Professional Documents
Culture Documents
Data Communication
Data Communication
2.16
Source-to-destination delivery
Transport layer
The transport layer is responsible for the delivery
of a message from one process to another. A process is an
application program running on a host. Whereas the
network layer oversees source-to-destination delivery of
individual packets, it does not recognize any relationship
between those packets.
2.19
• The transport layer, on the other hand, ensures that the whole
message arrives intact and in order, overseeing both error control
and flow control at the source-to-destination level.
• Service-point addressing. The network layer gets each packet to the
correct computer; the transport layer gets the entire message to the
correct process on that computer.
• Segmentation and reassembly.
• Connection control. The transport layer can be either connectionless
or connection oriented. A connectionless transport layer treats each
segment as an independent packet and delivers it to the transport
layer at the destination machine. A connection oriented transport
layer makes a connection with the transport layer at the destination
machine first before delivering the packets.
• Flow control. Like the data link layer, the transport layer is
responsible for flow control. However, flow control at this layer is
performed end to end rather than across a single link.
• Error control. Like the data link layer, the transport layer is
responsible for error control. However, error control at this layer is
performed process-to process rather than across a single link.
2.20
Reliable process-to-process delivery of a message
Session layer
The session layer is responsible for dialog
control and synchronization.
• Dialog control. The session layer allows two systems to
enter into a dialog.
• Synchronization. The session layer allows a process to
add checkpoints, or synchronization points, to a stream of
data.
Presentation layer
2.24
The presentation layer is responsible for translation (Because
different computers use different encoding systems, the
presentation layer is responsible for interoperability between
these different encoding methods), compression, and
encryption.
2.25
Application layer
The application layer is responsible for
providing services to the user.
07:01:02:01:2C:4B
753
Suppose a signal travels through a transmission medium and its power is reduced to
one-half. This means that P2 is (1/2)P1. In this case, the attenuation (loss of power)
can be calculated as
The power of a signal is 10 mW and the power of the noise is 1 μW; what are the
values of SNR and SNRdB ?
Solution
The values of SNR and SNRdB can be calculated as follows:
Example
Consider the same noiseless channel transmitting a signal with four signal levels (for
each level, we send 2 bits). The maximum bit rate can be calculated as
Example
We need to send 265 kbps over a noiseless channel with a bandwidth of 20 kHz. How
many signal levels do we need?
Solution
We can use the Nyquist formula as shown:
Since this result is not a power of 2, we need to either increase the number of levels or
reduce the bit rate. If we have 128 levels, the bit rate is 280 kbps. If we have 64 levels,
the bit rate is 240 kbps.
Shannon’s Theorem
C = B log2(1 + SNR)
Example
Consider an extremely noisy channel in which the value of the signal-to-noise ratio is
almost zero. In other words, the noise is so strong that the signal is faint. For this
channel the capacity C is calculated as
This means that the capacity of this channel is zero regardless of the bandwidth. In
other words, we cannot receive any data through this channel.
Example
We can calculate the theoretical highest bit rate of a regular telephone line. A
telephone line normally has a bandwidth of 3000. The signal-to-noise ratio is usually
3162. For this channel the capacity is calculated as
This means that the highest bit rate for a telephone line is 34.860 kbps. If we want to
send data faster than this, we can either increase the bandwidth of the line or
improve the signal-to-noise ratio.
Example
The signal-to-noise ratio is often given in decibels. Assume that SNR dB = 36 and the
channel bandwidth is 2 MHz. The theoretical channel capacity can be calculated as
Example
We have a channel with a 1-MHz bandwidth. The SNR for this channel is 63. What
are the appropriate bit rate and signal level?
Solution
First, we use the Shannon formula to find the upper limit.
The Shannon formula gives us 6 Mbps, the upper limit. For better performance we
choose something lower, 4 Mbps, for example. Then we use the Nyquist formula to
find the number of signal levels.
The Shannon capacity gives us the
upper limit; the Nyquist formula tells us
how many signal levels we need.
3.63
PERFORMANCE
1. The bandwidth of a subscriber line is 4 kHz for voice or data. The bandwidth of
this line for data transmission
can be up to 56,000 bps using a sophisticated modem to change the digital signal to
analog.
2. If the telephone company improves the quality of the line and increases the
bandwidth to 8 kHz, we can send 112,000 bps by using the same technology as
mentioned in Example 3.42.
Example
A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per
minute with each frame carrying an average of 10,000 bits. What is the throughput of
this network?
Solution
We can calculate the throughput as
What is the propagation time if the distance between the two points is 12,000 km?
Assume the propagation speed to be 2.4 × 108 m/s in cable.
Solution
We can calculate the propagation time as
The example shows that a bit can go over the Atlantic Ocean in only 50 ms if there is
a direct cable between the source and the destination.
