:
● CSMA/CD: Nodes listen to the network and only transmit when it is free. If a
collision is detected, the nodes stop transmitting and try again after a random
delay.
● CSMA/CA: Nodes attempt to avoid collisions by checking if the network is free
before transmitting. If it is busy, they wait for a random period before checking
again.
Advantages:
Disadvantages:
51
NotesNeo
2. Ring Topology
Structure:
● In a ring topology, each network node is connected to exactly two other nodes,
forming a single continuous pathway for signals through each node – a ring.
● Each node is connected to its adjacent nodes via point-to-point links, creating a
closed loop.
Communication:
Access Methods:
● Token Passing:
○ A token (a small data packet) circulates around the network. Only the node
holding the token can transmit data.
○ When a node receives the token, it attaches its data and the destination
address to the token and sends it on. The token continues to circulate until it
reaches the destination node, which removes the data and sends an
acknowledgment.
○ After the data transmission is complete, the token is released back into the
network to allow other nodes to transmit data.
Advantages:
52
NotesNeo
○ Faulty devices can be identified and removed from the network without
bringing down the entire system.
3. Efficient Data Transmission:
○ Each node regenerates the signal, which can help in maintaining the signal
strength over long distances.
4. Scalability:
○ Additional nodes can be added without significant impact on the network’s
performance.
Disadvantages:
3. Star Topology
Structure:
● In a star topology, all network nodes are connected to a central hub, switch, or
server.
● The central hub acts as a repeater for data flow.
● Each node has a dedicated point-to-point connection to the central hub, making
the topology resemble a star.
53
NotesNeo
Communication:
● All data transmissions are routed through the central hub. When a node sends data,
it is received by the hub and then forwarded to the destination node.
● This centralization allows the hub to manage and control all communications within
the network.
Advantages:
Disadvantages:
54
NotesNeo
4. Tree Topology
Structure:
Communication:
● Data transmission in a tree topology starts from a root node and can travel
through the branches to reach any leaf node.
● Communication pathways follow the hierarchical structure, ensuring data moves
from the parent nodes to the child nodes or vice versa.
Advantages:
1. Scalability:
○ Easy to expand by adding new nodes to the network without disrupting the
existing structure.
2. Manageability:
○ The hierarchical nature allows for easier management and troubleshooting
as the network is divided into manageable segments (branches).
3. Support for Broadband Transmission:
○ Effective for transmitting data over long distances without signal
attenuation, making it suitable for wide area networks (WANs).
4. Isolation of Faults:
○ Faults in one segment do not affect the entire network, allowing for isolated
troubleshooting and repair.
5. Hierarchical Organization:
○ Facilitates organized and structured network operations, making it easier to
implement policies and security measures.
55
NotesNeo
Disadvantages:
1. Complexity:
○ More complex to design and install compared to simpler topologies like bus
or star.
2. High Cost:
○ Requires more cabling and specialized devices, such as repeaters and hubs,
increasing the overall cost.
3. Dependency on Root Node:
○ The entire network depends on the root node. If it fails, it can disrupt the
entire network or large segments of it.
4. Reconfiguration Issues:
○ Adding or removing nodes can be challenging and may require
reconfiguration of the entire network hierarchy.
5. Troubleshooting:
○ While faults are isolated to specific branches, identifying and resolving
issues can be more complex due to the hierarchical structure.
5. Mesh Topology
Structure:
● In a mesh topology, every node is connected to every other node in the network,
creating a web-like structure of interconnections.
56
NotesNeo
● Structure: Some nodes are fully interconnected, while others are connected only to
the nodes they communicate with most frequently.
● Advantages: Reduced cost and complexity compared to full mesh, while still
providing redundancy.
● Disadvantages: Less redundancy than full mesh, but more manageable and
cost-effective.
Communication:
● Mesh topology supports multiple paths for data transmission between any two
nodes.
● If one path fails, data can be rerouted through another path, enhancing reliability
and fault tolerance.
● Data can travel directly from one node to another without needing a central hub or
switch, reducing the likelihood of congestion and bottlenecks.
Advantages:
57
NotesNeo
○ Multiple redundant connections ensure network reliability and fault
tolerance. A failure in one connection does not affect the network as a
whole.
2. Robustness:
○ The network remains operational even if several connections fail.
3. High Performance:
○ Direct communication paths between nodes can lead to faster data
transmission and reduced latency.
4. Scalability:
○ Easy to expand by adding new nodes without disrupting the existing
network.
