Professional Documents
Culture Documents
Network and Data Communication
Network and Data Communication
Table of Contents
COURSE OVERVIEW ................................................................................................................................ 4
Introduction ........................................................................................................................................ 4
Course Aims and Objectives .............................................................................................................. 4
Learning Outcomes ............................................................................................................................ 4
Assignment and Assessment ............................................................................................................. 5
Course Schedule ................................................................................................................................. 5
STUDENT SUPPORT AND ASSISTANCE ................................................................................................... 5
Academic Support .............................................................................................................................. 5
Study guidelines ................................................................................................................................. 5
Unit 1: Communications Systems Fundamentals .................................................................................. 6
1.1 Introduction ................................................................................................................................... 6
1.2 Unit Objectives ............................................................................................................................. 6
1.3 Communication System ............................................................................................................... 7
1.4 Modulation / Demodulation ........................................................................................................ 8
1.5 Computer Networks ................................................................................................................... 10
1.6 Internet ....................................................................................................................................... 11
1.7 Wireless & Mobile Communications ......................................................................................... 12
1.8 Unit 1 Summary .......................................................................................................................... 14
1.9 Unit 1 Activities .......................................................................................................................... 15
Unit 2: Network Topologies ................................................................................................................. 16
2.1 Introduction ................................................................................................................................. 16
2.2 Unit Objectives............................................................................................................................. 16
2.3 Network Infrastructure ................................................................................................................ 17
2.4 LAN/PAN/ MAN ............................................................................................................................ 18
2.5 WAN ............................................................................................................................................ 19
2.6 Wireless and Mobile Topologies................................................................................................... 20
2.7 Unit 2 Summary .................................................................................................................... 21
2.8 Unit 2 Activities .......................................................................................................................... 22
Unit 3: Binary Mathematics ................................................................................................................. 23
3.1 Introduction ................................................................................................................................. 23
3.2 Unit Objectives............................................................................................................................. 23
Page 1 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
COURSE OVERVIEW
Introduction
This module consists of 9 units in the field of network and data communications.
Nowadays everyone using the Internet is de facto connected to a network. In
fact the combination of computer science and traditional telecommunications
has given rise to what is commonly called as ICT. The computerization of the
telecommunication infrastructure has enabled more sophisticated networking
possibilities such as the mobile network communications with the advent of
3G/4G networks and smartphones.
In this module you will learn the basic of communication systems fundamentals
up to more advanced modern technologies such as the VoIP and Fiber Optics.
Learning Outcomes
Upon completion of this course learners should be able to:
Understand the core concepts of computer networking
Design network architecture
Identify network topologies
Plan IP addressing and routing
Set up VoIP networks
Apply the OSI layer model
Grasp wireless and mobile communications fundamentals
Become acquainted with optical fibre networks
Page 4 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Course Schedule
The course comprises 5 face to face sessions of duration 2 hours each, normally
on Saturdays’ afternoon, however learners are encouraged to use the electronic
means to communicate with their lecturer.
Study guidelines
This course holds 4 credits, an equivalent of 48 hours of effective learning if you
spend 4 hours weekly on the manual during 12 weeks.
Learners are advised to:
Read the units topics completely before attempting the activities
Seek to meet the learning outcomes
Spend some extra reading time with the recommended textbooks
Prepare your questions for the face to face sessions
Collaborate and share with your peers online and in the classroom
Page 5 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 6 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
1
Fundamentals of Communications Systems by Michael P.Fitz Chapter 1
Page 7 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
(a) (b)
2
Modulation for Analog Communication, Yao Wang, Polytech University, Brooklyn
3
Modulation for Analog Communication, Yao Wang, Polytech University, Brooklyn
Page 8 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 9 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
this technology led to the famous Integrated Digital Services Network (ISDN)
known for videoconferencing.
Peer to Peer: 2 computers communicating with equal status, for instance 2 PCs
with a direct RJ45 cable without a server.
Page 10 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Wireless Networks: short range transmission for WLANs and Wi-Fi, long range
for mobile cellular networks and satellite communications.
Virtual Networks: VLANs and VPNs (Virtual Private Networks) enforced with
tunnelling for security purpose, common in enterprise networks.
1.6 Internet
Computer networks gained momentum with the Client/Server paradigm. With
mainframes, networking was on a limited enterprise scale but with digital
networks like ISDN computers were at the back end of telephony networks. Data
and electronic transfers with the X.25 protocol was the beginning what would
be later the Internet. The precursors to the Internet were Minitel in France and
Prestel in U.K. At the beginning the network was known as ARPANET owned by
the military, the philosophy being that even part of the network is damaged or
bombarded, they would be able to communicate. The search for reliability,
resiliency and fault tolerance was their primary concern. Two major emerging
technologies boosted the used of Internet, firstly the invention of the TCP/IP
protocol suite at Berkeley University and secondly the creation of the www by
CERN scientists in Switzerland namely Time Berners Lee for dissemination of
research findings.
Internet Governance
Internet is the best example of a distributed network. The Internet Country Code
Top Level Domain Name (ccTLD, for Mauritius it is .mu) is governed worldwide
by ICANN (Internet Corporation for Assigned Names and Numbers) and the
IANA ((Internet Assigned Numbers Authority). Afrinic is the Regional Internet
Page 11 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Registry (RIR) responsible for IP addresses, with its head office currently in the
cyber city in Mauritius.
Future Trends
There is a saying that the Internet was the biggest invention after the television.
Well the television has not been exploited as much as the Internet in a very short
span of time. Internet 2.0: This is a special network with immense bandwidth
for research interconnecting universities in the USA, also present in South Korea
and Japan. For instance if you to put a music class on the Internet or the satellite
animated images for cyclones the current Internet will fail, thus Internet 2.0,
which is not an international network. Web 2.0: not to confuse with Internet
2.0, innovations are mostly on light weight programming. Examples are Mashup
and social networks. All IP Networks: IP is the common denominator for
heterogeneous networks including mobile networks. Internet of Things (IoT):
involves the interconnection of objects (human, object and animals) on the
Internet, boosted by IPv6, present in home automation and M2M
communications.
