UNIT -I
Hierarchical Topology
1.
INTRODUCTION
This
chapter provides an introduction to Computer networks and covers fundamental
topics like data, information to the definition of communication and computer
networks.
The
main objective of data communication and networking is to enable seamless
exchange of data between any two points in the world.
This
exchange of data takes place over a computer network.
Data
refers to the
raw facts that are collected while information refers to processed data
that enables us to take decisions.
Ex.
When result of a particular test is declared it contains data of all students,
when you find the marks you have scored you have the information that lets you
know whether you have passed or failed.
The
word data refers to any information which is presented in a form
that is agreed and accepted upon by creators and users.
1.1INTRODUCTION TO
DATA COMMUNICATIONS
Data
communications refers to the
exchange of data between two devices via some form of transmission
medium such as a wire cable.
For data communications to occur, the communicating
devices must be part of a communication
system made up of a combination of hardware (physical equipment) and software (programs).
The effectiveness of a data communications system depends
on four fundamental characteristics:
delivery, accuracy, timeliness, and jitter.
1. Delivery: The system must deliver data to the
correct destination. Data must be received by the
intended device or user and
only by that device or user.
2.
Accuracy: The system must deliver the data accurately. Data that have been
altered in
transmission and left
uncorrected are unusable.
3. Timeliness: The system must deliver data in a
timely manner. Data delivered late are useless. In
the case of video and audio, timely delivery means
delivering data as they are produced, in the
same order that they are produced, and without
significant delay. This kind of delivery is called
real-time transmission.
4.
Jitter: Jitter refers to the variation in the packet arrival time. It is
the uneven delay in the
delivery of audio or video packets. For example, let us
assume that video packets are sent every 30ms.
If some of the packets arrive with 30ms delay and others with 40ms delay, an
uneven quality in the video is the result.
COMPONENTS OF A
DATA COMMUNICATIONS SYSTEM
A data
communications system has five components:
- Message: The message is the information (data) to be communicated. Popular
forms of information include text,
numbers, pictures, audio, and video.
- Sender:
The sender is the device that sends the data message. It can be a
computer, workstation, telephone
handset, video camera, and so on.
- Receiver: The receiver is the device that receives the message. It can be a computer, workstation, telephone handset, television, and so on.
4. Transmission Medium
It
is the path by which the message travels from sender to receiver. It can be
wired or wireless and many subtypes in both.
5. Protocol
It is an agreed upon set or rules
used by the sender and receiver to communicate data.
A protocol is a set of rules that
governs data communication.
A Protocol is a necessity in data
communications without which the communicating entities are like two persons
trying to talk to each other in a different language without know the other
language.
DATA
REPRESENTATION
Data is collection of raw facts
which is processed to deduce information. There may be different forms in which
data may be represented. Some of the forms of data used in communications are
as follows:
1. Text :Text includes combination of
alphabets in small case as well as upper case. It is stored as a pattern of
bits. Prevalent encoding system : ASCII, Unicode .
2. Numbers:
Numbers include combination
of digits from 0 to 9. It is stored as a pattern of bits. Prevalent encoding
system : ASCII, Unicode.
3. Images:
An image is worth a thousand
words‖
is a very famous saying. In computers images are digitally stored.
A Pixel is the smallest element
of an image. To put it in simple terms, a picture or image is a matrix of pixel
elements.
The pixels are represented in the
form of bits. Depending upon the type of image (black n white or color) each
pixel would require different number of bits to represent the value of a pixel.
The size of an image depends upon
the number of pixels (also called resolution) and the bit pattern used to
indicate the value of each pixel.
Example: if an image is purely black and
white (two color) each pixel can be represented by a value either 0 or 1, so an
image made up of 10 x 10 pixel elements would require only 100 bits in memory
to be stored.
On the other hand an image that
includes gray may require 2 bits to represent every pixel value (00 - black, 01
– dark gray, 10– light gray, 11 –white). So the same 10 x 10 pixel image would
now require 200 bits of memory to be stored. Commonly used Image formats : jpg,
png, bmp, etc
4. Audio:
Data can also be in
the form of sound which can be recorded and broadcasted.
Example: What we hear on the radio is a
source of data or information.
Audio data is
continuous, not discrete.
5. Video:
Video refers to broadcasting of
data in form of picture or movie.
DATA
FLOW
The data can flow between the two
devices in the following ways.
1.
Simplex
2. Half
Duplex
3. Full
Duplex
1. Simplex
Ø In Simplex, communication is
unidirectional
Ø Only one of the devices sends the
data and the other one only receives the data.
Ø Example: in the above diagram: a
cpu send data while a monitor only receives data.
2. Half Duplex
Ø
In
half duplex both the stations can transmit as well as receive but not at the
same time.
Ø
When
one device is sending other can only receive and vice-versa (as shown in figure
above.)
Ø
Example:
A walkie-talkie.
3. Full Duplex
Ø
In
Full duplex mode, both stations can transmit and receive at the same time.
Ø
Example:
mobile phones
1.2. A
COMMUNICATIONS MODEL
The fundamental purpose of a
communications system is the exchange of data between two parties. Figure 1.2b
presents one particular example, which is communication between a workstation
and a server over a public telephone network.
Another example is the exchange
of voice signals between two telephones over the same network. The key elements
of the model are as follows:
Source: This device generates the data
to be transmitted; examples are telephones and personal computers.
Figure: Simplified Communications
Model
Transmitter: Usually, the data generated by a source system are
not transmitted directly in the form in which they were generated. Rather, a
transmitter transforms and encodes the information in such a way as to produce
electromagnetic signals that can be transmitted across some sort of transmission system. For example,
a modem takes a digital bit stream from an attached device such as a personal
computer and transforms that bit stream into an analog signal that can be
handled by the telephone network.
Transmission
system: This can
be a single transmission line or a complex network connecting source and destination.
Receiver: The receiver accepts the signal
from the transmission system and converts it into a form that can be handled by
the destination device. For example, a modem will accept an analog signal
coming from a network or transmission line and convert it into a digital bit
stream.
Destination:
Takes the incoming data from the receiver.
