You are on page 1of 46

DATA COMMUNICATIONs AND Networks D.

veeraswamy

Fundamental of Data Communications


1. Introduction
Data Communication is a system consisting of carries and related devices used to transport data from one
point to another. Communication means to convey a message, an idea, a picture or speech that is received and
understood clearly and correctly by the person for whom it is conveyed.
Ancient Methods of Communication and Their Demerits – Message were sent in olden times either through horse
riders or by using pigeons. There was no surety that the messenger will be able to convey the message exactly in the
same form as told to him verbally.
Electronic Methods of Communication – With the invention of telephone instrument and the communication
satellites, the means of electronic communication has become very popular in India even though the cost of
installation and maintenance of telephones is still very high and beyond the means of a common man.
Limitations of Telephonic Communication:
(a) Both the sender and the receiver of the message should be available at the same time and should speak the
same language to understand.
(b) Telephone communication is not a secured means of communication because anyone can overhear the
message.
(c) It is not suitable to send picture or any other type of message except a spoken message.
(d) It is affected by the electrical interference or by the people digging roads etc.
(e) It is still quite costly to make a telephone call outside the city or the country.
Computerized Communication – Since the time computers have started playing an important role in the field of
communications. The main reason for this is that computers can send data extremely fast. They can even transmit
pictures and sound in a much secured manner. Further, PCs can send information on the existing telephone line.
Advantage of Computerized Communication –
(a) Telephonic calls, using Internet, can be made to any part of the world with the same expenses as a local
telephone call made within the city.
(b) Pictures, sound and written matter can be sent within minutes and a confirmation about it reaching at the
destination can be obtained immediately.
(c) Message can be sent in coded form so that they are not understood by anybody else except the person who is
sending and the person who is receiving them.
(d) Message can be sent in any language from any place of world to any place.
(e) Users need not take highly specialized training for sending or receiving message.
2. Communication Systems
A Communication system is the combination of hardware, software and data transfer links that make up a
communication facility for transferring data in a cost effective and efficient manner. A communication system itself
can be either analog or digital. The technique by which a digital signal is converted to its analog form is known as
Modulation. The reverse process i.e. conversion of analog signal to digital signal is known as Demodulation. These
processes of conversions carried out by a special device called Modem.
Advantage of Digital Transmission over Analog Transmission:–
(a) The voice data, music and images can be interspersed to make more efficient use of the same circuits and
equipment.
(b) Much higher transmission rates are possible using telephone lines.
(c) Digital transmission is much cheaper than analog transmission.
(d) Maintenance of a digital system is easier than maintenance of analog system.
(e) A digital signal can pass through an arbitrary number of regenerators in with no loss in signal and thus travel
long distances with no information loss. In contrast, analog signal always suffer some information loss when
amplified, and this loss is cumulative.
3. Signal And Data
Data in a communication system can be either digital data or analog data.
Digital Data – On the hockey playground, the referee blows a whistle and all the players in the field understand the
message instantaneously. The whistle blown in short bursts of high pitched sound like PEE, PE or it may have a long
burst PEEEEEEE. The first one is indication to the players to start the game and the second long whistle is to stop the
match immediately. The message conveyed by the sound energy in short pulses is very clear to all the players. This is
an example of Digital Data Transmission.
Analog Data – When we sit in a concert hall where many musical instrument being played by different players. For
example say one player to playing sitar and other is playing tabla. This is an analog data communication. Both sitar
and tabla are sending sound waves in the same sequence and there is a rhythm and harmony between the two. Any
music system conveys the songs in the analog form.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Different Characteristics of Analog and Digital Data Communication: -
Item Analog Transmission Digital Transmission
Form It is in the form of continuous variable It is in the form of discrete quantities
of physical quantities and has binary digits
Cost of transmission Low High
Efficiency Low high
Maintenance cost of High Low
equipment
Effect of noise High Low
Attenuation High Low
Example TV transmission from DoorDarshan Data transmission from hard disk to
memory
4. Channel Characteristics
A communication channel provides the medium to move electromagnetic energy from a source to one or
more destination points. It is a pathway over which data are transferred between remote devices.
Characteristics: -
(a) It should be able to deliver maximum amount of electromagnetic energy from the transmitter to the receiver
with minimum cost.
(b) It should not add much noise on the way so that the receiver is able to understand the message correctly.
(c) There should not be any restriction on the distances between the transmitter where the sender is located and
the receiver where the signal is received.
Types of Communication Channels: -
There are two types of communication channel used in data communication. These are:
(a) A public telephone system
(b) A commercial radio station
Both these channels are used for transfer of voice in analog form. The other type of channel is used for the
transmission of the data between a PC and a printer. This carries digital data and transmits square waves. The digital
signal between a PC and printer also gets attenuated if the distance of the printer is long.
Digital Channel Capacity: -
The capacity of a digital channel is the number of data bits a channel conveys in one second. The
measurement is in bits per second (bps). It is also known as bit rate of channel. The bit rate of networking ranges from
kilobits per second or Kbps to millions of bits per second. The duration of a binary digit determines the bit rate. The
shorter duration of bit is the cause of the greater the bps rating of the signal.
Relationship between bit time and bit rate per second: -
Bit time (milli sec) Bit rate per Bit time (milli sec) Bit rate per
second(bps) second(bps)
3.3 300 .833 1200
.416 2400 .104 9600
.052 19200
Baud and Bit Rate: - Baud is a measure of the digital signaling rate in a channel. Bit rate is a measure of the digital bit
values the channel conveys with each baud.
The only way to increase the digital bit rate is to decrease the bit time of the signal. But electrical
characteristics of the material used for conveying the bits limit the reduction in the size of the bit time and thus fixing
the maximum bit rate per second.
Maximum Data Rate of a Channel: - The maximum data rate of a noisy channel whose bandwidth is in Hertz (Hz),
and whose signal-to-noise ratio, shown as S/N in decibels, is given by:
Maximum number of bits/sec = H1092 (1 + S/N)
5. Transmission Modes
There are three modes of data transmission. These are:
(a) Simplex – Simplex communication imply a simple method of communication. In simplex communications
mode, there is a one way communication transmission. Television transmission is a very good example of this
type of communication.
(b) Half-duplex - In half-duplex mode, both units communicate over the same medium, but only one unit can
send at a time. While one is in send mode, the other unit is in receiving mode. It is like two polite people
talking to each other—one talks, the other listens, but neither one talks at the same time.
(c) Full-duplex - In a half-duplex system, the line must be "turned around" each time the direction is reversed.
This involves a special switching circuit and requires a small amount of time (approximately 150 millisec-
onds). With high speed capabilities of the computer, this turn-around time is unacceptable in many instances.
Also, some applications require simultaneous transmission in both directions. In such cases, a full-duplex
system is used that allows information to flow simultaneously in both directions on the transmission path.
Use of a full-duplex line improves efficiency as the line turn-around time required in a half-duplex
arrangement is eliminated. It requires four wires.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
6. Asynchronous and Synchronous Transmission
Asynchronous Mode: - Asynchronous mode refers to a series of events that take place which are not synchronized one
after the other.
Asynchronous Transmission: - Asynchronous transmission is often referred to as start-stop transmission because of
its nature, that is the sender can send a character at any time convenient and the receiver will accept it. Asynchronous
communication lines remain in an idle state until the hardware on the line is ready to transmit. Since the line is idle, a
series of bits have to be sent to the receiving node to notify it that there is more data coming. When data is finished,
the node has to be notified that the transmission is complete and to go back to an idle state, hence the STOP bits are to
be sent. This pattern continues for the duration of the time the link is operative. This is the characteristic of many
terminals when on a terminal, the time spent between successive keystrokes would vary. Thus, in asynchronous
transmission, data is transmitted character by character at irregular intervals.
Synchronous Transmission: - Synchronous devices need not use Start and Stop bits; so coordination between the two
nodes, i.e. the sender and the receiver, is handled differently. In synchronous communications, there are two
"channels" - one for data and another for link Synchronization. The channel for synchronization uses the integral clock
in the hardware for link synchronization between the two nodes when one of the nodes is ready to transmit data, a
unique combination of bits called a Sync Character is sent to the receiver. Since the first character will probably get
trashed, a second one usually follows to ensure that synchronization is complete.
Comparison between Asynchronous and Synchronous Transmission: -
 Synchronous communications tend to be more expensive than asynchronous ones as the hardware involved is
more costly due to integral clocking mechanism that have to be used as well as more sophisticated engineering
efforts.
 Synchronous transmission is well suited to remote communication between a computer and such devices as
buffered card readers and printers. It is also used for computer to computer communications.
 The primary advantage of synchronous transmission is its efficiency. Not only does it eliminate the need for
individual start-stop bits on each character, but much higher data rates can be used than with asynchronous
transmission.
 Asynchronous transmission is well suited to many keyboard type terminals. The advantage of this method is
that it does not require any local storage at the terminal or the computer as transmission takes place character
by character. Hence it is cheaper to implement.
Efficiency of Data Transmission in Synchronous and Asynchronous Modes: - Asynchronous data incorporates the
use of extra framing bits to establish the start and ending (stop) of a data character word. A receiver responds to the
data stream when it detects a start bit. A data character is decoded and defined after the stop bit is received and
confirmed. Asynchronous data are easier to detect and synchronize, but the efficiency of data transmission is reduced
by the addition of framing bits as overhead (no message data) bits.
A comparison of a single character using the two data types is as follows. For this purpose, the ASCII code of
the letter E (1000101) is used. The order of transmission is to send the Least Significant Bit (LSB) first. The number of
framing bits used for asynchronous data varies depending on the stations in the communication link. For example,
suppose we use 1 start and 2 stop bits. This adds 3 more bits to the character 'word. Hence total 10 bits are required to
send the letter E using asynchronous data. However, in' the case of synchronous transmission, only 7 bits are required
for transmission of the character E.
The efficiency of transmission is defined as the ratio of the number of message bits to the total number of transmitted
bits:
databits
or % efficiency = totalbits x 100
Cyclic Redundancy Check (CRC): - In synchronous communications, CRC is used to verify the integrity of the entire
packet or block of data. Integrity of the packet means whether the complete packet of data is received in its correct
form as it was sent at the sending end. In synchronous communications, parity checking is sufficient to ensure data
integrity. In high-speed asynchronous communications, single bit corrections are not enough. As each packet is
created, a CRC check is placed somewhere in the packet and is verified at the receiving end.
CRC is a calculation method used to check the accuracy of a digital transmission over a communication link.
The sending computer uses one of several formulas to calculate a value from the information contained in the data,
and this value is appended to the message block before it is sent. The receiving computer performs the same
calculation on the same data and should derive the same number. If the two CRCs do not match, indicating that a
transmission error has occurred, the receiving computer asks the sending computer to retransmit the data.
This procedure is known as a redundancy check because each transmission includes extra or redundant error-
checking values as well as the data itself. A CRC is generated by dividing the total number of bits in the block of data
being sent by a predetermined binary number. The remainder is then added to the packet and the packet is
transmitted. On the receiving end, the reverse mathematical operation is performed to verify the packet contents. If
the computation is successful, the packet is passed to the next step. If it fails, the issuing node is notified and the entire
packet is retransmitted.
Common CRC patterns are 12-bit (CRC 12), 16-bit (CRC-16 and CRC-CCITT), and 32-bit (CRC-32)
Transmission Media

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Introduction – Transmission media is the general term used to describe the data path that forms the physical channel
between sender and the receiver
1. Guided Media – The Guided Media refer to the media in which the signals are guided through a solid medium,
such as copper wire, optical fiber etc. Examples of guided media are the following:
(a) Twisted-pair Wire – A twisted-pair cable consists of two insulated copper wires, typically about 1 mm thick,
here the wire are twisted together in a helical manner.
Characteristics:
 Twisted pair consists of two insulated copper wires.
 The thickness of coils is about 1 mm.
 The wires are twisted together.
 Twisted pair is commonly used in local telephone communication.
 For digital transmission over short distances up to 1 km.
Advantage:
 Trained men power is available to repair and service the media.
 In a telephone system signals can travel several kilometers without amplification, when twisted pair
wires are used.
 It is used for both i.e. analog transmission as well as digital transmission.
 It is least expensive.
 If a portion of a twisted pair cable is damaged the network is not effected very badly.
Disadvantage:
 This cable has poor protection layer that’s why easily pick up noise.
 It is likely to break easily.
(b) Co-axial Cable – A Co-axial cable consists of a stiff copper wire as the core, surrounded by an insulating
material.
Characteristics:
 Co-axial cable consists of a copper wire as the core surrounded by an insulating material.
 It is available in two forms i.e. 50-ohm and 75-ohm.
 50-ohm cable is used for digital transmission.
 75-ohm cable is used for analog transmission.
Advantage:
 Co-axial cable is used to span the network to long
distance at higher data rate (bit/s).
 It is used for both digital and analog transmission.
 It has higher Band-width.
 It is in-expensive as compare to fiber optics.
Disadvantage:
 In respect to twisted pair, it is expensive.
 Failure of portion, may affect the whole network.
 Network cannot be extended above 1 km.
 Bandwidth is not constant, varies according to length
(Distance covers).
(c) Fiber Optics – Fiber optics is the newest form of guided media.
This media is superior in data handling and security
characteristics. The Fiber Optic transmits light signals rather
than electrical signal. Each Fiber has an inner core of glass or
plastic and additional resources required at both side i.e. source
and destination to convert electrical signal into light signal and
vice versa.
In Optical fiber the outer jacket is made up of either
polyvinyl chloride (PVC) or teblon. Inside the jacket, Kevlar which is a strong material used in the fabrication
of bullet proof vests. Below the Kevlar another plastic coating to protect the fiber is at the centre of the cable
and it consists of cladding and core.
Characteristics:
 Cost: - Fiber Optic cable is more expensive than any other cables.
 Installation: - Installation of this cable is difficult than any other cables.
 Bandwidth: - Through fiber optics light signal is passed that’s why chances of attenuation will be
lesser.
 Fiber Optics cable provides higher Bandwidth than any other cables.
 Maximum connecting points/node capacity: - If fiber optic is used as communication channel with
Ethernet then up to 75 nodes can be easily connected/installed.
 Mode of Transmission: - Fiber Optic supports half duplex mode of transmission. In half duplex mode
of transmission, transmission is possible in both direction, but only one direction at a time.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Advantage:
 This media is superior than any other media use to connect network resources physically.
 The Bandwidth of this media is higher than any other media.
 This cable cannot be easily getting noisy.
 This media is lighter than any other media.
 Signal cannot be leakage.
 Greater immunity to tapping.
Disadvantage:
 Fiber Optics required high skilled people to use.
 It doesn’t support two ways communication at a time.
 Cost of this cable is much higher than any other cable.
 Unidirectional light propagation.
 Installation and maintenance is typical.
2. Unguided Media – The media in which signal are not guided through a solid medium is called Unguided Media.
For example Air is the media through which electromagnetic energy ca flow easily.
There are several methods which are used to send electromagnetic energy through air:
(a) Radio Waves – Electromagnetic waves ranging in frequency between 3 KHz and 1 GHz are called radio
waves.
Radio waves are omni-directional. When an antenna transmits radio waves, hey are propagated in all
directional. This means that the sending and receiving antenna do not have to be aligned. Omni-directional
properly has a disadvantage that radio waves transmitted by one antenna are susceptible interference by
another antenna that may send signal using the same frequency or band.
Radio waves are those wave that propagate in the sky mode can travel long distance broadcasting.
Characteristics:
 Have frequency between 10 KHz to 1 GHz.
 Radio waves are easy to generate.
 Radio waves are omni directional.
 They can travel long distances.
 They can penetrate buildings easily.
Advantage:
 Due to low and medium frequency it can penetrates walls, means AM radio can receive a signals
inside a building.
Disadvantage:
 Due to low & medium frequency these can’t isolate a communication to just inside or outside a
building.
Application of radio waves:
 Due to omni-directional characteristics of radio wave, it is use in AM and FM radio, TV, Maritime
radio, Codeless phone and paging.
(b) Microwaves – Electromagnetic waves having frequency between 1 GHz to 3 GHz are called microwaves.
Microwaves are unidirectional when an antenna transmits microwaves, they can be narrowly
focused. This means that the sending and receiving antenna need to be aligned. Microwave propagation is
line of sight propagation.
There are two types of antenna used for microwave communication:
(i) Parabolic dish antenna – It is based on the geometry of parabolic in which every line is parallel to the line of
symmetry or line of sight and reflects off the curve at angles such that on the lines intersect at a common point
called the focus.
The parabolic dish works as a funnel, catching a wide range of waves and directing them to a
common point. In this way, more of the signal is recovered than would be possible with a single-point
receiver.
(ii) Horn antenna – It looks like a gigantic scoop. Outgoing transmissions are broadcast up a stem and deflected
outward in a series of narrow parallel beams by the curved head. Received transmission is collected by the
scooped shape of the horn and is deflected down into the same.
Characteristics:
 Frequencies above 100 MHz.
 Microwaves travel in straight line.
 Microwaves are in expansive as compare to fiber optics system.
 Microwaves communication is widely used for telephones, television redistribution etc.
 Microwave system permit data transmission rate above about 16 GHz /sec.
 Repeaters are used to extend the coverage area.
Advantage:
 A pair of antennas can be aligned without interfering with another pair of aligned antennas.
Disadvantage:

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 Very high frequency microwaves can’t penetrate walls, if receivers are inside the building.
 Uses of certain portions of band in microwaves require permission from authorities.
Application:
 Microwaves are used for uni-cast communication such as cellular telephones satellite networks and
wireless LANs.
Types of Microwave communication system:
There are two types of microwave communication system:
1. Terrestrial: -
 Such system used directional parabolic antennas to send and receives signals.
 The signals are highly focused and the physical part must be line to sight.
 Relay towards are used to extend the signals.
 Frequency range between 21 to 23 GHz and 4 to 6 GHz.
 Cost: - Short distance system can be inexpensive but long distance systems can be expensive.
 Installation: - In Terrestrial microwave system line of sight maintain line of sight requirement can
make installation difficult. Because antennas must be carefully aligned.
 Bandwidth capacity: - Data rates are from 1 to 10 m bit/sec.
2. Satellite: -
 Satellite microwave system transmits signals between directional parabolic antennas.
 Such as also maintain line of sight.
 One antenna is on a satellite in geo-synchronous orbit (The orbit where the speed of the satellite
matches the earth’s rotation speed), about 36000 kms above the equator.
 This allows a ground station to aim its antenna at a fixed point in the sky.
 In satellite communication microwave communication at 6 GHz are transmitted from a transmitter on
earth to a satellite position in space.
 The signal reaches the satellite and it become weak due to the distance of 36,000 km traveled. The
transponder in a satellite amplifies the weak signal and sends them back to the earth at a frequency of
4 GHz. These signals are received at a receiving station on the earth.
Characteristics:
 Frequency – Range: 4 GHz – 6 GHz and 11 GHz – 14 GHz
 Cost – Building and launching such system is extremely expensive.
 Installation – Extremely difficult and technical.
 Bandwidth – High and it also depends on the frequency use.
Advantage:
 Satellite communication is a single broadcast or relay station visible from any point of a very large
area on the earth.
 Satellites used for national transmission are visible from all ports of the country.
 Transmission and receiving costs are independent from the distance between these stations.
 It makes high quality communication.
 Maintenance cost is less.
Disadvantage:
 Initial setup cost is very high.
Kepler’s Law: - It defines the period as a function of the distance of the satellite from the centre of the earth i.e.
According to Kepler’s Law,
Period = C(distance)3/2
Where ‘C’ is a constant approximately equal to 1/100.
‘Period’ has a unit second.
(c) Infrared and Millimetre Wave – In electromagnetic waves ranging in frequency between 3 GHz to 400 THz
are called infrared.
The infrared data association (IRDA) an association of sponsoring the use of infrared waves has
established standards for communication between devices such as keyboards, mousse, PCs and printers. The
recent standard defines a data rate of 4 MB/sec.
Infrared waves are those waves that propagate in the line of sight mode.
Characteristics:
 Used for short range communication.
 The remote controls used on television and VCRS, DVDS use infrared communication.
 They are relatively directional, cheap, and easy to build but do not pass through solid object.
 No government license is needed to operate on infrared system like radio system.
 Infrared communication is used fro indoor wireless LAN.
 Portable computers with infrared capability can be on the local LAN without having too physically
connected to it.
Advantage:

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 Due to high frequency and short range communication, it prevents interference between one system
and another.
Disadvantage:
 High frequency infrared can’t penetrate walls, if receivers are inside the building.
 It can’t be used outside the building because the sun’s ray contains infrared waves that can be
interfering with communication.
Application:
 It can be used for short range communication in a closed area using line of sight propagation.
(d) Light Wave: - A modern application is to connect the LANs in two buildings via lasers mounted on their roof
tops. Coherent optical signaling using lasers is inherently unidirectional; so each building needs its own laser
and its own photo detector.
Advantage:
 The bandwidth is very high at very low cost.
 It is relatively easy to install.
 It does not require any license.
Disadvantage:
 Laser beams cannot penetrate rain or thick fog, but they normally work well on sunny days.
 Heat from the sun during the daytime causes convection currents to rise up from the roof of the
building.
Fiber Optics Communication: - The huge capacity and digital efficiency of optical fibers have made them most
appropriate for computer communication. Optical fibers are used to connect work-stations with central processor in a
LAN. Main purposes of using optical fibers are to provide safe mechanism with high data rate.
Components: - A fiber optics system has three components: -
 Light source
 Transmission medium (channel)
 Detector
 Light source – The two commonly use optical sources are Light Emitting Diodes (LEDs) and Injection Laser
Diodes. The LEDs emit a lower level of light (-15 dbm power level) but concentrate it into a tighter cone
pattern. The laser diodes emit light at -6 dbm. The pattern of light is shown below:
 Transmission medium (channel) – The transmission medium is an ultra-thin fiber of glass.
 Detector – The detector generates an electrical pulse when light falls on it. By attaching a light source to one
end of an optical fiber and a detector to the other, we have a unidirectional data transmission system that
accepts an electrical signal, converts and transmits it as light pulses, and then reconverts the output to
electrical signals art the receiving end.
Categorization into bands of electromagnetic spectrum of Radio wave & Microwave: -
(i) Very Low Frequency (VLF) – VLF have range between 3 to 30 Hz and we ground propagation method.
Application of VLF is called long range radio navigation.
(ii) Low Frequency (LF) – LF has range between 30 Hz to 300 KHz and use ground propagation method. LF is
used in radio beacons and navigational locators.
(iii) Middle Frequency (MF) – MF has range between 300 KHz to 3 MHz and use sky propagation method. MF is
used in AM (Amplitude Modulator).
(iv) High Frequency (HF) – HF has range between 3 MHz to 30 MHz and use ground sky propagation method.
HF is used in citizens band (CB), ship/aircraft communication.
(v) Very High Frequency (VHF) – It has range between 30 MHz to 300 MHz and used both sky and line of sight
propagation. VHF is used in VHF TV and FM radio.
(vi) Ultra High Frequency (UHF) – UHF has range between 300 MHz to 3 GHz and use line of sight propagation
method. UHF is used in UHF TV, cellular phones, paging, satellite.
(vii) Super High Frequency (SHF) – SHF has range between 3 GHz to 30 GHz and use line of sight
propagation method. SHF is used in satellite communication.
(viii) Extremely High Frequency (EHF) – EHF has range between 30 GHz to 300 GHz and use line of sight
propagation method. It is used in satellite and radar.

DATA MODEMS
Modulation: - Modification of one or more characteristic of a
carrier wave by an information bearing signal is called
‘Modulation’.
Categorization of Modulation: -
1. Amplitude Modulation – In Amplitude Modulation
transmission, the carrier signal is modulated so that its
amplitude varies with the changing amplitude of
modulating signal. The frequency and phase of the carrier

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
remains the same. Only the amplitude changes to follow the variation in information.
Modulation creates a band width i.e. the twice the bandwidth of modulating signal and covers a range
centered in a carrier frequency. However the signal components above and below the carrier frequency carry the
exactly the same information. For this reason some implementation discarded one half of the signal and cut the
bandwidth in half.
The total bandwidth required for amplitude modulation can be determined from the bandwidth of audio
signal.
BAM = 2B
Where B – Bandwidth of Audio signal
BAM – Bandwidth of AM
The federal communication commission (FCC) allows 10 KHz for each amplitude modulation station
(AM). AM stations allowed carrier frequency between 530 KHz to 1700 KHz.
Advantage:
 Easy to implement
 Used for both digital and analog
 In the case of digital signal, two different voltage levels are used i.e. 0
or 1.
Disadvantage:
 It is affected by the noise signal. That may add up with the information signal.
 As the strength of the signal decreases in a channel with distance traveled it reaches a minimum level.
Before signal strength goes down, it must be amplified.
2. Frequency Modulation – In Frequency Modulation transmission, the frequency of carrier signal is modulated to
follow the changing voltage level of modulating
signal. The peak amplitude and phase of carrier
signal remains constant but as the amplitude of
information system changes, the frequency of carrier
changes corresponding.
The actual bandwidth is difficult to determine
exactly but it can be solved shown that it is several
lines that of analog signal.
BFM = 2(1 + β)B
Here β is a factor depends upon
modulation technique.
The bandwidth of an audio signal broadcast
in stereo is almost 15 KHz. The Fcc allows 200 KHz for
each station. FM stations are allowed carrier
frequency anywhere between 88 MHz to 108 MHz.
Advantage:
 Frequency modulated is least affected by the noise.
Disadvantage:
 Needs much higher bandwidth than
amplitude modulation.
Use:
 FM technique is used to convert digital signal
into FM signals.
3. Phase Modulation – In phase modulation transmission
the phase of carrier signal is modulated to follow the
changing voltage level of modulating signal. The peak
of amplitude and frequency of carrier signal remains
constant but the amplitude of information signal changes the phase of carrier signal. In frequency modulation the
instantaneous change in carrier frequency is proportional to the amplitude of modulating signal while in phase
modulation; the instantaneous change in carrier frequency is proportional to the derivative of amplitude of
modulating signal.
The actual bandwidth is difficult to determine exactly but it can be shown empirically that it is several
times that of analog or modulating signal. Although the formula of same bandwidth for frequency modulation
and phase modulation. The value of ‘β’ is lower in the case of phase modulation around 1 narrow band and 3 for
wide band.
Advantage:
 It provides the signal modulation that allows computers to communicate at higher data rates through
telephone system.
Disadvantage:
 Phase modulation requires two signals with a phase difference between them.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Use:
 This technique is used to convert colour information in colour television broadcast.
 This technique is used to convert digital signals into phase modulated (PM) signal.
Analog to Digital Conversion:
1. Pulse Code Modulation (PCM): - The common technique in which analog signal changes to digital data
(Digitization) is called PCM. A PCM encoder has three procedures:
(a) Analog signal is sampled
(b) Sampled signal is quantized
(c) Quantized values are encountered as streams of bits.
(a) Sampling – The analog signal sampled every Ts second where Ts
second is the sample interval or period. The inverse of the
sampling interval is called the sampling rate or sampling
frequency and denoted by f s, where fs = 1/Ts.
According
to the Nyquist
theorem, the
sampling rate must
be at least 2 times
the higher
frequency
contained in the
signal.
For
elaborating Nyquist
theorem we remember some points:
 Sample a signal only & signal is band-limited.
 Sampling rate must be at least 2 times the highest frequency, not the bandwidth.
If the analog signal is low-pass, the bandwidth & the highest frequency are the same value.

If the analog signal is band pass, the bandwidth value is lower than the value of the maximum
frequency.

(b) Quantization - The result of sampling is a series of pulse with amplitude values between the maximum to
minimum amplitudes of the signal. The set of amplitude can be infinite with non-integral values b/w the two
limits. These values can’t be used in the encoding
process.
Steps in Quantization: -
 We assume that the original analog signal has
instantaneous amplitude between Vmin & Vmax.
 We divide the range into 1 zones, each of height
 (delta)
Vmax - Vmin
i.e.  =
2
 We assign quantized values of 0 to 1-10 to the
mid-point of each zone.
 We approximate the value of the sample
amplitude to the quantized values.
For quantization & encoding, we take a sampled signal and the sample amplitude are between -20 v
and + 20 v.
We decided to have eight levels. This means that  = SV

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
(c) Encoding – After each sample is quantized & no. of bits per sample is decided, each sample can be changed to
an n-bit codeword i.e. no. of bits nn = log2L, where L = Quantization level & Bit rate = Sampling rate x no. of
bits per sample = fs x nn
In PCM decoder, we first use circuitry to convert the code words into a pulse that holds the
amplitude. After the
staircase signal is
completed, it passes
through a low-pass filter to
smooth the staircase signal
into an analog signal. The
filter has the same cut off
frequency as the original
signal at the sender. If the
signal has been sampled at
or greater than the Nyquist sampling rate & if there
are enough quantization levels, the original signal
will be recreated. The maximum and minimum
values of the original signal can be achieved by
using amplification.
3. Delta Modulation (DM) – DM finds the change from
previous sample. There are no code words; bits are sent
one after another.
Modulator – The Modulator is used at the sender site to
create a stream of bits from an analog signal. The
process records the small positive or
negative changes, called Delta. If the
delta is positive, the process records a
1. if it is negative the process records a
0. However the process needs a base
against which the analog signal is
compared. The modulator builds a
second signal that resembles a staircase. Finding the change I then reduced to comparing the input signal with the
gradually made staircase signal.
Demodulator – The Demodulator takes the
digital data & using the staircase maker & the
delay unit, creates the analog signal. The
created analog signal needs to pass through a
low-pass filter for smoothing.
Digital to analog Conversion: - Digital to analog
conversion is the process of changing one of the
characteristics of an analog signal based on the information in digital data. This is also called Shift Keying.
Relationship between Data rate & signal rate – Data or bit rate is the no. of bits per second. Signal or baud rate is the
no. of signal elements per second.
In the analog transmission of digital data, the baud rate is less than or equal to the bit rate.
S = N x 1/r baud, where S = signal rate, N = data rate, r = no. of data elements carried in one signal = log2l
where l is the type of signal element.
Shift Keying: -
 Amplitude Shift Keying (ASK) – In amplitude shift keying the amplitude of the carrier signal is varied to
create signal elements. Both frequency & phase remain constant while the amplitude changes.
Levels of ASK: -
(d) Level o – This is also called Binary ASK or on-off keying & peak amplitude of one signal level is 0 & the other
is the same as the amplitude of the carrier frequency.
Bandwidth for ASK, B = (1 + d) X S
Where d = value between 0 & 1
S = Signal rate
The formula shows that the
required bandwidth has a minimum value
of s & a maximum value of 25.
(e) Multilevel ASK (MASK) – Multilevel ASK is
that in which more than two levels. We can use 4, 8, 16 or more different amplitude for the signal & modulate
the data using 2, 3, 4 or more bits at a time.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 Frequency Shift Keying (FSK) – In FSK, the frequency of the carrier signal is varied to represent data. The
frequency of the modulated signal is constant for the duration of one signal element, but changes for the next
signal element if the data element changes. Both peak element if the data element changes. Both peak
amplitude & phase remain constant for all signal elements.
(a) Binary FSK (BFSK) – Binary FSK is considering two frequencies f1 & f2. We use the first carrier if the data
element is 0; we use the second if the
data element is 1.
The middle of one
bandwidth is f1 & the other is f2. Both
f1 & f2 are  f apart from the
midpoint between the two bands, so
the difference between the two
frequencies is 2  f.
Bandwidth for FSK, B = (1 + d) X 3 + 2  f
(b) Multilevel FSK (MFSK) – Multilevel FSK is that in which more than two frequencies used. To send 2 bits
at a time, we can use four frequencies and so on. Bandwidth for FSK for multilevel,
B = (1 + d) x S + (L – 1) 2  f
 Phase Shift Keying (PSK) – In PSK, the phase of the carrier is varied to represent two or more different signal
elements. Both peak amplitude & frequency remain constant as the phase changes. Today, PSK is more
common than ASK & FSK.
(a) Binary PSK (BPSK) – The simplest PSK is binary PSK, in
which we have only two signal elements, one with a phase
of 00 and the other with a phase of 1800.
Bandwidth of PSK, B = (l+ d) S
(b) Quadrature PSK (QPSK) – The simplicity of BPSK enticed designers to use 2 bits at a time in each signal
element, thereby decreasing the baud rate & eventually the required bandwidth. The scheme is called
quadrature PSK because it uses two separate means out of phase. The incoming bits are first passed
through a serial to parallel conversion that sends bit to one modulator and the next bit to the other
modulator. If the duration of each bit in the incoming signal is T, the duration of each bit sent to the
corresponding BPSK signal is 2T. This means that the bit to each BPSK signal has one half the frequency
of the signal.
 DPSK –
Encoding Technique and CODEC: -
MODEMS: - It is a device converts digital signal generated by computer into an analog signal to be carried by public
access telephone line. It is also the device converts the analog signals received over a telephone line into digital signal
usable by the computer. A modem derives its meaning from modulation and demodulation i.e. a signal modulator
and signal demodulator. A modulator converts digital signals into analog and demodulator converts analog signal
into digital signal. Modems are classified into many categories. Modem speed range from 300bps to 56kbps. The tasks
which modem can perform are:
 Automatically dial another modem using touch tone or pulse dialing.
 Auto answer.
 Disconnect a telephone connection when data transfer has completed.
 Automatically speed negotiation between two modems.
 Converts bits into the form suitable for the LAN.
 Transfer data reliable.
 Converts received signal back into bits.
Modem Commands – When a computer wants to make a connection using telephone no. as parameter using tone
dialing. The modem then replies with an ok response i.e. it tries to make connection with remote modem if it is not
able to make connection it sends message in the form of code.
3 – for no carrier
7 – for busy
6 - for no dial tone, etc.
If it gets connected then it returns a connect code as it sends +++ and then wait for a command from host
computer. In this case command is hang up the connection (ATH). The modem will then return an OK message when
it has successfully created a connection.
Classification of Modems – Modem can be of the following types:
1. Landline Modems – Landline modems are those modems which connect to the public switched telephone
network (PSTN). To connect to PSTN, this modem has a jack known as RJ-11 jack or regular phone jack.
Landline modem can be of following types:
(a) Internal Modems – Internal modems are installed within the computer as interface cards.
(b) External Modems – External Modems are installed as a separate hardware device, outside the computer. They
are more expensive than the internal modems.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
(c) PCMCIA Modems – PCMCIA Modems are credit-card sized modems used in laptop computers. PCMCIA
stands for Personal Computer Memory Card International Association.
(d) Voice/data/fax Modems – Voice/data/fax Modems which are use for transferring files, sending and
receiving faxes and voice mail using associated software.
2. Wireless Modems – Wireless modem are based on webs. Using wireless modem, one can connect to a network
while being mobile. Like Landline Modems wireless modems do not plug into jack. There are very few
manufacturers of wireless modem.
3. LAN Modems – LAN Modems allows share remote access to LAN resources. LAN modems are of various types.
Depending upon the number of parts, network architecture, memory requirements, security, etc.
Modem Standard – There are two modem standards:
1. Bell Modems – The first commercially available modems were developed by Bell Telephone Company. In the
early 70’s they defined the development of the technology and provided the standards. Some major Bell modems
include the 103/113 series, 202 series, 212 series, 201 series, 208 series and 209 series.
2. ITU-T Modems – Many of today’s modems are based on the standard published by ITU-T. V.21, V.22, V.23,
V.22bis, V.32, V.32bis, V.33 and V.34 modems are ITU-T modems.
Modem Protocols –
1. X.25 Protocol – X.25 is an end to end protocol. It acts as an interface between data terminal equipment (DTE) and
data circuit-terminating equipment (DCE).
X.25 is a packet-switching protocol that defines the interface between a synchronous packet-switching
host computer and analog dedicated circuits or dial-up switched virtual circuits in the voice-grade public data
network.
X.25 allows a variety of devices that are designated as data terminal equipment (DTE) to talk to the public
data network (PDN).
2. Triple-X Protocol – X.3, X.28 and X.29 protocols are collectively known as Triple-X protocols. Triple-X protocols
are used to connect a dumb terminal to an X.25 network. A dumb terminal is any terminal that does not
understand X.25 protocol. X.3 defines a packet assembler/disassembler (PAD). X.28 defines the rules for
communication between a dumb terminal and a PAD. X.29 defines relationship between a PAD and a remote
terminal.
Protocol Used by Modem for Transferring Files – Some of the protocols used by modem for transferring files are
described in the following sub-sections:
 XMODEM – XMODEM is a file transfer protocol used in telephone-line communication between PCs. XMODEM
protocol requires that one terminal or computer be set up as the sender and other be set up as the receiver. A
block of data sent under XMODEM protocol will have the following format:
Start of Header Block Number 1’s Complement of Block 128 Data Checksum
Number Characters bits
Characteristics:
 It is easy to implement with a small computer.
 It requires manual setup for each file to be transferred.
 The error detection technique is unsophisticated and unable to detect reliably the most common type of
transmission error, which is noise burst that can last of the order of 10 milliseconds.
 It is a half-duplex protocol.
 YMODEM – It is similar to XMODEM, but with some differences. These differences are the following:
 A data unit is of 1024 bytes.
 Two CANs are sent to abort a transmission.
 ITU-T CRC-16 is used for error checking.
 Multiple files can be sent simultaneously.
 ZMODEM – It combines the features of both XMODEM and YMODEM.
 Kermit – It is an also a file transfer protocol like XMODEM. It allows the transmission of control characters as text.
Establishing a Connection – Connection can be of the following three types:
 Direct Connection between PCs – One PC can call another PC. Modems at both ends of the connection talk to
one another.
 Connection to a Mainframe Computer – A PC connects a mainframe computer.
 Connection to an on-line service – On-line service consist of one or more central computers linked by
telephone lines to other small computers spread across the country or world.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy

