Unit - I PPT (CN)
Unit - I PPT (CN)
IT
Department of
IT
UNIT-1
DATA COMMUNICATIONS
INTRODUCTION TO COMPUTER
NETWORKS
• Computer networking refers to interconnected
computing devices that can exchange data
and share resources with each other. These
networked devices use a system of rules,
called communications protocols, to transmit
information over physical or wireless
technologies.
Why do we need Computer
Networks?
• To share computer files
• To share computer equipment(Laser printers and
large hard-disk drives can be expensive)
• To improve communication speed and
accuracy(less chance of a message being
lost)
• To reduce the cost of data transfer(telegrams)
• Verify Data Transfer(Fluctuations of costs in
foreign exchange and shares)
• High Reliability(because of hardware
failure)
What is Communication
• Communication is defined as a process in which
more than one computer transfers information,
instructions to each other and for sharing resources.
Or in other words, communication is a process or act
in which we can send or receive data.
• Data communications (DC) is the process of using
computing and communication technologies to
transfer data from one place to another, and vice
versa. It enables the movement of electronic or
digital data between two or more nodes, regardless
of geographical location, technological medium or
data contents.
Components
A communication system is made up of the following components:
• Message: A message is a piece of information that is to be
transmitted from one person to another. It could be a text file, an
audio file, a video file, etc.
• Sender: It is simply a device that sends data messages. It can be a
computer, mobile, telephone, laptop, video camera, or workstation,
etc.
• Receiver: It is a device that receives messages. It can be a computer,
telephone mobile, workstation, etc.
• Transmission Medium / Communication Channels: Communication
channels are the medium that connect two or more workstations.
Workstations can be connected by either wired media or wireless
media.
• Set of rules (Protocol): When someone sends the data (The sender),
it should be understandable to the receiver also otherwise it is
meaningless.
Components
Some examples of Protocols
• TCP(Transmission Control Protocol): It is responsible for
dividing messages into packets on the source computer and
reassembling the received packet at the destination or
recipient computer. It also makes sure that the packets have
the information about the source of the message data, the
destination of the message data, the sequence in which the
message data should be re-assembled, and checks if the
message has been sent correctly to the specific destination.
Protocols
A protocol is a set of rules that
govern data A protocol defines what
communications.
is communicated, how communicated,
it is and
when it is communicated.
The key elements of a protocol are
syntax, semantics , timing, Sequence control,
Flow Control, Error Control, Security.
Elements
• Syntax. The term syntax refers to the structure or format
of the data, meaning the order in which they are
presented.
• Semantics. The word semantics refers to the meaning
of each section of bits. It provides rules and norms for
understanding message
• Timing. The term timing refers to two characteristics:
when data should be sent and how fast they can be
sent . For example, If a sender sends 100 Mbps but the
receiver can only handle 1 Mbps, the receiver will
overflow and lose data. Timing ensures preventing data
loss, collisions and other timing related issues.
Sequence control : Sequence control ensures the proper
ordering of data packets. The main responsibility of
sequence control is to acknowledge the data while it get
received, and the retransmission of lost data. Through
this mechanism the data is delivered in correct order.
Flow Control : Flow control regulates device data
delivery. It limits the sender’s data or asks the receiver if
it’s ready for more. Flow control prevents data
congestion and loss.
Error Control : Error control mechanisms detect and fix
data transmission faults. They include error detection
codes, data resend, and error recovery. Error control
detects and corrects noise, interference, and other
problems to maintain data integrity.
Security : Network security safeguards data
confidentiality, integrity, and authenticity. which
includes encryption, authentication, access control,
and other security procedures.
Standards
• Standards provide guidelines to manufacturers,
vendors, government agencies, and other service
providers to ensure the kind of interconnectivity
necessary in today's marketplace and in
international communications.
• Data communication standards fall into two
categories: de facto (meaning "by fact" or "by
convention") and de jure (meaning "by law" or
"by regulation").
Standards categories
• De facto: standards are often established
originally by manufacturers who seek to
define the functionality of a new product or
technology.
• De jure: Those standards that have been
legislated by an officially recognized body are
de jure standards.
• LAYERED TASKS: We use the concept of layers in our
daily life. As an example, let us consider two friends
who communicate through postal mail The process of
sending a letter to a friend would be complex if there
were no services available from the post office.
Below Figure shows the steps in this task
OSI Reference
•
Model
OSI Reference Model - internationally
standardised network architecture.