The communications tasks are as
follows:
1.3 DATA COMMUNICATIONS
NETWORKING
Computer Network
Computer Networks are used for
data communications
Definition: A computer network can be defined
as a collection of nodes. A node can be any device capable of transmitting or
receiving data. The communicating nodes have to be connected by communication
links.
A Compute network should ensure
reliability of the data communication
process, should see
security of the data
performance by achieving higher throughput
and smaller delay times
Categories of Network
Networks are categorized on the
basis of their size. The three basic categories of computer networks are:
A. Local Area Networks (LAN) is usually limited to a few
kilometers of area. It may be privately owned and could be a network inside an
office on one of the floor of a building or a LAN could be a network consisting
of the computers in a entire building.
B. Wide Area Network (WAN) is made of all the networks in a
(geographically) large area. The network in the entire state of Maharashtra
could be a WAN
C. Metropolitan Area Network
(MAN) is of size
between LAN & WAN. It is larger than LAN but smaller than WAN. It may
comprise the entire network in a city like Mumbai.
PROTOCOL
A Protocol is one of the
components of a data communications system. Without protocol communication
cannot occur. The sending device cannot just send the data and expect the
receiving device to receive and further interpret it correctly.
When the sender sends a message
it may consist of text, number, images, etc. which are converted into bits and
grouped into blocks to be transmitted and often certain additional information
called control information is also added to help the receiver interpret the
data.
For successful communication to
occur, the sender and receiver must agree upon certain rules called protocol.
A Protocol is defined as a set of
rules that governs data communications.
A protocol defines what is to be
communicated, how it is to be communicated and when it is to be communicated.
NETWORK TOPOLOGY
Networks can be classified
by their topology, which is the basic geometric arrangement of the network.
Different types of network configurations exist for network designers to choose
from. Communications channels can be connected in different arrangements using
several different topologies. This arrangement allows users to exchange
information and share resources (software and hardware).
Four basic types of network
configurations are star, bus, ring, hierarchical and mesh. Ring, bus, and star
topologies are commonly used in LANs and BNs. Star and mesh topologies are
commonly used in MANs and WANS. The networks are usually built using a combination
of several different topologies.
- Bus
- Ring
- Hierarchical
- Mesh
A star topology is one in
which a central unit provides a link through which a group of smaller computers
and devices is connected. The central computer is commonly called a host computer. A
host computer is usually a large computer such as a minicomputer or a
mainframe. A file server is a large storage device that provides volumes of
data and programs to the other units in the network.
In the star network, all
interactions between different computers in the network travel through the host
computer. The central unit will poll each to decide whether a unit has a
message to send. If so, the central computer will carry the message to the
receiving computer.
Star networks represent a
very popular form of configuration for time-sharing systems in which a central
computer makes available resources and databases for several "client"
computers to share. As such, the star network is appropriate for systems that
demand centralized control. The disadvantage of the star network is that a
processing problem in the central computer can be paralyzing to the entire
system.
In a star network, the
central unit may be a host computer or a file server. The host computer is
a large centralized computer, usually a minicomputer or a mainframe. In
contrast, the file server is a large-capacity hard-disk storage
device. It stores data and programs files shared by the users on the network.
Also, called a network server.
In a bus configuration, each
computer in the network is responsible for carrying out its own communications
without the aid of a central unit. A common communications cable (the bus) connects all of the
computers in the network. As data travels along the path of the cable, each
unit performs a query to determine if it is the intended recipient of the
message. The bus network is less expensive than the star configuration and is
thus widely in use for systems that connect only a few microcomputers and
systems that do not emphasize the sharing of common resources.
The problem in a computer on
a bus topology does not frustrate the operation of the network, but a crack in
the central cable will stop the whole network. Bus topology is popular because
many computers can be connected to a single central cable. In a bus topology,
each end user computer in the network handles its own communications control.
There is no host computer or file server. As the information passes along the
bus, it is examined by each terminal to see if the data is for it.
A ring configuration
features a network in which each computer is connected to the next two other
computers in a closed loop. Like the bus network, no single central computer exists in
the ring configuration. Messages are simply transferred from one computer to
the next until they arrive at their intended destinations. Each computer on the
ring topology has a particular address. As the messages pass around the ring,
the computers validate the address. If the message is not addressed to it, the
node transmits the message to the next computer on the ring.
This type of network is
commonly used in systems that connect widely dispersed mainframe computers. A
ring network allows organizations to engage in distributed data processing
system in which computers can share certain resources with other units while
maintaining control over their own processing functions. However, a failure in
any of the linked computers can greatly affect the entire network.
The ring arrangement is the
least frequently used with microcomputers. However, as stated above, it often
is used to link mainframes over wide geographical areas to build distributed
data processing system. The loss of a mainframe usually does not restrain the
operation of the network, but a cable problem will stop the network altogether.
Hierarchical Topology
A hierarchical network (or a
tree network) resembles a star network in that several computers are connected
to a central host computer (usually a mainframe). However, these
"client" computers also serve as host computers to next level units.
Thus, the hierarchical network can theoretically be compared to a standard
organizational chart or a large corporation. Typically, the host computer at
the top of the hierarchy is a mainframe computer. Lower levels in the hierarchy
could consist of minicomputers and microcomputers. It should be noted that a
system can sometimes have characteristics of more than one of the above
topologies.
This topology is effective
in a centralized corporation. For example, different divisions within a
corporation may have individual microcomputers connected to divisional
minicomputers. The minicomputers in turn may be connected to the corporation's
mainframe, which contains data and programs.
This is a net-like
communications network in which there are at least two pathways to each node. In a mesh topology, computers are connected to
each other by point-to-point circuits. In the topology, one or more computers
usually become switching centers, interlinking computers with others.
Although a computer or cable
is lost, if there are other possible routes through the network, the damage of
one or several cables or computers may not have vital impact except the
involved computers. However, if there are only few cables in the network, the
loss of even one cable or device may damage the network seriously.