Multichannel Data communication


Multiplexing: - Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals
across a single data link.
Format of multiplexed system:-
Multiplexer is that which combines transmission stream into a
single stream i.e. many to one method.
Demultiplexer is that which separates the stream back
into its component transmission i.e. one-to-many method &
directs them to their corresponding lines. Link
refers to the physical path channel refers to the
portion of a link that carries a transmission
between a given pair of lines. One link can have
many channels.
Categories / techniques of multiplexing: -
(a) Frequency-division multiplexing: - FDM is
an analog technique that can be applied
when the band-width of a link is greater
than the combined band-widths of the
signals to be transmitted. In FDM, signals
generated by each sending device modulate.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Different carrier frequencies. These modulated signals are then combined into a single composite signal that can
be transported by the link. Carrier frequencies are separated by sufficient bandwidth to accommodate the
modulated signal. These bandwidth ranges are the channels through which the various signals travel, channels
can be separated by strips of unused bandwidth, guard bands to prevent signals from overlapping.

Application of FDM:-
 FDM is used in AM & FM radio broadcasting with band from 530 to 1700 KHz & 88 to 108 MHz
respectively.
 FDM is used in television broadcasting
 FDM is used in first generation cellular telephones.
(b) Wavelength division multiplexing: - WDM is an analog technique that is designed to use the high data-rate
capability of fiber-optic cable. The optical-fiber data rate is higher than the data rate of metallic transmission cable.
Using a fiver-optic cable fox one single line wastes the available bandwidth. Multiplexing allows us to combine
several lines into one. In WDM, the multiplexing & demultiplexing involve optical signals transmitted through
fiber-optic channels.
In WDM technology, we want to
combine multiple sources light into one single
light at the multiplexer & do the reverse at the
demultiplexer. The combining & splitting of
light source are easily handled by a prism. A
prism bends a beam of light based on the angle of incidence & the frequency. Using this technique, a multiplexer
can be made to combine several input beams of light, each containing a narrow band of frequencies into one
output beam of a wider band of frequencies. A demultiplexer can also be made to reverse the process.
Dense WDM can multiplex a very
large number of channels by spacing channels
very close to one another. It achieves even
greater efficiency.
Application of WDM: -
 WDM is used in SONET network
in which multiple optical fiber
lines are multiplexed & demultiplexed.
(c) Time–division multiplexing: - TDM is a digital
multiplexing technique for combining several low rate
channels into one high-rate one.
Two schemes for TDM: -
1. Synchronous TDM: - In synchronous TDM, the data
flow of each input connection is divided into units, where each input occupies one input time slot. A unit can
be 1 bit, 1charecter of 1 block of data. Each input unit becomes one output unit & occupies one output time
slot. However the duration of an output time slot is n times shorter. Than the duration of an input time slot. If
an input time slot is Ts, the output time slot is T/n & where n is the no. of connections. In other wards, a unit
in the output connection has a shorter duration;
it travels faster.
In synchronous TDM, the data rate of
the link is n times slots are grouped into frames.
A frame consists of one complete cycle of time
slots, with one slot dedicated to each sending
device. In a system with n input lines each flame
has n slot, with each slot allocated to carrying
data from a specific input line.
2. Statistical TDM: - In statistical TDM, slot are
dynamically allocated to improve bandwidth
efficiency. Only when a input line has a slot’s worth
of data to send is it given a slot in the output frame.
In statistical TDM, the no. of slots in each frame is
less than the no of input lines. The multiplexer
checks each input line in round robin fashion: it
allocates a slot for an input line if the line has data to send otherwise it skips the line & checks the next line. In
statistical TDM, no solt is left empty as long as there are data to be sent by any input line.
Difference between synchronous &statistical TDM: -
 An output slot in synchronous TDM is totally occupied by data where as in statistical TDM, a slot need to
carry data as well as address of the destination.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 In statistical TDM, a block of data is usually many bytes while the address is just a few bytes where as in
synchronous TDM, there is no such situation.
 The frame in statistical TDM need not be synchronized means there is no need of synchronization bits where
as in synchronous TDM must be synchronized.
 In statistical TDM, the capacity of the link is
normally less than the sum of the capacity of
cache channel where as in synchronous TDM, the
capacity of the link is equal to the sum of the
capacity of channel.
Access technique: - Access technique is basically divided
into three groups.
(a) Random Access: - In random access of contention
methods, no station is superior to another station & name is assigned the control over the another. No station
permits of does not permit, another station to send.
Method of random access technique: -
 ALHO
 CSMA (carrier sense multiple access)
 CSMA/CD (Carrier sense multiple Access with collision detection)
 CSMA/CA ( Carrier sense multiple access with collision Avoidance )
(b) Controlled Access: - In controlled access, the stations consult one another to find which station has the right to
send. A station can’t send unless it has been authorized by other stations.
Method of controlled access technique: -
 reservation
 polling
 token passing
(c) Channelization: - Channelization is a multiple access method in which the available bandwidth of a link is shared
in time, frequency, or through code, between different stations.
Method of channelization: -
(a) Frequency Division Multiple Access (FDMA): - In FDMA, the available bandwidth is divided into frequency
bands. Each station is allocated a band to send its data in other wards, each band is reserved for a specific
station, & it belongs to the station all the time. Each station also uses a band pass filter to confine the
transmitter frequencies to prevent station interferences, the allocated bands are separated from one another
by small guare bands.
FDMA specifies a predetermined frequency band for the enter period of communication. The
means that stream data can easily be used with FDMA.
FDMA is an access method in the data link layer. In each station tells its physical layer to
make a band pall signal from the data passed to it. The signals must be created in the allocated band
there is no physical multiplexer at the physical layer. The signals created at each station are
automatically band pass filtered. They are mixed when they are sent to the common channel.
(b) Time Division Multiple Access (TDMA): - In TDMA, the station share the bandwidth of the channel in time.
Each station is allocated to a time slot during which it can send data. Each station transmits its data, in is
assigned time slot.
TDMA lies in achieving synchronization between the different stations. Cache station needs to know
the beginning of its slot & the location of its slot this may be difficult because of propagation delays
introduced in the system if the station are spread over a large area. To compensate for the delays, inserting
guard times synchronization is accomplished by having some synchronization bits at the beginning of each
slot.
TDMA is an access method in the data link. The data link layer in each station tells its physical layer
to user the allocated time slot there is no physical multiplexer at the physical layer.
(c) Code Division Multiple Access (COMA): - In CDMA, one channel carries all transmission simultaneously
but having no timesharing.
CDMA simply means communication with different codes. If a station needs to send a 0 bit, it
encodes it as -1 ; if it needs to send a 1 bit, it encodes it as +1 & when a station is idles, it senda no signal
which is interpreted as a ‘0’.
Properties of orthogonal sequence: -
 Each sequence is made of N elements, where N is the no. of stations.
 If we multiply a sequence by a no; every element in the sequence is multiplied by that element.
This is called multiplication of a sequence by a scalar. i.e. - [ +1+1-1-1 ] = [ +2+2-2-2 ]
 If we multiply two equal sequence element by element add the results, we get N, where N is the
no. of elements in the each sequence. This is called the inner product of two equal sequences. i.e. -
[+1+1-1-1] . [+1+1-1-1] = 1+1+1+1 = 4.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 If we multiply two different sequence, element by element & add the results. We get 0. This is
called inner product of two different sequences. i.e.: - [+1+1-1-1] . [+1+1+1+1] = 1+1-1-1 = 0
 Adding two sequences means adding the corresponding elements. The result is another sequence.
i.e. - [+1+1-1-1] + [+1+1+1+1] = [+2+200].
Spread Spectrum: - Spread spectrum combines signals from different sources to bit into a latger bandwidth. It is
designed to be used in wireless communication (LANs & WANs).
To achieve bandwidth efficiency, spread spectrum techniques add redundancy; they spread the original
spectrum needed for each station. If the required bandwidth for each station is B, spread spectrum expands it to Bss,
such that Bss>>B. The expanded bandwidth allows the source to corp. its message, in a protective envelope for a mare
secure transmission.
Two principles for achieving goals of spread spectrum: -
 The bandwidth allocated to each station needs to be. By for larger than what is needed. This allows
redundancy.
 The expanding of the original bandwidth B to the bandwidth Bss must be done by a process that is
independent of the original signal. In other worked. The spreading process occurs after the signal is created
by the source.
Two techniques to spread the bandwidth: -
(a) Frequency Hopping Spread Spectrum (FHSS): - The FHSS technique uses M different carrier frequencies that are
modulated by the source signal. At one moment, the signal modulates one carrier, frequency, at the next moment,
the signal modulates another carrier frequency, although the modulation is done using one carrier frequency at a
time, M frequencies are used in the long sun. The bandwidth occupied by a source after spreading is BFHSS >> B.
Layout for FHSS: -
Pseudorandom code
generator, called Pseudo random
noise (PN), creates a K-bit pattern
for every happing period Th. He
frequency table uses the pattern
to find the frequency to be used
for this hopping period & passes
it to the frequency synthesizes.
The frequency synthesizer creates
a carrier signal of that frequency
& the source signal modulates the
carrier signal.
(b) Direct Sequence Spread Spectrum (DSSS): - The DSSS technique expands the bandwidth of the original signal in
DSSS. We replace each data. Bit with n bits is assigned a code of n bits, called chips, where the chip sale is n times
that of the data bit.
Layout of DSSS: -
Digital Hierarchy: - Telephone companies
implement TDM through a hierarchy of digital
signal, called digital signal service of Digital
Hierarchy.
United States, ANSI standard & Europe IIU-I standard is called the synchronous optical network
(SONET) & Synchronous. Digital Hierarchy (SDH) respectively. SONET/ SDH are a synchronous n/w using
synchronous TDM multiplexing. All clocks in the system are locked to a master clock.
Architecture of SONET/STD: -
(a) Signals: - SONET defines a hierarchy of electrical signaling levels called synchronous transport signals (STSD)
each STS levels (STS-1 to STS-192) supports a certain data rate, specified in megabits per sec. the corresponding
optical signals are called optical carriers (OCS). SOH Specifies a similar system called a synchronous transport
module (STM). STM is intended to be compatible with existing European hierarchies such as E-lines & with STS
levels.
SONET/SDH rates: -
STS OC Rate (Mbps) STM
STS – 1 OC – 1 S1 – 840
STS – 3 OC – 3 155.520 STM – 1
STS – 9 OC – 9 466.560 STM – 3
STS – 12 OC – 12 622.080 STM – 4
STS – 18 OC – 18 933.120 STM – 6
STS – 24 OC – 24 1244.160 STM – 8
STS – 36 OC – 36 1866.230 STM – 12
STS – 48 OC – 48 2488.320 STM – 16
STS – 96 OC – 96 4976.640 STM – 32

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
STS - 192 OC - 192 9983.280 STM - 64
(b) Devices: - Basic devices for SONET transmission:
(i) STS Multiplexer/Demultiplexer: - They mark the beginning points & end points of a SONET link. They
provide the interface between an electrical tributary network & the optical network. An STS Multiplexer
multiplexes signals from multiple electrical sources & creates the corresponding OC signal. An STS
Demultiplexer demultiplexes an optical signal into corresponding electrical signals.
(ii) Regenerator: - It extends the length of the links. A regenerator is a repeater that takes a received optical signal,
demodulates it into the corresponding electrical signal, regenerates the electric signal & finally modulates the
electric signal into its correspondent optical signal. A SONET regenerator replaces some of the existing
information with new information.
(iii) Add/Drop Multiplexer: - It allows insertion and extraction of signal.
(iv) Terminals: - It is a device that uses the services of a SONET network.
(c) Connections: - The devices are connected using section lines & paths.
(i) Sections: - A section is the optical link connecting two neighbour devices like Multiplexer to Multiplexer,
multiplexer to regenerator or regenerator to regenerator.
(ii) Lines: - A line is the portion of the network between two Multiplexer like STS Multiplexer to Add/Drop
Multiplexer, two add/drop Multiplexer, or two STS Multiplexer.
(iii) Path: - A path is the end to end portion of the network between STS Multiplexers.
Network using SONET equipment: -

Network fundamentals
AN OVERVIEW OF NETWORKING
A network is a group of computers connected in some fashion in order to share resources. A group of
computers in a network provide greater storage capacity and processing power than that by standalone independent
machines. In addition to computers, a network also consists of peripheral devices with carriers and data
communication devices used for the purpose of exchanging data and information.
By using computer networks, the cost of data transfer can be made cheaper than other conventional means
like telegrams etc. as computers can send data at a very fast speed. Thus, computers enable us to reduce both cost and
time in transferring data. In a network, computers of different make can be connected together and users can work
together in a group. Software packages have been developed for group working in Data Base Management (DBMS)
and graphical artworks. Also, data from different departments located at distant places can be transferred to and
stored on a central computer. This data can then be accessed by the computers located in different departments. The
data at the central computer is updated and accessed by all users. This prevents any bottlenecks in the smooth
functioning of the organization because all the users will get the latest information (for example, inventory) stored in
the central computer.
Communication Switching Techniques: - In a WAN two devices are not connected directly but a network of
switching nodes provides a transfer path between the two devices. The process of transferring data block from one
node to another is called data switching. There are following types of switching techniques: -
 Circuit Switching – In Circuit Switching, there is a dedicated communication path between the sending and
receiving devices.
A circuit switched
network is made of a set of
switches connected by
physical links in which
each link is divided into n-
channels.
Circuit switching
takes place at the physical
layer. In this, data are
continuous flow sent by

