Module-1 PPT Data Communication
Module-1 PPT Data Communication
1-1
Introduction
1. Data communications
2. Networks
3. The Internet
4. Protocols and standards
1-2
Data Communications
Sharing of information
Local: Between individual ,face to face
Remote: Takes place over distance
Telecommunication-(tele far): communication at distance
• Data
Information presented in whatever form is agreed upon by the
parties creating and using the data
• Data communication
Exchange of data between two devices
Via some form of transmission medium
1-3
Fundamental characteristics
Delivery: Data must be correctly delivered, must be
received correctly by intended party.
Accuracy: System must deliver the data accurately
Data that have been altered in transmission and Uncorrected
data are unusable
Timeliness: System must deliver the data in a timely
manner.
Late delivered data are useless
Video and audio data must be delivered in real-time.
Jitter: It is the variation in the packet arrival time
1-4
Five Components of Data Communication
• Message
• Sender
• Receiver
• Transmission medium
• Protocol
1-5
Message: Information to be communicated
Text, number, pictures, audio, video
Sender: The device that sends the data message.
Computer, workstation, telephone handset, video camera.
Receiver: The device that receives the message from sender.
Computer, workstation, telephone handset, television.
Transmission medium: It is the physical path by which a
message travels from sender to receiver.
Twisted pair, coaxial cable, fiber optic cable ,radio waves.
Protocol: It is the set of rules that govern data
communication.
It represents agreement between the communicating devices
1-6
Data Representation
Text: Represented as a bit pattern(0’s and 1’s)
Different sets of bit patterns have been designed to represent text
Code-each set of pattern; Coding-Process of representing symbols
Unicode-coding system; uses 32 bits to represent a symbol or character.
ASCII-to represent 127 character
Numbers: Represented by bit pattern
Numbers are directly converted to a binary.
Images: Represented by bit pattern
Pixel : smallest unit of image
Resolution: Number of pixels in unit area
Methods: RGB, Black and white, gray scale system
Audio: Recording and broadcasting of sound or music
It is continuous in nature
Video: Recording and broadcasting of picture or movie
It can be continuous, combination of images.
1-7
Data Flow
Simplex: Communication is unidirectional
Only one of the two devices can transmit other can only receive
Examples: Keyboard, Monitors
Entire capacity of the channel is to send data in one direction
Half duplex: Each station can both transmit and receive, but not at the
same time.
When one device is sending , the other can only receive.
Example: Walkie-Talkies and (Citizen Band) radios
Entire capacity of the channel is utilized for each direction.
Distributed Processing
• Task is divided among multiple computers.
• Separate machine handle subset of the task
1-10
Network Criteria
Performance: Measured in terms of response and transmit time.
Transmit time: Time required for a message to travel from one device to
another.
Response time: Time between an inquiry and a response
Performance of a network depends:
Number of users
Type of transmission medium
Capabilities of the connected hardware
Efficiency of the software
Throughput: Number of bits transmitted in per second
Delay: time taken to transmit data
Reliability: Frequency of failure
Security: Protecting data from unauthorized access, protecting data from
damage, development.
1-11
Physical Structures
Types of connection
• Point-to-point
– Dedicated link between two devices
– The entire capacity of the channel is reserved
– Ex) Microwave link, TV remote control
• Multipoint
– More than two devices share a single link
– Capacity of the channel is either
• Spatially shared: Devices can use the link simultaneously
• Timeshare: Users must take turns
1-12
1-13
Physical Topology
Physical topology is the way in which a network is laid out
physically
Two or more devices connect to a link
Two or more links form a topology
Different Topologies are :Mesh, Star, Bus, Ring
1-14
Mesh Topology
• Dedicated point-to-point link to every other nodes. The
term dedicated means that the link carries traffic only b/w
the two devices it connects
• Consider that each node must be connected to every other
node.
• Node1 must be connected to n-1 nodes, node2 must be
connected to n-1 node and finally node n must be
connected to n-1 nodes.
