Professional Documents
Culture Documents
Unit 1
The different types of distance based networks are PAN, LAN, CAN, MAN & WAN.
The approximate maximum distance between any two communicating computers for each of the
networks is given below:
looks like an acronym that a board of directors spent a lot of money and time trying to create,
but it actually stands for any generic local area network. A network is a group of computers and
other devices connected together so they can pass information back and forth.
• The local area network (LAN) is a network which is designed to operate over a small
physical area such as an office, factory or a group of buildings. LANs are very widely
used in a variety of applications.
• LANs are easy to design and troubleshoot. The personal computers and workstations
in the offices are interconnected via LAN.
Data Communication Network (NNK) PRMITR
• The exchange of information and sharing of resources becomes easy because of LAN.
• Local Area Network technology connects people and machines within a site.
• A LAN is a form of local (limited-distance), shared packet network
for computer communications.
• In LAN all the machines are connected to a single cable. Different types of. Topologies
such as Bus, Ring, Star, Tree etc. are used for LANs.
• LAN uses a layered architecture and they are capable of operating at hundreds of
Mbits/sec.
• A local area network (LAN) is usually a privately owned and links the devices in a
single office, building or campus of upto a few kilometers in size.
• Depending on the needs of an organization and the type of technology used, a LAN can
be as simple as two personal computers and a printer in someone's office or home or it
can extend throughout a company and include voice, sound and video peripherals.
• LAN s are widely used to allow resources to be shared between personal computers or
workstations. The resources to be shared can be hardware like a printer or softwares or
data.
• A common example of a LAN found in many business organizations, links a work
group of task related computers, e.g. accounting and finance PCs, administrative PCs or
engineering workstations.
• One of the computer in a network can become a server serving all the remaining
computers called clients. Software can be stored on the server and it can be used by the
remaining clients.
• In a LAN its size can be determined by licensing restrictions on the number of users
per copy of software or by restricting the number of users licensed to access
the operating system.
• LAN's are also distinguished from MAN's and WAN's based on the transmission media
they use and topology. In general a given LAN will use only one type of transmission
medium. The most common topologies used are bus, ring and star.
• The term LAN can also refer just to the hardware and software that allows you to
connect all the devices together. In this sense, Local Talk is one kind of LAN, Ethernet is
another. (AppleTalk is the protocol for Local Talk.)
The data rates for LAN range from 4 to 16 Mbps with the maximum of 100 Mbps.
The components used by LANs can be divided into cabling standards, hardware, and
protocols. Various LAN protocols are Ethernet, Token Ring: TCP/IP, 5MB, NetBIOS and
NetBeui, IPX/SPX, Fiber Distributed Data Interchange (FDDI) and Asynchronous
Transfer Mode (ATM).
Data Communication Network (NNK) PRMITR
LAN benefits include the fact that a high-speed transmission system can be shared
among multiple devices in support of large number of active terminals and a large
number of active applications in the form of a multi-user, multi-tasking computer
network. LAN-connected workstations realize the benefit of decentralized access to very
substantial centralized processors, perhaps in the form of mainframe host computer and
storage capabilities (information repositories). Additionally, current technology allows
multiple LANs to be inter-networked through the use of LAN switches, routers and the
like.
LAN topologies:
Various topologies are possible for the broadcast LANs such as bus topology or ring
topology.
Data Communication Network (NNK) PRMITR
Bus topology:
• Bus topology is shown in Fig. In this topology at any instant only one computer acts as
master and it is allowed to transmit (broadcast). The others are supposed to listen.
• If two or more machines want to transmit simultaneously then an arbitration
mechanism has to be used for resolving the conflict.
• It is possible to have a centralized or distributed type arbitration mechanism.
• The most popular example of bus topology is Ethernet (IEEE 802.3). It has a
decentralized control and it operates at 10 or 100 Mbps.
• Computers on Ethernet can transmit whenever they want. If collision of their packets
takes place, then they wait for a random time and retransmit their packets.
Ring topology:
• This is another broadcast topology.
• In a ring each bit propagates around on its own without waiting for the rest of the
packet to which it belongs.