Page 12 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
disaster situations. Cellular networks use the MAC (Mediums Access Control, Ex:
TDMA & CDMA) schemes to allow multiple users to make call simultaneously in
a cell.
4
Mobile Communications by Schiller, Pg 168
Page 13 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
TCP/IP , the OSI model and network operating system have boosted up
computer networking
Fixed and Wireless LANs use unlicensed frequencies and 802.11 standard.
Smartphones and tablets are more and more used to access the Internet
and allow mobile and pervasive computing
SDN and NFV are cost effective emerging technologies for network
operators and administrators
Page 14 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
7. What is the main difference between a dial-up network and a VoIP network?
Page 15 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 16 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Let us now study the network topologies portrayed in figure 2.3.15 below:
Figure 2.3.1
For the mesh network, we can derive the formula for the number of nodes (n)
and links.
5
Data & Communications Networking by Forouzan
Page 17 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
LAN/HyperLAN/MAN: LANs are local area networks using unlicensed band and
802.11x standard whereas MAN are metropolitan area networks meant for
cities and towns. You do have WLAN, WPAN and WMAN. HyperLAN are special
types of LAN that guarantees QoS and allows faster rate. HyperLANs are
categorized into HyperLAN1, HyperLAN2, HyperLAN3 and HyperLAN46.
Personal Area Network (PAN): a PAN is not new, you will recall the SOHO (Small
Office Home Office) network. But with the advent of Wi-Fi zones with WAPs,
home users can design and personalize small residential networks. You have
probably encountered sharing Internet or cable network for movies in a
residential area. However, there are legal issues that you need to respect when
building a PAN.
Smart Homes & Buildings: these are modern intelligent homes and buildings
making use of emerging technologies like IPv6, IoT (Internet of Things) and
mobile communications to provide a wide range of services like remote security
and comfort to users. For example you can switch on or off your washing
machine remotely or monitor your rooms with a smartphone.
Controller Area Network (CAN): it is a serial bus system, which was originally
developed for automotive applications in the early 1980s7. These networks are
principally found in embedded systems. Your barking system for instance is
controlled with a CAN. Controllers are actually microprocessors but with
dedicated controller functions.
6
Mobile Communications by J. Schiller
7
www.can-cia.org › Home › System design › Technology
8
http://en.wikipedia.org/wiki/Near_field_communication
Page 18 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
2.5 WAN
At the outset Data on Voice in wide area computer networks was rendered
possible using modems and ISDN. Progressively we have witnessed Voice over
Frame Relay, Internet, ATM, etc. WANs have evolved from traditional telephone
networks to the Internet combined with emerging technologies like VoIP, IoT
and M2M. Figure 2.5.1 portrays large scale system architecture of a banking
system.
WLANs/ Wi-Fi: Wireless LANs as fixed LANs make use of the IEEE 802.11x
protocol and transmit in the range of unlicensed band 2.4 GHz UHF and 5 GHz
SHF radio waves. Wireless Access Points (WAPs) and hotspots are the key
components of a WLAN and Wireless Fidelity (Wi-Fi) for Internet connectivity.
Some WAPs have advanced routing capabilities and security features like the
Wired Encryption Privacy (WEP) keys or more secure ones like the Wi-Fi
Protected Access Pre-Shared Key (WPA PSK) or WPA2 PSK, the latter to being
more difficult to crack.
Cellular Network: a cellular network is characterized by the geographical
representations of urban and rural areas into cells generally of hexagonal
shapes. A cell comprise a base station (BS) with a Home Registry and Antennas.
The base station is important for handing over between one cell to another
based on the signal to noise ratio. Many base stations are connected to a
switching that does billing and interconnection with other regions or countries.
MANETs & VANETs /Sensor Networks: Mobile Ad hoc Networks differ from
fixed infrastructure network in the way packets are routed and connectivity and
services take place. Thus a MANET uses dynamic routing algorithms namely
Dynamic Source Routing (DSR), Temporary Ordered Routing Algorithm (TORA)
and Ad Hoc On-demand Distance Vector (AODV). Vehicular Ad hoc Network
(VANET) is an Ad hoc network on transport systems like Car to Car (C2C). Sensor
networks are networks that route packets according to energy levels of the
nodes or physical parameters like temperature, pressure, etc.
Other Wireless Networks: there exist a number of non-cellular networks like the
Citizen Band (CB) commonly used by heavy weight lorries’ drivers on long
distance travel, Radio Amateur networks , direct mode terrestrial networks
(TETRA) useful in disaster recovery management, satellite communication, the
latter is covered in unit 1.
Page 20 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Hybrid topologies are the ones combining two or more topologies, for
example bus and ring topologies.
Cellular networks are composed of hexagonal cells with small sizes for
urban regions.
MANETs are mobile ad hoc networks, they differ from fixed network
infrastructure from a routing perspective
Smart homes and smart buildings are emerging Personal Area Networks.
Spectrum allocation for wireless WANs is a major issue for the authority.
Page 21 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
3. Draw a hybrid topology with a star backbone and three ring networks.
4. Draw a hybrid topology with a ring backbone and two bus networks.
10. Explain with the help of examples the difference between wireless and
mobility.
Page 22 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
3.1 Introduction
Number bases have played an influential role in coding and encryption. Numbers
as we write them are currently called Arabic numbers and with the invention of
zero as number, decimal number system appeared. In 1854, British
mathematician George Boole published a landmark paper detailing an algebraic
system of logic that would become known as Boolean algebra. His logical
calculus was to become instrumental in the design of digital electronic
circuitry.10One for the on state and zero for the off state. With the advent of
transistors and electronic semiconductor components, more sophisticated
computers arrive on the market. So this unit is different from the others in the
sense it’s more about the foundation of data communication. You will
appreciate the use of binary digits and hexadecimal notations for computing
data. You might wonder why it’s worth studying binary digits when applications
and networking problems are mostly solved at the application level. You will
surely grasp its significance as you go through this unit.
10
Understanding Binary Numbers Slide 7
Page 23 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Figure 3.3.1 Model K, The first Relay Based Computer to use Binary
Numbers (1937)12
Why do we need to know about Binary?
