Documente Academic
Documente Profesional
Documente Cultură
Data Communications:
The term telecommunication means communication at a distance. The word data refers to
information presented in whatever form is agreed upon by the parties creating and using
the data. Data communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable.
Fundamental Characteristics:
Delivery
Accuracy
Timelines
Jitter
1. Message
2. Sender
3. Receiver
4. Medium
5. Protocol
1
Direction of data flow:
Simplex
Half Duplex
Full Duplex
1. THE INTERNET:
An internet is two or more networks that can communicate with each other.
The most notable internet is called the Internet, and is composed of thousands of
interconnected networks.
2
The figure shows the internet as several backbones, provider networks, and
customer networks.
At the top level, the backbones are large networks owned by some communication
companies such as sprint, Verizon (MCI), AT&T, and NTT.
The backbone networks are connected through some complex switching systems,
called Peering points.
At the second level, there are smaller networks, called Provider networks that
use the services of the backbones for a fee.
The provider networks are connected to backbones and sometimes to other
provider networks.
The customer networks are networks at the edge of the internet that actually use
the services provided by the internet. They pay fees to provider networks for
receiving services.
Backbones and provider networks are also called Internet Services Providers
(ISPs). The backbones are often referred to as international ISPs; the provider
networks are often referred to as national or regional ISPs.
1. Dial-up service:
The first solution is to add the telephone line a modem that converts data to
voice. The software installed on the computer dials the ISP and imitates
making a telephone connection.
Unfortunately, the dial-up service is very slow, and when the line is used for
internet connection, it cannot be used for telephone connection.
2. DSL Service: The DSL service also allows the line to be used simultaneously for voice
and data communication.
The cable companies have been upgrading their cable networks and connecting to
the internet.
A residence or a small business can be connected to the internet by using this
service.
It provides a higher speed connection, but the speed varies depending on the
numbers of neighbors that use the same cable.
Protocol is a set of rules that govern all aspect of data communication between computers
on a network.
These rules include guidelines that regulate the following characteristics of a network:
access method, allowed physical topologies, types of cabling, and speed of data transfer.
4
Protocols are to computers what language is to humans. Since this article is in English,
to understand it you must be able to read English. Similarly, for two devices on a network
to successfully communicate, they must both understand the same protocols.
Elements of protocol:
i) Syntax
ii) Semantics
iii) Timing
STANDARDS:
ANSI(AmericanNationalStandardsInstitute)
5
3. LAYERED TASKS:
To ease network engineering, the whole networking concept is divided into multiple
layers. Each layer is involved in some particular task and is independent of all other
layers.
But as a whole, almost all networking tasks depend on all of these layers.
Layers share data between them and they depend on each other only to take input and
send output.
In layered architecture of Network Model, one whole network process is divided into
small tasks.
Each small task is then assigned to a particular layer which works dedicatedly to process
the task only.
Every layer clubs together all procedures, protocols, and methods which it requires to
execute its piece of task. All layers identify their counterparts by means of encapsulation
header and tail.
6
4. OSI MODEL:
The model was developed by the International Organisation for Standardisation (ISO) in
1984. It is now considered the primary Architectural model for inter-computer
communications.
The OSI model describes how information or data makes its way from application
programmes (such as spreadsheets) through a network medium (such as wire) to another
application programme located on another network.
The OSI reference model divides the problem of moving information between computers
over a network medium into SEVEN smaller and more manageable problems.
• The OSI Reference Model is composed of seven layers, each specifying particular
network functions.
7
• The process of breaking up the functions or tasks of networking into layers reduces
complexity.
• Each layer provides a service to the layer above it in the protocol specification.
• Each layer communicates with the same layer’s software or hardware on other
computers.
• The lower 4 layers (transport, network, data link and physical —Layers 4, 3, 2, and 1) are
concerned with the flow of data from end to end through the network.
• The upper four layers of the OSI model (application, presentation and session—Layers 7,
6 and 5) are orientated more toward services to the applications.
APPLICATION:
• The application layer is the OSI layer that is closest to the user.