1.4.COMPUTER
COMMUNICATION ARCHITECTURE
1.4.1
Need
for a Protocol Architecture
1.4.2
TCP/IP
Protocol Architecture
1.4.3
OSI
Model
1.4.1
Need
for a Protocol Architecture
Typical
tasks to be performed are as follow:
1. The source system must either
activate the direct data communication path or inform the communication network
of the identity of the desired destination system.
2. The source system must
ascertain that the destination system is prepared to receive data.
3. The file transfer application
on the source system must ascertain that the file management program on the
destination system is prepared to accept and store the file for this particular
user.
4. If the file formats used on
the two systems are different, one or the other system must perform a format
translation function.
The peer layers communicate by
means of formatted blocks of data that obey a set of rules or conventions known
as a protocol. The key features of a protocol are as follows:
• Syntax: Concerns the format of the data blocks
• Semantics: Includes control information for coordination and error
handling
• Timing:Includes speed matching and sequencing
1.4.2 TCP/IP Protocol Architecture
In
general terms, communications can be said to involve three agents:
applications, computers, and networks. Examples of applications include file
transfer and electronic mail. The applications that we are concerned with here
are distributed applications that involve the exchange of data between two
computer systems.
These applications, and others,
execute on computers that can often support multiple simultaneous applications.
Computers are connected to networks, and the data to be exchanged are
transferred by the network from one computer to another. Thus, the transfer of
data from one application to another involves first getting the data to the
computer in which the application resides and then getting the data to the
intended application within the computer. With these concepts in mind, we can organize
the communication task into five relatively independent layers.
Ø Physical
layer
Ø Network
access layer
Ø Internet
layer
Ø Host-to-host,
or transport layer
Ø Application
layer
The physical layer covers the physical interface between a data
transmission device (e.g., workstation, computer) and a transmission medium or
network. This layer is concerned with specifying the characteristics of the
transmission medium, the nature of the signals, the data rate, and related
matters.
The network access layer is
concerned with the exchange of data between an end system (server, workstation,
etc.) and the network to which it is attached. The sending computer must
provide the network with the address of the destination computer, so that the
network may route the data to the appropriate destination. The sending computer
may wish to invoke certain services, such as priority, that might be provided
by the network.
The network access layer is
concerned with access to and routing data across a network for two end systems
attached to the same network. In those cases where two devices are attached to
different networks, procedures are needed to allow data to traverse multiple
interconnected networks. This is the function of the internet layer. The Internet Protocol (IP) is used at this layer to
provide the routing function across multiple networks. This protocol is
implemented not only in the end systems but also in routers. A router is a
processor that connects two networks and whose primary function is to relay
data from one network to the other on its route from the
source to the destination end
system.
Regardless
of the nature of the applications that are exchanging data, there is usually a
requirement that data be exchanged reliably. That is, we would like to be assured
that all of the data arrive at the destination application and that the data arrive
in the same order in which they were sent. As we shall see, the mechanisms for
providing reliability are essentially independent of the nature of the
applications.Thus, it makes sense to collect those mechanisms in a common layer
shared by all applications; this is referred to as the host-to-host layer, or transport
layer. The Transmission Control
Protocol (TCP) is the most commonly used protocol to provide this
functionality.
Finally,
the application layer contains the
logic needed to support the various
user
applications. For each different type of application, such as file transfer, a
separate module is needed that is peculiar to that application.
Operation of TCP and IP
Figure
2.1 indicates how these protocols are configured for communications. To make
clear that the total communications facility may consist of multiple networks, the
constituent networks are usually referred to as subnetworks. Some sort of network access protocol, such as the
Ethernet logic, is used to connect a computer to a subnetwork. This protocol
enables the host to send data across the subnetwork to another host or, if the
target host is on another subnetwork, to a router that will forward the data.
IP is implemented in all of the end systems and the routers. It acts as
a
relay to move a block of data from one host, through one or more routers, to another
host. TCP is implemented only in the end systems; it keeps track of the blocks
of data to assure that all are delivered reliably to the appropriate
application.
Each
host on a subnetwork must have a unique global internet address; this allows
the data to be delivered to the proper host. Each process with a host must have
an address that is unique within the host; this allows the host-to-host
protocol (TCP) to deliver data to the proper process. These latter addresses
are known as ports.
Let
us trace a simple operation. Suppose that a process, associated with port 3 at
host A, wishes to send a message to another process, associated with port 2 at
host B. The process at A hands the message down to TCP with instructions to
send it to host B, port 2.TCP hands the message down to IP with instructions to
send it to host B. Note that IP need not be told the identity of the
destination port. All it needs to know is that the data are intended for host
B. Next, IP hands the message down to the network access layer (e.g., Ethernet
logic) with instructions to send it to router J (the first hop on the way to
B).
To
control this operation, control information as well as user data must be transmitted,
as suggested in Figure 2.2. Let us say that the sending process generates a
block of data and passes this to TCP. TCP may break this block into smaller
pieces to make it more manageable.To each of these pieces,TCP appends control
information known as the TCP header, forming a TCP segment. The control
information is to be used by the peer TCP protocol entity at host B. Examples
of items in this header include:
•
Destination port: When the TCP
entity at B receives the segment, it must know to whom the data are to be
delivered.
•
Sequence number: TCP numbers the
segments that it sends to a particular destination port sequentially, so that
if they arrive out of order, the TCP entity at B can reorder them.
·
Checksum:
The sending TCP includes a code that is a function of the contents of the remainder
of the segment. The receiving TCP performs the same calculation and compares
the result with the incoming code.A discrepancy results if there has been some
error in transmission.
Next, TCP hands each segment over to IP,
with instructions to transmit it to B. These segments must be transmitted
across one or more subnetworks and relayed through one or more intermediate
routers. This operation, too, requires the use of control information. Thus IP
appends a header of control information to each segment to form an IP datagram. An example of an item
stored in the IP header is the destination host address (in this example, B).
Finally, each IP datagram is presented
to the network access layer for transmission across the first subnetwork in its
journey to the destination. The network access layer appends its own header,
creating a packet, or frame.The packet is transmitted across the subnetwork to
router J. The packet header contains the information that the subnetwork needs
to transfer the data across the subnetwork.
