Uploaded by Gabriel Kayode

Complete Module

advertisement
COM 302: DATA COMMUNICATIONS AND NETWORKING
Module 2
DATA COMMUNICATIONS EQUIPMENT
Data communications equipment (DCE) refers to computer hardware devices used to establish, maintain and
terminate communication network sessions between a data source and the receiving device.
One example of data communications equipment would be a modem. The modem is used primarily to preform
signal exchange. This means for example the modem that is connected to your computer can receive a transmission
from your computer and send it over a LAN to another computer or workstation. A simpler example of this data
transformation or signal exchange would be your cable box. Your cable provider sends data through the cables into
your cable box your cable box in turn collects the data that was sent and converts it or exchanges it and makes it
understandable to you the viewer in the form of a video that you can watch on your television.
DCE may also be responsible for providing timing over a serial link. In a complex network which uses directly
connected routers to provide serial links, one serial interface of each connection must be configured with a clock
rate to provide synchronisation. So, DCEs consist of devices and connections within the network which connect the
communications circuit from the data source and the destination.
The data terminal equipment (DTE) is the end instrument that is used to convert user input into digital signals and
vice versa. This device communicates with the DCE.
The data terminal equipment serves as the functional part of the data station which can be referred to as the data
sink. This is where the data will originate, or it’s source. It also allows for the data communication control function
to be performed.
There can be many different configurations of data terminal equipment: it can be a simple laptop, or it can be a
number of different devices connected together. An example of this would be a computer, printer, and an external
hard drive all connected and having the ability to each send information to the data communications equipment. For
an example, you turn on your computer and have a memo to write for your company. You open up a word
document, type out the memo and proceed to send the memo in an email as an attachment. When you click send,
your computer becomes the data terminal equipment. So, that message is sent from your computer (the DTE) to
your boss’s computer. Your boss’s computer then becomes another data terminal equipment device. When your
boss opens up the email and downloads the attachment to view the memo, his computer, now the DTE digitally
converts the email attachment and opens it in a word document so your boss can read the memo.
COMMUNICATION COMPONENTS
1. Modems
A MODEM is a MOdulation-DEModulation device that converts the discrete stream of digital "on-off" electric pulses
used by computers into the analog wave patterns used for transmission of the human voice. Demodulator (recovers)
the digital data from the transmitted signal. A special type of MODEM called an acoustic coupler is often used in
libraries and information units with portable machines, but internal and external direct-connect MODEMs are
generally used at permanent stations.
2. Multiplexers
A multiplexer is a device used for transmission of several messages over a single channel using predetermined
frequencies within the full bandwidth. The multiplexer operates on the principle that individual channel may require
only a small account of actual transmission time; thus, the multiplexer acts almost as a timeshare computer
allocating use of the single communication lines on a priority basis. A multiplexer is capable of accepting as many as
45 separate channels for transmitting data on a single communication line.
3. Concentrators (Data Switch)
A concentrator is a switch that allocates a particular input to a particular output. While a multiplexer combines the
inputs on a high-speed line; the concentrator allocates a particular input to the line for the duration of its
1
information transfer. The allocation of the output line to a specific input depends on when the request is made, the
speed of the input line, and the class or importance of the request.
4. Front-end Processors
Front-end processors are installed to handle communication related functions for a mainframe computer so that the
later can be fully used for processing applications, be it an inquiry to a database, a printing job or updating a master
file, etc... The aim of the front-end processor is to provide an inter-face between the mainframe computer and the
network so that the data is passed to and from the mainframe efficiently. The front-end processor is responsible for
supervision of the input/output controllers or channels attached to the network, for providing buffering and partial
processing of in-coming and outgoing data, for the assembling and dissembling of messages and for error handling.
The Need for Modulation
A message signal cannot travel a long distance because of its low signal strength. In addition to this, physical
surroundings, the addition of external noise and travel distance will further reduce the signal strength of a message
signal. So, in order to send the message signal to a long distance, we need to increase the signal strength of a
message signal. This can be achieved by using a high frequency or high energy signal called carrier signal. A high
energy signal can travel to a larger distance without getting affected by external disturbances. We take the help of
such high energy signal to transmit the message signal. This high energy or high frequency signal is known as carrier
signal.
The low energy message signal is mixed with the high energy or high frequency carrier signal to produce a new high
energy signal which carries information to a larger distance.
The question arises how the message signal should be added to the carrier signal. The solution lies in changing some
characteristics (amplitude, frequency or phase) of a carrier signal in accordance with the amplitude of the message
signal. This process is called modulation. Modulation means to “change”.
The Message signal contains information whereas the carrier signal contains no information. Carrier signal is used
just to transmit the information to a long distance. At the destination, the message signal is consumed whereas the
carrier signal is wasted.
In modulation process, the characteristics of the carrier signal is changed but the message signal characteristics will
not be changed. The carrier signal does not contain any information so even if we change the characteristics of the
carrier signal, the information contained in it will not be changed. However, the message signal contains information
so if we change the characteristics of the message signal, the information contained in it will also change. Therefore,
we always change the characteristics of the carrier signal but not the message signal.
Modulation allows the transmission to occur at high frequency while it simultaneously allows the carrying of the
message signal.
Modulation Definition
Modulation is the process of mixing a low energy message signal with the high energy carrier signal to produce a
new high energy signal which carries information to a long distance.
or
Modulation is the process of changing the characteristics (amplitude, frequency or phase) of the carrier signal, in
accordance with the amplitude of the message signal.
A device that performs modulation is called modulator.
Example:
The modulation process can be understood with a simple example. The below figure shows the amplitude
modulation.
2
The first figure shows the modulating signal or message signal which contains information, the second figure shows
the high frequency carrier signal which contains no information and the last figure shows the resultant amplitude
modulated signal.
From the above three figures, it can be observed that the amplitude of the carrier signal is varied in accordance with
the instant amplitude of the message signal.
Types of Signals in Modulation
In modulation process, three types of signals are used to transmit information from source to destination. They are
the message signal, carrier signal, and modulated signal.
1) Message signal
The signal which contains a message to be transmitted to the destination is called a message signal. The message
signal is also known as a modulating signal or baseband signal.
The original frequency range of a transmission signal is called baseband signal. The message signal or baseband
signal undergoes a process called modulation before it gets transmitted over the communication channel. Hence,
the message signal is also known as the modulating signal.
3
2) Carrier signal
The high energy or high frequency signal which has characteristics like amplitude, frequency, and phase but contains
no information is called a carrier signal. It is also simply referred to as a carrier. Carrier signal is used to carry the
message signal from transmitter to receiver. The carrier signal is also sometimes referred to as an empty signal.
3) Modulated signal
When the message signal is mixed with the carrier signal, a new signal is produced. This new signal is known as a
modulated signal. The modulated signal is the combination of the carrier signal and modulating signal.
Need for (Benefits of) Modulation
Modulation is extremely necessary in communication system because of the following reasons:
1) Avoids mixing of signals
One of the basic challenges facing by the communication engineering is transmitting individual messages
simultaneously over a single communication channel. A method by which many signals or multiple signals can be
combined into one signal and transmitted over a single communication channel is called multiplexing.
We know that the sound frequency range is 20 Hz to 20 KHz. If the multiple baseband sound signals of same
frequency range (I.e. 20 Hz to 20 KHz) are combined into one signal and transmitted over a single communication
channel without doing modulation, then all the signals get mixed together and the receiver cannot separate them
from each other. We can easily overcome this problem by using the modulation technique.
By using modulation, the baseband sound signals of same frequency range (I.e. 20 Hz to 20 KHz) are shifted to
different frequency ranges. Therefore, now each signal has its own frequency range within the total bandwidth.
After modulation, the multiple signals having different frequency ranges can be easily transmitted over a single
communication channel without any mixing and at the receiver side, they can be easily separated.
2) Increase the range of communication
The energy of a wave depends upon its frequency. The greater the frequency of the wave, the greater the energy
possessed by it. The baseband audio signals frequency is very low so they cannot be transmitted over large
distances. On the other hand, the carrier signal has a high frequency or high energy. Therefore, the carrier signal can
travel large distances if radiated directly into space.
The only practical solution to transmit the baseband signal to a large distance is by mixing the low energy baseband
signal with the high energy carrier signal. When the low frequency or low energy baseband signal is mixed with the
high frequency or high energy carrier signal, the resultant signal frequency will be shifted from low frequency to high
frequency. Hence, it becomes possible to transmit information over large distances. Therefore, the range of
communication is increased.
3) Wireless communication
In radio communication, the signal is radiated directly into space. The baseband signals have very low frequency
range (I.e. 20 Hz to 20 KHz). So it is not possible to radiate baseband signals directly into space because of its poor
signal strength. However, by using the modulation technique, the frequency of the baseband signal is shifted from
low frequency to high frequency. Therefore, after modulation, the signal can be directly radiated into space.
4) Reduces the effect of noise
Noise is an unwanted signal that enters the communication system via the communication channel and interferes
with the transmitted signal.
A message signal cannot travel for a long distance because of its low signal strength. Addition of external noise will
further reduce the signal strength of a message signal. So in order to send the message signal to a long distance, we
need to increase the signal strength of the message signal. This can be achieved by using a technique called
modulation.
4
In modulation technique, a low energy or low frequency message signal is mixed with the high energy or high
frequency carrier signal to produce a new high energy signal which carries information to a long distance without
getting affected by the external noise.
5) Reduces height of antenna
When the transmission of a signal occurs over free space, the transmitting antenna radiates the signal out and
receiving antenna receives it. In order to effectively transmit and receive the signal, the antenna height should be
approximately equal to the wavelength of the signal to be transmitted.
Now,
The audio signal has a very low frequency (I.e. 20 Hz to 20 kHz) and longer wavelength, so if the signal is transmitted
directly into space, the length of the transmitting antenna required would be extremely large.
For instance, to radiate an audio signal frequency of 20 kHz directly into space, we would need an antenna height of
15,000 meters.
The antenna of this height is practically impossible to construct.
On the other hand, if the audio signal (20 Hz) has been modulated by a carrier wave of 200 MHz. Then, we would
need an antenna height of 1.5 meters.
The antenna of this height is easy to construct.
Types of Modulation
Basically, the modulation is classified into two types: analog modulation and digital modulation.
Analog modulation
In analog modulation, the analog signal (sinusoidal signal) is used as a carrier signal that modulates the analog
message signal. In analog modulation, the characteristics (amplitude, frequency or phase) of the carrier signal is
varied in accordance with the amplitude of the message signal.
The four basic types of analog modulation are as follows:
5
1) Amplitude modulation
Amplitude modulation is a type of modulation where the amplitude of the carrier signal is varied (changed) in
accordance with the amplitude of the message signal while the frequency and phase of carrier signal remain
constant.
The above figure shows the amplitude modulation.
The first figure shows the modulating signal or message signal which contains information, the second figure shows
the high frequency carrier signal which contains no information and the last figure shows the resultant amplitude
modulated signal.
From the above three figures, it can be observed that the amplitude of the carrier signal is varied in accordance with
the instant amplitude of the message signal.
2) Frequency modulation
Frequency modulation is a type of modulation where the frequency of the carrier signal is varied (changed) in
accordance with the amplitude of the message signal while the amplitude and phase of carrier signal remain
constant.
6
The above figure shows the frequency modulation.
The first figure shows the modulating signal or message signal, the second figure shows the high frequency carrier
signal which contains no information and the last figure shows the resultant frequency modulated signal.
From the above three figures, it can be observed that the frequency of the carrier signal is varied in accordance with
the instant amplitude of the message signal.
3) Phase modulation
Phase modulation is a type of modulation where the phase of the carrier signal is varied (changed) in accordance
with the amplitude of the message signal while the amplitude of carrier signal remains constant.
7
The above figure shows the phase modulation.
The first figure shows the modulating signal or message signal, the second figure shows the high frequency carrier
signal which contains no information and the last figure shows the resultant phase modulated signal.
From the above three figures, it can be observed that the phase of the carrier signal is varied in accordance with the
instant amplitude of the message signal.
In this type of modulation, when the phase is changed it also affects the frequency so this modulation also comes
under frequency modulation.
The frequency and phase modulation come under angle modulation. When the frequency or phase of the carrier
signal is varied (changed) in accordance with the amplitude of the message signal, then it is called angle modulation.
4) Analog pulse modulation
In amplitude, frequency and phase modulation techniques, the carrier and message signals are continuous signals
(sinusoidal signals). However, in analog pulse modulation, the carrier signal is a discontinuous signal (series of pulses)
and message signal is a continuous signal (sinusoidal signal).
Analog pulse modulation is the process of changing the characteristics (pulse amplitude, pulse width or pulse
position) of the carrier pulse, in accordance with the amplitude of the message signal.
The analog pulse modulation is again classified as,
1. Pulse amplitude modulation
2. Pulse width modulation
3. Pulse position modulation
8
Example: The analog pulse modulation can be understood with a simple example. The below figure shows the pulse
amplitude modulation.
The first figure shows the message signal (continuous signal), the second figure shows the carrier pulse train (series
of pulses) which contains no information and the last figure shows the resultant pulse amplitude modulated (PAM)
signal.
From the above three figures, it can be observed that the amplitude of the series of carrier pulses are varied
(changed) in accordance with the instant amplitude of the message signal while the width and positions of the
carrier pulses remain constant.
Analog modulation is more sensitive to noise. Noise is an unwanted signal that enters the communication system via
the communication channel and interferes with the transmitted signal. The noise signal degrades the transmitted