• It differs from the other layers in that it does not provide services to any other OSI layer,
but rather, only to applications outside the OSI model.
• Examples of such applications are spreadsheet programs, word processing programs, and
bank terminal programs.
PRESENTATION:
8
• The presentation layer ensures that the information that the application layer of one
system sends out is readable by the application layer of another system.
• If necessary, the presentation layer translates between multiple data formats by using a
common format.
SESSION:
• The session layer defines how to start, control and end conversations (called sessions)
between applications.
• This includes the control and management of multiple bi-directional messages using
dialogue control.
• It also synchronizes dialogue between two hosts' presentation layers and manages their
data exchange.
TRANSPORT:
• The transport layer regulates information flow to ensure end-to-end connectivity between
host applications reliably and accurately.
• The transport layer segments data from the sending host's system and reassembles the
data into a data stream on the receiving host's system.
• Layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol).
NETWORK:
• Defines how routing works and how routes are learned so that the packets can be
delivered.
9
• The network layer also defines how to fragment a packet into smaller packets to
accommodate different media.
DATA LINK:
• The data link layer provides access to the networking media and physical transmission
across the media and this enables the data to locate its intended destination on a network.
• The data link layer provides reliable transit of data across a physical link by using the
Media Access Control (MAC) addresses.
• The data link layer uses the MAC address to define a hardware or data link address in
order for multiple stations to share the same medium and still uniquely identify each
other.
• Concerned with network topology, network access, error notification, ordered delivery of
frames, and flow control.
PHYSICAL:
• The physical layer deals with the physical characteristics of the transmission medium.
• This layer manages the interface between the the computer and the network medium
(coax, twisted pair, etc.)
• Such characteristics as voltage levels, timing of voltage changes, physical data rates,
maximum transmission distances, physical connectors, and other similar attributes are
defined by physical layer specifications.
5. TCP/IP:
10
• TCP/IP is a set of protocols developed to allow cooperating computers to share resources
across a network
• They are Transport layer and Network layer protocols respectively of the protocol suite
• The most well known network that adopted TCP/IP is Internet – the biggest WAN in the
world
• Technologies were widely discussed and circulated in documents called “Request for
Comments” (RFC) – free of charge
• Because TCP/IP was developed earlier than the OSI 7-layer mode, it does not have 7
layers but only 4 layers
The overall idea was to allow one application on one computer to talk to(send data packets)
another application running on different computer.
11
Different Layers of TCP/IP Reference Model
Below we have discussed the 4 layers that form the TCP/IP reference model:
Protocol is used to connect to the host, so that the packets can be sent over it.
Order in which packets are received is different from the way they are sent.
o Delivering IP packets
o Performing routing
o Avoiding congestion
12
Layer 3: Transport Layer
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
2. FTP (File Transfer Protocol) is a protocol that allows File transfer amongst computer
users connected over a network. It is reliable, simple and efficient.
4. DNS (Domain Name Server) resolves an IP address into a textual address for Hosts
connected over a network.
It operated independently.
It is scalable.
Client/server architecture.
Demerits of TCP/IP
1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard protocols around
standard, acting as a communication gateway which the Internet has developed. It is a communication
between the network and end user. protocol, which allows connection of hosts over a network.
2. In OSI model the transport layer guarantees 2. In TCP/IP model the transport layer does not guarantees
the delivery of packets. delivery of packets. Still the TCP/IP model is more
14
reliable.
4. OSI model has a separate Presentation layer 4. TCP/IP does not have a separate Presentation layer or
and Session layer. Session layer.
5. Transport Layer is Connection Oriented. 5. Transport Layer is both Connection Oriented and
Connection less.
7. OSI is a reference model around which the 7. TCP/IP model is, in a way implementation of the OSI
networks are built. Generally it is used as a model.
guidance tool.
8. Network layer of OSI model provides both 8. The Network layer in TCP/IP model provides
connection oriented and connectionless connectionless service.
service.
9. OSI model has a problem of fitting the 9. TCP/IP model does not fit any protocol
protocols into the model.