• It is the building block of all data
• In order to understand storage capacity and sizes, you need to know
how data is read and saved
• The data is fragile, each digit is need to be whole
Binary system has enabled the design of logic gates such as OR, AND, Inverter
gates by representing on state by a “1” and off state by “0”. Thus more complex
digital circuits with transistors representing advanced computational functions
were made possible. As a matter of fact a computer understands only binary
language. Hence the need for digital modulation demodulation and transmission
is required for telecommunications using computers at the ends. For memory
addresses hexadecimal notation is commonly used. The next section deals with
hexadecimal number system and section after you will learn some conversion
techniques from one number base system to another.
11
Understanding Binary Numbers Slide 10
12
Understanding Binary Numbers Slide 11
Page 24 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
0 0 0000
1 1 0001
2 2 0010
3 3 0011
4 4 0100
5 5 0101
6 6 0110
7 7 0111
8 8 1000
9 9 1001
A 10 1010
B 11 1011
C 12 1100
D 13 1101
E 14 1110
F 15 1111
To change this number to base 10, multiply each placeholder by the amount its
location represents and add: (5 x 4096) + (3 x 512) + (7 x 64) + (0 x 8) + (1 x 1) =
20,480 + 1536 + 448 + 0 + 1 = 22,46510
HEXADECIMAL
Page 25 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
1. From Binary to Octal – Count off from right to left by three and translate each
triad into base 10. These digits will be the base-8 symbols to express this binary
number in octal.
2. From Binary to Hexadecimal - Count off from right to left by four and translate
each quad into base 10. These digits will be the base-16 symbols to express this
binary number in hexadecimal.
Example:
0x94D3 = 1001 0100 1101 0011 = 215 + 212 + 210 + 27 + 26 + 24 + 21 +20
Page 26 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 27 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
11. What was the role of Boolean algebra on computer data communication?
12. Packets over a network are made of binary digits, what is the tool to visualize
these packets in a wireless network? Give one example of such a tool.
Page 28 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
4.1 Introduction
The paradigm shift from circuit switching to packet switching and the advent of
IP networks are driving traditional networks towards All-IP networks also called
as 4G in mobile communications. Routing and switching are the two most
popular network functions in a network. Routers and Switches are hardware
components that work like a computer with and operating system and a user
interface for programming and configuring the settings. As these components
are often at the border or entry point of enterprise networks, they must be
properly set to avoid security and efficiency problems. In an IP network, packets
are transmitted from one node to another. These packets contain source and
destination addresses, the data payload, the transport protocol (TCP/UDP), etc.
Thus it is important to understand how IP addresses are organized and assigned.
IPv4 addresses are near to depletion, so most network operators have upgraded
their core networks to support IPv6 packets. However, many enterprise
networks and access networks are still on IPv4, hence transition schemes from
IPv4 to IPv6 is also tackled in this unit.
Page 29 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
13
Network Fundamentals by Forouzan Pg 54
Page 30 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Figure 4.3.2
Figure 4.3.3
The Internet Corporation for Assigned Named and Numbers (ICANN) is the
private non-profit corporation with responsibility for IP address space
allocation, protocol parameter assignment, domain name system management,
and root server system management functions. Afrinic is the regional registry
for IP addresses, their head office is located in Ebene, Mauritius.
4.4 CIDR
A class B address is far too large for most organizations and a class C network,
with 256 addresses is too small. This leads to granting Class B address to
organizations who do not require all the address in the address space wasting
most of it. This is resulting in depletion of Address space. A solution is CIDR
(Classless InterDomain Routing) The basic idea behind CIDR, is to allocate the
Page 31 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 32 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
14
Page 33 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Static routing manually sets up the optimal paths between the source and the
destination computers. On the other hand, the dynamic routing uses dynamic
protocols to update the routing table and to find the optimal path between the
source and the destination computers.
The routers that use the static routing algorithm do not have any controlling
mechanism if any faults in the routing paths. These routers do not sense the
faulty computers encountered while finding the path between two computers or
routers in a network. The dynamic routing algorithms are used in the dynamic
routers and these routers can sense a faulty router in the network. Also, the
dynamic router eliminates the faulty router and finds out another possible
optimal path from the source to the destination. If any router is down or faulty
due to certain reasons, this fault is circulated in the entire network. Due to this
quality of the dynamic routers, they are also called adaptive routers. The static
routing is suitable for very small networks and they cannot be used in large
networks. As against this, dynamic routing is used for larger networks. The
manual routing has no specific routing algorithm. The dynamic routers are based
on various routing algorithms like OSPF (Open Shortest Path First), IGRP (Interior
Gateway Routing Protocol) and RIP (Routing Information Protocol)15.
4.7 Subnetting
It allows a network to be split into several parts for internal use but still act like
a single network to the outside world. To implement subnetting, the router
needs a subnet mask that indicates the split between network + subnet number
and host. Ex. 255.255.252.0/22. A‖/22‖ to indicate that the subnet mask is 22
bits long.
A subnet mask is defined for each IP address. The subnet mask identifies which
portion of the 4 octets is used to identify the data link, with the remaining bits
identifying the node. If you want no subnetting, use these default masks (255 −
strictly follow number, 0 − wildcard):
Class A: 255.0.0.0
15
https://sites.google.com/site/assignmentssolved/mca/semester6/mc0087/10
Page 34 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Class B: 255.255.0.0
Class C: 255.255.255.0
Let's use these two addresses for some examples: 171.68.3.3 and 171.68.2.3. If
the subnet mask is 255.255.255.0, the first 24 bits are masked, so the router
compares the first 3 octets of the two addresses. Since the masked bits are not
the same, the router knows that these addresses belong to different subnets.
Figure 4.7.3
The network address is the beginning address of each block. It can be found by
applying the default mask to any of the addresses in the block (including itself).
Page 35 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
It retains the netid of the block and sets the hostid to zero. We must not apply
the default mask of one class to an address belonging to another class.
Short-Cut Method
** If the byte in the mask is 255, copy the byte in the address.
** If the byte in the mask is 0, replace the byte in the address with 0.
** If the byte in the mask is neither 255 nor 0, we write the mask and the address
in binary and apply the AND operation.
What is the subnetwork address if the destination address is 19.30.80.5 and the
mask is 255.255.192.0?