signal (signal containing information). Therefore, this drawback can be overcome by the digital modulation
technique.
Digital modulation
The digital modulation technique is employed for efficient communication. The main advantage of the digital
modulation over analog modulation include high noise immunity, available bandwidth, and permissible power. In
digital modulation, the modulating signal or message signal is converted from analog to digital.
Pulse Code Modulation (PCM)
In digital modulation, the modulation technique used is Pulse Code Modulation (PCM). The pulse code modulation is
the method of converting an analog signal into a digital signal I.e. 1s and 0s. As the resultant signal is a coded pulse
train, this is called as pulse code modulation.
9
COM 302: DATA COMMUNICATIONS AND NETWORKING
MODULE 3
MULTIPLEXING
Multiplexing is a technique by which different analog and digital streams of transmission can be
simultaneously processed over a shared link. Multiplexing divides the high capacity medium into low
capacity logical medium which is then shared by different streams.
Communication is possible over the air (radio frequency), using a physical media (cable), and light (optical
fibre). All mediums are capable of multiplexing.
When multiple senders try to send over a single medium, a device called Multiplexer divides the physical
channel and allocates one to each. On the other end of communication, a De-multiplexer receives data
from a single medium, identifies each, and sends to different receivers.
1. Frequency Division Multiplexing
When the carrier is frequency, FDM is used. FDM is an analog technology. FDM divides the spectrum or
carrier bandwidth in logical channels and allocates one user to each channel. Each user can use the channel
frequency independently and has exclusive access of it. All channels are divided in such a way that they do
not overlap with each other. Channels are separated by guard bands. Guard band is a frequency which is
not used by either channel.
2. Time Division Multiplexing
TDM is applied primarily on digital signals but can be applied on analog signals as well. In TDM the shared
channel is divided among its user by means of time slot. Each user can transmit data within the provided
time slot only. Digital signals are divided in frames, equivalent to time slot i.e. frame of an optimal size
which can be transmitted in given time slot.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-multiplexer are timely synchronized
and both switch to next channel simultaneously.
When channel A transmits its frame at one end,the De-multiplexer provides media to channel A on the
other end.As soon as the channel A’s time slot expires, this side switches to channel B. On the other end,
the De-multiplexer works in a synchronized manner and provides media to channel B. Signals from
different channels travel the path in interleaved manner.
10
3. Wavelength Division Multiplexing
Light has different wavelength (colors). In fiber optic mode, multiple optical carrier signals are multiplexed
into an optical fiber by using different wavelengths. This is an analog multiplexing technique and is done
conceptually in the same manner as FDM but uses light as signals.
Further, on each wavelength time division multiplexing can be incorporated to accommodate more data
signals.
4. Code Division Multiplexing
Multiple data signals can be transmitted over a single frequency by using Code Division Multiplexing. FDM
divides the frequency in smaller channels but CDM allows its users to full bandwidth and transmit signals
all the time using a unique code. CDM uses orthogonal codes to spread signals.
MULTIPLEXERS VS CONCENTRATORS
Multiplexing can promote more economical use of a communication channel; it acts as a communication
interface, combining the input streams from several devices into a single stream that can be sent over a
single channel to the computer system. This allows a single communication channel (typically voice-grade)
to substitute for many slower sub voice channels that might otherwise have been operating at less than
full capacity. Once the computer system has completed processing, the data is sent to the multiplexer,
which then routes the data to the appropriate device.
A concentrator differs from a multiplexer in that it allows data to be transmitted from only one terminal
at a time over a communication channel. The concentrator polls the terminals one at a time to see if they
have any messages to send. When a communication channel is free, the first terminal ready to send or
receive data will get control of the channel and continue to control it for the length of the transaction. The
use of a concentrator relies on the assumption that not all terminals will be ready to send or receive data
at a given time.
DATA TRANSMISSION MODES
The way in which data is transmitted from one place to another is called data transmission mode. It is also
called the data communication mode. It indicates the direction of flow of information. Sometimes, data
transmission modes are also referred to as directional modes.
When a person is giving a lecture, information is conveyed in one direction. Similarly, during a conversation
between two persons, spoken messages are exchanged in both directions. These messages may be
exchanged alternatively or simultaneously.
There are three data transmission modes.
(i) Simplex mode:
In simplex mode, data is transmitted in only one direction. A terminal can only send data and cannot
receive it or it can only receive data but cannot send data.
Today, this mode of data communication is not popular, because most of the modem communications
require two-way exchange of data. However, this mode of communication is used in business field at
certain point-of-sale terminals in which sales data is entered without a corresponding reply. The other
examples of simplex communication modes are Radio and T.V transmissions.
11
In computer system, the keyboard, monitor and printer are examples of simplex devices. The keyboard can
only be used to enter data into computer, while monitor and printer can only accept (display/print) output.
(ii) Half-Duplex Mode:
In half-duplex mode, data can be transmitted in both directions but only in one direction at a time. In this
mode, data is sent and received alternatively. It is like a one-lane bridge where two-way traffic must give
way in order to cross the other.
In half-duplex mode, at a time only one end transmits data while other end receives. In addition, it is
possible to perform error detection and request the sender to re-transmit information.
The Internet browsing is an example of half duplex. When we issue a request to download web document
or webpage, it is downloaded and displayed before we issue another request.
(iii) Full-Duplex Mode:
In full-duplex mode, data can be transmitted in both directions at the same time on the same channel. It is
the fastest directional mode of communication. The telephone communication system is an example of
full-duplex communication mode.
Types of Data Transmission Modes:
There are two types of data transmission modes. These are:
(i) Parallel Transmission.
(ii) Serial Transmission.
(i) Parallel Transmission:
In parallel transmission, a group of bits of data flow at the same time (in parallel) through separate
communication lines. It is very fast data transmission. The automobile traffic on a multi-lane highway is an
example of parallel transmission.
Inside the computer, usually a group of bits of data flow from one component to another at the same time.
If a computer uses 32-bit internal structure, then 32-bits of data can be transferred from one component
of computer to another at the same time. Parallel transmission is commonly used to transfer data from
computer to printer.
(ii) Serial Transmission:
In serial data transmission, a group of bits of data flow in sequential order through single communication
line. The flow of traffic on one-lane residential street is an example of serial data transmission mode. Serial
transmission is typically slower than parallel transmission, because data is sent sequentially in a bit-by-bit
on a single communication line.
The telephone line system uses the serial transmission to transmit data from one location to another. In
computer system, mouse also uses serial transmission to send the command signals inside the computer.
Synchronous and Asynchronous Transmissions:
Synchronous Transmission:
In synchronous transmission, data is transmitted block-by-block or word-byword at the same time. Each
block may contain several bytes of data. In this mode, data is saved before sending. A large volume of data
can be transmitted at a time. The data transmission is very fast. It is most commonly used by remote
communication systems.
In synchronous transmission, a special communication device known as 'synchronized clock' is required to
schedule the transmission of information. This special communication device or equipment is expensive.
Asynchronous Transmission:
In asynchronous transmission, data is transmitted one byte at a 'time'. For example, the data is
transmitted character-by-character as the user types it on a keyboard. In this mode, data is not saved
before sending.
An asynchronous line that is idle (not being used) is identified with a value 1, also known as mark state.
This value is used by the communication devices to find whether the line is idle or free.
In asynchronous transmission, a special signal is sent by sender to the receiver before sending the
message. It is known as start bit. A start bit has a value of 0, also called a space state. Thus, when the line
12
switches from a value of 1 to a value of 0, the receiver is alerted for receiving the message. The
asynchronous transmission is most commonly used by microcomputers.
Transmission Mediums in Computer Networks
Data is represented by computers and other telecommunication devices using signals. Signals are
transmitted in the form of electromagnetic energy from one device to another. Electromagnetic signals
travel through vacuum, air or other transmission mediums to move from one point to another (from
sender to receiver).
Electromagnetic energy (includes electrical and magnetic fields) consists of power, voice, visible light, radio
waves, ultraviolet light, gamma rays etc.
Transmission medium is the means through which we send our data from one place to another. The first
layer (physical layer) of Communication Networks OSI Seven-layer model is dedicated to the transmission
media.
Factors to be considered while selecting a Transmission Medium
1. Transmission Rate
2. Cost and Ease of Installation
3. Resistance to Environmental Conditions
4. Distances
Bounded or Guided Transmission Media
Guided media, which are those that provide a conduit from one device to another, include Twisted-Pair
Cable, Coaxial Cable, and Fibre-Optic Cable.
A signal travelling along any of these media is directed and contained by the physical limits of the medium.
Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals in the
form of electric current. Optical fibre is a cable that accepts and transports signals in the form of light.
Twisted Pair Cable
This cable is the most commonly used and is cheaper than others. It is lightweight, cheap, can be installed
easily, and they support many different types of network. Some important points:
 Its frequency range is 0 to 3.5 kHz.
 Typical attenuation is 0.2 dB/Km @ 1kHz.
 Typical delay is 50 µs/km.
 Repeater spacing is 2km.
A twisted pair consists of two conductors (normally copper), each with its own plastic insulation, twisted
together. One of these wires is used to carry signals to the receiver, and the other is used only as ground
reference. The receiver uses the difference between the two. In addition to the signal sent by the sender
on one of the wires, interference(noise) and crosstalk may affect both wires and create unwanted signals.
13
If the two wires are parallel, the effect of these unwanted signals is not the same in both wires because
they are at different locations relative to the noise or crosstalk sources. This results in a difference at the
receiver.
Twisted Pair is of two types:
 Unshielded Twisted Pair (UTP)
 Shielded Twisted Pair (STP)
Unshielded Twisted Pair Cable
It is the most common type of telecommunication when compared with Shielded Twisted Pair Cable which
consists of two conductors usually copper, each with its own colour plastic insulator. Identification is the
reason behind coloured plastic insulation.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11 connector and 4 pair cable
use RJ-45 connector.
Advantages of Unshielded Twisted Pair Cable
 Installation is easy
 Flexible
 Cheap
 It has high speed capacity,
 100-meter limit
 Higher grades of UTP are used in LAN technologies like Ethernet.
It consists of two insulating copper wires (1mm thick). The wires are twisted together in a helical form to
reduce electrical interference from similar pair.
Disadvantages of Unshielded Twisted Pair Cable
 Bandwidth is low when compared with Coaxial Cable
 Provides less protection from interference.
Shielded Twisted Pair Cable
This cable has a metal foil or braided-mesh covering which encases each pair of insulated conductors.
Electromagnetic noise penetration is prevented by metal casing. Shielding also eliminates crosstalk.
It has the same attenuation as unshielded twisted pair. It is faster the unshielded and coaxial cable. It is,
however, also more expensive than coaxial and unshielded twisted pair.
14
Advantages of Shielded Twisted Pair Cable
 Easy to install
 Performance is adequate
 Can be used for Analog or Digital transmission
 Increases the signalling rate
 Higher capacity than unshielded twisted pair
 Eliminates crosstalk
Disadvantages of Shielded Twisted Pair Cable
 Difficult to manufacture
 Heavy
Applications of Shielded Twisted Pair Cable
 In telephone lines to provide voice and data channels. The DSL lines that are used by the telephone
companies to provide high-data-rate connections also use the high-bandwidth capability of
unshielded twisted-pair cables.
 Local Area Network, such as 10Base-T and 100Base-T, also use twisted-pair cables.
Coaxial Cable
Coaxial is called by this name because it contains two conductors that are parallel to each other. Copper is
used in this cable as centre conductor which can be a solid wire or a standard one. It is surrounded by PVC
installation, a sheath which is encased in an outer conductor of metal foil, braid or both.
Outer metallic wrapping is used as a shield against noise and as the second conductor which completes the
circuit. The outer conductor is also encased in an insulating sheath. The outermost part is the plastic cover
which protects the whole cable.
Here the most common coaxial standards.
 50-Ohm RG-7 or RG-11 : used with thick Ethernet.
 50-Ohm RG-58 : used with thin Ethernet
 75-Ohm RG-59 : used with cable television
 93-Ohm RG-62 : used with ARCNET.
15
Coaxial Cable Standards
Coaxial cables are categorized by their Radio Government (RG) ratings. Each RG number denotes a unique
set of physical specifications, including the wire gauge of the inner conductor, the thickness and the type of
the inner insulator, the construction of the shield, and the size and type of the outer casing. Each cable
defined by an RG rating is adapted for a specialized function, as shown in the table below:
Coaxial Cable Connectors
To connect coaxial cable to devices, we need coaxial connectors. The most common type of connector
used today is the Bayonet Neill-Concelman (BNC) connector. The below figure shows 3 popular types of
these connectors: the BNC Connector, the BNC T connector and the BNC terminator.
The BNC connector is used to connect the end of the cable to the device, such as a TV set. The BNC T
connector is used in Ethernet networks to branch out to a connection to a computer or other device. The
BNC terminator is used at the end of the cable to prevent the reflection of the signal.
There are two types of Coaxial cables:
16
1. BaseBand
This is a 50 ohm (Ω) coaxial cable which is used for digital transmission. It is mostly used for LAN's.
Baseband transmits a single signal at a time with very high speed. The major drawback is that it needs
amplification after every 1000 feet.
2. BroadBand
This uses analog transmission on standard cable television cabling. It transmits several simultaneous signal
using different frequencies. It covers large area when compared with Baseband Coaxial Cable.
Advantages of Coaxial Cable
 Bandwidth is high
 Used in long distance telephone lines.
 Transmits digital signals at a very high rate of 10Mbps.
 Much higher noise immunity
 Data transmission without distortion.
 The can span to longer distance at higher speeds as they have better shielding when compared to
twisted pair cable
Disadvantages of Coaxial Cable
 Single cable failure can fail the entire network.
 Difficult to install and expensive when compared with twisted pair.
 If the shield is imperfect, it can lead to grounded loop.
Aplications of Coaxial Cable
 Coaxial cable was widely used in analog telephone networks, where a single coaxial network could
carry 10,000 voice signals.
 Cable TV networks also use coaxial cables. In the traditional cable TV network, the entire network
used coaxial cable. Cable TV uses RG-59 coaxial cable.
 In traditional Ethernet LANs. Because of its high bandwidth, and consequence high data rate,
coaxial cable was chosen for digital transmission in early Ethernet LANs. The 10Base-2, or Thin
Ethernet, uses RG-58 coaxial cable with BNC connectors to transmit data at 10Mbps with a range of
185 m.
Fibre Optic Cable
A fibre-optic cable is made of glass or plastic and transmits signals in the form of light.
For better understanding we first need to explore several aspects of the nature of light.
Light travels in a straight line as long as it is mobbing through a single uniform substance. If ray of light
travelling through one substance suddenly enters another substance (of a different density), the ray
changes direction.
The below figure shows how a ray of light changes direction when going from a more dense to a less dense
substance.
Bending of a light ray
As the figure shows:
17