Examples
of items that may be contained in this header include:
• Destination
subnetwork address:The subnetwork must know to which attached device the
packet is to be delivered.
• Facilities
requests:The network access protocol might request the use of certain subnetwork
facilities, such as priority.
At router J, the packet
header is stripped off and the IP header examined. On the basis of the
destination address information in the IP header, the IP module in the router
directs the datagram out across subnetwork 2 to B. To do this, the datagram is
again augmented with a network access header.
When the data are
received at B, the reverse process occurs. At each layer, the corresponding
header is removed, and the remainder is passed on to the next higher layer,
until the original user data are delivered to the destination process.
TCP
and UDP
For most applications running as part of
the TCP/IP protocol architecture, the transport layer protocol is TCP. TCP
provides a reliable connection for the transfer of data between applications. A
connection is simply a temporary logical association between two entities in
different systems. A logical connection refers to a given pair of port values.
For the duration of the connection each entity keeps track of TCP segments
coming and going to the other entity, in order to regulate the flow of segments
and to recover from lost or damaged segments.
Figure 2.3a shows the header format for
TCP, which is a minimum of 20 octets, or 160 bits. The Source Port and
Destination Port fields identify the applications at the source and destination
systems that are using this connection. The Sequence Number, Acknowledgment
Number, and Window fields provide flow control and error control. The checksum
is a 16-bit frame check sequence used to detect errors in the TCP segment.
Chapter 20 provides more details.
In addition to TCP, there is one other
transport-level protocol that is in common use as part of the TCP/IP protocol
suite: the User Datagram Protocol (UDP). UDP does not guarantee delivery,
preservation of sequence, or protection against duplication. UDP enables a
procedure to send messages to other procedures with a minimum of protocol
mechanism. Some transaction-oriented applications make use of UDP; one example
is SNMP (Simple Network Management Protocol), the standard network management
protocol for TCP/IP networks. Because it is connectionless, UDP has very little
to do. Essentially, it adds a port addressing capability to IP. This is best
seen by examining the UDP header, shown in Figure 2.3b. UDP also includes a
checksum to verify that no error occurs in the data; the use of the checksum is
optional.
1.4.3
OSI
MODEL
The Open Systems Interconnection (OSI)
reference model was developed by the International Organization for
Standardization (ISO)2 as a model for a computer protocol architecture and as a
framework for developing protocol standards.
The
OSI model consists of seven layers:
Ø Application
Ø Presentation
Ø Session
Ø Transport
Ø Network
Ø Data link
Ø Physical
Figure 2.6 illustrates the OSI model and
provides a brief definition of the functions performed at each layer. The
intent of the OSI model is that protocols be developed to perform the functions
of each layer.
The designers of OSI assumed that this
model and the protocols developed within this model would come to dominate
computer communications, eventually replacing proprietary protocol
implementations and rival multivendor models such as TCP/IP.This has not
happened.Although many useful protocols have been developed in the context of
OSI, the overall seven-layer model has not flourished. Instead, the TCP/IP
architecture has come to dominate.There are a number of reasons for this
outcome. Perhaps the most important is that the key TCP/IP protocols were
mature and well tested at a time when similar OSI protocols were in the
development stage. When businesses began to recognize the need for
interoperability across networks, only TCP/IP was available and ready to
go.Another reason is that the OSI model is unnecessarily complex, with seven
layers to accomplish what TCP/IP does with fewer layers.
The physical
layer coordinates the functions required to carry a bit stream over a
physical medium. It deals with the mechanical and electrical specifications of
the interface and transmission medium. The physical layer is also concerned
with the following:
Physical characteristics of interfaces and
medium: The physical layer defines the characteristics
of the interface between the devices and the transmission medium. It also
defines the type of transmission medium.
Representation
of bits: The physical layer data consists of a stream
of bits (sequence of Os or 1s) with no interpretation. To be transmitted, bits
must be encoded into signals--electrical or optical. The physical layer defines
the type of encoding (how Os and I s are changed to signals).
Data
rate: The transmission rate-the number of bits sent
each second-is also defined by the physical layer. In other words, the physical
layer defines the duration of a bit, which is how long
it lasts.
Synchronization
of bits: The sender and receiver not only must use the
same bit rate but also
must be synchronized at the bit level. In
other words, the sender and the receiver clocks must
be synchronized.
Line
configuration: The physical layer is concerned with the
connection of devices to the media. In a point-to-point configuration, two
devices are connected through a dedicated link. In a
multipoint configuration, a link is shared
among several devices.
Physical
topology: The physical topology defines how devices are
connected to make a network. Devices can be connected by using a mesh topology
(every device is connected to every other device), a star topology (devices are
connected through a central device), a ring topology (each device is connected
to the next, forming a ring), a bus topology (every device is on a common link),
or a hybrid topology (this is a combination of two or more topologies).
Transmission
mode: The physical layer also defines the direction
of transmission between two
devices: simplex, half-duplex, or full-duplex.
In simplex mode, only one device can send; the
other can only receive. The simplex mode is a
one-way communication. In the half-duplex mode,
two devices can send and receive, but not at
the same time. In a full-duplex (or simply duplex)
mode, two devices can send and receive at the
same time.
The data
link layer transforms the physical layer, a raw transmission facility, to a
reliable link. It makes the physical layer appear error-free to the upper layer
(network layer). Other responsibilities of the data link layer include the
following:
Framing: The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
Physical
addressing: If frames are to be distributed to different
systems on the network, the data link layer adds a header to the frame to
define the sender and/or receiver of the frame. If the frame is intended for a
system outside the sender's network, the receiver address is the address of the
device that connects the network to the next one.
Flow
control: If the rate at which the data are absorbed by
the receiver is less than the rate at which data are produced in the sender,
the data link layer imposes a flow control mechanism to avoid overwhelming the
receiver.
Error
control: The data link layer adds reliability to the
physical layer by adding mechanisms to detect and retransmit damaged or lost
frames. It also uses a mechanism to recognize duplicate frames. Error control
is normally achieved through a trailer added to the end of the frame.
Access
control: When two or more
devices are connected to the same link, data link layer protocols are necessary
to determine which device has control over the link at any given time.
