Computer Networks Unit12
Computer Networks Unit12
Unit - 1
Simply a Friend’s NETWORK
computer network
• A computer network, often simply referred to
as a network, is a collection of computers
and devices interconnected by
communications channels that facilitate
communications among users and allows
users to share resources.
Collection of computers
devices
communications channels
WIRED WIRELESS
• Networks may be classified according to a
wide variety of characteristics.
• A computer network allows sharing of
resources and information among
interconnected devices.
Computer networks can be used for a variety of purposes:
Facilitating communications: Using a network, people can communicate efficiently and easily via
email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing.
Sharing hardware: In a networked environment, each computer on a network may access and
use hardware resources on the network, such as printing a document on a shared network
printer.
Sharing files, data, and information: In a network environment, authorized user may access data
and information stored on other computers on the network. The capability of providing access to
data and information on shared storage devices is an important feature of many networks.
Sharing software: Users connected to a network may run application programs on remote
computers.
Speed up.
Components:
• Message
• Sender
• Receiver
• Transmission medium
• Protocol
• Protocol is a set of rules.
• Example: Now consider that you are driving a car.
• You have to follow some set of rules for that.
• Why was that rules put?
• It was posed on all drivers so that the
transportation is smooth and safe.
• Similarly in networking the protocols were set up so
that the transportation of your message over the
network is smooth and safe.
• A standard way of communicating across a
network.
• A protocol is the "language" of the network.
• A method by which two dissimilar systems can
communicate.
• TCP is a protocol which runs over a network.
Data flow:
• Simplex, half-duplex and full-duplex connections
• A simplex connection is a connection in which the data flows in only one direction, from the
transmitter to the receiver. This type of connection is useful if the data do not need to flow in
both directions (for example, from your computer to the printer or from the mouse to your
computer...).
• A half-duplex connection (sometimes called an alternating connection or semi-duplex) is a
connection in which the data flows in one direction or the other, but not both at the same
time. With this type of connection, each end of the connection transmits in turn. This type of
connection makes it possible to have bidirectional communications using the full capacity of
the line.
EXAMPLE -
• A full-duplex connection is a connection in which the data flow in both directions
simultaneously. Each end of the line can thus transmit and receive at the same time, which
means that the bandwidth is divided in two for each direction of data transmission if the
same transmission medium is used for both directions of transmission.
EXAMPLE -
•types of
transmission
technologies
• Transmission is actually the process of sending
and propagating analog or signals of digital
information.
• Transmission technology generally refers to
physical layer protocol duties like modulation,
demodulation, line coding, and many more.
• It might also include higher-level protocol
duties such as digitizing analog signals, data
compression, etc.
• Types of Transmission Technology :
Transmission media is basically divided into
two categories:
• Broadcast Networks,
• Point-to-Point Networks.
• 1. Broadcast Networks :
Broadcast networks are also known as terrestrial
networks.
• It is basically a group of radio stations, television
stations, or any other electronic media outlets that
simply generate agreement to air, or broadcast,
content generally from a centralized source.
• Broadcasting is simply a method of transferring
messages to all the recipients simultaneously.
• In this network, a message that is sent by a node is
received by all the other nodes connected to the
network and share a common medium of
communication.
• Broadcast networks also avoid procedures of complex
routing of switched network by simply confirming and
ensuring that each transmission of nodes is basically
received by all the other nodes in the network.
• This is the reason why the broadcast network has
single communications channel.
• In this network, each receiving station just receives all signals that
are sent by transmitters.
• Even routing of signals is highly affected passively.
• These networks generally have single communication that is shared
by all machines present on the network.
• Short messages also are known as packets that are sent by any of
the machines present are received by all of the others present over
there.
• Some of the systems of broadcast also support transmission to
subset of machines also known as multicasting.
• It just links, in contrast, communication channel that is basically
shared by all of machines in network.
• Advantages of Broadcast Networks –
• In this network, packets are generally transmitted and
received by all of computers.
• It allows multicasting in the network.
• It has no limit. Even events can also run as long as required.
• It ensures better utilization of all resources available.
