(REVIEWER) Lecture 1
(REVIEWER) Lecture 1
4. JITTER
5. PROTOCOL
Prevalent image formats: JPEG, PNG, BMP • An agreed set of rules by the sender
and the receiver to communicate
data.
✓ Audio
• Audio refers to the recording or • a set of rules that govern data
broadcasting of sound or music. communications.
o Walkie-talkies and CB
(citizens band) radios are
both half-duplex systems.
3. FULL-DUPLEX
RELIABILITY
NETWORK CRITERIA
o In addition to accuracy of delivery, network
reliability is measured by the frequency of
A network must be able to meet a certain number of
failure, the time it takes a link to recover from a
criteria. The most important of these are performance,
failure, and the network's robustness in a
reliability, and security.
catastrophe.
▪ Must achieve higher throughput and smaller
o Robustness is the integrity of the
delay time.
network
PERFORMANCE
SECURITY
2. Physical topology
MULTIPOINT
a. Mesh
b. Star • A multipoint (also called multidrop) connection is
c. Bus one in which more than two specific devices
d. Ring share a single link.
__________________________________________
• In a multipoint environment, the capacity of the
channel is shared, either spatially or temporally.
TYPES OF CONNECTION
• If several devices can use the link
simultaneously, it is a spatially shared
A network is two or more devices connected through links.
connection. If users must take turns, it is a
timeshared connection.
A link is a communications pathway that transfers data
from one device to another.
CATEGORIES OF TOPOLOGY
o For visualization purposes, it is simplest to
imagine any link as a line drawn between two
points. The term physical topology refers to the way in which a
o For communication to occur, two devices must be network is laid out physically: two or more devices
connected in some way to the same link at the connect to a link; two or more links form a topology.
same time.
The topology of a network is the geometric
There are two possible types of connections: point-to- representation of the relationship of all the links and
point and multipoint. linking devices (usually called nodes) to one another.
POINT-TO-POINT
MESH TOPOLOGY
• A point-to-point connection provides a dedicated
➢ In a mesh topology, every device has a
link between two devices.
dedicated point-to-point link to every
• The entire capacity of the link is reserved for other device.
transmission between those two devices. ➢ The term dedicated means that the link
carries traffic only between the two
• Most point-to-point connections use an actual
devices it connects.
length of wire or cable to connect the two ends,
Disadvantages
Advantages
One big disadvantage of a star topology is the
✓ Include ease of installation.
dependency of the whole topology on one single
o Backbone cable can be laid along the
point, the hub.
most efficient path, then connected to
o If the hub goes down, the whole system
the nodes by drop lines of various
is dead.
lengths.
o Although a star requires far less cable
o In this way, a bus uses less cabling than
than a mesh, each node must be linked
mesh or star topologies.
to a central hub.
o In a star, for example, four network
o For this reason, often more cabling is
devices in the same room require four
required in a star than in some other
lengths of cable reaching all the way to
topologies (such as ring or bus).
the hub.
o Example: router/modem in houses
o In a bus, this redundancy is eliminated.
serves as hub
Only the backbone cable stretches
through the entire facility. Each drop line
BUS TOPOLOGY has to reach only as far as the nearest
point on the backbone.
➢ A bus topology, on the other hand, is
multipoint. One long cable acts as a
Disadvantages
backbone to link all the devices in a network
Include difficult reconnection and fault isolation.
(see Figure 1.7).
Example: CATV o A bus is usually designed to be optimally
▪ Easier to design; ease of efficient at installation.
installation
o It can therefore be difficult to add new
➢ Nodes are connected to the bus cable by devices.
drop lines and taps.
o Signal reflection at the taps can cause
➢ A drop line is a connection running between degradation in quality. This degradation
the device and the main cable. can be controlled by limiting the number
and spacing of devices connected to a
➢ A tap is a connector that either splices into given length of cable.
the main cable or punctures the sheathing
of a cable to create a contact with the o Adding new devices may therefore
metallic core. require modification or replacement of
the backbone
➢ As a signal travels along the backbone, some
of its energy is transformed into heat. In addition, a fault or break in the bus cable stops
all transmission, even between devices on the
o Therefore, it becomes weaker and same side of the problem.
weaker as it travels farther and farther.
