DataCom Tutorial (2)
DataCom Tutorial (2)
&
COMPUTER NETWORKING
CONTENTS
2
Signals
The means through which data is transformed from one place to another is called
transmission or communication media.
There are two categories of transmission media used in computer
communications.
Electromagnetic radiation can be transmitted through an optical media, such
as optical fiber, or through twisted pair wires, coaxial cable, or dielectric-
slab waveguides.
It may also pass through any physical material that is transparent to the specific
wavelength, such as water, air, glass, or concrete.
Sound is, by definition, the vibration of matter, so it requires a physical medium
for transmission, as does other kinds of mechanical waves and heat energy.
Transmission Media
Guided media are the physical links through which signals are
confined to narrow path.
These are also called guide media. Bounded media are made up of a
external conductor (Usually Copper) bounded by jacket material.
Bounded media are great for LABS because they offer high speed,
good security and low cast.
However, some time they cannot be used due distance
communication.
Three common types of bounded media are used of the data
transmission. These are
Coaxial Cable
Twisted Pairs Cable
Fiber Optics Cable
Prepared By Tsegaye A. 12/22/2024
Coaxial cable
16
Coaxial cable is very common & widely used commutation media. For
example TV wire is usually coaxial. Coaxial cable gets its name
because it contains two conductors that are parallel to each other. The
center conductor in the cable is usually copper. The copper can be either
a solid wire or stranded martial.
Outside this central Conductor is a non-conductive material. It is
usually white, plastic material used to separate the inner Conductor
form the outer Conductor. The other Conductor is a fine mesh made
from Copper.
It is similar to UTP
but has a mesh
shielding that’s
protects it from EMI
which allows for
higher transmission
rate.
Micro waves
Prepared By Tsegaye A. 12/22/2024
Infrared waves
Devices used in networking
25
Hub
Switch
Router
A common connection
point for devices in
a network.
A hub contains
multiple ports. When a
packet arrives at one
port, it is copied to the
other ports so that all
segments of the LAN
can see all packets.
Prepared By Tsegaye A. 12/22/2024
Switch
29
A network switch is a small hardware
device that joins multiple computers
together within one local area network
(LAN). Network switches appear nearly
identical to network hubs, but a switch
generally contains more intelligence than a
hub. Unlike hubs, network switches are
capable of inspecting data packets as they
are received, determining the source and
destination device of each packet, and
forwarding them appropriately.
By delivering messages only to the connected
device intended, a network switch
conserves network bandwidth and offers
generally better performance than a hub.
Prepared By Tsegaye A. 12/22/2024
Router
30
A router is a device that forwards data
packets between computer networks, creating an
overlay internetwork.
Digital signaling
Data source (digital/analog) encoded into digital signal
Analog signaling
Data source (digital/analog) encoded into constant-
frequency signal (carrier signal)
Modulation
Process of encoding source data onto a carrier signal
with frequency fc
Modulating signal/ baseband signal
Input signal (analog/digital) → modulator
Modulated signal/ bandlimited(bandpass) signal
Result of modulating the carrier signal
Prepared By Tsegaye A. 12/22/2024
Digital Data, Digital Signal
38
PSEUDOTERNARY
42
i. Nonreturn to Zero-Level(NRZ-L)
- 0 = high level
- 1 = low level
ii. Nonreturn to Zero Inverted (NRZ-I)
- 0 = no transition at beginning of interval
- 1 = transition at beginning of interval
iii. Bipolar –AMI
- 0 = no signal
- 1 = +ve or –ve, alternating for successive ones
iv. Pseudoternary
- 0 = +ve or –ve level, alternating for successive zeros
- 1 = no line signal
v. Manchester
- 0 = transition from high to low in middle of interval
- 1 = transition from low to high in middle of interval
Unipolar
Allsignal elements have same sign
(positive and negative)
Polar
One logic state represented by positive voltage the
other by negative voltage
Data rate
Rate of data transmission in bits per second
Duration or length of a bit
Time taken for transmitter to emit the bit
Prepared By Tsegaye A. 12/22/2024
Terms (2)
44
Modulation rate
Rateat which the signal level changes
Measured in baud = signal elements per second
BFSK
Prepared By Tsegaye A. 12/22/2024
Phase Shift Keying (PSK)
49
BPSK
Prepared By Tsegaye A. 12/22/2024
Differential PSK
50
Quantized code # 1 9 15 10 5 2 2
PCM code 0001 1001 1111 1010 0101 0010 0010
Prepared By Tsegaye A. 12/22/2024
PAM = pulse amplitude modulation
55 Prepared By Tsegaye A. 12/22/2024
Analog Data, Analog Signals
56
STARTING
Synchronization
The receiver must know the rate at which bits are
Network topology
software
Network Definition
A network can be defined as two or more
computers connected together in such a way that
they can share resources.