• Disadvantages of Broadcast Networks –
• It cannot accommodate huge number of devices.
• It doesn’t allow personalization of message.
• 2. Point-to-Point Networks :
Point-to-Point Networks or Point-to-Point Connection is type of
private data connection that is connecting securely two or
more locations for private data services.
• It might also be configured to usually carry voice, internet, and
data services together all over same point-to-point network.
• It simply refers to type of communication connection among
two endpoints or nodes of communication.
• It is connection among pairs of machines.
• Transmission from point-to-point with one sender and receiver
is commonly known as unicasting.
• This network is generally used for two locations that are required to
securely send data that is very sensitive and confidential among each of
locations.
• A point-to-point or P2P (Data Link) also gives or provides path from one
point that is fixed to other point being fixed.
• It is very closed network data transport service that does not travel
through public Internet.
• This network includes various connections among individual pairs of
machine.
• A packet present on these types of networks might be needed to go
through intermediate computers before they reach desired or
destination computer.
• The packets also need to follow multiple routes of different length sizes.
• Therefore, routing algorithms are very
essential and important in point-to-point
connection.
• This network is generally available in range of
bandwidth speeds along with point-to-point
T1, point-to-point Ethernet, or many more.
• Advantages of Point-to-Point Networks –
• It increases productivity.
• It generally uses leased lines so that speeds are
guaranteed.
• It provides better security so that data can be transferred
securely with confidence.
• Disadvantages of Point-to-Point Networks –
• With this network, we can only connect two sites.
• It is very expensive for distant locations.
•Network
Categories: LAN,
MAN, WAN
(Wireless /Wired)
Network Types
• Networks may be
classified according to a
wide variety of
characteristics.
Network Types – By Span Of Geographical area
• LAN
• MAN
• WAN
Local Area Network
• A local area network (LAN) is a network that
connects computers and devices in a limited
geographical area such as home, school,
computer laboratory, office building, or closely
positioned group of buildings.
42
Figure 2.17 OSI model
Layers
• In the sense of purpose and responsibility, each layer is
separate and independent
• Each has its own function, but also provides a service to
those layers above and below itself
• The model should be considered an aid to understanding the
nature of communication on the network – and useful in
sorting out troubles that might occur on a network
• By providing, it allows both software engineers and hardware
manufacturers ensure their products work together.
44
The Layers at Work
As the next slide shows:
• When communicating, each OSI layer talks with the same
layer in the other device
• E.g. the Application Layer of Device A communicates with
the Application Layer of Device B, by passing the data
through the other layers
• The Application Layer of each device is not concerned with
how the other layers are functioning, but it does rely on
them to do their job
45
The layers at Work
46
Remembering the Layers
Application All
Presentation People
Session Seem
Transport To
Network Need
Data Link Data
Physical Processing
47
How does data flow ?
When data is sent from the application on the source
computer the following happens
• Data in the form of a packet moves down through
the layers
• When it reaches the Physical Layer it is ready to be
sent along the cable
• At the Physical Layer the bits may be analogue or
digital, in the form of electrical, light or radio waves
48
How does data flow ? (2)
49
Encapsulation
50
Physical Layer
• The lowest, bottom, layer – responsible for the physical
connection between devices
• The NIC converts the data (bits) in to transmission signals.
• Transmissions may be analogue or digital
• Responsible for the rate of transmission
• Includes all components such as the type of connector (RJ-45,
Token Ring, BNC, SC connector)
• Devices at this level include NICs, repeaters, hubs and
concentrators
51
Figure 2.5 Physical layer
Note:
Representation of bits
Physical Topology
Transmission Mode
Data Link Layer
• Has two sub layers of its own:
– Logical Link Control (LLC)
– Media Access Control (MAC)
• LLC acts between protocols such as Internet Protocol
(IP) and the MAC method.
