The block diagram of data communication network. It consists of primary source, a transmission medium and destination. The primary source is the source of the information and secondary destination is the user of the information. Block diagram of data communication network Primary host: Normally it is a mainframe computer. It is connected to many local terminals. The data is given from host to DTE or vice versa. Data Terminal Equipment (DTE): It is the interface between user computer and DCE or modem. Data Communication Equipment (DCE): Normally it is modem. It converts digital signals to analog signals. The terminal euipment is interfaced to transmission medium through DEC. Parallel Transmission Consider for e!ample, the data is coded using "#CII code with 8 th $%#&' bit used as parity bit. Then each character, symbol or number will have eight binary digits. (hen data transmission is reuired, all the bits of byte are transmitted simultaneously on separate wires. This is called parallel transmission. It is shown in )ig. below. Thus as shown in figure, there are eight wires for eight bits. *arallel transmission is used for short distance data transmission. )or e!ample parallel transmission takes place when printer is connected to parallel port of the computer. Advantaes o! Parallel Transmission +. Due to parallel connecting wires, the data transfer is very fast. ,. Comple!ity of parallel transmission is less, since all lines are transmitted separately. -. It is possible to isolate anyone line for testing or other purpose, without any intelligent hardware or software. Disadvantaes o! Parallel Transmission +. Cost of parallel transmission is more, since separate hardware connection is reuired for every bit. ,. *arallel transmission is not suitable for longer distances. Applications +. *rinters and processor to processor communications use parallel transmission. ,. %ost of the short distance communications. "erial Transmission In serial transmission, the bits of the byte are transmitted serially one after another. The bits stored in the register shifted towards .#& at every clock pulse. Thus whenever clock pulse is received bit at .#& position is transmitted on the line. This is shown in figure below. #erial transmission can take place on single connecting wire between transmitter and receiver. "s shown in below figure, the digital bits form a digital waveform. This transmission is suitable for long distance transmission. #erial transmission takes place on serial port of the computer. Advantaes o! "erial Transmission +. It reduces the number of wires reuired for connecting the two systems. ,. #erial transmission is most economical way of transmission. Disadvantaes o! "erial Transmission +. #erial transmission is slow, since all the information is transmitted serially. ,. Comple!ity of serial transmission is more, since more bits for synchroni/ation are reuired. Applications +. .ocal area networks use serial transmission. ,. Communication with system located at long distance. "erial Transmission In serial transmission, the bits of the byte are transmitted serially one after another. The bits stored in the register shifted towards .#& at every clock pulse. Thus whenever clock pulse is received bit at .#& position is transmitted on the line. This is shown in )ig. 0.+.-. #erial transmission can take place on single connecting wire between transmitter and receiver. "s shown in above figure, the digital bits form a digital waveform. This transmission is suitable for long distance transmission. #erial transmission takes place on serial port of the computer. Serial transmission Advantaes o! "erial Transmission 1. It reduces the number of wires reuired for connecting the two systems. ,. #erial transmission is most economical way of transmission. Disadvantaes o! "erial Transmission +. #erial transmission is slow, since all the information is transmitted serially. ,. Comple!ity of serial transmission is more, since more bits for synchroni/ation are reuired. Applications 1. .ocal area networks use serial transmission. ,. Communication with system located at long distance. Asynchronous Transmission In asynchronous transmission, the transmitter sends data with its own timing clock which is not known to the receiver. 1Thus transmitter and receiver does not operate at same clock signal. Normally start bit is used at the beginning of the byte and stop bit is used at the end of the byte. The start and stop bits help the receiver to identify starting and ending instants of the byte. The start and stop bits have different durations and patterns so that they can be recogni/ed easily at the receiver. The asynchronous mode of data transmission is simple to implement, but determining sampling instants is comple!. The timing errors tend to be more in this mode. "ynchronous Transmission In the synchronous mode, the transmitter and receiver operate at common clock signal. 