A folder
A printer
A disk drive
computer.
Client Client
Client Client
messages travel
Bus
A bus is the simplest physical topology. It consists of a
single cable that runs to every workstation
This topology uses the least amount of cabling, but also
covers the shortest amount of distance.
Each computer shares the same data and address path.
With a logical bus topology, messages pass through the
trunk, and each workstation checks to see if the message
is addressed to itself. If the address of the message
matches the workstation’s address, the network adapter
copies the message to the card’s on-board memory.
Prepared By Tsegaye A. 12/22/2024
Network topology (cont.)
78
Bus topology
Star Topology
Ring
Each computer connects to two other computers,
joining them in a circle creating a unidirectional
path where messages move workstation to
workstation.
Each entity participating in the ring reads a
message, then regenerates it and hands it to its
neighbor on a different network cable.
Ring Topology
Mesh
The mesh topology is the simplest logical topology in terms of data
flow, but it is the most complex in terms of physical design.
In this physical topology, each device is connected to every other
device
This topology is rarely found in LANs, mainly because of the
complexity of the cabling.
If there are x computers, there will be (x × (x–1)) ÷ 2 cables in
the network. For example, if you have five computers in a mesh
network, it will use 5 × (5 – 1) ÷ 2, which equals 10 cables. This
complexity is compounded when you add another workstation.
For example, your five-computer, 10-cable network will jump to 15
cables just by adding one more computer. Imagine how the person
doing the cabling would feel if you told them you had to cable 50
computers in a mesh network—they’d have to come up with 50 ×
(50 – 1) ÷ 2 = 1225 cables!
Prepared By Tsegaye A. 12/22/2024
Network topology (cont.)
87
Because of its design, the physical mesh topology is very
expensive to install and maintain.
Cables must be run from each device to every other device.
The advantage you gain from it is its high fault tolerance.
With a logical mesh topology, however, there will always be a
way of getting the data from source to destination.
It may not be able to take the direct route, but it can take an
alternate, indirect route. It is for this reason that the mesh
topology is still found in WANs to connect multiple sites
across WAN links. It uses devices called routers to search
multiple routes through the mesh and determine the best path.
However, the mesh topology does become inefficient with five
or more entities.
Prepared By Tsegaye A. 12/22/2024
Network topology (cont.)
88
Mesh Topology
For two computers to send and receive data, the cards must agree on
several things. These include the following:
- The maximum size of the data frames
- The amount of data sent before giving
confirmation
- The time needed between transmissions
- The amount of time needed to wait before sending
confirmation
- The amount of data a card can hold
- The speed at which data transmits
In order to successfully send data on the network, you need to make
sure the network cards are of the same type and they are connected
to the same piece of cable.