• MAC is responsible for the connection to the physical
media (eg cable)
55
MAC
• Each NIC has a unique number hard coded in to the
card – its physical address
• The first 6 digits denote the manufacturer, the next
six are unique) – type “winipcfg” on your PC
• When the MAC address is added to the packet it is
now known as a frame
• It now has all the information required to travel from
the source to the destination
56
Figure 2.6 Data link layer
Note:
Physical Addressing
Flow Control
Error control
63
Network Layer (2)
The Network Layer does the following:
• Adds the address to the packet (encapsulation)
• Maps the network address to the devices physical address
• Determines the best path for the packet (routing)
• Ensures that the packet is in the correct format for the
destination
See Diagram =
64
How does it work ?
• Encapsulation at the Transport Layer involves adding the address of the
sender to the datagram
• The destination address is now added. Both addresses are logical.
• Both addresses are necessary for packets to move between end systems.
• If a packet must move to another network, a routing protocol is required
• If different packet lengths are used on the different networks, the
Network Layer formats the data accordingly
• The primary piece of hardware which works on this layer is the router.
(covered in detail, later in course)
65
Figure 2.9 Network layer
Note:
Routing
Figure 2.10 Source-to-destination delivery
Example 2
In Figure 2.11 we want to send data from a node with
network address A and physical address 10, located on
one LAN, to a node with a network address P and
physical address 95, located on another LAN. Because
the two devices are located on different networks, we
cannot use physical addresses only; the physical
addresses only have local jurisdiction. What we need here
are universal addresses that can pass through the LAN
boundaries. The network (logical) addresses have this
characteristic.
Figure 2.11 Example 2
Transport Layer
• Ensures reliable transport of packets from source to
destination
• Also manages the speed of transmission – flow
control
• There are two types of transmission (Connection-
Oriented Transmissions and Connectionless
Transmissions) – see next slide
72
Connection-Oriented Transmissions
• Also known as ‘ Reliable Transport Method’ – uses
acknowledgement (ack) packets on successful receipt of data
• Extra packets slows down communication
• Features are
– Reliability
– Slower Communication
– Packets are re-transmitted if unrecognisable or not received
• Once all the data is received successfully , the packet is re-
assembled and the Transport Layer passes it to the Session
Layer
73
Connectionless Transmissions
• In this mode the transmitting device does not require
acknowledgements from the receiver, and continues
to transmit on the assumption that the data was
received
• Features are:
– Little or No Reliability
– Faster Transmission
– Packets are not Re-transmitted
74
Flow Control
• Establishes the maximum speed at which both sender
and receiver can communicate at
• Transport Layer determines largest packet size which
can be sent
• Packets are numbered – to allow re-assembly in the
correct order
75
Figure 2.12 Transport layer
Note:
84
Session Services
The following services are provided:
• Establishing a Connection
• Maintaining the Session
• Ending the Connection
• Dialogue Control
• Dialogue Separation
85
Session Services (2)
• Handshaking – SYN and ACK packets
• Session must be terminated (otherwise one device will
be still transmitting without any device actually
listening)
• Dialogue Control (simplex, half-duplex, full-duplex)
• Dialogue Separation – checkpoints within the
transmission which allow the detection of lost packets,
and subsequent re-transmission
86
Session Layer Functions:
Dialog Control: session layer allows two
systems to enter into a dialog, it allows
communication between two processes to take
place in either half duplex or full duplex mode.
88
Presentation Layer (2)
(2) Data Compression
• By reducing the volume of data, transfers can take
place in less time
• Packets are examined and such things as spaces in
text removed
• The destination device returns the data to its original
format before passing to the Application Layer
89
Presentation Layer (3)
(3) Data Encryption
• Allows data to be converted to a form which hides its
meaning, apart from those you wish to see it
• Not all data is encrypted on its journey across the
network
• In order for decryption to occur at the destination
device a ‘key’ is required
90
Functions of Presentation Layer:
Translation – The presentation layer at the sender
changes information from its sender-dependent format into a
common format. The presentation layer at receiving machine
changes the common format into its receiver dependent format.