2ence the timing errors are minimum in synchronous mode of transmission. There are no start and stop bits. The bytes are transmitted as a block continuously. )ig. 0.+.0 shows block wise synchronous transmission. Synchronous transmission The transmitter sends dock along with the data. The receiver recovers this dock and uses it to detect the data bits. The beginning of the block is indicated by flag bits in the receiver. The synchronous transmission is also3called coherent transmission. It is little comple! but number of errors are reduced. The selection of synchronous or asynchronous transmission depends upon the type of application. #auds The &aud $&d' indicates the rate at which changes occur in a signal over a given period of time. &aud is the unit of signaling speed or modulation rate. The baud rate is obtained by taking the reciprocal of the shortest signaling element. The relationship between baud rate and bit rate can best be e!plained with following e!ample. Example 4.1.1 : Fig. 4.1.5 shows the signal which is encoded in 4 levels and transmitted over a channel. Determine the baud rate and bit rate. Baud rate for 4-level modulation Solution: The bit rate can be obtained very easily. "s shown in the above figure, eight bits are transmitted in one second period. 2ence bit rate will be, &it rate = Number of bits transmitted per second 4 5 bits6sec. Now observe that each level of the encoded signal combines two successive bits. 2ence the encoded signal changes level after two bits. (e know that baud rate is the rate at which encoded or modulated signal changes its levels. 2ence baud rate for the signal of )ig. 0.+.7 will be half of the bit rate, since it changes level after two &aud rate 4 0 bauds. Transmission $odes The data can be e!changed in the following three ways, +. The data can be transferred in both directions simultaneously. ,. The data can be transferred in both directions, but transfer can take place in only direction at a time. -. The data transfer can be only in one direction. )or this type of e!change standard terminology is used in data transmission and data communications as shown below in table 0.+.+. Table 4.1.1 : Directional caabilities The bandwidth reuirement of the channel changes according to data e!change capability. (e will see more about this further. Review Questions 1. !hat do "ou mean b" s"nchronous and as"nchronous data transmission 8 !hat are their advantages and disadvantages 8 #. !hat are the advantages of transmitting binar" code e$uivalent of an analog signal on a transmission channel% Discuss limitations of such digital transmission. &. Discuss the advantages and disadvantages of arallel transmission over serial transmission. Data Communication Codes (e know that digital data is represented by binary 191 and 1+1 levels. "ll the machine level data is digital. &ut when we use computers for variety of applications: letters, numbers, symbols etc. are used. #uch letters or symbols are normally represented by group of binary digits. #uch bits are normally 7 to 5. The bits follow a well defined pattern to represent a particular symbol. #uch patterns are called codes. )or e!ample, a 7;bit code can represent , 7 4 -, different symbols. " 53bit code can represent , 5 4 ,7< symbols. There are two code sets commonly used. These codes are =3bit "#CII code and 5 bit E&CDIC code. A"C%% Code The "merican #tandard Code for Information Interchange $"#CII' is defined by "merican National #tandards Institute $"N#I'. It uses =3bits to represent every symbol. Thus "#CII code represents , = 4 +,5 various symbols. Table 0.,.+ shows the "#CII code set. Ta&le '()(* A"C%% code set The bit numbering scheme is shown in top left corner of the table. The "#CII code for the particular symbol can be obtained by reading the he!adecimal co3ordinates from the above table. )or e!ample the letter 1 E1 has the co3ordinates of $column > 0, ?ow > 7'. 2ence the "#CII code will be, Table 4.2.2 Thus the "#CII code for other symbols can be determined. The symbols like C? 6 $Carriage ?eturn' and .) $.ine )eed' are used for basic operation of printers and displays. The symbols "C@ $"cknowledgement' and N"@ $Negative "cknowledgement' are used for error control. The symbols #TA $#tart of Te!t' and ETA $End of Te!t' are used for transferring block of data characters. %any other symbols and their meanings are listed in Table 0.,.