Cms 703 Main Main
Cms 703 Main Main
Syllabus:
Introduction to Data Communication, Network, Protocols & standards and standards
organizations – Line Configuration – Topology – Transmission mode – Classification
of Network – OSI Model – Layers of OSI Model.
Introduction to Data Communication
Data:
Communication:
DATA COMMUNICATION:
In its simplest form, data communication takes place between two devices
that are directly connected by some form of point-to-point transmission medium.
Data communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable. For data communications to occur,
the communicating devices must be pail of a Communication system made up of a
cornbination of hardware (physical equipment) and software (programs).
The effectiveness of a data Communications system depends on four
fundamental characteristics: delivery, accuracy, timeliness, and jitter.
1. Delivery.
The system must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user.
2. Accuracy.
The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness.
The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as
they are produced, in the same order that they are produced, and without significant
delay. This kind of delivery is called real-time transmission.
4. Jitter.
351CS51
Jitter refers to the variation in the packet arrival time. It is the uneven delay in
the delivery of audio or video packets. For exarnple, let us assume that video
packets arc sent every 30 ms. If some of the packets arrive with 30-ms delay and
others with 40-ms delay, an uneven quality in the video is the result.
Components
4. Transmission medium.
The transmission medium is the physical path by which a message travels from
sender to receiver. Sonic examples of transmission media include twisted-pair wire,
coaxial cable, fiber-optic cable, and radio waves.
5. Protocol.
A protocol is a set of sents an agreement between the devices may be connected
but not cannot be understood by a person rules that govern data communications. It
reprecommunicating devices without a protocol, two communicating, just as a
person speaking French who speaks only Japanese.
Data Representation
351CS51
Information today comes in different forms such as text, numbers, images,
audio, and video.
Fig 1.2
Data Flow
Simplex
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the
same time:
When one device is sending, the other can only receive, and vice versa (sec
Figure 1.2b).
351CS51
The half-duplex mode is like a one-lane road with traffic allowed in both
threetions. When cars are traveling in one direction, cars going the other way must
wait. In a half-duplex transmission, the entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the time. Walkie-talkies and CB
(citizens band) radios are both half-duplex systems.
Full-Duplex
In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously (see Figure 1.2c).
The full-duplex mode is like a two-way street with traffic flowing in both
directions at the same time. In full-duplex mode, signals going in one direction share
the capacity of the link with signals going in the other direction. This sharing can occur
in two ways: Either the link must contain two physically separate transmission paths,
one for sending and the other for receiving; or the capacity of the channe1 is divided
between signals traveling in both directions.
Network
351CS51
A network is a set of devices (often referred to as nodes) connected by
communication links. A node can be a computer, printer, or any other device capable
of sending and/or receiving data generated by other nodes on the network.
Distributed Processing
Network Criteria
Performance
Reliability
Security
351CS51
Physica1 Structures
Type of Connection
Multipoint:
Protocol (computing)
351CS51
de facto standard
A protocol that has not been approved by an organized body but adopted as a
standard through widespread use.
de jure standard
Common protocols
IP (Internet Protocol)
UDP (User Datagram Protocol)
TCP (Transmission Control Protocol)
DHCP (Dynamic Host Configuration Protocol)
HTTP (Hypertext Transfer Protocol)
FTP (File Transfer Protocol)
Telnet (Telnet Remote Protocol)
SSH (Secure Shell Remote Protocol)
POP3 (Post Office Protocol 3)
SMTP (Simple Mail Transfer Protocol)
IMAP (Internet Message Access Protocol)
SOAP (Simple Object Access Protocol)
PPP (Point-to-Point Protocol)
RFB (Remote Framebuffer Protocol)
Protocols
In computer networks, communication occurs between entities in different
systems. An entity is anything capable of sending or receiving information. However,
two entities cannot simply send bit streams to each other and expect to be understxxl.
For communication to occur, the entities must agree on a protocol. A protocol is a set
of rules that govern data communications. A protocol defines what is communicated,
how it is communicated, and when it is communicated. The key elements of a protocol
are syntax, semantics, and timing.
Syntax:
The term syntax refers to the structure or format of the data, meaning the order
in which they are presented. For example, a simple protocol might expect the first 8
bits of data to be the address of the sender, the second S bits to be the address of the
receiver, and the rest of the stream to be the message itself.
Semantics:
351CS51
The word semantics refers to the meaning of each section of bits. How is a
particular pattern to be interpreted, and what action is to be taken based on that
interpretation? For example, does an address identify the route to be taken or the final
destination of the message?
Timing:
The term timing refers to two characteristics: when data should be sent and how
fast they can be sent. For example, if a sender produces data at 100 Mhps hut the
receiver can process data at only 1 Mbps. the transmission will overload the receiver
and some data will be lost.
351CS51
International Telecommunication Union (ITU)
The IEEE is the largest professional organization in the world and consists of
computing and engineering professionals. It is involved in developing standards for
computing, communication, and for processes in electrical engineering, and
electronics. It sponsored an important standard for local area networks called Project
802.
Internet Society (ISOC) and the associated Internet Engineering Task Force
(IETF)
Internet Society and the associated Internet Engineering Task Force are
concerned with expediting the growth and in the evaluation of Internet
communications. The Internet Society concentrates on users issues, including
enhancements to the TCP/IP protocol suite. IETF focuses on technical Internet issues
(hardware and software). Important contributions include the development of Simple
Network Management Protocol (SNMP)
351CS51
Line Configuration
1. Point-to-point connection
2. Multipoint connection
Point-to-Point Connector
It must be noted that microwave and satellite dedicated links are also possible.
Two computers connected together (point-to-point) through microwave link.
When you change the television channel by remote control, you are establishing
a point-to-point connection between the remote control and the television‘s control
system.
Multipoint Connection
Fig 1.3
351CS51
Topology
bus network,
star network,
ring network,
mesh network,
star-bus network,
tree or hierarchical topology network.
Network topology signifies the way in which devices in the network see their
logical relations to one another. The use of the term "logical" here is significant. That
is, network topology is independent of the "physical" layout of the network. Even if
networked computers are physically placed in a linear arrangement, if they are
connected via a hub, the network has a Star topology, rather than a bus topology. In
this regard the visual and operational characteristics of a network are distinct; the
logical network topology is not necessarily the same as the physical layout. Networks
may be classified based on the method of data used to convey the data, these include
digital and analog networks.
We know that two or more devices are connected to a link for data
communication. Similarly, two or more links form a topology. The topology of a
network is the geometric representation of the relationship of all the links and the
nodes (communication devices) to one another.
1. Star topology
2. Ring topology
3. Bus topology
351CS51
1. Star Topology
Fig 1.4
Advantages:
The main advantages of star topology are:
It is easy to install and to maintain.
You can easily add and remove nodes to and from the network without
affecting the network.
If any node fails, other nodes are not affected.
Disadvantages
The main disadvantages of star topology are:
This type of network depends upon the central Hub. If Hub fails the entire
network is failed.
Each computer is directly connected to the Hub through a cable, so it becomes
more costly.
2. Ring Topology
In ring network, each node is connected to two adjacent nodes in the form a
closed ring or loop. In ring topology, the last node connects to the first node to
complete the ring. In ring topology, each node has a dedicated point-to-point
connection only with the two devices on either side of it.
351CS51
In this network, data is communicated in one direction from node to node
around the entire ring. When a computer in ring network sends message to another
computer on the network, the message travels to each node or computer until it reaches
its destination. The ring network configuration is shown in figure 1.5 below.
Fig 1.5
Advantages
The main advantages of ring topology are:
It is less expensive than star topology.
Nodes can be easily added or removed.
Disadvantages
The main disadvantages of ring topology are:
It is more difficult to install and maintain.
If a node fails, it affects the entire network.
3. Bus Topology
In bus network, all nodes are connected to a common communication medium
or central cable. The central physical cable that connects the nodes is called Bus. The
data is communicated between nodes in both directions through bus. A bus topology
uses the multipoint connection. The central single cable (or bus) acts as backbone to
link all the devices to the network.
In bus network, when a computer sends a message to another computer it also
attaches the address of the destination computer. In bus topology, a special device
called a terminator is attached at the cable‘s start and end points. A terminator stops the
network signals.
351CS51
In LAN, bus topology is mostly used. In this topology, each computer is
assigned a unique address. The bus network configuration is given in figure 1.6 below.
Fig 1.6
Complex topologies
1. Mesh Topology
In the mesh topology, separate cables are used to connect individual devices on
the network. This topology is expensive because of the number of cables used in the
network.
The mesh topology is of two types,
full-mesh and
partial-mesh.
a) Full mesh:
In this topology, each device is interconnected with all the devices on the
network, by a dedicated cable. If one device fails, the data traveling along the network
can be routed through another device attached to the active device. The structure of the
network is complex because the devices in the network are interconnected.
351CS51
b) Partial Mesh
In this topology, each device on the network is not connected to other devices.
Only a few devices on the network are connected using the full-mesh topology, and the
others are connected to one or more devices on the network.
Hybrid Topology:
This topology is the combination of bus, star, and ring networks. In other
words, this topology combines multiple topologies to form a large topology. The
hybrid topology is widely implemented in WANs.
351CS51
Transmission mode
A transmission mode defines the way in which group of bits goes from one
device to another. In transmission mode data flows in 3 ways.
1. Simplex 2. Half-duplex 3.Full-duplex.
Parallel Transmission
Binary data 1s and 0s are organized into groups of n bits each. Bits are
transmitted simultaneously by using a separate line (wire) for each bit. Multiple bits are
sent with each clock tick.
Advantages:
It is commonly used for data transmission
Distances between two devices are short. (eg: communication between
computer and peripheral devices.
Disadvantages:
Limited to short distances
Very expensive
351CS51
Serial Transmission:
Group of bits is transmitted one by one using line (wire) for all bits.
Advantages:
The advantage of serial over parallel transmission is that with only one
communication channel, serial transmission reduces the cost of transmission over
parallel by roughly a factor of n.
Since communication within devices is parallel, conversion devices are
required at the interface between the sender and the line (parallel-to-serial) and
between the line and the receiver (serial-to-parallel).
We can communicate to long distance and it is less expensive.
It has 2 ways to provide communications
1. Asynchronous
2. Synchronous
351CS51
Fig 1.11
Bits are divided into small groups (bytes) and sent independently. The sender
can send the groups at any time and the receiver never knows when they will arrive.
We send one start bit (0) at the beginning and one stop bit (1) at end of each
byte.
There may be a gap between each byte. When the receiver detects a start bit, it
sets a timer and begins counting bits as they come in after receiving stop bit, it ignores
any received pulses.
Bit stream is combined into larger ―frames‖, which may contain multiple bytes.
We send bits one after another without start / stop bits or groups.
It is the responsibility of the receiver to group the bits.
351CS51
Classification of Network
Types of networks
351CS51
In a bus (i.e., a linear cable) network, at any instant at most one machine is the master
and is allowed to transmit. All other machines are required to refrain from sending. An
arbitration mechanism is needed to resolve conflicts when two or more machines want
to transmit simultaneously. The arbitration mechanism may be centralized or
distributed. IEEE 802.3, popularly called Ethernet, for example, is a bus-based
broadcast network with decentralized control, usually operating at 10 Mbps to 10
Gbps. Computers on an Ethernet can transmit whenever they want to; if two or more
packets collide, each computer just waits a random time and tries again later.
A second type of broadcast system is the ring. In a ring, each bit propagates
around on its own, not waiting for the rest of the packet to which it belongs. Typically,
each bit circumnavigates the entire ring in the time it takes to 21 transmit a few bits,
often before the complete packet has even been transmitted. As with all other broadcast
systems, some rule is needed for arbitrating simultaneous accesses to the ring. Various
methods, such as having the machines take turns, are in use. IEEE 802.5 (the IBM
token ring), is a ring-based LAN operating at 4 and 16 Mbps. FDDI is another example
of a ring network.
Broadcast networks can be further divided into static and dynamic, depending
on how the channel is allocated. A typical static allocation would be to divide time into
discrete intervals and use a round-robin algorithm, allowing each machine to broadcast
only when its time slot comes up. Static allocation wastes channel capacity when a
machine has nothing to say during its allocated slot, so most systems attempt to
allocate the channel dynamically (i.e., on demand). Dynamic allocation methods for a
common channel are either centralized or decentralized. In the centralized channel
allocation method, there is a single entity, for example, a bus arbitration unit, which
determines who goes next. It might do this by accepting requests and making a
decision according to some internal algorithm. In the decentralized channel allocation
method, there is no central entity; each machine must decide for itself whether to
transmit. You might think that this always leads to chaos, but it does not. Later we will
study many algorithms designed to bring order out of the potential chaos.
351CS51
Fig 1.14
Metropolitan Area Networks
A metropolitan area network, or MAN, covers a city. The best-known example
of a MAN is the cable television network available in many cities. This system grew
from earlier community antenna systems used in areas with poor over-the-air television
reception. In these early systems, a large antenna was placed on top of a nearby hill and
signal was then piped to the subscribers' houses. At first, these were locally-designed,
ad hoc systems. Then companies began jumping into the business, getting contracts
from city governments to wire up an entire city. The next step was television
programming and even entire channels designed for cable only. Often these channels
were highly specialized, such as all news, all sports, all cooking, all gardening, and so
on. But from their inception until the late 1990s, they were intended for television
reception only.
Starting when the Internet attracted a mass audience, the cable TV network
operators began to realize that with some changes to the system, they could provide
two-way Internet service in unused parts of the spectrum. At that point, the cable TV
system began to morph from a way to distribute television to a metropolitan area
network. To a first approximation, a MAN might look something like the system
shown in Fig 1.14. In this figure we see both television signals and Internet being fed
into the centralized head end for subsequent distribution to people's homes.
351CS51
Figure 1.15. A metropolitan area network based on cable TV
351CS51
Metropolitan area network
A wide area network (WAN) is a computer network that covers a broad area
(i.e. any network whose communications links cross metropolitan, regional, or national
boundaries [1]). Less formally, a WAN is a network that uses routers and public
communications links. Contrast with personal area networks (PANs), local area
networks (LANs), campus area networks (CANs), or metropolitan area networks
(MANs), which are usually limited to a room, building, campus or specific
metropolitan area (e.g., a city) respectively. The largest and most well-known example
of a WAN is the Internet. A WAN is a data communications network that covers a
relatively broad geographic area (i.e. one city to another and one country to another
country) and that often uses transmission facilities provided by common carriers, such
as telephone companies. WAN technologies generally function at the lower three
layers of the OSI reference model: the physical layer, the data link layer, and the
network layer.