92
Application Services
• File Services
• Electronic-mail Services
• Network-printing Services
• Application Services
• Database Services
93
Figure 2.15 Application layer
Note:
Mail Services:
Directory Services:
Figure 2.16 Summary of duties
OSI versus TCP/IP Model
• OSI model is an important concept
• Protocol most in use on modern networks is TCP/IP
• TCP/IP does not map its layers precisely to OSI model
• OSI = 7 layers, TCP/IP = 4 layers (sometimes a 5th
physical layer is referred to)
98
OSI vs TCP/IP
Application
Application or
Presentation
Process Layer
Session
Transport Transport
Network Internet
Physical
99
TCP/IP Model – Summary
• Application or Process Layer – concerned with how data at
both ends is handled.
• Transport Layer – manages flow of data
• Internet Layer – consists of several protocols, primary
protocol is IP (providing hierarchical addressing scheme
• Data Link (or Network Interface) Layer – manages
transmission of data within the network
• Physical Layer – not really defined, TCP/IP leaves the physical
connection to manage itself
100
Summary
• Purpose of the OSI model and its seven layers
• Function of each layer
• Process for communication between devices
• TCP/IP Model
101
• Physical Layer: Bit rate, Baud rate, Bandwidth,
Transmission Impairments: Attenuation, Distortion,
Noise; Data rate limits: Nyquist formula, Shannon
Formula, Modulation & modems; Transmission
Modes, Multiplexing: Frequency Division, Time
Division, Wavelength Division; Concept of
Topologies, Transmission Media: Twisted pair,
coaxial, fiber optics, Wireless Transmission (radio,
microwave & infrared);Message switching, Circuit
Switching & Packet Switching.
•Bit rate, Baud
rate,
Bandwidth,
Bit rate
• Bit rate is the number of binary bits (1s or 0s) transmitted per second.
• Bit rate refers to the rate at which data is processed or transferred.
• It is usually measured in seconds, ranging from bps for smaller values to
kbps and mbps.
• Bit rate is also known as bitrate or data rate.
Baud Rate
• Baud rate is the rate at which the number of
signal elements or changes to the signal
occurs per second when it passes through a
transmission medium.
• The higher a baud rate is the faster the data is
sent/received.
• In above Image, Number of signal elements (marked
in red color) = 3, Number of bits transmitted (1, 0, 1)
= 3. So, Here Bit rate = 3/1 = 3 bits per second. And,
Baud rate = 3/1 = 3 baud per second.
• In above Image, Number of signal elements (marked
in red color) = 6, Number of bits transmitted (1, 1, 0)
= 3. So, Here Bit rate = 3/1 = 3 bits per second. and,
Baud rate = 6/1 = 6 baud per second.
Note:
Solution
10 log10 (P2/P1) = 10 log10 (0.5P1/P1) = 10 log10 (0.5)
= 10(–0.3) = –3 dB
Example 13
Imagine a signal travels through an amplifier and its
power is increased ten times. This means that P2 = 10
P1. In this case, the amplification (gain of power) can be
calculated as
dB = –3 + 7 – 3 = +1
distortion
A very important consideration in data communications is how fast we can send data, in
bits per second, over a channel. Data rate depends on three factors:
1. The bandwidth available
2. The level of the signals we use
3. The quality of the channel (the level of noise)
3.129
Example
We need to send 265 kbps over a noiseless channel with a bandwidth of 20 kHz. How
many signal levels do we need?
Solution
We can use the Nyquist formula as shown:
Since this result is not a power of 2, we need to either increase the number of levels or
reduce the bit rate. If we have 128 levels, the bit rate is 280 kbps. If we have 64 levels, the
bit rate is 240 kbps.
Shannon capacity
• Shannon capacity is a formula used to
determine the theoretical highest data rate for
a channel through which data is
passing/transferring.
• The formula is:
• C=B log2 (1 + S/N)
• Here C is the Capacity, B is the Bandwidth of
the channel, S/N is the Signal to Noise ratio.
Example 1:
• Consider an extremely noisy channel in which the
value of the signal-to-noise ratio is almost zero. In
other words, the noise is so strong that the signal is
faint. For this channel, the capacity is calculated as:
• C = B log2 (1 + S/N) = B log2 (1 + 0) = B log2 (1)
• =B * 0 = 0
3.134
Modulation
& modems;
Modulation
modulation is the process of varying one or more
properties of a periodic waveform, called the
carrier signal, with a separate signal called the
modulation signal that typically contains
information to be transmitted.