• Since it is a broadcast system, some rules are essential for arbitrating the simultaneous
access to the ring.
• An example of ring based LAN is IEEE 802.5 (IBM token ring) operating at 4 and 16
Mbps.
Static and dynamic broadcast networks:
• The broadcast networks are further classified into two types namely,
WAN is the acronym for, Wide Area Network and refers to a network used to
connect different equipments from remote areas. This technology connects sites that are
in diverse locations. Wide Area Networks (WANs) connect larger geographic area, such
as New York, Canada, or the world. The geographical limit of WAN is unlimited.
Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of
network. Hence, a WAN may be defined as a data communications network that covers
a relatively broad geographic area to connect LANs together between different cities
with the help of transmission facilities provided by common carriers, such as telephone
companies. WAN technologies function at the lower three layers.
Normally, network services are provided by a Common Carrier of, for example, telephone
company. Users can use services on rent basis. Available services include telephone network,
leased line, packet switched network, X.25, ISDN, frame relay and cell relay.
WAN is composed of a number of autonomous computers that are distributed over a
large geographical area. LAN can be extended across large distances using Satellite
Bridge but still this cannot accommodate many computers arbitrarily. WAN must be
scalable to long distances and many computers. Therefore, network must replace shared
medium with packet switches to span long distances or many computers. Each switch
moves an entire packet from one connection to another. This mechanism is called
packet switching. These switches are nothing but a small computer with network
interfaces, memory and program dedicated to packet switching function. These packet
switches may connect to computers and to other packet switches, typically high-speed
connections to other packet switches, lower speed to computers. These packet switches
can be linked together to form WANs. WANs need not be symmetric or have regular
connections, i.e. each switch may connect to one or more other switches and one or
more computers.
Data Communication Network (NNK) PRMITR
Data delivery from one computer to another is accomplished through store and forward
technology. Packet switch stores incoming packet and forwards the packet to another
switch or computer that has internal memory. Therefore, this can hold a packet in queue
if outgoing connection is busy.
• When a network spans a large distance or when the computers to be connected to each
other are at widely separated locations a local area network cannot be used.
• A wide area network (WAN) must be installed. The communication between different
users of "WAN" is established using leased telephone lines or satellite links and similar
channels.
• It is cheaper and more efficient to use the phone network for the links.
• Most wide area networks are used for transferring large blocks of data between its
users. As the data is from existing records or files, the exact time taken for this data
transfer is not a critical parameter.
• Another example of WAN is an airline reservation system. Terminals are located all
over the country through which the reservations can be made .
• It is important to note here that all the terminals use the same common data provided
by the central reservation computer.
• Because of the large distances involved in the wide area networks, the propagation
delays and variable signal travel times are major problems.
• Therefore most wide area networks are not used for time critical applications. They are
more suitable for transfer of data from one user to the other which is not a time critical
application. Wide area networks are basically packet switching networks.
• A WAN provides long distance transmission of data, voice image and
video information over large geographical areas that may comprise a country, a
continent or even the whole world.
Data Communication Network (NNK) PRMITR
• WAN contains a collection of machines used for running user (i.e. application)
programs. All the machines called hosts are connected by a communication subnet.
• The function of the subnet is to carry messages from host to host. The subnet consists
of two important components; transmission lines and switching elements.
• Transmission lines move bits from one machine to another. The switching elements
are specialized computers used to connect two or more transmission lines. When data
arrive on an incoming line, the switching element must choose an outgoing line to
forward them.
• The switching elements are either called as packet switching nodes, intermediate
systems, data switching exchanges or routers.
• When a packet is sent from one router to another via one or more intermediate
routers, the packet is received at intermediate router. It is stored in the routers until the
required output line is free and then forwarded. A subnet using this principle is called a
point to point, store-forward or packet switched subnet.
• WAN's may use public, leased or private communication devices, and can spread over
a wide geographical area. A WAN that is wholly owned and used by a single company is
often called as an enterprise network.
• In most WANs the network contains a large number of cables or telephone lines each
one connecting a pair of routers.
Data Communication Network (NNK) PRMITR
• If two routers which are not connected to each other via a cable want to communicate,
then they have to do it indirectly via other routers.