Prepared By Tsegaye A. 12/22/2024
Configuration
94
Extended example:
❖ how the Internet protocols fetch a web page
Web Browser
Network
Web Server
Computers
Networks
Internet layer
Network Interface
Prepared By Tsegaye A. 12/22/2024
Basic Internet Network Architecture
115
Host A Host B
Application Layer Application Layer
HTTP Message
Router
Internet Layer Internet Layer Internet Layer
IP Datagram IP Datagram
HTTP outline:
GET /~hugue/index.html HTTP/1.1
Host: www.cs.umd.edu
HTTP Message
connection-oriented or connectionless,
TCP outline:
Source Port: 1081
Destination Port: 80
Checksum: 0xa858
IP outline:
Time to live: 128
Header checksum: 0x57d1
Ethernet outline:
Destination:00:a0:cc:54:1d:4e
Source: 00:e0:81:10:19:fc
Type: IP
Ethernet Frame
Src: 00:e0:81:10:19:fc Dst: 00:a0:cc:54:1d:4e Type: IP
Host A Host B
Application Layer Application Layer
Message
Physical Network
Prepared By Tsegaye A. 12/22/2024
Protocol Layering
126
Physical Network
Prepared By Tsegaye A. 12/22/2024
Protocol Hierarchies
127
error management,
flow control,
routing
security
Router Network
B
Web Browser
Network
A
Routing takes place at the IP
layer: routers are not aware of
Web Server transport and application layers.
Prepared By Tsegaye A. 12/22/2024
Protocol Layering and Routing
134
Host A Host B
Application Layer Application Layer
HTTP Message
Router
Internet Layer Internet Layer Internet Layer
IP Datagram IP Datagram
Application 7
5 Application Presentation 6
Session 5
4 TCP Transport 4
3 IP Network 3
2 Network Interface Data Link 2
1 Hardware Physical 1
connector design.
n+1
PDU
N-1 N-1
PDU PDU
IP Addresses
Logical, unique
eg. cs.umd.edu is 128.8.10.143
IP Packet Format:
VERS HL TOS Fragment Length
Datagram ID FLAG Fragment Offset
TTL Protocol Header Checksum
Source Address
Destination Address
Options (if any)
Data
Prepared By Tsegaye A. 12/22/2024
TCP Segment Format
153
Data
Length Checksum
Data
Network API
Socket Structures
Socket Functions
157
Application
Network API
Generic:
support for multiple protocol families.
address representation independence
Descriptor Table
Data structure for file 0
❑ E-mail services. This application provides the basis for e-mail forwarding and storage.
❑ Directory services. This application provides distributed database sources and access for global
information about various objects and services.
• Each standard protocol is a pair of computer programs that interact with the user and the
transport layer to provide a specific service to the user.
• In the case of these application protocols, we should know what types of services they
provide, how they work, the options that we can use with these applications, and so on.
• The study of these protocols enables a network manager to easily solve the problems that
may occur when using these protocols.
• The deep understanding of how these protocols work will also give us some ideas about
how to create new nonstandard protocols.
❖ In this paradigm, there is no need for a server process to be running all the time
and waiting for the client processes to connect.
❖ A computer connected to the Internet can provide service at one time and receive
service at another time.
❖ A computer can even provide and receive services at the same time.
❖ One of the areas that really fits in this paradigm is the Internet telephony.
• After the handshaking process, the two ends can send chunks of
12/22/2024
data in segments in eachPrepared By Tsegaye A.
direction. 189
SCTP Protocol
• SCTP provides a service which is a combination of the two other
protocols.
• SCTP is normally suitable for any application that needs reliability and
at the same time needs to remain connected, even if a failure occurs in
one network-layer connection.
12/22/2024 Prepared By Tsegaye A. 190
Iterative Communication Using UDP
• Communication between a client program and a server
program can occur iteratively or concurrently.
• Although several client programs can access the same server
program at the same time, the server program can be
designed to respond iteratively or concurrently.
• An iterative server can process one client request at a time; it
receives a request, processes it, and sends the response to the
requester before handling another request.
• When the server is handling the request from a client, the
requests from other clients, and even other requests from the
same client, need to be queued at the server site and wait for
the server to be freed.