5. Efficient Load Handling:
○ Load is evenly distributed due to multiple pathways, preventing any single
point from becoming a bottleneck.
Disadvantages:
6. Hybrid Topology
Structure:
Common Examples:
58
NotesNeo
Communication:
Advantages:
1. Flexibility:
○ Hybrid topology can be designed to meet the specific needs of different
parts of the network, providing a tailored solution.
2. Scalability:
○ New nodes and sub-networks can be added easily without disrupting the
existing network.
3. Reliability:
○ Combines the fault tolerance of multiple topologies. For example, if a bus
segment fails in a star-bus topology, the star-configured sub-networks can
still function independently.
4. Efficient Troubleshooting:
○ Fault isolation is more straightforward since problems can often be traced to
a specific segment or sub-network.
5. Performance Optimization:
○ Network performance can be optimized by using high-speed topologies like
star or mesh for high-traffic areas and simpler topologies like bus for
low-traffic areas.
Disadvantages:
59
NotesNeo
Connection-Oriented Services
● Description: A dedicated path is established before data transfer, ensuring reliable
delivery.
● Examples: TCP (Transmission Control Protocol).
● Operation:
○ A sender initiates communication with a request (SYN).
○ The receiver acknowledges the request (SYN-ACK).
○ Data is sent in a specific order and can be tracked for delivery confirmation.
○ The connection is terminated once data transfer is complete.
● Advantages:
○ Reliable and ordered data delivery.
○ Suitable for applications requiring accuracy, like file transfers and web
browsing.
● Disadvantages:
○ Requires more bandwidth and resources.
○ Slower due to connection establishment and teardown.
Connectionless Services
● Description: Data is sent in the form of packets without establishing a dedicated
path, and packets are routed independently.
● Examples: UDP (User Datagram Protocol).
● Operation:
○ Data packets are sent directly to the receiver without a handshake.
○ Packets can arrive in any order and may not be received at all.
60
NotesNeo
● Advantages:
○ Faster and more efficient for simple data transmissions.
○ Requires less bandwidth and resources.
● Disadvantages:
○ No guarantee of delivery or order, making it less reliable.
○ Potential for data loss due to network congestion.
61
NotesNeo
1. Framing: Divides the stream of bits received from the network layer into
manageable data units called frames.
2. Addressing: Uses MAC (Media Access Control) addresses to identify devices on the
network.
3. Line Discipline: Ensures proper coordination between devices on a network,
determining which device can send data and when it can do so.
4. Flow Control: Manages the rate of data transmission between two nodes to
prevent overwhelming the receiver.
5. Error Detection and Correction: Detects and corrects errors that may occur in the
physical layer.
6. Access Control: Determines which device has control over the transmission
medium at any given time.
Data Link Control refers to the set of services provided by the Data Link Layer to ensure
reliable data transfer over the physical medium. In scenarios like half-duplex
transmission, where devices can only transmit data one at a time, the data link layer
prevents collisions and data loss by coordinating the communication.
62
NotesNeo
1. Line Discipline
ENQ/ACK
● ENQ (Enquiry): The sender transmits an ENQ frame to check if the receiver is
ready.
● ACK (Acknowledgement): The receiver responds with an ACK if ready or a NACK if
not.
Working of ENQ/ACK:
Poll/Select
The Poll/Select method is used in network topologies with a primary device and multiple
secondary devices.
Select Mode:
● The primary device sends a Select (SEL) frame to the intended secondary device.
● The secondary device acknowledges readiness.
● The primary device sends data frames.
63
NotesNeo
Poll Mode:
● The primary device polls secondary devices to check if they have data to send.
● If a secondary device responds with ACK, it sends data to the primary device.
2. Flow Control
Flow Control manages the rate of data transmission to prevent the receiver from being
overwhelmed.
Stop-and-Wait
● The sender transmits a frame and waits for an ACK before sending the next frame.
● Simple but inefficient due to waiting for each ACK before sending the next frame.
Sliding Window
Sender Window:
● The sender can send frames within the window size limit.
● As frames are sent and acknowledged, the window slides to allow new frames to be
sent.
Receiver Window:
● The receiver can receive a specific number of frames before sending an ACK.
● The window slides as frames are received and acknowledged.
3. Error Control
Stop-and-Wait ARQ
● The sender keeps a copy of the last frame until it receives an ACK.
● Frames and ACKs are numbered alternately (0 and 1).