[ECE 426] Fundamentals of Data Communications | Module 1 | 8
ANGELA MONIQUE Z. BUHAT, ICE 3205
o The damaged area reflects signals back Disadvantages
in the direction of origin, creating noise Unidirectional traffic can be a disadvantage.
in both directions. o In a simple ring, a break in the ring (such
as a disabled station) can disable the
Bus topology was the one of the first topologies used in entire network.
the design of early local area networks. o This weakness can be solved by using a
dual ring or a switch capable of closing
off the break.
RING TOPOLOGY
Advantages
✓ A ring is relatively easy to install and reconfigure.
o Each device is linked to only its NETWORK MODELS
immediate neighbors (either physically
or logically). Computer networks are created by different entities.
o To add or delete a device requires o Standards are needed so that these
changing only two connections. The only heterogeneous networks can communicate with
constraints are media and traffic one another.
considerations.
The two best-known standards are the OSI model and the
✓ Fault isolation is simplified
Internet model.
o Generally, in a ring, a signal is circulating
✓ The OSI (Open Systems Interconnection) model
at all times. If one device does not
defines a seven-layer network
receive a signal within a specified
✓ The Internet model defines a five-layer network.
period, it can issue an alarm.
o The alarm alerts the network operator to
the problem and its location.
o The category into which a network falls is server and used as needed by the whole
determined by its size. group.
o A LAN normally covers an area less than ▪ In this example, the size of the
2 mi; LAN may be determined by
o a WAN can be worldwide. licensing restrictions on the
o Networks of a size in between are number of users per copy of
area networks and span tens of miles. the number of users licensed to
access the operating system.
➢ LANs are designed to allow resources to be ➢ A WAN can be as complex as the backbones that
shared between personal computers or connect the Internet or as simple as a dial-up line
workstations. that connects a home computer to the Internet.
o The resources to be shared can include
➢ We normally refer to the first as a switched WAN
hardware (e.g., a printer), software (e.g.,
and to the second as a point-to-point WAN
an application program), or data.
(Figure 1.11).
o A common example of a LAN, found in
many business environments, links a
workgroup of task-related computers,
The most notable internet is called the Internet » Cerf and Kahn's landmark 1973 paper outlined the
(uppercase letter I), a collaboration of more than protocols to achieve end-to-end delivery of
hundreds of thousands of interconnected networks. packets.
Protocols = rules
International Internet Service Providers
Standards = agreed-upon rules
» At the top of the hierarchy are the international
service providers that connect nations together.
PROTOCOLS
» Regional internet service providers or regional • refers to the structure or format of the data,
ISPs are smaller ISPs that are connected to one meaning the order in which they are presented.
or more national ISPs. o For example, a simple protocol might
expect the first 8 bits of data to be the
» They are at the third level of the hierarchy with a
smaller data rate. address of the sender, the second 8 bits
to be the address of the receiver, and the
rest of the stream to be the message
itself.
• How is a particular pattern to be interpreted, and Standards are developed through the cooperation of
what action is to be taken based on that standards creation committees, forums, and government
interpretation? regulatory agencies.
o For example, does an address identify
the route to be taken or the final Standards Creation Committees
destination of the message? While many organizations are dedicated to the
establishment of standards, data telecommunications in
TIMING North America rely primarily on those published by the
• refers to two characteristics: when data should following:
be sent and how fast they can be sent. 1. International Organization for Standardization (ISO)
2. International Telecommunication Union-
• For example, if a sender produces data at 100
Telecommunication Standards Sector (ITU-T)
Mbps but the receiver can process data at only 1
3. American National Standards Institute (ANSI)
Mbps, the transmission will overload the receiver
4. Institute of Electrical and Electronics Engineers (IEEE)
and some data will be lost. 5. Electronic Industries Association (EIA)