• We need n(n-1) physical links. If link allows
communication in both directions, we can divide number
of links by 2. in a mesh topology, we need n(n-1)/2
1-15
1-16
Advantages
Eliminating the traffic problem
Robust
Privacy
Fault identification and fault isolation
Disadvantages
Installation and reconnection
Wiring space is more
Hardware required to connect each link can be expensive
1-17
Star Topology
• Dedicated point-to-point link only to a central controller,
called a hub
1-18
Advantages
Less expensive, easy to install and reconfigure
Robust
Fault detection and fault isolation is also easy
Disadvantages
Dependency of the whole on one single point, the
hub
1-19
Bus Topology
• One long cable acts as a backbone to links all nodes
1-20
Advantages
Easy installation
Cheap
Disadvantages
Difficult reconfiguration and fault isolation,
A fault or break in the bus stops all transmission
1-21
Ring Topology
• Dedicated point-to-point link only with the two nodes on
each sides
1-22
Advantages
•Easy reconfiguration
•Fault isolation
Disadvantage
• Unidirectional traffic
•A break in the ring can disable the entire network
1-23
Hybrid Topology
• Example: Main star topology with each branch connecting several stations in a bus
topology
• To share the advantages from various topologies
1-24
Categories of Networks
1-25
LAN
• Usually privately owned
1-26
1-27
An isolated LAN connecting 12 computers to a hub in a closet
1-28
MAN
• Designed to extend to an entire city
1-29
WAN
1-30
1-31
Internetwork
• Internetwork (internet) : two or more networks are
connected by internetworking devices
• Internetworking devices: router, gateway, etc.
• The Internet: a specific worldwide network
1-32
1-33
Internetwork Example
• A heterogeneous network : four WANs and two LANs
1-34
• Switching
• An internet is a switched network in which a switch connects
at least two links together. A switch needs to forward data from
a network to another network when required.
• The two most common types of switched networks are
circuit-switched and packet-switched networks.
1-35
• Circuit-Switched Network
• In a circuit-switched network, a dedicated connection, called
a
circuit, is always available between the two end systems;
the switch can only make it active or inactive.
1-36
1-37
• Packet-Switched Network
• In a computer network, the communication between the two ends
is done in blocks of data called packets.
• we see the exchange of individual data packets between the two
computers.
• This allows us to make the switches function for both storing and
forwarding because a packet is an independent entity that can be
stored and sent later
1-38
1-39
The Internet
• an internet (note the lowercase i) is two or more networks that
can communicate with each other.
• The most notable internet is called the Internet (uppercase I ),
and is composed of thousands of interconnected networks.
1-40
1-41
Accessing the Internet
• The Internet today is an internetwork that allows any user to become part
of it. The user, however, needs to be physically connected to an ISP. The
physical connection is normally done through a
point-to-point WAN.
Using Telephone Networks
Dial-up service
• The first solution is to add to the telephone line a modem that converts
data to voice. The software installed on the computer dials the ISP and
imitates making a telephone connection.
• DSL Service
• Since the advent of the Internet, some telephone companies have
upgraded their telephone lines to provide higher speed Internet services to
residences or small businesses.
1-42
Using Cable Networks
• The cable companies have been upgrading their cable networks and
connecting to the Internet. A residence or a small business can be
connected to the Internet by using this service.
• It provides a higher speed connection, but the speed varies
depending on the number of neighbors that use the same cable
1-43
• Direct Connection to the Internet
• A large organization or a large corporation can itself
become a local ISP and be connected to the Internet.
• This can be done if the organization or the corporation
leases a high-speed WAN from a carrier provider and
connects itself to a regional ISP.
• For example, a large university with several campuses
can create an internetwork and then connect the
internetwork to the Internet
1-44
• INTERNET HISTORY
• Early History
• There were some communication networks, such as telegraph and telephone networks, before
1960.
• These networks were suitable for constant-rate communication at that time.
• A computer network, on the other hand, should be able to handle bursty data, which means data
received at variable rates at different times.
• Packet switched Networks
• In 1960 Advanced Research Projects Agency (ARPA)
• In 1967 ARPANET Advanced Research Projects Agency Network
a small network of connected computers.
• The idea was that each host computer would be attached to a specialized
computer, called an interface message processor (IMP).
• Each IMP had to be able to communicate with other IMPs as well as with its own attached host.