• OSI = Open Systems Interconnection: deals with open
systems, i.e. systems open for communications with
other systems.
• It was first introduced in the late 1970s. An open system
is a set of protocols that allows any two different systems
to communicate regardless of their underlying
architecture. The purpose of the OSI model is to show
how to facilitate communication between different
systems without requiring changes to the logic of the
underlying hardware and software.
7-Layer OSI
Model
Layer 7 Application • Layers 1-4 relate to
Layer
Presentation
communications
Layer 6 Layer technology.
Layer 5 Session Layer • Layers 5-7 relate to user
applications.
Layer 4 Transport Layer
Communications subnet
boundary
Layer 7: Application
• Layer
The application layer enables the user,
whether human or software, to access the
network. It provides user interfaces and
support for services such as electronic mail,
remote file access and transfer, shared
database management, and other types of
distributed information services.
• Network virtual terminal. A network virtual
terminal is a software version of a physical
terminal, and it allows a user to log on to a
remote host.
File transfer, access, and management. This
application allows a user to access
files in a remote host (to make changes or read
data), to retrieve files from a remote
computer for use in the local computer, and to
manage or control files in a remote
computer locally.
o Mail services. This application provides the basis
for e-mail forwarding and
storage.
o Directory services. This application provides
distributed database sources and
access for global information about various objects
and services.
LAYER 6:Presentation Layer
The presentation layer is concerned with the syntax and
semantics of the information
exchanged between two systems.
The presentation layer is responsible for translation,
compression, and encryption
Specific responsibilities of the presentation layer include the
following:
o Translation. The processes (running programs) in two
systems are usually exchanging information in the form of
character strings, numbers, and so on. The information must
be changed to bit streams before being transmitted. Because
different computers use different encoding systems, the
presentation layer is responsible for interoperability
between these different encoding methods.
The presentation layer at the sender changes the
information from its sender-dependent format into
a common format. The presentation layer at the
receiving machine changes the common format into
its receiver-dependent format.
Encryption. To carry sensitive information, a system
must be able to ensure
Privacy
Compression. Data compression reduces the
number of bits contained in the information. Data
compression becomes particularly important in the
transmission of multimedia such as text, audio, and
video.
Layer 5: Session
• Layer
The services provided by the first three layers
(physical, data link, and network) are not sufficient for
some processes. The session layer is the network
dialog controller. It establishes, maintains, and
synchronizes the interaction among communicating
systems
• Dialog control. The session layer allows two systems
to enter into a dialog. It allows the communication
between two processes to take place in either half
duplex (one way at a time) or full-duplex (two ways at
a time) mode.
Synchronization:
The session layer allows a process to add checkpoints,
or synChronization points, to a stream of data. For
example, if a system is sending a file
of 2000 pages, it is advisable to insert checkpoints after
every 100 pages to ensure
that each 100-page unit is received and acknowledged
independently. In this case,
if a crash happens during the transmission of page 523,
the only pages that need to
be resent after system recovery are pages 501 to 523.
Pages previous to 501 need
not be resent.
Layer 4: Transport
Layer
The transport layer is responsible for process-to-process delivery
of the entire message. A process is an application program
running on a host
o Service-point addressing. Computers often run several
programs at the same time. For this reason, source-to-destination
delivery means delivery not only from one computer to the next
but also from a specific process (running program) on one
computer to a specific process (running program) on the other.
The transport layer header must therefore include a type of
address called a service-point address (or port address). The
network layer gets each packet to the correct computer; the
transport layer gets the entire message to the correct process on
that computer.
Segmentation and reassembly. A message is divided into
transmittable segments,
with each segment containing a sequence number. These
numbers enable the transport layer to reassemble the
message correctly upon arriving at the destination and
to identify and replace packets that were lost in
transmission.
o Connection control. The transport layer can be either
connectionless or connectionoriented. A connectionless
transport layer treats each segment as an independent
packet and delivers it to the transport layer at the
destination machine. A connectionoriented transport
layer makes a connection with the transport layer at the
destination machine first before delivering the packets.
After all the data are transferred,
the connection is terminated.
Flow control. Like the data link layer, the transport
layer is responsible for flow
control. However, flow control at this layer is
performed end to end rather than
across a single link.
o Error control. Like the data link layer, the transport
layer is responsible for
error control. However, error control at this layer is
performed process-toprocess rather than across a
single link.