-. Table 4.2.3 Control symbols used in ASCII code set The "#CII code uses = bits. Normally the 5 th bit at %#& position is used for parity coding. This bit is also called parity bit. The value of this parity bit depends upon the type of parity coding used. )or e!ample if even parity coding is used then, the parity bit is taken such that number of is in the "#CII code are 1even1. Example 4.2.1 : 'eresent the following message b" (S)** code. +se even arit" for 8 th bit in ,SB. ,essage: B-..4& Solution: The table 0.,.0 shows the "#CII code for each character in given message. Table 4.2.4 E#CD%C Code E!tended &inary Coded Decimal Interchange Code $E&CDIC' 3 is an 5 bit code. It has ,7< possible combinations, but all the combinations are not defined in the code. There is no parity bit for error checking. Table 0.,.7 shows the code set for E&CDIC code. Bbserve that there is difference in bits numbering of E&CDIC code and "#CII code. The E&CDIC code is not same for all the devices. Ta&le '()(+ E#CD#C Code The E&CDIC code can handle graphic and control characters. This code is more suitable for data processing applications since it is compatible with &CD oriented data processing euipment. Baudot Code This is one of the first code developed and used for teleprinter. This code uses 7 bits. 2ence there are , 7 = -, distinct symbols. &y using the shift arrangement, the number of symbols can be doubled to <0. This can be done using letters $. T?#' and figures $)IC#' control characters. Table 0.,.< shows the baudot code. The baudot code is normally transmitted asynchronously. The baudot code is used in telegraph communications on the keyboard, printer and paper tape reader. + = %ark 4 *unch 2ole o 4 #pace = No *unch 2ole Table 4.2.6 Baudot Code Ote! Codes There are some other codes like morse code, &CD code, 2ollerith code, Numeric code etc. Binar" )ode Decimal /B)D0 This is one of the earlier code developed for data processing. It is shown in Table 0.,.=. #ince it does not support characters and symbols, it is suitable only for numeric information. To represent the number greater than D, other four bit groupings are used. )or e!ample 0D is represented in &CD as 9+99 +99+. 1umeric )odes: These numbers are suitable for representating numeric data. The number values are represented using binary digits. The binary number system is also one of the numeric code. Table 0.,.= lists various types of Numeric codes. Table 4.2." #ume!i$ $odes ,orse )ode: the ,orse code consists of dots and dashes in articular se$uence to reresent characters2 numbers and secial characters. This code is normall" used for telegrah". The number of dots and dashes for ever" s"mbol are different in length. E!!o! Cont!ol (hen the data is transmitted from one place to another, errors are introduced. These errors are introduced due to noise in the channel. There are two methods to detect and correct these errors i) Forward acting error correction and ii' Error detection with retransmission. !pe" of Error #ontrol i. Forward acting error correction In this method, the errors are detected and corrected by proper coding techniues at the receiver $decoder'. The check bits or redundant bits are used by the receiver to detect and correct errors. The error detection and correctionE capability of the receiver depends upon number of redundant bits in the transmitted message. The forward acting error correction is faster, but over all probability of errors is higher. This is because some of the errors cannot be corrected ii. Error detection wit$ retran"mi""ion In this method, the decoder checks the input seuence. (hen it detects any error, it discards that part of the seuence and reuests the transmitter for retransmission. The transmitter then again transmits the part of the seuence in which error was detected. 2ere note that, the decoder does not correct the errors. It Fust detects the errors and sends reuests to transmitter. This method has lower probability of error, but it is slow. T%pes o& E!!o!s There are mainly two types of errors introduced during transmission on the data> random errors and burst errors. i) ?andom errors> These errors are created due to white Caussian noise in the channel. The error generated due to white gaussian noise in the particular interval does not affect the performance of the system in subseuent intervals. In other words, these errors are totally uncorrelated. 2ence they are also called as random errors. ii) &urst errors> These errors are generated due to impulsive noise in the channel.9 These impulse noise $bursts' are generated due to lightning an switching transients. These noise bursts affect several successive symbols. #uch errors are called burst errors. The burst errors are dependent on each other in successive %me""age intervals. '(,(, Parity Codin 4.'.'.1 (!in$iple o& Ope!ation This is the most simplest coding. " parity bit is added so that number of +1s can be made even or odd. )or e!ample consider =3bit message signal and I3parity bit as follows. )i*. 4.'.1 (a!it% $odin* In above figure observe that there are seven bits in message word. "nd there are 0+Gs in message word. " parity bit of bs >>>> + is added in the codeword. This makes odd number of +Gs in the codeword. This is called odd arit". How errors are detected? &ow let t$e error take" place in 2nd 'it of t$e code word. i.e.