Fig 1.16
351CS51
Global area network
A VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider. Generally,
a VPN has a topology more complex than point-to-point.
Internet work
351CS51
Intranet
Extranet
Internet
Intranets and extranets may or may not have connections to the Internet. If
connected to the Internet, the intranet or extranet is normally protected from being
accessed from the Internet without proper authorization. The Internet is not considered
to be a part of the intranet or extranet, although it may serve as a portal for access to
portions of an extranet.
Intranet
An intranet is a set of networks, using the Internet Protocol and IP-based tools
such as web browsers and file transfer applications, that is under the control of a single
administrative entity. That administrative entity closes the intranet to all but specific,
authorized users. Most commonly, an intranet is the internal network of an
organization. A large intranet will typically have at least one web server to provide
users with organizational information.
Extranet
Internet
The Internet consists of a worldwide interconnection of governmental, academic,
public, and private networks based upon the networking technologies of the Internet
Protocol Suite. It is the successor of the Advanced Research Projects Agency Network
(ARPANET) developed by DARPA of the U.S. Department of Defense. The Internet is
also the communications backbone underlying the World Wide Web (WWW). The
'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical
reasons and to distinguish it from other generic internetworks.
351CS51
OSI Model
The OSI model is a reference model which most IT professionals use to describe
networks and network applications.
The OSI model was originally intended to describe a complete set of production
network protocols, but the cost and complexity of the government processes involved
in defining the OSI network made the project unviable. In the time that the OSI
designers spent arguing over who would be responsible for what, TCP/IP conquered
the world.
The Application Layer of the OSI model is responsible for providing end-user
services, such as file transfers, electronic messaging, e-mail, virtual terminal access,
and network management. This is the layer with which the user interacts.
The Presentation Layer of the OSI model is responsible for defining the syntax
which two network hosts use to communicate. Encryption and compression should be
Presentation Layer functions.
The Session Layer of the OSI model is responsible for establishing process-to-
process commnunications between networked hosts.
351CS51
Layer Four of the OSI Model
The Transport Layer of the OSI model is responsible for delivering messages
between networked hosts. The Transport Layer should be responsible for fragmentation
and reassembly.
The Network Layer of the OSI model is responsible for establishing paths for
data transfer through the network. Routers operate at the Network Layer.
The Data Link Layer of the OSI model is responsible for communications
between adjacent network nodes. Hubs and switches operate at the Data Link Layer.
The Physical Layer of the OSI model is responsible for bit-level transmission
between network nodes. The Physical Layer defines items such as: connector types,
cable types, voltages, and pin-outs.
The OSI model is a layered framework for the design of network systems that
allows
351CS51
communication between all types of computer systems. It Consists of seven
separate but related layers, each of which defines a part of the process of moving
information across a network (see Figure 1.17). An understanding of the fundamentals
of the OSI model provides a solid basis for exploring data communications.
Fig 1.17
Layered Architecture
The OSI model is composed of seven ordered layers: physical (layer 1), data
link (layer 2), network (layer 3), transport (layer 4), session (layer 5), presentation
(layer 6), and application (layer 7). Figure 2.3 shows the layers involved when a
message is sent from device A to device B. As the message traveLs from A to B, it
may pass through many intermediate nodes. These intermediate nodes usually involve
only the first three layers of the OSI model.
In developing the model, the designers distilled the process of transmiting data
to its most fundamental elements. They identi6ed which networking ftznctons had
related uses and collected those functions into discrete groups that became the layers.
Each layer defines a family of functions distinct from those of the other layers. By
defining and localizing functionality in this fashion, the designers created an
architecture that is both comprehensive and flexible. Most importantly, the OS1 model
allows complete i rileroperabilily between otherwise incompatible systems.
351CS51
Within a single machine, each layer calls upon the services of the layer just
below it. Layer 3, for example, uses the services provided by layer 2 and provides
services for layer 4 Between machines, layer x on one machine communicates with
layer x on another machine. This communication is governed by an agreed-upon series
of rules and conventions called protocols. The processes on each machine that
communicate at a given layer are called peer-to-peer processes. Communication
between machines is therefore a peer-to-peer process using the protocols appropriate to
a given layer.
Physical layer
The physical layer is the first or the lowest layer in the OSI reference model.
This layer deals with the actual transmission of data using a transmission medium.
Functions:
The physical layer is responsible for:
Interfacing with the physical transmission medium.
Defining the physical, electrical, and mechanical properties of he involved
components.
Services:
The services offered by the physical layer are:
Setting up of connection
Ending the connection
Transmitting data over a communication channel
Receiving data from a communication channel
Network layer:
It is a heart of the OSI model. It deals with routing strategies, which are
responsible for delivery of a packet from source to destination.
351CS51
Function:
It is used to provide internetworking.
It moves packets from source to destination.
Services:
Routing
Accounting
Packetizing
Transport Layer:
It provide different types of data transmission services.
Function:
Interfacing with network and session
Splitting data
Controlling transmission and sequencing.
It ensures the packets are delivered correctly.
Services:
Controlling errors
Controlling flow
Both services connection oriented and connection less
Eg: TCP, UDP, SPX.
Session layer:
This layer manages sessions between communicating entities.
Function:
Interfacing between transport and presentation.
It accepts data from presentation and passes to transport.
It manages the information exchange between two communicating systems with
the help of various services.
Services:
Authenticating the user (verifying the user information)
Managing the dialogs
Controls the transmission of data and determines the applications whose turn it
is to transmit the data.
Providing synchronization service.
Eg: NetBIOS , RPC( Remote Procedure Call)
Presentation Layer:
It is responsible for data formatting and presenting data for display.
Function:
Interfacing between the session and application layer.
Accepts data from application and passes to session.
Presenting data for display after formatting.
Converts data from one format to another using Unicode or ASCII .
351CS51
Services:
Encrypting data
Decrypting data
Compressing data
Eg: HTTP, FTP
Application layer:
It is the top most layer.
Function:
Interfacing between user and presentation
Accepts input from user and passes to presentation.
Defining how applications on one computer can communications with
application on other computers.
Services:
It provides underlying network related services.
E.g: FTP, Telnet.
351CS51
UNIT – II
Syllabus:
Parallel and Serial Transmission – DTE/DCE/such as EIA-449, EIA-530 and x.21
interface – Interface standards – Modems –Guided Media – Unguided Media –
Performance – Types of Error – Error Detection – Error Corrections.
Digital data transmission can occur in two basic modes: serial or parallel. Data
within a computer system is transmitted via parallel mode on buses with the width of
the parallel bus matched to the word size of the computer system. Data between
computer systems is usually transmitted in bit serial mode. Consequently, it is
necessary to make a parallel-to-serial conversion at a computer interface when sending
data from a computer system into a network and a serial-to-parallel conversion at a
computer interface when receiving information from a network. The type of
transmission mode used may also depend upon distance and required data rate.
Parallel Transmission
Examples
351CS51
Serial Transmission
In serial transmission, bits are sent sequentially on the same channel (wire)
which reduces costs for wire but also slows the speed of transmission. Also, for serial
transmission, some overhead time is needed since bits must be assembled and sent as a
unit and then disassembled at the receiver.
Applications
Examples
Tradeoffs
351CS51
interference present, RS-232 can be transmitted at higher speeds, or over greater
distances, or both. Parallel transmission has similar distance-versus-speed tradeoffs, as
well as a clocking threshold distance. Techniques to increase the performance of serial
and parallel transmission (longer distance for same speed or higher speed for same
distance) include using better transmission media, such as fiber optics or conditioned
cables, implementing repeaters, or using shielded/multiple wires for noise immunity.
Two different types of devices are assumed on each end of the interconnecting
cable for a case of simply adding DTE to the topology (e.g. to a hub, DCE), which also
brings a less trivial case of interconnection of devices of the same type: DTE-DTE or
DCE-DCE. Such cases need crossover cables, such as for the Ethernet or null modem
for RS-232.
A DTE is the functional unit of a data station that serves as a data source or a
data sink and provides for the data communication control function to be performed in
accordance with link protocol.
Usually, the DTE device is the terminal (or a computer emulating a terminal),
and the DCE is a modem.
A general rule is that DCE devices provide the clock signal (internal clocking)
and the DTE device synchronizes on the provided clock (external clocking). D-sub
connectors follow another rule for pin assignment.
351CS51
This term is also generally used in the Telco and CISCO equipment context to
designate a device unable to generate clock signals, hence a PC to PC Ethernet
connection can also be called a DTE to DTE communication. This communication is
done via an Ethernet crossover cable as opposed to a PC to DCE (hub, switch, or
bridge) communication which is done via an Ethernet straight cable.
Although the terms are most commonly used with RS-232, several data
communications standards define different types of interfaces between a DCE and a
DTE. The DCE is a device that communicates with a DTE device in these standards.
Standards that use this nomenclature include:
A general rule is that DCE devices provide the clock signal (internal clocking)
and the DTE device synchronizes on the provided clock (external clocking). D-sub
connectors follow another rule for pin assignment. DTE devices usually transmit on
pin connector number 2 and receive on pin connector number 3. DCE devices are just
the opposite: pin connector number 2 receives and pin connector number 3 transmits
the signals.
Usually, the DTE device is the terminal (or computer), and the DCE is a
modem.
When two devices, that are both DTE or both DCE, must be connected together
without a modem or a similar media translator between them, a kind of crossover cable
must be used, i.e. a null modem for RS-232 or as usual for Ethernet.
351CS51
RS- 449
351CS51
EIA-530
The specification defines the cable between the DTE and DCE devices. It is to
be used in conjunction with EIA-422 and EIA-423, which define the electrical
signalling characteristics. Because EIA-530 calls for the more common 25 pin
connector, it displaced the similar EIA-449, which also uses EIA-422/423, but a larger
37-pin connector.
Two types of EIA-530 are defined: the Category 1, which uses the balanced
characteristics of EIA-422, and Category 2, which is the unbalanced EIA-423.
351CS51
RS530 is just like RS422 and uses a differential signaling on a DB25 - RS232
format - EIA-530 Transmit (and the other signals) use a twisted pair of wires (TD+ &
TD-) instead of TD and a ground reference as in RS232 or V.24. This interface is used
for HIGH SPEED synchronous protocols. Using a differential signaling allows for
higher speeds over long cabling. This standard is applicable for use at data signaling
rates in the range from 20,000 to a nominal upper limit of 2,000,000 bits per second.
Equipment complying with this standard, however, need not operate over this entire
data signaling rate range. They may be designed to operate over a narrower range as
appropriate for the specific application.
351CS51
X.21
The Signal Element Timing, or clock, is provided by the carrier (your telephone
company), and is responsible for correct clocking of the data. X.21 is primarily used in
Europe and Japan, for example in the Scandinavian DATEX and German DATEX-L
circuit switched networks during the 1980s.
X.21 Overview
X.21 is a state-driven protocol running full duplex at 9600 bps to 64 Kbps with
subscriber networks. It is a circuit-switching protocol using Synchronous ASCII with
odd parity to connect and disconnect a subscriber to the public-switching network.
Signals Provided
The signals of the X.21 interface are presented on a 15-pin connector defined
by ISO Document 4903. The electrical characteristics are defined in CCITT
Recommendations X.26 and X.27, which refer to CCITT Recommendations V.10 and
V.11.
351CS51
X.21 provides eight signals:
This provides reference for the logic states against the other circuits. This signal
may be connected to the protective ground (earth).
Transmit (T) -
This carries the binary signals which carry data from the DTE to the DCE. This
circuit can be used in data-transfer phases or in call-control phases from the DTE to
DCE (during Call Connect or Call Disconnect).
Receive (R) -
This carries the binary signals from DCE to DTE. It is used during the data-
transfer or Call Connect/Call Disconnect phases.
Control (C) -
It is controlled by the DTE to indicate to the DCE the meaning of the data sent
on the transmit circuit. This circuit must be ON during data-transfer phase and can be
ON or OFF during call-control phases, as defined by the protocol.
Indication (I) -
The DCE controls this circuit to indicate to the DTE the type of data sent on the
Receive line. During data phase, this circuit must be ON and it can be ON or OFF
during call control, as defined by the protocol.
This provides the DTE or dCE with timing information for sampling the
Receive line or Transmit line. The DTE samples at the correct instant to determine if a
binary 1 or 0 is being sent by the DCE. The DCE samples to accurately recover signals
at the correct instant. This signal is always ON.
This circuit is normally ON and provides the DTE with 8-bit byte element
timing. The circuit transitions to OFF when the Signal Element Timing circuit samples
351CS51
the last bit of an 8-bit byte. Call-control characters must align with the B lead during
call-control phases. During data- transfer phase, the communicating devices bilaterally
agree to use the B lead to define the end of each transmitted or received byte. The C
and I leads then only monitor and record changes in this condition when the B lead
changes from OFF to ON, although the C and I leads may be altered by the transitions
on the S lead. This lead is frequently not used.
As stated previously, X.21 is a state protocol. Both the DTE and DCE can be in
a Ready or Not-Ready state. The Ready state for the DTE is indicated by a continuous
transmission of binary 1's on the T lead. The Ready state for the DCE is continuous
transmission of binary 1's on the R lead. During this continuous transmission of Ready
state, the control leads are OFF.
During the Not-Ready state, the DCE transmits binary 0's on the R lead with
the I lead in the OFF state.
351CS51
7 Unassigned
8 Ground - -
9 Transmit (B) Out In
10 Control (B) Out In
11 Receive (B) In Out
12 Indication (B) In Out
13 Signal Timing (B) In Out
14 Unassigned
15 Unassigned
Functional Description
As can be seen from the pinning specifications, the Signal Element Timing
(clock) is provided by the DCE. This means that your provider (local telco office) is
responsible for the correct clocking and that X.21 is a synchronous interface. Hardware
handshaking is done by the Control and Indication lines. The Control is used by the
DTE and the Indication is the DCE one.