1-45
Birth of the Internet
• In 1972, Vint Cerf and Bob Kahn, both of whom were part of the core ARPANET
group, collaborated on what they called the Internetting Project.
• They wanted to link dissimilar networks so that a host on one network could
communicate with a host on another.
• There were many problems to overcome: diverse packet sizes, diverse interfaces, and
diverse transmission rates, as well as differing reliability requirements.
• the idea of a device called a gateway to serve as the intermediary hardware to transfer
data from one network to another.
• In 1973 Transmission Control Protocol (TCP) and Internet Protocol (IP). IP
would handle datagram routing while TCP would be responsible for higher level
functions such as segmentation, reassembly, and error detection. The new
combination became known as TCP/IP.
• MILNET: for military (Military Network)
• CSNET: Computer Science Network
• NSFNET: National Science Foundation Network
• ANSNET: Advanced Network services Network
1-46
• Internet Today
• World Wide Web
• Multimedia
• Recent developments in the multimedia applications such as voice over IP (telephony),
video over IP (Skype), view sharing (YouTube), and television over IP (PPLive) has
increased the number of users and the amount of time each user spends on the network.
• Peer-to-Peer Applications
• Peer-to-peer networking is also a new area of communication with a lot of potential
1-47
STANDARDS AND ADMINISTRATION
• Internet Standards
• An Internet standard is a thoroughly tested design that is useful to and adhered to by
those who work with the Internet. It is a formalized regulation that must be followed.
• There is a strict procedure by which a plan attains Internet standard status.
1-48
1-49
1-50
• ISOC
• The Internet Society (ISOC) is an international, nonprofit organization
formed in 1992 to provide support for the Internet standards process.
• ISOC accomplishes this through maintaining and supporting other Internet
administrative bodies such as IAB, IETF, IRTF, and IANA .
• ISOC also promotes research and other scholarly activities relating to
the Internet.
• IAB
• The Internet Architecture Board (IAB) is the technical advisor to the
ISOC. The main purposes of the IAB are to oversee the continuing
development of the TCP/IP Protocol Suite and to serve in a technical
advisory capacity to research members of the Internet community.
1-51
• IETF
• The Internet Engineering Task Force (IETF) is a forum of working
groups managed by the Internet Engineering Steering Group (IESG ).
• IETF is responsible for identifying operational problems and proposing
solutions to these problems.
• IRTF
• The Internet Research Task Force (IRTF) is a forum of working groups
managed by the Internet Research Steering Group (IRSG). IRTF focuses on
long-term research topics related to Internet protocols, applications,
architecture, and technology
1-52
Standards: agreed-upon rules
• Standards is essential in
– Creating/maintaining open and competitive markets
– Guaranteeing national/international interoperability
• Two categories
– De jure (“by law” or “by regulation’) standards
– De facto (“by fact” or ‘by convention’) standards
• Proprietary standards: closed standards
• Nonproprietary standards: open standards
1-53
Standards Organizations
• Standards are developed by
– Standards creation committees
International Organization for Standardization (ISO)
International Telecommunication Union-
Telecommunication Standard Sector (ITU-T)
American National Standards Institute(ANSI)
Institute of Electrical and Electronics Engineers(IEEE)
Electronic Industries Association (EIA)
– Forums
– Regulatory agencies
1-54
Network Models
1-55
Overview
• Network is a combination of hardware and software that
sends data from one location to another.
• Hardware consist of the physical equipment that carries
signals.
• Software consist of instruction sets that make possible
to use services.
1-56
PROTOCOL LAYERING
• protocol defines the rules that both the sender and
receiver and all intermediate devices need to follow to be
able to communicate effectively.
