Professional Documents
Culture Documents
LECTURE NOTES
SUBJECT CODE-KCS-603
Vision
Be known globally for value-added Education innovation research at the intersection of disciplines in
service of human kind.
Mission
M1: Place a multidisciplinary engineering education ecosystem that transforms learners into future
innovators, entrepreneurs and professional leaders.
M2: Create an ambience of interdisciplinary research, innovation and creativity to address regional and
global challenges for benefit of human life and environment.
M3: To provide the environment for enhancing knowledge, and inculcating critical and design thinking,
life skills through quality learning systems.
M4: Collaborate with globally renowned academic and research Institutions and corporate for
improving productivity and economics.
Vision
To inculcate the ability among the students by which versatile development can be done, and they
can be prepared to excel globally with ethical values.
Mission
M1: To empower technical, leadership and interpersonal skills in the field of Computer Science
and Engineering–IoT, and encourage them to apply their learning for solving the societal issues.
M2: To provide a framework for promoting collaborative and multidisciplinary activities with an emphasis
on the advancement of Internet of Things
M3: To develop continuous learning environment among students to inculcate innovative research in
Computer Science and Engineering-IoT to serve the needs of Industry, Government and Society globally.
PROGRAM EDUCATIONAL OBJECTIVE
PEO 1: The graduates of our program will have sound knowledge in Mathematical, Scientific
and Engineering concepts necessary to formulate, analyze, design and solve Engineering
problems and to prepare them for higher learning, research and industry.
PEO 2: The graduates of our program will possess innovative skills to asses and apply the rapid changes
in technology and to engage in research leading to novel solutions for human, social and
global competency.
PEO 3: The graduates of our program will acquire knowledge and grab opportunities to work as teams
on multidisciplinary environment, communicate ideas effectively with diverse audiences,
leadership qualities with ethical values and engage in life-long learning.
PSO 1: The ability to develop problem solving skills through programming techniques for addressing
real life problems using appropriate principles and concepts of Internet of Things.
PSO 2: Develop the understanding of various IOT application development tools and its
implementation for IOT applications.
Computer Networks(KCS- 603)
Course Bloom’s Knowledge Level (KL)
Outcom
e ( CO)
At the end of course , the student
will be able to
Explain basic concepts, OSI reference model, services and role of each layer of
CO1 OSI model and K1,K2
TCP/IP, networks devices and transmission media, Analog and digital data
transmission
CO2 Apply channel allocation, framing, error and flow control techniques. K3
Describe the functions of Network Layer i.e. Logical addressing, subnetting &
CO3 Routing K2,K3
Mechanism.
Explain the different Transport Layer function i.e. Port addressing, Connection
CO4 Management, K2,K3
Error control and Flow control mechanism.
CO5 Explain the functions offered by session and presentation layer and their K2,K3
Implementation.
Explain the different protocols used at application layer i.e. HTTP, SNMP, SMTP,
CO6 FTP,TELNET and VPN. K2
DETAILED SYLLABUS 3-0-0
Unit Topic Propose
d
Lecture
Introductory Concepts: Goals and applications of networks, Categories of
networks, Organization of the Internet, ISP, Network structure and architecture
(layering principles, services, protocols and standards), The OSI reference
I model, TCP/IP protocol suite, Network devices and components. 08
Physical Layer:
Network topology design, Types of connections, Transmission media, Signal
transmission and
encoding, Network performance and transmission impairments, Switching
techniques and multiplexing.
Link layer: Framing, Error Detection and Correction, Flow control (Elementary
II Data Link Protocols, Sliding Window protocols). 08
Medium Access Control and Local Area Networks: Channel allocation, Multiple
access protocols, LAN standards, Link layer switches & bridges (learning bridge
and spanning tree algorithms).
Network Layer: Point-to-point networks, Logical addressing, Basic
III internetworking (IP, CIDR,
ARP, RARP, DHCP, ICMP), Routing, forwarding and delivery, Static and dynamic 08
routing, Routing algorithms and protocols, Congestion control algorithms, IPv6.