Modems
To get the most out of a modem, you should have a communications software
package, a program that simplifies the task of transferring data.
351CS51
also modems that come as an expansion board that you can insert into a vacant
expansion slot. These are sometimes called onboard or internal modems.
While the modem interfaces are standardized, a number of different protocols for
formatting data to be transmitted over telephone lines exist. Some, like CCITT V.34,
are official standards, while others have been developed by private companies. Most
modems have built-in support for the more common protocols -- at slow data
transmission speeds at least, most modems can communicate with each other. At high
transmission speeds, however, the protocols are less standardized.
Aside from the transmission protocols that they support, the following
characteristics distinguish one modem from another:
bps : How fast the modem can transmit and receive data. At slow rates, modems are
measured in terms of baud rates. The slowest rate is 300 baud (about 25 cps). At higher
speeds, modems are measured in terms of bits per second (bps). The fastest modems
run at 57,600 bps, although they can achieve even higher data transfer rates by
compressing the data. Obviously, the faster the transmission rate, the faster you can
send and receive data. Note, however, that you cannot receive data any faster than it is
being sent. If, for example, the device sending data to your computer is sending it at
2,400 bps, you must receive it at 2,400 bps. It does not always pay, therefore, to have a
very fast modem. In addition, some telephone lines are unable to transmit data reliably
at very high rates.
voice/data: Many modems support a switch to change between voice and data
modes. In data mode, the modem acts like a regular modem. In voice mode, the modem
acts like a regular telephone. Modems that support a voice/data switch have a built-in
loudspeaker and microphone for voice communication.
351CS51
data compression : Some modems perform data compression, which enables them
to send data at faster rates. However, the modem at the receiving end must be able to
decompress the data using the same compression technique.
flash memory : Some modems come with flash memory rather than conventional
ROM, which means that the communications protocols can be easily updated if
necessary.
Fax capability: Most modern modems are fax modems, which means that they can
send and receive faxes.
At the receiving end, the incoming analog signal is given to the modem. This
modem demodulates the analog signal back into digital signal and gives this signal to
the computer.
Next, the computer sends a command to the modem to go‖ Off Hook‖, i.e to
open communication with the phone line. Next, the computer issues a command to
modem to dial a phone number.
These commands are given via ―Transmit Data TxD‖ line. The modem
acknowledges receipt of these commands by replaying to the computer on the ―Receive
Data RxD‖ line.
When the remote modem, the modem at the other end of line responds, the
local modem sends a special greeting tone to the remote modem, to inform the remote
modem that it is being called by another modem. The remote modem responds with a
higher pitched tone.
351CS51
Next, the two modems enter a process known as ―Handshake‖. This process
decides how the two modems are going to communicate with each other. Various
things decided during this process are
Once the handshake is done, the computer sends a Request To Send (RTS) signal
to the local modem. This signal asks the modem if the modem is free to receive data
from the computer.
If the modem is not busy, then the modem will send a Clear To Send (CTS) signal
to the computer. Once the computer receives this CIS signal from the modem, the
computer will send the data to be transmitted to the modem.
If the modem cannot transmit the data, as fast as it received from the computer,
then the modem will drop the CTS signal to the computer, this will stop any further
data from the computer. Computer will stop data transmission to the modem until it
receives CTS signal.
This will inform the local computer that the communication is broken.
351CS51
TRANSMISSION MEDIA
351CS51
i. Bandwidth:
The maximum data rates depend upon the bandwidth of the transmission medium.
ii. Connectivity:
This factor determines, how the transmission media can be connected in
networking. For example, some media are best suited for broadcast type of
applications.
v. Security:
This refers to data security on the transmission media.
GUIDED MEDIA
Guided media, which are those that provide a conduct from one device to
another, include twisted-pair cable, coaxial cable, and fiber-optic cable. A signal
traveling along any of these media is directed and contained by the physical limits of
the medium. Twisted-pair and coaxial cable use metallic (copper) conductors that
accept and transport signals in the form of electric current. Optical fiber is a cable that
accepts and transports signals in the form of light.
351CS51
sources (e.g., one is closer and the other is farther). This results in a difference at the
receiver. By twisting the pairs, a balance is maintained.
i. Twisted-pair cables are used in telephone lines to provide voice and data channels.
The local loop—the line that connects subscribers to the central telephone office—
commonly consists of unshielded twisted pair cables.
ii. The DSL (Digital Subscriber Line) lines that are used by the telephone companies
to provide high-data-rate connections also use the high bandwidth capability of
unshielded twisted-pair cables.
iii. Local area networks, such as 10Base-T and 100Base-T, also use twisted-pair
cables.
Performance
351CS51
Fig Performance of UTP
Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in
twisted- pair cable, in part because the two media are constructed quite differently.
Instead of having two wires, coax has a central core conductor of solid or stranded wire
(usually copper) enclosed in an insulating sheath, which is, in turn, encased in an outer
conductor of metal foil, braid, or a combination of the two. The outer metallic
wrapping serves both as a shield against noise and as the second conductor, which
completes the circuit. This outer conductor is also enclosed in an insulating sheath, and
the whole cable is protected by a plastic cover.
351CS51
Performance
In Figure 7.9 the attenuation is much higher in coaxial cables than in twisted-
pair cable. In other words, although coaxial cable has a much higher bandwidth, the
signal weakens rapidly and requires the frequent use of repeaters.
i. Coaxial cable was widely used in analog telephone networks where a single coaxial
network could carry 10,000 voice signals.
ii. Later it was used in digital telephone networks where a single coaxial cable could
carry digital data up to 600 Mbps. However, coaxial cable in telephone networks
has largely been replaced today with fiber-optic cable.
iii. Cable TV networks also use coaxial cables. In the traditional cable TV network, the
entire network used coaxial cable. Later, however, cable TV providers replaced
most of the media with fiber-optic cable; hybrid networks use coaxial cable only at
the network boundaries, near the consumer premises. Cable TV uses RG-59 coaxial
cable.
351CS51
Fiber-Optic Cable
A fiber-optic cable is made of glass or plastic and transmits signals in the form
of light. Optical fibers use reflection to guide light through a channel. A glass or plastic
core is surrounded by a cladding of less dense glass or plastic. The difference in
density of the two materials must be such that a beam of light moving through the core
is reflected off the cladding instead of being refracted into it.
Performance
i. Fiber-optic cable is often found in backbone networks because its wide bandwidth
is cost-effective. Today, with wavelength-division multiplexing (WDM), we can
transfer data at a rate of 1600 Gbps. The SONET network provides such a
backbone.
ii. Some cable TV companies use a combination of optical fiber and coaxial cable,
thus creating a hybrid network. Optical fiber provides the backbone structure while
coaxial cable provides the connection to the user premises. This is a cost-effective
351CS51
configuration since the narrow bandwidth requirement at the user end does not
justify the use of optical fiber.
iii. Local - area networks such as 1 00B as e -FX network (Fast Ethernet) and 1 000B
as e- X also use fiber-optic cable.
Fiber-optic cable has several advantages over metallic cable (twisted pair or
coaxial).
Higher bandwidth.
Fiber-optic cable can support dramatically higher bandwidths (and hence data
rates) than either twisted-pair or coaxial cable. Currently, data rates and bandwidth
utilization over fiber-optic cable are limited not by the medium but by the signal
generation and reception technology available.
Light weight.
Fiber-optic cables are much lighter than copper cables. Greater immunity to
tapping. Fibereoptic cables are more immune to tapping than copper cables. Copper
cables create antenna effects that can easily be tapped.
351CS51
Unidirectional light propagation.
Cost.
The cable and the interfaces are relatively more expensive than those of other
guided media. If the demand for bandwidth is not high, often the use of optical fiber
cannot be justified.
The part of the electromagnetic spectrum, ranging from 3 kHz to 900 THz are
used for wireless communication.
Unguided signals can travel from the source to destination in several ways:
ground propagation, sky propagation, and line-of-sight propagation.
In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth. These low-frequency signals emanate in all
directions from the transmitting antenna and follow the curvature of the planet.
Distance depends on the amount of power in the signal: The greater the power, the
greater the distance.
351CS51
The section of the electromagnetic spectrum defined as radio waves and
microwaves is divided into eight ranges, called bands, each regulated by government
authorities. These bands are rated from very low frequency (VLF) to extremely high
frequency (EHF).
Table 7.4 lists these bands, their ranges, propagation methods, and some
applications.
We can divide wireless transmission into three broad groups: radio waves,
microwaves, and infrared waves.
351CS51
Fig (10) Wireless transmission waves
Radio Waves
Radio waves, for the most part, are omnidirectional. When an antenna transmits
radio waves, they are propagated in all directions. This means that the sending and
receiving antennas do not have to be aligned. A sending antenna sends waves that can
be received by any receiving antenna. The omnidirectional property has a
disadvantage, too. The radio waves transmitted by one antenna are susceptible to
interference by another antenna that may send signals using the same frequency or
band.
Radio waves, particularly those waves that propagate in the sky mode, can
travel long distances. This makes radio waves a good candidate for long distance
broadcasting such as AM radio.
Radio waves, particularly those of low and medium frequencies, can penetrate
walls. This characteristic can be both an advantage and a disadvantage. It is an
advantage because, for example, an AM radio can receive signals inside a building. It
is a disadvantage because we cannot isolate a communication to just inside or outside a
351CS51
building.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves. Microwaves are unidirectional. When an antenna transmits microwave
waves, they can be narrowly focused. This means that the sending and receiving
antennas need to be aligned. The unidirectional property has an obvious advantage. A
pair of antennas can be aligned without interfering with another pair of aligned
antennas.
Applications of Microwaves
Microwaves, due to their unidirectional properties, are very useful when unicast
(one-to-one) communication is needed between the sender and the receiver. They are
used in cellular phones, satellite networks, and wireless LANs.
351CS51
Terrestrial Microwave
Terrestrial microwave is used for point to point links. The distance covered by
microwaves is slightly more than line of sight. A parabolic dish antenna of 3m
diameter is used for transmission. This antenna is usually mounted on tall hills or
buildings to cover large distance in line of slight. The distance covered by terrestrial
microwaves is given as,
d = 7.14 eq .1
more distance covered by bending of microwaves along the curvature of the earth‘s
surface. Value of K is usually taken as . Hence microwaves travel more distance than
line of sight. For terrestrial microwave 2 to 40 GHz frequencies are used. Microwaves
get attenuated with distance. Loss due to attenuation is given as,
In the above equation observe that loss varies as a square of the distance. But for
twisted pair cable and co-axial cable and loss varies logarithmically with distance. The
repeaters or amplifiers are places from 10 to 100km apart for terrestrial microwave
links. The communication is done on 4 – 6 GHz bands. Higher bands such as 11, 12
and 22 GHz are also used. Loss increases with frequency. Hence higher frequencies
travel very small distances. But they are highly directional.
351CS51
Applications of Terrestrial Microwave:
Satellite Microwave
Satellites are widely used as repeaters. Fig (11) shows how point to point and broadcast
links can be implemented via satellite. A satellite consists of receiving antenna and
receiver circuit. The transmitted signal on uplink frequency is received by satellite. The
signal is filtered, amplified and retransmitted on downlink frequency. The transmitter
and receiver of the satellite consists of one channel. It is also called transponder. In one
satellite there are large number of channels. (transponders). Normally, all transponders
have common transmitting and receiving antenna.
Satellite
Transponder
uplink downlink
Antenna Antenna
Transmitter Receiver
Earth Station Earth Station
Fig (11) Point to Point link via satellite
Satellite
Transponder
Uplinks Downlinks
351CS51
Fig (11) shows the satellite receives from one earth station and transmits to
only one earth station. It is called point to point link. In such link satellite acts as a
repeater station. Very narrow beams are used for such links.
Fig (12) shows that one earth station (transmitter) is transmitting on uplink to
the satellite. The satellite is then transmitting to multiple earth stations on downlink. In
this case, satellite acts as a broadcast station. Normally TV transmission uses such
broadcast link. Wide beams are used for this purpose.
Broadcast Radio:
Broadcast radio is another type of wireless transmission. It uses the frequencies from
30 MHz to 1 GHz for transmission. These frequencies are also called radio waves. The
transmission is mainly omnidirectional. Hence it doesnot require directional antennas.
Broadcast radio also uses line of sight transmission. But attenuation at these
frequencies is relatively low. The distance covered is,
Since wavelength is relatively higher for radio waves, they have less
attenuation.
Broadcasting of FM radio.
Broadcasting of UHF and VHF television.
351CS51
Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from
1 mm to 770 nm), can be used for short-range communication. Infrared waves, having
high frequencies, cannot penetrate walls. This advantageous characteristic prevents
interference between one system and another; a short-range communication system in
one room cannot be affected by another system in the next room. When we use our
infrared remote control, we do not interfere with the use of the remote by our
neighbors. However, this same characteristic makes infrared signals useless for long-
range communication. In addition, we cannot use infrared waves outside a building
because the sun‘s rays contain infrared waves that can interfere with the
communication.
Applications of Infrared
The infrared band, almost 400 THz, has an excellent potential for data
transmission. Such a wide bandwidth can be used to transmit digital data with a very
high data rate. The Infrared Data Association (IrDA), an association for sponsoring
the use of infrared waves, has established standards for using these signals for
communication between devices such as keyboards, mice, PCs, and printers. For
example, some manufacturers provide a special port called the IrDA port that allows a
wireless keyboard to communicate with a PC. The standard originally defined a data
rate of 75 kbps for a distance up to 8 m. The recent standard defines a data rate of 4
Mbps.
Infrared signals defined by IrDA transmit through line of sight; the IrDA port
on the keyboard needs to point to the PC for transmission to occur.
Types of Errors
Whenever bits flow from one point to another, they are subject to unpredictable
changes because of interference. This interference can change the shape of the signal.
In a single-bit error, a 0 is changed to a I or a I to a 0. In a burst error, multiple bits are
changed. For example, a 1/100s burst of impulse noise on a transmission with a data
rate of 1200 bps might change all or some of the 12 bits of information.
351CS51
Single-Bit Error
The term single-bit error means that only 1 bit of a given data unit (such as a
byte, character, or packet) is changed from 1 to 0 or from 0 to 1.