• The LANs have a symmetric topology while WANs have irregular topologies.
• The WAN s can also be formed using satellite or ground radio system. Satellite
networks are inherently broadcast type so they are useful when the broadcast property is
important.
WAN is generally slower in transmission speed. Requesting the same level of speed as
with LAN leads to a substantial increase in communication costs.
The Satellite Bridge can extend LAN across large distances while in case of the WAN, it
spans over a wide geographical area.
LAN still can not accommodate arbitrarily many computers; WAN must be scalable to
long distances and many computers.
1. Cost
2. Reliability
3. Scalability
4. Bandwidth capacity
5. Ease of installation
6. Ease of troubleshooting
7. Delay involved in routing information from one node to another.
Types of Topologies
Data Communication Network (NNK) PRMITR
Star Topology
The physical star Topology uses a central controlling or hub with dedicated legs
pointing in all directions – like points of a star. Each network device has a dedicated
point-to-point link to the central hub. There is no direct link between these computers
and the computers can communicate via central controller only. This strategy prevents
troublesome collisions and keeps the lines of communications open and free of traffic.
The routing function is performed by the central controller which centrally controls
communication between any two computers by establishing a logical path between
them. It means that if one computer A wants to send data to another computer
B, Computer A sends the data to the controller & this controller then sends the data to
computer B.
This Topology, obviously, require a great deal of cabling. This design provides an
excellent platform for reconfiguration and trouble-shooting. Changes to the network
are as simple as plugging another segment into the hub and a break in the LAN is easy to
isolate and doesn't affect the rest of the network.
Advantages of Star Topology
The benefits of star topology are:
1. It is easier to add new node or modify any existing node without disturbing
network i.e. expansion is easier.
2. Addition of new node does not increase communication delay.
Data Communication Network (NNK) PRMITR
3. If any local computer or link fails, the entire system does not collapse. Only that link
or computer is affected.
4. It is easy to find device and cable problems i.e. fault identification and isolation is
easier.
5. Media faults are automatically isolated to the failed segment.
Disadvantages of Star Topology
The disadvantages are considered as follows:
1. If the central controller or hub fails, entire system collapses.
2. Cabling cost is more as each node is connected individually to the hub.
3. Requires more cable than most topologies
4. Moderately difficult to install
Mesh Topology
In mesh topology, each node is connected to every other node in the network i.e. each
node has a dedicated point to point link to every other node as shown. Dedicated means
that the link carries the traffic only between two devices it connects.
In this way there exist multiple paths between two nodes of the network. In case of
failure of one path, the other one can be used.
Advantages of Mesh Topology
1. It is robust as the failure of one node does not collapse the entire system. If one link
fails, the entire system continues to work.
2. There is no traffic congestion problem as dedicated links are being used.
3. Dedicated links ensure faster transmission without any delay.
4. Dedicated links also ensure data privacy and security.
5. Point to point links makes fault identification and isolation easier.
Data Communication Network (NNK) PRMITR
1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard protocols around
standard, acting as a communication which the Internet has developed. It is a
gateway between the network and end user. communication protocol, which allows connection of
hosts over a network.
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP model
is more reliable.
4. OSI model has a separate Presentation 4. TCP/IP does not have a separate Presentation layer
layer and Session layer. or Session layer.
5. OSI is a reference model around which 5. TCP/IP model is, in a way implementation of the
the networks are built. Generally it is used OSI model.
as a guidance tool.
6. Network layer of OSI model provides 6. The Network layer in TCP/IP model provides
both connection oriented and connectionless service.
connectionless service.
Data Communication Network (NNK) PRMITR
7. OSI model has a problem of fitting the 7. TCP/IP model does not fit any protocol
protocols into the model.
8. Protocols are hidden in OSI model and 8. In TCP/IP replacing protocol is not easy.
are easily replaced as the technology
changes.
9. OSI model defines services, interfaces 9. In TCP/IP, services, interfaces and protocols are not
and protocols very clearly and makes clear clearly separated. It is also protocol dependent.
distinction between them. It is protocol
independent.
