Module - 1 Introduction
Module - 1 Introduction
1. Delivery
2. Accuracy
3. Timeliness
4. Jitter
Data Communication cont..
1. Delivery
– System must deliver data to the correct destination.
– Data must be received only by the intended device or user.
2. Accuracy
– System must deliver the data accurately.
– Data that have been altered in transmission and left
uncorrected are unusable.
Data Communication cont..
3. Timeliness
– System must deliver data in a timely manner.
– Data delivered late are useless.
– Ex: Real-time transmission
• Video and audio – Deliver it in the same order that they
are produced, and without significant delay.
Data Communication cont..
4. Jitter
– It refers to the variation in the packet arrival time.
– It is the uneven delay in the delivery of audio or video
packets.
– Caused by network congestion and packet loss.
2. Components of Data
Communication
2. Components of Data Communication
• A data communication system is made up of five components.
1. Message
2. Sender
3. Receiver
4. Transmission medium
5. Protocol
2. Components of Data Communication
1. Message
– Information (data) to be communicated.
– Ex: text, numbers, pictures, audio and video.
2. Sender
– Device that sends the data message.
– Ex: computer, workstation, telephone handset, video
camera and so on.
3. Receiver
– Device that receives the message.
– Ex: computer, workstation, telephone handset, television
and so on.
2. Components of Data Communication
4. Transmission medium
– Physical path by which a message travels from sender to
receiver.
– Ex: twisted-pair wire, coaxial cable, fiber-optic cable and
radio waves.
5. Protocol
– It is a set of rules that govern data communications.
– It represents an agreement between the communicating
devices.
– Ex: A person speaking French cannot be understood by a
person who speaks only Japanese.
3. Data Representation
3. Data Representation
• Information comes in different forms such as text, numbers,
images, audio and video.
Text
Numbers
Images
Audio
Video
3. Data Representation cont..
1. Text
– Represented as a bit pattern, a sequence of bits (0s or 1s).
– Different sets of bit patterns have been designed to represent text
symbols.
– Each set is called a code.
– Process of representing symbols is called coding.
– Unicode
• Common coding system.
• It uses 32 bits to represent a symbol or character in any
language.
– American Standard Code for Information Interchange
(ASCII)
• Developed some decades ago in the United States.
• Constitutes the first 127 characters in Unicode.
• Also referred to as Basic Latin
3. Data Representation cont..
2. Numbers
– Represented by bit patterns.
– It is directly converted to a binary number.
3. Data Representation cont..
3. Images
– Represented by bit patterns.
– Composed of a matrix of pixels.
– Each pixel is a small dot.
– Size of the pixel is depend on
resolution.
– Better representation (resolution):
more memory is needed.
– Ex: Image can be divided into
1000
pixels or 10,000 pixels.
– Each pixel is assigned a bit
pattern.
3. Data Representation cont..
3. Images
– Size and value of the pattern depend on the image.
– 1-bit pattern for image made of only black and white dots.
• Ex: Chessboard
– 2-bit pattern for image is not made of pure white and pure
black pixels.
• Ex: 4 levels of gray scale
– A black pixel can be represented by 00
– A dark gray pixel by 01
– A light gray pixel by 10
– A white pixel by 11.
3. Data Representation cont..
3. Images
– Several methods to represent color images.
• RGB method
– Each color is made of a combination of three
primary colors: red, green, and blue.
• YCM method
– Each color is made of a combination of three other
primary colors: yellow, cyan, and magenta.
3. Data Representation cont..
4. Audio
– Refers to recording or broadcasting of sound or music.
– It is continuous, not discrete.
5. Video
– Refers to recording or broadcasting of a picture or movie.
– It can either be
• Produced as a continuous entity (e.g., by a TV camera),
– or it can be a
• Combination of images, each a discrete entity, arranged
to convey the idea of motion.