Figure (2) shows the effect of a single-bit error on a data unit. To understand
the impact of the change, imagine that each group of 8 bits is an ASCII character with
a 0 bit added to the left. In Figure 10.1, 00000010 (ASCII STX) was sent, meaning start
of text, but 00001010 (ASCII LF) was received, meaning line feed.
Single-bit errors are the least likely type of error in serial data transmission. To
understand why, imagine data sent at 1 Mbps. This means that each bit lasts only
1/1,000,000 s, or 1 µs. For a single-bit error to occur, the noise must have a duration of
only 1 µs, which is very rare; noise normally lasts much longer than this.
Burst Error
The term burst error means that 2 or more bits in the data unit have changed
from 1 to 0 or from 0to 1.
351CS51
Figure (3) shows the effect of a burst error on a data unit. In this case,
0100010001000011 was sent, but 0101110101100011 was received. Note that a burst
error does not necessarily mean that the errors occur consecutive bits. The length of the
burst is measured from the first corrupted bit to the last corrupted bit. Some bits in
between may not have been corrupted.
A burst error is more likely to occur than a single-bit error. The duration of
noise is normally longer than the duration of 1 bit, which means that when noise affects
data, it affects a set of bits. The number of bits affected depends on the data rate and
duration of noise. For example, if we are sending data at 1 kbps, a noise of 1/100 s can
affect 10 bits; if we are sending data at I Mbps, the same noise can affect 10,000 bits.
Redundancy
The central concept in detecting or correcting errors is redundancy. To be able
to detect or correct errors, we need to send some extra bits with our data. These
redundant bits are added by the sender and removed by the receiver. Their presence
allows the receiver to detect or correct corrupted bits.
351CS51
Coding
Redundancy is achieved through various coding schemes. The sender adds redundant
bits through a process that creates a relationship between the redundant bits and the
actual data bits. The receiver checks the relationships between the two sets of bits to
detect or correct the errors. The ratio of redundant bits to the data bits and the
robustness of the process are important factors in any coding scheme. Figure (4) shows
the general idea of coding.
Block coding
In block coding, we divide our message into blocks, each of k bits, called datawords.
We add r redundant bits to each block to make the length n = k + r. The resulting n-bit
blocks are called codewords. How the extra r bits is chosen or calculated is something
we will discuss later. For the moment, it is important to bow that we have a set of
datawords, each of size k, and a set of codewords, each of size of n. With k bits, we can
create a combination of 2k datawords; with n bits, we can create a combination of 2n
codewords. Since n > k, the number of possible codewords is larger than the number of
possible data- words. The block coding process is one-to-one; the same dataword is
always encoded as the same codeword. This means that we have 2n – 2k codewords that
are not used. We call these codewords invalid or illegal. Figure (5) shows the situation.
351CS51
Fig (5) Datawords and codewords in block coding
Error Detection
How can errors be detected by using block coding? If the following two conditions
are met, the receiver can detect a change in the original codeword.
The receiver has (or can find) a list of valid codewords.
The original codeword has changed to an invalid one.
Figure (6) shows the role of block coding in error detection.
Example 10.2
Let us assume that k = 2 and n = 3. Table (1) shows the list of datawords and
codewords. Later, we will see how to derive a codeword from a dataword.
351CS51
Assume the sender encodes the dataword 01 as 011 and sends it to the receiver.
Consider the following cases:
The receiver receives 011. It is a valid codeword. The receiver extracts the
dataword 01 from it.
The codeword is corrupted during transmission, and 111 is received (the leftmost
bit is corrupted). This is not a valid codeword and is discarded.
The codeword is corrupted during transmission, and 000 is received (the right two
bits are corrupted). This is a valid codeword. The receiver incorrectly extracts the
dataword 00. Two corrupted bits have made the error undetectable.
Error Correction
As we said before, error correction is much more difficult than error detection. In error
detection, the receiver needs to know only that the received codeword is invalid; in
error correction the receiver needs to find (or guess) the original codeword sent. We
can say that we need more redundant bits for error correction than for error detection.
Figure (7) shows the role of block coding in error correction. We can see that the idea
is the same as error detection but the checker functions are much more complex.
Fig (7)
Structure of encoder and decoder in error correction
Example 10.3
Let us add more redundant bits to Example 101 to see if the receiver can correct
an error without knowing what was actually sent. We add 3 redundant bits to the 2-bit
dataword to make 5-bit codewords. Again, later we will show how we chose the
redundant bits. For the moment let us concentrate on the error correction concept.
Table 10.2 shows the datawords and codewords.
Assume the dataword is 01. The sender consults the table (or uses an algorithm)
to create the codeword 01011. The codeword is corrupted during transmission, and
01001 is received (error in the second bit from the right). First, the receiver finds that
351CS51
the received codeword is not in the table. This means an error has occurred. (Detection
must come before correction.) The receiver, assuming that there is only 1 bit corrupted,
uses the following strategy to guess the correct dataword.
Comparing the received codeword with the first codeword in the table (01001
versus 00000), the receiver decides that the first codeword is not the one that was
sent because there are two different bits.
By the same reasoning, the original codeword cannot be the third or fourth one in
the table.
The original codeword must be the second one in the table because this is the
only one that differs from the received codeword by 1 bit. The receiver replaces 01001
with 01011 and consults the table to find the data word 01.
351CS51
UNIT – III
Syllabus:
Multiplexing – Types of Multiplexing – Multiplexing Application – Telephone system
– Project 802 – Ethernet – Token bus – Token Ring – FDDI – IEEE 802.6 – SMDS –
Circuit Switching – Packet Switching – Message switching – Connection Oriented and
Connectionless services.
Multiplexing
Whenever the bandwidth of a medium linking two devices is greater than the
bandwidth needs of the devices, the link can be shared. Multiplexing is the set of
techniques that allows the simultaneous transmission of multiple signals across a single
data link. As data and telecommunications use increases, so does traffic. We can
accommodate this increase by continuing to add individual links each time a new
channel is needed; or we can install higher-bandwidth links and use each to carry
multiple signals. Today‘s technology includes high-bandwidth media such as optical
fiber and terrestrial and satellite microwaves. Each has a bandwidth far in excess of
that needed for the average transmission signal. If the bandwidth of a link is greater
than the bandwidth needs of the devices connected to it, the bandwidth is wasted. An
efficient system maximizes the utilization of all resources; bandwidth is one of the
most precious resources we have in data communications.
In a multiplexed system, n lines share the bandwidth of one link. Figure 3.1
shows the basic format of a multiplexed system. The lines on the left direct their
transmission streams to a multiplexer (MUX), which combines them into a single
stream (many-to-one). At the receiving end, that stream is fed into a demultiplexer
(DEMUX), which separates the stream back into its component transmissions (one-to-
many) and directs them to their corresponding lines. In the figure, the word link refers
351CS51
to the physical path. The word channel refers to the portion of a link that carries a
transmission between a given pair of lines. One link can have many (n) channels.
Frequency-division multiplexing,
Wavelength-division multiplexing, and
Time-division multiplexing.
The first two are techniques designed for analog signals, the third, for digital signals.
Frequency-Division Multiplexing
351CS51
Fig 3.3 Frequency – Division Multiplexing
Figure 3.3 gives a conceptual view of FDM. In this illustration, the transmission
path is divided into three parts, each representing a channel that carries one
transmission.
multiplex them.
Multiplexing Process
351CS51
Fig 3.4 FDM Process
Demultiplexing Process
Analog Hierarchy:
One of these hierarchical systems used by AT&T is made up of groups, super groups,
master groups, and jumbo groups (see Figure 3.6).
351CS51
In this analog hierarchy, 12 voice channels are multiplexed onto a higher-
bandwidth line to create a group. A group has 48 kHz of bandwidth and supports 12
voice channels.
Finally, six master groups can be combined into a jumbo group. A jumbo group
must have 15.12 MHz (6 x 2.52 MHz) but is augmented to 16.984 MHz to allow for
guard bands between the master groups.
351CS51
Another common use of FDM is in television broadcasting. Each TV channel
has its own bandwidth of 6 MHz.
The first generation of cellular telephones (still in operation) also uses FDM.
Each user is assigned two 30-kflz channels, one for sending voice and the other for
receiving. The voice signal, which has a bandwidth of 3 kHz (from 300 to 3300 Hz), is
modulated by using FM. Remember that an FM signal has a bandwidth 10 times that of
the modulating signal, which means each channel has 30 kHz (10 x 3) of bandwidth.
Therefore, each user is given, by the base station, a 60-kHz bandwidth in a range
available at the time of the call.
Wavelength-Division Multiplexing
WDM is conceptually the same as FDM, except that the multiplexing and
demultiplexing involve optical signals transmitted through fiber-optic channels. The
idea is the same: We are combining different signals of different frequencies. The
difference is that the frequencies are very high.
Although WDM technology is very complex, the basic idea is very simple. We
want to combine multiple light sources into one single light at the multiplexer and do
the reverse at the demultiplexer. The combining and splitting of light sources are easily
handled by a prism. Recall from basic physics that a prism bends a beam of light based
on the angle of incidence and the frequency. Using this technique, a multiplexer can be
made to combine several input beams of light, each containing a narrow band of
351CS51
frequencies, into one output beam of a wider band of frequencies. A demultiplexer can
also be made to reverse the process. Figure 6.11 shows the concept.
One application of WDM is the SONET network in which multiple optical fiber
lines are multiplexed and demultiplexed.
A new method, called dense WDM (DWDM), can multiplex a very large
number of channels by spacing channels very close to one another. It achieves even
greater efficiency.
Time-Division Multiplexing
Note that in Figure 3.8 we are concerned with only multiplexing, not switching.
This means that all the data in a message from source 1 always go to one specific
destination, be it 1, 2, 3, or 4. The delivery is fixed and unvarying, unlike switching.
351CS51
We can divide TDM into two different schemes: synchronous and statistical.
Telephone System
Major Components
Local Loops
Trunks
Trunks are transmission media that handle the communication between offices.
A trunk normally handles hundreds or thousands of connections through multiplexing.
Transmission is usually through optical fibers or satellite links.
351CS51
Switching Offices
To avoid having a permanent physical link between any two subscribers, the
telephone company has switches located in a switching office. A switch connects
several local loops or trunks and allows a connection between different subscribers.
As telephone networks evolved into a complex network, the functionality of the
signaling system increased. The signaling system was required to perform other tasks
such as
i. Providing dial tone, ring tone, and busy tone
ii. Transferring telephone numbers between offices
iii. Maintaining and monitoring the call
iv. Keeping billing information
v. Maintaining and monitoring the status of the telephone network equipment
vi. Providing other functions such as caller ID, voice mail, and so on.
Project 802
In 1985, the Computer Society of the IEEE started a project, called Project
802, to set standards to enable intercommunication among equipment from a variety of
manufacturers. Project 802 does not seek to replace any part of the OSI or the Internet
model. Instead, it is a way of specifying functions of the physical layer and the data
link layer of major LAN protocols.
The relationship of the 802 Standard to the traditional OSI model is shown in
Figure 13.1. The IEEE has subdivided the data link layer into two sublayers: logical
link control (LLC) and media access control (MAC). IEEE has also created several
physical layer standards for different LAN protocols.
351CS51
Fig 3.10 IEEE standard for LANs
The data link layer in the IEEE standard is divided into two sublayers:
i. LLC and
ii. MAC.
That data link control handles framing, flow control, and error control. In
IEEE Project 802, flow control, error control, and part of the framing duties are
collected into one sublayer called the logical link control. Framing is handled in both
the LLC sublayer and the MAC sublayer.
351CS51
The LLC provides one single data link control protocol for all IEEE LANs. In
this way, the LLC is different from the media access control sublayer, which provides
different protocols for different LANs. A single LLC protocol can provide
interconnectivity between different LANs because it makes the MAC sublayer
transparent. Figure 13.1 shows one single LLC protocol serving several MAC
protocols.
The purpose of the LLC is to provide flow and error control for the upper-layer
protocols that actually demand these services. For example, if a LAN or several LANs
are used in an isolated system, LLC may be needed to provide flow and error control
for the application layer protocols. However, most upper-layer protocols such as IP
(discussed in Chapter 20), do not use the services of LLC. For this reason, we end our
discussion of LLC.
Physical Layer
Ethernet
351CS51
The original Ethernet was created in 1976 at Xerox‘s Palo Alto Research
Center (PARC). it has gone through four generations: Standard Ethernet (10 s), Fast 00
Mbps), Gigabit Ethernet (1 Gbps), and Ten-Gigabit Ethernet (10 0bps), Figure 3.11.
We briefly discuss all these generations starting with the first, traditional) Ethernet.
1. Standard Ethernet
MAC Sublayer
In Standard Ethernet, the MAC sublayer governs the operation of the access
method. It also frames data received from the upper layer and passes them to the
physical layer.
Physical Layer
The Standard Ethernet defines several physical layer implementations; four of
the most common, are shown in Figure 3.12.
351CS51
10Base5: Thick Ethernet
351CS51
10Base- T: Twisted-Pair Ethernet
Although there are several types of optical fiber 10-Mbps Ethernet, the most
common is called 10Base-E 10Base-F uses a star topology to connect stations to a hub.
The stations are connected to the hub using two fiber-optic cables, as shown in Figure
3.16,
351CS51
3. Fast Ethernet
Fast Ethernet was designed to compete with LAN protocols such as FDDI or
Fiber Channel (or Fibre Channel, as it is sometimes spelled). IEEE created Fast
Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard
Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. The goals of
Fast Ethernet can be summarized as follows:
MAC Sublayer
The access method is the same (CSMA/CD) for the half-duplex approach; for
full- duplex Fast Ethernet, there is no need for CSMAICD. However, the
implementations keep CSMA/CD for backward compatibility with Standard Ethernet.
Autonegotiation
351CS51
1. To allow incompatible devices to connect to one another. For example, a device
with a maximum capacity of 10 Mbps can communicate with a device with a
100 Mbps capacity (but can work at a lower rate).
2. To allow one device to have multiple capabilities.
3. To allow a station to check a hub‘s capabilities.
Physical Layer
The physical layer in Fast Ethernet is more complicated than the one in
Standard Ethernet. We briefly discuss some features of this layer.