• When communication is simple, we may need only one
simple protocol;
• when the communication is complex, we may need to
divide the task between different layers, in which case
we need a protocol at each layer, or protocol layering
1-57
1-58
Second Scenario
1-59
Layered Tasks
Sender, Receiver, and Carrier
At the sender site
Higher layer: the sender writes the letter, inserts the letter in
an envelope, writes the sender and receiver address, and
drops the letter in a mailbox
Middle layer: the letter is picked up by a letter carrier and
delivered to the post office
Lower layer: the letter is stored at the post office; a carrier
transports the letter
1-60
At the receiver site
Lower layer: the carrier transports the letter to the post office
Middle layer: the letter is stored and delivered to the recipient’s
mailbox
Higher layer: the receiver picks up the letter, opens the envelope
and reads it
Hierarchy
According to our analysis, there are three different activities at the
sender site and another three activities at the receiver site. The task
of transporting the letter b/w the sender and receiver is done by the
carrier
1-61
Sending a letter
1-62
• Advantages:
• Protocol layering enables us to divide a complex task into
several smaller and simpler tasks.
• Modularity in this case means independent layers. A layer
(module) can be defined as a black box with inputs and outputs,
without concern about how inputs are changed to outputs.
• It allows us to separate the services from the implementation. A
layer needs to be able to receive a set of services from the lower
layer and to give the services to the upper layer; we don’t care
about how the layer is implemented.
• Internet, is that communication does not always use only two
end systems; there are intermediate systems that need only some
layers, but not all layers.
1-63
Principles of Protocol Layering
• First Principle
• The first principle dictates that if we want bidirectional
communication, we need to make each layer so that it is able
to perform two opposite tasks, one in each direction.
• For example, the third layer task is to listen (in one direction)
and talk (in the other direction).
• The second layer needs to be able to encrypt and decrypt.
• The first layer needs to send and receive mail
1-64
• Second Principle
• The second principle that we need to follow in protocol layering
is that the two objects under each layer at both sites should be
identical.
• For example, the object under layer 3 at both sites should be a
plaintext letter.
• The object under layer 2 at both sites should be a cipher text
letter.
• The object under layer 1 at both sites should be a piece of mail.
1-65
Logical Connections
1-66
TCP/IP PROTOCOL SUITE
• TCP/IP is a protocol suite (a set of protocols organized in
different layers) used in the Internet today.
• It is a hierarchical protocol made up of interactive modules,
each of which provides a specific functionality.
• The term hierarchical means that each upper level protocol is
supported by the services provided by one or more lower level
protocols.
• The original TCP/IP protocol suite was defined as four software
layers built upon the hardware.
1-67
1-68
Layered Architecture
1-69
1-70
1-71
Physical layer
73
Data link layer
1-74
Responsibilities
• Framing: the data link layer divides the stream of bits received
from the network layer into manageable data units called frames
• Physical addressing: if frames are to be distributed to different
system on the network, the data link layer adds a header to the frame
to define the sender and/or receiver of the frame
• Flow control: if the rate at which the data are absorbed by the
receiver is less than the rate at which data are produced in the sender
• Error control: the data link layer adds reliability to the physical
layer by adding mechanism to detect and retransmit damaged data
• Access control: when two or more devices are connected to the
same link, data link layer protocols are necessary to determine
which device has the control over the link
75
Node-to-node delivery
1-76
Network layer
1-78
• The Internet Control Message Protocol (ICMP) helps IP to
report some problems when routing a packet.
• The Internet Group Management Protocol (IGMP) is another
protocol that helps IP in multitasking.
• The Dynamic Host Configuration Protocol (DHCP) helps IP to
get the network-layer address for a host.
• The Address Resolution Protocol (ARP) is a protocol that
helps IP to find the link-layer address of a host or a router
when its network-layer address is given.
1-79
Source-to-destination delivery
1-80
Transport layer
• The transport layer is responsible for delivery of a message from one process to another.
• The transport layer at the source host gets the message from the application layer, encapsulates it in a
transport layer packet (called a segment or a user datagram in different protocols) and sends it, through
the logical (imaginary) connection, to the transport layer at the destination host.
• the transport layer is responsible for giving services to the application layer: to get a
message from an application program running on the source host and deliver it to the
corresponding application program on the destination host.
1-81
• we have more than one protocol in the transport layer, which means
that each application program can use the protocol that best matches
its requirement.
• The main protocol, Transmission Control Protocol (TCP), is a
connection-oriented protocol that first establishes a logical connection
between transport layers at two hosts before transferring data.
• It creates a logical pipe between two TCPs for transferring a stream of
bytes.