• The received and queued requests are handled in the first-in,
first-out fashion. Prepared By Tsegaye A. 191
12/22/2024
Sockets Used for UDP
• In UDP communication, the client and server use only one socket each.
• The socket created at the server site lasts forever; the socket created at
the client site is closed (destroyed) when the client process terminates.
• In other words, different clients use different sockets, but the server
creates only one socket and changes only the remote socket address each
time a new client makes a connection.
• This is logical, because the server does know its own socket address,
but does not know the socket addresses of the clients who need its
services; it needs to wait for the client to connect before filling this part of
the socket address.
12/22/2024 Prepared By Tsegaye A. 192
Sockets for UDP communication
• The diagram also shows the status of the socket after each
action.
• We call the first one the listen socket and the second the response socket.
• The reason for having two types of sockets is to separate the connection
phase from the data exchange phase.
• A server uses a listen socket to listen for a new client trying to establish
connection.
• The client uses only one socket for both connection establishment and
12/22/2024 Prepared By Tsegaye A. 198
data exchange.
Sockets used in TCP communication
www.cisco.com
172.16.5.5
66.13.29.25
Source Port
49888 80
Logical Addressing
• Since the network layer provides end-to-
end communication, the two computers
that need to communicate with each other
each need a universal identification
system, referred to as network-layer
address or logical address.
• This type of identification is provided in
the network layer through a uniform and
global addressing mechanism.
12/22/2024 Prepared By Tsegaye A. 235
Services Provided at the
Source Computer
The network layer at the source computer provides
four services:
❖Packetizing,
❖Finding the logical address of the next hop,
❖ Finding the physical (MAC) address of the next
hop, and
❖ Fragmenting the datagram if necessary.
• The network layer does not actually deliver the datagram to the
next hop; it is the duty of the data link layer to do the delivery.
• The data link layer needs the MAC address of the next hop to do
the delivery.
• To find the MAC address of the next hop, the network layer
could use another table to map the next-hop logical address to
the MAC address.
• this task has been assigned to another auxiliary protocol called
Address Resolution Protocol (ARP) that finds the MAC address
of the next hop given the logical address.
Dotted-Decimal Notation
117.149.29.2
12/22/2024 Prepared By Tsegaye A. 247
Example: Dotted-decimal
notation and binary notation for
an IPv4 address
Example 1
Solution
We replace each group of 8 bits with its equivalent
decimal number and add dots for separation.
19.8
Example 2
Solution
We replace each decimal number with its binary
equivalent.
19.9
Example 3
Solution
a. There must be no leading zero (045).
b. There can be no more than four numbers.
c. Each number needs to be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal
notation is not allowed.
Classful Addressing
• IPv4 addressing, at its inception, used
the concept of classes.
• This architecture is called classful
addressing.
• In classful addressing, the address space
is divided into five classes: A, B, C, D,
and E.
• Each class occupies some part of the
address space.
Finding the classes in binary and dotted-decimal
notation
Example 4
Solution
a. The first bit is 0. This is a class A address.
b. The first 2 bits are 1; the third bit is 0. This is a class C
address.
c. The first byte is 14; the class is A.
d. The first byte is 252; the class is E.
19.13
Classes and Blocks
• One problem with classful addressing is that
each class is divided into a fixed number of
blocks with each block having a fixed size
Find
• a. The first address
• b. The last address
• c. The number of addresses.
Solution
a. The first address can be found by ANDing the given
addresses with the mask. ANDing here is done bit by
bit. The result of ANDing 2 bits is 1 if both bits are 1s;
the result is 0 otherwise.
b. The last address can be found by ORing the given
addresses with the complement of the mask. ORing
here is done bit by bit. The result of ORing 2 bits is 0 if
both bits are 0s; the result is 1 otherwise. The
complement of a number is found by changing each 1
to 0 and each 0 to 1.
c. The number of addresses can be found by
complementing the mask, interpreting it as a decimal
number, and adding 1 to it.
Network Addresses
• A very important concept in IP addressing is the
network address.