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
the source station & received by the destination station, although there may be periods of silence. There is no
addressing involved during data transfer.
Switching at the physical layer in the traditional telephone network uses the circuit switching approach.
Workstation – It is a basically a PC or printer or other sharable resources. Workstation is also called a terminal or
data access point of a network.
The dedicated path is a sequence of links between switching nodes.
Circuit Switching involves three steps:
(a) Circuit Establishment
(b) Signal Transfer
(c) Circuit Transfer
Circuit Switching is mainly used for voice based network. It is not effective for data communication.
 Message Switching – In message switching, it is not necessary to establish a dedicated path between a sending
and receiving devices. In message switching, the sending device spends destination address to the message and
passes to the network. The message is then passes through the network from one node to another until reaches to
its destination. Each switching nodes receives the message stored it and then transmit it to the next node.
Examples of message are email etc.
 Packet Switching – Packet Switching combines the advantage of message and circuit switching but it is
functionally similar to message switching. There are two approaches to packet switching.
In data communication, the message is going to pass through a packet switched network & it needs to be
divided into packets of fixed or
variable size.
In packet switching,
there is no resource allocation
for a packet. This means that
there is no reserved bandwidth
on the links & there is no
schedule processing time for
each packet. Resources are
allocated on demand. The
allocation is done one a first
come, first served basis.
In packet switched network, each packet is treated independently of all others. Even if a packet is part of
multi-packet transmission, the network treats it as though it existed alone. Packet switching is normally done at
the network layer.
[Node – Node is a service provides of a network to particular region. The workstations are connected with the
node.]
DATAGRAM
A datagram is a packet that is sent over a network using a connectionless service, i.e. a network where the
delivery of data does not depend on the maintenance of connections between the communicating computers. In the
next Chapter, you will learn that a protocol called User Datagram Protocol (UDP) handles such connectionless
services. These services do not guarantee that the datagrams will be delivered without error, without duplication or
loss and in the same serial order in which they were sent. They only guarantee a "best effort" delivery of datagram.
VIRTUAL CIRCUIT
In a circuit-switching network, making a connection actually means a physical path is established from the
source to the destination through the network. In a virtual circuit network, when a circuit is established, what really
happens is that the route is chosen from source to destination, and all the switches (that is routers) along the way
make table they can route any packets on that virtual circuit. They also have the opportunity to reserve resource for
the new circuit.
When a packet comes along, the switch inspects the packet's header to find out which virtual circuit it belongs
to. Then it looks up that virtual circuit in its table to determine which communication line to send. They are also
known as switched virtual circuit.
CONNECTIONLESS AND CONNECTION ORIENTED COMMUNICATION
In a connection oriented service, a logical connection is established between the two communicating
computers. The TCP protocol (discussed in a later Chapter) is used in such a communication. It guarantees error free
delivery of messages without loss or duplication. The packets are received in the same serial order in which they were
sent. The connection is established by a three-way handshake: In this method, before the sending device can send data
to the receiving device, the former must determine the availability of the latter and a network pathway must be
discovered on which the data can be sent. This is known as connection establishment. It normally involves the
following steps:
 The sender sends a connection request packet to the receiver.
 The receiver, if available, returns a confirmation packet (acknowledgement) to the sender.
 The sender then returns an acknowledgement of this confirmation packet.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Once the connection is established, the packets are sent in order, and their acknowledgements from the
receiving device are also received in that same order. After the communicating computers finish off with the sending
and receiving, the connection is terminated. Connection termination also involves full confirmation between both the
communicating devices, as in connection establishment.
In a connectionless communication, there is no maintenance of connection between the two devices. Each data
packet (preferably called as 'datagram) takes its own path and reaches the destination. There is also no guarantee that
datagrams will be received error-free and in the same order in which they are being sent. Also no connection
establishment and termination are required.
CELL SWITCHING (ATM)
Many of the problems associated with packet switching are solved by adopting a concept called Cell
Switching. A cell is a small data unit of fixed size unlike packets which have variable sizes.
1. Cell Network - A network that uses a cell as the
basic unit of data exchange is called a cell
network. When packets of different sizes and
formats reach a cell network, they are split into
small data units of equal length and loaded into
cells. The cells are then multiplexed (given in
Figure) with other cells and routed through the
cell network.
2. Cell Switching - ATM uses switches to route
cells from source to destination. It normally uses
the following types of switches:
 VP switch - A virtual path (VP) switch routes the cell using only the Virtual Path Identifier (VPI) for
identification.
 VPC switch - A VPC switch
routes the cell using both VPI
and VCI.
3. Segmentation and Reassembly of
Cells - In order to address the issue
of segmentation and reassembly, a
protocol layer was added in between
the ATM and packet protocols such
as IP (Internet Protocol). This layer is
known as ATM Adaptation Layer
(AAL). The AAL header contains the
necessary information to reassemble
the cells into the original packet.
The packet that passes down to the AAL is encapsulated by adding a header and a trailer. The resulting
encapsulated packet is then fragmented into cells.
Packet header consists of the following fields:
 8 bit Common Part Indicator (CPI) - It determines which version of the packet format is being used. Currently
only value 0 is defined.
 8 bit Beginning tag (Btag) - The Beginning tag must match with the End tag (Etag) of the trailer for a given
packet. This helps in the reassembly of the cells into packet. It prevents the situation in which the loss of the
last cell of one packet and the first cell of another packet causes the two packets to be joined into a single
packet.
 16 bit Buffer Allocation Size (BASize) - It represents as to how much space to allocate for the reassembly.
Packet trailer consists of the following fields:
 Pad field - Pad field is used to pad the user data to a multiple of 3 bytes. This ensures that the trailer, along
with the 8 bit 0-filled field, is aligned on a 32-bit boundary (4 byte), making it of constant size for efficient
processing.
 8 bit End tag (Etag) - It contains a value equal to the value in the
Btag field.
 16 bit Len – It contains the length of the packet.
NETWORK TOPOLOGIES
Topology is the method in which networks are physically connected
together. Topology determines the complexity of connecting computer, the
strategy for physically expanding the network, in future. There are three
type of topology is used: -
(i) Bus Topology: - Bus topology is a network geometric arrangement in
which a single connecting line is shared by a number of nodes. In linear
bus topology, all computers are connected by a single length of cable

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
with a terminator at each end. Each node is connected to two others except the machines at either end of the cable,
which are connected only to one other node. Examples of Bus Topology are Ethernet, Local Talk etc.
Advantage of Bus Topology:
(a) This topology is simple, reliable, and easy to use and understand in small sized LANs.
(b) This topology requires least amount of cable to connect the computers together.
(c) This type of topology is easy to extend.
(d) This topology is less expensive than other cabling arrangements.
Disadvantage of Bus Topology:
(a) There is possibility of collision, thus in this case data packets may be lost.
(b) Heavy network traffic can slow down a bus considerably.
(c) It is difficult to troubleshoot a bus.
Examples of Bus Topology: -
 Ethernet - Ethernet, invented in 1973 by Bob Metcalfe (who later formed a new company called 3 Com, one of the
most successful networking companies), was a way to circumvent the limitations of earlier net- works. It was
based on IEEE (Institute of Electronic and Electric Engineers) standard called 802.3 CSMA/CD, and it provided
for ways to manage the crazy situation that occurred when many computers tried to transmit on one wire
simultaneously.
 LocalTalk - LocalTalk is a data link protocol built into the Macintosh RS-449/RS-422 serial interface. It forms a
part of the AppleTalk protocol suite. Appletalk is a suite of networking protocols that work together to provide
file and print sharing services to Macintosh networks. AppleTalk enables users to share folders and printers for
access by other network users.
(ii) Ring Topology: - Physical layout of Ring Topology based LAN is circular. Means that each workstation is
connected with it neighbors. Transmission can be done in only one direction, either clockwise or anticlockwise. It
is decided at the time of network design.
Token Passing: - It is a mechanism i.e. used with Ring Topology based LAN to make transmission possible
between two or more work stations.
Token is nothing but a small program. When network is on, this program starts moving from one
node to another in specific direction.
If a work station has to access the service of network, then it has to
wait for token. Once token becomes available to the node, it grabs the token make
its transmission /work, after completion of transmission, it has to release the
token.
Advantage of Ring Topology:
(a) Installation cost of Ring Topology may cheaper.
(b) No one computer can monopolize the network.
(c) The fair sharing of the network allows the network to degrade gracefully
as more users can added.
Disadvantage of Ring Topology:
(a) Failure of a node may interrupt the system.
(b) It is difficult to troubleshoot a ring network.
(c) Adding or removing computers disrupts the network.
Example of Ring Topology: -
 IBM Token Ring - Ethernet CSMA/CD networks provide a relatively simple way of passing data. However,
CSMA/CD breaks down under the pressure exerted by many computers on a network segment. In order to over-
come this problem, IBM and the IEEE created another networking standard called IEEE 802.5. 802.5 is more
commonly known as Token Ring network topology.
 FDDI (Fiber Distributed Data Interface) - FDDI (Fiber Distributed Data Interface) is another ring-based network.
FDDI networks run on optical fiber cables instead of copper cabling. It uses fiber-optic cables to implement very
fast; reliable networks. FDDI also- uses the 802.5
method of operation.
FDDI is a high performance fiber optic
token ring LAN running at 100 Mbps over
distances up to 200 km with up to 1000 stations
connected.
It can be used in the same way as any of
the other LANs, but with its high bandwidth,
another common use is as a backbone to connect
copper LANs.
How FDDI Works? FDDI (like Token Ring) uses
token-passing schemes to control network
access. But, unlike Token Ring, several FDDI
devices can transmit data simultaneously. Like

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Token Ring, a token is passed around the ring, and the possessor of the token is allowed to transmit FDDI frames.
Unlike Token Ring, a FDDI network may have several frames simultaneously circulating on the network. This is
possible because the possessor of the token may send multiple frames, without waiting for the first frame to
circulate all the way around the ring before sending the next frame.
(iii) Star Topology: - Star Topology based LAN based on an electronic device namely Hub. All terminals including
server are connected with central Hub. A Hub receives the signal from source and sends it to the destination.
Example of Star Network is ATM (Asynchronous transmission Mode). There are two types of Hub: -
(a) Active Hub: - The active hub regenerates the electrical signal and sends it to all connected computers.
(b) Passive Hub: - Passive hub doesn’t generate electrical signal but acts as a connecting point.
Advantage of Star Topology:
(a) It is easier to modify i.e. easy to add new terminal and easy to remove a particular terminal from a
network. It doesn’t disturb/affect the network.
(b) It is easy to troubleshoot.
(c) Failure of a single terminal doesn’t interrupt the whole network.
(d) To install this network several types of cables can be used.
Disadvantage of Star Topology:
(a) Failure of central hub interrupts the whole network.
(b) It is considered as expensive network.
(c) Additional resources are required in
case of broadcast implementation.
Example of Star Network –
ATM (Asynchronous Transmission Mode) - ATM
networking is the newest topology available at this
time. Unlike others, it can carry both voice and data
over network wire or fiber. ATM transmits all
packets as 53-byte cells, that have a variety of iden-
tifiers on them to determine such things as Quality
of Service.
ATM is capable of extremely high-speed
routing. At the lowest, it runs at 25 megabits per
seconds. At the fastest, it can run up to 622
megabits per second. In addition to its speed, ATM
is more complex than either Ethernet or Token
Ring. Presently, Fore Systems and IBM have both
invested very heavy amount in ATM-to-the-
desktop technology. That means, they use ATM to link servers and workstations and are banking on the need for
multimedia networks over the next several years.
How ATM Works? ATM communicates with cells rather than transmitting frames. Instead of specifying the source
and destination addresses of the stations communicating, an ATM cell indicates the path the data will flow through.
Small cells all of the same size is used to make it easy for devices to process a cell, so intermediate devices (called
switches) can maintain a very high data rate.
On an ATM network, every station is always transmitting. However, most of the cells transmitted are empty
cells that can be discarded at the switch. When a cell that is not empty enters the switch, the addresses are read to
determine where the cell will go next. The cell is then sent out in the next available slot, according to the type of cell it
is.
Role of ATM in Internetworks ATM has emerged as one of the technologies for integrating LANs and WANs. ATM
can support any traffic type in separate or mixed streams, delay-sensitive traffic, and non-delay-sensitive traffics as
shown in Figure. ATM can also scale from low to high speeds. It has been adopted by all the industry's equipment
vendors, from LAN to private branch exchange (PBX). With ATM, network designers can integrate LANs and WANs
to support emerging applications with economy in the enterprise.
Network designers are deploying ATM technology to migrate from Time Division Multiplexing 1TDM)
networks for the following reasons:
 To increase WAN bandwidth
 To improve performance
 To reduce down time

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy

Osi model and tcp/ip suite


Network Architecture: - Network Architecture deals with the physical connection, i.e. topologies, access methods and
connection protocols. Some examples of network architectures are:
 Ethernet
 Token ring
 AppleTalk
 ARCNET
 ATM etc.
Need for Layered Solutions: - Layered approach provides the following advantages:
 Each layer needs to know and worry only about the functions in its domain. Functioning of other layers is
hidden from it.
 Each layer performs a function independent of the other layers. This enables software developer to develop a
software component for a particular layer.
 A layer can be modified, if needed, without affecting other layers. Application Layer
 Software packages confirming to the standards of a particular layer are
able to use the softwares at other layer to communicate with each other.
Open System Interconnection (OSI) Model: - Main objectives of OSI Models Presentation Layer
are: -
 Allow to interconnected two systems through standard interface.
 Each layer performs a well-defined function.
Session Layer
 The function of each layer should be chosen according to international
standard protocols. Transport Layer
 Each lower level protocol provides its services to higher-level protocol.
 The seven layers of OSI reference Model are: -
1. Physical Layer: - All electrical and mechanical devices, these are used to Network Layer
connect two terminals, two nodes, medium etc. considered as the devices of
physical layer. Data Link Layer
In other words mostly hardware is categorized into physical layer.
These are involved in interconnecting two points of a network as well as
carry bit stream. Physical Layer
2. Data Link Layer: - The Data Link Layer is the second layer of OSI Model. The
Data Link Layer together with physical layer and the interconnectivity OSI STACK
medium provide a data link connection between source station and destination station for reliable transfer of
database.
Services provide by Data Link Layer: -
 Flow Control – Flow Control deals with how to keep the fast sender from over flowing a slow receiver by
buffer at the receiver sides and acknowledgement.
Retransmission Strategies
(ix) Stop and Wait – the sender allows one message to be transmitted checked for errors and an appropriate (ack-
positive or Nak – negative acknowledgement) returned to the sending station. No other message can be
transmitted by the sender until receiving station sends back a reply.
(ii) Sliding Window – The sender (sending station) maintains a sending window that maintains number of
frames (packages), it is permitted to send to the receiving station and the receiving station (Receiver)
maintains a receiving window that performs some necessary check up. There are two sliding window
techniques:
(a) Go Back N – This is a sliding window technique. It allows data and control message to be transmitted
continuously without for its acknowledgement from the receiver. In the case of error detection at the

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
receiving slide, the message with error retransmitted, as well as all other frames were transmitted
after the erroneous message.
(b) Selective Repeat – this approach is considered as refined approach in contrast to the Go back N. the
only message retransmitted is those for which NAK is received. Selective Repeat Mechanism
produces greater through put than the Go Back N.
 Framing – Some control bits are added to the data packets these are received from network layer. The bits are
associated with start and end frames.
 Error Detection and Correction Course – Various methods are use for such purpose. Some popular methods
are parity bit, checksum etc.
3. Network Layer: - The Network Layer provides services to the transport layer. It can be based on ether virtual
circuits or data grams. In both cases its main job is routing packets from source to destination. In case of virtual
circuit subnet, a routing decision is made when virtual circuit is setup.
In case of datagram subnet, routing decision is made on every incoming package.
Many Routing algorithms are used in computer Network. All algorithms are categorized into two
categories:
(i) Static Routing Algorithm – Static Routing algorithm dies not decide there routing decision on measurement of
current traffic and topology. Where as dynamic routing algorithm changes their routing decisions on current
traffic and topology.
The function of Network Layer is routing packets from source machine to destination machine. In
most subnets packets will require multiple hops to reach the destination.
Network Layer also manages congestion. To control congestion several algorithms are provided.
When too-many packets are present in the subnet the performance degrades. This situation is called
Congestion.
Subnet can be become congested increasing the delay and lowering the through put for packets.
Network designers attempt to avoid congestion by proper design. If congestion occurs it must be dealt.
Congestion can be bought about by several factors: -
 If all of a sudden, streams of packets begin arriving from three for four lines and all need the same
output line, queue is build up. If there is insufficient memory to hold of them, packets will be lost.
 Slow processor can also caused congestion. If the routers are slow at performing routing decision.
 Low bandwidth lines can also cause congestion.
Comparison of virtual circuit and Datagram Subnet: -
 Virtual circuits allow packets to contents circuit numbers only, where as datagram allow packets to
content full destination address.
 Using virtual circuits requires a setup phase, which takes time, where as with datagram such process
is not required.
 Virtual circuits have some advantages in avoiding congestion with the subnet because resources can
be reserved in advance at the time of connection establishment, where as congestion is a potential
problem with datagrams.
 Virtual circuits have a problem, if a router crashes and loses its memory, all the virtual circuits
passing through it will have to aborted, where as such type of problem will not arise with datagrams.
 Virtual circuits and datagrams both allow the router to balance the traffic.
4. Transport Layer: - This Layer is responsible provide reliable cost effective data transport from source machine to
destination machine. Transport Layer also provides some additional services associated with data transportation.
Two protocols are used with transport layer to provide such services. These are: -
 TCP (Transmission Control Protocol) – This protocol provides a highly reliable connection oriented end to
end transport service associated with the layer no four of OSI-Model. During transportation TCP adds some
additional information to the data packet i.e. associated with transportation service, called TCP header.
Source Port no. Destination Port no.
Sequence No.
Acknowledgement No.
TCP U A P R E F
Space