Page 36 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
2. The second group has 128 customers; each needs 128 addresses.
3. The third group has 128 customers; each needs 64 addresses.
Design the subblocks and give the slash notation for each subblock. Find out
how many addresses are still available after these allocations.
Group 1
For this group, each customer needs 256 addresses. This means the suffix
length is 8 (28 = 256). The prefix length is then 32 - 8 = 24.
01: 190.100.0.0/24 190.100.0.255/24
02: 190.100.1.0/24 190.100.1.255/24
…………………………………..
64: 190.100.63.0/24190.100.63.255/24
Total = 64 256 = 16,384
Group 2
For this group, each customer needs 128 addresses. This means the suffix
length is 7 (27 = 128). The prefix length is then 32 - 7 = 25. The addresses are:
001: 190.100.64.0/25 190.100.64.127/25
002: 190.100.64.128/25 190.100.64.255/25
003: 190.100.127.128/25 190.100.127.255/25
Total = 128 128 = 16,384
Group 3
For this group, each customer needs 64 addresses. This means the suffix length
is 6 (26 = 64). The prefix length is then 32 - 6 = 26.
001:190.100.128.0/26 190.100.128.63/26
002:190.100.128.64/26 190.100.128.127/26
…………………………
Page 37 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
128:190.100.159.192/26 190.100.159.255/26
Total = 128 64 = 8,192
Number of granted addresses: 65,536
Number of allocated addresses: 40,960
Number of available addresses: 24,576
4.8 Supernetting
Figure 4.8.1
Rules:
** The number of blocks must be a power of 2 (1, 2, 4, 8, 16, . . .).
** The blocks must be contiguous in the address space (no gaps between the
blocks).
** The third byte of the first address in the superblock must be evenly divisible
by the number of blocks. In other words, if the number of blocks is N, the third
byte must be divisible by N.
Page 38 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
A company needs 600 addresses. Which of the following set of class C blocks
can be used to form a supernet for this company?
198.47.32.0 198.47.33.0 198.47.34.0
198.47.32.0 198.47.42.0 198.47.52.0 198.47.62.0
198.47.31.0 198.47.32.0 198.47.33.0 198.47.52.0
198.47.32.0 198.47.33.0 198.47.34.0 198.47.35.0
1: No, there are only three blocks.
2: No, the blocks are not contiguous.
3: No, 31 in the first block is not divisible by 4.
4: Yes, all three requirements are fulfilled.
In subnetting, we need the first address of the subnet and the subnet mask to
define the range of addresses. In supernetting, we need the first address of the
supernet and the supernet mask to define the range of addresses.
4.9 Switching
Page 39 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Figure 4.9.1
space for IPv6 is 2128 = 3.4×1038 addresses, or more than 7.9×1028 times as many
as IPv4. IPv6, IP version 6 was designed to counter the depletion of IPv4
addresses but also has new features in areas like, security, global addressing,
auto configuration, any-casting, DHCP, address resolution, ICMP, etc.
Global Addresses:
Addresses are assigned to interfaces
Change from IPv4 mode:
_ Interface “expected” to have multiple addresses
_ Addresses have scope
Link Local
Unique Local
Global
_ Addresses have lifetime Valid and preferred lifetime
Page 41 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Auto configuration:
An important feature of IPv6 is that it allows plug and play option to the network
devices by allowing them to configure themselves independently. It is possible
to plug a node into an IPv6 network without requiring any human intervention.
This feature was critical to allow network connectivity to an increasing number
of mobile devices.
IPv6 offers two types of auto-configuration: Stateful auto configuration and
stateless auto configuration. Stateful auto-configuration: This configuration
requires some human intervention as it makes use of the Dynamic Host
Configuration Protocol for IPv6 (DHCPv6) for installation and administration of
nodes over a network. The DHCPv6 server maintains a list of nodes and the
information about their state to know the availability of each IP address from
the range specified by the network administrator.
DHCPv6:
The Dynamic Host Configuration Protocol (DHCP) facilitates the addition of new
machines in a network. Around October 1993, DHCP began to take shape as a
standard network protocol. The protocol allows the network devices to obtain
the different parameters that are required by the clients to operate in an
Internet Protocol (IP) network. The DHCP protocol significantly reduces the
system administration workload as the network devices can be added to the
network with little or no change in the device configuration. DHCP also allows
network parameter assignment at a single DHCP server or a group of such server
located across the network. The dynamic host configuration is made possible
with the automatic assignment of IP addresses, default gateway, subnet masks
and other IP parameters. On connecting to a network, a DHCP configured node
sends a broadcast query to the DHCP server requesting for necessary
information. Upon receipt of a valid request, the DHCP server assigns an IP
address from its pool of IP addresses and other TCP/IP configuration parameters
such as the default gateway and subnet mask. The broadcast query is initiated
just after booting and must be completed before the client initiates IP-based
Page 42 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
ICMPv6:
Internet Control Message Protocol version 6 is the implementation of the
Internet Control Message Protocol for Internet Protocol version 6 defined in RFC
4443. ICMPv6 is an integral part of IPv6 and performs error reporting and
diagnostic functions, and has a framework for extensions to implement future
changes.
Unicast: A unicast address identifies a single interface within the scope of the
type of unicast address. With the appropriate unicast routing topology, packets
addressed to a unicast address are delivered to a single interface. To
accommodate load-balancing systems, allows multiple interfaces to use the
same address as long as they appear as a single interface to the IPv6
implementation on the host.
16
Wikipedia
Page 43 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
17
Diamond IP
Page 45 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Class A was designed for large organizations with many hosts, Class B for
midsize organizations and Class C for small organizations. Class D was
designed for multicast and E for research and future use.
Classless Inter Domain Routing (CIDR) shows the mask with a / notation.
There are 3 techniques for IPv4 to IPv6 transition schemes namely Dual
Stack, Tunneling and Packet Translation.
Page 46 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
5. Explain the IPv4 – IPv6 transition schemes. At which stage each scheme
appropriate?