The network
layer is responsible for the source-to-destination delivery of a packet,
possibly across multiple networks (links). Whereas the data link layer oversees
the delivery of the packet between two systems on the same network (links), the
network layer ensures that each packet gets from its point of origin to its
final destination. Other responsibilities of the network layer include the
following:
Logical
addressing. The physical addressing implemented by the
data link layer handles the addressing problem locally. If a packet passes the
network boundary, we need another addressing system to help distinguish the
source and destination systems. The network layer adds a header to the packet
coming from the upper layer that, among other things, includes the logical
addresses of the sender and receiver.
Routing. When independent networks or links are connected to create
internetworks (network of networks) or a large network, the connecting devices
(called routers or switches) route or switch the packets to their final
destination. One of the functions of the network layer is to provide this
mechanism.
The transport
layer is responsible for process-to-process delivery of the entire message.
A process is an application program running on a host. Whereas the network
layer oversees source-to-destination delivery of individual packets, it does
not recognize any relationship between those packets. Other responsibilities of
the transport layer include the following:
Service-point
addressing: Computers often run several programs at the
same time. For this reason, source-to-destination delivery means delivery not
only from one computer to the next but also from a specific process (running
program) on one computer to a specific process (running program) on the other.
The transport layer header must therefore include a type of address called a
service-point address (or port address). The network layer gets each packet to the
correct computer; the transport layer gets the entire message to the correct
process on that computer.
Segmentation
and reassembly: A message is divided into transmittable
segments, with each segment containing a sequence number. These numbers enable
the transport layer to reassemble the message correctly upon arriving at the
destination and to identify and replace packets that were lost in transmission.
Connection
control: The transport layer can be either
connectionless or connection oriented. A connectionless transport layer treats
each segment as an independent packet and delivers it to the transport layer at
the destination machine. A connection oriented transport layer makes a connection
with the transport layer at the destination machine first before delivering the
packets. After all the data are transferred, the connection is terminated.
Flow control: Like the data link layer, the transport layer
is responsible for flow control. However, flow control at this layer is
performed end to end rather than across a single link.
Error control: Like the data link layer, the transport layer
is responsible for error control. However, error control at this layer is
performed process-to process rather than across a single link. The sending
transport layer makes sure that the entire message arrives at the receiving
transport layer without error (damage, loss, or duplication). Error correction
is usually achieved through retransmission.
The services provided by the first three
layers (physical, data link, and network) are not ufficient for some processes. The session layer is the network dialog
controller. It establishes, maintains, and synchronizes the interaction among
communicating systems. The session layer is responsible for dialog control and
synchronization. Specific responsibilities of the session layer include the
following:
Dialog
control: The session layer allows two systems to enter
into a dialog. It allows the communication between two processes to take place
in either half duplex (one way at a time) or full-duplex (two ways at a time)
mode.
Synchronization: The session layer allows a process to add checkpoints, or
synchronization points, to a stream of data. For example, if a system is
sending a file of 2000 pages, it is advisable to insert checkpoints after every
100 pages to ensure that each 100-page unit is
received and acknowledged independently. In this case, if a crash
happens during the transmission of page 523, the only pages that need to be
resent after system recovery are pages 501 to 523. Pages previous to 501 need
not be resent.
The presentation
layer is concerned with the syntax and semantics of the information
exchanged between two systems. Specific responsibilities of the presentation
layer include the following:
Translation: The processes (running programs) in two systems are usually exchanging
information in the form of character strings, numbers, and so on. The
information must be changed to bit streams before being transmitted. Because
different computers use different encoding systems, the presentation layer is
responsible for interoperability between these different encoding methods. The
presentation layer at the sender changes the information from its
sender-dependent format into a common format. The presentation layer at the
receiving machine changes the common format into its receiver-dependent format.
Encryption: To carry sensitive information, a system must be able to ensure
privacy. Encryption
means that the sender transforms the original
information another form and sends the resulting message out over the network.
Decryption reverses the original process to transform the message back to its
original form.
Compression: Data compression reduces the number of bits contained in the
information. Data
compression becomes particularly important in
the transmission of multimedia such as text, audio, and video.
The application
layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail,
remote file access and transfer, shared database management, and other types of
distributed information services.
TCP/IP
and OSI Comparison
Figure
2.7 illustrates the layers of the TCP/IP and OSI architectures, showing roughly
the correspondence in functionality between the two.
1.5 STANDARD DATA TRANSMISSION
1.5.1 Concepts and
Terminology
Data transmission refers to computer-mediated
communication among system users, and also with other systems. Data might be
transmitted by transferring a data file from one user to another.
In a designed information system, data
transmission by file transfer may be largely automatic, accomplished with
little user involvement.
Coding
In all
digital communications channels, computers transmit data and information in
forms of binary codes. Both sender and receiver of the data and
information should have a standard for both to understand them.
A coding
scheme for communications is a binary system, as in the computer systems. The
system consists of groups of bits (0 or 1) that represent characters. In computer
systems, a byte is a group of bits and represents a character. In data
communications, a byte is the same, but some codes use different number of bits
such as 5, 7, 8 or 9.
Two
predominant coding schemes ASCII and EBCDIC. ASCII
refers America Standard Code for Information Interchange. It is the most
popular code for data communications and is the standard code on most
communications terminals. Among two types of ASCII, a 7-bit code can make 128
character combinations, and an 8-bit can do 256 combinations.
EBCDIC
refers Extended Binary Coded Decimal Interchange Code. It is IBM's standard
information code, and has 8 bits for a character.
Bandwidth
Each types of communications
media has different transmission speed. The bandwidth is a
measure of the transmission rate of communications channels.
§
Baseband: Digital signals are commonly called baseband signals.
Baseband is a communications technique in which digital signals are
placed onto the transmission line without change in modulation. It transmits up
to a couple of miles, and does not require the complex modems. Typical Token
Ring and Ethernet use baseband signals.
§
Broadband: Broadband is a technique for transmitting large amounts of data,
voice and video over long distances simultaneously by modulating each signal
onto a different frequency. Using the FDM (Frequency division multiplexing)
technique, several streams of data can be transmitted simultaneously.