• TCP provides flow control (matching the sending data rate of the
source host with the receiving data rate of the destination host to
prevent overwhelming the destination)
• error control (to guarantee that the segments arrive at the destination
without error and resending the corrupted ones).
• Congestion control to reduce the loss of segments due to congestion
in the network.
1-82
• User Datagram Protocol (UDP), is a connectionless protocol
that transmits user datagrams without first creating a logical
connection.
• In UDP, each user datagram is an independent entity without
being related to the previous or the next on.
• UDP is a simple protocol that does not provide flow, error, or
congestion control.
• Stream Control Transmission Protocol (SCTP) is designed to
respond to new applications that are emerging in the
multimedia.
1-83
Reliable process-to-process delivery of a message
1-84
Application layer
1-86
Encapsulation and Decapsulation
1-87
• Encapsulation at the Source Host
At the source, we have only encapsulation.
1. At the application layer, the data to be exchanged is
referred to as a message. A message normally does not contain
any header or trailer, we refer to the whole as the message. The
message is passed to the transport layer.
2. The transport layer takes the message as the payload, the load
that the transport layer should take care of.
• It adds the transport layer header to the payload, which
contains the identifiers of the source and destination application
programs that want to communicate plus some more
information that is needed for the end-to end delivery of the
message, such as information needed for flow, error control, or
congestion control.
1-88
3.The network layer takes the transport-layer packet as data or
payload and adds its own header to the payload.
The header contains the addresses of the source and
destination hosts and some more information used for
error checking of the header, fragmentation
information, and so on.
4. The data-link layer takes the network-layer packet as data
or payload and adds its own header, which contains the link-
layer addresses of the host or the next hop (the router).
1-89
Decapsulation and Encapsulation at the Router
1. After the set of bits are delivered to the data-link layer, this
layer decapsulates the datagram from the frame and passes it to
the network layer.
2.The network layer only inspects the source and destination
addresses in the datagram header and consults its forwarding
table to find the next hop to which the datagram is to be
delivered.
• The datagram is then passed to the data-link layer of the next link
3. The data-link layer of the next link encapsulates the datagram in a
frame and passes it to the physical layer for transmission.
1-90
Decapsulation at the Destination Host
• At the destination host, each layer only decapsulates the
packet received, removes the payload, and delivers the
payload to the next-higher layer protocol until the message
reaches the application layer.
• It is necessary to say that decapsulation in the host
involves error checking
1-91
ADDRESSING
• 4 Levels of addressing:
-Physical addresses
- Logical addresses
-Port addresses
-Specific addresses
1-92
1-93
• Each address belongs to specific layer.
• Physical(Data link layer and Physical)
• Known as link address, it is the address of a node
defined by LAN/WAN.
• It is included in the frame used by the data link layer
• It is lowest level address
• Size and format depend on network(Ethernet uses 6
byte address)
• Example: 07-01-02-01-0C-4B (6 byte with 12
hexadecimal digit)
1-94
• Logical address (IP address): (Network layer)
– Necessary for universal communication –independent of
network
– Each host is identified uniquely
– Internet address is 32-bit long.
– Example: 162.192.2.2
1-96
1-97
• THE OSI MODEL
• Established in 1947, the International Organization for
Standardization (ISO) is a multinational body dedicated to
worldwide agreement on international standards.
• An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
• An open system is a set of protocols that allows any two different systems
to communicate regardless of their underlying architecture.
• The purpose of the OSI model is to show how to facilitate communication
between different systems without requiring changes to the logic of the
underlying hardware and software.
• The OSI model is not a protocol; it is a model for understanding and
designing a network architecture that is flexible, robust, and interoperable.
1-98
The OSI model is a layered framework for the design of
network systems that
allows communication between all types of computer
systems
1-99
OSI versus TCP/IP
1-100
• First, TCP/IP has more than one transport-layer protocol.
Some of the functionalities of the session layer are available in
some of the transport-layer protocols.
• Second, the application layer is not only one piece of software.
Many applications can be developed at this layer.
• If some of the functionalities mentioned in the session and
presentation layers are needed for a particular application,
they can be included in the development of that piece of
software
1-101
Lack of OSI Model’s Success
• First, OSI was completed when TCP/IP was fully in place and a lot of time
and money had been spent on the suite; changing it would cost a lot.