Layer 3: Network
Layer
The network layer is responsible for the source-to-
destination delivery of a packet, possibly across multiple
networks (links). Whereas the data link layer oversees the
delivery of the packet between two systems on the same
network (links), the network layer ensures that each
packet gets from its point of origin to its final destination.
Logical addressing.
The physical addressing implemented by the data link
layer handles the addressing problem locally. If a packet
passes the network boundary, we need another
addressing system to help distinguish the source and
destination systems.
Routing. When independent networks or links are
connected to create internetworks (network of
networks) or a large network, the connecting
devices (called routers or switches) route or switch
the packets to their final destination. One of the
functions of the network layer is to provide this
mechanism.
Layer 2: Data Link
The data link layer transforms the physical layer, a raw
Layer
transmission facility, to a reliable link. It makes the physical
layer appear error-free to the upper layer (network layer).
Other responsibilities of the data link layer include the
following:
[I Framing. The data link layer divides the stream of bits
received from the network layer into manageable data units
called frames.
o Physical addressing. If frames are to be distributed to
different systems on the network, the data link layer adds a
header to the frame to define the sender and/or receiver of
the frame. If the frame is intended for a system outside the
sender's network, the receiver address is the address of the
device that connects the network to the next one.
Flow control. If the rate at which the data are absorbed by the
receiver is less than
the rate at which data are produced in the sender, the data link
layer imposes a flow
control mechanism to avoid overwhelming the receiver.
o Error control. The data link layer adds reliability to the
physical layer by adding
mechanisms to detect and retransmit damaged or lost frames.
It also uses a mechanism to recognize duplicate frames. Error
control is normally achieved through a
trailer added to the end of the frame.
D Access control. When two or more devices are connected to
the same link, data
link layer protocols are necessary to determine which device
has control over the
link at any given time.
Layer 1:Physical layer
The physical layer coordinates the functions required to carry a
bit stream over a physical medium. It deals with the mechanical
and electrical specifications of the interface and transmission
medium
Physical characteristics of interfaces and medium. The physical
layer defines the characteristics of the interface between the
devices and the transmission medium. It also defines the type of
transmission medium.
o Representation of bits. The physical layer data consists of a
stream of bits (sequence of Os or 1s) with no interpretation. To
be transmitted, bits must be encoded into signals--electrical or
optical. The physical layer defines the type of encoding (how
Os and Is are changed to signals).
Data rate. The transmission rate-the number of bits
sent each second-is also defined by the physical
layer. In other words, the physical layer defines the
duration of a bit, which is how long it lasts. o
Synchronization of bits. The sender and receiver not
only must use the same bit rate but also must be
synchronized at the bit level. In other words, the
sender and the receiver clocks must be
synchronized.
o Line configuration. The physical layer is concerned
with the connection of devices to the media. In a
point-to-point configuration, two devices are
connected through a dedicated link. In a multipoint
configuration, a link is shared among several devices.
Physical topology. The physical topology defines how
devices are connected to
make a network.
Transmission mode. The physical layer also defines the
direction of transmission between two devices:
simplex, half-duplex, or full-duplex.
• The TCP/IP Reference Model: The TCP/IP reference
model was developed prior to OSI model. The
major design goals of this model were,
• To connect multiple networks together so that they
appear as a single network.
• Serial Communication
• Parallel Communication
Serial Data Transmission
• The Serial data transmission mode is a mode in
which the data bits are sent serially one after
the other at a time over the transmission
channel.
• According to the synchronization between the
transmitter and the receiver
• The Synchronous transmission mode is a
mode of communication in which the bits are
sent one after another without any start/stop
bits or gaps between them. Actually, both the
sender and receiver are paced by the same
system clock. In this way, synchronization is
achieved.
• In a Synchronous mode of data transmission,
bytes are transmitted as blocks in a
continuous stream of bits. Since there is no
start and stop bits in the message block.
• Asynchronous
• The Asynchronous transmission mode is a
mode of communication in which a start and
the stop bit is introduced in the message
during transmission. The start and stop bits
ensure that the data is transmitted correctly
from the sender to the receiver.
• start bit is '0' and the end bit is '1'
• The messages are sent at irregular intervals
and only one data byte can be sent at a time.
This type of transmission mode is best suited
for short-distance data transfer.