Broadband is the bandwidth used for direct communication between very high-speed computers (e.g., large mainframe computers). This bandwidth includes microwave, satellite, coaxial cable, and fiber-optic media.
Broadband is the bandwidth used for direct communication between very high-speed computers (e.g., large mainframe computers). This bandwidth includes microwave, satellite, coaxial cable, and fiber-optic media.
Two forms of data movement
exist: parallel data transmission and serial data transmission.
§
Parallel
Transmission: Parallel data transmission
involves the concurrent flow of bits of data through separate communications
lines. This pattern resembles the flow of automobile traffic on a
multilane highway. Internal transfer of binary data in a computer uses a
parallel mode. If the computer uses a 32-bit internal structure, all the 32
bits of data are transferred simultaneously on 32 lane connections. \ Parallel
data transmission is commonly used for interactions between a computer and its
printing unit. The printer usually located close to the computer, because
parallel cables need many wires and may not work stably in long distance.
§
Serial Data
Transmission: Most data transmitted over telephone lines use a serial pattern. That is, each individual bit of information travels along
its own communications path; the bits flow in a continuous stream along the
communications channel. This pattern is analogous to the flow of traffic down a
one-lane residential street.
Serial transmission is typically slower than parallel transmission, because data are sent sequentially in a bit-by-bit fashion.
Serial transmission is typically slower than parallel transmission, because data are sent sequentially in a bit-by-bit fashion.
Besides the previously
mentioned ways in which data may travel, there are three directional modes of
travel in data transmission.
§
Simplex
Communication: Simplex communication is a
mode in which data only flows in one direction. Because most modern communications require a two-way interchange
of data and information, this mode of transmission is not as popular as it once
was. However, one current usage of simplex communications in business involves
certain point-of-sale terminals in which sales data is entered without a
corresponding reply.
§
Half-duplex
Communication: Half-duplex communication
adds an ability for a two-way flow of data between computer terminals. In this
directional mode, data travels in two directions, but not simultaneously. Data
can only move in one direction when data is not being received from the other
direction. This mode is commonly used for linking computers together over
telephone lines.
§
Full-duplex
Communication: The fastest directional mode
of communication is full-duplex communication. Here, data is transmitted in
both directions simultaneously on the same channel. Thus, this type of
communication can be thought of as similar to automobile traffic on a two-lane
road. Full-duplex communication is made possible by devices called multiplexers.
Full-duplex communication is primarily limited to mainframe computers because
of the expensive hardware required to support this directional mode.
Modes of Transmitting Data
Another way of classifying
data communications flow is as synchronous or asynchronous.
§
Synchronous
Transmission: Large volumes of information
can be transmitted at a single time with synchronous transmission. This type of
transmission involves the simultaneous flow of several bytes of data. Because a
large block of data being sent synchronously cannot be interrupted, a
synchronized clock is necessary to carefully schedule the transmission of
information. This special communications equipment is expensive; but this cost
can be made up in part by faster, less expensive transmission of information.
§
Asynchronous
Transmission: Conversely, asynchronous
transmission involves the sending and receiving of one byte of data at a time.
This type of transmission is most often used by microcomputers and other
systems characterized by slow speeds.
1.5.2
Transmission Terminology
Data
transmission occurs between transmitter and receiver over some transmission medium.Transmission
media may be classified as guided or unguided. In both cases, communication is
in the form of electromagnetic waves. With guided
media, the waves are guided along a physical path; examples of guided media
are twisted pair, coaxial cable, and optical fiber. Unguided media, also called wireless, provide a means for
transmitting electromagnetic waves but do not guide them; examples are propagation
through air, vacuum, and seawater.
The
term direct link is used to refer to
the transmission path between two devices in which signals propagate directly
from transmitter to receiver with no intermediate devices, other than amplifiers
or repeaters used to increase signal strength. Note that this term can apply to
both guided and unguided media.
A
guided transmission medium is point to point if it provides a direct
link between two devices and those are the only two devices sharing the medium.
In a multipoint guided configuration, more than two devices share the same
medium.
The
signal is a function of time, but it can also be expressed as a function of
frequency; that is, the signal consists of components of different frequencies.
It turns out that the frequency domain view of a signal is more important to an
understanding of data transmission than a time domain view. Both views are
introduced here.
Time Domain
Concepts Viewed as a function of
time, an electromagnetic signal can be either analog or digital. An analog
signal is one in which the signal intensity
Analog
and Digital Waveforms
varies
in a smooth fashion over time. In other words, there are no breaks or
discontinuities in the signal.1 A digital signal is one in which the signal
intensity maintains a constant level for some period of time and then abruptly
changes to another constant level.2. Figure 3.1 shows an example of each kind
of signal.The continuous signal might represent speech, and the discrete signal
might represent binary 1s and 0s.
The
simplest sort of signal is a periodic signal, in which the same signal pattern repeats
over time. Figure 3.2 shows an example of a periodic continuous signal (sine wave)
and a periodic discrete signal (square wave). Mathematically, a signal s(t) is defined
to be periodic if and only if where the constant Tis the period of the signal
(Tis the smallest value that satisfies the equation). Otherwise, a signal is
aperiodic. The sine wave is the fundamental periodic signal. A general sine
wave can be represented by three parameters: peak amplitude (A), frequency (f),
and phase The peak amplitude is the maximum value or strength of the signal
over time; typically, this value is measured in volts. The frequency is the
rate [in cycles per
Examples of Periodic Signals
second,
or Hertz (Hz)] at which the signal repeats. An equivalent parameter is the period
(T) of a signal, which is the amount of time it takes for one repetition;
therefore, Phase is a measure of the relative position in time within a single period
of a signal, as is illustrated subsequently. More formally, for a periodic
signal f(t), phase is the fractional part t/T of the period T through which t
has advanced relative to an arbitrary origin. The origin is usually taken as
the last previous passage through zero from the negative to the positive
direction.
The general sine wave can be written
A
function with the form of the preceding equation is known as a sinusoid.
1.6
DIGITAL AND ANALOG SIGNALS
One of the major functions of the physical layer is to
move data in the form of electromagnetic
signals across a transmission medium.