• Second, some layers in the OSI model were never fully defined.
• EX: although the services provided by the presentation and the session
layers were listed in the document, actual protocols for these two layers
were not fully defined, nor were they fully described, and the
corresponding software was not fully developed.
• Third, when OSI was implemented by an organization in a different
application, it did not show a high enough level of performance to entice
the Internet authority to switch from the TCP/IP protocol suite to the OSI
model
1-102
TCP/IP
1-103
Example 1
In Figure, a node with physical address 10 sends a frame to a node with
physical address 87.
The two nodes are connected by a link.
At the data link level this frame contains physical addresses in the header.
These are the only addresses needed.
The rest of the header contains other information needed at this level.
The trailer usually contains extra bits needed for error detection
1-104
Example 2
In we want to send data from a node with
network address A and physical address 10,
located on one LAN, to a node with a network
address P and physical address 95, located on
another LAN.
Because the two devices are located on
different networks, we cannot use physical
addresses only; the physical addresses only
have local jurisdiction. What we need here
are universal addresses that can pass through
the LAN boundaries.
The network (logical) addresses have this
characteristic.
1-105
Example 3
Figure shows an example of transport layer communication.
Data coming from the upper layers have port addresses j and k
(j is the address of the sending process, and k is the address of
the receiving process).
Since the data size is larger than the network layer can handle,
the data are split into two packets, each packet retaining the
port addresses (j and k).
Then in the network layer, network addresses (A and P) are
added to each packet.
1-106
Figure 2.14 Example 3
1-107
Physical Layer:
1-110
Analog and Digital Signals
• Signals can be analog or digital. Analog signals can have an infinite
number of values in a range; digital signals can have only a limited
number of values.
1-111
Periodic and Nonperiodic
• A periodic signal completes a pattern within a measurable
time frame, called a period, and repeats that pattern over
subsequent identical periods.
• The completion of one full pattern is called a cycle.
• A nonperiodic signal changes without exhibiting a pattern
or cycle that repeats over time.
1-112
DIGITAL SIGNALS
• In addition to being represented by an analog signal,
information can also be represented by a digital signal. For
example, a 1 can be encoded as a positive voltage and a 0 as
zero voltage. A digital signal can have more than two levels.
In this case, we can send more than 1 bit for each level.
1-113
Two digital signals: one with two signal levels and the other
with four signal levels
3.114
• In general, if a signal has L levels, each level needs log2 L bits.
For this reason, we can send log24 = 2 bits in part b.
1-115
Example 3.17
A digital signal has nine levels. How many bits are needed
per level? We calculate the number of bits by using the
formula. Each signal level is represented by 3.17 bits.
However, this answer is not realistic. The number of bits
sent per level needs to be an integer as well as a power
of 2. For this example, 4 bits can represent one level.
3.116
• Bit Rate
• bit rate (instead of frequency)—is used to describe digital
signals. The bit rate is the number of bits sent in 1s,
expressed in bits per second (bps).
• Assume we need to download text documents at the rate of
100 pages per minute. What is the required bit rate of the
channel?
Solution
A page is an average of 24 lines with 80 characters in each line.
If we assume that one character requires 8 bits, the bit rate is
1-117
• A digitized voice channel is made by digitizing a 4-kHz
bandwidth analog voice signal. We need to sample the signal at
twice the highest frequency (two samples per hertz). We assume
that each sample requires 8 bits.
• What is the require bitrate?
• Solution
• The bit rate can be calculated as
1-118
Bit Length
•The bit length is the distance one bit occupies on the
transmission medium.
•Bit length =propagation speed * bit duration
Digital Signal as a Composite Analog Signal
•a digital signal is a composite analog signal. The bandwidth is
infinite
•A digital signal, in the time domain, comprises connected
vertical and horizontal line segments. A vertical line in the time
domain means a frequency of infinity (sudden change in time); a
horizontal line in the time domain means a frequency of zero (no
change in time).