Transport Layer: Process-to-process delivery, Transport layer protocols (UDP
IV
and TCP), Multiplexing, Connection management, Flow control and 08
retransmission, Window management,
TCP Congestion control, Quality of service.
Application Layer: Domain Name System, World Wide Web and Hyper Text
V Transfer Protocol,Electronic mail, File Transfer Protocol, Remote login, Network
management, Data compression, Cryptography – basic concepts. 08
Text books and References:
1. Behrouz Forouzan, “Data Communication and Networking”, McGraw Hill
2. Andrew Tanenbaum “Computer Networks”, Prentice Hall.
3. William Stallings, “Data and Computer Communication”, Pearson.
4. Kurose and Ross, “Computer Networking- A Top-Down Approach”, Pearson.
5. Peterson and Davie, “Computer Networks: A Systems Approach”, Morgan Kaufmann
6. W. A. Shay, “Understanding Communications and Networks”, Cengage Learning.
7. D. Comer, “Computer Networks and Internets”, Pearson.
8. Behrouz Forouzan, “TCP/IP Protocol Suite”, McGraw Hill.
PROGRAMME OUTCOME[POs]
PO 2. Problem Analysis: Identify, formulate, research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences,
PO 3. Design/development of Solutions: Design solutions for complex engineering problems and design
system components or processes that meet t h e specified needs with appropriate consideration for the
public health and safety, and the cultural, societal, and environmental considerations.
methods including design of experiments, analysis and interpretation of data, and synthesis of
PO 5. Modern Tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modeling to complex engineering activities with
PO 6. The Engineer and Society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the
PO 7. Environment and Sustainability: Understand the impact of the professional engineering solutions
in societal and environmental contexts, and demonstrate the knowledge of, and need for
sustainable development.
PO 8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of
PO 9. Individual and Team Work: Function effectively as an individual, and as a member or leader in
engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.
PO 11. Project Management and Finance: Demonstrate knowledge and understanding of the engineering
and management principles and apply these to one’s own work, as a member and leader in a team,
PO 12. Life-long Learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change.
UNIT 1
Computer Network?
A computer network is a set of devices connected through links. A node can be computer,
printer, or any other device capable of sending or receiving the data. The links connecting the
nodes are known as communication channels.
Computer Network uses distributed processing in which task is divided among several
computers. Instead, a single computer handles an entire task, each separate computer handles
a subset.
Computer Network?
NIC is a device that helps the computer to communicate with another device. The
network interface card contains the hardware
addresses, the data-link layer protocol use this address to identify the
system on the network so that it transfers the data to the correct destination.
Hub
Hub is a central device that splits the network connection into multiple devices. When
computer requests for informationfrom a computer, it sends the request to the Hub. Hub
distributes this request to all the interconnected computers.
Switches
Switch is a networking device that groups all the devices over the network to transfer the data
to another device. A switch is better than Hub as it does not broadcast the message over the
network, i.e., it sends the message to the device for which it belongs to. Therefore, we can
say that switch sends the message directly from source to the destination.
Cables and connectors
o Twisted pair cable: It is a high-speed cable thattransmits the data over 1Gbps or
more.
o Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial cable is
more expensive than twisted pair cable, but it provides the high data transmission
speed.
o Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the data
using light beams. It provides high data transmission speed as compared to other
cables. It is more expensive as compared to other cables, so it is installed at the
government level.
Router
Router is a device that connects the LAN to the internet. The router is mainly used to connect
the distinct networks or connect the internet to multiple computers.
Modem
Modem connects the computer to the internet over the existing telephone line. A modem is
not integrated with the computer motherboard. A modem is a separate part on the PC slot
found on the motherboard.
Communication speed
Network provides us to communicate over the network in a fast and efficient manner. For
example, we can do video conferencing, email messaging, etc. over the internet. Therefore,
the computer network is a great way to share our knowledge and ideas.
File sharing
File sharing is one of the major advantage of the computer network. Computer network
provides us to share the files with each other.
Since the files are stored in the main server which is centrally located. Therefore, it is easy to
take the back up from the main server.
We can install the applications on the main server, therefore, the user can access the
applications centrally. So, we do not need to install the software on every machine.