● Uses a timer to detect lost frames.
Scenarios:
● Damaged Frame: The receiver sends a NAK for damaged frames, and the sender
retransmits.
● Lost Frame: If no ACK is received within a time limit, the sender retransmits the
frame.
64
NotesNeo
● The sender keeps copies of transmitted frames until they are acknowledged.
● The receiver sends ACKs or NAKs, and the sender retransmits as necessary.
Protocols:
● Go-Back-N ARQ: The sender retransmits all frames after a damaged or lost frame.
● Selective-Reject ARQ: Only the damaged frames are retransmitted, making it more
efficient.
Overview
● MAC Address (Media Access Control Address) is a unique identifier assigned to
network interfaces for communications at the data link layer.
● It is used to ensure that data packets are delivered to the correct hardware
destination within a local network.
Structure
● Format: MAC addresses are 48 bits long, typically represented in hexadecimal
format (e.g., 00:1A:2B:3C:4D:5E).
● Components:
○ OUI (Organizationally Unique Identifier): The first 24 bits, assigned by the
IEEE to the manufacturer.
○ NIC (Network Interface Controller) Specific: The last 24 bits, assigned by the
manufacturer.
Importance
● Ensures unique identification of devices within a local network.
● Used in various data link layer protocols for addressing and communication.
4.3 Framing
Definition
● Framing is the process of dividing data into frames to facilitate error detection and
flow control.
Types of Framing
1. Fixed-size Framing: Frames of a fixed size, easy to implement but can lead to
inefficiency.
2. Variable-size Framing: Frames of variable sizes, more efficient but complex to
implement.
65
NotesNeo
Frame Structure
● Header: Contains control information, such as source and destination MAC
addresses, frame type, and sequence number.
● Payload: The actual data being transmitted.
● Trailer: Contains error-checking information, like a CRC checksum, to detect
transmission errors.
Methods
1. Character Count: Uses a field in the frame header to specify the number of
characters in the frame.
2. Character Stuffing: Uses special characters to mark the beginning and end of the
frame, with stuffing characters to avoid confusion.
3. Bit Stuffing: Inserts non-information bits into the data stream to ensure the frame
delimiter patterns do not appear in the data.
4. Physical Layer Coding Violations: Uses specific signal patterns to indicate the start
and end of a frame.
Stop-and-Wait Protocol
In the Stop-and-Wait protocol, the sender sends one frame at a time and waits for an
acknowledgement (ACK) from the receiver before sending the next frame. This simple
technique ensures that the receiver is ready to process the next frame before it is sent.
Process:
Advantages:
66
NotesNeo
Disadvantages:
The Sliding Window Protocol is a more efficient method of flow control compared to
Stop-and-Wait. It allows the sender to send multiple frames before needing an
acknowledgment (ACK) for any of them, improving the efficiency of data transmission.
This method is based on maintaining a window at both the sender and receiver sides to
keep track of which frames have been sent and acknowledged.
Basic Concepts:
Example:
67
NotesNeo
○ If the receiver window size is 7, it can hold 7 frames. If it receives frames 0
through 4, the window size shrinks to 2. Once an acknowledgment is sent, the
window expands back to 7.
Advantages:
● More efficient use of the communication channel as multiple frames can be sent
before needing an acknowledgment.
● Reduced latency as frames can be acknowledged in batches rather than
individually.
Disadvantages:
Error Detection:
Error detection mechanisms identify the presence of errors in transmitted frames. The
primary methods are:
● Parity Check: Adds a parity bit to the data to make the number of 1s either even
(even parity) or odd (odd parity). The receiver checks the parity to detect errors.
● Checksum: Adds the binary values of data segments and transmits the sum. The
receiver verifies the sum to detect errors.
● Cyclic Redundancy Check (CRC): Adds a sequence of redundant bits (CRC bits) to
the data. The receiver uses polynomial division to check for errors.
Error Correction:
Error correction mechanisms not only detect errors but also correct them without the need
for retransmission. The primary methods are:
● Automatic Repeat Request (ARQ): If an error is detected, the receiver requests
the sender to resend the frame.
● Hamming Code: Redundant bits is added to the data frame, allowing the receiver
to both detect and correct single-bit errors.
● Forward Error Correction (FEC): The sender adds redundant data to help the
receiver detect and correct errors (multi-bit) without needing retransmission.