10. Describe the role of a NAT router, why is the NAT irrelevant in IPv6?
11. In case of mobile nodes what is the burden on the routing tables?
12. State one example of routing based of energy levels of the nodes.
Page 47 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
5.1 Introduction
The Open System Interconnection (OSI) model is a layered model developed in
the 70’s by the International Standards Organization (ISO) in Geneva. The idea
was to lay down a standard so that any hardware can interconnect thus
communicate with each other. The analogy is from 2 persons looking at each
other and talking. The senses (mouth, nose, eyes, ears and touch) can modeled
in form of layers one above the other. In the same way two computers
communicating in a peer to peer set up send the data though a physical layer up
to an application layer. In this unit you will first learn about the 7 layered model,
then a 4 layered model. The layer model applies also to wireless networks and
architectures different from the peer to peer. For instance client/server
architecture and WANs too network according to the layered model. Thus, you
must be able to situate the different hardware like routers and switches within
the OSI model. However, you will easily guess that different protocols would be
required at different layers, this part is not within the scope of this unit but
undertaken in unit 8.
Page 48 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Layer 6—Presentation layer: Negotiates data transfer syntax for the application
layer and performs translations between different data formats, if necessary.
For example, this layer can translate the coding that represents the data when
communicating with a remote system made by a different vendor.
18
Forouzan
Page 49 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
interference, the session layer functions will suspend communications until the
interference goes away.
Layer 3—Network layer: Provides the routing of packets though a network from
source to destination. This routing ensures that data packets are sent in a
direction that leads to a particular destination. Protocols such as Internet
Protocol (IP) operate at this layer.
Layer 2—Data link layer: Ensures medium access, as well as synchronization and
error control between two entities. With wireless networks, this often involves
coordination of access to the common air medium and recovery from errors that
might occur in the data as it propagates from source to destination. Most
wireless network types have a common method of performing data link layer
functions independent of the actual means of transmission.
19
Forouzan Data Communications & Networking 2nd Ed. Ch2 Network Models
Page 50 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The TCP/IP 4 layer model mapped with the OSI 7 layer model is depicted in figure
5.4.1. This topic is further detailed in section 6.3 in unit 6.
The basic construction of WAP architecture can be explained using the following
model. The order of the independent levels – which are a hierarchy - has the
advantage that the system is very flexible and can be scaled up or down. Because
of the different levels – or stacks - this is called the "WAP Stack", which is divided
into 5 different levels.
20
Mobile Communications by J. Schiller
Page 51 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The main tasks of the physical layer comprise channel coding and error
detection/correction, which is directly combined with the coding mechanisms.
Channel coding makes extensive use of different forward error correction (FEC)
schemes. FEC adds redundancy to user data, allowing for the detection and
correction of selected errors. The power of an FEC scheme depends on the
amount of redundancy, coding algorithm and further interleaving of data to
minimize the effects of burst errors. The FEC is also the reason why error
detection and correction occurs in layer one and not in layer two as in the ISO/OSI
reference model. The GSM physical layer tries to correct errors, but it does not
deliver erroneous data to the higher layer.
SNA has many similarities with the OSI 7 layers reference model as shown in
figure 5.6.1. However, the SNA model has only six layers and it does not define
specific protocols for its physical control layer. The physical control layer is
assumed to be implemented via other standards. The functions of each SNA
component are described as follows:
21
Network Protocols Handbook, Javvin Technologies, Inc., Page 8
22
Network Protocols Handbook, www.javvin.com, Page 8
Page 52 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
In SNA networks, programs that exchange information across the SNA network
are called transaction programs (TPs). Communication between a TP and the
SNA network occurs through network accessible units or NAUs (formerly called
“network addressable units”), which are unique network resources that can be
accessed (through unique local addresses) by other network resources. There
are three types of NAU: Physical Unit, Logic Units and Control Points.
Communication between Transaction Programs (TP) and Logic
Units (LU) is shown in figure 5.6.2.23
23
Network Protocols Handbook, Javvin Technologies Inc.
Page 53 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The OSI model consists of 7 layers that can be memorized with “All People
Seem To Need Data Processing”.
The upper layers (5, 6, 7) deal with applications whereas the lower layers
(1, 2, 3, 4) deal with data transport.
IBM SNA is a 6 layered model namely: Data Link Control, Path Control,
Transmission Control, Data Flow Control, Presentation Services, and
Transaction Services.
Page 54 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
2. Give an example of a layered model other than for computer networks. Use
a diagram to explain your answer.
7. Describe the 4 types of addresses used in TCP/IP: Physical, Logical, Port, and
Specific.
9. Using diagram show how wireless protocols are mapped onto the TCP/IP
model.
10. Using diagram show how wireless protocols are mapped onto the OSI model.
Page 55 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
6.1 Introduction
Protocols are inherent to computer networks. They exist at the 7 layers of the
OSI model. Fortunately protocols are something that all networks agree upon,
else we need gateways to convert on protocol to another. As a matter of fact in
you with connect a Packet Switched Network (PSN) to a Circuit Switched
Network (CSS) you must place a gateway in between. Gateways, middleware,
APIs are everywhere to ensure smooth communication. You must be familiar
with the famous TCP/IP suite or protocol stack, the latter meaning that within
one layer or one protocol you may have a number of protocols. TCP/IP like
sockets were invented at the Berkeley University in the USA. There is no license
or copyright in using in these protocols. In this unit we are focusing on network
and transport protocols, nevertheless you will see also protocols at the other
layers like application, session, presentation, data link and physical.
Page 56 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 57 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
II. It divides the data it receives from the upper layer into segments and tags a
sequence number to each segment which is used at the receiving end for
reordering of data.
III. It simply adds port address, checksum and length information to the data it
receives from the upper layer.