Both data and the signals that represent them can be
either analog or digital in form.
Analog and Digital Data
Data can be analog or digital. The term analog data
refers to information that is continuous;
Digital data
refers to information that has discrete states.
For example, an analog clock that has hour, minute, and
second hands gives information in a continuous
form; the movements of the hands are continuous. On the other hand, a digital
clock that reports the hours and the minutes will change suddenly from 8:05 to
8:06.
Analog data, such as the sounds made by a human voice,
take on continuous values. When someone
speaks, an analog wave is created in the air. This can be captured by a
microphone and converted to an
analog signal or sampled and converted to a digital signal.
Digital data take on discrete values. For example, data
are stored in computer memory in the form
of Os and 1s. They can be converted to a digital signal or modulated into an
analog signal
for transmission across a medium.
Analog and Digital Signals
Like the data they represent, signals can be either
analog or digital. An analog signal has
infinitely many levels of intensity over a period of
time.
A digital signal, on the other hand, can have only a
limited number of defined values. Although each
value can be any number, it is often as simple as 1 and O.
Periodic and Non periodic Signals
Both analog and digital signals can take one of two
forms: periodic or non periodic.
A periodic signal completes a pattern within a measurable
time frame, called a period, and repeats
that pattern over subsequent identical periods. The completion of one full
pattern is called a cycle.
A non periodic signal changes without exhibiting a
pattern or cycle that repeats over time.
Periodic Analog Signals
Periodic analog signals can be classified as simple or
composite.
A simple periodic analog signal, a sine wave, cannot be
decomposed into simpler signals. A
composite periodic analog signal is composed of multiple sine waves.
Sine Wave
The sine wave is the most fundamental form of a periodic
analog signal. When we visualize it as
a simple oscillating curve, its change over the course
of a cycle is smooth and consistent, a
continuous, rolling flow.
A sine wave can be represented by three parameters: the
peak amplitude, the frequency, and the
phase. These three parameters fully describe a sine wave.
Peak Amplitude
The peak amplitude of a signal is the absolute value of
its highest intensity, proportional to the energy it carries. For electric signals, peak amplitude is
normally measured in volts.
Period and Frequency
Period refers to the amount of time, in seconds, a signal
needs to complete 1 cycle. Frequency refers
to the number of periods in 1s.
Period is the inverse of frequency, and frequency is the
inverse of period, as the following
formulas show.
f = 1/T and T
= 1/f
Unit Equivalent Unit Equivalent
Seconds (s) 1s Hertz (Hz) 1 Hz
Milliseconds
(ms) 10-3 s Kilohertz (kHz) 103 Hz
Microseconds (µs) 10-6 s Megahertz (MHz) 106 Hz
Nanoseconds (ns) 10-9 s Gigahertz (GHz) 109 Hz Picoseconds
(ps) 10-12 s Terahertz (THz) 1012 Hz
Composite Signals
Simple sine waves have many applications in daily life.
We can send a single sine wave to carry
electric energy from one place to another. For example,
the power company sends a single sine wave
with a frequency of 60 Hz to distribute electric energy to houses and
businesses.
A
single frequency sine wave is not useful in data communications; we need to
send a composite signal, a signal made of
many simple sine waves.
According to Fourier analysis, any composite signal is a
combination of simple sine waves with different
frequencies, amplitudes, and phases.
Bandwidth
The range of frequencies contained in a composite signal
is its bandwidth. The bandwidth is
normally a difference between two numbers. For example,
if a composite signal contains frequencies
between 1000 and 5000, its bandwidth is 5000 - 1000, or 4000.
The bandwidth of a composite signal is the difference
between the highest and the lowest frequencies
contained in that signal.
Bit Rate
Most digital signals are non periodic, and thus period
and frequency are not appropriate
characteristics. Another term-bit rate is used to
describe digital signals.
The bit rate is the number of bits sent in 1s, expressed
in bits per second (bps).
Bit Length
We discussed the concept of the wavelength for an analog
signal: the distance one cycle occupies on the
transmission medium. We can define something similar for
a digital signal: the bit length. The bit length is the distance one bit occupies on the transmission medium.
Bit length=propagation speed x bit duration
Data Rate Limits
A very important consideration in data communications is
how fast we can send data, in bits per second
over a channel. Data rate depends on three factors:
1. The bandwidth available
2. The level of the signals we use
3. The quality of the channel (the level of noise)
Two theoretical formulas were developed to calculate the
data rate: one by Nyquist for a noiseless channel,
another by Shannon for a noisy channel.
Noiseless Channel: Nyquist Bit Rate
For a noiseless channel, the Nyquist bit rate formula
defines the theoretical maximum bit rate
BitRate = 2 x bandwidth x l0g2 L
In this formula, bandwidth is the bandwidth of the
channel, L is the number of signal levels used to
represent data, and Bit Rate is the bit rate in bits per
second.
Noisy Channel: Shannon Capacity
In reality, we cannot have a noiseless channel; the
channel is always noisy. In 1944, Claude Shannon
introduced a formula, called the Shannon capacity, to
determine the theoretical highest data rate for a
noisy channel:
Capacity =bandwidth X log2 (1 +SNR)
In this formula, bandwidth is the bandwidth of the
channel, SNR is the signal-to-noise ratio, and capacity
is the capacity of the channel in bits per second. Note
that in the Shannon formula there is no indication of the signal level, which means that no matter how many
levels we have, we cannot achieve a data rate higher than the capacity of the channel. In other words, the formula
defines a characteristic of the channel,
not the method of transmission.
1.7. TRANSMISSION IMPAIRMENT
Signals travel through transmission media, which are not
perfect. The imperfection causes signal
impairment. This means that the signal at the beginning
of the medium is not the same as the signal at the end of the
medium. What is sent is not what is received. Three causes of impairment are attenuation, distortion, and noise.
Attenuation
Attenuation means a loss of energy. When a signal,
simple or composite, travels through a medium, it
loses
some of its energy in overcoming the resistance of the medium. That is why a
wire carrying electric signals gets warm,
if not hot, after a while. Some of the electrical energy in the signal is
converted to heat. To compensate for this
loss, amplifiers are used to amplify the signal.