If the angle of incidence I(the angle the ray makes with the line perpendicular to the interface
between the two substances) is less than the critical angle, the ray refracts and moves closer to the
surface.
 If the angle of incidence is greater than the critical angle, the ray reflects (makes a turn) and travels
again in the denser substance.
 If the angle of incidence is equal to the critical angle, the ray refracts and moves parallel to the
surface as shown.
Note: The critical angle is a property of the substance, and its value differs from one substance to another.
Optical fibres use reflection to guide light through a channel. A glass or plastic core is surrounded by a
cladding of less dense glass or plastic. The difference in density of the two materials must be such that a
beam of light moving through the core is reflected off the cladding instead of being refracted into it.
Internal view of an Optical fibre
Propagation Modes of Fibre Optic Cable
Current technology supports two modes (Multimode and Single mode) for propagating light along optical
channels, each requiring fibre with different physical characteristics. Multimode can be implemented in
two forms: Step-index and Graded-index.
Multimode Propagation Mode
Multimode is so named because multiple beams from a light source move through the core in different
paths. How these beams move within the cable depends on the structure of the core as shown in the
below figure.
18


In multimode step-index fibre, the density of the core remains constant from the centre to the
edges. A beam of light moves through this constant density in a straight line until it reaches the
interface of the core and the cladding.
The term step-index refers to the suddenness of this change, which contributes to the distortion of
the signal as it passes through the fibre.
In multimode graded-index fibre, this distortion gets decreases through the cable. The word index
here refers to the index of refraction. This index of refraction is related to the density. A gradedindex fibre, therefore, is one with varying densities. Density is highest at the centre of the core and
decreases gradually to its lowest at the edge.
Single Mode
Single mode uses step-index fibre and a highly focused source of light that limits beams to a small range of
angles, all close to the horizontal. The single-mode fibre itself is manufactured with a much smaller
diameter than that of multimode fibre, and with substantially lower density.
The decrease in density results in a critical angle that is close enough to 90 degree to make the propagation
of beams almost horizontal.
Fibre Optic Cable Connectors
There are three types of connectors for fibre-optic cables, as shown in the figure below.
19
The Subscriber Channel (SC) connector is used for cable TV. It uses push/pull locking system. The StraightTip (ST) connector is used for connecting cable to the networking devices. MT-RJ is a connector that is the
same size as RJ45.
Advantages of Fibre Optic Cable
Fibre optic has several advantages over metallic cable:
 Higher bandwidth
 Less signal attenuation
 Immunity to electromagnetic interference
 Resistance to corrosive materials
 Light weight
 Greater immunity to tapping
Disadvantages of Fibre Optic Cable
There are some disadvantages in the use of optical fibre:
 Installation and maintenance
 Unidirectional light propagation
 High Cost
Applications of Fibre Optic Cable
 Often found in backbone networks because its wide bandwidth is cost-effective.
 Some cable TV companies use a combination of optical fibre and coaxial cable thus creating a
hybrid network.
 Local-area Networks such as 100Base-FX network and 1000Base-X also use fibre-optic cable.
UnBounded or UnGuided Transmission Media
Unguided medium transport electromagnetic waves without using a physical conductor. This type of
communication is often referred to as wireless communication. Signals are normally broadcast through
free space and thus are available to anyone who has a device capable of receiving them.
The below figure shows the part of the electromagnetic spectrum, ranging from 3 kHz to 900 THz, used for
wireless communication.
20
Unguided signals can travel from the source to the destination in several ways: Gound propagation, Sky
propagation and Line-of-sight propagation as shown in below figure.
Propagation Modes
 Ground Propagation: In this, radio waves travel through the lowest portion of the atmosphere,
hugging the Earth. These low-frequency signals emanate in all directions from the transmitting
antenna and follow the curvature of the planet.
 Sky Propagation: In this, higher-frequency radio waves radiate upward into the ionosphere where
they are reflected back to Earth. This type of transmission allows for greater distances with lower
output power.
 Line-of-sight Propagation: in this type, very high-frequency signals are transmitted in straight lines
directly from antenna to antenna.
We can divide wireless transmission into three broad groups:
1. Radio waves
2. Micro waves
3. Infrared waves
Radio Waves
Electromagnetic waves ranging in frequencies between 3 KHz and 1 GHz are normally called radio waves.
Radio waves are omnidirectional. When an antenna transmits radio waves, they are propagated in all
directions. This means that the sending and receiving antennas do not have to be aligned. A sending
antenna send waves that can be received by any receiving antenna. The omnidirectional property has
disadvantage, too. The radio waves transmitted by one antenna are susceptible to interference by another
antenna that may send signal suing the same frequency or band.
Radio waves, particularly with those of low and medium frequencies, can penetrate walls. This
characteristic can be both an advantage and a disadvantage. It is an advantage because, an AM radio can
receive signals inside a building. It is a disadvantage because we cannot isolate a communication to just
inside or outside a building.
21
Omnidirectional Antenna for Radio Waves
Radio waves use omnidirectional antennas that send out signals in all directions.
Applications of Radio Waves
 The omnidirectional characteristics of radio waves make them useful for multicasting in which there
is one sender but many receivers.
 AM and FM radio, television, maritime radio, cordless phones, and paging are examples of
multicasting.
Micro Waves
Electromagnetic waves having frequencies between 1 and 300 GHz are called micro waves. Micro waves
are unidirectional. When an antenna transmits microwaves, they can be narrowly focused. This means that
the sending and receiving antennas need to be aligned. The unidirectional property has an obvious
advantage. A pair of antennas can be aligned without interfering with another pair of aligned antennas.
The following describes some characteristics of microwaves propagation:
 Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to be in
direct sight of each other, towers that are far apart need to be very tall.
 Very high-frequency microwaves cannot penetrate walls. This characteristic can be a disadvantage
if receivers are inside the buildings.
 The microwave band is relatively wide, almost 299 GHz. Therefore, wider sub-bands can be
assigned and a high date rate is possible.
 Use of certain portions of the band requires permission from authorities.
Unidirectional Antenna for Micro Waves
Microwaves need unidirectional antennas that send out signals in one direction. Two types of antennas are
used for microwave communications: Parabolic Dish and Horn.
22
A parabolic antenna works as a funnel, catching a wide range of waves and directing them to a common
point. In this way, more of the signal is recovered than would be possible with a single-point receiver.
A horn antenna looks like a gigantic scoop. Outgoing transmissions are broadcast up a stem and deflected
outward in a series of narrow parallel beams by the curved head. Received transmissions are collected by
the scooped shape of the horn, in a manner similar to the parabolic dish, and are deflected down into the
stem.
Applications of Micro Waves
Microwaves, due to their unidirectional properties, are very useful when unicast(one-to-one)
communication is needed between the sender and the receiver. They are used in cellular phones, satellite
networks and wireless LANs.
There are 2 types of Microwave Transmission :
1. Terrestrial Microwave
2. Satellite Microwave
Advantages of Microwave Transmission
 Used for long distance telephone communication
 Carries 1000's of voice channels at the same time
Disadvantages of Microwave Transmission
 It is very costly
Terrestrial Microwave
For increasing the distance served by terrestrial microwave, repeaters can be installed with each antenna.
The signal received by an antenna can be converted into transmittable form and relayed to next antenna
as shown in below figure. It is an example of telephone systems all over the world
There are two types of antennas used for terrestrial microwave communication :
23
1. Parabolic Dish Antenna
In this every line parallel to the line of symmetry reflects off the curve at angles in a way that they intersect
at a common point called focus. This antenna is based on geometry of parabola.
2. Horn Antenna
It is a like gigantic scoop. The outgoing transmissions are broadcast up a stem and deflected outward in a
series of narrow parallel beams by curved head.
Satellite Microwave
This is a microwave relay station which is placed in outer space. The satellites are launched either by
rockets or space shuttles carry them.
These are positioned 36000 Km above the equator with an orbit speed that exactly matches the rotation
speed of the earth. As the satellite is positioned in a geo-synchronous orbit, it is stationery relative to earth
and always stays over the same point on the ground. This is usually done to allow ground stations to aim
antenna at a fixed point in the sky.
24
Features of Satellite Microwave
 Bandwidth capacity depends on the frequency used.
 Satellite microwave deployment for orbiting satellite is difficult.
Advantages of Satellite Microwave
 Transmitting station can receive back its own transmission and check whether the satellite has
transmitted information correctly.
 A single microwave relay station which is visible from any point.
Disadvantages of Satellite Microwave
 Satellite manufacturing cost is very high
 Cost of launching satellite is very expensive
 Transmission highly depends on whether conditions, it can go down in bad weather
Infrared Waves
Infrared waves, with frequencies from 300 GHz to 400 THz, can be used for short-range communication.
Infrared waves, having high frequencies, cannot penetrate walls. This advantageous characteristic prevents
interference between one system and another, a short-range communication system in on room cannot be
affected by another system in the next room.
When we use infrared remote control, we do not interfere with the use of the remote by our neighbours.
However, this same characteristic makes infrared signals useless for long-range communication. In
addition, we cannot use infrared waves outside a building because the sun's rays contain infrared waves
that can interfere with the communication.
Applications of Infrared Waves
 The infrared band, almost 400 THz, has an excellent potential for data transmission. Such a wide
bandwidth can be used to transmit digital data with a very high data rate.
 The Infrared Data Association (IrDA), an association for sponsoring the use of infrared waves, has
established standards for using these signals for communication between devices such as
keyboards, mouse, PCs and printers.
 Infrared signals can be used for short-range communication in a closed area using line-of-sight
propagation.
25
COM 302: DATA COMMUNICATIONS AND NETWORKING
Module 4
COMMUNICATION PROTOCOLS
Communications devices have to agree on many physical aspects of the data to be exchanged before
successful transmission can take place. Rules defining transmissions are called protocols.
A protocol is a set of rules which governs how data is sent from one point to another. In data
communications, there are widely accepted protocols for sending data. Both the sender and receiver must
use the same protocol when communicating. They are required to exchange messages in or between
computing systems and are required in communications.
Communications protocols cover authentication, error detection and correction, and signalling. They can
also describe the syntax, semantics, and synchronization of analog and digital communications.
Communications protocols are implemented in hardware and software. There are thousands of
communications protocols that are used everywhere in analog and digital communications. Computer
networks cannot exist without them.