Similarly, hardware can also be shared.
Security
Network allows the security by ensuring that the user has the right to access the certain files
and applications.
Scalability
Scalability means that we can add the new components on the network. Network must be
scalable so that we can extend the network by adding new devices. But, it decreases the speed
of the connection and data of the transmission speed also decreases, this increases the
chances of error occurring. This problem can be overcome by using the routing or
switching devices.
Reliability
Computer network can use the alternative source for the data communication in case of any hardware
failure.
Ownership of
Network Private Private or Public Private or Public
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link is
reserved for transmission between those two devices. Most point-to-point connections use an actual length of wire or
cable to connect the two ends, but other options, such as microwave or satellite links, are also possible. When you
change television channels by infrared remote control, you are establishing a point-to-point connection between the
remote control and the television's control system.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific devices share a single link.
In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. If several devices
can use the link simultaneously, it is a spatially shared connection. If users must take turns, it is a timeshared
connection.
Network Topology
Geometric representation of how the computers are connected to each other is known as topology. There are five
types of topology – Mesh, Star, Bus, Ring and Hybrid.
Types of Topology
There are five types of topology in computer networks:
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
Mesh Topology
In mesh topology each device is connected to every other device on the network through a dedicated point-to-point
link. When we say dedicated it means that the link only carries data for the two connected devices only. Lets say
we have n devices in the network then each device must be connected with (n-1) devices of the network. Number
of links in a mesh topology of n devices would be n(n-1)/2.
1. No data traffic issues as there is a dedicated link between two devices which means the link is only available for
those two devices.
2. Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the communication
between other devices on the network.
3. Mesh topology is secure because there is a point to point link thus unauthorized access is not possible.
4. Fault detection is easy.
Star Topology
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star
topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If
one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data
to the designated device.
1. Less expensive because each device only need one I/O port and needs to be connected with hub with one link.
2. Easier to install
3. Less amount of cables required because each device needs to be connected with the hub only.
4. Robust, if one link fails, other links will work just fine.
5. Easy fault detection because the link can be easily identified.
Disadvantages of Star topology
1. If hub goes down everything goes down, none of the devices can work without hub.
2. Hub requires more resources and regular maintenance because it is the central system of star topology.
Bus Topology
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There
is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over the main
cable, there is a limit of drop lines and the distance a main cable can have.
Ring Topology
In ring topology each device is connected with the two devices on either side of it. There are two dedicated point to
point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as ring
topology. If a device wants to send data to another device then it sends the data in one direction, each device in ring
topology has a repeater, if the received data is intended for other device then repeater forwards this data until the
intended device receives it.
1. Easy to install.
2. Managing is easier as to add or remove a device from the topology only two links are required to be changed.
1. A link failure can fail the entire network as the signal will not travel forward due to failure.
2. Data traffic issues, since all the data is circulating in a ring.
Hybrid topology
A combination of two or more topology is known as hybrid topology. For example a combination of star and mesh
topology is known as hybrid topology.
1. We can choose the topology based on the requirement for example, scalability is our concern then we can use
star topology instead of bus technology.
2. Scalable as we can further connect other computer networks with the existing networks with different
topologies.
o The main aim of the layered architecture is to divide the design into small pieces.
o Each lower layer adds its services to the higher layer to provide a full set of services
to manage communications and run the applications.
o It provides modularity and clear interfaces, i.e., provides interaction between
subsystems.
o It ensures the independence between layers by providing the services from lower to
higher layer without defining how the services are implemented. Therefore, any
modification in a layer will not affect the other layers.
o The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower to a
higher layer and hiding the details from the layers of how the services are
implemented.
o The basic elements of layered architecture are services, protocols, and interfaces.
o Service: It is a set of actions that a layer provides to
the higher layer.
o Protocol: It defines a set of rules that a layer uses to exchange the information
with peer entity. These rules mainly concern about both the contents and order
of the messages used.
o Interface: It is a way through which the message is transferred from one layer
to another layer.
o In a layer n architecture, layer n on one machine will have a communication with
the layer n on another
machine and the rules used in a conversation are known as a layer-n protocol.