Page 58 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
6.4 Application
BOOTP: Bootstrap Protocol
DCAP: Data Link Switching Client Access Protocol
DHCP: Dynamic Host Configuration Protocol
DNS: Domain Name Systems
FTP: File Transfer Protocol
Finger: User Information Protocol
HTTP: Hypertext Transfer Protocol
S-HTTP: Secure Hypertext Transfer Protocol (S-HTTP)
IMAP & IMAP4: Internet Message Access Protocol
IPDC: IP Device Control
IRCP (IRC): Internet Relay Chat Protocol
LDAP: Lightweighted Directory Access Protocol
MIME (S-MIME): Multipurpose Internet Mail Extensions (Secure
MIME)
NAT: Network Address Translation
NNTP: Network News Transfer Protocol
NTP: Network Time Protocol
POP & POP3: Post Office Protocol (version 3)
RLOGIN: Remote Login in Unix
RMON: Remote Monitoring MIBs in SNMP
SLP: Service Location Protocol
SMTP: Simple Mail Transfer Protocol
SNMP: Simple Network Management Protocol
SNTP: Simple Network Time Protocol
TELNET: TCP/IP Terminal Emulation Protocol
TFTP: Trivial File Transfer Protocol
URL: Uniform Resource Locator
X-Window: X Window or X Protocol or X System
6.5 Presentation
LPP: Lightweight Presentation Protocol
6.6 Session
RPC: Remote Procedure Call protocol
RMI: exclusively in Java
Page 59 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
6.7 Transport
ITOT: ISO Transport over TCP/IP
RDP: Reliable Data Protocol
RUDP: Reliable UDP
TALI: Transport Adapter Layer Interface
TCP: Transmission Control Protocol
UDP: User Datagram Protocol
Compressed TCP
6.8 Network
Routing
BGP/BGP4: Border Gateway Protocol
EGP: Exterior Gateway Protocol
IP: Internet Protocol
IPv6: Internet Protocol version 6
ICMP/ICMPv6: Internet Control Message Protocol
IRDP: ICMP Router Discovery Protocol
Mobile IP: IP Mobility Support Protocol for IPv4 & IPv6
NARP: NBMA Address Resolution Protocol
NHRP: Next Hop Resolution Protocol
OSPF: Open Shortest Path First
RIP (RIP2): Routing Information Protocol
RIPng: RIP for IPv6
RSVP: Resource ReSerVation Protocol
VRRP: Virtual Router Redundancy Protocol
Multicast
BGMP: Border Gateway Multicast Protocol
DVMRP: Distance Vector Multicast Routing Protocol
IGMP: Internet Group Management Protocol
MARS: Multicast Address Resolution Server
MBGP: Multiprotocol BGP
MOSPF: Multicast OSPF
MSDP: Multicast Source Discovery Protocol
MZAP: Multicast-Scope Zone Announcement Protocol
PGM: Pragmatic General Multicast Protocol
PIM-DM: Protocol Independent Multicast - Dense Mode
PIM-SM: Protocol Independent Multicast - Sparse Mode
Page 60 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
MPLS Protocols
MPLS: Multi-Protocol Label Switching
CR-LDP: Constraint-Based Label Distribution Protocol
LDP: Label Distribution Protocol
RSVP-TE: Resource ReSerVation Protocol-Traffic Engineering
6.9 Data Link
Page 61 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The TCP/IP protocol suite has 4 layers namely: Host to Network Layer,
Internet Layer, Transport Layer and Application Layer.
Examples of Application Layer protocols are HTTP, SMTP, DNS, and FTP.
Routing, Multicast and MPLS form part of the Network Layer protocols.
Remote Procedure Call, SIP and SDP (VoIP) are Session Layer Protocols.
In OSI model the physical Layer and Data Link Layer are mapped onto the
Host to Network (also referred as Network to Access) Layer in the TCP/IP
protocol suite.
Page 62 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
1. Use a diagram to illustrate the mapping of the OSI model and the TCP/IP
protocol suite model.
8. Explain the IPv6 changes brought to the Host to Network and Network Layers
protocols under IPv4.
Page 63 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
7.1 Introduction
In the previous unit data was brought down to its physical form in terms of bits
and bytes, subsequently into electric signals for transmission. One step above,
we need to represent the data that is text, alphabets, sound, video, images, etc.
into bits and bytes. For example if we type the letter “A” on the keyboard, that
letter should be represented by some bits that will be interpreted by the
circuitry and the operating system to finally display the shape A in my text editor
for instance. For alphabets and numbers, most computers and networks use the
ASCII code. In this unit you will see the different coding techniques including
source coding and channel coding. Non Return to Zero (NRZ) and Return to Zero
(RZ) codes are likewise covered. Audio and video coding commonly called as
CODEC is dealt with in the next unit on VoIP technologies. Coding techniques are
today the core of security measures. The level of math and abstraction is high,
you will learn more in the third year of your programme.
Page 64 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The ASCII code is an example of fixed-length code, because each of the code word
is of the same length (7 bits). However, in the view of efficient communication,
the occurrence of ‘Z’ is not as often as that of ‘e’ and ‘a’. If there is a way of
encoding information such that the alphabets with higher probability of
occurrence are assigned with shorter code words, and longer for the other letters
24
http://en.wikipedia.org/wiki/Coding_theory#Definition
Page 65 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
which seldom come out, then on the whole it may be able to conserve the
number of bits to be sent to the channel while sending the same information.
This is what the variable length code can do.
Channel coding is about error correction to ensure robust and accurate data
transmission. One technique is to add an extra bit usually called the checksum
in order to verify the data integrity. Forward Error Correction (FEC) is a common
channel coding scheme. FEC is a technique used for controlling errors in data
transmission over unreliable or noisy communication channels. The central idea
is the sender encodes his message in a redundant way by using an error-
correcting code (ECC).
The redundancy allows the receiver to detect a limited number of errors that may
occur anywhere in the message, and often to correct these errors without
retransmission. FEC gives the receiver the ability to correct errors without
needing a reverse channel to request retransmission of data, but at the cost of a
fixed, higher forward channel bandwidth. FEC is therefore applied in situations
where retransmissions are costly or impossible, such as one-way communication
links and when transmitting to multiple receivers in multicast. FEC information is
usually added to mass storage devices to enable recovery of corrupted data, and
is widely used in modems.25 Channel coding consists of Block Codes and
Convolutional Codes.