• For Example, if there are two bytes of data,
say(10001101, 11001011) then it will be
transmitted in the mode
asynchronous follows:
as
• The data transmission mode is a
mode
Parallel in which the data bits are
parallelly at a time.sent
In other words, there is a
transmission of n-bits at the same time
simultaneously.
Parallel Mode
Parallel Mode
• Multiple transmission lines are used in such
modes of transmission. So, multiple data bytes
can be transmitted in a single system clock.
• This mode of transmission is used when a
large amount of data has to be sent in a
shorter duration of time. It is mostly used for
short-distance communication.
Advantages and Disadvantages
• The main advantages of parallel transmission
over serial transmission are:
• it is easier to program;
• and data is sent faster.
• Although parallel transmission can transfer
data faster, it requires more transmission
channels than serial transmission
• Parallel transmission is used when:
• a large amount of data is being sent;
• the data being sent is time-sensitive;
• and the data needs to be sent quickly
• A scenario where parallel transmission is used
to send data is video streaming. When a video
is streamed to a viewer, bits need to be received
quickly to prevent a video pausing or buffering.
• Video streaming also requires the transmission of
large volumes of data. The data being sent is
also time-sensitive as slow data streams result in
poor viewer experience
Multiplexing
• Multiplexing is a technique used to combine
send the multiple data streams over a single
and
medium. The process of combining the data
streams is known as multiplexing and hardware
used for multiplexing is known as a multiplexer.
• Multiplexing is achieved by using a device called
Multiplexer (MUX) that combines n input lines to
generate a single output line. Multiplexing follows
many-to-one, i.e., n input lines and one output
line.
• When multiple senders try to send over a
single medium, a device called Multiplexer
divides the physical channel and allocates one
to each.
• On the other end of communication, a De-
multiplexer receives data from a single
medium, identifies each, and sends to different
receivers.
Frequency Division Multiplexing
• In the 20th century, many telephone companies used
frequency-division multiplexing for long distance
connections to multiplex thousands of voice signals
through a coaxial cable system
• For shorter distances, cheaper cables were used for
various systems but they didn’t allow large
bandwidths.
• The most common example of frequency-division
multiplexing is radio and television broadcasting, in
which multiple radio signals at different frequencies
pass through the air at the same time. Another
example is cable television, in which many television
channels are carried simultaneously on a single cable.
• The FDM is an analog multiplexing that
combines analog signals.
• Frequency division multiplexing is applied when
the bandwidth of the link is greater than the
combined bandwidth of the signals to be
transmitted.
frequency-division multiple
• Inaccess
frequency-division multiple access (FDMA),
the available bandwidth is divided into
frequency bands.
• A specific frequency band is given to one person,
and it will received by identifying each of the
frequency on the receiving end. It is often used in
the first generation of analog mobile phone.
• FDMA stands for Frequency Division Multiple
Access, a technology commonly used in mobile
communications. It’s an access method for the
data link layer, that uses the concepts of FDM to
basically achieve the same goal.
• 1. FDM is a physical layer multiplexing technique,
while FDMA is a data link layer access method.
Features:
High Speed, Secure, Used for comparatively
shorter distances
Twisted Pair Cable
• consists of 2 separately insulated
conductor wires wound about each other.
Generally, several such pairs are bundled
together in a protective sheath. They are
the most widely used Transmission Media.
• Twisted Pair is of two types
Unshielded Twisted Pair (UTP)
• This type of cable has the ability to block
interference and does not depend on a physical
shield for this purpose. It is used for telephonic
applications.
• Advantages: Least expensive, Easy to install, High
speed capacity
• Disadvantages: Susceptible to external
interference, Lower capacity and performance in
comparison to STP Short distance transmission
due to attenuation
Shielded Twisted Pair
• This type of cable consists of a special jacket to
block external interference. It is used in fast-data-
rate Ethernet and in voice and data channels of
telephone lines.
• Advantages: Better performance at a higher data
rate in comparison to UTP Eliminates crosstalk,
comparatively faster
• Disadvantages: Comparatively difficult to install
and manufacture, More expensive, Bulky
Coaxial Cable
• It has an outer plastic covering containing 2 parallel
conductors each having a separate insulated protection
cover. Coaxial cable transmits information in two
modes: Baseband mode(dedicated cable bandwidth)
and Broadband mode(cable bandwidth is split into
separate ranges). Cable TVs and analog television
networks widely use Coaxial cables.