Topology
Fast Ethernet is designed to connect two or more stations together. If there are
only two stations, they can be connected point-to-point. Three or more stations need to
be connected in a star topology with a hub or a switch at the center, as shown in Figure
3.17.
Implementation
351CS51
Fig 3.18 Fast Ethernet implementation
3. Gigabit Ethernet
The need for an even higher data rate resulted in the design of the Gigabit
Ethernet protocol (1000 Mbps). The IEEE committee calls the Standard 8O23z. The
goals of the Gigabit Ethernet design can be summarized as follows:
MAC Sublayer
Full-Duplex Mode
351CS51
In the full-duplex mode of Gigabit Ethernet, there is no collision;
the maximum length of the cable is determined by the signal attenuation in the
cable.
Half-Duplex Mode
Physical Layer
Topology
Gigabit Ethernet is designed to connect two or more stations. If there are only
two stations they can be connected point-to-point. Three or more stations need to be
connecting in a star topology with a hub or a switch at the center. Another possible
configuration is to connect several star topologies or let a star topology be part of
another as shown Figure 3.19.
351CS51
Fig 3.19 Topologies of Gigabit Ethernet
Implementation
Fig 3.20
4. Ten-Gigabit Ethernet
351CS51
1. Upgrade the data rate to 10 Gbps.
2. Make it compatible with Standard, Fast, and Gigabit Ethernet.
3. Use the same 48-bit address.
4. Use the same frame format.
5. Keep the same minimum and maximum frame lengths.
6. Allow the interconnection of existing LANs into a metropolitan area network
(MAN) or a wide area network (WAN).
MAC Sublayer
Ten -Gigabit Ethernet operates only in full duplex mode which means there is
no need for contention; CSMA/CD is not used in Ten-Gigabit Ethernet.
Physical Layer
Token bus
Fig 3.21
Token bus is a network implementing the token ring protocol over a "virtual
ring" on a coaxial cable. A token is passed around the network nodes and only the node
possessing the token may transmit. If a node doesn't have anything to send, the token is
passed on to the next node on the virtual ring. Each node must know the address of its
351CS51
neighbour in the ring, so a special protocol is needed to notify the other nodes of
connections to, and disconnections from, the ring.
Token bus was standardized by IEEE standard 802.4. It is mainly used for
industrial applications. Token bus was used by GM (General Motors) for their
Manufacturing Automation Protocol (MAP) standardization effort. This is an
application of the concepts used in token ring networks. The main difference is that the
endpoints of the bus do not meet to form a physical ring. The IEEE 802.4 Working
Group is disbanded. In order to guarantee the packet delay and transmission in Token
bus protocol, a modified Token bus was proposed in Manufacturing Automation
Systems and flexible manufacturing system (FMS) [1].
Token Ring
Fig 3.22
A Token Ring network is a local area network (LAN) in which all computers
are connected in a ring or star topology and a bit- or token-passing scheme is used in
order to prevent the collision of data between two computers that want to send
messages at the same time. The Token Ring protocol is the second most widely-used
protocol on local area networks after Ethernet. The IBM Token Ring protocol led to
a standard version, specified as IEEE 802.5. Both protocols are used and are very
351CS51
similar. The IEEE 802.5 Token Ring technology provides for data transfer rates of
either 4 or 16 megabits per second. Very briefly, here is how it works:
At the start, a free Token is circulating on the ring, this is a data frame which to
all intents and purposes is an empty vessel for transporting data. To use the network, a
machine first has to capture the free Token and replace the data with its own message.
In the example above, machine 1 wants to send some data to machine 4, so it
first has to capture the free Token. It then writes its data and the recipient's address
onto the Token (represented by the yellow flashing screen).
The packet of data is then sent to machine 2 who reads the address, realizes it is
not its own, so passes it on to machine 3. Machine 3 does the same and passes the
Token on to machine 4.
351CS51
Fig 3.23
This time it is the correct address and so number 4 reads the message
(represented by the yellow flashing screen). It cannot, however, release a free Token on
to the ring, it must first send the message back to number 1 with an acknowledgement
to say that it has received the data (represented by the purple flashing screen).
The receipt is then sent to machine 5 who checks the address, realizes that it is
not its own and so forwards it on to the next machine in the ring, number 6.
Machine 6 does the same and forwards the data to number 1, who sent the
original message.
That's the basics of Token Ring and it shows how data is sent, received and
acknowledged, but Token Ring also has a built in management and recovery system
which makes it very fault tolerant. Below is a brief outline of Token Ring's self
maintenance system.
FDDI
FDDI stands for Fiber Distributed Data Interface. The FDDI standard is ANSI
X3T9.5 . The FDDI topology is ring with two counter rotating rings for reliability
with no hubs. Cable type is fiber-optic. Connectors are specialized. The media access
method is token passing. Multiple tokens may be used by the system. The maximum
length is 100 kilometers. The maximum number of nodes on the network is 500. Speed
is 100 Mbps. FDDI is normally used as a backbone to link other networks. A typical
FDDI network can include servers, concentrators, and links to other networks.
CDDI is a copper version of FDDI which uses category 5 cable. Obviously the distance
is more limited than FDDI.
351CS51
FDDI token passing allows multiple frames to circulate around the ring at the
same time. Priority levels of a data frame and token can be set to allow servers to send
more data frames. Time sensitive data may also be given higher priority. The second
ring in a FDDI network is a method of adjusting when there are breaks in the cable.
The primary ring is normally used, but if the nearest downstream neighbor stops
responding the data is sent on the secondary ring in attempt to reach the computer.
Therefore a break in the cable will result in the secondary ring being used. There
are two network cards which are:
1. Dual attachment stations (DAS) used for servers and concentrators are attached
to both rings.
2. Single Attachment stations (SAS) attached to one ring and used to attach
workstations to concentrators.
A router or switch can link an FDDI network to a local area network (LAN).
Normally FDDI is used to link LANs together since it covers long distances.
351CS51
IEEE 802.6
This standard has also failed, mostly due to the same reasons that the FDDI
standard failed. Most MANs now use Synchronous Optical Network (SONET) or
Asynchronous Transfer Mode (ATM) network designs, with recent designs using
native Ethernet or MPLS.
SMDS
Increases in raw data rates removed the need for fragmentation into cells, and
SMDS' niche market position ensured that it remained a high-priced service. As a
result, SMDS has been supplanted by IP-based and Ethernet-based services and MPLS.
351CS51
SMDS allows users to transparently extend their data communications
capabilities over a wider geographical area. Since it is a service offered by the
telephone companies, SMDS permits this expansion using existing Customer-premises
equipment (CPE) and protocols, with minimal investment in dedicated leased lines as
the number of line terminations increases.
Switching Techniques
In its simplest form, data communication takes place between two devices,
which are directly connected by some form of transmission medium- twisted wires,
coaxial cables, microwave and satellite links. Instead, communication is achieved by
transmitting data from source to destination through a network of intermediate nodes.
These nodes provide a switching facility, which moves data from node to node until the
destination is reached. There are three different methods of establishing
communication links between the sender and receiver in a communication network,
namely, circuit switching, message switching and packet switching.
Circuit Switching
351CS51
Fig 3.23 Circuit Switching
Message Switching
As shown in fig. in the store and forward method, the message is transmitted from the
source node to an intermediate node. The intermediate node stores the complete
message temporarily, inspects it for errors, and transmits it to the next node, based on
an available free channel and its routing information. The actual path taken by the
message to its destination is dynamic, because the path is established as it travels
along. When the message reaches a node, the channel on which it came is released for
use by another message. In fig, if a message is to be transmitted from station A to
station B, it may take either path 1-2-3-4 or 1-5-4, depending on the availability of a
free output path at that particular moment.
351CS51
Fig 3.25
Packet Switching
A message is split up into ‗packets‘ of a fixed size. Besides the block of data to
be sent, a packet has a header, which contains the destination and source addresses,
control information, message number, number of current and last packet,
synchronization bits, acknowledgement and error checking bytes, etc. like message
switching, the packets may be routed from the sender node to the destination node
either by store-and-forward or broadcast method.
Two distinct techniques are used in data communications to transfer data. Each has
its own advantages and disadvantages. They are the connection-oriented method and
the connectionless method:
351CS51
virtual circuit number 01. As it moves through the network, routers quickly send it
through virtual circuit 01.
Fig 3.26
The physical, data link, and network layer protocols have been used to
implement guaranteed data delivery. For example, X.25 packet-switching networks
perform extensive error checking and packet acknowledgment because the services
were originally implemented on poor-quality telephone connections. Today, networks
are more reliable. It is generally believed that the underlying network should do what it
does best, which is deliver data bits as quickly as possible. Therefore, connection-
oriented services are now primarily handled in the transport layer by end systems, not
the network. This allows lower-layer networks to be optimized for speed.
351CS51
LANs operate as connectionless systems. A computer attached to a network can
start transmitting frames as soon as it has access to the network. It does not need to set
up a connection with the destination system ahead of time. However, a transport-level
protocol such as TCP may set up a connection-oriented session when necessary.
The Internet is one big connectionless packet network in which all packet
deliveries are handled by IP. However, TCP adds connection-oriented services on top
of IP. TCP provides all the upper-level connection-oriented session requirements to
ensure that data is delivered properly. MPLS is a relatively new connection-oriented
networking scheme for IP networks that sets up fast label-switched paths across routed
or layer 2 networks.
A WAN service that uses the connection-oriented model is frame relay. The
service provider sets up PVCs (permanent virtual circuits) through the network as
required or requested by the customer. ATM is another networking technology that
uses the connection-oriented virtual circuit approach.
351CS51
UNIT - IV
Syllabus:
History of Analog and Digital Network – Access to ISDN – ISDN Layers – Broadband
ISDN – X.25 Layers – Packet Layer Protocol – ATM – ATM Topology – ATM
Protocol.
Data
Signaling
Transmission
Data
The concepts of analog and digital data are simple enough. Analog data take
continuous values on some interval. For example, voice and video are continuously
varying patterns of intensity. Most data collected by sensors, such as temperature and
pressure, are continuous-valued. The most familiar example of analog data is audio or
acoustic data, which, in the form of sound waves, can be perceived directly by human
beings. Another common example of analog data is video. Here it is easier to
characterize the data in terms of the viewer (destination) of the TV screen rather than
the original scene (source) that is recorded by the TV camera.
Digital data take discrete values; examples are text and integers. Text or
character strings generated from type writer or keyboard is discrete in nature. Such
discrete data is assigned binary (digital) values as per some code.
Signals
351CS51
In a communications system, data are propagated from one point to another by
means of electric signals. For example, the speech data is converted to electric signal
through microphone. Video data is converted to electric signal by video camera.
Depending upon the data, its signal can be analog or digital. For example video and
speech generate analog signals. Text strings generate digital signal.
An analog signal is a continuously varying electromagnetic wave that may be
propagated over a variety of media, depending on spectrum; examples are wire media,
such as twisted pair and coaxial cable, fiber optic cable, and atmosphere or space
propagation. A digital signal is a sequence of voltage pulses that may be transmitted
over a wire medium; for example, a constant positive voltage level may represent
binary 1, and a constant negative voltage level may represent binary 0.
351CS51
Analog data such as voice, video, temperature etc can also be represented by
digital signals. Normally pulse code modulation, delta modulation or differential
pulse code modulation can be used to convert analog data to digital signal. By means
of this digital transmission of analog signals is possible. It is possible to digitally
multiplex voice, video etc signals. Digital storage of analog signals on compact discs
is also possible due to this conversion.
Signals can be analog or digital. Analog signals can have an infinite number
of values in a range; digital signals can have only a limited number of values.
Transmission
Both analog and digital signals may be transmitted on suitable transmission
media. The way these signals are treated is a function of the transmission system.
Analog transmission
Analog transmission is a means of transmitting analog signals without regard
to their content; the signals may represent analog data (e.g., voice) or digital data
(e.g., binary data that pass through a modem). In either case, the analog signal will
become weaker (attenuated) after a certain distance. To achieve longer distances, the
analog transmission system includes amplifiers that boost the energy in the signal.
Unfortunately, the amplifier also boosts the noise components. With amplifiers
cascaded to achieve long distances, the signal becomes more and more distorted.
351CS51
For analog data, such as voice, quite a bit of distortion can be tolerated and
the data remain intelligible. However, for digital data, cascaded amplifiers will
introduce errors.
Digital transmission
Digital transmission, in contrast, is concerned with the content of the signal. A
digital signal can be transmitted only a limited distance before attenuation endangers
the integrity of the data. To achieve greater distances, repeaters are used. A repeater
receives the digital signal, recovers the pattern of 1s and 0s, and retransmits a new
signal, thereby overcoming the attenuation.
The same technique may be used with an analog signal if it is assumed that the
signal carries digital data. At appropriately spaced points, the transmission system has
repeaters rather than amplifiers. The repeater recovers the digital data from the analog
signal and generates a new, clean analog signal. Thus, noise is not cumulative.
The preferred method of transmission – both supplied by the
telecommunications industry and its customers is digital, this despite an enormous
investment in analog communications facilities. Both long-haul telecommunications
facilities and intrabuilding services are gradually being converted to digital
transmission and, where possible, digital signaling techniques.
The most important reasons are (advantages of digital transmission):
Digital technology.
The advent of large-scale integration (LSI) and very large- scale integration
(VLSI) technology has caused a continuing drop in the cost and size of digital
circuitry. Analog equipment has not shown a similar drop.
Data integrity.
With the use of repeaters rather than amplifiers, the effects of noise and other
signal impairments are not cumulative. It is possible, then, to transmit data longer
distances and over lesser quality lines by digital means while maintaining the integrity
of the data.
Capacity utilization.
It has become economical to build transmission links of very high
bandwidth, including satellite channels and connections involving optical fiber. A
high degree of multiplexing is needed to effectively utilize such capacity, and this is
more easily and cheaply achieved with digital (time- division) rather than analog
(frequency-division) techniques.
Security and privacy.
Encryption techniques can be readily applied to digital data and to analog data
that have been digitized.
Integration.
351CS51
By treating both analog and digital data digitally, all signals have the same
form and can be treated similarly. Thus, economies of scale and convenience can be
achieved by integrating voice, video, and digital data.