4. Data Flow or Transmission
Mode
4. Data Flow or Transmission Mode
• Defines the direction of signal flow between two
connected
devices.
• There are three modes of transmission, namely:
1. Simplex
2. Half-duplex
3. Full-duplex
4.1 Simplex Mode
• Communication is unidirectional.
– Communication between sender and receiver occurs in only
one direction.
• Only sender can send the data and receiver can receive the
data.
• Receiver cannot reply to the sender.
• Use the entire capacity of the channel to send data.
4.1 Simplex Mode cont..
• Ex: One-lane road
• Ex: Keyboards and Monitors
– Only Keyboard can send input to monitor
– Monitor can only receive the input and display it on the
screen.
– Monitor cannot reply to the keyboard.
4.2 Half-Duplex Mode
• Each station can both transmit and receive, but not at the same
time.
• When one device is sending, the other can only receive, and
vice versa.
• Entire capacity of a channel is taken over by the transmitting
device.
4.2 Half-Duplex Mode cont..
• Ex: Walkie-talkies
– Speakers at both ends can speak, but they have to speak
one by one.
– They cannot speak simultaneously.
4.3 Full-Duplex Mode
• Also called duplex.
• Both stations can transmit and receive at same time.
• Signals going in either direction sharing the capacity of the
link.
• Sharing can occur in two ways:
– Link has two physically separate transmission paths
1. Performance
2. Reliability
3. Security
1. Network Criteria cont..
1. Performance
– Measured in many ways, including transit and response
time.
1. Transit time:
– Amount of time required for a message to travel
from one device to another.
2. Response time:
– Elapsed time between an inquiry and beginning
of a
response.
1. Network Criteria cont..
1. Performance
– It depends on a number of factors, including
1. Number of users
2. Type of transmission medium
3. Capabilities of the connected hardware
4. Efficiency of the software.
1. Network Criteria cont..
1. Performance
– It is evaluated by two contradictory networking metrics:
1. Throughput
– More
2. Delay
– Less
– Contradictory : If we try to send more data to the network,
we may increase throughput but we increase the delay
because of traffic congestion in the network.
1. Network Criteria cont..
2. Reliability
– It is measured by the
1. Frequency of failure
2. Time it takes a link to recover from a failure
3. Network’s robustness in a catastrophe.
1. Network Criteria cont..
3. Security
– Network security issues include
1. Protecting data from unauthorized access
2. Protecting data from damage and development
3. Implementing policies and procedures
for recovery from breaches and data losses.
A simple
network
Computers
Printer
Cable
Sharing a printer in a stand-
alone environment
Sharing a printer in a networking
environment
Common network elements
Printer
Server Clients (shared peripherals)
Data
Applications of Networks
• Marketing and sales Ex: online reservation of Hotels
• Financial Services Ex: online Banking
• Manufacturing Ex: CAD
• Electronic Messaging Ex: E-mail
• Directory Services Ex: Centralized database
• Information Services Ex: Bulletin boards
• Tele conferencing Ex: Voice conferencing
• Cellular Telephone Ex: Mobile phone communication
• Cable Television Ex: Video on Request.
2. Physical Structures
2.1 Type of Connection
• Two types of connections: point-to-point and multipoint.
1. Point-to-point
– A dedicated link between two devices.
2.1 Type of Connection cont..
2. Multipoint (Multi drop)
– More than two specific devices share a single link.
2.2 Physical Topology
• Arranging computers in a Network.
• Geometric representation of relationship of all the links
and linking devices (usually called nodes) to one another.
• There are four basic topologies:
1. Mesh topology
2. Star topology
3. Bus topology
4. Ring topology
1. Mesh topology
– Every link is dedicated point-to-point link
– The term dedicated means that the link carries
traffic only between the two devices it connects
1. Mesh
topology
• To connect n number of nodes
– Each node must be connected to n – 1 nodes.
– We need n ( n - 1) / 2 duplex-mode links.