There are many properties of a transmission that a protocol can define. Common ones include: packet size,
transmission speed, error correction types, handshaking and synchronization techniques, address
mapping, acknowledgement processes, flow control, packet sequence controls, routing, address
formatting.
Popular protocols include: File Transfer Protocol (FTP), TCP/IP, User Datagram Protocol (UDP), Hypertext
Transfer Protocol (HTTP), Post Office Protocol (POP3), Internet Message Access Protocol (IMAP), Simple
Mail Transfer Protocol (SMTP).
SYNCHRONOUS AND ASYNCHRONOUS TRANSMISSION
A protocol establishes a means of communicating between two systems. As long as the sender and
receiver each use the same protocol, information can be reliably exchanged between them. We will look at
two common protocols used in serial data communications, the first is known as Asynchronous, the
second as Synchronous.
ASYNCHRONOUS TRANSMISSION
The asynchronous protocol evolved early in the history of telecommunications. It became popular with the
invention of the early tele-typewriters that were used to send telegrams around the world.
Asynchronous systems send data bytes between the sender and receiver by packaging the data in an
envelope. This envelope helps transport the character across the transmission link that separates the
sender and receiver. The transmitter creates the envelope, and the receiver uses the envelope to extract
the data. Each character (data byte) the sender transmits is preceded with a start bit, and suffixed with a
stop bit. These extra bits serve to synchronize the receiver with the sender.
In asynchronous serial transmission, each character is packaged in an envelope, and sent across a single
wire, bit by bit, to a receiver. Because no signal lines are used to convey clock (timing) information, this
method groups data together into a sequence of bits (five - eight), then prefixes them with a start bit and
appends the data with a stop bit.
26
Nowadays, electronic clocks that provide the timing sequences
necessary to decode the incoming signal have replaced the
electromechanical motors.
This method of transmission is suitable for slow speeds less than about 32000 bits per second. In addition,
notice that the signal that is sent does not contain any information that can be used to validate if it was
received without modification. This means that this method does not contain error detection information,
and is susceptible to errors.
In addition, for every character that is sent, an additional two bits is also sent. Consider the sending of a
text document which contains 1000 characters. Each character is eight bits, thus the total number of bits
sent are 10000 (8 bits per character plus a start and stop bit for each character). These 10000 bits is
actually 1250 characters, meaning that an additional 250 equivalent characters are sent due to the start
and stop bits. This represents a large overhead in sending data, clearly making this method an inefficient
means of sending large amounts of data.
Summary
Transmission of these extra bits (2 per byte) reduce data throughput. Synchronization is achieved for each
character only. When the sender has no data to transmit, the line is idle and the sender and receiver are
NOT in synchronization. Asynchronous protocols are suited for low speed data communications, and there
is no method of error checking inherent in this protocol.
SYNCHRONOUS TRANSMISSION
One of the problems associated with asynchronous transmission is the high overhead associated with
transmitting data. Another problem is the complete lack of any form of error detection. This means the
sender has no method of knowing whether the receiver is correctly recognizing the data being transmitted.
In synchronous transmission, greater efficiency is achieved by grouping characters together, and doing
away with the start and stop bits for each character. We still envelop the information in a similar way as
before, but this time we send more characters between the start and end sequences. In addition, the start
and stop bits are replaced with a new format that permits greater flexibility. An extra ending sequence is
added to perform error checking.
A start type sequence, called a header, prefixes each block of characters, and a stop type sequence, called
a tail, suffixes each block of characters. The tail is expanded to include a check code, inserted by the
transmitter, and used by the receiver to determine if the data block of characters was received without
errors. In this way, synchronous transmission overcomes the two main deficiencies of the asynchronous
method, that of inefficiency and lack of error detection.
There are variations of synchronous transmission, which are split into two groups, namely character
orientated and bit orientated. In character orientated, information is encoded as characters. In bit
orientated, information is encoded using bits or combinations of bits, and is thus more complex than the
character orientated version. Binary synchronous is an example of character orientated, and High-Level
Data Link Control (HDLC) is an example of bit orientated.
27
In asynchronous transmission, if there was no data to transmit, nothing was sent. We relied on the start bit
to start the motor and thus begin the preparation to decode the incoming character. However, in
synchronous transmission, because the start bit has been dropped, the receiver must be kept in a state of
readiness. This is achieved by sending a special code by the transmitter whenever it has no data to send.
In bit orientated protocols, the line idle state is changed to 7E,
which synchronizes the receiver to the sender. The start and
stop bits are removed, and each character is combined with
others into a data packet.
User data is prefixed with a header field, and suffixed with a
trailer field which includes a checksum value (used by the
receiver to check for errors in sending).
The header field is used to convey address information (sender and receiver), packet type and control
data. The data field contains the user’s data (if it can't fit in a single packet, then multiple packets are used
and numbered). Generally, it has a fixed size. The tail field contains checksum information which the
receiver uses to check whether the packet was corrupted during transmission.
Summary
Asynchronous transmission is suited for low speed serial transmission and does not include error checking
as part of the protocol. Each character is contained in an envelope of a start and stop bit. It is inefficient.
Synchronous transmission can achieve higher speeds than asynchronous. In addition, it is an error checking
protocol, and much more efficient because it groups characters together into blocks.
Some common networking protocols for routing, addressing schemes, interoperability and naming
conventions:
1. TCP/IP
Transmission Control Protocol, TCP A connection-based Internet protocol responsible for breaking data
into packets, which the IP protocol sends over the network. IP is located at the TCP/IP Internet layer which
corresponds to the network layer of the OSI Model. IP is responsible for routing packets by their IP address.
Internet Protocol, IP is a connectionless protocol. This means, IP does not establish a connection between
source and destination before transmitting data, thus packet delivery is not guaranteed by IP. Instead, this
must be provided by TCP. TCP is a connection-based protocol and, is designed to guarantee delivery by
monitoring the connection between source and destination before data is transmitted. TCP places packets
in sequential order and requires acknowledgment from the receiving node that they arrived properly
before any new data is sent.
2. IPX/SPX
IPX/SPX is the primary protocol of Novell NetWare (in particular, versions 4.0 and earlier, though it can be
used on all versions). Internetwork Packet Exchange/Sequenced Packet Exchange developed by Novell and
is used primarily on networks that use the Novell NetWare network operating system. The IPX and SPX
protocols provide services similar to those offered by IP and TCP. Like IP, IPX is a connectionless network
layer protocol. SPX runs on top of IPX at the transport layer and, like TCP, provides connection oriented,
guaranteed delivery. IPX/SPX provides many of the same features as TCP/IP, and is a routable transport
protocol that allows networks to be segmented. However, network segmentation with IPX/SPX is done
with network numbers and not with subnet masks. IPX/SPX is also similar to TCP/IP because IPX/SPX relies
on internal protocols for network communication.
28
IPX
IPX is similar to the operation of UDP of TCP/IP. IPX is a connectionless datagram transfer service. Because
it is connectionless, like UDP, it does not require any preliminary connection setup to transmit the data
packets. A disadvantage to connectionless communication is that flow control and error correction are not
provided during network communication. In addition, packet delivery is not guaranteed. IPX also provides
addressing and routing of packets within and between network segments.
SPX
SPX is similar to the operation of TCP of TCP/IP. SPX is connection-oriented data transfer over IPX. Because
SPX is connection oriented, flow control and error correction are provided along with packet delivery
acknowledgments. SPX allows a single packet to remain unacknowledged at one time. If a packet is
unacknowledged, the packet is retransmitted a total of 8 times. If there’s no acknowledgment, SPX
considers the connection failed.
3. FTP (File Transfer Protocol)
One of the earliest uses of the Internet, long before Web browsing came along, was transferring files
between computers. The File Transfer Protocol (FTP) is used to connect to remote computers, list shared
files, and either upload or download files between local and remote computers.
FTP runs over TCP, which provides a connection-oriented, guaranteed data-delivery service. FTP is a
character-based command interface, although many FTP applications have graphical interfaces. FTP is still
used for file transfer purposes, most commonly as a central FTP server with files available for download.
Web browsers can make FTP requests to download programs from links selected on a Web page.
4. SMTP (Simple Mail Transfer Protocol)
SMTP is a standard electronic-mail protocol that handles the sending of mail from one SMTP to another
SMTP server. To accomplish the transport, the SMTP server has its own MX (mail exchanger) record in the
DNS database that corresponds to the domain for which it is configured to receive mail.
When equipped for two-way communication, mail clients are configured with the address of a POP3 server
to receive mail and the address of an SMTP server to send mail. The clients can configure server
parameters in the properties sheets of the mail client, basing the choices on an FQDN or an IP address.
SMTP uses TCP for communication and operates on port 25. Simple Mail Transfer Protocol (SMTP) is the
application-layer protocol used for transmitting e-mail messages. SMTP is capable of receiving e-mail
messages, but it's limited in its capabilities. The most common implementations of SMTP are in
conjunction with either POP3 or IMAP4. For example, users download an e-mail message from a POP3
server, and then transmit messages via an SMTP server
5. HTTP (Hypertext Transfer Protocol)
HTTP is often called the protocol of the Internet. HTTP received this designation because most Internet
traffic is based on HTTP. When a user requests a Web resource, it is requested using HTTP. The following is
a Web request:
http://www.example.com
When a client enters this address into a Web browser, DNS is called to resolve the Fully Qualified Domain
Name (FQDN) to an IP address. When the address is resolved, an HTTP get request is sent to the Web
server. The Web server responds with an HTTP send response. Such communication is done several times
throughout a single session to a Web site. HTTP uses TCP for communication between clients and servers.
HTTP operates on port 80.
29
6. HTTPS (Hypertext Transfer Protocol Secure)
HTTP is for Web sites using additional security features such as certificates. HTTPS is used when Web
transactions are required to be secure. HTTPS uses a certificatebased technology such as VeriSign.
Certificate-based transactions offer a mutual authentication between the client and the server. Mutual
authentication ensures the server of the client identity, and ensures the client of the server identity.
HTTPS, in addition to using certificate-based authentication, encrypts all data packets sent during a session.
Because of the encryption, confidential user information cannot be compromised. To use HTTPS, a Web
site must purchase a certificate from a third-party vendor such as VeriSign, CertCo, United States Postal