2.70
Example
What are the propagation time and the transmission time for a 2.5-kbyte message (an
e-mail) if the bandwidth of the network is 1 Gbps? Assume that the distance between
the sender and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission time as shown on the next slide:
Note that in this case, because the message is short and the bandwidth is high, the
dominant factor is the propagation time, not the transmission time. The transmission
time can be ignored.
Example
What are the propagation time and the transmission time for a 5-Mbyte message (an
image) if the bandwidth of the network is 1 Mbps? Assume that the distance between
the sender and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission times as shown on the next slide.
Note that in this case, because the message is very long and the bandwidth is not very
high, the dominant factor is the transmission time, not the propagation time. The
propagation time can be ignored.
Transmission medium and physical layer
Classes of transmission media
GUIDED MEDIA
7.78
Coaxial cable
Categories of coaxial cables
Fiber optics: Bending of light ray
Optical fiber
Propagation modes
Modes
UNGUIDED MEDIA: WIRELESS
Radio Waves
Microwaves
Infrared
Electromagnetic spectrum for wireless communication
Propagation methods
Bands
Wireless transmission waves
Radio waves are used for multicast communications, such as radio and
television, and paging systems. They can penetrate through walls.
Highly regulated. Use omni directional antennas
Microwaves are used for unicast communication such as cellular telephones,
satellite networks,
and wireless LANs.
Higher frequency ranges cannot penetrate walls.
Use directional antennas - point to point line of sight communications.
7.91
Infrared signals can be used for short-range communication in a closed area
using line-of-sight propagation.
7.92
Wireless Channels
Are subject to a lot more errors than guided
media channels.
Interference is one cause for errors, can be
circumvented with high SNR.
The higher the SNR the less capacity is
available for transmission due to the
broadcast nature of the channel.
Channel also subject to fading and no
coverage holes.
Switching
CIRCUIT-SWITCHED NETWORKS
(physical layer transfer of the signal). The data are a continuous flow
sent by the source station and received by the destination station,
although there may be periods of silence.
There is no addressing involved during data transfer. Of course, there
system A needs to connect to system M, it sends a setup request that includes the address
of system M, to switch I. Switch I finds a channel between itself and switch IV that can be
dedicated for this purpose. Switch I then sends the request to switch IV, which finds a
dedicated channel between itself and switch III. Switch III informs system M of system A's
intention at this time.
In the next step to making a connection, an acknowledgment from system M needs to be
sent in the opposite direction to system A. Only after system A receives this
acknowledgment is the connection established.
Three Phases
• Although a circuit-switched network normally has low efficiency, the delay in this
type of network is minimal.
• During data transfer the data are not delayed at each switch.
• The total delay is due to the time needed to create the connection, transfer data,
and disconnect the circuit.
• Delay caused by the setup is the sum of four parts: the propagation time of the
source computer request ,the request signal transfer time, the propagation time of
the acknowledgment from the destination computer, and the signal transfer time of
the acknowledgment.
DATAGRAM NETWORKS
If the message is going to pass through a packet-switched network, it
needs to be divided into packets of fixed or variable size. The size of the
packet is determined by the network and the governing protocol.
In packet switching, there is no resource allocation for a packet.
Resources are allocated on demand.
The allocation is done on a first-come, first-served basis. When a switch
receives a packet, no matter what is the source or destination, the packet
must wait if there are other packets being processed.
In a datagram network, each packet is treated independently of all others.
Datagram switching is normally done at the network layer.
The datagram networks are sometimes referred to as connectionless
networks. The term connectionless here means that the switch (packet
switch) does not keep information about the connection state.
There are no setup or teardown phases.
Each packet is treated the same by a switch regardless of its source or
destination.
A datagram network with four switches (routers)
Routing Table
If there are no setup or teardown phases, how are the packets routed to
their destinations in a datagram network?
In this type of network, each switch (or packet switch) has a routing table
which is based on the destination address.
The routing tables are dynamic and are updated periodically.
The destination addresses and the corresponding forwarding output ports
are recorded in the tables.
Destination Address
Every packet in a datagram network carries a
header that contains, among other information,
the destination address of the packet.
When the switch receives the packet, this
destination address is examined; the routing
table is consulted to find the corresponding port
through which the packet should be forwarded.
This address, unlike the address in a virtual-
circuit-switched network, remains the same
during the entire journey of the packet.
Delay
There may be greater delay in a datagram network than in a virtual-circuit
network.
Although there are no setup and teardown phases, each packet may
experience a wait at a switch before it is forwarded.
Since not all packets in a message necessarily travel through the same
switches, the delay is not uniform for the packets of a message
VIRTUAL-CIRCUIT NETWORKS
identifier (VCI).