OSI Model
o OSI stands for Open System Interconnection is a
reference model that describes how information from a software application in
one computer moves through a physical medium to the software application in
another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO)
in 1984, and it is now considered as an architectural model for the inter- computer
communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each
layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
Characteristics of OSI Model:
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related issues, and
they are implemented only in the software. The application layer is closest to the end
user. Both the end user and the application layer interact with the software
applications. An upper layer refers to the layer just above another layer.
o The lower layer of the OSI model deals with the data transport issues. The data link
layer and the physical layer are implemented in hardware and software. The physical
layer is the lowest layer of the OSI model and isclosest to the physical medium. The
physical layer is mainly responsible for placing the information on thephysical
medium.
Functions of the OSI Layers
There are the seven OSI layers. Each layer has different functions. A list of seven layers is
given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Que :- Explain the Physical layer
o The main functionality of the physical layer is to transmit the individual bits from one
node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
o
Functions of the Data-link layer
o Framing: The data link layer translates the physical'sraw bit stream into packets
known as Frames. The Data link layer adds the header and trailer to the frame. The
header which is added to the frame contains the hardware destination and source
address.
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentionedin
the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that
no data get corrupted. It ensures that the transmitting station such as a server with
higher processing speed does not exceed the receiving station, with lower processing
speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is
placed to the Data link layer's trailer which is added to the message frame before it is
sent to the physical layer.If any error seems to occurr, then the receiver sends the
acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to determine
which device has control over the link at a given time.
Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on the
network.
o It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide the
routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in
which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known
as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
o Segmentation and reassembly: When the transport layer receives the message from
the upper layer, it divides the message into multiple segments, and each segment is
assigned with a sequence number that uniquely identifies each segment. When the
message has arrived at the destination, then the transport layer reassembles the
message based on their sequence numbers.
o Connection control: Transport layer provides two services Connection-oriented
service and connectionless service. A connectionless service treats each segment as an
individual packet, and they all travel in different routes to reach the destination. A
connection-oriented service makes a connection with the transport layer at the
destination machine before delivering the packets. In connection-oriented service, all
the packets travel in the single route.
o Flow control: The transport layer also responsible for flow control but it is performed
end-to-end rather than across a single link.
o Error control: The transport layer is also responsible for Error control. Error control
is performed end-to-end rather than across the single link. The sender transport
layer ensures that message reach at the destination
without any error.
Session Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
o The Presentation layer is also known as the syntax layer.
Application Layer
o An application layer serves as a window for users and application processes to
access network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer
functions.
o This layer provides the network services to the end-users.
TCP/IP model
these four layers are represented in TCP/IP model by a single layer called the
application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and each of them
provides specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more
lower-level protocols.
Functions of TCP/IP layers:
o A network layer is the combination of the Physical layer and Data Link layer defined
in the OSI reference model.
o It defines how the data should be sent physically through the network.
o This layer is mainly responsible for the transmission of the data between two devices
on the same network.
o The functions carried out by this layer are encapsulating the IP datagram into frames
transmitted by the network and mapping of IP addresses into physical addresses.
o The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay.
Internet Layer
An internet layer is the second layer of the TCP/IP model. An internet layer is also
known as the network layer.
The main responsibility of the internet layer is to send the packets from any network,
and they arrive at the destination irrespective of the route they take.
Following are the protocols used in this layer are:
IP Protocol: IP protocol is used in this layer, and it is the most significant part of the
entire TCP/IP suite.
Following are the responsibilities of this protocol:
o IP Addressing: This protocol implements logical host addresses known as IP
addresses. The IP addresses are used by the internet and higher layers to identify
the device and to provide internetwork routing.
o Host-to-host communication: It determines the path through which the data is to be
transmitted.
o Data Encapsulation and Formatting: An IP protocol accepts the data from the
transport layer protocol. An IP protocol ensures that the data is sent and received
securely, it encapsulates the data into message known as IP datagram.
o Fragmentation and Reassembly: The limit imposed on the size of the IP datagram
by data link layer protocol is known as Maximum Transmission unit (MTU). If the
size of IP datagram is greater than the MTU unit, then the IP protocol splits the
datagram into smaller units so that they can travel over the local network.