• Advantages: High Bandwidth, Better noise Immunity,
Easy to install and expand, Inexpensive
• Disadvantages: Single cable failure can disrupt
the entire network
Optical Fibre
Cable
• It uses the concept of reflection of light through a
core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic
covering called the cladding. It is used for
transmission of large volumes of data.
• Advantages: Increased capacity and bandwidth,
Light weight, Less signal attenuation
• Disadvantages: Difficult to install and maintain,
High cost, Fragile
Unguided Media
• It is also referred to as Wireless or Unbounded
transmission media.
• No physical medium is required for the
transmission of electromagnetic signals.
• Features: Signal is broadcasted through air,
Less Secure, Used for larger distances
• There are 3 major types of Unguided
Media
(i) Radio waves
• These are easy to generate and can penetrate
through buildings. The sending and receiving
antennas need not be aligned. Frequency
Range:3KHz – 1GHz. AM and FM radios and
cordless phones use Radio waves for
transmission.
• Further Categorized as: (i) Terrestrial and (ii)
Satellite.
(ii)
• It is a line ofMicrowaves
sight transmission i.e. the
sending and receiving antennas need to be
properly aligned with each other. The
distance covered by the signal is directly
proportional to the height of the antenna.
Frequency Range:1GHz
– 300GHz. These are majorly used for
mobile phone communication and
television distribution.
(iii) Infrared
• Infrared waves are used for very short
distance communication. They cannot
penetrate through obstacles. This prevents
interference between systems. Frequency
Range: 300GHz – 400THz. It is used in TV
remotes, wireless mouse, keyboard, printer,
etc.
Switching
• A network is a set of connected devices.
Whenever we have multiple devices, we have the
problem of how to connect them to make one-
to- one communication possible.
• One solution is to make a point-to-point
connection between each pair of devices (a mesh
topology) or between a central device and every
other device (a star topology).
• These methods, however, are impractical and
wasteful when applied to very large
networks
• A better solution is switching.
• A switched network consists of a series of
interlinked nodes, called switches.
• Switches are devices capable of creating
temporary connections between two or more
devices linked to the switch.
• In a switched network, some of these nodes are
connected to the end systems (computers or
telephones, for example). Others are used only
for routing.
• The end systems (communicating devices) are
labeled A, B, C, D, and so on, and the switches are
labeled I, II, III, IV, and V. Each switch is
connected to multiple links
Switched network
Taxonomy of switched networks
CIRCUIT-SWITCHED NETWORKS
• A circuit-switched network consists of a set
of switches connected by physical links.
• A connection between two stations is a
dedicated path made of one or more
links.
• However, each connection uses only one
dedicated channel on each link.
• Each link is normally divided into n
channels by using FDM or TDM
Three Phases(circuit-switched network )
• connection setup
• data transfer
•connection teardown
Setup Phase:
• Before the two parties (or multiple parties in a
conference call) can communicate, a dedicated circuit
(combination of channels in links) needs to be
established.
• The end systems are normally connected through
dedicated lines to the switches, so connection setup
means creating dedicated channels between the
switches.
• when system A needs to connect to system M,
it sends a setup request that includes the
address of system M, to switch I.
• Switch I finds a channel between itself
and switch IV that can be dedicated for
this purpose.
• Switch I then sends the request to switch IV,
which finds a dedicated channel between
itself and switch III. Switch III informs system
M of system A's intention at this time.
• In the next step to making a connection, an
acknowledgment from system M needs to
be sent in the opposite direction to system
A.
• Only after system A receives this
acknowledgment is the
connection established.
• Note that end-to-end addressing is
required for creating a connection between
the two end systems.
• Data Transfer Phase:
– After the establishment of the dedicated
circuit (channels), the two parties can transfer
data.
• Teardown Phase:
– When one of the parties needs to disconnect, a
signal is sent to each switch to release the
resources.
• Efficiency: It can be argued that circuit-
switched networks are not as efficient as
the other two types of networks because
resources are allocated during the entire
duration of the connection. These
resources are unavailable to other
• Delay:
– Although a circuit-switched network normally has
low efficiency, the delay in this type of network is
minimal.
– During data transfer the data are not delayed at
each switch; the resources are allocated for the
duration of the connection
DATAGRAM NETWORKS
• In a datagram network, each packet is
treated
independently of all others.
• Even if a packet is part of a multipacket
transmission, the network treats it as
though it existed alone.