1-119
Figure 3.17
The time and frequency domains of periodic and nonperiodic
digital signals
3.120
Transmission of Digital Signals
• Baseband Transmission
• Baseband transmission means sending a digital signal over a
channel without changing the digital signal to an analog signal.
1-121
• For example, the entire bandwidth of a cable connecting two computers is
one single channel. As another example, we may connect several
computers to a bus, but not allow more than two stations to communicate
at a time. Again we have a low-pass channel, and we can use it for
baseband communication.
1-122
• Case 1: Low-Pass Channel with Wide Bandwidth
• If we want to preserve the exact form of a nonperiodic digital
signal with vertical segments vertical and horizontal segments
horizontal, we need to send the entire spectrum, the
continuous range of frequencies between zero and infinity.
• This is possible if we have a dedicated medium with an
infinite bandwidth between the sender and receiver that
preserves the exact amplitude of each component of the
composite signal.
• Although this may be possible inside a computer (e.g., between CPU and
memory), it is not possible between two devices.
• such as a coaxial or fiber optic cable, with a very wide bandwidth, two
stations can communicate by using digital signals with very good accuracy
1-123
Figure 3.20 Baseband transmission using a dedicated medium
1-125
Figure 3.21 Rough approximation of a digital signal using the
first harmonic for worst case
3.126
• Better Approximation
• To make the shape of the analog signal look more like that of
a digital signal, we need to add more harmonics of the
frequencies. We need to increase the bandwidth. We can
increase the bandwidth to 3N/2, 5N/2, 7N/2, and so on.
1-127
Figure 3.22 Simulating a digital signal with first three harmonics
3.128
Table 3.2 Bandwidth requirements
3.129
Example 3.22
Solution
The answer depends on the accuracy desired.
a. The minimum bandwidth, is B = bit rate /2, or 500 kHz.
3.130
• Broadband Transmission (Using Modulation)
• Broadband transmission or modulation means changing
the digital signal to an analog signal for transmission.
Modulation allows us to use a bandpass channel—a channel
with a bandwidth that does not start from zero. This type of
channel is more available than a low-pass channel.
1-131
Figure 3.24 Modulation of a digital signal for transmission on a bandpass
channel
3.132
• TRANSMISSION IMPAIRMENT
• Signals travel through transmission media, which are not
perfect. The imperfection causes signal impairment.
• This means that the signal at the beginning of the medium is
not the same as the signal at the end of the medium. What is
sent is not what is received.
• Three causes of impairment are attenuation, distortion, and
noise
1-133
• Attenuation
• Attenuation means a loss of energy. When a signal, simple
or composite, travels through a medium, it loses some of its
energy in overcoming the resistance of the medium.
• That is why a wire carrying electric signals gets warm, if not
hot, after a while. Some of the electrical energy in the signal is
converted to heat. To compensate for this loss, amplifiers are
used to amplify the signal.
1-134
Figure 3.26 Attenuation
3.135
• Decibel
• To show that a signal has lost or gained strength, engineers use
the unit of the decibel.
• The decibel (dB) measures the relative strengths of two
signals or one signal at two different points.
• Note that the decibel is negative if a signal is attenuated and
positive if a signal is amplified.
1-136
• Distortion
• Distortion means that the signal changes its form or shape.
• Distortion can occur in a composite signal made of different
frequencies. Each signal component has its own propagation
speed through a medium and, therefore, its own delay in
arriving at the final destination.
• Signal components at the receiver have phases different from
what they had at the sender. The shape of the composite signal
is therefore not the same.
1-137
Figure 3.28 Distortion
3.138
• Noise: Noise is another cause of impairment. Several
types of noise, such as thermal noise, induced noise,
crosstalk, and impulse noise, may corrupt the signal.
• Thermal noise is the random motion of electrons in a wire,
which creates an extra signal not originally sent by the
transmitter.
• Induced noise comes from sources such as motors and
appliances. These devices act as a sending antenna, and the
transmission medium acts as the receiving antenna.
• Crosstalk is the effect of one wire on the other. One wire acts
as a sending antenna and the other as the receiving antenna.
• Impulse noise is a spike (a signal with high energy in a very
short time) that comes from power lines, lightning, and so on.