• To accommodate that many links, every device must have n – 1
input/output (I/O) ports to be connected to the other n – 1
stations.
• Example:
– 8 devices in mesh.
– Number of links = 8 (8-1)/2 = 28
– Number of ports per device = 8 –1 = 7
1. Mesh topology cont..
Advantages:
1. Eliminate the traffic problems
– Each connection can carry its own data load.
2. It is robust.
– If one link becomes unusable, it does not weaken the entire
system.
3. There is privacy or security
– Only the intended recipient sees the message.
– Prevent other users from gaining access to messages.
4. Links make fault identification and fault isolation easy
– Traffic can be routed to avoid links with suspected problems.
– Network manager discover the exact location of fault and helps
in finding its cause and solution.
1. Mesh topology cont..
Disadvantage:
• It is related to amount of cabling and number of I/O ports
required.
1. Installation and reconnection are difficult.
2. Bulk of the wiring (in walls, ceilings, or floors) can be
greater than the available space.
3. Hardware (I/O ports and cable) can be expensive.
• For these reasons it is implemented in a limited fashion.
1. Mesh topology cont..
• Ex: used as a backbone connecting the main computers of a
hybrid network that can include several other topologies.
1. Mesh topology cont..
• Ex: Connection of telephone regional offices
– In which each regional office needs to be connected to
every other regional office.
2. Star Topology
• Each device has a dedicated point-to-point link only to a central
controller (hub).
• No direct link between the devices.
• It does not allow direct traffic between devices.
• Controller acts as an exchange: If one device wants to send data to
another, it sends the data to the controller, which then relays the data
to the other connected device.
2. Star Topology cont..
Advantages:
1. It is less expensive than a mesh topology.
2. Each device needs only one link and one I/O port.
3. It is easy to install and reconfigure.
4. Far less cabling needs to be housed.
5. Easy to setup and modify (Additions, moves, and deletions required
one connection between that device and the hub).
6. It is robust
– If one link fails, only that link is affected. All other links
remain
active.
7. Easy fault identification and fault isolation.
8. Hub can be used to monitor link problems and bypass defective
links.
2. Star Topology cont..
Disadvantage
1. If the hub goes down, the whole system is dead.
2. More cabling is required than ring or bus topologies.
Example:
• Used in LANs
• Often used in High-speed LANs.
• n devices are connected using ‘n’ links.
• 4 devices are connected using ‘4’ links.
3. Bus Topology
• Multipoint configuration.
• One long cable acts as a backbone to link all devices in a network.
• Nodes are connected to the bus cable by drop lines and taps.
• As a signal travels along the backbone, some of its energy is
transformed into heat. Therefore, it becomes weaker and weaker as
it travels farther and farther.
• For this reason there is a limit on the number of taps and on the
distance between those taps.
3. Bus Topology cont..
Advantages Disadvantages
It is very simple to install. It is very difficult to troubleshoot.
It uses less cable than other It provides slow data transfer
topologies. speed.
It is relatively inexpensive. A single fault can bring the entire
network down.
Used in small networks. Difficult to add new devices.
Require modification or
replacement of the
backbone.
It is easy to understand.
3. Bus Topology cont..
• It is the one of the first topologies used in the design of early
local area networks.
• Traditional Ethernet LANs use this topology.
4. Ring Topology
• Each device has a dedicated point-to-point
configuration to
neighbors.
• Signal is passed from device to device until it
reaches
destination.
• Signal is passed in one direction only.
• Each device in the ring incorporates a repeater.
• Repeater regenerates the bits and pass.
4. Ring Topology cont..
• Advantages
1. Easy of install and reconfigure
• Each device is linked (either physically or logically) to
only its immediate neighbors.
• To add or delete a device – change only two connections.
2. Fault isolation is simple.
• A signal is circulating at all times.
• If one device does not receive a signal within a specified
period, it can issue an alarm.