( )t t$e recei*er num'er of 1 +" are c$ecked. )nd due to error( num'er of 1 +" are +e*en+. ,ence an error i" pre"ent in t$e recei*ed codeword. Parity coding is an error detecting code: -e "tudied a'o*e( t$at error i" pre"ent in t$e recei*ed codeword. But it i" not po""i'le to locate( w$ic$ 'it i" in error. ,ence parit! code" are onl! error detecting code". Multiple errors cannot be detected &ow let u" a""ume t$at 2nd a" well a" 1 st 'it" are in error. $en we get( "s shown above, there is an error in +7+ and #nd bit. &ut still the parity is odd $i.e. odd numbe of l1s'. Then the receiver will not be able to deted this error. Thus multiple errors cannot be detected. This problem can be solved with the help of method discussed ne!t subsection. 4.'.'.2 Odd and Even (a!it% Codin* Odd parity: If t$e parit! 'it i" added "uc$ t$at t$ere are odd num'er of 1 +"( t$en it i" called odd parit! coding. Examples: Even parity coding : If t$e parit! 'it i" added "uc$ t$at t$ere are e*en num'er of l+"( t$en it i" called e*en parit! coding. Examples: 4.'.'.' +e!ti$al and ,o!i-ontal (a!it% Ce$.s .et u" con"ider t$e me""age word of 4/'it" lengt$. ml = 1 0 1 1 m2 = 1 1 0 1 m3 = 000 1 m4 = 0 1 0 1 $e"e four me""age 'it" can 'e arranged a" an arra! of 4 x 4 "i1e. $e arra! can 'e repre"ented '! a matrix a" "$own 'elow. To this matri! one e!tra column for hori/ontal parity and e!tra row for vertical parity is added. )or e!ample if we consider odd parity, then parity bit is added in e!tra row and column such that there are odd numbers of l1s. It is shown below. )i*. 4.'.2 +e!ti$al and o!i-ontal pa!it% $e$.s 3ow error can be located% .et us assume that there is an error in #11d row third column bit. This bit is encircled as shown in )ig. "s shown in )ig. 0.-.-, parity of #nd row and &rd column is wrong. 2ence there is an error in the bit in 2nd row and 3rd column. (e know that 2nd row represents message1 m2 +. 2ence there is error in &rd bit of m2 This is how vertical and hori/ontal parity checks are used to locate errors. /dvanta*es: +' *arity coding is simple. ,' Code rate is high. #ince only one e!tra parity bit per message is reuired. )or e!ample, if there are 1b1 message bits, then there will be $k 2 +' bits after parity coding. 2ence code rate will be, Code rate = 454 which is high. 5 61 -' Hery simple decoders and generators are reuired. 0' (ith vertical and hori/ontal checks, it is possible to detect particular bit in error. 0isadvanta*es: +' It only detects errors. I. cannot correct errors. ,' %ultiple errors cannot be detected. /ppli$ations: *arity coding is used for error detection in "?I systems. E-ample '(,(*: *n a single arit" chec5 code2 the arit" bit b1 is given b" following rule: For 5 4 -, determine all ossible code words. "olution: )or k 4 -, the given euation becomes, In mod3, addition we know that can be written as since there is no subtraction operation. 2ence above euation can be written as, This euation gives parity bit from three message bits. )ollowing table shows the possible code words. 4.3.4 #!clic 4edundanc! #$ecking 5#4#) The data message polynomial %$p' is divided by the generator polynomial 65p). The uotient is discarded and the remainder is truncated to +< bits. This is called block check sum $&#C'. It is added with the message. The result of addition is nothing but encoded codeword. If there are transmission errors, then remainder is non/ero. Btherwise if there are no transmission errors, the remainder is /ero. This is how errors are detected at the receiver. Example 0.-.,> The generator ol"nomial of a $=, 0' c"clic code 7/0 = & 2 . 2 +. Find all the code vectors for the code in s"stematic form. Solution: 2ere n = 7 and ! = 4 therefore " 44 n 3 ! 44 3. There will be total 2 ! = , 0 44 +< message vectors of = bits each. Consider any message vector as, Then the message polynomial will be #! = 0 in euation 0.0.7', "nd given generator polynomial is, To obtain p q 1 (p) #ince " = -, $ ,/0 will be, (e now have $ ,/0 and 7/0. Now let1s perform the division to find remainder of this division. Thus the remainder polynomial is # 2 8 2 9 in the division of & ,/0 by 7/0. Therefore remainder C$p' can be written as, This is the reuired cyclic code vectors in systematic form. The other code vectors can be obtained using the same procedure. Table 0.-.+ lists all the systematic cyclic codes. a'le 4.3.1 #ode *ector" of a 57( 4) c!clic code for 7 /0 = & 2 2 1 '(+ 0ata 1odems. The modems are basically DCE or data communication euipment. It is the interface between DTE and analog transmission media. '(+(* /s%n$!onous 1odems J The clocking information is not received in1 asynchronous modem. 8 It uses )#@ and used for low speed dial3up1 circuits. J The types of modems used are ,9, T 67, ,9,T, ,9,7 and +9-. J %odems operate over +,993,,99 2/ freuencies. 4.2.2 S%n$!onous 1odems J The clocking information is received in synchronous modem. 8 It is used for medium and high speed applications. 8 It uses *#@ or I"% modulation. J #ynchronous modems are more complicated and more e!pensive than asynchronous modems. J %edium speed modems operate over ,099 to 0599 bps. J 2igh speed synchronous modems operate at D<99 bps. 4.2.' 