25
http://en.wikipedia.org/wiki/Forward_error_correction
Page 66 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Data representation
ASCII : this is ANSI’s (American National Standard Institute)
7-bit American Standard Code for Information Interchange
• ASCII code(7-bit) is often used with an 8th bit known as parity bit used for
detecting errors during Data Transmission
• Parity bit is added to the Most Significant bit (MSB)
The name ASCII is an acronym for: American Standard Code for Information
Interchange. It is a character encoding standard developed several decades ago
to provide a standard way for digital machines to encode characters. The ASCII
code provides a mechanism for encoding alphabetic characters, numeric digits,
and punctuation marks for use in representing text and numbers written using
the Roman alphabet. As originally designed, it was a seven bit code. The seven
bits allow the representation of 128 unique characters.
All of the alphabet, numeric digits and standard English punctuation marks are
encoded. The ASCII standard was later extended to an eight bit code (which
allows 256 unique code patterns) and various additional symbols were added,
including characters with diacritical marks (such as accents) used in European
languages, which don’t appear in English.
Notice also on the ASCII code chart that the numeric characters are in the range
30h-39h. Conversion between an ASCII encoded digit and an unpacked BCD
(Binary Coded Decimal- 4 bits) digit can be accomplished by adding or
subtracting 30h. Subtract 30h from an ASCII digit to get BCD, or add 30h to a BCD
digit to get ASCII. Again, as with upper and lower case conversion for alphabetic
characters, it is necessary to ensure that the character is in fact a numeric digit
Page 67 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
before performing the subtraction. The digit characters are in the range 30h-
39h.
26
http://en.wikipedia.org/wiki/EBCDIC
Page 68 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
27
Courtesy ALTTC/NP/KKD/Data Communication
Page 69 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
28
Courtesy ALTTC/NP/KKD/Data Communication
Page 70 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The two types of coding are source coding and channel coding.
Data code is the set of all textual characters or symbols and their
corresponding binary patterns.
The Clock signal should be recovered from the transmitted signal, RZ code
is used for that purpose.
Page 71 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
1. Explain the different ways of converting data to signal and vice versa.
7. What are the different ways of converting analog data to digital data?
8. Define the NRZ codes, give some examples, you may wish use bits signal
representation to illustrate your answer. What has led to RZ codes?
Page 72 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
8.1 Introduction
VoIP pronounced as “Voyp” often referred to as IP telephony has taken
ascendance in computer networking the past decade. You are probably using
Skype and What’s App on your PC and smartphone respectively. Other long
distance call solutions were already present in the 90’s, one example is
net2phone. At that time the sound quality was bad so users preferred the dial
up phone although the price was 5 to 8 times more. Today, VoIP has
considerably improved in terms of quality and security. VoIP is not only about
telephony but comprises multimedia communication such as video streaming,
graphics, etc. The specific features of VoIP like the SIP and CODEC are covered
here. At the beginning you will be introduced with the existing signaling system
and what is the trend towards VoIP. You will have the opportunity to work on
settings of IP Phone in your assignment. Many companies are gearing towards
this technology for telephony solutions as it provides a number of services
almost impossible with the Plain Old Telephone System (POTS).
Page 73 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
8.3 IP Telephony
Traditionally telephony was based on analogue transmission and circuit
switching networks (CSN) commonly known as the Public Switched Telephone
Network (PSTN). When you wish to place a call, you need to dial up, that is to
compose at telephone number each single number corresponding to a tone,
therefore a signal frequency. Once the switching centre establishes a circuit
between the caller and callee through a signalling system (SS7), the
communication line is open. For long telephony was exclusively audio
communication.
• Real Time applications on the Internet
• Telephony
• VoIP
• Teleconference
• IPTV
• Video streaming
• Multicast Audio/Video Conference
Page 74 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Example: For a 32 kbps DVI4 audio conference with 100 participants (5 senders,
95 receivers) with an average packet size 100 bytes. Calculate Ts and Tr.
Page 76 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
8.6 CODECS
Excellent: 5
Good: 4
Fair: 3
Poor: 2
Bad: 1
40 bytes for IP (20 bytes) / User Datagram Protocol (UDP) (8 bytes) / Real-Time
Transport Protocol (RTP) (12 bytes) headers.
6 bytes for Multilink Point-to-Point Protocol (MP) or Frame Relay Forum (FRF).12
Layer 2 (L2) header.
Sample Calculation
For example, the required bandwidth for a G.729 call (8 Kbps codec bit rate)
with cRTP, MP and the default 20 bytes of voice payload is:
Total packet size (bits) = (28 bytes) * 8 bits per byte = 224 bits
Page 77 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Note: 160 bits = 20 bytes (default voice payload) * 8 bits per byte
Bandwidth per call = voice packet size (224 bits) * 50 pps = 11.2 Kbps
MP or w/cRTP Ethernet
Bit Codec Code Voice Voice
FRF.12
rate(kbps) sample sample payload payload MP or (kbps)
CODEC MOS PPS (kbps)
size(B) interval size (B) size(ms) FRF.12
(ms) (kbps)
Table 8.6.1
Page 78 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Codec Based on the codec, this is the number of bits per second that need to be
Bit Rate transmitted to deliver a voice call. (codec bit rate = codec sample size /
(Kbps) codec sample interval).
Codec Based on the codec, this is the number of bytes captured by the Digital
Sample Signal Processor (DSP) at each codec sample interval. For example, the
Size (Bytes) G.729 coder operates on sample intervals of 10 ms, corresponding to 10
bytes (80 bits) per sample at a bit rate of 8 Kbps. (codec bit rate = codec
sample size / codec sample interval).
Codec This is the sample interval at which the codec operates. For example, the
Sample G.729 coder operates on sample intervals of 10 ms, corresponding to 10
Interval (ms) bytes (80 bits) per sample at a bit rate of 8 Kbps. (codec bit rate = codec
sample size / codec sample interval)
MOS MOS is a system of grading the voice quality of telephone connections. With
MOS, a wide range of listeners judge the quality of a voice sample on a scale
of one (bad) to five (excellent). The scores are averaged to provide the MOS
for the codec.
Voice The voice payload size represents the number of bytes (or bits) that are
Payload filled into a packet. The voice payload size must be a multiple of the codec
Size sample size. For example, G.729 packets can use 10, 20, 30, 40, 50, or 60
(Bytes) bytes of voice payload size.