Digital to
Digital
Conversion
Line coding is the process of converting digital data to
digital signals.
We assume that data, in the form of text, numbers,
graphical images, audio, or video, are stored in computer
memory as sequences of bits.
Signal Element Versus Data Element
This can be achieved if there are transitions in the signal that alert the
receiver to the beginning, middle, or end of the pulse.
4.151
Figure 4.4 Lack of synchronization
Figure 4.2 Signal level versus data level
Example 1
Sampling
Quantizing
Encoding
• The sampling process is sometimes
referred to as PULSE AMPLITUDE
MODULATION (PAM).
Figure 4.18 PAM
Figure 4.19 Quantized PAM signal
Figure 4.20 Quantizing by using sign and magnitude
Uniform quantisation uses equal quantisation levels throughout the
entire range of an input analogue signal. The signal-to-noise ratio (SNR),
including quantisation noise, is the most important factor affecting voice
quality in uniform quantisation. The signal-to-noise ratio is measured in
decibels (dB). The higher the signal-to-noise ratio, the better the voice
quality. Quantisation noise reduces the signal-to-noise ratio of a signal, so
an increase in quantisation noise degrades the quality of a voice signal.
Low signals will have a small signal-to-noise ratio and high signals will
have a large signal-to-noise ratio. Because most voice signals are
relatively low, having better voice quality at higher signal levels is an
inefficient way of digitising voice signals. Uniform quantisation was
therefore replaced by a non-uniform quantisation process called
companding
Figure 4.21 PCM
Figure 4.22 From analog signal to PCM digital code
Note:
• Amplitude
• Frequency
• Phase
• When we vary these characteristics, the
outcome should be a NEW WAVEFORM or a
DIFFERENT VERSION of a WAVEFORM.
Signal Element Versus Data Element
•
• Where L is the level of signal element
•Amplitude
Shift Keying
• In amplitude shift keying, the amplitude of the
carrier signal is varied to create signal
elements.
In ASK the baud rate and bit rate are the same. The baud
rate is therefore 2000. An ASK signal requires a
minimum bandwidth equal to its baud rate. Therefore,
the minimum bandwidth is 2000 Hz.
Example 4
Given a bandwidth of 5000 Hz for an ASK signal, what
are the baud rate and bit rate?
Solution
In ASK the baud rate is the same as the bandwidth,
which means the baud rate is 5000. But because the baud
rate and the bit rate are also the same for ASK, the bit
rate is 5000 bps.
Example 5
Given a bandwidth of 10,000 Hz (1000 to 11,000 Hz),
draw the full-duplex ASK diagram of the system. Find the
carriers and the bandwidths in each direction. Assume
there is no gap between the bands in the two directions.
Solution
For full-duplex ASK, the bandwidth for each direction is
BW = 10000 / 2 = 5000 Hz
The carrier frequencies can be chosen at the middle of
each band (see Fig. 5.5).
fc (forward) = 1000 + 5000/2 = 3500 Hz
fc (backward) = 11000 – 5000/2 = 8500 Hz
Figure 5.5 Solution to Example 5
Binary ASK (BASK)
Figure 5.6 FSK
Figure 5.7 Relationship between baud rate and bandwidth in FSK
Example 6
Find the minimum bandwidth for an FSK signal
transmitting at 2000 bps. Transmission is in half-duplex
mode, and the carriers are separated by 3000 Hz.
Solution
For FSK
BW = baud rate + fc1 - fc0
BW = bit rate + fc1 - fc0 = 2000 + 3000 = 5000 Hz
Example 7
Find the maximum bit rates for an FSK signal if the
bandwidth of the medium is 12,000 Hz and the difference
between the two carriers is 2000 Hz. Transmission is in
full-duplex mode.
Solution
Because the transmission is full duplex, only 6000 Hz is
allocated for each direction.
BW = baud rate + fc1 - fc0
Baud rate = BW - (fc1 - fc0 ) = 6000 - 2000 = 4000
But because the baud rate is the same as the bit rate, the
bit rate is 4000 bps.