3ow4speed 1odems These modems are generally asynchronous. They use noncoherent )#@. 2ence transmit carrier and clock freuencies are not recovered by receive modem. The pre3and port3euali/ation circuits do not reuire initiali/ation. 4.2.4 1edium and ,i* Speed 1odems These modems are normally synchronous type, and have transmission rates higher than ,099 bps. They use *#@ or I"%. The clock is transmitted and received by the respective modems. These modems have scrambler 6 desc1rambler and adaptive euali/ers. 4.2.2 1odem Cont!ol The modems have certain set of commands that are used to perform functions such as call initiating and dialing, busy signal recognition, automatic answering, error correction etc. The commonly used modem command is "T command set. At command mode: (hen the modem does not communicate directly with another modem, it is said to have in command mode. In this mode, the modem monitors information sent through DTE for "#CII characters "T. "s the modem detects the "T seuence, it interprets the ne!t set of characters as "T commands. At on line mode: "fter the communication is established with other modem, the modem then enters the online mode. In this mode, the modem interprets the "T characters as data only. 4.6 5SO4OS5 Seven 3a%e! /!$ite$tu!e The data needs to be communicated all over the nation as well as world. Therefore the data communication systems should follow some compatible and world wide accepted standards. These standards fit into the frame work established by International Brgani/ation for #tandardi/ation $I#B'. This framework is called the model for Bpen #ystems Interconnection $B#I'. It is also called I#B3B#K ?eference model. This model specifies seven layers or levels in the communication system. The lowest layer is called physical layer, which specifies conversion of bits into electrical signals and connection to the network. The various functions are specified in different layers to the highest $seventh' layer, which support the end user like .BCIN, password, file transfer etc. The I#B3B#I does not provide the actual standards but it provides the common framework for co3ordination of standards development. 2ence it is called reference model. )ig. 0.<.+ shows the layered architecture of I#B3B#I reference model. It is also called seven layer model. The layer 191 which is transmission media is included in the seven layers. "s shown in the figure, the first layer is physical layer, then data link layer, network layer, transport layer, session layer, presentation layer and application layer. The transmission media considered to be O t$ layer, but it is not part of seven layers. The sub network has three layers > physical layer, data link layer and network layer. These three layers interface one to one to the corresponding layers of end systems. Table 0.<.+ gives the summary of various layers, the primary functions offered by them and services provided to the ne!t higher layer. .a!er" of IS9/9SI reference model and t$eir function" (lication la"er /la"er 90 "s shown in )ig. The application layer is the highest layer in the B#I model. It pro*ide" services to the users. The functions like .BCIN, password checking, file transfers etc. are performed by application layer. .resentation la"er /la"er :0 The two communicating entities may have different local synta!, i.e. code and data format differences. These differences are resolved in the presentation layer. )or e!ample consider that one end of the system is transferring file which is in "#CII code format. The other end system needs this file, but its uses I&%1s E&CDIC format. Then the translation from "#CII code to E&CDIC code $without changing the meaning' will be done in the presentation layer. Session la"er /la"er ;0 The management and synchroni/ation of a dialog $conversation' between two different applications is done at the session layer. "t this layer the user establishes system to system interconnection. The logging on and off, user identification and billing, and session management etc. are controlled at this layer. )or e!ample consider transmission of data from one end application to other end application. "t the session layer, the streams of data are properly marked .and resynchroni/ed so that the ends of messages are not cut off prematurely. Thus there is no data loss. Transort la"er /la"er 40 The transport layer provides transport services. %any groups of independent messages are passed by the end users. These messages can be transmitted on the parallel paths or single path as available. The transport layer may do multiple!ing, splitting, blocking or segmenting of various messages $data streams' to improve utili/ation of network resources. The transport layer guarantees the data from one end of the system to other with small error rate, minimum delay, minimum cost and highest throughputs. The transport layer provides end to end connectivity. 