A VCI, unlike a global address, is a small number that has only switch scope; it is
VCl.
Note that a VCI does not need to be a large number since each switch can use its
• A frame arriving at port 1 with a VCI of 14. When the frame arrives, the switch
looks in its table to find port 1 and a VCI of 14. When it is found, the switch knows
to change the VCI to 22 and send out the frame from port 3.
• The data transfer phase is active until the source sends all its frames to the
destination.
• The procedure at the switch is the same for each frame of a message.
• The process creates a virtual circuit, not a real circuit, between the source and
destination.
Switch and tables in a virtual-circuit network
Setup Phase:
In the setup phase, a switch creates an entry for a virtual circuit. For example,
suppose source A needs to create a virtual circuit to B. Two steps are required:
the setup request and the acknowledgment.
The switch assigns the incoming port (1) and chooses an available incoming VCI (14)
and the outgoing port (3). It does not yet know the outgoing VCI, which will be found
during the acknowledgment step. The switch then forwards the frame through port 3
to switch 2.
Acknowledgment
Destination B receives the setup frame, and if it is ready to receive frames from
A, it assigns a VCI to the incoming frames that come from A, in this case 77.
This VCI lets the destination know that the frames come from A, and not other
sources.
Teardowil Phase:
In this phase, source A, after sending all frames to B, sends a special frame called
a teardown request. Destination B responds with a teardown confirmation frame.
All switches delete the corresponding entry from their tables.
Delay in Virtual-Circuit Networks
STRUCTURE OF A SWITCH
Structure of Circuit Switches:
Circuit switching today can use either of two technologies: the space-division
switch or the time-division switch.
Space-Division Switch
In space-division switching, the paths in the circuit are separated from one
another spatially.
Crossbar Switch: A crossbar switch connects n inputs to m outputs in a grid,
using electronic microswitches (transistors) at each crosspoint.
of crosspoints.
Each crosspoint in the middle stage can be accessed by multiple crosspoints in
2.122
Example
2.123
Example:
DIGITAL SUBSCRIBER LINE
This flag can create the same type of problem we saw in the byte-oriented
protocols. That is, if the flag pattern appears in the data, we need to
somehow inform the receiver that this is not the end of the frame.
We do this by stuffing 1 single bit (instead of I byte) to prevent the pattern
from looking like a flag. The strategy is called bit stuffing.
Bit stuffing is the process of adding one extra 0 whenever five
consecutive 1s follow a 0 in the data, so that the receiver does not
mistake the pattern 0111110 for a flag.
FLOW AND ERROR CONTROL
The most important responsibilities of the data link layer are flow
control and error control. Collectively, these functions are known as
data link control.
Now let us see how the data link layer can combine
framing, flow control, and error control to achieve the
delivery of data from one node to another. The
protocols are normally implemented in software by
using one of the common programming languages. To
make our discussions language-free, we have written
in pseudocode a version of each protocol that
concentrates mostly on the procedure instead of
delving into the details of language rules.
Taxonomy of protocols discussed in this chapter
NOISELESS CHANNELS
11.153
Design of Stop-and-Wait Protocol
Algorithm Sender-site algorithm for Stop-and-Wait Protocol
Algorithm Receiver-site algorithm for Stop-and-Wait Protocol
Figure 11.9 Flow diagram for Example 11.2
11.157
NOISY CHANNELS
(continued)
(continued)
Sender-site algorithm for Stop-and-Wait ARQ
Receiver-site algorithm for Stop-and-Wait ARQ Protocol
HDLC
In normal response mode (NRM), the station configuration is unbalanced. We have one
primary station and multiple secondary stations. A primary station can send commands;
a secondary station can only respond. The NRM is used for both point-to-point and
multiple-point links
Asynchronous balanced mode
• Each frame in HDLC may contain up to six fields: a beginning flag field, an address
field, a control field, an information field, a frame check sequence (FCS) field, and
an ending flag field.
• In multiple-frame transmissions, the ending flag of one frame can serve as the
beginning flag of the next frame.
• Flag field:. The flag field of an HDLC frame is an 8-bit
sequence with the bit pattern 01111110 that identifies both the
beginning and the end of a frame and serves as a
synchronization pattern for the receiver.
• Address field. The second field of an HDLC frame contains the
address of the secondary station. If a primary station created the
frame, it contains a to address. If a secondary creates the frame,
it contains a from address.
• Control field. The control field is a 1- or 2-byte segment of the
frame used for flow and error control. The interpretation of bits
in this field depends on the frame type.
• Information field. The information field contains the user's data
from the network layer or management information. Its length
can vary from one network to another.
• FCS field. The frame check sequence (FCS) is the HDLC error
detection field. It can contain either a 2- or 4-byte CRC.
Control field format for the different frame types
U-frame control command and response
2.171