Figure 5.8 PSK
Figure 5.9 PSK constellation
Figure 5.10 The 4-PSK method
Figure 5.11 The 4-PSK characteristics
Figure 5.12 The 8-PSK characteristics
QPSK and its implementation:
Note:
Solution
An AM signal requires twice the bandwidth of the
original signal:
BW = 2 x 4 KHz = 8 KHz
Note:
Solution
An FM signal requires 10 times the bandwidth of the
original signal:
BW = 10 x 4 MHz = 40 MHz
Modems
The word "modem" is a contraction of the words
modulator-demodulator.
A modem is typically used to send digital data over a
phone line.
The sending modem modulates the data into a signal
that is compatible with the phone line, and the
receiving modem demodulates the signal back into
digital data.
Wireless modems convert digital data into radio
signals and back.
Inside the Modem: Modulator
Digital signal
Digital signal
modem ->
ISDN adapter
Transmission
Modes
Transmission Modes
• Defn: A transmission mode is the manner in
which data is sent over the underlying medium
Transmission modes can be divided into two fundamental
categories:
4.286
Parallel Transmission
4.293
Serial Transmission
• The hardware needed to convert data between
an internal parallel form and a serial form can be
straightforward or complex
• In the simplest case, a single chip that is known
as a Universal Asynchronous Receiver and
Transmitter (UART) performs the conversion
• A related chip, Universal Synchronous-
Asynchronous Receiver and Transmitter (USART)
handles conversion for synchronous networks
Timing of Serial Transmission
• Serial transmission mechanisms can be divided into
three broad categories (depending on how
transmissions are spaced in time):
• Asynchronous transmission can occur at any time
– with an arbitrary(uninformed) delay between the
transmission of two data items
• Synchronous transmission occurs continuously
– with no gap between the transmission of two data items
• Isochronous transmission occurs at regular intervals
– with a fixed gap between the transmission of two data items
Asynchronous Transmission
• It is asynchronous if the system allows the physical medium to be idle for an
arbitrary time between two transmissions
• The asynchronous style of communication is well-suited to applications that
generate data at random(unsystematically)
– (e.g., a user typing on a keyboard or a user that clicks on a link)
• The disadvantage of asynchrony arises from the lack of coordination between
sender and receiver
– While the medium is idle, a receiver cannot know how long the medium will remain
idle before more data arrives
• Asynchronous technologies usually arrange for a sender to transmit a few extra
bits before each data item
– to inform the receiver that a data transfer is starting
– extra bits allow the receiver to synchronize with the incoming signal
– the extra bits are known as a preamble or start bits
Asynchronous Character Transmission
This figure illustrates how voltage varies at different stages:
a start bit, eight bits of a character, and a stop bit are sent
Note
4.299
Note
4.300
Figure 4.34 Asynchronous transmission
4.301
Synchronous Transmission
• A synchronous mechanism transmits bits of data continually
– with no idle time between bits
– after transmitting the final bit of one data byte, the sender transmits a bit of the
next data byte
• The sender and receiver constantly remain synchronized
– which means less synchronization overhead
• Compare the 8-bit characters on
– an asynchronous system as illustrated in Figure 9.5
– and a synchronous system as illustrated in Figure 9.6
• Each character sent using RS-232 requires an extra start bit and stop bit
– meaning that each 8-bit character requires a minimum of 10 bit times, even if no
idle time is inserted
• On a synchronous system
– each character is sent without start or stop bits
Bytes, Blocks, and Frames
• If the underlying synchronous mechanism must send
bits continually
– What happens if a sender does not have data ready to send
at all times?
– The answer lies in a technique known as framing:
• an interface is added to a synchronous mechanism that accepts and
delivers a block of bytes known as a frame
– Most synchronous systems include an idle sequence
(or idle byte)
• that is transmitted when the sender has no data to
send
Bytes, Blocks, and Frames
Note
4.306
Figure 4.35 Synchronous transmission
4.307
Isochronous Transmission
• Isochronous transmission
– is designed to provide steady(FIXED, STABLE) bit flow for multimedia applications
311
Categories of multiplexing
Introduction
Under the simplest conditions, a medium can carry only one
signal at any moment in time.