Voice The voice payload size can also be represented in terms of the codec
Payload samples. For example, a G.729 voice payload size of 20 ms (two 10 ms codec
Size samples) represents a voice payload of 20 bytes [ (20 bytes * 8) / (20 ms) =
(ms) 8 Kbps
PPS PPS represents the number of packets that need to be transmitted every
second in order to deliver the codec bit rate. For example, for a G.729 call
with voice payload size per packet of 20 bytes (160 bits), 50 packets need
to be transmitted every second [50 pps = (8 Kbps) / (160 bits per packet) ]
Table 8.6.229
29
Voice Over IP-Per Call Bandwidth Consumption Pg 3,4
Page 79 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The main differences between VoIP and dial up networks are the
signaling protocols and real time transmission.
TCP and UDP are not appropriate for VoIP, RTP and RTCP are preferred.
Audio and video are coded using CODECs starting with “G” for audio and
“H” for video.
Non uniform quantization µ-law for North America, A-law for the other
countries
The Mean Option Score (MOS) is used by the ITU to assess quality of
speech, it ranges from 5 (Excellent) to 1 (Poor)
There are Open Source IP-PBX like Asterisk and Elastic but they are limited
in terms of capacity of users. For thousands of users Cisco Call Manager is
one solution.
Page 80 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
2. What is a signaling protocol in a network? Why SIP is used instead of SS7 for
VoIP networks?
3. Illustrate with the help of a diagram the different entities in a SIP based
network infrastructure.
5. Why are TCP and UDP transport protocols not suited for multimedia
transmission?
Page 81 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
9.1 Introduction
Optical fiber presents very interesting characteristics like immunity to
electromagnetic interference and high channel bandwidth that has propelled its
use as backbone and outbound transmission medium. Moreover we are
witnessing now Fiber To The Cabinet (FTTC) and in some areas Fiber To The
Home (FTTH). On the other hand Optical devices and cables are very expensive,
if you are wearing eyeglasses, you have an idea about the price of a good pair of
spectacles. Light is normally in the visible part of the spectrum with a frequency
higher than microwave but due to its attenuation over long distances in free
space, it is transmitted in glass or plastic cables. In this unit you will learn about
different transmission modes in optical fibers and current corporate solutions.
Just like IPv6, optical fiber is not yet at the level of access networks in many
countries in the African region, Mauritius inclusive, except in some areas where
the optical fiber follows the electricity pillars. This unit is the last one in this
module, you should be having now a global picture of network and data
communications.
Page 82 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
30
Fiber Optics, Technician’s Manual 2nd Edition by Jim Hayes, Ch2 Pg 17
31
Fiber Optics, Technician’s Manual 2nd Edition by Jim Hayes, Ch2 Pg 18
Page 84 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 85 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
Page 86 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
FSO: Free space optics technology (abbreviated as FSO), also referred to as open-
air photonics or optical wireless or infrared broadband, transmits data from
point-to-point and multipoint using low-powered infrared lasers. Unlike
traditional copper wires or fiber-optic technology, which transmits data by light
across glass, FSO uses laser technology to send optical signals through the air
using lenses and mirrors to focus and redirect the beams and send data from one
chip to another. And unlike radio frequencies, FSO technology does not require a
spectrum license. An FSO system uses optical amplifiers and a telescope that
sends multiple wavelengths of light in direct line of sight through the atmosphere
to another telescope waiting to receive the information. The receiving telescope
is connected to a highly sensitive receiver through an optical fiber and a DWDM
demultiplexer. Since the system is bidirectional, each telescope can
32
DPS Telecom, htttp://www.dpstele.com
Page 87 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
simultaneously send and receive information. The only weather condition that
affects an FSO transmission is fog. Fog can corrupt the direct line of sight
between the two telescopes because the moisture particles in the air are so small
and dense that they act as millions of tiny prisms dissipating the band of light
sent from the laser. Free space optics provides a higher bandwidth to the end
user at a faster speed. The photons transmitted by the laser are much quicker
than electrons moving along a wire and they can pass straight through each
other, which charge-bearing electrons cannot do. Because of this, large amounts
of data, such as IP -based voice and video, can be transmitted through a narrow
corridor of space.33
Fibre Distributed Data Interface (FDDI) is a 100 Mbps high-speed LAN standard
that was developed specifically for fibre optics by the ANSI X3T9.5 committee,
and products are readily available. FDDI has a dual counter-rotating ring
topology with dual-attached stations on the backbone that are attached to both
rings, and single-attached stations that are attached to only one of the rings
through a concentrator. It has a token passing media access protocol and a
100Mbit/s data rate. FDDIs dual ring architecture makes it very fault tolerant, as
the loss of a cable or station will not prevent the rest of the network from
operating properly.34
SONET: Synchronous Optical Network, a standard for connecting fiber-optic
transmission systems. SONET was proposed by Bellcore in the middle 1980s and
is now an ANSI standard. SONET defines interface standards at the physical layer
of the OSI seven-layer model. The standard defines a hierarchy of interface rates
that allow data streams at different rates to be multiplexed. SONET establishes
Optical Carrier (OC) levels from 51.8 Mbps (OC-1) to 9.95 Gbps (OC-192). Prior
rate standards used by different countries specified rates that were not
compatible for multiplexing. With the implementation of SONET, communication
carriers throughout the world can interconnect their existing digital carrier and
fiber optic systems.35 SONET is also referred to as SDH (Synchronous Digital
Hierarchy).
33
Webopedia http://www.webopedia.com/TERM/F/free_space_optics.html
34
Fibre Optics Technician’s Manual, 2nd Ed. by Jim Hayes, Pg 35
35
http://www.webopedia.com/TERM/S/SONET.html by Vangie Beal
Page 88 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
The three types of propagation in optical fibers are multimode step index,
multimode graded index and single mode.
Fiber optics connections are quite delicate and fragile and is one of the
causes of leakage or attenuation.
Fiber Space Optic (FSO) is convenient in urban regions but requires line
of sight (LOS).
Page 89 of 90
OUbs017124 - NETWORK AND DATA COMMUNICATIONS
4. A fibre optic data link is made up of 3 components. With the help of a diagram
illustrate these three components.
12. Surely you have observed objects larger, bent and closer in the sea when
looking from outside. Explain this phenomenon.
Page 90 of 90