• Alarm alerts the network operator to the problem and its
location.
4. Ring Topology cont..
• Disadvantage
1. Unidirectional traffic
• A break in the ring can disable the entire network.
• This weakness can be solved by using a dual ring or a switch
capable of closing off the break.
– Secondary ring is redundant.
– It is used as a backup in case the
primary ring fails.
4. Ring Topology cont..
• Ex: IBM introduced its Token-Ring local area network (LAN)
6-1 MULTIPLEXING
6.68
Figure 6.2 Categories of multiplexing
6.69
Figure 6.3 Frequency-division multiplexing
6.70
Note
FDM is an analog multiplexing technique that combines analog signals.
6.71
Figure 6.4 FDM process
6.72
Figure 6.5 FDM demultiplexing example
6.73
Example 6.1
6.75
Example 6.2
Solution
For five channels, we need at least four guard bands. This
means that the required bandwidth is at least
5 × 100 + 4 × 10 = 540 kHz,
as shown in Figure 6.7.
6.76
Figure 6.7 Example 6.2
6.77
Example 6.3
Solution
The satellite channel is analog. We divide it into four
channels, each channel having a 250-kHz bandwidth.
Each digital channel of 1 Mbps is modulated such that
each 4 bits is modulated to 1 Hz. One solution is 16-QAM
modulation. Figure 6.8 shows one possible configuration.
6.78
Figure 6.8 Example 6.3
6.79
Figure 6.9 Analog hierarchy
6.80
Example 6.4
6.82
Note
WDM is an analog multiplexing technique to combine optical signals.
6.83
Figure 6.11 Prisms in wavelength-division multiplexing and demultiplexing
6.84
Figure 6.12 TDM
6.85
Note
6.86
Figure 6.13 Synchronous time-division multiplexing
6.87
Note
In synchronous TDM, the data rate
of the link is n times faster, and the unit duration is n times shorter.
6.88
Example 6.5
Solution
We can answer the questions as follows:
a. The data rate of each input connection is 1 kbps. This
means that the bit duration is 1/1000 s or 1 ms. The
duration of the input time slot is 1 ms (same as bit
duration).
6.89
Example 6.5 (continued)
6.90
Example 6.6
6.92
Figure 6.14 Example 6.6
6.93
Example 6.7
Solution
We can answer the questions as follows:
a. The duration of 1 bit before multiplexing is 1 / 1 kbps,
or 0.001 s (1 ms).
6.96
Example 6.8
6.98
Example 6.9
Solution
Figure 6.17 shows the output for four arbitrary inputs. The
link carries 50,000 frames per second. The frame duration
is therefore 1/50,000 s or 20 μs. The frame rate is 50,000
frames per second, and each frame carries 8 bits; the bit
rate is 50,000 × 8 = 400,000 bits or 400 kbps. The bit
duration is 1/400,000 s, or 2.5 μs.
6.99
Figure 6.17 Example 6.9
6.100
Figure 6.18 Empty slots
6.101
Figure 6.19 Multilevel multiplexing
6.102
Figure 6.20 Multiple-slot multiplexing
6.103
Figure 6.21 Pulse stuffing
6.104
Figure 6.22 Framing bits
6.105
Example 6.10
Solution
We can answer the questions as follows:
a. The data rate of each source is 250 × 8 = 2000 bps = 2
kbps.
6.106
Example 6.10 (continued)
Two channels, one with a bit rate of 100 kbps and another
with a bit rate of 200 kbps, are to be multiplexed. How this
can be achieved? What is the frame rate? What is the
frame duration? What is the bit rate of the link?
Solution
We can allocate one slot to the first channel and two slots
to the second channel. Each frame carries 3 bits. The
frame rate is 100,000 frames per second because it carries
1 bit from the first channel. The bit rate is 100,000 frames/s
× 3 bits per frame, or 300 kbps.
6.108
Figure 6.26 TDM slot comparison
6.109