68
NotesNeo
1. Stop-and-Wait ARQ
● In Stop-and-Wait ARQ, the sender transmits one frame and waits for an
acknowledgment (ACK) from the receiver before sending the next frame.
Process:
Advantages:
Disadvantages:
2. Go-Back-N ARQ
● In In Stop-and-Wait ARQ, , the sender can send several frames before needing an
acknowledgment but must retransmit all frames starting from the one that was not
acknowledged.
Process:
1. Send Frames: The sender transmits multiple frames up to a window size (N).
2. Receive Frames: The receiver processes each frame and sends ACKs for correctly
received frames.
3. Detect Error: If an error is detected in a frame, the receiver discards the erroneous
frame and all subsequent frames.
4. Retransmit: The sender retransmits the erroneous frame and all subsequent frames
starting from the error.
Advantages:
69
NotesNeo
● More efficient than Stop-and-Wait as multiple frames are sent before waiting for
an ACK.
● Effective use of available bandwidth.
Disadvantages:
● Can lead to redundant retransmissions if an error occurs, as frames after the error
need to be resent.
● Inefficient use of bandwidth if errors are frequent.
Process:
1. Send Frames: The sender transmits multiple frames up to a window size.
2. Receive Frames: The receiver processes each frame and sends ACKs for correctly
received frames.
3. Detect Error: If an error is detected, the receiver requests a retransmission of only
the erroneous frame.
4. Retransmit: The sender retransmits only the erroneous frame.
Advantages:
Disadvantages:
● Requires more complex logic and buffering at both sender and receiver.
● More memory required to store the received frames until they can be processed in
order.
Basic Concepts
● Window Size: Defines the number of frames that can be sent without
acknowledgment.
● Acknowledgment: Receiver sends acknowledgments for received frames, allowing
the sender to slide the window forward and send new frames.
70
NotesNeo
● Sender Window: Allows the sender to transmit multiple frames before waiting for
an ACK. It slides forward as ACKs are received.
● Receiver Window: Allows the receiver to accept multiple frames and slide forward
as frames are correctly received and acknowledged.
Process:
1. Send Frames: The sender transmits multiple frames within the window size.
2. Receive Frames: The receiver accepts and processes frames within its window.
3. Send ACKs: The receiver sends cumulative ACKs for received frames.
4. Slide Window: Both sender and receiver slide their windows forward as frames are
acknowledged.
Sliding Window Protocol is a more efficient error control method that allows continuous
transmission of frames. The sender can transmit multiple frames before needing an
acknowledgment, and both sender and receiver maintain a window that slides over the
sequence of frames.
1. Go-Back-N ARQ:
If an error is detected or a frame is lost, the receiver sends a NAK for the erroneous
frame. The sender retransmits the erroneous frame and all subsequent frames.
● Damaged Frame: The receiver sends a NAK for the damaged frame. The sender
retransmits the damaged frame and all following frames.
● Lost Frame: If a frame is lost, the receiver detects a sequence gap and sends a
NAK for the missing frame. The sender retransmits the missing frame and all
subsequent frames.
● Lost ACK: If an ACK is lost, the sender retransmits frames after the last
successfully acknowledged frame when the timer expires.
2. Selective-Repeat ARQ:
Only the frames that are negatively acknowledged (NAK) are retransmitted, rather than
all subsequent frames. This requires the receiver to buffer out-of-order frames until the
missing frame is correctly received.
● Efficiency: More efficient than Go-Back-N ARQ because only specific frames are
retransmitted.
● Receiver Buffering: The receiver stores all received frames, including out-of-order
frames, until the correct sequence is restored.
● Selective Retransmission: The sender retransmits only the frames requested by the
NAKs, using a mechanism to identify and resend specific frames.
71
NotesNeo
Important Questions
MDU PYQs
March - 2021
1. Write short note on :
a. Framing in data link layer
2. (a) What is OSI model? Explain the working of OSI model in detail.
(b) What do you mean by sliding window protocol ? Explain.
3. (a) Give a brief description about computer network and its historical development.
(b) Explain data link layer functions and services in detail.
July - 2021
72
NotesNeo
3. Describe the various layers of TCP/IP protocol.
Feb - 2022
July - 2022
Dec - 2022
Nov - 2023
1. Write a short note on the following:
a. Mesh Topologies
2. (a) What is computer network ? Explain its historical development in detail.
(b) Explain Data Link Layer functions in detail.
3. (a) Explain TCP/IP model in detail.
(b) Describe various Transmission media used in Computer Networks.
73