ISDN
Basics of ISDN
ISDN is based on a number of fundamental building blocks. First, there are two
types of ISDN "channels" or communication paths:
B-channel
The Bearer ("B") channel is a 64 kbps channel which can be used for voice,
video, data, or multimedia calls. B-channels can be aggregated together for even
higher bandwidth applications.
D-channel
The Delta ("D") channel can be either a 16 kbps or 64 kbps channel used
primarily for communications (or "signaling") between switching equipment in the
ISDN network and the ISDN equipment at your site.
These ISDN channels are delivered to the user in one of two pre-defined
configurations:
Basic Rate Interface (BRI)
BRI is the ISDN service most people use to connect to the Internet. An ISDN
BRI connection supports two 64 kbps B-channels and one 16 kbps D-channel over a
standard phone line. BRI is often called "2B+D" referring to its two B-channels and
351CS51
one D-channel. It is used by single line business customers for typical desktop type
applications.
More and more people are discovering that ISDN is the right Internet answer.
As the Internet becomes more and more information-intensive with graphics,
sound, video and multimedia, our ability to take advantage of these new resources
depends on the speed of our Internet connection.
With ISDN, your Internet access is:
Even faster
By combining your two B-channels you have access to up to 128 kbps -- more
than four times as fast as a 28.8 kbps modem on a standard phone line. And ISDN's
digital technology assures you the cleanest connection to the Internet so you won't be
slowed down by re-transmissions because of old analog technology.
More efficient and economical
351CS51
ISDN brings increased capabilities, reduced costs and improved
productivity to organizations both large and small. When you're looking for something
on the Internet, you can get there faster. You can be more productive because you
aren't waiting as long to get to that next website or download that large file.
Access to ISDN
To enhance your network connection speed, you can use an Integrated Services
Digital Network (ISDN) line. Whereas standard phone lines typically transmit at up to
56 kilobits per second (Kbps), ISDN lines can transmit at speeds of 64 or 128 Kbps.
An ISDN line must be installed by the phone company at both the server and
at the remote site. ISDN also requires that you install an ISDN adapter on the server
and your computer. Costs for ISDN equipment and lines may be higher than standard
modems and phone lines. However, the speed of communication reduces the
duration of the connection, possibly saving toll charges.
An ISDN line comes with two B channels that transmit data at 64 Kbps, and
one D channel for signaling that transmits data at 16 Kbps. We can configure each
B channel to operate as a port. With some ISDN drivers, we can aggregate the
channels. This means we can statically assign a higher bandwidth by configuring
both B channels to act as a single port. With this configuration, line speed increases
to 128 Kbps.
The Multilink feature performs channel aggregation for ISDN. Multilink
combines multiple physical links into a logical bundle. This aggregate link increases
the bandwidth of a connection. In addition, you can allocate multiple links
dynamically, which means ISDN lines are used only as they are required. This
eliminates excess bandwidth, representing a significant efficiency advantage to users.
ISDN Layers
351CS51
Fig (4.5) layers of ISDN
Table 1
OSI Layer B Channel D Channel
3 IP DSSI (Q.931)
2 HDLC/PPP LAP – D (Q.921)
1 I.430/I.431 or ANSI T1.601
351CS51
Layer 3 (Network Layer)
ISDN Layer 3 is used for ISDN signaling: ITU-T I.450 and ITU-T I.451. Both
these protocols carry end-to-end, circuit-switched and packet-switched connections. A
variety of call-establishment, call-termination, information, and miscellaneous
messages are described by using SETUP, CONNECT, RELEASE, USER
INFORMATION, CANCEL, STATUS, and DISCONNECT.
At layer 3 we typically see IP packets. ISDN operates in Full-Duplex which
means that traffic can be received and transmitted at the same time.
The ISDN D channel will utilize different signaling protocols at Layer 3 and
Layer 2 of the OSI Model. Typically at Layer 2, LAP-D (Link Access Procedure – D
Channel) is the Q.921 signaling used and DSS1 (Digital Subscriber Signaling System
No.1) is the Q.931 signaling that is used at Layer 3. It is easy to remember which one
is used at which layer by simply remembering that the middle number corresponds
to the layer it operates at.
ISDN terminals come in two types. Specialized ISDN terminals are referred to
as terminal equipment type 1 (TEl). Non-ISDN terminals, such as DTE, that predate
the ISDN standards are referred to as terminal equipment type 2 (TE2). TE1 is
connected to the ISDN network through a four-wire, twisted-pair digital link. TE2 is
connected to the ISDN network through a TA. The ISDN TA can be either a
standalone device or a board inside the TE2. If the TE2 is implemented as a
standalone device, it connects to the TA via a standard physical-layer interface.
Examples include EIA/TIA-232-C (formerly RS-232C), V.24, and V.35.
Beyond the TEl and TE2 devices, the next connection point in the ISDN
network is the network termination type 1 (NT 1) or network termination type 2
(NT2) device. These are network-termination devices that connect the four-wire
subscriber wiring to the conventional two-wire local loop. In North America, the NT1
is a customer premises equipment (CPE) device. In most other parts of the world, the
NT1 is part of the network provided by the carrier. The NT2 is a more complicated
device that typically is found in digital private branch exchanges (PBXs) and that
performs Layer 2 and 3 protocol functions and concentration services. An NT1/2
device also exists as a single device that combines the functions of an NT1 and an
NT2.
351CS51
ISDN specifies a number of reference points that define logical interfaces
between functional groupings, such as TAs and NTs. ISDN reference points include
the following:
Figure 12-1 illustrates a sample ISDN configuration and shows three devices
attached to an ISDN switch at the central office. Two of these devices are ISDN-
cornpatible, so they can be attached through an S reference point to NT2 devices. The
third device (a standard, non-ISDN telephone) attaches through the reference point to
a TA. Any of these devices also could attach to an NT 1/2 device, which would replace
both the NT1 and the NT2. In addition, although they are not shown, similar user
stations are attached to the far right ISDN switch.
Broadband ISDN
351CS51
than1.544 Mbps is defined as broadband, and any communications based on this
speed are called broadband communications.
on cell switching instead of circuit switching. It uses fiber optic cables for
transmission and provides data transfer rates upto 155 Mbps. B-ISDN uses ATM and
the ATM reference model. B-ISDN can be used form video telephony, audio and
video data, high speed data transfer, in addition to broadcasting television programs.
Functional Architecture
351CS51
The control of B-ISDN is based on common-channel signaling. B-ISDN must
support all of the 64-kbps transmission services, both circuit-switching and packet-
switching. This protects the user‘s investment and facilitates migration from
narrowband to broadband ISDN. In addition, broadband capabilities arc provided for
higher data- rate transmission services. At the user-network interface, these
capabilities will be provided with the connection-oriented asynchronous transfer mode
(ATM) facility.
User-Network Interface
Figure A.4, shows the reference configuration for B-ISDN. In order to clearly
illustrate the broadband aspects, the notations for reference points and functional
groupings are appended with the letter B (e.g.. B-NT1, B-TE). The broadband
functional groups are equivalent to the functional groups defined for narrowband
351CS51
1SDN, and are discussed below. Interfaces at (he R reference point may or may not
have broadband capabilities.
Transmission Structure
A data rate of 155.52 Mbps can certainly support all of the narrowband ISDN
services. That is, such a rate readily supports one or more basic- or primary-rate
interfaces; in addition, it can support most of the B-ISDN services. At that rate, one or
several video channels can be supported, depending on the video resolution and the
coding technique used. Thus, the full-duplex 155.52-Mbps service will probably be
the most common B-ISDN service.
The higher data rate of 622.08 Mbps is needed to handle multiple video
distribution, such as might be required when a business conducts multiple simultaneous
videoconferences. This data rate makes sense in the network-to-subscriber direction.
The typical subscriber will not initiate distribution services and thus would still be able
to use the lower, 155.52-Mbps service. The full-duplex, 622.08- Mbps service would
be appropriate for a video-distribution provider.
The protocol architecture for B-ISDN introduces some new elements not found
in the ISDN architecture, as depicted in Figure 4.8. For B-ISDN, it is assumed that the
transfer of information across the user-network interface will use ATM.
The decision to use ATM for B-ISDN is a remarkable one; it implies that B-
ISDN will be a packet-based network, certainly at the interface, and almost certainly
in terms of its internal switching. Although the recommendation also states that B-
ISDN will support circuit-mode applications, this will be done over a packet- based
transport mechanism. Thus, ISDN, which began as an evolution from the circuit-
switching telephone network, will transform itself into a packet-switching network
as it takes on broadband services.
351CS51
Management Plane.
1. Includes plane management, which performs management functions related
to a system as a whole and provides coordination between all the planes, and
2. layer management, which performs management functions relating to
resources and parameters residing in its protocol entities.
351CS51
Fig (4.10) Functions of ISDN layers
2. Transmission convergence: The main functions of this sub layer are cell rate
decoupling, HEC (Header Error Control) header sequence generation, cell
351CS51
delineation, transmission frame adaptation, transmission frame
generation.
351CS51
Data terminal equipment devices (DCEs) are end systems that communicate
across the X.25 network. They are usually terminals, personal computers, or
network hosts, and are located on the premises of individual subscribers. DCE devices
are communications devices, such as modems and packet switches that provide the
interface between DTE devices and a PSE and are generally located in the carrier‘s
facilities. PSEs are switches that compose the bulk of the carrier‘s network. They
transfer data from one DTE device to another through the X.25 PSN.
Figure 4.11 illustrates the relationships between the three types of X.25 network
devices.
buffering,
351CS51
packet assembly, and
packet disassembly.
Fig (4.12) The PAD buffers assembles, disassembles the data packets.
X.25 Session Establishment
X.25 sessions are established when one DTE device contacts another to
request a communication session. The DTE device that receives the request can
either accept or refuse the connection. If the request is accepted, the two systems
begin full-duplex information transfer. Either DTE device can terminate the
connection. After the session is terminated, any further communication requires the
establishment of a new session.
351CS51
A virtual circuit is a logical connection created to ensure reliable
communication between two network devices. A virtual circuit denotes the existence
of a logical, bidirectional path from one DTE device to another across an X.25
network. Physically, the connection can pass through any number of intermediate
nodes, such as DCE devices and PSEs. Multiple virtual circuits (logical connections)
can be multiplexed onto a single physical circuit (a physical connection). Virtual
circuits are demultiplexed at the remote end, and data is sent to the appropriate
destinations. Figure 4.13 illustrates four separate virtual circuits being multiplexed onto
a single physical circuit.
Fig (4.13) Virtual circuits can be multiplexed onto a single physical circuit.
351CS51
communication occurs over an SVC and neither device has additional data to
transfer, the virtual circuit is terminated.
X.25 originally defined three basic protocol levels or architectural layers. In the
original specifications these were referred to as levels and also had a level number,
whereas all ITU-T X.25 recommendations and ISO 8208 standards released after 1984
refer to them as layers. The layer numbers were dropped to avoid confusion with the
OSI Model layers.
Physical layer:
This layer specifies the physical, electrical, functional and procedural
characteristics to control the physical link between a DTE and a DCE. Common
implementations use X.21, EIA-232, EIA-449 or other serial protocols.
Data link layer:
The data link layer consists of the link access procedure for data
interchange on the link between a DTE and a DCE. In its implementation, the
Link Access Procedure, Balanced (LAPB) is a data link protocol that manages a
communication session and controls the packet framing. It is a bit-oriented
protocol that provides error correction and orderly delivery.
Packet layer:
This layer defined a packet-layer protocol for exchanging control and user
data packets to form a packet-switching network based on virtual calls,
according to the Packet Layer Protocol.
351CS51
Fig (4.14)
Packet Layer Protocol or PLP is the Network Layer protocol for the X.25
protocol suite. PLP manages the packet exchanges between DTE (data terminal)
devices across VCs (virtual calls). PLP also can be used on ISDN using Link Access
Procedures, D channel (LAPD).
351CS51
There are 5 modes of PLP:
call setup,
data transfer,
idle,
call clearing and
restarting.
Call setup mode is used to create VCs (virtual calls) between DTE devices. A
PLP uses the 14-digit X.121 addressing scheme to set up the virtual call.
Data transfer mode is used to send data between DTE devices across a virtual
call. At this level PLP handles segmentation and reassembly, bit padding, error
control and flow control.
Idle mode is used when a virtual call is established but there is no data transfer
happening.
Call clearing mode is used to end sessions between DTE devices and to terminate
VCs.
Restarting mode is used to synchronize the transmission between a DTE device
and its locally connected DCE (data communications) device.
351CS51
It identifies the packet's parameters such as whether the packet contains Data
or Control information, type of windowing performed, and whether to use Delivery
Confirmation.
6. DIAG Diagnostic
9. REJ Reject
351CS51
4. User Data
ATM
Introduction to ATM
351CS51
Variable data rates can be handled easily because of cell switching. This is
important for transmitting video and audio data. Cell switching provides ATM
networks flexibility to handle data arriving at variable data rates from various
sources.
Cell switching provides high speeds of operation. It is easy to switch the packets
because their size is fixed. Speeds of the order of 10 Gbps are possible with
ATM.
Cell switching in ATM enables broadcast of data. In circuit switching, the
broadcast of data is not possible.
In addition, ATM provides Quality of Service (QoS) feature that allows you to get
a guaranteed bandwidth. You can give precedence to voice and video data over
other data. This results in better management of bandwidth.
1. A transmission path (TP) is the physical connection (wire, cable, satellite, and
so on) between an endpoint and a switch or between two switches.
Think of two switches as two cities. A transmission path is the Set of all
highways that directly connect the two cities. A transmission path is divided into
several virtual paths.
3. Cell networks are based on virtual circuits (VCs). All cells belonging to a single
message follow the same virtual circuit and remains in their original order until
they reach their destination.
Think of a virtual circuit as the lanes of a highway (virtual path).
351CS51
Fig (4.16) Relationship between TP, VP and VC
Multiple VCs are combined together to form a virtual path (VP). Virtual
paths are identified by a value known as the virtual path identifier (VPI). A
transmission path is a collection of VPs.
ATM TOPOLOGY
Architecture
ATM is a cell-switched network. The user access devices, called the
endpoints, are connected through a user-to-network interface (UNI) to the switches
inside the network. The switches are connected through network-to-network
interfaces (NNIs). Figure 18.9 shows an example of an ATM network.
