Professional Documents
Culture Documents
Introduction
1.1
1-1 DATA COMMUNICATIONS
The term telecommunication means communication at a
distance. The word data refers to information presented
in whatever form is agreed upon by the parties creating
and using the data. Data communications are the
exchange of data between two devices via some form of
transmission medium such as a wire cable.
1.2
Figure 1.1 Five components of data communication
1.3
Data Representation
1.4
Data Representation
1.6
1-2 NETWORKS
1.8
Network Criteria
To be considered effective and efficient, a network must
meet a number of criteria.
Performance
Reliability
Security
1.9
Performance
Performance can be measured in many ways, including transit time
and response time. The performance of network depends on a
number of factors.
Number of users : Having a large number of concurrent users can
slow response time in a network not designed to coordinate heavy traffic
loads. In peak load periods the actual number of users can exceed the
average and decrease performance.
Type of transmission medium : The medium defines the speed at
which data can travel through a connection (the data rate). The speed of
light imposes an upper bound on the data rate.
Connected Hardware : The types of hardware included in a network
affect both the speed and capacity of transmission.
Software : The software used to process data at the sender, receiver
and intermediate nodes also affects network performance.
1.10
Reliability
1.11
Security
1.12
Figure 1.3 Types of connections: point-to-point and multipoint
1.13
Figure 1.4 Categories of topology
1.14
Figure 1.5 A fully connected mesh topology (five devices)
1.15
Mesh topology
1.16
Figure 1.6 A star topology connecting four stations
1.17
Star topology
1.18
Figure 1.7 A bus topology connecting three stations
1.19
A bus topology
The bus topology is also known as a linear bus. This is the
simplest and most common method of networking computers. It
consist of a single cable called a trunk that connects all the
computers in the network in the single-line.
Advantages:
Easy to install, Less cabling then mesh star or tree
Disadvantages:
Difficult reconfiguration and fault isolation
A fault or break in the bus cable stop all transmission.
1.20
A bus topology
•The most common access method of the bus topologies
is CSMA (Carrier Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so
that data integrity is maintained, i.e., the packets do not get lost.
There are two alternative ways of handling the problems that occur
when two nodes send the messages simultaneously.
•CSMA CD: CSMA CD (Collision detection) is an access method
used to detect the collision. Once the collision is detected, the
sender will stop transmitting the data. Therefore, it works on
"recovery after the collision".
•CSMA CA: CSMA CA (Collision Avoidance) is an access method
used to avoid the collision by checking whether the transmission
media is busy or not. If busy, then the sender waits until the media
becomes idle. This technique effectively reduces the possibility of
the collision. It does not work on "recovery after the collision".
1.21
Figure 1.8 A ring topology connecting six stations
1.22
Ring topology
1.23
Figure 1.9 A hybrid topology: a star backbone with three bus networks
1.24
Categories of Networks
1.25
Categories of Networks
➢ LANs are designed to allow resources to be shared between personal
computers or workstations. The resources to be shared can include
hardware (e.g., a printer), software (e.g., an application program), or data.
➢ The switched WAN connects the end systems, which usually comprise
a router (internet working connecting device) that connects to another
LAN or WAN.
➢The point-to-point WAN is normally a line leased from a telephone
provider that connects a home computer or a small LAN to an Internet
service provider (ISP). This type of WAN is often used to provide Internet
access.
1.26
Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet
1.27
Figure 1.11 WANs: a switched WAN and a point-to-point WAN
1.28
Interconnection of Networks: Internetwork
1.29
Figure 1.12 A heterogeneous network made of four WANs and two LANs
1.30
1-3 THE INTERNET
1.31
Advanced Research Projects Agency (ARPA)
1.33
Figure 1.13 Hierarchical organization of the Internet
1.34
1-4 PROTOCOLS AND STANDARDS
1.35
Protocols
Even in this simple scenario, we can see that a set of rules needs to be followed.
First, Maria and Ann know that they should greet each other when they meet.
Second, they know that they should confine their vocabulary to the level of their friendship.
Third, each party knows that she should refrain from speaking when the other party is speaking.
Fourth, each party knows that the conversation should be a dialog, not a monolog: both should
have the opportunity to talk about the issue.
Fifth, they should exchange some nice words when they leave.
We can see that the protocol used by Maria and Ann is different from the communication
between a professor and the students in a lecture hall. The communication in the second case is
mostly monolog; the professor talks most of the time unless a student has a question, a situation
in which the protocol dictates that she should raise her hand and wait for permission to speak. In
this case, the communication is normally very formal and limited to the subject being taught.
1.36
Protocols
1.37
Standards
1.38
Data communication standards fall into two categories:
de facto (meaning "by fact" or "by convention") and
de jure (meaning "by law" or "by regulation").
1.39
Standards Organizations
1.40
Forums
1.41
Regulatory Agencies
1.42