Header R C S S Y I
Free

Window Size
Length G K H T N N

Checksum Urgent pointer


Data
Fig: - TCP Segment
Source and Destination Port – Values of this field identifies the local port no.
Sequence no. – Sequence no. identifies the current sequence no. of data segment.
Data Offset – Values of this field identifies the start of data.
Flags – Shows individual status:
(a) URG (Urgent Flag) – Value of this field identifies the urgent pointer. It is considered as Urgent Flag.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
(b) ACK (Acknowledgement Flag) – Value of this field associated with acknowledgement of the packet.
(c) PSH (Push Flag) – Push Flag performs push function.
(d) RST (Reset Flag) –
(e) SYN (Sequence Synchronization Flag) – The value of this field associated with sequence
synchronization.
(f) FIN (Final Flag) – End of Transmission Flag.
Window Size – This field contains the values associated with strength of destination station, How many byte
(data block) the receiving host can accept at a time.
Checksum – Checksum for data end header.
Urgent Pointer – The value of this field identifies specific type of data area.
 UDP (User Data Protocol) – The protocol supports connectionless transportation with internet protocol. The
Protocol encapsulates all the necessary information with data packet to transport them from source to
destination, without having to establish a connection.
UDP Segment (the packet i.e. segmented by UDP) consist of header followed by the data in UDP
header source code no. and destination port no. are also available like TCP header, which contains address of
source machine and address of destination machine. UDP length field contains the value which includes
header length + data length. The UDP Checksum field contains the value i.e. helpful in checking the errors at
destination station. It functions like checksum of TCP header. Some options fields are also available with UDP
header.
5. Session Layer: - Main functionality of this layer is to establish and release the session. The session layer allows
users on different machines to establish session between them. Session can allow going both directions. One of the
services of the session layer is to manage dialog control.
6. Presentation Layer: - Presentation Layer mainly manages the formats of information.
7. Application Layer: - Several protocols are available under this layer. Large number of terminals are connected
with the system and requires verify of services.
(i) DNS – Domain Name System is a mechanism which high level name and converts it into machine
understandable form. Domain Name System is helpful in assigning the high level name for several machines.
Domain Name System maintains the domains in hierarchical order. This mechanism is implemented with
TCP/IP internets. Domain Name categorized into mainly two categorized:
(a) Geographic – Example of this is .in, .ch, .jp, .us
(b) Non-Geographic – Example of this is .com, .org, .edu, .net, etc.
(ii) Email – Email is a popular service provided by the largest network internet. It is basically a program which
enables us to send and receive message to and from world wide.
Email is popular because it provides fast, convenient method of transferring information. The major
characteristics of Email are:
 Store and forward
 Delivery time ranging from few sec. to hours
 Supports multimedia service
 Secure mailing
 Auto processing
(iii) FTP (File Transfer Protocol) – This protocol provides method of transferring files over internet. FTP transfer
files to and from a remote network sites. FTP provides several commands to transfer differents formats of files
from one host to another. It also supports transferring of compressed files.
(iv) World Wide Web (WWW) – Basically WWW is a system for linking hypertext document. Each document is
a web page written in Hypertext Markup language and link between documents is called hyperlink. A
browser can display the page by establish a TCP connection to its server. Browser asking for document to the
server and closing the connection. In easily days gopher is used in place of WWW.Gopher provides all the
implementation in the form of menus. So user has to access the service using such menu items.
Characteristics of WWW: -
 Fastest growing discovery and retrieval system.
 Considered as navigational system based on hyperlink.
 State-less interaction between client and server confirming to http (Hyper Text Transfer Protocol).
(v) Telnet – Telnet is a program that allows us to establish a virtual terminal connection between two machines
using TCP/IP. For this we must have its internet address or host name of computer.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
TCP/IP Suite (TCP/IP Protocol): - TCP reference model is implemented with or suitable form those computer
network architecture that allow communication across multiple divers network. TCP/IP network architecture consists

of four layers:-
Application Layer: - The Application Layer provides services that can be used by other applications for example
protocols have been developed for remote login, for e-mail, for file transfer etc. The application layer program run
directly over the transport layer.
Transport Layer: - Two basic services are provided by this layer: -
The first service consists of reliable connection oriented transfer of byte stream, which is provided by TCP.
The second service consists of connectionless transfer of individual package i.e. provided by UDP. UDP is used for
applications that require quick but reliable delivers.
The TCP/IP Model doesn’t require strict layering. In other words the application layer has the option of by
passing intermediate layer.
Internet Layer: - The Internet layer handles the transfer of information access multiple networks through the use of
gateways or routers. It has similar function as network layer of OSI Model. A key aspect of the Internet layer is the
definition of global unique address for the machines that are attached with the Internet. The Internet layer provides a
single service namely best effort connectionless packet transfer. For this packets are also called data grams. The
connectionless approach makes the system robust i.e. if failures occur in the network the packets are routed around
the point of failure. There is no need to setup the connection.
Network Interface Layer: - Network Interface Layer is concern with the network specific aspects of the transfer of
packets. It must deal with port of network layer and data link layer. The network interface layer is particularly
concern with the protocols that access the intermediate networks.
TCP/IP Services and Application Protocols: -
 Client Server Model – In this model, transaction responsibilities are divided into two parts: client and server.
Clients rely on servers for services such as file storage, printing, and processing power. Client is a PC running
front-end software that knows how to communicate with the server. This model improves performances.
 Telnet – Previously Described.
 File Transfer Protocol (FTP) – Previously described.
 Trivial File Transfer Protocol (TFTP) – This protocol is nofrills, unauthenticated protocol used to transfer files.
TFTP depends on UDP and often is used to boot diskless workstations.
 Simple Mail Transfer Protocol (SMTP) – This protocol is a TCP/IP protocol that specifies how computers
exchange electronic mail. It works post office protocol, and is one of the reasons that Internet E-mail functions so
well.
 Network File System (NFS) – This is a distributed file system protocol suite developed by Sun Microsystems that
allow to remote file access across a network. It allows all network users to access shared files stored on computers
of different types.
 Simple Network Management Protocol (SNMP) – This is a network management protocol for TCP/IP networks.
SNMP provides a means to monitor and control network devices, and to manage configurations, statistics
collection, performance, and security. It specifies how nodes are managed on a network, using agents to monitor
network traffic and maintain a management information base.
 Domain Name System (DNS) - Previously described.
 Internet Control Message Protocol (ICMP) – This is an integral part of the IP that handles error and control
message. Specially routers and hosts use ICMP to send reports of problem about datagram, back to the original
source that sends to the datagram.
 Internet Group Management Protocol (IGMP) – This protocol is mainly used with multicast network to group the
members, used by host.
 Address Resolution Protocol (ARP) – This protocol is used as a device driver which accepts packets from internet
layer and converts the packet into Ethernet format.
 Reverse Address Resolution Protocol (RARP) – This protocol performs the same function as ARP does but in
reverse, that is given an IP address, it determines the corresponding physical address.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Data Transmission By TCP and Ethernet: - Ethernet and TCP/IP works together well. Ethernet provides the physical
cabling (layers 1 and 2 of OSI model) and TCP/IP the communications protocol (layers 3 and 4 of OSI model).
TCP/IP uses 32-bit IP addresses to identify a node and the network to which it is attached to. IP addresses are
unique, 4 byte addresses that must be assigned to every addressable device or node on the internetwork.
TCP receives the stream of bytes from the upper -Application layer and assembles them into TCP segments,
or packets. In the process of assembling, header information is attached at the front of data.
Header information includes a checksum as well as a packet sequence number (if there is more than one
segment in the entire message).
A connection (Virtual circuit) is established between the sending and receiving machines. The sending TCP
software issues a request for a TCP connection with the receiving machine. The receiving TCP software adds its own
unique socket number to the request message and sends it back to the original machine. A connection is thus
established between the two machines.
If the message is more- than one TCP segment long, the receiving TCP software reassembles the message
using the sequence numbers contained in each segment's TCP header. If a segment is missing or corrupt (which can be
determined from the checksum), TCP returns a message with the faulty sequence number in the body. The originating
TCP software can then resend the bad

segmen t.
The address resolution protocol (ARP) associates an IP address with the physical address. On a typical
physical network, such, as a LAN, each device on a link is identified by a physical or station address usually
imprinted on the network interface card (NIC). ARP maintains tables of
name-to-address mappings.
RARP (Reverse Address Resolution Protocol) performs the same
function as ARP does but in reverse, that is given an IP address, it
determines the corresponding physical address.
Data Encapsulation: - The data from the application program is encapsu-
lated into the TCP segment. This means that the data in a TCP segment is
the data from the application program. The IP datagram encapsulates this
TCP segment. Thus, means the TCP segment forms the data part of the IP
datagram. The IP datagram is sent along the physical wire, encapsulated in
the Ethernet frame (or any other LAN frame). That is, IP datagram is
transported as the data of the frame. This process is known as data
encapsulation. The same process gets reversed at the receiver side. This is
known as data decapsulation.
Data Routing: - The IP protocol in the TCP/IP suite is responsible for
routing the data packets to its destination. Routing means finding the
route (next hop) for a data-gram. If the destination node is on the same
network as the source node, the delivery is direct. In direct delivery, the
sender can compare the destination address with the addresses of the
computers to which it is connected to. If a match is found, the packet is
delivered to the same.
If the destination host is not in the same network as the sender, the delivery is indirect. In the indirect
delivery, the packet goes from router to router until it reaches the network of the destination host. In indirect delivery,
the sender uses the IP address of the destination computer and a routing table. The routing table is used to find the IP
address of the router to which the packet should be sent to.
Error Reporting Mechanism – Internet Control Message Protocol (ICMP): - This is an integral part of the IP that
handles error and control message. Specially routers and hosts use ICMP to send reports of problem about datagram,
back to the original source that sends to the datagram.
ICMP detects error conditions such as internet work congestion and downed links and notifies IP and upper-
layer protocols so packets can be routed avoiding problem areas.
ICMP does not correct errors but simply reports them. ICMP are encapsulated inside IP datagram before they
are sent over the network. Five types of errors are reported by ICMP. These are: -
(a) Destination Unreachable

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
(b) Source Quench (Destination overwhelmed with datagrams)
(c) Timeout exceeded
(d) Parameter problems
(e) Redirection
Internet Architecture: - Internet is an interconnection of multiple networks. The word internet (lowercase i) is
different from Internet (uppercase I). While internet means network of networks, Internet is the term used to refer to a
specific worldwide network, WWW (World Wide Web).
Internetwork (internet) consists of multiple networks in which LANs are
attached to other LANs, other communications networks, remote sites, individual
stations— and -Wide Area Networks (WANs). It permits data to move freely 'among
large numbers of networks and populations.
All internetworks, including the Internet, have a layered architecture. Internet
has four layers. These are as follows:
(a) Subnetwork Layer - All the machines connected together in a local area network
(LAN) reside in this layer.
(b) Internetwork Layer - This layer provides the functionality for communications
between networks through gateways. Each sub network uses gateways to connect to the
other sub networks in the internetwork. The internetwork layer is where data gets transferred from gateway to
gateway until it reaches its destination and then passes into the sub network layer. The internetwork layer runs the
Internet Protocol (IP).
(c) Service Provider Protocol Layer - This layer is responsible for the overall end-to-end communications of the
network. This is the layer that runs the Transmission Control Protocol (TCP) and other protocols. It handles the data
traffic flow itself and ensures reliability for the message transfer.
(d) Application Services Layer - This layer supports the interfaces to the user applications. This layer interfaces to
electronic mail, remote file transfers, and remote access.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy

Data link protocol


PROTOCOL
In sending data from one place to other place, communication requires at least two devices working together,
one to send and one to receive. Such a basic arrangement requires coordination for an intelligible exchange to occur.
For example, in half-duplex transmission, it is essential that only one device transmits at a time. If both devices at the
two ends of the link put signals on the line simultaneously, they collide. The coordination of half-duplex transmission
is part of a procedure called line discipline. This line discipline is one of the functions included in the data link layer of
OSI model.
Besides line discipline, the other important functions in the data link layer are flow control and error control.
These three functions together are known as data link control.
TRANSMISSION CONTROL PROCEDURE
Transmission control is a set of procedures used to control transmission and reception of data between two
communicating devices. This can be divided into two subgroups, namely:
(i) Synchronous Protocols - Synchronous protocols take the whole bit stream and chop it into characters of equal size.
Protocols governing synchronous transmission can be divided into two classes.
 Character-oriented protocols - Character-oriented protocols, also called byte-oriented protocols, interpret a
transmission frame or packet as a succession of characters, each composed of one byte (eight bits). All control
information is in the form of an existing character encoding system such as ASCII coding method.
Character-oriented protocols are not as efficient as bit-oriented protocols and therefore are now
seldom used.
 Bit-oriented protocols - Bit-oriented protocols interpret a transmission frame or packet as a succession of
individual bits, made meaningful by their placement in the frame and by their neighboring bits. Control
information is in the form of one or more bits.
(ii) Asynchronous Protocol - Asynchronous protocol treats each character in a bit stream independently.. Today, these
protocols are employed mainly in modems. A variety of asynchronous protocols developed are:
 XMODEM - XMODEM protocol has an error checking technique that can be used between microcomputers. It
requires that one terminal or computer be set up as the sender and other be set up as the receiver. After the
protocol is started, the transmitter waits for the receiver to send a Negative Acknowledge (NAK) character. The
receiver meanwhile is set to send NAKs every 10 seconds. When the transmitter detects the first NAK, it begins
sending messages as blocks of 128 data characters, surrounded by some protocol control characters. The
beginning of each block is signaled by a Start Of Header (SOH) character. This is followed by a block number
character in ASCII, followed by the same block number with each bit inverted. The bit inversion, known as the 1's
complement, results in the block number being followed by the same block number with each bit inverted. A 128-
character piece of the file is sent, followed by a checksum that is the remainder of the sum of all the 128 bytes in
the message divided by 255. Mathematically, the XMODEM checksum can be represented as:
128

 ASCIIValueofCharacter
1
CHECKSUM = R[ 255 ]
in which R is the remainder of the division process. The receiver checks each part of the received block to confirm
the following:
 Was first character a Start Of Header (SOH)?
 Was the block number exactly one more than the previous block received?
 Were exactly 128 characters of data received?
 Was the locally computed checksum identical to the last character received in the block?
If the receiver is satisfied, it sends an Acknowledge (ACK) back to the transmitter, and the transmitter
sends the next block. If not, an NAK is sent, and the transmitter resents the block found in error. This process is
continued, block by block, until the entire file is sent and verified. At the end of the data, the transmitter sends an
End Of Text character. The receiver replies with an ACK, and the session is terminated.
Limitations of XMODEM Protocol - There are several points to consider about the XMODEM protocol.
 It is easy to implement with a small computer, but it does require a computer at each end.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 It requires manual setup for each file to be transferred.
 The error detection technique (ordinary sum of the data characters) is unsophisticated and unable to detect
reliably the most common type of transmission error, which is a noise burst that can last of the order of 10
milliseconds (the duration of about 12 bits at 1200 bps).
 It is a half-duplex protocol; that is, information is sent, and then the sender waits for a reply before sending
the next message.
 Because operation of the XMODEM protocol generally assumes a full duplex line, it is inefficient in use of the
transmission facility.
Support for XMODEM Protocol - In spite of the previously mentioned limitations, the XMODEM protocol and
several derivatives are supported by most asynchronous communication pro-;-rams designed for operation on PCs.
The rationale for the widespread support of these protocols is dated to the initial placement of the XMODEM protocol
into the public domain.
Most of the asynchronous communications programs developed during the early 1980s eventually included
XMODEM support. In the late 1980s, several derivatives of the XMODEM protocol gained acceptance due to the
increased level of functionality they provided. Some new versions of the XMODEM protocol added CRC error
checking. Other versions provided a full-duplex transmission capability with CRC error detection, thus increasing the
efficiency of the protocol. Today, almost all communication programs designed for use on PCs support XMODEM
and several of its derivatives.
 YMODEM - YMODEM Protocol is similar to XMODEM, with the following differences:
 The data unit is 1024 bytes.
 Multiple files can be sent simultaneously.
 ITU-T, CRC-16 is used for error checking.
 ZMODEM - ZMODEM is a newer protocol combining features of both XMODEM and YMODEM.
 BLAST (Blocked asynchronous transmission) - BLAST (Blocked asynchronous transmission) is more powerful
than XMODEM. It is a full-duplex operation with sliding window flow control. It allows the transfer of data and
binary files.
CHARACTER ORIENTED PROTOCOLS (COP)
There is one type of COP called Binary Synchronous Protocol (Bisync or BSC). BSC stands for Binary
Synchronous Communication protocol. It was developed by IBM in the year 1964. It supports half-duplex
transmission, using stop and wait/ARQ (Acknowledgement Request) flow control and error detection. It does not
support full-duplex or sliding window protocol transmission.
BIT ORIENTED PROTOCOLS (BOP)
SDLC (Synchronous Data Link Control Protocol) and HDLG (High Level Data Link Control Protocol) is the
two bit-oriented protocols. SDLC was developed by IBM. HDLC is one of the ISO designed protocols and has become
the basis for all bit-oriented protocols in use.
Synchronous Data Link Control Protocol (SDLC)
SDLC is a data-link layer protocol developed in the 1970s by IBM for its Systems Network Architecture (SNA)
networking environment. It is primarily used in wide area networks (WANs) that use leased lines to connect
Mainframe SNA hosts and remote terminals.
In a serial SDLC link, data is sent as a synchronous bit stream divided into frames that contain addressing and
control information in addition to the pay- load of data.
SDLC uses a master/slave architecture in which one station is designated as primary (master) and the
remaining stations are secondary (slaves). The primary station establishes and tears down SDLC connections,
manages these connections, and polls each secondary station in a specific order to determine whether any secondary
station wants to transmit data.
SDLC can be used in a variety of connection topologies such as the following:
 Direct point-to-point connections between a primary and a secondary station
 Multipoint
connections between
a primary and a
group of secondary
stations.
High Level Data Link
Control Protocol (HDLC)
This is a protocol to
prevent aliasing error. It
determines where a true
message block begins and
ends and what part of the
message is to be included in
the CRC (Cyclic Redundancy