For multiple signals to share one medium, the medium must
somehow be divided, giving each signal a portion of the total
bandwidth.
The current techniques that can accomplish this include
• frequency division multiplexing (FDM)
• time division multiplexing (TDM)
• Synchronous vs statistical
• wavelength division multiplexing (WDM)
313
Multiplexing
Multiplexor (MUX)
Demultiplexor (DEMUX)
Sometimes just called a MUX
314
Multiplexing
• Two or more simultaneous transmissions
on a single circuit.
• Multiplexing costs less.
315
Frequency Division Multiplexing
Assignment of non-overlapping frequency ranges to each
“user” or signal on a medium. Thus, all signals are
transmitted at the same time, each using different frequencies.
A multiplexor accepts inputs and assigns frequencies to each
device.
The multiplexor is attached to a high-speed communications
line.
A corresponding multiplexor, or demultiplexor, is on the end
of the high-speed line and separates the multiplexed signals.
316
317
Frequency Division Multiplexing
Analog signaling is used to transmits the signals.
Uses of Frequency Division Multiplexing:
Broadcast radio and television, cable television, and the
cellular phone systems use frequency division multiplexing.
This technique is the oldest multiplexing technique.
Drawback:
Since it involves analog signaling, it is more susceptible to
noise.
318
FDM
Note:
326
Note:
329
330
Synchronous Time Division
Multiplexing
If one device generates data at a faster rate than other devices,
then the multiplexor buffer the faster incoming stream.
If a device has nothing to transmit, the multiplexor must still
insert a piece of data from that device into the multiplexed
stream.
331
Interleaving
333
334
Synchronous time division multiplexing
335
Synchronous Time Division
Multiplexing
Three types popular today:
• T-1 multiplexing (the classic)
• ISDN multiplexing
• SONET (Synchronous Optical NETwork)
336
Synchronous TDM
• Very popular
• Line will require as much bandwidth as all the
bandwidths of the sources
337
Statistical Time Division Multiplexing
A statistical multiplexor transmits only the data from active
workstations (or why work when you don’t have to).
If a workstation is not active, no space is wasted on the
multiplexed stream.
A statistical multiplexor accepts the incoming data streams
and creates a frame containing only the data to be transmitted.
338
339
To identify each piece of data, an address is included.
340
If the data is of variable size, a length is also included.
341
Statistical Time Division Multiplexing
A statistical multiplexor does not require a line over as high a
speed line as synchronous time division multiplexing since
STDM does not assume all sources will transmit all of the
time!
Good for low bandwidth lines (used for LANs)
Much more efficient use of bandwidth!
342
Wavelength Division Multiplexing
(WDM)
Give each message a different wavelength (frequency)
Easy to do with fiber optics and optical sources
343
Note:
• Multiplexing
• Types of multiplexing
– TDM
• Synchronous TDM (T-1, ISDN, optical fiber)
• Statistical TDM (LANs)
– FDM (cable, cell phones, broadband)
– WDM (optical fiber)
348
•Concept of
Topologies,
NETWORK TOPOLOGIES
• Network topology is the arrangement of the
various elements like links, node
• Example:
• Distributed Bus Topology
• Bus Network
•
• -Advantages
• Easy to implement and extend
• Well suited for temporary networks (quick setup)
• Initially less expensive than other topologies
• Cheap
• -Disadvantages
• Difficult to administer/troubleshoot.
• Limited cable length and number of stations.
• If there is a problem with the cable, the entire network goes down.
• Maintenance costs may be higher in the long run.
• Performance degrades as additional computers are added or on heavy traffic.
• Low security (all computers on the bus can see all data transmissions).
• One virus in the network will affect all of them (but not as badly as a star or ring network).
• Proper termination is required.(loop must be in closed path).
• If one node fails, the whole network will shut down.
• If many computers are attached, the amount of data flowing causes the network to slow down.