• When an organization is given a block of addresses,
the organization is free to allocate the addresses to the
devices that need to be connected to the Internet.
• The first address in the class, however, is normally (not
always) treated as a special address.
• The first address is called the network address and
defines the organization network.
• It defines the organization itself to the rest of the
world.
• The first address is the one that is used by routers to
direct the message sent to the organization from the
outside.
Hierarchy
• IP addresses, like other addresses or identifiers
we encounter these days, have levels of
hierarchy.
• For example, a telephone network in Ethiopia
has three levels of hierarchy.
• The leftmost three digits (251) define the
country code, the next three digits (011, for
example) define the area, the last six digits
(112343, for example) define the subscriber
number.
Two-Level Hierarchy: No Subnetting
• An IP address can define only two levels of
hierarchy when not subnetted.
• The n leftmost bits of the address x.y.z.t/n define
the network (organization network); the 32 – n
rightmost bits define the particular host (computer
or router) to the network.
• The two common terms are prefix and suffix.
• The part of the address that defines the network is
called the prefix; the part that defines the host is
called the suffix.
• The prefix is common to all addresses in the
network; the suffix changes from one device to
another.
Three-Levels of Hierarchy: Subnetting
• An organization that is granted a large block of
addresses may want to create clusters of networks
(called subnets) and divide the addresses between the
different subnets.
• The rest of the world still sees the organization as one
entity; however, internally there are several subnets.
• All messages are sent to the router address that
connects the organization to the rest of the Internet;
the router routes the message to the appropriate
subnets.
• The organization, however, needs to create small
subblocks of addresses, each assigned to specific
subnets. The organization has its own mask; each
subnet must also have its own.
Example
• Suppose an organization is given the block
17.12.14.0/26, which contains 64 addresses. The
organization has three offices and needs to divide the
addresses into three subblocks of 32, 16, and 16
addresses.
• We can find the new masks by using the following
arguments:
1. Suppose the mask for the first subnet is n1, then 232-n1
must be 32, which means that n1 = 27.
2. Suppose the mask for the second subnet is n2, then 232-n2
must be 16, which means that n2 = 28.
3. Suppose the mask for the third subnet is n3, then 232-n3
must be 16, which means that n3 = 28.
• This means that we have the masks 27, 28, 28 with
the organization mask being 26.
More Levels of Hierarchy
• The structure of classless addressing does not restrict the
number of hierarchical levels.
• An organization can divide the granted block of addresses into
subblocks.
• Each subblock can in turn be divided into smaller subblocks.
And so on.
• One example of this is seen in the ISPs.
• A national ISP can divide a granted large block into smaller
blocks and assign each of them to a regional ISP.
• A regional ISP can divide the block received from the national
ISP into smaller blocks and assign each one to a local ISP.
• A local ISP can divide the block received from the regional ISP
into smaller blocks and assign each one to a different
organization.
• Finally, an organization can divide the received block and make
several subnets out of it.
Address Allocation
• The next issue in classless addressing is address allocation.
How are the blocks allocated?
• The ultimate responsibility of address allocation is given to a
global authority called the Internet Corporation for Assigned
Names and Addresses (ICANN).
• However, ICANN does not normally allocate addresses to
individual organizations. It assigns a large block of addresses
to an ISP.
• Each ISP, in turn, divides its assigned block into smaller
subblocks and grants the subblocks to its customers.
• In other words, an ISP receives one large block to be
distributed to its Internet users.
• This is called address aggregation: many blocks of addresses
are aggregated in one block and granted to one ISP.
Example
An ISP is granted a block of addresses starting with
190.100.0.0/16 (65,536 addresses).
The ISP needs to distribute these addresses to three groups of
customers as follows:
a. The first group has 64 customers; each needs 256
addresses.
b. The second group has 128 customers; each needs 128
addresses.
c. The third group has 128 customers; each needs 64
addresses.
Design the subblocks and find out how many addresses
are still available after these allocations.