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Check). It uses bit-stuffing for data transparency.
In HDLC, all information is carried by frames that can be of the following types:
 Information Frames (1-frames)
 Supervisory control sequences (S-frames), or unnumbered command/ responses (U-frames).
Figure shows one information frame as a angular block divided into six fields. These fields are:
 A beginning Flag (F1) field.
 An address (A) field. It is used to identify ME the terminals. It is of 8 bits.
 A control (C) field. It is used for sequence numbers and acknowledgements. It is of 8 bits.
 An information field (I) or data field contain information.
 A frame check sequence (FCS) field. It is situ to CRC.
 A final flag (F2) field.
There are three kinds of controls. Control field Information (I-Frame), Control field for Supervisory (S-Frame) and
control field for Unnumbered frame). The contents are shown in Figure. S-frames and U-frames have the same fields
except that the I field is left out.
The P/F bits stand for Poll/Final. It is used when a computer is polling a group of terminals. When used as P,
the computer is inviting the term send data. All the frames sent by the terminal, except the final one, have the P/F bit
set to P. The final one is set to F.
Transmission Control Procedure Types: - The following are the different transmission control procedure types:
 Non-procedure – Non-procedure protocols are those which do not have any laid down procedure for connecting
two PCs together. Examples include Ethernet, Token ring, Token bus, FDDI etc.
 Basic procedure - Basic Control Procedure protocols include LAPB (Link Access Procedure, Balanced), LAPD
(Link Access Procedure for D channel) and LAPM (Link Access Procedure for Modems).
LAPB is used in balanced configuration of two devices, where both devices are of combined type.
Communication in LAPB is always in asynchronous balanced mode. LAPB is used today in ISDN on B channels.
LAPD is used for control signaling and it also uses asynchronous balanced mode. It is used in ISDN for D
channels.
LAPM is designed to do both synchronous and asynchronous conversion, error-detection and re-
transmission. It was designed to apply HDLC features to modems.
 HDLC Procedure - HDLC supports both half duplex and full duplex communication systems. Systems that use
HDLC can be characterized by their station types, their configuration and by their response modes.
Stations in HDLC are of the following three types:
 Primary Station - A primary station sends commands.
 Secondary Station - A secondary station sends responses.
 Combined Station - A combined station sends both commands and responses.
HDLC supports the following three modes of communication:
 Normal Response Mode (NRM), where secondary station needs permission to transmit.
 Asynchronous Response Mode (ARM), where secondary station does not need permission to transmit.
 Asynchronous Balanced Mode (ABM), where all stations are equal (i.e. all are combined stations) and any station
can initiate transmission.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy

Local area network (lan)


Introduction: - Local area network (LAN) is a group of computers located in the same room, on the same floor, or in
the same building that are connected to form a single network. Local area networks (LANs) allow users to share
storage devices, printers, applications, data, and other network resources. They are limited to a specific geographical
area, usually less than 2 kilometres in diameter.
Advantage of LAN –
 Local area networks allow sharing of expensive resources such as laser printers and high-capacity, high-speed
mass storage devices among a number of users.
 Local area networks allow for high-speed exchange of essential information between key people in an
organization.
 LANs provide the catalyst to increase the range of potential applications for the IBM PCs.
 LANs contribute to increased productivity. A LAN installation should be studied closely in the context of its
proposed contribution to the long-range interests of the organization.
Disadvantage of LAN –
 The financial cost of local area networking is still high in comparison with many other alternatives.
 Local area networking software requires memory space in each of the computers used on the network.
 Users may have difficulty in learning the network commands. The installation and management of a LAN
requires far more technical and administrative skills than installing and managing several computers that are
not networked.
 Some control on the part of the user is lost. You may have to share a printer with other users. You may face a
situation like.
 Some type of security system must be implemented if it is important to protect confidential data.
 Many current application programs will not run in a network environment. The program may require too
much memory or have other technical constraints.
Characteristics of LANs –
 LANs work in a restricted geographical area.
 LANs operate at relatively high speed when compared to the typical wide area networks currently in use.
LAN data transfer speeds may be as high as 80 million bits per second (80 Mbps), or slightly less than 10
million characters
per second (10
Mcps). Compare
this to the maxi-
mum data transfer
speed of 56 Kbps
(7000 Cps) for high-
grade telephone
company digital
trunk lines, or the
1200/2500 bps (120/250 Cps) transmission speed used by most personal computer communications systems.
 LANs are private networks, not subject to tariffs or other regulatory controls.
BASEBAND Vs BROADBAND
Bandwidth use refers to the ways of allocating the capacity of transmission media. The total media capacity or
bandwidth can be divided into channels. A channel is simply a portion of the bandwidth that can be used for
transmitting data. The two ways of allocating the capacity of bounded transmission media are the following:
1. Baseband - These transmissions use the entire media bandwidth for a single channel. Baseband is commonly used
for digital signaling, although it can also be used for analog signals. Most Local Area Networks use base band
signaling.
2. Broadband - These transmissions provide the ability to divide the entire media bandwidth into multiple channels.
Since each channel can carry a different analog signal or digital signal, broadband networks support multiple
simultaneous conversations over a single transmission medium.
MEDIA ACCESS CONTROL: -
The term Media refers to the cabling used for transmitting data from one node to another. Examples of media
in local area networks include Co-axial cabling, Twisted-pair Cabling and Fiber-optic cabling.
MAC (Media Access Control) layer is one of the two sub-layers of data link layer of the OSI model. The other
sub-layer is the Logical Link Control (LLC) layer. The MAC layer interfaces with the physical layer below it and
provides access to the network interface card (NIC).
The main function of MAC layer is to determine which computer on the network is allowed to use the media
(transmission medium) at any given moment.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Media Access Control methods are ways to allow computers to transmit signals over network cabling, while
ensuring that only one computer transmits at a time. If two computers simultaneously place signals on the wire, a
collision can occur and data might be corrupted unless a method is used to resolve the collision gracefully. Some main
media access control methods used in networking are:
 Carrier Sense Multiple Access with Collision Detection (CSMA/CD): used in Ethernet networking.
 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): used in AppleTalk networking.
 Token passing: used in Token Ring and Fiber Distributed Data Interface (FDDI) networking.
LAN HARDWARE: -
Hardware required to implement a LAN, includes he following:
 One or more powerful, preferably multiprocessor LAN servers and dumb and/or intelligent terminals.
 A transmission medium such as coaxial cabling, twisted-pair cabling, fiber-optic cabling, etc. and their
associated equipment such as connectors, patch panels, wall plates and splitters. These days unguided
transmission media technologies such as infrared communication, wireless cellular networking, satellite
networking etc. are very much in use. In such cases, their associated hardware is also required for establishing
the LAN.
 The physical connection of a computer to the LAN is made through a Network Interface Card (NIC). This is
sometimes also known as Media Access Control (MAC) card. The MAC card is installed in the computer just
like a Video Graphics Adapter (VGA) card or a CD-ROM controller card is installed. A laptop computer can
access a LAN with a PCMCIA LAN card.
 LAN devices, such as repeaters, concentrators, bridges, hubs, switches and multistation access units (MAUs)
are also used. Hubs, switches, bridges and repeaters are explained in a later Section.
 Equipment for organizing, protecting, and troubleshooting LAN hardware such as racks, cabinets, surge
protectors, line conditioners, uninterruptible power supplies (UPSs), KVM switches and cable testers, are
needed.
 Data storage technologies such as RAID, network-attached storage (NAS), and storage area networks (SANS),
and the technologies used to connect them, such as Small Computer System Interface (SCSI) and Fibre
Channel. RAID is a technology used to implement fault tolerant storage systems by using data redundancy.
 Technologies for securely interfacing private corporate networks with unsecured public ones, such as
firewalls, proxy servers, and packet-filtering routers.
LAN OPERATING SYSTEMS: -
LAN operating systems are network aware operating systems that support networking. Such an operating
system provides support for multi-user operations as well as administrative, security and network management
functions.
Jobs done by LAN Operating System -
 A Network Operating System has to acknowledge and respond to requests from many workstations.
 It has to manage network access, resource allocation and sharing, data protection as well as error control.
 It provides for printer, file-system, database and application sharing.
NetWare - NetWare is a LAN operating system designed by Novell Inc. It can be used to connect different offices
across a building or across a country.
One major advantage of Novell NetWare is the capability to support many users and services. It can support many
different types of operating systems such as DOS/Windows, Macintosh, UNIX etc. It is ideal for both medium and
large sized LANs.
The disadvantage of NetWare is that it is slightly difficult for both the LAN administrators and users to
become proficient in using all its functionality. NetWare can be run over Token Ring, Ethernet, ARCnet and FDDI
LANs.
Windows NT - The most popular LAN operating system to appear on the market is the Microsoft's Windows NT. It
provides connectivity like NetWare.
Advantages of Windows NT are the the following:
 It is very easy to learn.
 It is less expensive.
IMPLEMENTING LAN: -
Computers in a LAN can be connected in a number of ways. They can be connected via cables, phone lines or
wireless media. Different types of connections are suitable for different types of businesses and budgets. Whatever
connection you choose to establish, a Network Interface Card (NIC) must be installed in each computer in the
network.
1. Implementation of LAN using Coaxial Cables - Coaxial cable is the most common network cable. A local area
network whose nodes reside within a reasonable distance of each other that is on the same floor of a building or in
adjacent floors may be implemented using coaxial cables or twisted pair wires.
A special connector called T-connector is used to join work stations in a ring topology. The T-connector is
attached to the NIC of each workstation. Cables are attached to the open ends of the T-connectors, to form a chain.
The workstations at each end of the chain will have only one cable attached. The open end of the T-connector, in

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
these two workstations, must be capped using a resistor plug. The resistor plug absorbs the signal and prevents
distortion.
In bus topology networks, a cable is connected to each NIC and extended to the shared cable. Figure 8.7
illustrates the relationship of the Ethernet hardware components required to connect a workstation to a bus-based
coaxial cable.
2. Implementation of LAN using Twisted Pair - Twisted-pair cable is less expensive than coaxial cable, but less
durable. However, it is more reliable in the sense that if a portion of a twisted-pair cable is damaged, the entire
network is not shut down, as may be the case with coaxial cable.
Twisted-pair wires use connectors called RJ-11 connectors. The RJ connector is inserted into a socket on
the NIC.
3. Implementation of LAN using Fiber Optic Cables - Fiber optic cables are becoming popular as a networking cable
because of its high transmission speed. Also, since light signal is not subject to electrical disturbances, it is free
from transmission errors. It can transmit reliable signals as far as 10 km. However, it is more expensive to buy,
install and maintain fiber optic cables. It also requires special equipments, called fiber line drivers,, to convert
electrical signal into light signals.
Fiber optic cable is tailor-made and comes equipped with its own connectors. If you wish to connect a
workstation with equipment that is not compatible with fiber optic cable, attach the workstation to fiber-line
driver.
4. Implementation of LAN using Wireless Technology - Another alternative for LAN implementation is through
wireless technology. The technology consists of hardware that manages the connection using radio or infrared
signaling devices. This eliminates the need for cables all together. A wireless network can make use of existing
cellular telephony, satellite communication system and paging systems. It may be necessary to implement the
LAN using wireless technology in areas where cabling is extremely difficult or impossible. For example, when
offices are located across the river or hill side.
FAST LANs: -
Fast LANs are LANs that are capable of carrying voice, data and video at 100 Mbps, which is 10 times faster
than traditional LANs. They can be implemented using IEEE 100BaseFX or 100BaseT specifications. These standards
can be implemented using either copper twisted-pair wires or fiber optics.
100BaseFX is often used for wiring campus backbones. 100BaseFX networks are wired together in a star
topology using fiber-optic cabling and fiber-optic hubs or Ethernet switches. Fiber-optic cabling uses either two-
strand multimode or three-strand single-mode optical fiber, with each strand carrying data in opposite directions.
Repeaters can be used to extend the length of cabling. With multi-mode fiber-optic , cabling, the maximum allowable
distance (using repeaters) is 2 kilometres and with single-mode fiber-optic cabling, maximum distance is 10
kilometres.
The other IEEE standard, 100BaseT, provides data transmission speeds of 100 Mbps. Commonly known as
Fast Ethernet, it is used as departmental backbones and in establishing connections to highspeed servers and
workstations running bandwidth-intensive applications such as CAD or multimedia programs.
Fast Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) mechanism like other
Ethernet technologies. It is generally wired in a star topology using two pairs of wires in category 5 cabling or four
pairs of wires in category 3 cabling or a duplex multimode fiber-optic cable.
NONSTANDARD LANS: -
Nonstandard LANs are LANs implemented without following any LAN standards. One such implementation
is the direct connection of two computers using a serial cable known, as null modem cable. Computers, so connected,
can trasfer files by using some supporting software such as Direct Cable Connection accessory of Microsoft Windows
95 and 98, or Laplink software for Microsoft.
Generally null modem cable is based on the RS232 serial transmission interface specifications.
EXTENDING LAN: -
Using some specialized devices one can increase the operating range of a LAN. Signals get attenuated with
distance. This can be overcome by arranging for a repeater in the path. Repeaters are explained in Section 8.10.2.
Similarly, one can extend the LAN to several buildings in a campus by using devices such as bridges and switches.
1. Fiber Optic Extension - Repeaters can be used in extending fiber-optic cables in a LAN or Metropolitan Area
Network (MAN). A repeater is a networking component that extends a network by boosting the signal so that it
can travel farther along the cabling. Repeaters are used in fiber-optic networks to amplify and regenerate light
signals for long-distance cable runs.
2. Repeaters - All transmission media attenuate (weaken) the electromagnetic waves that travel through the media.
Attenuation therefore limits the distance any medium can carry data. Adding a device that amplifies the signal
can allow it to travel farther, increasing the size of the network. For example, if one is connecting computers that
are more than 100 metres apart using Ethernet cable, one will need a device that amplifies signals to ensure data
transmission. Devices that amplify signals in this way are called repeaters.
Repeaters fall into the following two categories:
 Amplifiers - Amplifiers simply amplify the entire incoming signal, i.e both signal and the noise. These are able
to improve upon the analog type of signal only.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 Signal-regenerating devices (Repeaters) - Signal regenerating repeaters create an exact duplicate of the
incoming digital data by identifying it amidst the noise, reconstructing it and passing only the desired
information. In this manner, the original signal is duplicated, boosted to its original strength and then sent.
Why Repeaters?
Repeaters extend the distance of a single network. So if you are using an Ethernet LAN but need to go farther
than you are usually able to, you can then install a repeater to achieve the added distance. When a repeater is
installed, it creates a physical break in the cable. The signal is received on one side of the repeater, regenerated and
passed on to the next section of cable.
3. Bridges: - Bridges are mainly used to connect two similar local area network. It is also considered are an device
which connect two similar segments in a network.
Purpose of bridges:-
 Bridges work under data link layer of OSI model.
 Works on MAC address. [ c medium access control (MAC)]
 Manages network traffic by filtering packets.
 Translator from one protocol to another. Protocol.
Type of bridges:-
1. Local bridges: - Local bridges are used where the network is being locally segmented means that the two
networks of segments physically close together.
2. Remote bridges: - Remote bridges are mainly used where the network is remotely segmented. The segments
are physically far apart is different building, etc. such bridges required several transmission medium to
connect two points.
Advantages of latest bridges: -
 Suitable for CSMA/CD and token bus.
 Self learning:- requires low manual configuration.
 No hardware changes required. No software changes required.
 Ready to install.
Disadvantages of transparent / latest bridges:-
 Transparent bridges don’t support loop path.
4. Switches: - switch is a device, functionality is similar to bridges means that switches are used to connect two
devices of networks. Switches operate of data link layer of OSI model. Switches filter the request as will as control
floating of frames.
5. Hubs: - It multiple incoming connections need to be connected with multiple outgoing connections then a HUB is
required. Is data communication a HUB is used as a central point where data arrives from one or more directions
and is forwarded out one or more other directions. HUBs are multi port repeaters. They operate at the physical
layer of OSI model. HUBs are used to provide a physical star topology.
6. Routers: - Routers are both hardware and software. The purpose of a router is to connect nodes across and inter
network. Routers work under network layer of OSI model. A router contains routing table as well as routing
protocols. Router uses address i.e. the combination of network numbers and node address. There are several
protocols available to use with routers. Some of there are: -
(i) Routing Information Protocol (RIP) – This routing protocol is use by several network operating systems for
routing the packets from source to destination. Each router maintains a table of each destination and the file
table is frequently updated by routing information protocol broadcast message. They also maintain the total
number of hop in routing table to select the shortest path to the destination.
(ii) Exterior Gateway Routing Protocol (ERGP) – This is the enhance form of RIP. It also manages there
problems. There are frequently arising with RIP. It works like default routing protocol across the internet. It
uses up to five conditions to select the best route.
(iii) Open Shortest Path First (OSPF) – It might be possible that there are several path exist between one router
to another but main responsibility of this protocol is to select shortest path they use DISKSTRA’S Algorithm.
According to that algorithm a graph is build of the subnet. Router is represented as and each of the line is
represented communication line. Shortest path is selected according to path length.
7. Gateways: - Gateways is used to connect totally dissimilar networks. They have capability to perform protocol
conversion for all seven layers of the OSI model. The common use of this device is to connect a LAN and
mainframe computer. Gateways changing protocol, transmitting packet between two different systems.
X.25 Gateways – These gateways are becoming popular because of thee evolution of enterprise networks
and WAN. A PC on the remote sites LAN function as a gateway and runs gateway software. Remote LAN can
also communicate with mainframe. X.25 was established as a recommendation of the ITU (International
Telecommunication Union), an organization that recommends standards for international telephone services. X.25
has been adopted by public data networks and became especially popular in Europe.
In the X.25 view a network operates much like a telephone system. X.25 network is assumed to consist
of complex packet switches that contain the intelligence needed to route packets.
Comparison between Routers and Gateways: -

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Routers and Gateways can manipulate the packets being transmitted. In the case of a router, that
manipulation may be simply some determination of where the packet comes from and where the packets are to go.
But an intelligent decision is being made. In a gateway, the decision may be a little more complex because a gateway
can perform more functions. It only not perform the router’s function but also converts the message from one packet
format to another.
Virtual LANs: -
Virtual LAN (VLAN) is a networking technology that allows networks to be segmented logically without
having to be physically rewired.
Traditionally, each department in a building used to have its own local area network (LAN). These LANs
were created using hubs, and these hubs were connected to a main Ethernet switch in the main room of the building.
However, broadcasts sent by any host were received by all hosts on the network, even if all of the hosts do not need to
receive them. Also, if the organization of the departments changes, the hubs must be rewired to reflect the new
topology of the network.
To overcome these problems, many Ethernet switches nowadays support Virtual LAN (VLAN) technologies.
All hubs are replaced by VLAN switches. The network administrator creates virtual network segments whose logical
topology is independent of the physical topology of the wiring. Each station is assigned a VLAN identification
number (ID), and stations with the same VLAN ID can act and function as though they are all on the same physical
network segment.
Broadcasts sent by one host are received only by hosts with the same VLAN ID. The assignment of VLAN IDs
is done at the port level on the switches themselves and can be managed remotely using network management
software. Moving a host from one department to another department only requires the assignment of a different
VLAN ID to the port on the switch to which the host is connected. No rewiring is needed.
The main advantage of using VLAN technologies is that users can be grouped together according to their
need for network communication, regardless of their actual physical locations.
The only disadvantage is that additional configuration is required to set up and establish the VLANs. VLAN
techniques are also typically used in Asynchronous Transfer Mode (ATM) networks to partition the network into
smaller segments.