Fragmentation can be done by the sender or intermediate router. At the receiver side,
all the fragments are reassembled to form an original message.
o Routing: When IP datagram is sent over the same local network such as LAN, MAN,
WAN, it is known as direct delivery. When source and destination are on the distant
network, then the IP datagram is sent indirectly. This can be accomplished by routing
the IP datagram through various devices such as routers.
ARP Protocol
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data
which is being sent over the network.
Application Layer
o An application layer is the topmost layer in the TCP/IP model.
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP
model is more reliable.
3. OSI model has a separate 3. TCP/IP does not have a separate Presentation
Presentation layer and Session layer. layer or Session layer.
8. Protocols are hidden in OSI model 8. In TCP/IP replacing protocol is not easy.
and are easily replaced as the
technology changes.
Internet
Internet is defined as an Information super Highway, to access information over the web. However, It can be
defined in many ways as follows:
Internet is a world-wide global system of interconnected computer networks.
Evolution
The concept of Internet was originated in 1969 and has undergone several technological & Infrastructural changes as
discussed below:
The origin of Internet devised from the concept of Advanced Research Project Agency Network
(ARPANET).
ARPANET was developed by United States Department of Defense.
Basic purpose of ARPANET was to provide communication among the various bodies of
government.
Initially, there were only four nodes, formally called Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes located at different countries and thus became
known as Internet.
By the time, with invention of new technologies such as TCP/IP protocols, DNS, WWW, browsers, scripting
languages etc.,Internet provided a medium to publish and access information over the web.
Advantages
Internet covers almost every aspect of life, one can think of. Here, we will discuss some of the advantages of
Internet:
Internet allows us to communicate with the people sitting at remote locations. There are various apps
available on the wed that uses Internet as a medium for communication. One can find various social
networking sites such as:
o Facebook
o Twitter
o Yahoo
o Google+
o Flickr
o Orkut
One can surf for any kind of information over the internet. Information regarding various topics such as
Technology, Health & Science, Social Studies, Geographical Information, Information Technology,
Products etc can be surfed with help of a search engine.
Apart from communication and source of information, internet also serves a medium for entertainment.
Following are the various modes for entertainment over internet.
o Online Television
o Online Games
o Songs
o Videos
o Social Networking Apps
Internet allows us to use many services like:
o Internet Banking
o Matrimonial Services
o Online Shopping
o Online Ticket Booking
o Online Bill Payment
o Data Sharing
o E-mail
Internet provides concept of electronic commerce, that allows the business deals to be conducted on
electronic systems
Disadvantages
However, Internet has prooved to be a powerful source of information in almost every field, yet there exists many
disadvanatges discussed below:
There are always chances to loose personal information such as name, address, credit card number.
Therefore, one should be very careful while sharing such information. One should use credit cards only
through authenticated sites.
Another disadvantage is the Spamming.Spamming corresponds to the unwanted e-mails in bulk. These e-
mails serve no purpose and lead to obstruction of entire system.
Virus can easily be spread to the computers connected to internet. Such virus attacks may cause your system
to crash or your important data may get deleted.
Also a biggest threat on internet is pornography. There are many pornographic sites that can be found, letting
your children to use internet which indirectly affects the children healthy mental life.
There are various websites that do not provide the authenticated information. This leads to misconception
among many people.
Transmission media?
Data can be represented either in analog or digital form. The computers used
the digital form to store the information. Therefore, the data needs to be
converted in digital form so that it can be used by a computer.
DIGITAL-TO-DIGITAL CONVERSION
o Unipolar Encoding
o Polar Encoding
o Bipolar Encoding
Unipolar
o Digital transmission system sends the voltage pulses over the medium link
such as wire or cable.
o In most types of encoding, one voltage level represents 0, and another
voltage level represents 1.
o The polarity of each pulse determines whether it is positive or negative.
o This type of encoding is known as Unipolar encoding as it uses only one
polarity.
o In Unipolar encoding, the polarity is assigned to the 1 binary state.
o In this, 1s are represented as a positive value and 0s are represented as a
zero value.
o In Unipolar Encoding, '1' is considered as a high voltage and '0' is
considered as a zero voltage.
o Unipolar encoding is simpler and inexpensive to implement.