Group 1 solution
For this group, each customer needs 256 addresses. This means that 8
(log2256) bits are needed to define each host. The prefix length is
then 32 − 8 = 24. The addresses are
Group 2
For this group, each customer needs 128 addresses. This
means that 7 (log2 128) bits are needed to define each host.
The prefix length is then 32 − 7 = 25. The addresses are
Group 3
For this group, each customer needs 64 addresses. This
means that 6 (log264) bits are needed to each host. The prefix
length is then 32 − 6 = 26. The addresses are
Solution
We first need to align the left side of the double colon
to the left of the original pattern and the right side of
the double colon to the right of the original pattern to
find how many 0s we need to replace the double
colon.
19.47
ADDRESS MAPPING
• The delivery of a packet to a host or a router
requires two levels of addressing: logical and
physical.
• We need to be able to map a logical address
to its corresponding physical address and vice
versa.
• This can be done by using either static or
dynamic mapping.
• IP is used for logical addressing
• MAC is used for physical addressing in a local
network such as Ethernet
Mapping Logical to Physical
Address: ARP
• Anytime a host or a router has an IP datagram to send to
another host or router, it has the logical (IP) address of the
receiver.
• The logical (IP) address is obtained from the DNS if the
sender is the host or it is found in a routing table if the sender
is a router.
• But the IP datagram must be encapsulated in a frame to be
able to pass through the physical network. This means that the
sender needs the physical address of the receiver. The host or
the router sends an ARP query packet.
• The packet includes the physical and IP addresses of the
sender and the IP address of the receiver. Because the sender
does not know the physical address of the receiver, the query
is broadcast over the network
Mapping Physical to Logical
Address: RARP
• There are occasions in which a host knows its
physical address, but needs to know its logical
address. This may happen in two cases:
1. A diskless station is just booted. The station
can find its physical address by checking its
interface, but it does not know its IP address.
2. An organization does not have enough IP
addresses to assign to each station; it needs to
assign IP addresses on demand. The station can
send its physical address and ask for a short
time lease.
• Reverse Address Resolution Protocol (RARP) finds
the logical address for a machine that knows only its
physical address. Each host or router is assigned one
or more logical (IP) addresses, which are unique and
independent of the physical (hardware) address of
the machine. To create an IP datagram, a host or a
router needs to know its own IP address or addresses.
The IP address of a machine is usually read from its
configuration file stored on a disk file.
• The machine can get its physical address (by reading
its NIC, for example), which is unique locally. It can
then use the physical address to get the logical
address by using the RARP protocol. A RARP
request is created and broadcast on the local network.
Another machine on the local network that knows all
the IP addresses will respond with a RARP reply.
ICMP
• The IP protocol has no error-reporting or
error-correcting mechanism.
• The IP protocol also lacks a mechanism for host
and management queries.
• The Internet Control Message Protocol
(ICMP) has been designed to compensate for
the above two deficiencies.
• It is a companion to the IP protocol.
• PING and TRACEROUTE are two tools for
ICMP
Link Layer
and
Physical Layer
INTRODUCTION
The first node is the source host; the last node is the destination
host. The other four nodes are four routers. The first, the third,
and the fifth links represent the three LANs; the second and the
fourth links represent the two WANs.
12/22/2024 Prepared By Tsegaye A. 303
Services provided by the layer
• The data-link layer is located between the physical and the
network layers.
• The datalink layer provides services to the network layer; it
receives services from the physical layer.
• The duty scope of the data-link layer is node-to-node.
• When a packet is travelling in the Internet, the data-link
layer of a node (host or router) is responsible for delivering a
datagram to the next node in the path.
• For this purpose, the data-link layer of the sending node
needs to encapsulate the datagram received from the network
in a frame, and the data-link layer of the receiving node
needs to decapsulate the datagram from the frame.
12/22/2024 Prepared By Tsegaye A. 304
Cont’d
• In other words, the data-link layer of the source host needs
only to encapsulate, the data-link layer of the destination
host needs to decapsulate, but each intermediate node needs
to both encapsulate and decapsulate.