• Packets in this approach are referred to as
datagrams
• Datagram switching is normally done at the
network layer
• The switches in a datagram network
are traditionally referred to as routers
• In this example, all four packets (or datagrams)
belong to the same message, but may travel
different paths to reach their destination. This
is so because the links may be involved in
carrying packets from other sources and do
not have the necessary bandwidth available
to carry all the packets from A to X
• This approach can cause the datagrams of a
transmission to arrive at their destination
out of order with different delays between
the packets.
• Packets may also be lost or dropped because
of a lack of resources. In most protocols, it is
the responsibility of an upper-layer protocol
to reorder the datagrams or ask for lost
datagrams before passing them on to the
application.
• The datagram networks are sometimes
referred to as connectionless networks.
The term connectionless here means that
the switch (packet switch) does not keep
information about the connection state.
• There are no setup or teardown phases. Each
packet is treated the same by a switch
regardless of its source or destination.
Routing Table
• each switch (or packet switch) has a routing table
which is based on the destination address.
• The routing tables are dynamic and are
updated periodically. The destination
addresses and the corresponding forwarding
output ports are recorded in the tables.
• This is different from the table of a circuit switched
network in which each entry is created when the
setup phase is completed and deleted when the
teardown phase is over
Destination Address:
Every packet in a datagram network carries a header
that contains, among other information, the
destination address of the packet.
• When the switch receives the packet, this
destination address is examined; the routing table
is consulted to find the corresponding port
through which the packet should be forwarded.
• This address, unlike the address in a virtual-
circuit- switched network, remains the same
during the entire journey of the packet.
• Efficiency: The efficiency of a datagram
network is better than that of a circuit-
switched network; resources are allocated
only when there are packets to be transferred.
• If a source sends a packet and there is a delay
of a few minutes before another packet can be
sent, the resources can be reallocated during
these minutes for other packets from other
sources.
• Delay: There may be greater delay in a datagram
network than in a virtual-circuit network.
• Although there are no setup and teardown
phases, each packet may experience a wait at
a switch before it is forwarded.
• In addition, since not all packets in a
message necessarily travel through the same
• switches, the delay is not uniform for the
packets of a message.
• The packet travels through two switches. There
are three transmission times (3T), three
propagation delays(Propagation delay is the
amount of time required for a signal to be
received after it has been sent) (slopes 3't of
the lines), and two waiting times (W1 + W2)'
We ignore the processing time in each switch.
The total delay is
• Total delay =3T + 3t + WI + W2
VIRTUAL-CIRCUIT NETWORKS
• A virtual-circuit network is a cross between a circuit-
switched network and a datagram network. It has some
characteristics of both.
• 1. As in a circuit-switched network, there are setup
and teardown phases in addition to the data transfer
phase.
• 2. Resources can be allocated during the setup phase,
as in a circuit-switched network, or on demand, as in a
datagram network.
• 3. As in a datagram network, data are packetized and
each packet carries an address in the header. However,
the address in the header has local jurisdiction (it
defines what should be the next switch and the channel
on which the packet is being carried), not end-to-end
jurisdiction
• 4. As in a circuit-switched network, all packets
follow the same path established during the
connection.
• 5. A virtual-circuit network is normally
implemented in the data link layer, while a circuit-
switched network is implemented in the physical
layer and a datagram network in the network
layer.
• Figure shows example of a virtual-circuit network.
The network has switches that allow traffic from
sources to destinations. A source or destination
can be a computer, packet switch, bridge, or any
other device that connects other networks.
• Addressing: In a virtual-circuit network,
two types of addressing are involved:
global and local(virtual-circuit identifier).
• Global Addressing: A source or a destination
needs to have a global address-an address that
can be unique in the scope of the network or
internationally if the network is part of an
international network. However, we will see that
a global address in virtual-circuit networks is
used only to create a virtual-circuit identifier, as
discussed next.
• Virtual-Circuit Identifier: The identifier that is
actually used for data transfer is called the virtual-
circuit identifier (VCI). A VCI, unlike a global
address, is a small number that has only
• switch scope; it is used by a frame between two
switches. When a frame arrives at a switch, it has
a VCI; when it leaves, it has a different VCl.
• Figure shows how the VCI in a data frame
changes from one switch to another. Note that a
VCI does not need to be a large number since
each switch can use its own unique set of VCls.
• Three Phases: As in a circuit-switched network, a
source and destination need to go through
three phases in a virtual-circuit network:
• setup,
• data transfer,
• and teardown.