351CS51
ATM Reference Model
351CS51
Fig (4.18) ATM reference model
Control plane: Responsible for controlling the operation of all the layers by
generating appropriate signals.
User plane: Responsible for managing the transfer data.
Management plane: Responsible for managing layer-specific issues such as
error control.
Plane management plane: Responsible for managing the entire system and
coordinating various functions of the planes, such as resource reservation.
1. Physical layer
2. ATM layer
3. ATM adaptation layer
1. Physical layer
The ATM physical layer corresponds to the OSI physical layer. The ATM
physical layer is responsible for defining the electric and physical characteristics of
physical media.
351CS51
Network (SONET) is one of the most widely used physical media standard for TAM.
Some of the other standards are DS-3, FDDI, and shielded-twisted pair (STP).
Transmission-convergence (TC):
This sublayer is responsible for packaging the cells into appropriate frames as
required by a particular transmission medium. In addition, the TC sublayer is
responsible for error control and cell-rate decoupling. Cell-rate decoupling refers to the
adaption of the rate of transmission of cell to the capacity of transmission media.
2. ATM Layer
The ATM layer, along with the ATM adaption layer, corresponds to the data
link layer of the OSI model.
Defining the cell layout and the header information for the cell
Establishing and managing the connections
First five bytes contain the header information and remaining 48 bytes contain the
data.
351CS51
AAL consists of two sublayers:
ATM Protocol
351CS51
Fig (4.19a)
Fig (4.19b)
(a) ATM cells at the user-network interface; (b) ATM cells at the network-node
interface
Each ATM cell consists of 53 bytes: the header is five bytes long and the
remaining 48 bytes (the cell payload) carry information from higher layers. The only
difference between the two types of ATM cell is that the cells at the user-network
interface carry a data field for the flow control of data from users. This means that
351CS51
only eight bits are available for virtual path identifiers, rather than 12 bits at the
network-node interface.
The virtual connections set up in ATM networks are identified by the
combination of the virtual path identifier and virtual channel identifier fields shown
in Fig (4.19a). These two fields provide a hierarchy in the numbering of virtual
connections, whereby a virtual path contains a number of virtual channels as is
illustrated in Figure 26. An advantage of this hierarchy is that in some cases the
switching of ATM cells may be based on the virtual path identifier alone.
The payload type field Fig (4.19b) identifies the type of cell. The cell loss
priority (CLP) field is a single bit; if the bit is 0 that cell has a high priority, and if the
bit is 1 the cell has a low priority. This information may influence the decision
whether to discard cells if a network becomes congested.
The header error control field contains a cyclic redundancy check on the
other bytes in the header.
351CS51
UNIT - V
Syllabus:
INTRODUCTION
CONNECTING DEVICES
We divide connecting devices into five different categories based on the layer
in which they operate in a network, as shown in Fig (5.1).
1. Those which operate below the physical layer such as a passive hub.
2. Those which operate at the physical layer (a repeater or an active hub).
3. Those which operate at the physical and data link layers (a bridge or a two-layer
switch).
4. Those which operate at the physical, data link, and network layers (a router or a
three-layer switch).
5. Those which can operate at all five layers (a gateway).
Passive Hubs
A passive hub is just a connector. It connects the wires coming from different
branches. In a star-topology Ethernet LAN, a passive hub is just a point where the
signals coming from different stations collide the hub is the collision point. This type
of a hub is part of the media; its location in the Internet model is below the physical
layer.
351CS51
Repeaters
351CS51
consist of drop repeaters, similar to the cells in cellular radio, and hub repeaters,
which receive and retransmit signals from and to a number of directions.
7. A bus repeater links one computer bus to a bus in another computer chassis,
essentially chaining one computer to another.
8. Network repeaters regenerate incoming electrical, wireless or optical signals.
With physical media like Ethernet or Wi-Fi, data transmissions can only span a
limited distance before the quality of the signal degrades. Repeaters attempt to
preserve signal integrity and extend the distance over which data can safely travel.
Actual network devices that serve as repeaters usually have some other name.
Active hubs, for example, are repeaters. Active hubs are sometimes also called
"multiport repeaters," but more commonly they are just "hubs." Other types of
"passive hubs" are not repeaters. In Wi-Fi, access points function as repeaters only
when operating in so-called "repeater mode."
Higher-level devices in the OSI model like switches and routers generally do
not incorporate the functions of a repeater. All repeaters are technically OSI physical
layer devices. A repeater is an electronic device that receives a signal and retransmits
it at a higher level and/or higher power, or onto the other side of an obstruction, so that
the signal can cover longer distances.
351CS51
Fig (5.2) A repeater connecting two segments of a LAN
A repeater does not actually connect two LANs; it connects two segments of
the same LAN. The segments connected are still part of one single LAN. A repeater is
not a device that can connect two LANs of different protocols.
351CS51
becomes lost can still read the signal well enough to determine the intended voltages
and replicate them in their original form.
Usage
Repeaters are also used extensively in broadcasting, where they are known as
translators, boosters or TV relay transmitters.
Disadvantages
However, repeaters have certain disadvantages. A repeater does not filter out
any data that passes through it. It cannot differentiate between valid signals and
noise, and amplifies both. This increases the network traffic. Therefore, if you use
repeaters to connect multiple LANs, there will be performance problems due to heavy
network traffic.
Bridges
A bridge is a device used to connect different LAN segments. These LAN segments
may use same or different data link layer protocols. A bridge operates at the data link
layer level. Bridges are also known as level- 2 devices.
Bridges are used for traffic isolation, that is, to isolate one part of a network from
another part and to reduce traffic between two segments.
Bridges can be used to extend a network over a wide area, and to interconnect 5 LANs.
For a large organization, it is possible that the network is dispersed over a wide
geographical area. Bridges use protocols, such as HDLC to send frames across point-
to-point links. Bridges use X.25 to send frames across public networks.
351CS51
Functions of Bridges:
A bridge translates a data link layer frame of one protocol into another. It does not
operate on the network layer packet header; therefore, a bridge can forward packets of
different network layer protocols. In other words, a bridge is network layer protocol
independent. Bridges enable packet forwarding between both homogenous and
heterogeneous networks. For example, a bridge may forward TCP/IP packets as well as
SPX/IPX packets.
A bridge is more complex than a repeater. Bridges require both hardware and
software to function.
351CS51
Advantages:
Types of Bridges:
1. Homogeneous bridges
2. Heterogeneous bridges
Homogeneous Bridges:
Homogeneous Bridges connect two or more LAN segments based on the same
standard. For example, a bridge connecting two Ethernet or Token Ring LANs is a
homogeneous bridge.
Fig 5.3 shows a homogeneous bridge connecting two Token Ring – based LANs.
351CS51
Fig (5.3) Homogeneous Bridges
Heterogeneous Bridges:
Fig (5.4) shows a heterogeneous bridge. This bridge connects an IEEE 802.3
Ethernet based LAN to an IEEE 802.5 Token Ring – based LAN.
Heterogeneous Bridges connect two or more LAN segments based on different
LAN standards. For example, a heterogeneous bridge may connect an Ethernet LAN to
a token Ring LAN.
Another way of classifying bridges is based on the algorithm that they use. They are:
Transparent
Source – routing
Translational
Source-route transparent.
Routers
351CS51
Fig (5.5) Routers
Unicast:
351CS51
Broadcast and multicast transport services are from one host to another host. It
means that a packet carries a single source address as well as single destination
address. Their type of transfer is also called unicast communication or transfer date.
Broadcast:
However, at times, a single packet is intended for more than one receiver.
This happens in two types of scenarios. The first is called a broadcast transfer in
which a single sender sends data to all the hosts available on the network. An
example of such communication is the broadcasting of messages by a server to all its
clients before it goes down.
The second possible scenario is when a sender wants to send data to some
specific destinations over the network. This is further complicated situation because
not all the hosts on the network destinations. Therefore, there must be some means to
identify the intended hosts and leave the others out.
Broadcasts can be of two types. The first is called a network broadcast and
includes all the hosts present on the local network or subnet. The second type of
broadcast, on the other hand, is called a universal broadcast and involves all the
hosts present on all the networks connected to the local network or subnet.
In such cases where there is more than one destination, two implementations
are possible. The first and simpler method is to send the packet to each receiver
individually. This involves one packet for each receiver, which puts a lot of traffic
over the network whenever any such multi destination communication is required.
However, it eliminates the need for any special addressing technique. The second
method, on the other hand, involves developing a special addressing technique that
can be used to identify a specific host or all the hosts on the network at time.
Multicast:
Clearly, the second approach makes more efficient use of network resources
because only a single copy of a datagram is routed over the network, which reaches
all the destinations. However, considerable support from the network layer is required
351CS51
to implement such a network layer protocol that is aware of multicast and broadcast
communication.
A routing table is used for finding the IP address to which a packet should be
forwarded so that it may reach its destination. The routing table, as shown in figure 6.2,
has the following entries:
Types of routers
inside enterprises,
between enterprises and the Internet, and
inside Internet Service Providers (ISPs).
The largest routers (for example the Cisco CRS-1 or Juniper T1600)
interconnect ISPs, are used inside ISPs, or may be used in very large enterprise
networks.
The smallest routers provide connectivity for small and home offices.
Routers intended for ISP and major enterprise connectivity almost invariably
exchange routing information using the Border Gateway Protocol (BGP).
351CS51
Edge Router:
An ER is placed at the edge of an ISP network. The router speaks
external BGP (EBGP) to a BGP speaker in another provider or large enterprise
Autonomous System(AS). This type of routers is also called PE (Provider
Edge) routers.
Subscriber Edge Router:
An SER is located at the edge of the subscriber's network, it speaks
EBGP to its provider's AS(s). It belongs to an end user (enterprise)
organization. This type of routers is also called CE (Customer Edge) routers.
Inter-provider Border Router:
Interconnecting ISPs, this is a BGP speaking router that maintains BGP
sessions with other BGP speaking routers in other providers' ASes.
Core router:
Within an ISP:
Internal to the provider's AS, such a router speaks internal BGP (IBGP)
to that provider's edge routers, other intra-provider core routers, or the
provider's inter-provider border routers.
Routers are also used for port forwarding for private servers.
Routers use headers and forwarding tables to determine the best path for
forwarding the packets, and they use protocols such as ICMP to communicate with
each other and configure the best route between any two hosts.
Gateway
Computer terminology
351CS51
Gateway (web page), a webpage designed to attract visitors and search engines
to a particular website.
Payment gateway, the software interface between a web-based shopping cart
and a merchant account.
Gateway (computer program), a link between two computer programs allowing
them to share information and bypass certain protocols on a host computer.
Residential gateway, a home networking device.
Gateways, also called protocol converters, can operate at any layer of the OSI
model. The job of a gateway is much more complex than that of a router or
switch. Typically, a gateway must convert one protocol stack into another.
Gateways work on all seven layers of OSI architecture. The main job of a
gateway is to convert protocols among communications networks. A router by itself
transfers, accepts and relays packets only across networks using similar protocols.
A gateway on the other hand can accept a packet formatted for one protocol (e.g.
AppleTalk) and convert it to a packet formatted for another protocol (e.g.
TCP/IP) before forwarding it.
351CS51
users are host nodes, while the nodes that connect the networks in between are
gateways. For example, the computers that control traffic between company networks
or the computers used by internet service providers (ISPs) to connect users to the
internet are gateway nodes.
Most computer operating systems use the terms described above. A computer
running Microsoft Windows however describes this standard networking feature as
Internet Connection Sharing; which will act as a gateway, offering a connection
between the Internet and an internal network. Such a system might also act as a DHCP
server. Dynamic Host Configuration Protocol (DHCP) is a protocol used by
networked devices (clients) to obtain various parameters necessary for the clients
to operate in an Internet Protocol (IP) network. By using this protocol, system
administration workload greatly decreases, and devices can be added to the network
with minimal or no manual configurations.
Internet-to-Orbit Gateway
Examples
351CS51
LAN to the provider-specific network which in turn connects to the Internet. In
the case of a home, this gateway is called a residential gateway.
Routing algorithms
Routing:
To transfer packets from a sender to the destination, the network layer must
determine the path or the route that each packet must follow. The network layer must
determine the path for a packet, either throughout the transmission or at the start of
transfer. This job is done by the network layer routing protocol. The path information
is stored in a routing table.
Types of routing
1. Static routing
2. Dynamic routing
Static routing:
This is the simplest type of routing, in which the routing information is entered
once and it does not usually change. The network administrator enters the routing
information into the routing tables.
Dynamic routing:
In dynamic routing, routers build their routing tables dynamically. Routes are
added or deleted on the basis of the information exchanged among various routers.
For large and rapidly changing networks, dynamic routing is the most useful. It
reflects the state of a network more accurately than static routing.
351CS51
Routing Algorithms:
Any routing protocol is based upon an algorithm that finds out the path for a
packet. The purpose of a routing algorithm is to find out a path from source to the
destination for a given set of routers.
In a given graph of routers, the problem of finding the route from a source to a
destination reduces to identifying a series of consecutive links in which:
The source is connected to the first link in the path
The destination is connected to the last link in the path.
1. Dijkstra’s Algorithm
Dijkstra‘s algorithm assumes that the cost is a positive number between any
pair of routers, the nodes in the graph. The network with the routers is considered as a
graph represented by the nodes on the network. The algorithm starts from the source
node and proceeds with finding out the routes for all the other nodes. The first routes
found are the one-hop routes, which are from the source node to the nodes directly
connected to this source. Then, the algorithm proceeds to the next node. All the direct
routes are calculated and the costs of all the nodes from the original node are calculated
again. The procedure is repeated until the routes for all the nodes are found. Fig 5.6
shows a graph with six nodes, the cost of each link being equal to one.
351CS51
Fig (5.6)
In fig 5.6, A is the source node. The nodes directly connected to A are B and C,
and the cost of A-B and A-C is equal to 1. The nodes directly connected to B are A,C
and E. From node B, the cost of B-A, B-C and B-E are all 1. however, when you
calculate the cost of reaching C through B from A (A-C-B) it equals 2.
In a similar manner, each node is traversed and the cost of reaching all the
nodes from the source node is recalculated. Only the minimum cost of reaching a node
from the source node is taken into consideration. In this way, the costs of reaching all
the nodes on the network can be found out.