Unipolar encoding has two problems that make this scheme less desirable:
o DC Component
o Synchronization
Polar
o Polar encoding is an encoding scheme that uses two voltage levels: one
is positive, and another is negative.
o By using two voltage levels, an average voltage level is reduced, and
the DC component problem of unipolar encoding scheme is alleviated.
NRZ
o NRZ stands for Non-return zero.
o In NRZ encoding, the level of the signal can be represented either positive
or negative.
NRZ-I: NRZ-I is an inversion of the voltage level that represents 1 bit. In the
NRZ-I encoding scheme, a transition occurs between the positive and negative
voltage that represents 1 bit. In this scheme, 0 bit represents no change and 1
bit represents a change in voltage level.
RZ
o RZ stands for Return to zero.
o There must be a signal change for each bit to achieve synchronization.
However, to change with every bit, we need to have three values:
positive, negative and zero.
o RZ is an encoding scheme that provides three values, positive voltage
represents 1, the negative voltage represents 0, and zero voltage
represents none.
o In the RZ scheme, halfway through each interval, the signal returns to zero.
o In RZ scheme, 1 bit is represented by positive-to-zero and 0 bit is
represented by negative-to- zero.
Disadvantage of RZ:
It performs two signal changes to encode one bit that acquires more bandwidth.
Biphase
o Biphase is an encoding scheme in which signal changes at the middle of
the bit interval but does not return to zero.
Manchester
o It changes the signal at the middle of the bit interval but does
not return to zero for synchronization.
Differential Manchester
o It changes the signal at the middle of the bit interval for
synchronization, but the presence or absence of the transition at the
beginning of the interval determines the bit. A transition means binary
0 and no transition means binary 1.
Bipolar
o Bipolar encoding scheme represents three voltage levels: positive, negative,
and zero.
o In Bipolar encoding scheme, zero level represents binary 0, and
binary 1 is represented by alternating positive and negative
voltages.
o If the first 1 bit is represented by positive amplitude, then the second 1
bit is represented by negative voltage, third 1 bit is represented by the
positive amplitude and so on. This alternation can also occur even
when the 1bits are not consecutive.
ANALOG-TO-DIGITAL CONVERSION
o When an analog signal is digitalized, this is called an analog-to-digital
conversion.
o Suppose human sends a voice in the form of an analog signal, we need
to digitalize the analog signal which is less prone to noise. It requires a
reduction in the number of values in an analog message so that they
can be represented in the digital stream.
Guided Media
It is defined as the physical medium through which the signals are transmitted.
It is also known as Bounded media.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each
other. A twisted pair cable is cheap as compared to other transmission media.
Installation of the
twisted pair cable is easy, and it is a lightweight cable.
The frequency range for twisted pair cable is from 0 to in
3.5KHz. the
A twisted pair consists of two insulated copper wires
arranged in a regular spiral pattern.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
UTP Connectors
A shielded twisted pair is a cable that contains the mesh surrounding the wire
that allows the higher transmission rate.
Characteristics Of Shielded Twisted Pair:
o The cost of the shielded twisted pair cable is not very high and not
very low.
o An installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example,
TV wire is usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to
each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the
outer conductor is made up of copper mesh. The middle core is made up
of non-conductive cover that separates the inner conductor from the outer
conductor.
o The middle core is responsible for the data transferring whereas the
copper mesh prevents from the EMI(Electromagnetic interference).
BNC Connector
Fibre Optic
to cause the reflection within the core so that the light waves are
transmitted through the fibre.
o Jacket: The protective coating consisting of plastic is known as a jacket.
The main purpose of a jacket is to preserve the fibre strength, absorb
shock and extra fibre protection.
o Thinner and Sturdier: Fibre optic cable is thinner and lighter in weight
so it can withstand more pull pressure than copper cable.