• Ring Topology
• Distributed Star
• Star Network
• -Advantages
• Good performance
• easy to set up and to expand. Any non-centralised failure
will have very little effect on the network, whereas on a
ring network it would all fail with one fault
• -Disadvantages
• Expensive to install
• Extra hardware required
• Tree Topology
• Hybrid Topology
• Transmission Media:
Twisted pair, coaxial, fiber
optics, Wireless
Transmission (radio,
microwave & infrared);
Transmission media-Guided media(Wired
Transmissions)
Unguided media(Wireless
Transmission)
Figure 7.1 Transmission medium and physical layer
Figure 7.2 Classes of transmission media
7.1 Guided Media
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Figure 7.3 Twisted-pair cable
Figure 7.4 UTP and STP
Table 7.1 Categories of unshielded twisted-pair cables
• Skew
Figure 7.7 Coaxial cable
Table 7.2 Categories of coaxial cables
(Radio
Guide) RG- 75 W Cable TV
59
• 1. Thick coaxial is that it does not bend easily and is difficult to install.
Fiber Optics
Figure 7.11 Optical fiber
Figure 7.12 Propagation modes
Figure 7.13 Modes
In fiber optics, a graded-index or gradient-index fiber is an optical fiber whose
core has a refractive index that decreases with increasing radial distance from
the fiber axis.
• Light signals - Unlike electrical signals in copper wires, light signals from
one fiber do not interfere with those of other fibers in the same cable.
This means clearer phone conversations or TV reception.
• Digital signals - Optical fibers are ideally suited for carrying digital
information, which is especially useful in computer networks.
• Non-flammable - Because no electricity is passed
through optical fibers, there is no fire hazard.
Radio Waves
Microwaves
Infrared
Figure 7.17 Electromagnetic spectrum for wireless communication
Figure 7.18 Propagation methods
Table 7.4 Bands
Band Range Propagation Application
Circuit Switching
Message Switching
Packet Switching
Circuit Switching
• Circuit switching is a technique that directly
connects the sender and the receiver in an
unbroken path.
Advantages:
• The communication channel (once
established) is dedicated.
Disadvantages:
Possible long wait to establish a connection, (10
seconds, more on long- distance or international calls.)
during which no data can be transmitted.
Advantages:
• Channel efficiency can be greater compared to circuit-
switched systems, because more devices are sharing the
channel.
• Traffic congestion can be reduced, because messages may
be temporarily stored in route.
• Message priorities can be established due to store-and-
forward technique.
• Message broadcasting can be achieved with the use of
broadcast address appended in the message.
Message Switching
Disadvantages
• Message switching is not compatible with
interactive applications.
Datagram
• The size of the packet can vary from 180 bits, the size for
the Datakit® virtual circuit switch designed by Bell Labs for
communications and business applications; to 1,024 or
2,048 bits for the 1PSS® switch, also designed by Bell Labs
for public data networking; to 53 bytes for ATM switching,
such as Lucent Technologies' packet switches.
Packet switching
• In virtual circuit, the route between stations does not mean that
this is a dedicated path, as in circuit switching.
• A packet is still buffered at each node and queued for output over
a line.
• The difference between virtual circuit and datagram approaches:
With virtual circuit, the node does not need to make a routing
decision for each packet.
It is made only once for all packets using that virtual circuit.
Packet Switching: Virtual Circuit
Advantages:
• Packet switching is cost effective, because switching
devices do not need massive amount of secondary
storage.
• Packet switching offers improved delay characteristics,
because there are no long messages in the queue
(maximum packet size is fixed).
• Packet can be rerouted if there is any problem, such as,
busy or disabled links.
• The advantage of packet switching is that many
network users can share the same channel at the same
time. Packet switching can maximize link efficiency by
making optimal use of link bandwidth.
Disadvantages of packet switching
Disadvantages:
• Protocols for packet switching are typically more complex.
• It can add some initial costs in implementation.
• If packet is lost, sender needs to retransmit the data.
• Another disadvantage is that packet-switched systems still
can’t deliver the same quality as dedicated circuits in
applications requiring very little delay - like voice
conversations or moving images.
• ADDITIONAL READING
IS STRONGLY
RECOMMENDED