Example 8.1
As a trivial example, let us use a circuit-switched network to connect eight telephones in a small area.
Communication is through 4-kHz voice channels. We assume that each link uses FDM to connect a maximum
of two voice channels. The bandwidth of each link is then 8 kHz. Figure 8.4 shows the situation. Telephone 1
is connected to telephone 7; 2 to 5; 3 to 8; and 4 to 6. Of course the situation may change when new
connections are made. The switch controls the connections.
Three Phases
The actual communication in a circuit-switched network requires three phases: connection
setup, data transfer, and connection teardown.
Setup Phase
Before the two parties (or multiple parties in a conference call) can communicate, a dedicated
circuit (combination of channels in links) needs to be established. The end systems are normally
connected through dedicated lines to the switches, so connection setup means creating dedicated
channels between the switches. For example, in Figure 8.3, when system A needs to connect to
system M, it sends a setup request that includes the address of system M, to switch I. Switch I
finds a channel between itself and switch IV that can be dedicated for this purpose. Switch I then
sends the request to switch IV, which finds a dedicated channel between itself and switch III.
Switch III informs system M of system A's intention at this time.
In the next step to making a connection, an acknowledgment from system M needs to be sent in
the opposite direction to system A. Only after system A receives this acknowledgment is the
connection established. Note that end-to-end addressing is required for creating a connection
between the two end systems. These can be, for example, the addresses of the computers
assigned by the administrator in a TDM network, or telephone numbers in an FDM network.
Data Transfer Phase
After the establishment of the dedicated circuit (channels), the two parties can transfer data.
Teardown Phase
When one of the parties needs to disconnect, a signal is sent to each switch to release the
resources.
Efficiency
It can be argued that circuit-switched networks are not as efficient as the other two types of
networks because resources are allocated during the entire duration of the connection. These
resources are unavailable to other connections. In a telephone network, people normally
terminate the communication when they have finished their conversation. However, in computer
networks, a computer can be connected to another computer even if there is no activity for a long
time. In this case, allowing resources to be dedicated means that other connections are deprived.
Delay
Although a circuit-switched network normally has low efficiency, the delay in this type of
network is minimal. During data transfer the data are not delayed at each switch; the resources
are allocated for the duration of the connection. Figure 8.6 shows the idea of delay in a circuit-
switched network when only two switches are involved. As Figure 8.6 shows, there is no waiting
time at each switch. The total delay is due to the time needed to create the connection, transfer
data, and disconnect the circuit. The
Data Communication Network (NNK) PRMITR
Unit 2
Process to Process :
latter are beyond the control of and accountability to the former.[nb 5] A positive end-to-
end acknowledgements with infinite retries can obtain arbitrarily high reliability from any
network with a higher than zero probability of successfully transmitting data from one
end to another.[nb 6]
The end-to-end principle does not trivially extend to functions beyond end-to-end error
control and correction. E.g., no straightforward end-to-end arguments can be made for
communication parameters such as latency and throughput.
The basic notion: reliability from unreliable parts[edit]
In the 1960s, Paul Baran and Donald Davies, in their pre-ARPANET elaborations of
networking, made brief comments about reliability that capture the essence of the later
end-to-end principle. To quote from a 1964 Baran paper, "Reliability and raw error rates
are secondary. The network must be built with the expectation of heavy damage anyway.
Powerful error removal methods exist."[9]:5 Similarly, Davies notes on end-to-end error
control, "It is thought that all users of the network will provide themselves with some
kind of error control and that without difficulty this could be made to show up a missing
packet. Because of this, loss of packets, if it is sufficiently rare, can be tolerated."[10]:2.3
The French CYCLADES network was the first to make the hosts responsible for the
reliable delivery of data.
In the following sections data link layer's functions- Error control and Flow control has been
discussed. After that MAC layer is explained. Multiple access protocols are explained in the
MAC layer section.
Flow Control
Flow Control is one important design issue for the Data Link Layer that controls the flow of data
between sender and receiver.
In Communication, there is communication medium between sender and receiver. When Sender
sends data to receiver than there can be problem in below case :
1) Sender sends data at higher rate and receive is too sluggish to support that data rate.