Service, or other certificate providers. When the certificate is issued to a Web site from a third-party
vendor, the Web site is using trusted communication with the client. The communication is trusted
because the third party is not biased toward either the Web site or the client. To view a certificate during a
HTTPS session, simply double-click the lock icon in the lower-right area of the Web browser. HTTPS
operates on port 443 and uses TCP for communication.
7. ARP / RARP (Address Resolution Protocol / Reverse Address Resolution Protocol)
The Address Resolution Protocol (ARP) is an Internet layer protocol that helps TCP/IP network components
find other devices in the same broadcast domain. ARP uses a local broadcast (255.255.255.255) at layer 3
and FF:FF:FF:FF:FF:FF at layer 2 to discover neighboring devices. Basically stated, you have the IP address
you want to reach, but you need a physical (MAC) address to send the frame to the destination at layer 2.
ARP resolves an IP address of a destination to the MAC address of the destination on the same data link
layer medium, such as Ethernet. Remember that for two devices to talk to each other in Ethernet (as with
most layer 2 technologies), the data link layer uses a physical address (MAC) to differentiate the machines
on the segment. When Ethernet devices talk to each other at the data link layer, they need to know each
other’s MAC addresses.
RARP is sort of the reverse of an ARP. In an ARP, the device knows the layer 3 address, but not the data link
layer address. With a RARP, the device doesn’t have an IP address and wants to acquire one. The only
address that this device has is a MAC address. Common protocols that use RARP are BOOTP and DHCP
8. NTP (Network Time Protocol)
The Network Time Protocol is used to synchronize the time of a computer client or server to another
server or reference time source, such as a radio or satellite receiver or modem. It provides accuracy's
typically within a millisecond on LANs and up to a few tens of milliseconds on WANs.
A protocol performs the following functions:
1. Data sequencing. It refers to breaking a long message into smaller packets of fixed size. Data sequencing
rules define the method of numbering packets to detect loss or duplication of packets, and to correctly
identify packets, which belong to same message.
2. Data routing. Data routing defines the most efficient path between the source and destination.
3. Data formatting. Data formatting rules define which group of bits or characters within packet constitute
data, control, addressing, or other information.
4. Flow control. A communication protocol also prevents a fast sender from overwhelming a slow receiver.
It ensures resource sharing and protection against traffic congestion by regulating the flow of data on
communication lines.
5. Error control. These rules are designed to detect errors in messages and to ensure transmission of
correct messages. The most common method is to retransmit erroneous message block. In such a case, a
block having error is discarded by the receiver and is retransmitted by the sender.
30
6. Precedence and order of transmission. These rules ensure that all the nodes get a chance to use the
communication lines and other resources of the network based on the priorities assigned to them.
7. Connection establishment and termination. These rules define how connections are established,
maintained and terminated when two nodes of a network want to communicate with each other.
8. Data security. Providing data security and privacy is also built into most communication software
packages. It prevents access of data by unauthorized users.
9. Log information. Several communication software are designed to develop log information, which
consists of all jobs and data communications tasks that have taken place. Such information may be used
for charging the users of the network based on their usage of the network resources.
31
COM 302: DATA COMMUNICATIONS AND NETWORKING
Module 5
COMPUTER NETWORKS
A Computer Network is the interconnection of multiple devices, generally termed as hosts connected
using multiple paths for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two different
devices which are known as Network devices or components. There are multiple components that go into
computer networks, but not all of these are needed in every type of network. Some of the more common
computer network components include:
1. Network Interfaces
Every device on the network has to have a network interface of some design. The network interface is
sometimes referred to as a NIC (network interface card) and may be integrated into the computer's
motherboard or may be a separate card. The NIC is the component that takes information from the
computer and sends it out onto the network wire, or into the air in the case of a wireless network.
2. Repeater
A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before
the signal becomes too weak or corrupted so as to extend the length to which the signal can be
transmitted over the same network. An important point to be noted about repeaters is that they do not
amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the
original strength. It is a 2 port device.
3. Hubs
When you connect multiple computers on a network, they all plug into a central device called a hub. The
hub has the job of moving the network signal from one wire to another. In the case of a basic hub, the
signal from one computer is sent to all other computers on the hub, and each NIC decides whether to pass
the information to the computer or just drop it if it is not the intended recipient.
4. Switches
Switches are really smart hubs in that they are able to build tables that keep up with which computer is on
which switch port. With this intelligence, a switch does not transmit all information to all other computers
on the switch, just to the destination computer. Switching technology helps to reduce congestion on a
network and should be used for networks of 10 or more computers.
5. Routers
Routers are really smart switches in that they are aware of other networks, while hubs and switches are
only aware of the network they facilitate. Routers are used to connect one local area network (LAN) to
another, many times across long distances via commercial data carriers. Another way routers are smart is
they can dynamically update their routing information, detecting when one route to a network is down,
and checking to see if another route is available.
6. Gateway
A gateway, as the name suggests, is a passage to connect two networks together that may work upon
different networking models. They basically work as the messenger agents that take data from one system,
interpret it, and transfer it to another system. Gateways are also called protocol converters and can
operate at any network layer. Gateways are generally more complex than switch or router.
7. Media (Cabling)
Of course, none of these networking devices work well unless they are connected to each other, and that is
done with various media. The most ubiquitous media is commonly called Ethernet cabling, which is actually
32
one of several categories of unshielded twisted pair (UTP) wiring. In addition, there is fibre optic cable,
which is more expensive and uses laser or LED light rather than electrical pulses. Wireless networks have
also become popular due to the ease and low expense of setting up a network. The "media" for a wireless
network is the air, through which the wireless NICs transmit radio signals that carry information.
8. Software
Software is the intelligence that causes all of the components to function together. The most popular
network software today uses what is known as the TCP/IP protocol suite, or stack. The suite is constructed
from actual layers of software, where each has its own function. These layers play by the same set of rules
so heterogeneous computer systems can communicate with each other, regardless of differences in
hardware or operating systems. Software in a network can either be local, or network.
Local Operating System - A local operating system allows personal computers to access files, print to a local
printer, and have and use one or more disk and CD drives that are located on the computer. Examples are
Ubuntu, Linux, Windows 7, Windows 8, Windows 10 etc.
Network Operating System - The network operating system is a program that runs on computers and
servers, and allows the computers to communicate over the network, sharing files and hardware devices
with one another. Examples include Windows Server 2012, Oracle Solaris, etc.
THE OSI NETWORK REFERENCE MODEL
OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International Organization of
Standardization ‘ in the year 1974. It is a 7-layer architecture with each layer having specific functionality
to performed. All these 7 layers work collaboratively to transmit the data from one device to another across
the globe.
1. Physical Layer (Layer 1):
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical
connection between the devices. The physical layer contains information in the form of bits. When
receiving data, this layer will get the signal received and convert it into 0s and 1s and send them to the
Data Link layer, which will put the frame back together.
The functions of the physical layer are :
1. Bit synchronization: The physical layer provides the synchronization of the bits by providing a clock.
This clock controls both sender and receiver thus providing synchronization at bit level.
2. Bit rate control: The physical layer also defines the transmission rate i.e. the number of bits sent
per second.
33
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes are
arranged in a network i.e. bus, star or mesh topology.
4. Transmission mode: Physical layer also defines the way in which the data flows between the two
connected devices. The various transmission modes possible are: Simplex, half-duplex and fullduplex.
*Hub, Repeater, Modem, Cables are examples of physical layer devices.
2. Data Link Layer (DLL) (Layer 2):
The data link layer is responsible for the node to node delivery of the message. The main function of this
layer is to make sure data transfer is error free from one node to another, over the physical layer. When a
packet arrives in a network, it is the responsibility of DLL to transmit it to the Host using its MAC address.
Data Link Layer is divided into two sub layers :
1. Logical Link Control (LLC)
2. Media Access Control (MAC)
Packet received from Network layer is further divided into frames depending on the frame size of NIC
(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP(Address Resolution Protocol) request onto the
wire asking “Who has that IP address?” and the destination host will reply with its MAC address.
The functions of the data Link layer are :
1. Framing: Framing is a function of the data link layer. It provides a way for a sender to transmit a set
of bits that are meaningful to the receiver. This can be accomplished by attaching special bit
patterns to the beginning and end of the frame.
2. Physical addressing: After creating frames, Data link layer adds physical addresses (MAC address)
of sender and/or receiver in the header of each frame.
3. Error control: Data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
4. Flow Control: The data rate must be constant on both sides else the data may get corrupted thus,
flow control coordinates that amount of data that can be sent before receiving acknowledgement.
5. Access control: When a single communication channel is shared by multiple devices, MAC sub-layer
of data link layer helps to determine which device has control over the channel at a given time.
* Packet in Data Link layer is referred as Frame.
** Data Link layer is handled by the NIC (Network Interface Card) and device drivers of host machines.
*** Switches & Bridges are examples of Data Link Layer devices.
3. Network Layer (Layer 3):
Network layer works for the transmission of data from one host to the other located in different networks.
It also takes care of packet routing i.e. selection of shortest path to transmit the packet, from the number
of routes available. The sender and receiver’s IP address are placed in the header by network layer.
The functions of the Network layer are :
1. Routing: The network layer protocols determine which route is suitable from source to destination.
This function of network layer is known as routing.
2. Logical Addressing: In order to identify each device on internetwork uniquely, network layer
defines an addressing scheme. The sender & receiver’s IP address are placed in the header by
network layer. Such an address distinguishes each device uniquely and universally.