Wide area network (wan)


Introduction: - WAN (Wide Area Network) is a digital communication system which interconnects different sites,
computer installations and user terminals, and may also enable LANs to communicate with each other. This type of
network may be developed to operate nationwide or worldwide. The transmission media used in WANs are normally
public systems such as telephone lines, microwave and satellite links.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
WAN is used to interconnect LANs which may be at opposite sides of a country or located around the globe.
Wide area networks (WANs) combine the continuous error detection and correction techniques included in
synchronous communications with robust network problem determination and data routing to form powerful
backbones that ensure high-quality, reliable service for end users.
Network Using Wan and Network Services: -
Many wide area network services are emerging these days due to the increasing demand of corporate
business houses and public and private sectors for these services at the lowest possible cost.
Users are demanding Wide area network accesses that offer support for transmission of data, video, imaging,
fax and voice. The primary driving forces of increased capacity and sophistication for wide area network services are:
(i) Host to terminal connection - A terminal is an I/O device, consisting of a keyboard and a monitor and the host is
a back-end processing computer. Hosts and terminals may be located in different locations. Hosts can be
connected to the different terminals through local area network connections or through remote dial-up
connections. User's commands are typically entered through a terminal. This information is transmitted to a host
computer (generally Mainframe computer) over an Ethernet or Token Ring local area network connection. The
mainfram processes the input and sends the output over the network to the terminal monitor. Thus, application
runs in the host and the terminal does user interfacing function.
Terminals can be of two types:
 Local Terminals: directly connected to the host via a serial or LAN connection.
 Remote Terminals: connected to the host via a phone line with a modem at both the ends.
(ii) LAN to LAN connection - Wide area networking may be used for communicating with devices that reside beyond
one's local LAN. For the communication to take place, the two LANs must be in the same WAN. Routers can be
used to connect LANs that employ similar protocols.
When two dissimilar LANs are to be connected, tunnels and gateways are made use of.
A gateway is any device that is capable of interconnecting networks with dissimilar routing protocols.
WAN links can be grouped into the following three main categories:
 Circuit-switched services - A temporary switched circuit established through the telecommunications system
for the duration of the communication session. When the connection is terminated, the carrier's switches are
freed up for other uses. Examples are modems and dial-up Integrated Services Digital Network (ISDN)
connections.
 Leased lines - These are dedicated connections that establish permanent switched circuit that is always ready
to carry network traffic.
Leased lines are very expensive because then are dedicated to the customer even when they are not in
use.
 Packet-switched services - These are dedicated or dial-up connections to a public packet-switching network
such as X.25, a public frame-relay network, or even a virtual private network (VPN). Intermediary switches
send data packets along the best route possible by using the logical address of the destination node, which is
contained in the packet header.
(iii) Remote LAN connection - Remote access to a LAN can be either through dial-up connection using a modem or
through a leased line. Remote access to the office LAN gives the employees and/or customers access to the fol-
lowing services:
 File and print services
 Client/Server applications such as database applications
 Applications for remote network administration
Programs such as PcAnywhere control the network-access remotely. However, since remote connection is
mainly made using a slow modem, network-access control is often slow and jerky. But it provides high security,
saves on hardware and licensing costs, and is simple to implement on a network.
Remote LAN connection allows users to access file, print and other services of the company from remote
locations.
Router Concepts: -
Routing is the function of the network layer of the OSI model. Routing means finding route or the next hop
for a packet. A device called router does the routing function. It uses a table called routing table to find the route to
the packet's final destination. Routing tables contain information about the potential paths that a data packet should
take to travel through the internet work and reach its destination.
To view the internal routing table of a computer running Microsoft Windows XP, Windows 2000 or Windows
NT, type route print at the command prompt.
Router has to read the header of each packet that arrives and extract the destination address of the packet. The
router then sends the packet out on the appropriate transmission path based on a calculation of the optimum route to
that destination.
Routing involves two main functions. These are:
1. Forwarding Function - When packets need to be sent to a host or hosts on another network, they are forwarded to
a router that is connected to that particular local network. The router to which the packet is forwarded will then

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
check its routing tables to determine the path the packet should take. Packets are usually sent along the path with
the lowest cost value or metric. The routing metric mainly includes the following:
 Hop Count: The number of intermediate routers between a given network and the local router.
 Latency: The time delay in processing a packet through the router or over a given route.
 Congestion: The length of the packet queue at the incoming port of the router.
 Load: The processor use at the router or the number of packets per second that it is currently processing
 Bandwidth: The available capacity of a route to support network traffic; decreases as network traffic
increases
 M Reliability: The relative amount of downtime that a particular router might experience because of
malfunctions.
 Maximum Transmission Unit (MTU): The largest packet size that the router can forward without needing
to fragment the packet.
2. Filtering Function - Filtering is the process of controlling the flow of packets based on attributes such as source
Filtering is done to protect the network from unauthorized traffic. Network administrators can create rules for
filtering out unwanted packets. A packet that satisfies all the rules is allowed to be transmitted, while a packet
that violates any of the rules is dropped.
Packet filtering can be implemented in the following two ways:
 Static Filtering - In Static Filtering, ports are configured as either permanently open or permanently closed.
For example, to deny outside packets access the company's intranet server on port 80, one can configure the
router to block all incoming packets directed towards port 80.
 Dynamic Filtering - In Dynamic Filtering, selected ports can be opened for authorized access and closed for
others. These ports are opened at the start of a legitimate session and then closed at the end of the session to
secure the port against unauthorized attempts. One can configure rules in the router to read the incoming
packets, dynamically open the two ports to allow a session to be started, monitor the flow of packets to ensure
that no attempt is made to hijack the session by an unauthorized user and close the randomly assigned ports
when the session ends.
Routing Method: - There are two routing method:
 Static Routing - In static routing method, routing tables are manually configured by the network
administrator. Static routing is generally used in smaller networks that contain only a smaller number of
routers or where security is a major concern. Routers that use static routing are called static routers. Each
static router must be configured and maintained separately because static routers do not exchange routing
information with each other.
The routing table must contain a route for every network in the internet work. It is more immune to
any hampering by hackers since the network administrator controls the configuration of the routing table.
 Dynamic Routing - Dynamic Routing is a routing mechanism which is handled by a routing protocol, such as
Routing Information Protocol (RIP), Open Shortest Path First (OSPF) Protocol etc. These protocols
dynamically exchange routing information among routers on an internet work. Routers that use this method
are called dynamic routers.
A routing protocol is installed on each Dynamic Router. The routers periodically exchange their rout-
ing information so that if the internet work is reconfigured or a router goes down, the routing tables of each
router are modified accordingly.
Dynamic routers are less secure because routing tables can be hampered by hackers. If the network is
reconfigured or a router goes down, it takes time for this information to propagate between the various
routers on the network. Routing protocols also create additional network traffic.
Local Routing: -
Local routing is the routing of a packet within a particular network. When a packet arrives at a router and the
IP address indicates that the packet belongs to this network, the router sends an ARP message to find out the physical
address of the destination node. The process is explained in the following Section.
1. ARP (Address Resolution Protocol) Table - ARP is a network layer protocol concerned with mapping node names
to IP addresses. It matches logical and physical device addresses.
On a typical physical network, such as a LAN, each device on a link is identified by a physical or station
address usually imprinted on the network interface card (NIC). ARP maintains tables of name to-address
mappings, known as ARP table, and can send out packets for searching the address if a desired name or address
is not currently in its table. Physical addresses have local jurisdiction and can be changed easily. For example, if
the NIC on a particular machine fails, the physical address changes. The IP addresses, on the other hand, have
universal jurisdiction and cannot be changed. ARP is used to find the physical address to the node when its
Internet address is known.
Any time a host, or a router, needs to find the physical address of another host on its network, it formats
an ARP query packet that includes the IP address and broadcasts it over the network.
Reverse Address Resolution Protocol (RARP) - RARP (Reverse Address Resolution Protocol) performs the same
function as ARP does but in reverse, that is given a physical address, it determines the IP address.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
2. Distributed Routing - In Distributed routing, each router periodically exchanges its routing information with each
of its neighbors. For example, let us assume that the hop count is taken as a metric-for-routing in a certain
network. Once every T milli seconds, a router A sends to its neighbors a list of hop counts (to each destination). It
also receives a similar list from its neighbors. Suppose a neighbor B has sent a routing table with Bi as the hop
count required to reach node i. If node A knows that the hop count to reach node B is m, it knows that it can reach
node i via B in m + Bi hop counts. By performing similar calculation for all the routing tables that arrive, a node
can find out the best estimate and correspondingly modify its routing table.
3. Hierarchical Routing - In Hierarchical routing, a network is divided into sub-networks, with the router in a sub-
network knowing only about the nodes within its subnetwork and being ignorant about the nodes in other sub-
networks. This frees the routers from keeping information about all the nodes in a network, which would have, as
networks grow in size, required large memory, enormous CPU time and huge bandwidth.
4. Distance-Vector Protocol - A distance vector protocol periodically broadcasts the complete routing tables across
the internet work. Routing tables are calculated on the basis of the number of hops required to reach the
destination network. Other routing metrics such as traffic load, bandwidth available, latency or Maximum Trans-
mission Unit (MTU) are not used in calculating routing tables.
5. Link-State Protocol - Link-State Protocol is more efficient in terms of network overhead than the Distance-Vector
Protocol. An example of a protocol that uses Link-State algorithm is the OSPF (Open Shortest Path First) protocol.
OSPF-enabled routers, using any algorithm, compute the shortest path between nodes on an internet
work. They create a map (or tree) called the link state database describing the topology or structure of the specific
network area. Network areas are groups of networks connected using OSPF-enabled routers that all have router
interfaces for any of the networks included in the area. Division of the complete network into network areas has
the advantage that each router need maintain only link state information about its own area and other areas con-
nected to it, which improves the scalability of OSPF.
The link state database includes cost information in addition to hop information. The link state database is
updated if a router goes down or if the structure of the network is reconfigured. Only the updations are
exchanged over the network. This is unlike distance-vector protocol which involved transmission of the complete
routing tables. Also, unlike RIP-enabled routers, which broadcast routing information every 30 seconds, OSPF
broadcasts changes only when they occur. These features substantially reduce inter-router network traffic com-
pared to RIP and make OSPF a more efficient protocol than RIP for large internet works.
Communication Protocols Over Wan : -
The two commonly used communication protocols over WAN are ATM and X.25.
1. ATM (Asynchronous Transmission Mode) - ATM is a connection-oriented protocol that can work with either
permanent virtual circuits (PVCs) or switched virtual circuits (SVCs). ATM networks use maximum bandwidth,
while maintaining guaranteed quality of service (QoS).
The two main benefits of ATM are:
 high transmission speed
 flexible bandwidth-on-demand capability
ATM uses fixed-size cells for packaging information. Due to the fixed size of cells, ATM connections are
predictable and can be easily managed.
ATM technology works primarily at data-link layer of the OSI (Open Systems Interconnection) reference
model.
ATM connects devices over a WAN using virtual channels (VCs) and virtual paths (VPs). Virtual channels
consist of one or more physical ATM links connected in a series for transmitting data between remote stations. All
cells in a given ATM transmission follow the same VC to ensure reliable data transmission. A Virtual Channel
exists only as long as data is being transmitted on it.
A Virtual Path (VP) is a collection of VCs having the same source and destination points. VP can be used
to group all the traffic to a given destination and send it over the VP.
ATM cells are of size 53 bytes (48 bytes of data payload and 5 bytes of control and routing information).
The payload field contains the data which can be either plain text, images voice or video.
ATM dynamically allocates bandwidth. Bandwidth is allocated only in required amounts. For example,
when an ATM link is idle, it utilizes no bandwidth, which in turn results in considerable cost savings.
2. X.25 Protocol - X.25 is a packet-switching protocol for wide area network (WAN). The X.25 standard corresponds
in functionality to the first three layers of the Open Systems Interconnection (OSI) reference model. X.25 provides
the following specifications:
 Network Layer: The network layer protocol of X.25 is known as Packet Layer Protocol (PLP). It defines how to
address and deliver X.25 packets using permanent virtual circuits (PVCs) or switched virtual circuits (SVCs).
This layer is responsible for call-setup and call-termination and for managing transfer of packets.
 Data-link Layer: Data-link layer protocol of X.25 is known as Link Access Procedure Balanced (LAPB). It
defines framing and error-correction methods. LAPB is derived from the High-level Data Link Control
(HDLG) protocol.
 Physical Layer: The physical layer interface of X.25 is called X.21bis and it is used to connect computers and
terminals (DTE) with data communications equipment (DCE) such as switches.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy

Data transmission networks


Telephone Networks: - Telephone networks provide in addition to the Plain Old Telephone Service (POTS)
connection, high-speed data transmission services such as Integrated Services Digital Network (ISDN), Frame Relay,
T1 lines and Asymmetric Digital Subscriber Line (ADSL). The telephone networks connect the customer premises
equipment (CPE) with a similar equipment at the telephone company's central office. This connection can then be
used to support the following:
 Dial-up remote access solutions using modems or ISDN.
 High-speed dedicated leased-line access to the Internet for corporate users.
 Packet-switched services, such as X.25 services, for point-to-point or multipoint wide area network (WAN)
connections with other branches of the telephone company.
1. Dial-up Telephone Networks - A Dial-up Telephone Network is a network established using a modem over
ordinary phone lines. The phone lines (also known as dial-up lines), used primarily for voice communication, are
less expensive to use but they have less available bandwidth.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Companies often use dial-up networking only for occasional, low-bandwidth usage (such as remote
access networking) or as a backup for the more costly dedicated or leased lines.
Dial-up networks are shared with all subscribers in the Public Switched Telephone Network (PSTN)
domain.
2. Leased Line - Leased line is a permanent direct connection usually bought by corporate business houses for
connecting two geographically separate local area networks (LANs). Leased lines are dedicated circuits that the
telephone company reserves for the exclusive use of the customer.
In a leased-line network, the customer's LAN is connected by bridges, routers, modems and terminal
adapters to the telephone company's central office, which sets up dedicated switches to connect it to the
destination LAN. One can also use a leased line to connect to the Internet.
Leased lines are very expensive as compared to dial-up lines. In return, they are always available, active
and secure.
The fee for a leased line is dependent on bandwidth and distance. The fee is usually charged monthly or
quarterly.
3. X.25 - X.25 was designed as a global standard for a packet-switching network. It was originally designed to
connect remote terminals with mainframe hosts. X.25 was designed when analog telephone transmissions were
done on copper wire. Therefore, it has a large overhead of error-correction information, resulting in inefficient use
of bandwidth.
Although newer WAN technologies such as Frame Relay, Integrated Services Digital Network (ISDN)
and T-carrier services are preferred these days, X.25 networks are widely used in credit card verification,
automatic teller machine transactions and other dedicated business and financial uses.
An X.25 network consists of a backbone of X.25 switches that are called packet switching exchanges
(PSEs). These switches provide packet-switching services. PSEs connect DCEs at the local facilities of X.25 carriers
to the X.25 Public Data Network (PDN). DTEs at customer premises connect to DCEs at X.25 carrier facilities by
using a device called a packet assembler/disassembles (PAD).
One DTE (computer terminal) can initiate a communication session with another by dialing its X.21
address and establishing either permanent virtual circuit or switched virtual circuit. Messages are transmitted in
the form of packets. Maximum packet sizes range from 64 to 4096 bytes, depending on the system. Packets are
routed through the X.25 backbone network by using the ID number (a 12-bit number) of the virtual circuit
established for this particular communication session. This ID number is also known as the Logical Channel
Identifier (LCI).
Some important Networks and its characteristics:
1. Public Switched Telephone Network (PSTN) –
 Analog nature of transmission.
 It has restricted bandwidth.
 Available at every place.
 Transmission rate is low.
 It is voice based communication i.e. Telephones.
 Modems are required when it is used for data communication.
2. Public Switched Data Network (PSDN) –
 Several technologies are used with PSDN.
 Highly reliable.
 Provides quality of connections.
 It supports both low and high speed at reasonable cost.
 It is very popular for connecting public and private systems to implement electronic mail services.
3. Value Added Network (VAN) – In value added services the provider of such services must process store and
manipulate the data i.e. carried on the network. The technique can be used in specific type of business electronic
data interchange is one area for value added services in which two trading partners exchange trading documents
such as purchase orders, invoices etc
Integrated Services Digital Network (ISDN): - ISDN is enhanced digital Network which integrates voice, video and
data services using digital transmission medium and combining both circuit and packet switching technique. Users
can use their digital connections to telephone company for transmitting both voice and data over the some medium.
It is an international communications standard for sending voice, video and data over digital telephone line.
This system allows data to be transmitted simultaneously across the world using end to end digital connectivity.
There are two basic types of ISDN Servers:
(i) Basic Rate Interface (BRI) – BRI consists of two 64 kbps B-channels and one 16 kbps D-channel. It is most
appropriate of individual error and small business. To access a customer should have within 5.5 km of the
service provider central office. If distance is extended from 5.5 km repeaters are required.
(ii) Primary Rate Interface (PRI) – PRI is intended for users with greater capacity requirements. Typically the
channel structure is 23 B-channel + one 64kbps channel. The higher capacity service is central site solution for
extending application to large no. of remote users.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
With its BRI and PRI servers ISDN has the flexibility to meet the bandwidth needs of home office or company
head quarter small office can use ISDN BRI to support al of its voice and data communication requirement and users
in a very large office can benefits from ISN PRI’s capacity.
Advantage of ISDN: -
 Speed – Before ISDN modem was used to make computer communications through public telephone network
but it has limited bandwidth to transmit data. Actually ISDN is replacement for old telephone services. It is
the fact that ISDN services is provided by the some companies but the difference that we can get much faster
connection for voice data and video through a single line.
 Multiple Device – Before ISDN, it was necessary to have a separate line for each device that has to be used
simultaneously but by the use of ISDN it became possible to combine several digital data sources over a single
line.
 Signaling – The signaling mechanism is also different form telephone. It sends a digital packet through a
separate channel so connection establishment and called setup time is very fast.
Application of ISDN: -
 Internet access
 Telephoning
 Video conferencing (Synchronization)
 Education
NARROWBAND ISDN (N-ISDN): - The original ISDN providing data rates of 64 Kbps to 1.544 Mbps is known as
Narrowband ISDN (NISDN). When ISDN was originally designed, this range of data rate was sufficient to handle all
existing transmission needs. As applications using the telecommunications networks advanced, these rates proved
inadequate to support many applications.
BROADBAND ISDN (B-ISDN): - To provide for the needs of the next generation technology, an extension of ISDN,
called Broadband ISDN (B-ISDN), is under study. B-ISDN provides subscribers to the network with data rates in the
range of 600 Mbps, almost 400 times faster than the PRI rate.
Broadband ISDN Services - Broadband ISDN provides two types of services:
 Interactive - Interactive services are those services which need two-way transfers between either two
subscribers or between a subscriber and a service provider.
 Distributive - Distributive services are of simplex communication form which are sent from a service provider
to subscribers. The subscriber does not have to transmit a request each time a service is desired. These services
can be without or with user control.
Physical Specifications of Broadband ISDN - The Broadband ISDN model is divided into layers which are closely tied
to the design of Asynchronous Transmission Mode.
However, the physical aspects of B-ISDN that are not related to ATM include:
 Access methods - Broadband ISDN has the following three access methods:
Symmetrical (155.520 Mbps)
Asymmetrical (155.520 Mbps/622.080 Mbps)
 Functional equipment groupings - The functional groupings of equipment in the Broadband ISDN model are
the same as those for Narrowband ISDN. However, these equipments are called B-NT1, B-NT2, B-TE1, B-TE2
and B-TA.
 Reference points - Broadband ISDN also uses the reference points similar to Narrowband ISDN (R, S, T and
U).
Frame Relay: - Frame relay is a service for people who want connection oriented way to move bits from one station to
another at regionable speed and low cost. Frame relay can be used with virtual leased line. The customer leases a
permanent virtual circuit between two points and can then send frames between them.
Congestion Control: - Frame relay employs congestion-notification mechanisms rather than flow control. Since frame
relay is implemented on a reliable network media flow control-function is left to higher-layer protocols.
Frame relay uses two congestion-notification mechanisms. These are:
(i) FECN (Forward-Explicit Congestion Notification) - The FECN mechanism is initiated when a sender device (DTE)
sends frames into the network. If the network is congested, switches (DCE) will set the value of the FECN bit to 1.
When the frames reach the destination device, the set FECN bit indicates that the frame experienced congestion in its
path from source to destination. The destination device will pass this information to higher-level protocols for
processing.
(ii) BECN (Backward-Explicit Congestion Notification) - DCE devices (such as switches) set the value of the BECN bit
in those frames that are travelling in the opposite direction of frames with their FECN bit set. This informs the DTE
that the particular path is congested. It can then pass this information to higher-level protocols for processing.
Frame Relay header also contains a Discard Eligibility (DE) bit. This bit is set to 1 in less-important frames.
Thus, in case of congestion, these unimportant frames can be identified and dropped. When the network becomes
congested, DCE devices will discard frames with the DE bit set. This reduces the chance of critical data getting deleted
during congestion periods.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Cell Relay: - Cell relay uses fix sized packets called cell relay. The basic idea behind ATM is to transmit all
information in small, fixed size packets called cell. ATM is both a technology and potentially a service. Sometimes the
service is called cell relay. The fixed size cell reduces overhead.
ATM Technology: -
 ATM is used in many networks including both public and private.
 ATM technology can be used in existing twisted pair, co-axial cable, and fiber optics network for local area
network as well as WAN communication. In other words such technology is compatible with existing
network.
 ATM technology is also compatible with wireless and satellite communication.
ATM Layered Structure: -The new wide area service is
called B-ISDN. It will offer video on demand, Live
television from many sources, full motion multimedia e-
mail, CD quality music, high speed data transport and
many other services. The underline technology that
makes B-ISDN possible is called ATM. Following are the
different layers of ATM:
(i) Physical Layer – The physical layers deals with
physical devices and medium.
(ii) ATM Layer – ATM Layer mainly deals with cell
and cell transport. It defines the layout of a cell
and tells what the header fields mean. The size
of a cell is 53 bytes (5 bytes of header and 48
bytes of data/payload). Because each cell is the
same size and small, delay and other problems
with multiplexing different sized packets are
avoided. Congestion control is also located here.
Functionality of this layer is same as the
network layer of OSI Model.
(iii) ATM Adaptation Layer – ATM Adaptation Layer is divided in two sub layers:
(a) Segmentation and Reassembly (SAR) – This is the lower part of ATM Adaptation Layer. The SAR sub
layer breaks packets into cell on the transmission side and put them back together again at the
destination.
(b) CS – This layer is responsible for accepting messages from the application and breaking them into 48
bytes for transmission.
 How ATM Protocol works?
When a user sends data over the ATM network. The higher level data unit is passed down to the CS, which
prepares the data for the ATM layers. The data is then passed down the SAR sub layer, which divides the data into
appropriately sized segment.
These segments are then passed on to the ATM layer, which defines and appropriate cell header for each
segment and encapsulate the header and payload into 53 byte cell. The cells are then passed down to the physical
layer, which streams the cell and an appropriate place.
Benefits of ATM: –
 High bandwidth medium with low delay.
 Meets the requirement of the telephone, cable television, radio and data industries.
 Ability to transmit video without creating a glittering or loosing the synchronization of sound and picture.
 ATM switches capable of transmitting 20 gigabits of data/second and a shared switch can transmit up to 662
Gbits/sec.
 It is extremely fast and provides dynamic bandwidth.
 ATM is designed for high performance multimedia networking.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy

Wireless communication
Introduction: - Mobile devices such as laptop, palmtop, mobile, phones etc. are now available at affordable prices.
These devices, based on the wireless communication techniques, help us to achieve mobility. Mobility is the ability to
access information and services any-me and anywhere. Through wireless computing, one can access information, on
traffic, ticket booking, check account balance, e-mail from one's home, cafeteria, or even from a grocery store.
Wireless communication makes use of spread, spectrum radio, infrared, cellular radio and satellite
communication technologies. Since discussing each of them is out of the scope of this book, only the Cellular radio
and Satellite communication technologies are discussed in the following sub-sections.
Cellular Radio: - Cellular Radio means using a large number of low-power base stations for transmission, each
having a limited coverage area.
An area is divided into a number of smaller areas, called cells. Each of these smaller areas is served by its own
low-power radio base station. Frequency channels are allocated to these radio stations in such a way that the channels
(frequencies) used in one cell can be reused in another cell some distance away.
Principle of Operation - The principle behind cellular radio is this: Instead of using one powerful transmitter, many
low-power transmitters are placed throughout a coverage area. For example, a high power transmitter in a region can
have twelve conversations (channels).
The cellular radio equipment (base station) can communicate with mobiles as long as they are within range.
Radio energy weakens over distance, hence, mobiles must remain within a frequency range to be able to
communicate, with each other.

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Cells - A cell is the basic geographic unit of a cellular system. The term cellular comes from the honeycomb shape of
the areas into which a coverage area is divided. Cells can be sized according to the population density in a given area.
The splitting of cell into smaller cells is known as cell splitting. A group of cells is called a cluster. No frequency is
reused within a cluster.
Frequency Reuse - Since only a small number of radio channel frequencies are available, there has to be a way to reuse
the available channels. The solution adopted was frequency reuse through the cellular concept. Cells are assigned a
group of channels that is completely different from that of the neighboring cells. Infact, all the cells in a cluster use
different frequencies. The same group of channels can be used in cells in some other cluster, provided that they are far
enough from each other, so that their frequencies do not interfere.
Handoff - When a mobile user travels from one cell to another, while he is attending a call, he is moving out of range
of one radio base station and entering into the range of another base station. Since adjacent cells do not use the same
frequency channel, the call must be either dropped or transferred from one radio channel to another when a user
crosses the line between adjacent cells. Dropping the call is not a desirable solution. The second option must be
adopted and it is known as handoff.
Handoff occurs when a call is transferred from one radio channel to another as a mobile equipment leaves one
cell and enters another one.
When a mobile user leaves a cell, the reception becomes weak. At this point, the cell site in use requests a
handoff. The Mobile Telephone Network switches the call to a stronger frequency channel in the new cell. This is done
without interrupting or alerting the user. The user does not notice the handoff at all.
TELEPHONY (GSM): - GSM stands for Global System for Mobile Communication. Various systems had been
developed for cellular communication, but there was no standardization. This led to several incompatibility problems.
To overcome such problems, GSM standard was adopted in 1982 for cellular communication.
GSM is a globally accepted standard for digital cellular communication. It provides the specifications, that is
the function and interface requirements, but does not address the hardware. This is done to allow buying equipments
from different vendors.
GSM network is divided into the following three systems:
(i) Switching System (SS) - Switching System is responsible for call processing and subscriber related functions. It
includes the following functional units:
 Home Location Register (HLR): It is a database storing permanent information about subscribers such as the
subscriber's address, service profile and activity status.
 Visitor Location Register" (VLR): It is another database that stores temporary information about subscribers
This information is needed by MSC (Mobile services Switching Centre) to service the visiting subscribers.
 Mobile Services Switching Centre (MSC): It controls calls to and from other telephone systems or data
systems. It performs such functions as toll ticketing, network interfacing, common channel signaling etc.
 Authentication Centre (AUC): It provides authentication services like identifying authorized users and also
ensures the confidentiality of each call.
 Equipment Identity Register (EIR): It is a database storing information about the identity of mobile
equipments. This prevents calls from stolen, unauthorized or defective mobile stations. Often EIR is
integrated with the AUC (Authentication Centre).
(ii) Base Switching System (BSS) - All radio related functions are performed by BSS. IC consists of Base Station
Controllers (BSC) and Base Transceiver Stations (BTS).
 Base Station Controllers (BSC) - They provide all the control functions and physical links between the BTS
(Base Transceiver Stations) and MSC (Mobile Services Switching Centre). They control handoffs, radio
frequency (RF), power levels in base transceiver stations (BTS) etc.
 Base Transceiver Stations (BTS) - BTS is the radio equipment (transceiver + antenna) needed to service a cell.
They handle the radio interface to the mobile stations. A group of BTSs is controlled by a single BSC (Base
Station Controller).
(iii) Operation and Support System (OSS) - OSS is connected to all the elements of Switching System (SS) and to the
Base Station Controller (BSC). It is the functional entity through which the network operator monitors and controls
the system. It offers cost-effective support for centralized, regional and local operational and maintenance activities
required for a GSM network.
GSM Specifications - Following is the list of GSM specifications:
 Frequency Range: 1,850 to 1,990 MHz.
 Duplex Distance: Duplex distance is the distance between the uplink and downlink frequencies. Duplex
distance specified for GSM is 80 MHz.
 Channel Separation: For GSM, separation between---adjacent carrier frequencies is 200 KHz.
 Modulation: Modulation in GSM is done through Gaussian minimum shift keying (GMSK).
 Transmission rate: GSM has a data rate of 270 kbps.
 Access Method: GSM utilizes the Time Division Multiple Access (TDMA) concept.
 Coding: GSM uses Linear Predictive Coding (LPC). Speech is encoded at 13 kbps.
VSAT (VERY SMALL APERTURE TERMINAL): -

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
Very Small Aperture Terminals (VSATs) are tiny terminals that have 1-meter antennas and can put out about 1 watt of
power. The uplink is generally good for 19.2 kbps, but the downlink is more, often. 512 kbps. In many VSAT systems,
the micro-stations do not have enough power to communicate directly with one another. Instead, a special ground
station, the hub, with a large high gain antenna is needed to relay traffic between VSATs as shown in Figure 11.7.
In this mode of operation, either the sender or the receiver has a large antenna and a powerful amplifier. The
trade-off is a longer delay in return for having cheaper end-user stations. The delay time or end-to-end transit time is
between 250 to 300 cosec (540 m. sec. for a VSAT system with a hub).
Among the options available in the country, VSAT networks have proved to be the most reliable and cost-
effective for a small-sized network. Terrestrial based communication links available in India are notoriously unreliable
due to various reasons like lack of foreign investment in infrastructure sector, absence of proper planning, non-
availability of resources, delay in implementation of liberalization policy etc. The major benefits of VSAT network are:
 very simple and easy to install
 channel availability to the tune of 99.5 per cent, thus leading to
 greater reliability
 high throughput and low bit error rate (BER) for data applications and
 integration of data and voice in one communication medium

Security and privacy


Network Security: - In a network several users are working together and access for share the common resource that’s
why security must be maintained among network users. Following are the major consideration to maintain network
security:
 Information that is stored in the system only accessed through authorized users.
 Sharable resources should be available for only authorized members.
 Unauthorized users should not be able to insert unnecessary information.
 Unauthorized users should not be able to access the information of the system.
Protection against Unauthorized use: - To prevent the use of information through outsiders, legal users are assigned
an identification in the form of User ID with Password.
Types of ATTACK: - There are two types of ATTACK:
(i) Passive ATTACK – This is considered as monitoring of transmission. Main purpose of such types of
attack is to obtain the information which is being transmitted. Such types of ATTACK are difficult to
detect but possible to prevent.
(ii) Active ATTACK – It includes modification of messages, capturing authentification, creation of false
messages, obtaining permissions associated with information etc. Active attack cannot beeasily prevented,
but it requires protection of all facilities all the time.
Firewall: - When a small network (LAN) connects with internet, it faces several dangerous security threads. To
overcome such problem Firewall is built. Firewalls are basically combination of hardwares & softwares that are built
using routers, servers and a variety of software. Firewall reduce the speed of a network but protect against several
security threads.
Benefits of using Firewall –

Department of ECE DCN Study Material


DATA COMMUNICATIONs AND Networks D.veeraswamy
 Protection against services
 Access to host
 To implement authentification procedure efficiency
 Policy inforcement
 Proper use of login
Characteristics of good Firewall system – Firewall is mainly built to protect our network. A Firewall system has
following characteristics to maintain security:
 A Firewall system should be able to deny authorized accession of network services.
 The Firewall should be flexible.
 The Firewall system most contains advance authentification measures.
 The Firewall system should implement filtering mechanism.
Firewall Types – There are three types of Firewall:
(i) Proxy Firewall – Such types of Firewall which is working as intermediate between users request and a
particular layer (application layer or session layer or transport layer).
(ii) Packet Filtering Firewall – Such types of firewalls checks/examines all the incoming packets, then the
system forwards or drops its according to predefined rules.
(iii) Stageful Inspection Firewall – Such Firewalls system is considered as a new technology based firewall
system. Such system provides functionality or awareness to application layer without using any proxy.
Virtual Private Network (VPN): - VPN is a private network of an organization built over public connections,
protocols and services used in VPN are those of public networks, but it is so built that it would function as a
private corporate network.
In VPNs, users enjoy the same security and privacy features as available in a real private network. It
gives secure remote access to the corporate network over the Internet.
VPNs use tunneling technologies to allow users to access private network resources through the
Internet or any other public network.
Tunneling solutions are typically based on the Microsoft’s Point-to-Point Tunneling protocol (PPTP).

Department of ECE DCN Study Material

You might also like