10. Protocols are hidden in OSI model and are 10. In TCP/IP replacing protocol is not easy.
easily replaced as the technology changes.
11. OSI model defines services, interfaces and 11. In TCP/IP, services, interfaces and protocols are not
protocols very clearly and makes clear clearly separated. It is also protocol dependent.
distinction between them. It is protocol
independent.
15
6. ADDRESSING:
A network address is any logical or physical address that uniquely distinguishes a n/w node
or device over a tele comm. network.
Physical Addressing:
The physical address, also known as the link address, is the address of a node as
defined by its LAN or WAN.
The size and format of this addresses are vary depending on the network.
Most local area networks use a 48 bit physical address written as 12 hexadecimal
digits, every byte is separated by a colon as shown below
07:03:02:01:2C:4B
Logical address:
Logical addresses are necessary for universal communications that are independent of
underlying physical networks.
Physical addresses are not adequate in a internetwork environment where different n/w’s
can have different address formats.
16
A universal addressing system is needed in which each host can be identified uniquely,
regardless of underlying physical n/w.
The physical addresses will change from hop to hop, but logical addresses will remains
the same.
Port address:
Using IP addresses, a packet reaches the network layer of the receiving node. The next
task is handover the packet to the appropriate transport layer protocol.
The protocol type field in the IP header is used to identify the transport layer protocol
used by a particular datagram or packet.
Example: 765
Some applications have user friendly addresses that are designed for the specific
application.
Email addesses
17
URL
A line code is the code used for data transmission of a digital signal over a transmission line.
This process of coding is chosen so as to avoid overlap and distortion of signal such as inter-
symbol interference.
As the coding is done to make more bits transmit on a single signal, the bandwidth used
is much reduced.
Error detection is done and the bipolar too has a correction capability.
Unipolar
Polar
Bi-polar
Unipolar Signaling
Unipolar signaling is also called as On-Off Keying or simply OOK.
18
Return to Zero (RZ)
Unipolar Non-Return to Zero (NRZ)
In this type of unipolar signaling, a High in data is represented by a positive pulse called
as Mark, which has a duration T0 equal to the symbol bit duration. A Low in data input has no
pulse.
Advantages
It is simple.
No clock is present.
Loss of synchronization is likely to occur (especially for long strings of 1s and 0s).
19
Advantages
It is simple.
The spectral line present at the symbol rate can be used as a clock.
Disadvantages
No error correction.
The signal droop is caused at the places where signal is non-zero at 0 Hz.
Polar Signaling
There are two methods of Polar Signaling. They are −
Polar NRZ
Polar RZ
Polar NRZ
In this type of Polar signaling, a High in data is represented by a positive pulse, while a Low in
data is represented by a negative pulse. The following figure depicts this well.
20
Advantages
It is simple.
No error correction.
No clock is present.
The signal droop is caused at the places where the signal is non-zero at 0 Hz.
Polar RZ
In this type of Polar signaling, a High in data, though represented by a Mark pulse, its
duration T0 is less than the symbol bit duration. Half of the bit duration remains high but it
immediately returns to zero and shows the absence of pulse during the remaining half of the bit
duration.
21
Advantages
It is simple.
No error correction.
No clock is present.
The signal droop is caused at places where the signal is non-zero at 0 Hz.
Bipolar Signaling
This is an encoding technique which has three voltage levels namely +, - and 0. Such a signal is
called as duo-binary signal.
Bipolar NRZ
Bipolar RZ
From the models so far discussed, we have learnt the difference between NRZ and RZ. It just
goes in the same way here too. The following figure clearly depicts this.
22
The above figure has both the Bipolar NRZ and RZ waveforms. The pulse duration and symbol
bit duration are equal in NRZ type, while the pulse duration is half of the symbol bit duration in
RZ type.
Advantages
Following are the advantages −
It is simple.
This technique is suitable for transmission over AC coupled lines, as signal drooping
doesn’t occur here.
Disadvantages
Following are the disadvantages −
No clock is present.
23