Table 5.1 lists all the source destination pairs with the source as node A and the
corresponding costs of reaching the destination node.
A-B 1
A-C 1
A-D 2
A-E 2
A-F 2
2. Shortest Path
351CS51
The shortest path algorithm assumes that the router knows the complete
topology of the network. Therefore, it looks at computing the optimal path with the
least cost for the given source and the destination. It uses Dijkstra‘s algorithm for this
purpose. The shortest path algorithm guarantees convergence to the shortest path
available on the known network. The problem with the approach is that it requires prior
information about ht entire network topology, which becomes very difficult in real
scenarios, where frequent changes are also possible on the underlying network.
3. Flooding
Flooding also guarantees the shortest path delivery of packets to their
destination. As the name suggests, every router that receives a packet during transition
sends the packet to its entire connected links. This technique is call flooding. As the
packet passes through all the possible paths on the network, it is guaranteed to pass
through the optimal path also.
This approach does not require any prior information regarding network
topology. However, the main problem with this approach is that duplicate copies reach
the destination and, therefore, the destination host has to make some arrangements to
manage these duplicate packets. In addition, if no restriction is put on the outgoing
links at the routers, these duplicate packets travel on the network for a long time and
cause unnecessary load on the network. To tackle this problem, routers check the
packets before flooding them out. The checking process involves the following
considerations:
The checking process must send packets out over the links excluding the incoming
link.
If the packet has been flooded in the past, it should not be flooded again.
The packet should be flooded only over the links that probably go towards the
destination, instead of all the links.
Flooding guarantees the quickest possible delivery of the packet. It is used in
critical applications such as military networks where parallel paths are created on the
network. In such networks, flooding ensures maximum connectivity even if some links
are broken.
4. Distance-Vector Algorithm
351CS51
The distance-vector algorithm is an iterative, asynchronous, and disturbed
routing algorithm. Each router receives some information from one or more of its
directly attached neighbors, perform a calculation, and them distributes the results of
its calculation back to its neighbors. This process is iteratively continued until no more
information is exchanged between neighbors. The algorithm is asynchronous because it
does not require all the nodes to operate in lock step with each other.
The principal data structure in the algorithm is the distance table maintained on
each node. The distance table for a node is a table that has a row for each known
destination on the network and a column indicating the neighbor node having the least
cost for that destination.
Fig (5.7)
Routing Table
A host or a router has a routing table with an entry for each destination, or a
combination of destinations, to route IP packets. The routing table can be either static
or dynamic.
Static Routing Table
351CS51
A static routing table contains information entered manually. The administrator
enters the route for each destination into the table. When a table is created, it cannot
update automatically when there is a change in the Internet. The table must be
manually altered by the administrator.
A static routing table can be used in a small internet that does not change very
often. or in an experimental internet for troubleshooting. It is poor strategy to use a
static routing table in a big Internet such as the Internet.
TCP/IP Network
The TCP/IP model, or Internet Protocol Suite, describes a set of general design
guidelines and implementations of specific networking protocols to enable
computers to communicate over a network. TCP/IP provides end-to-end
connectivity specifying how data should be formatted, addressed, transmitted,
routed and received at the destination. Protocols exist for a variety of different types
of communication services between computers.
TCP/IP is generally described as having four abstraction layers (RFC 1122). This
layer architecture is often compared with the seven-layer OSI Reference Model; using
terms such as Internet Reference Model in analogy is however incorrect as the Internet
Model is descriptive while the OSI Reference Model was intended to be prescriptive,
hence Reference Model.
351CS51
four layers of the DARPA model are: Application, Transport, Internet, and Network
Interface.
351CS51
2. Internet Layer
The Internet layer is responsible for addressing, packaging, and routing
functions. The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
The Internet layer is analogous to the Network layer of the OSI model.
3. Transport Layer
The Transport layer (also known as the Host-to-Host Transport layer) is
responsible for providing the Application layer with session and datagram
communication services. The core protocols of the Transport layer are Transmission
Control Protocol (TCP) and the User Datagram Protocol (UDP).
TCP provides a one-to-one, connection-oriented, reliable communications service.
TCP is responsible for the establishment of a TCP connection, the sequencing and
acknowledgment of packets sent, and the recovery of packets lost during
transmission.
UDP provides a one-to-one or one-to-many, connectionless, unreliable
communications service. UDP is used when the amount of data to be transferred is
small (such as the data that would fit into a single packet), when the overhead of
establishing a TCP connection is not desired or when the applications or upper
layer protocols provide reliable delivery.
The Transport layer encompasses the responsibilities of the OSI Transport layer
and some of the responsibilities of the OSI Session layer.
4. Application Layer
The Application layer provides applications the ability to access the services of
the other layers and defines the protocols that applications use to exchange data. There
are many Application layer protocols and new protocols are always being developed.
The most widely-known Application layer protocols are those used for the
exchange of user information:
The Hypertext Transfer Protocol (HTTP) is used to transfer files that make up
the Web pages of the World Wide Web.
The File Transfer Protocol (FTP) is used for interactive file transfer.
351CS51
The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail
messages and attachments.
Telnet, a terminal emulation protocol, is used for logging on remotely to network
hosts.
Additionally, the following Application layers protocols help facilitate the use
and management of TCP/IP networks:
The Domain Name System (DNS) is used to resolve a host name to an IP address.
The Routing Information Protocol (RIP) is a routing protocol that routers use to
exchange routing information on an IP internetwork.
The Simple Network Management Protocol (SNMP) is used between a network
management console and network devices (routers, bridges, intelligent hubs) to
collect and exchange network management information.
Transport Layer
351CS51
The Transport Layer provides this service of connecting applications through
the use of service ports. Since IP provides only a best effort delivery, the Transport
Layer is the first layer of the TCP/IP stack to offer reliability. IP can run over a reliable
data link protocol such as the High-Level Data Link Control (HDLC). Protocols above
transport, such as RPC, also can provide reliability.
For example, the Transmission Control Protocol (TCP) is a connection-oriented
protocol that addresses numerous reliability issues to provide a reliable byte stream:
data arrives in-order
data has minimal error (i.e. correctness)
duplicate data is discarded
lost/discarded packets are resent
includes traffic congestion control
Application Layer
The Application Layer refers to the higher-level protocols used by most
applications for network communication. Examples of application layer protocols
include the File Transfer Protocol (FTP) and the Simple Mail Transfer Protocol
(SMTP)[10]. Data coded according to application layer protocols are then encapsulated
into one or (occasionally) more transport layer protocols (such as the Transmission
351CS51
Control Protocol (TCP) or User Datagram Protocol (UDP)), which in turn use lower
layer protocols to effect actual data transfer.
Since the IP stack defines no layers between the application and transport
layers, the application layer must include any protocols that act like the OSI's
presentation and session layer protocols. This is usually done through libraries.
Application Layer protocols generally treat the transport layer (and lower)
protocols as "black boxes" which provide a stable network connection across which to
communicate, although the applications are usually aware of key qualities of the
transport layer connection such as the end point IP addresses and port numbers. As
noted above, layers are not necessarily clearly defined in the Internet protocol suite.
Application layer protocols are most often associated with client-server applications,
and the commoner servers have specific ports assigned to them by the IANA: HTTP
has port 80; Telnet has port 23; etc. Clients, on the other hand, tend to use ephemeral
ports, i.e. port numbers assigned at random from a range set aside for the purpose.
Transport and lower level layers are largely unconcerned with the specifics of
application layer protocols. Routers and switches do not typically "look inside" the
encapsulated traffic to see what kind of application protocol it represents, rather they
just provide a conduit for it. However, some firewall and bandwidth throttling
applications do try to determine what's inside, as with the Resource Reservation
Protocol (RSVP). It's also sometimes necessary for Network Address Translation
(NAT) facilities to take account of the needs of particular application layer protocols.
(NAT allows hosts on private networks to communicate with the outside world via a
single visible IP address using port forwarding, and is an almost ubiquitous feature of
modern domestic broadband routers).
351CS51
Fig (5.9)
One of the most popular Internet services is electronic mail (e-mail). The
designers of the Internet probably never imagined the popularity of this application
program. Its architecture consists of several components.
At the beginning of the Internet era, the messages sent by electronic mail were
short and consisted of text only; they let people exchange quick memos. Today,
electronic mail is much more complex. It allows a message to include text, audio, and
video. It also allows one message to be sent to one or more recipients.
The World Wide Web (WWW) is a repository of information linked together
from points all over the world. The WWW has a unique combination of flexibility,
portability, and user-friendly features that distinguish it from other services provided
by the Internet. The WWW project was initiated by CERN (European Laboratory for
Particle Physics) to create a system to handle distributed resources necessary for
scientific research. In this chapter we first discuss issues related to the Web.
Each site holds one or more documents, referred to as Web pages. Each Web
page can contain a link to other pages in the same site or at other sites. The pages can
be retrieved and viewed by using browsers. Let us go through the scenario shown in
Fig (9). The client needs to see some information that it knows belongs to site A. It
sends a request through its browser, a program that is designed to fetch Web
documents. The request. among other information, includes the address of the site and
the Web page, called the URL, which we will discuss shortly. The server at site A finds
the document and sends it to the client. When the user views the document, she finds
some references to other documents, including a Web page at site B. The reference has
the URL for the new site. The user is also interested in seeing this document. The client
sends another request to the new site, and the new page is retrieved.
(Client) Browser
A variety of vendors offer commercial browsers that interpret and display a
Web document, and all use nearly the same architecture.
Each browser usually consists of three parts:
i. a controller,
351CS51
ii.client protocol, and
iii.interpreters
The controller receives input from the keyboard or the mouse and uses the
client programs to access the document. After the document has been accessed, the
controller uses one of the interpreters to display the document on the screen.
The client protocol can be one of the protocols such as FTP and HTTP.
The interpreter can be HTML, Java, or JavaScript, depending on the type of
document.
We discuss the use of these interpreters based on the document type later in the
chapter (see Figure (5.10)).
Server
The Web page is stored at the server. Each time a client request arrives, the
corresponding document is sent to the client. To improve efficiency, servers normally
store requested files in a cache in memory; memory is faster to access than disk. A
server can also become more efficient through multithreading or multiprocessing. In
this case, a server can answer more than one request at a time.
Uniform Resource Locator
A client that wants to access a Web page needs the address. To facilitate the
access of documents distributed throughout the world, HTTP uses locators. The
uniform resource locator (URL) is a standard for specifying any kind of information on
the Internet. The URL defines four things: protocol, host computer, port, and path (see
Fig 5.11).
Fig (5.11)
Cookies
The World Wide Web was originally designed as a stateless entity. A client
sends a request; a server responds. Their relationship is over. The original design of
351CS51
WWW, retrieving publicly available documents, exactly fits this purpose. Today the
Web has other functions; some are listed here.
1. Some websites need to allow access to registered clients only.
2.. Websites are being used as electronic stores that allow users to browse through the
store, select wanted items, put them in an electronic cart, and pay at the end with a
credit card.
3. Some websites are used as portals: the user selects the Web pages he wants to see.
4. Some websites are just advertising.
HTML
Hypertext Markup Language (HTML) is a language for creating Web pages.
Data for a Web page are formatted for interpretation by a browser.
HTTP
The Hypertext Transfer Protocol (H1’TP) is a protocol used mainly to
access data on the World Wide Web. HTTP functions as a combination of FTP and
SMTP. It is similar to FTP because it transfers files and uses the services of TCP.
However, it is much simpler than FTP because it uses only one TCP connection.
There is no separate control connection: only data are transferred between the client
and the server.
HTTP is like SMTP because the data transferred between the client and the
server look like SMTP messages. In addition, the format of the messages is
controlled by MIME-like headers. Unlike SMTP, the HTTP messages are not
destined to be read by humans; they are read and interpreted by the HTTP server
and HTTP client (browser). SMTP messages are stored and forwarded, but HTTP
messages are delivered immediately. The commands from the client to the server are
embedded in a request message. The contents of the requested file or other
information are embedded in a response message.
HTTP uses the services of TCP on well-known port 80. HTTP uses the
services of TCP on well-known port 80.
The Internet is a global system of interconnected computer networks that use
the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is
a network of networks that consists of millions of private, public, academic, business,
and government networks of local to global scope that are linked by a broad array of
electronic and optical networking technologies. The Internet carries a vast array of
351CS51
information resources and services, most notably the inter-linked hypertext documents
of the World Wide Web (WWW) and the infrastructure to support electronic mail.
Most traditional communications media, such as telephone and television
services, are reshaped or redefined using the technologies of the Internet, giving rise to
services such as Voice over Internet Protocol (VoIP) and IPTV. Newspaper publishing
has been reshaped into Web sites, blogging, and web feeds. The Internet has enabled or
accelerated the creation of new forms of human interactions through instant messaging,
Internet forums, and social networking sites.
The origins of the Internet reach back to the 1960s when the United States
funded research projects of its military agencies to build robust, fault-tolerant and
distributed computer networks. This research and a period of civilian funding of a new
U.S. backbone by the National Science Foundation spawned worldwide participation in
the development of new networking technologies and led to the commercialization of
an international network in the mid 1990s, and resulted in the following popularization
of countless applications in virtually every aspect of modern human life. As of 2009,
an estimated quarter of Earth's population uses the services of the Internet.
The Internet has no centralized governance in either technological
implementation or policies for access and usage; each constituent network sets its own
standards. Only the overreaching definitions of the two principal name spaces in the
Internet, the Internet Protocol address space and the Domain Name System, are
directed by a maintainer organization, the Internet Corporation for Assigned Names
and Numbers (ICANN). The technical underpinning and standardization of the core
protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force
(IETF), a non-profit organization of loosely affiliated international participants that
anyone may associate with by contributing technical expertise.
The first part of the address is called a protocol identifier and it indicates what
protocol to use, and the second part is called a resource name and it specifies the IP
address or the domain name where the resource is located. The protocol identifier and
the resource name are separated by a colon and two forward slashes.
For example, the two URLs below point to two different files at the domain
pcwebopedia.com. The first specifies an executable file that should be fetched using
the FTP protocol; the second specifies a Web page that should be fetched using the
HTTP protocol.
351CS51
351CS51