34
* A segment in the Network layer is referred to as PACKET .
** Network layer is implemented by networking devices such as routers.
*** Network Layer, Data Link Layer and Physical Layer are also known as Lower Layers or Hardware
Layers.
4. Transport Layer (Layer 4):
Transport layer provides services to application layer and takes services from network layer. The data in
the transport layer is referred to as Segments. It is responsible for the End to End delivery of the complete
message. Transport layer also provides the acknowledgement of the successful data transmission and retransmits the data if error is found.
• At sender’s side:
Transport layer receives the formatted data from the upper layers, performs Segmentation and also
implements Flow & Error control to ensure proper data transmission. It also adds Source and Destination
port number in its header and forwards the segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s application.
Generally this destination port number is configured, either by default or manually. For example, when a
web application makes a request to a web server, it typically uses port number 80, because this is the
default port assigned to web applications. Many applications have default port assigned.
• At receiver’s side:
Transport Layer reads the port number from its header and forwards the Data which it has received to the
respective application. It also performs sequencing and reassembling of the segmented data.
The functions of the transport layer are:
1. Segmentation and Reassembly: This layer accepts the message from the (session) layer, and breaks
the message into smaller units. Each of the segment produced has a header associated with it. The
transport layer at the destination station reassembles the message.
2. Service Point Addressing: In order to deliver the message to correct process, transport layer header
includes a type of address called service point address or port address. Thus by specifying this
address, transport layer makes sure that the message is delivered to the correct process.
The services provided by transport layer:
1. Connection Oriented Service: It is a three phase process which include
– Connection Establishment
– Data Transfer
– Termination / disconnection
In this type of transmission the receiving device sends an acknowledgment back to the source after
a packet or group of packet is received. This type of transmission is reliable and secure.
2. Connection less service: It is a one phase process and includes Data Transfer. In this type of
transmission, the receiver does not acknowledge receipt of a packet. This approach allows for much
faster communication between devices. Connection oriented Service is more reliable than
connection less Service.
* Data in the Transport Layer is called as Segments.
** Transport layer is operated by the Operating System. It is a part of the OS and communicates with the
Application Layer by making system calls.
5. Session Layer (Layer 5):
This layer is responsible for the establishment of connection, maintenance of sessions, authentication and
also ensures security.
The functions of the session layer are :
35
1. Session establishment, maintenance and termination: The layer allows the two processes to
establish, use and terminate a connection.
2. Synchronization: This layer allows a process to add checkpoints which are considered as
synchronization points into the data. These synchronization points help to identify the error so that
the data is re-synchronized properly, and that ends of the messages are not cut prematurely and
data loss is avoided.
3. Dialog Controller: The session layer determines which device will communicate first and the
amount of data that will be sent.
6. Presentation Layer (Layer 6):
Presentation layer is also called the Translation layer. The data from the application layer is extracted here
and manipulated as per the required format to transmit over the network.
The functions of the presentation layer are:
1. Translation: For example, ASCII to EBCDIC.
2. Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the cipher text and the decrypted data is known as plain text. A key
value is used for encrypting as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on the network.
7. Application Layer (Layer 7):
At the very top of the OSI Reference Model stack of layers, we find Application layer which is implemented
by the network applications. These applications produce the data, which has to be transferred over the
network. This layer also serves as window for the application services to access the network and for
displaying the received information to the user.
Ex: Application – Browsers, Skype Messenger etc.
**Application Layer is also called as Desktop Layer.
The functions of the Application layer are :
1.
2.
3.
4.
Network Virtual Terminal
FTAM-File transfer access and management
Mail Services
Directory Services
SCENARIO:
Let’s consider a scenario where a user wants to send a message through some Messenger application
running in his browser. The “Messenger” here acts as the application layer which provides the user with an
interface to create the data. This message or so called Data is compressed and encrypted (if it is secure
data). A notification for communication is sent to the receiving device, and the message is converted into
bits (0’s and 1’s) so that it can be transmitted.
OSI model acts as a reference model and is not implemented in Internet because of its late invention. The
most popular network software today uses what is known as the TCP/IP protocol suite, or stack. The suite
is constructed from actual layers of software, where each has its own function. While the seven-layer OSI
model -- Physical, Data Link, Network, Transport, Session, Presentation and Application -- is the starting
point for network stacks, the Internet (TCP/IP) model has four layers that combine several of the seven OSI
layers into the other layers.
36
OSI MODEL TO TCP/IP MODEL
NETWORK TOPOLOGY
Computers in a network have to be connected in some logical manner. The layout pattern of the
interconnections between computers in a network is called network topology. You can think of topology as
the virtual shape or structure of the network. Network topology is also referred to as 'network
architecture.'
Devices on the network are referred to as 'nodes.' The most common nodes are computers and peripheral
devices. Network topology is illustrated by showing these nodes and their connections using cables. There
are a number of different types of network topologies, including point-to-point, bus, star, ring, mesh, tree
and hybrid. Let's review these main types.
1. Point-to-Point
Point-to-point topology is the simplest of all the network topologies. The network consists of a direct link
between two computers. This is faster and more reliable than other types of connections since there is a
direct connection. The disadvantage is that it can only be used for small areas where computers are in
close proximity.
2. Bus
Bus topology uses one main cable to which all nodes are directly connected. The main cable acts as a
backbone for the network. One of the computers in the network typically acts as the computer server. The
first advantage of bus topology is that it is easy to connect a computer or peripheral device. The second
advantage is that the cable requirements are relatively small, resulting in lower cost.
One of the disadvantages is that if the main cable breaks, the entire network goes down. This type of
network is also difficult to troubleshoot. For these reasons, this type of topology is not used for large
networks, such as those covering an entire building.
3. Star
In star topology, each computer is connected to a central hub using a point-to-point connection. The
central hub can be a computer server that manages the network, or it can be a much simpler device that
only makes the connections between computers over the network possible.
Star topology is very popular because the start-up costs are low. It is also easy to add new nodes to the
network. The network is robust in the sense that if one connection between a computer and the hub fails,
the other connections remain intact. If the central hub fails, however, the entire network goes down. It
also requires more cable than bus topology and is, therefore, more expensive.
37
4. Ring
In ring topology, the computers in the network are connected in a circular fashion, and the data travels in
one direction. Each computer is directly connected to the next computer, forming a single pathway for
signals through the network. This type of network is easy to install and manage.
If there's a problem in the network, it is easy to pinpoint which connection is defective. It is also good for
handling high-volume traffic over long distances since every computer can act as a booster of the signal.
On the downside, adding computers to this type of network is more cumbersome, and if one single
computer fails, the entire network goes down.
5. Mesh
In mesh topology, every node has a direct point-to-point connection to every other node. Because all
connections are direct, the network can handle very high-volume traffic. It is also robust because if one
connection fails, the others remain intact. Security is also high since data travels along a dedicated
connection.
38
COM 302: DATA COMMUNICATIONS AND NETWORKING
Module 6
NETWORKS (CONT’D)
Generally, networks are distinguished based on their geographical span. A network can be as small as
distance between your mobile phone and its Bluetooth headphone and as large as the internet itself,
covering the whole geographical world,
Personal Area Network
A Personal Area Network (PAN) is the smallest network which is very personal to a user. This may include
Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters. PAN
may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers
and TV remotes.
For example, a Piconet is a Bluetooth-enabled Personal Area Network which may contain up to 8 devices
connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single administrative system is
generally termed as Local Area Network (LAN). Usually, LAN covers an organization’ offices, schools,
colleges or universities. Number of systems connected in LAN may vary from as least as two to as much as
16 million.
LAN provides a useful way of sharing the resources between end users. The resources such as printers, file
servers, scanners, and internet are easily sharable among computers.
FIGURE: A SIMPLE LAN CONFIGURATION ARCHITECTURE
39
LANs are composed of inexpensive networking and routing equipment. It may contain local servers serving
file storage and other locally shared applications. It mostly operates on private IP addresses and does not
involve heavy routing. LAN works under its own local domain and controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and
uses Star topology, while Token-ring is rarely seen.
LAN can be wired, wireless, or in both forms at once.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It
can be in the form of Ethernet, Token-ring, ATM, or Fibre Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by Internet Service Providers (ISPs). This service enables its
users to expand their Local Area Networks. For example, MAN can help an organization to connect all of its
offices in a city.
FIGURE: A SIMPLE MAN CONFIGURATION ARCHITECTURE
The typical backbone of MAN is high-capacity and high-speed fibre optics. MAN works in between Local
Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet.
Wide Area Network
As the name suggests, the Wide Area Network (WAN) covers a wide area which may span across provinces
and even a whole country. Generally, telecommunication networks are Wide Area Network. These
networks provide connectivity to MANs and LANs. Since they are equipped with very high speed backbone,
WANs use very expensive network equipment. A WAN may be managed by multiple administration.
40
FIGURE 6.3: A TYPICAL WAN CONFIGURATION
Internetwork
A network of networks is called an internetwork, or simply the internet. It is the largest network in
existence. The internet hugely connects all WANs and it can have connection to LANs and Home networks.
Internet uses TCP/IP protocol suite and uses IP as its addressing protocol.
The internet enables its users to share and access enormous amount of information worldwide. It uses
WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on Client-Server
model.
Internet uses very high speed backbone of fibre optics. To inter-connect various continents, fibres are laid
under sea as submarine communication cable.
The Evolution of the Internet
The concept of Internet was originated in 1969 and has undergone several technological & Infrastructural
changes as discussed below:







The origin of Internet devised from the concept of Advanced Research Project Agency Network
(ARPANET).
ARPANET was developed by United States Department of Defence.
The basic purpose of ARPANET was to provide communication among the various bodies of
government.
Initially, there were only four nodes, formally called Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes located at different countries and thus
became known as Internet.
At the end of the cold war, the Internet was released to the general public, and especially
universities for telecommunication purposes.
In time, with invention of new technologies such as TCP/IP protocols, DNS, www, browsers,
scripting languages etc., the Internet continues to grow as the primary medium to publish and
access information over the web.
Advantages
41
Internet covers almost every aspect of life one can think of. Here, we will discuss some of the advantages
of Internet:




Internet allows us to communicate with the people at remote locations. There are various
applications available on the web that uses the Internet as a medium for communication. One can
find various social networking sites such as Facebook, twitter, Yahoo, Flickr, etc.
Internet helps us to access any kind of information over the internet. Information regarding various
topics such as Technology, Health & Science, Social Studies, Geographical Information, Information
Technology, Products etc. can be surfed with help of a search engine.
Internet also serves a medium for entertainment. Some of the various modes for entertainment
over internet include Online Television, Online Games, Songs, Videos, and Social Networking Apps.
Internet provides concept of electronic commerce, that allows the business deals to be conducted
on electronic systems
Disadvantages
There exists also, a few disadvantages of the Internet discussed below:
 There is always the chance that personal information such as name, address, credit card number
used over the Internet will fall into the wrong hands. Therefore, one should be very careful while
sharing such information. One should use credit cards only through authenticated sites.
 Another disadvantage is Spamming. Spams are the unwanted or junk e-mails received from
different places. These e-mails serve no purpose and lead to denial or obstruction of normal
service.
 Virus can easily be spread to the computers connected to internet. Such virus attacks may cause
the system to crash or important data may get deleted.
 Also a major concern of internet is pornography. There are many pornographic sites that can be
found on the Internet with negative moral effects, especially on children.
 There are various websites (especially blogs) that do not provide the authenticated information.
This leads to misinformation among many people.
The Intranet
Intranet is defined as private network of computers within an organization with its own server and firewall.
Alternatively, we can define Intranet as a system in which multiple PCs are networked and connected to
each other but are not available to the world outside of the intranet.
Usually each company or organization has their own Intranet network and members or employees of that
company can access the computers in their intranet. As every computer on internet is identified by a
unique IP address, likewise each computer in an Intranet is also identified by an IP Address, which is unique
among the computers in that Intranet.
Benefits
The Intranet is a very efficient and reliable network system for any organization. It is beneficial as almost
every advantage of the internet also applies to the Intranet. However, some additional and specific
benefits of intranets are:
42