1-139
Figure 3.29 Noise
3.140
• Signal-to-Noise Ratio (SNR)
• The signal-to-noise ratio is defined as
1-141
Figure 3.30 Two cases of SNR: a high SNR and a low SNR
3.142
• SNR is actually the ratio of what is wanted (signal) to what is
not wanted (noise).
• A high SNR means the signal is less corrupted by noise; a low
SNR means the signal is more corrupted by noise.
• Because SNR is the ratio of two powers, it is often described
in decibel units,
• SNRdB, defined as
1-143
Example 3.31
Solution
The values of SNR and SNRdB can be calculated as
follows:
3.144
DATA RATE LIMITS
A very important consideration in data communications is how
fast we can send data, in bits per second, over a channel. Data
rate depends on three factors:
1. The bandwidth available
2. The level of the signals we use
3. The quality of the channel (the level of noise)
1-145
• Noiseless Channel: Nyquist Bit Rate
• For a noiseless channel, the Nyquist bit rate formula defines
the theoretical maximum bit rate
BitRate = 2 * bandwidth * log2L
1-146
• Consider a noiseless channel with a bandwidth of 3000 Hz
transmitting a signal with two signal levels. The maximum bit
rate can be calculated as
1-147
Example 3.36
1-149
Example 3.37
3.150
Example 3.38
This means that the highest bit rate for a telephone line is
34.860 kbps. If we want to send data faster than this, we
can either increase the bandwidth of the line or improve
the signal-to-noise ratio.
3.151
Example 3.39
3.152
Example 3.41
Solution
First, we use the Shannon formula to find the upper limit.
3.153
Example 3.41 (continued)
3.154
PERFORMANCE
• Bandwidth
• In networking, we use the term bandwidth in two contexts.
❑ The first, bandwidth in hertz, refers to the range of
frequencies in a composite signal or the range of frequencies
that a channel can pass.
we can say the bandwidth of a subscriber telephone line is 4 kHz
1-155
Example 3.42
3.156
• Throughput
• The throughput is a measure of how fast we can actually
send data through a network. Although, at first glance,
bandwidth in bits per second and throughput seem the same,
they are different.
1-157
Example 3.44
Solution
We can calculate the throughput as
1-159
Example 3.45
Solution
We can calculate the propagation time as
1-161
Example 3.46 (continued)
3.162
• Queuing Time
• the time needed for each intermediate or end device to hold
the message before it can be processed. The queuing time is
not a fixed factor; it changes with the load imposed on the
network.
• When there is heavy traffic on the network, the queuing time
increases. An intermediate device, such as a router, queues the
arrived messages and processes them one by one. If there are
many messages, each message will have to wait
1-163
• Bandwidth-Delay Product
• The bandwidth-delay product defines the number of bits that
can fill the link.
1-164
Figure 3.31 Filling the link with bits for case 1
3.165
Figure 3.32 Filling the link with bits in case 2
3.166
• Jitter
• Jitter is a problem if different packets of data
encounter different delays and the application using
the data at the receiver site is time-sensitive (audio
and video data).
• If the delay for the first packet is 20 ms, for the second is 45
ms, and for the third is 40 ms, then the real-time application
that uses the packets endures jitter
1-167
Model Questions
1.What is data communication? What are its four fundamental characteristics? With a
neat diagram, explain the components of data communication system.
2. List out the functionalities of physical layer, data link layer and network layer?
3. Explain the different levels of addressing used in an internet with a suitable example
for each level of addressing in TCP/IP?
4. With a neat diagram, explain the interaction between layers in the OSI model?
5. Define network topology, explain ring topology with advantages and disadvantages?
6.Explain Encapsulation and Decapsulation
7.Explain Multiplexing and demultiplexing
8. Explain the layered architecture of TCP/IP protocol suite
9. Explain in detail the concept of protocol layering along with its principles.
10. With a neat diag, explain the functionalities of each layer of OSI reference model
11. Explain with the block diagram, the causes for transmission impairement
12. What is line coding? Represent the sequence “101000110” using Biphase and
Bipolar schemes N(RZ-L, NRZ-I and Manchester, differtential Manchester, RZ
and AMI coding )schemes 1-168