UnGuided Transmission
Radio waves
Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
Radio waves are omnidirectional, i.e., the signals are
propagated in all the directions.
The range in frequencies of radio waves is from 3Khz to 1 ghz.
In the case of radio waves, the sending and receiving antenna are not
aligned, i.e., the wave sent by the sending antenna can be received by any
receiving antenna.
An example of the radio wave is FM radio.
o A Radio wave is useful for multicasting when there is one sender and
many receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
Microwaves
Microwave transmission is a technology that transmits the
focused beam of a radio signal from one
ground-based microwave transmission antenna to
another.
o Microwaves are the electromagnetic waves having the
frequency in the range from 1GHz to 300 GHz.
o Microwaves are unidirectional as the sending and receiving
antenna is to be aligned, i.e., the waves sent by the sending
antenna are narrowly focussed.
o In this case, antennas are mounted on the towers to send a
beam to another antenna which is km away.
o It works on the line of sight transmission, i.e., the antennas
mounted on the towers are the direct sight of each other.
Advantages Of Microwave:
o It is free from land acquisition as it does not require any land for the
installation of cables.
o Microwave transmission provides an easy communication in terrains as
the installation of cable in terrain is quite a difficult task.
o Communication over oceans can be achieved by using microwave
transmission.
Infrared
o An infrared transmission is a wireless technology used for
communication over short ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data
transfer between two cell phones, TV remote operation, data transfer
between a computer and cell phone resides in the same closed area.
Characteristics Of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared
communication in one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum
interference.
o Infrared communication is unreliable outside the building because the sun
rays will interfere with the infrared waves.
Switching
Advantages of Switching:
Switching techniques
Circuit Switching
o Circuit switching is a switching technique that
establishes a dedicated path between sender and
receiver.
o In the Circuit Switching Technique, once the connection
is established then the dedicated path will remain to
exist until the connection is terminated.
o Circuit establishment
o Data transfer
o Circuit Disconnect
Message Switching
o Message Switching is a switching technique in which a
message is transferred as a complete unit and routed
through intermediate nodes at which it is stored and
forwarded.
Packet Switching
o The packet switching is a switching technique in which
the message is sent in one go, but it is divided into
smaller pieces, and they are sent individually.
o The message splits into smaller pieces known as
packets and packets are given a unique number to
identify their order at the receiving end.
o Every packet contains some information in its
headers such as source address, destination
address and sequence number.
o Packets will travel across the network, taking the shortest path as
possible.
o All the packets are reassembled at the receiving end in correct
order.
o If any packet is missing or corrupted, then the message
will be sent to resend the message.
o If the correct order of the packets is reached, then
the acknowledgment message will be sent.
Why Multiplexing?
History of Multiplexing
Concept of Multiplexing
Advantages of Multiplexing:
o It is an analog technique.
o Frequency Division Multiplexing is a technique in
which the available bandwidth of a single
transmission medium is subdivided into several
channels.
Advantages Of FDM:
o FDM is used for analog signals.
o FDM process is very simple and easy modulation.
o A Large number of signals can be sent through an FDM
simultaneously.
o It does not require any synchronization between sender and
receiver.
Disadvantages Of FDM:
Applications Of FDM:
o It is a digital technique.
o In Frequency Division Multiplexing Technique, all signals
operate at the same time with different frequency, but in
case of Time Division Multiplexing technique, all signals
operate at the same frequency with different time.
Concept Of TDM
Transmission impairment
When the received signal is not identical to the transmitted one due to the
transmission impairment. The quality of the signals will get destroyed
due to transmission impairment.
Performance of a Network
Performance of a network pertains to the measure of service quality of a
network as perceived by the user. There are different ways to measure the
performance of a network, depending upon the nature and design of the
network. The characteristics that measure the performance of a network
are :
Bandwidth
Throughput
Latency (Delay)
Jitter
BANDWIDTH
One of the most essential conditions of a website’s performance is the
amount of bandwidth allocated to the network. Bandwidth determines how
rapidly the web server is able to upload the requested information. While
there are different factors to consider with respect to a site’s performance,
bandwidth is every now and again the restricting element.