To solve the above problem, FLOW CONTROL is introduced in Data Link Layer. It also
works on several higher layers. The main concept of Flow Control is to
introduce EFFICIENCY in Computer Networks.
Feed back based Flow Control is used in Data Link Layer and Rate based Flow Control is used
in Network Layer.
In Feed back based Flow Control, Until sender receives feedback from the receiver, it will not
send next data.
A. Stop-and-Wait Protocol
Error Control
Network is responsible for transmission of data from one device to another device. The end to
end transfer of data from a transmitting application to a receiving application involves many
steps, each subject to error. With the error control process, we can be confident that the
transmitted and received data are identical. Data can be corrupted during transmission. For
reliable communication, error must be detected and corrected.
Error control is the process of detecting and correcting both the bit level and packet level errors.
Types of Errors
Single Bit Error
The term single bit error means that only one bit of the data unit was changed from 1 to 0 and 0
to 1.
Burst Error
In term burst error means that two or more bits in the data unit were changed. Burst error is also
called packet level error, where errors like packet loss, duplication, reordering.
Error Detection
Error detection is the process of detecting the error during the transmission between the sender
and the receiver.
Types of error detection
Parity checking
Cyclic Redundancy Check (CRC)
Checksum
Data Communication Network (NNK) PRMITR
Unit 3
rates) to different users. The assignment of sub-carriers to users may be changed dynamically,
based on the current radio channel conditions and traffic load.
The time division multiple access (TDMA) channel access scheme is based on the time-division
multiplexing (TDM) scheme, which provides different time-slots to different data-streams (in the
TDMA case to different transmitters) in a cyclically repetitive frame structure. For example,
node 1 may use time slot 1, node 2 time slot 2, etc. until the last transmitter. Then it starts all
over again, in a repetitive pattern, until a connection is ended and that slot becomes free or
assigned to another node. An advanced form is Dynamic TDMA (DTDMA), where a scheduling
may give different time sometimes but some times node 1 may use time slot 1 in first frame and
use another time slot in next frame.
As an example, 2G cellular systems are based on a combination of TDMA and FDMA. Each
frequency channel is divided into eight timeslots, of which seven are used for seven phone calls,
and one for signalling data.
The code division multiple access (CDMA) scheme is based on spread spectrum, meaning that a
wider radio spectrum in Hertz is used than the data rate of each of the transferred bit streams, and
several message signals are transferred simultaneously over the same carrier frequency, utilizing
different spreading codes. The wide bandwidth makes it possible to send with a very poor signal-
to-noise ratio of much less than 1 (less than 0 dB) according to the Shannon-Heartly formula,
meaning that the transmission power can be reduced to a level below the level of the noise and
co-channel interference (cross talk) from other message signals sharing the same frequency.
One form is direct sequence spread spectrum (DS-CDMA), used for example in 3G cell phone
systems. Each information bit (or each symbol) is represented by a long code sequence of several
pulses, called chips. The sequence is the spreading code, and each message signal (for example
each phone call) uses a different spreading code.
Data Communication Network (NNK) PRMITR
Another form is frequency-hopping (FH-CDMA), where the channel frequency is changing very
rapidly according to a sequence that constitutes the spreading code. As an example,
the Bluetooth communication system is based on a combination of frequency-hopping and either
CSMA/CA statistical time division multiplexing communication (for data communication
applications) or TDMA (for audio transmission). All nodes belonging to the same user (to the
same virtual private area network or piconet) use the same frequency hopping sequence
synchronously, meaning that they send on the same frequency channel, but CDMA/CA or
TDMA is used to avoid collisions within the VPAN. Frequency-hopping is used to reduce the
cross-talk and collision probability between nodes in different VPANs.
Subdivisions of FH-CDMA are "fast hopping" where the frequency of hopping is much higher
than the message frequency content and "slow hopping" where the hopping frequency is
comparable to message frequency content. The subdivision is necessary as they are considerably
different.
Numerical: A slotted ALOHA channel has an average 10% of the slots idle.
(Kindly refer Printed notes and Class notes for remaining questions)