Original Attenuated
Amplitude
Decibel
To show that a signal has lost or gained strength,
engineers use the unit of the decibel.
The decibel (dB) measures the relative strengths of two
signals or one signal at two different points.
Note that the decibel is negative if a signal is
attenuated and positive if a signal is amplified.
Distortion
Distortion
means that the signal changes its form or shape.
Distortion can occur in a composite signal made of
different frequencies. Each signal component has its own propagation speed (see the next section) through a medium
and, therefore, its own delay in arriving
at the final destination. Differences in delay may create a difference in phase
if
the delay is not exactly the same as the period duration.
In other words, signal components at the receiver have
phases different from what they had at the
sender. The shape of the composite signal is therefore not the same.
Noise
Noise is another cause of impairment. Several types of
noise, such as thermal noise, induced noise,
crosstalk, and impulse noise, may corrupt the signal.
Thermal noise is the random motion of electrons in a wire which creates an extra signal not originally sent
by the transmitter. Induced noise comes from sources such as motors and appliances.
To find the theoretical bit rate limit, we need to know the ratio of the
signal power to the noise power.
The signal-to-noise ratio is defined as:
SNR = average signal power/ average noise power
Because SNR is the ratio of two powers, it is often described in decibel
units, SNRdB,
defined as
1.8.
TRANSMISSION MEDIA
Transmission media is a pathway that
carries the information from sender to receiver. We use different types of cables or
waves to transmit data. Data is
transmitted normally through electrical or electromagnetic signals.
An
electrical signal is in the form of current. An electromagnetic signal is
series of electromagnetic energy pulses at various frequencies. These signals
can be transmitted through copper wires, optical fibers, atmosphere, water and
vacuum Different Medias have different properties like bandwidth, delay, cost
and ease of installation and maintenance. Transmission media is also called Communication channel.
Types of Transmission Media
Transmission
media is broadly classified into two groups.
1. Wired or Guided Media or Bound Transmission Media
2. Wireless or Unguided Media or Unbound Transmission Media
Wired or Guided Media or
Bound Transmission Media: Bound transmission media are the cables that are tangible or
have physical existence and are limited by the physical geography. Popular bound transmission media in use are twisted pair cable,
co-axial cable and fiber optical cable. Each of them has its own
characteristics like transmission speed, effect of noise, physical appearance,
cost etc.
Magnetic Media
A common way to transfer
data from one computer to another is to write them into magnetic tape or floppy
disk and physically transport the tapes or disks to the destination
machines and read them again using hardware parts
Twisted pair
- It
is the oldest and still the most common transmission medium as far as
networking is concerned.
- Twisted
pair consists of 2 insulated copper wires typically about 1 mm in
thickness.
- The
wires are twisted together in a helical form just like a DNA molecule.
- He
purpose of the twisting the copper wire is to reduce electrical
interference from similar pairs close by. The most common application of a
twisted pair is a telephone system.
- The
twisted pair can run several kilometers without amplification but for
longer distances repeaters may be needed.
- Twisted
pair can be used either for analog or digital transmission.
- The
bandwidth depends on the thickness of the wires its length and the
distance traveled.
- But
several megabytes can be achieved for a few kilometers in many cases.
Base band coaxial cable
- It
is better than the twisted pair and hence can span longer distance at
higher speed.
- It
is a cable which is commonly used for digital transmission.
- A
coaxial cable consists of a stiff copper wire as the core surrounded by an
insulated material.
- The
insulator is encased by a cylindrical conductor. The outer conductor is
covered in a protective shield
Broadband coaxial cable
It is a cable used for
analog transmission. It is called broadband. It means any cable network using
analog transmission.
**The major difference
between the base band and the broadband coaxial cable is that the later covers
a bigger area and involves analog transmission. Hence requires analog
amplifiers to strengthen this signal periodically.
This amplifier only
transmits signals in one direction. So a computer sending a “packet” will not
be able to reach computers upstream from it if an amplifier lies between them.
For minimizing this error
there are 2 types of broadband system
- Dual
cable system
- Single
cable system
Dual Cable system
It has two identical wires
running parallel to each other.
A computer sends the data
into cable 1 which runs to a device called the head-end at the root of the
cable tree. The head end then transfer the signal to the cable for transmission
back down the tree. All computers transmit through cable1 and receive through
cable 2.
Single cable system
In this case, there is
just one cable through which the sending and receiving of the data is done. The
differentiating factor is the bandwidth. The bandwidth through which the packet
is sent is not the same in which it is received.
Generally low frequency
bandwidth is used for communication from the computer to the head end which
then shifts the signal to the higher frequency bandwidth for broadcasting.
There are basically 2
categories in single cable system that is the exchange of packets through the
bandwidth range is done in two ways
- sub
split system
In this case the inbound
traffic bandwidth rang: 5-30 mhz
Outbound traffic range:
40-300 Mhz
- Mid
split system
In this case the inbound
traffic bandwidth rang: 5-116 mhz
Outbound traffic range:
168-300 Mhz
Wireless or Unguided Media or Unbound Transmission Media: Unbound
transmission media are the ways of transmitting data without using any cables.
These media are not bounded by physical geography. This type of transmission is called
Wirelesscommunication. Nowadays
wireless communication is becoming popular. Wireless LANs are being installed
in office and college campuses. This transmission usesMicrowave, Radio wave,
Infra red are some of popular unbound transmission media.
The data transmission capabilities
of various Medias vary differently depending upon the various factors. These
factors are:
1. Bandwidth. It refers to the
data carrying capacity of a channel or medium. Higher bandwidth communication
channels support higher data rates.
2. Radiation. It refers to the
leakage of signal from the medium due to undesirable electrical characteristics
of the medium.
3. Noise Absorption. It refers to
the susceptibility of the media to external electrical noise that can cause
distortion of data signal.
4. Attenuation. It refers to loss
of energy as signal propagates outwards. The amount of energy lost depends on
frequency. Radiations and physical characteristics of media contribute to
attenuation.