Bandwidth is characterized as the measure of data or information that can
be transmitted in a fixed measure of time. The term can be used in two
different contexts with two distinctive estimating values. In the case of
digital devices, the bandwidth is measured in bits per second(bps) or bytes
per second. In the case of analog devices, the bandwidth is measured in
cycles per second, or Hertz (Hz).
Bandwidth is only one component of what an individual sees as the speed
of a network. People frequently mistake bandwidth with internet speed in
light of the fact that internet service providers (ISPs) tend to claim that
they have a fast “40Mbps connection” in their advertising campaigns. True
internet speed is actually the amount of data you receive every second and
that has a lot to do with latency too.
“Bandwidth” means “Capacity” and “Speed” means “Transferrate”.
More bandwidth does not mean more speed. Let us take a case where we
have double the width of the tap pipe, but the water rate is still the same as
it was when the tap pipe was half the width. Hence, there will be no
improvement in speed. When we consider WAN links, we mostly mean
bandwidth but when we consider LAN, we mostly mean speed. This is on
the grounds that we are generally constrained by expensive cable
bandwidth over WAN rather than hardware and interface data transfer
rates (or speed) over LAN.
LATENCY
In a network, during the process of data communication, latency(also
known as delay) is defined as the total time taken for a complete message
to arrive at the destination, starting with the time when the first bit of the
message is sent out from the source and ending with the time when the last
bit of the message is delivered at the destination. The network connections
where small delays occur are called “Low-Latency-Networks” and the
network connections which suffer from long delays are known as “High-
Latency-Networks”.
. Latency is also known as a ping rate and measured in milliseconds(ms).
In simpler terms: latency may be defined as the time required to
successfully send a packet across a network.
It measured in many ways like: round trip, one way, etc.
It might be affected by any component in the chain which is utilized to
vehiculate data, like: workstation, WAN links, routers, LAN, server and
eventually may be limited for large networks, by the speed of light.
Latency = Propagation Time + Transmission Time +
Queuing Time + Processing Delay
Propagation Time: It is the time required for a bit to travel from the
source to the destination. Propagation time can be calculated as the ratio
between the link length (distance) and the propagation speed over the
communicating medium. For example, for an electric signal, propagation
time is the time taken for the signal to travel through a wire.
Propagation time = Distance / Propagation speed
Example:
Input: What will be the propagation time when the distance
between two points is
12, 000 km? Assuming the propagation speed to be 2.4
* 10^8 m/s in cable.
Queuing Time: Queuing time is a time based on how long the packet has to
sit around in the router. Quite frequently the wire is busy, so we are not
able to transmit a packet immediately. The queuing time is usually not a
fixed factor, hence it changes with the load thrust in the network. In cases
like these, the packet sits waiting, ready to go, in a queue. These delays are
predominantly characterized by the measure of traffic on the system. The
more the traffic, the more likely a packet is stuck in the queue, just sitting in
the memory, waiting.
Processing Delay: Processing delay is the delay based on how long it takes
the router to figure out where to send the packet. As soon as the router
finds it out, it will queue the packet for transmission. These costs are
predominantly based on the complexity of the protocol. The router must
decipher enough of the packet to make sense of which queue to put the
packet in. Typically the lower level layers of the stack have simpler
protocols. If a router does not know which physical port to send the packet
to, it will send it to all the ports, queuing the packet in many queues
immediately. Differently, at a higher level, like in IP protocols, the
processing may include making an ARP request to find out the physical
address of the destination before queuing the packet for transmission.
This situation may also be considered as a processing delay.
JITTER
Jitter is another performance issue related to delay. In technical terms, jitter is a
“packet delay variance”. It can simply mean that jitter is considered as a
problem when different packets of data face different delays in a network and
the data at the receiver application is time-sensitive, i.e. audio or video data.
Jitter is measured in milliseconds(ms). It is defined as an interference in the
normal order of sending data packets. For example: if the delay for the first
packet is 10 ms, for the second is 35 ms, and for the third is 50 ms, then the
real-time destination application that uses the packets experiences jitter.