Communication: Intranet offers easy and cheap communication within an organization. Employees
can communicate using chat, e-mail or blogs.

Collaboration: Information is distributed among the employees as according to requirement and it
can be accessed by the authorized users, resulting in enhanced teamwork.

Business Management: It is also possible to deploy applications that support business operations.

Security: Since information shared on intranet can only be accessed within an organization,
therefore there is reduced opportunities for information theft.

Specific Users: Intranet targets only specific users within an organization therefore, once can know
exactly whom he is interacting with.

Immediate Updates: Any changes made to information are reflected immediately to all the users.
Internet vs. Intranet
Despite the similarities between Intranets and Internet, there are some differences between the two.
Following are the differences between Internet and Intranet:
Intranet
Localized Network.
Doesn't have access to Intranet
More Expensive
More Security
More Reliability
Internet
Worldwide Network
Have access to Internet.
Less Expensive
Less Security
Less Reliability
LOCAL AREA NETWORK TOPOLOGIES
When choosing a networking system in communication, it is important to analyse the effectiveness and
usefulness of the networking type, to the particular context. In doing so, it is appropriate to understand
that each topology system has its merits and demerits.
Star Topology
Devices and computers on a star network connect to a central hub, (which may be a hub, a router or a
switch). The hub acts as a junction to connect different nodes present in the Star Network, and at the same
time it manages and controls the whole of the network.
Advantages
 Signals don’t necessarily get transmitted to all the workstations. A sent signal reaches the intended
destination after passing through no more than 3-4 devices and 2-3 links.
43



Easy to connect new nodes or devices. In star topology new nodes can be added easily without
affecting rest of the network. Similarly, components can also be removed easily.
Centralised management. This helps in monitoring the network.
Failure of one node or link doesn’t affect the rest of network. At the same time, it is easy to detect
the failure and troubleshoot it.
Disadvantages
 A major disadvantage of this network topology is that if the central hub fails, all computers
connected to that hub would be disconnected.
 Dependent on a central hub rather than an individual and reliable network source.
 The use of hub, a router or a switch as central device increases the overall cost of the network.
 Performance and as well number of nodes which can be added in such topology is depended on
capacity of central device.
 More software is required to run the network efficiently
Bus Topology
in the bus setup, all the nodes are connected to a single cable, by the help of interface connectors. This
central cable is the backbone of the network and is known as Bus. Every workstation communicates with
the other device through this Bus.
Advantages
 Easy to implement and extend
 Well suited for temporary networks (quick setup)
 Initially less expensive than other topologies
 The linear bus network is well-suited for LAN
Disadvantages
 Difficult to administer/troubleshoot.
 Limited cable length and number of stations.
 If there is a problem with the cable, the entire network goes down.
 Maintenance costs may be higher in the long run.
 Performance degrades as additional computers are added or on heavy traffic.
 Low security (all computers on the bus can see all data transmissions).
 One virus in the network will affect all of them
 Proper termination is required. (loop must be in closed path).
 If one node fails, the whole network will shut down.
 If many computers are attached, the amount of data flowing causes the network to slow down.
Ring Topology
A computer network configuration where each network computer and device are connected to each other
forming a large circle. Each packet is sent around the ring until it reaches its final destination. Any
computer that wants to transmit a packet uses a token, without which a message cannot be transmitted.
Today, the ring topology is seldom used. Below is a visual example of a simple computer setup on a
44
network using a ring topology.
Advantages
 Data is quickly transferred
 The use of tokens to transmit data ensures reliability of data.
 The transmission of data is relatively simple as packets travel in one direction only.
 Adding additional nodes has very little impact on bandwidth
 It prevents network collisions because of the media access method or architecture required
Disadvantages
 Data packets must pass through every computer between the sender and recipient therefore this
makes it slower.
 If any of the nodes fail, then the ring is broken and data cannot be transmitted successfully.
 It is difficult to troubleshoot the ring.
 Because all stations are wired together, to add a station you must shut down the network
temporarily.
 In order for all computers to communicate with each other, all computers must be turned on.
 Total dependence upon the one cable
Hybrid Topology
Tailor-made Integration of two or more different topologies to form a resultant topology. The network
adopts the characteristics and functioning of the combined topologies, rather than just the one.


Advantages
Unlike other networks, fault detection and troubleshooting is easy in this type of topology. The part
in which fault is detected can be isolated from the rest of network and the required corrective
measures can be taken, WITHOUT affecting the functioning of rest of the network.
It is easy to increase the size of network by adding new components, without disturbing existing
architecture.
45


Hybrid Network can be designed according to the requirements of the organization and by
optimizing the available resources. Special care can be given to nodes where traffic is high as well as
where chances of fault are high.
Hybrid topology is the combination of two or more topologies, so we can design it in such a way
that strengths of constituent topologies are maximised while their weaknesses are neutralised. For
example, we saw Ring Topology has good data reliability (achieved by use of tokens) and Star
topology has high tolerance capability (as each node is not directly connected to other but through
central device), so these two can be used effectively in hybrid star-ring topology.
Disadvantages
 One of the biggest drawbacks of the hybrid topology is its design. It is not easy to design this type of
architecture and it is a tough job for designers. Configuration and installation process needs to be
very efficient.
 The hubs used to connect two distinct networks, are very expensive. These hubs are different from
usual hubs as they need to be intelligent enough to work with different architectures and should be
function even if a part of network is down.
 As hybrid architectures are usually larger in scale, they require a lot of cables, cooling systems,
sophisticate network devices, etc.
MESH
In a mesh network topology, each of the network node, computer and other devices, are interconnected
with one another. Every node not only sends its own signals but also relays data from other nodes. In fact,
a true mesh topology is the one where every node is connected to every other node in the network. This
type of topology is very expensive as there are many redundant connections, thus it is not mostly used in
computer networks. It is commonly used in wireless networks. Flooding or routing technique is used in
mesh topology.
Advantages
 It can handle heavy traffic, as there are dedicated paths between any two network nodes.
 The arrangement of the network nodes is such that it is possible to transmit data from one node to
many other nodes at the same time.
 The failure of a single node does not cause the entire network to fail as there are alternate paths
for data transmission.
 Point-to-point contact between every pair of nodes, makes it easy to identify faults.
Disadvantages
 A lot of cabling is required. Thus, the costs incurred in setup and maintenance are high.
46


The arrangement wherein every network node is connected to every other node of the network,
many connections serve no major purpose. This leads to redundancy of many network connections.
Owing to its complexity, the administration of a mesh network is difficult.
47
Download