• One may ask why we need encapsulation and decapsulation
at each intermediate node.
• The reason is that each link may be using a different
protocol with a different frame format.
• Even if one link and the next are using the same protocol,
encapsulation and decapsulation are needed because the
link-layer addresses are normally different
12/22/2024 Prepared By Tsegaye A. 305
Cont’d
• Assume a person needs to travel from her home to her friend’s home in
another city.
• The traveller can use three transportation tools.
• She can take a taxi to go to the train station in her own city, then travel
on the train from her own city to the city where her friend lives, and
finally reach her friend’s home using another taxi.
• Here we have a source node, a destination node, and two intermediate
nodes.
• The traveller needs to get into the taxi at the source node, get out of
the taxi and get into the train at the first intermediate node (train station
in the city where she lives), get out of the train and get into another taxi
at the second intermediate node (train station in the city where her friend
lives), and finally get out of the taxi when she arrives at her destination.
12/22/2024 Prepared By Tsegaye A. 306
Framing
• Definitely, the first service provided by the data-link layer
is framing.
• The data-link layer at each node needs to encapsulate the
datagram (packet received from the network layer) in a
frame before sending it to the next node.
• The node also needs to decapsulate the datagram from
the frame received on the logical channel.
• Although we have shown only a header for a frame, that a
frame may have both a header and a trailer.
• Different data-link layers have different formats for
framing.
12/22/2024 Prepared By Tsegaye A. 307
Flow Control
• Whenever we have a producer and a consumer, we need to think
about flow control.
• If the producer produces items that cannot be consumed,
accumulation of items occurs.
• The sending data-link layer at the end of a link is a producer of
frames; the receiving data-link layer at the other end of a link is a
consumer.
• If the rate of produced frames is higher than the rate of
consumed frames, frames at the receiving end need to be buffered
while waiting to be consumed (processed).
• Definitely, we cannot have an unlimited buffer size at the receiving
side.
.
• In other words, we can have a point-to-point link or a
broadcast link. In a point-to-point link, the link is
dedicated to the two devices; in a broadcast link, the link
is shared between several pairs of devices.
12/22/2024 Prepared By Tsegaye A. 311
Two Sublayers
• To better understand the functionality of and the services
provided by the link layer, we can divide the data-link layer
into two sublayers:
1. data link control (DLC) and
331
12/22/2024 Prepared By Tsegaye A.
Bit-Oriented Framing
• In bit-oriented framing, the data section of a frame is a sequence of
bits to be interpreted by the upper layer as text, graphic, audio, video,
and so on.
• However, in addition to headers (and possible trailers), we still need a
delimiter to separate one frame from the other. Most protocols use a
special 8-bit pattern flag, 01111110, as the delimiter to define the
beginning and the end of the frame.
• Our first protocol is a simple protocol with neither flow nor error
control.
• We assume that the receiver can immediately handle any frame it
receives.
• In other words, the receiver can never be overwhelmed with incoming
frames. Figure 5.10 shows the layout for this protocol.
• 12/22/2024
The LAN market hasPrepared
seenByseveral
Tsegaye A.
technologies such as
349
PERFORMANCE
• we have discussed the tools of transmitting data (signals) over a
network and how the data behave.
• One important issue in networking is the performance of the network—
how good is it?
Bandwidth
• One characteristic that measures network performance is bandwidth.
However, the term can be used in two different contexts with two
different measuring values: bandwidth in hertz and bandwidth in bits
per second.
Bandwidth in Hertz
• Bandwidth in hertz is the range of frequencies contained in a composite
signal or the range of frequencies a channel can pass. For example, we
can say the bandwidth of a subscriber telephone line is 4 kHz.
• If the delay for the first packet is 20 ms, for the second is 45 ms,
and for the third is 40 ms, then the real-time application that uses
the packets endures jitter.