1etwor5 la"er /la"er &0 The network layer provides means to access the sub network for routing the messages to the destination end system. The outgoing messages are divided into packets at this layer. The incoming packets are assembled into messages for the higher levels. The routing of messages and packets is also decided in the network layer. Thus network layer acts as a network controller for routing data. Data lin5 la"er /la"er #0 The function of the data link layer is to detect and correct the errors introduced during transmision of electrical signals. )or the data which is to be transmitted, it adds the error detection bits. This encoded data is then handed over to physical layer for transmission. These error detection bits are used by the data link layer at other end for detecting and correcting errors. Normally the data is transmitted in frames. The flow of frames is also performed in data link layer. .h"sical la"er /la"er 10 The physical layer is concerned with the transmission of digital data over the interconnection media. It converts the digital data bits to the electrical signal. It decides duration of bit, amplitudes of the electrical signal, whether the transmission is half duple!, full duple! and how the connections are established at each end. The physical layer does not detect and correct any errors rather it is mainly concerned with physically carrying the data and handing over the data to data link layer. ?#3,-,C and ?#300D standards are the e!amples of physical layer protocols. 4." T%pes o& #etwo!.s In this section we will briefly describe various types of networks. They are .ocal "rea Network $."N', (ide "rea Network $("N', #atellite Network, *ublic #witched Telephone Network $*#TN', Integrated #ervices Digital Network $I#DN' etc. "ll these networks serve variety of applications. 4.".2 5nte*!ated Se!vi$es 0i*ital #etwo!. 65S0#7 The rapid development is computers and communication technologies have resulted in merging of these two fields. The computing, switching and digital transmission euipment are being used combinely and effectively for data, voice and image transmission. The Integrated #ervices Digital Network $I#DN' is intended to replace the e!isting telecommunications network and deliver the wide variety of services. The I#DN is an all digital network that provide services on telephone, data, computers etc. anywhere around the world. It is an interface network which integrates various( types of services and users. I#DN is the ne!t step in the field of communication. There are two types of I#DN> Narrowband I#DN and Broad'and I#DN In narrow band I#DN ,the data transmission takes place at very low rate of <0kb6sec &ecause of such low bit rates, the range of services offered by Narrow band I#DN is limited. The uality of video signal is very poor in narrow band I#DN. &roadband I#DN is the ne!t step of de*elopment in I#DN technology. The transmission of signals takes place on optical fiber in &roadband I#DN. &ecause of optical fibers, very high data rate are possible. &ecause of this fast e!change of data( 'road'and IS:& can pro*ide man! "er*ice". Principles o! %"DN: )i*. 4.".8 Conne$tion &eatu!es o& 5S0# .integrated in the single interface by I#DN. The customer I#DN interface is connected to I#DN central office through digital pipe $or I#DN line'. The I#DN central office is, connected to Integrated Digital Network $IDN' : which consists of packet switched network, circuit switched network, data bases, some other networks and services. Architecture.#lock diaram o! %"DN: )ig. 0.=.D shows the architecture or block diagram of I#DN, which is almost similar to )ig. 0.=.5. The common physical interface is basically customer I#DN interface. It provides DTE6DCE connection. This interface can also be used for telephone, computer terminal and videote!t terminal. " digital ;B< and .)&" can al"o 'e connected to t$e p$!"ical interface. The common physical interface is connected through digital line to I#DN central office. The common physical interface is connected through digital line to I#DN central offices. The central office connect the I#DN subscriber loop signal to IDN. The central office provides access to C1irc.uit switched network, dedicated lines, packet switched networks, and time shared, transaction oriented computer services. )i*. 4.".9 /!$ite$tu!e o! blo$. dia*!am o& 5S0# %"DN Channels : The digital pipe between central office and I#DN user carries various communication channels. There are three types of channels > 3 L-3channel having <0 kbps capacity 3 D channel having +< or <0 kbps capacity 3 2 channel having -50 $2B', +7-< $2ll' and +D,9 $2+,' kbps. "ny access link is constructed from these channels. The &3channel is the basic user ( channel. It can be used to carry digital data, *C% encoded digital *oice or a mi!ture of lower rate traffic. The D3channel carries signaling information to control circuit "witc$ed call" on a""ociated B c$annel" at the user interface. It is also used packet switching or low speed telemetr! when no signaling information is to be transmitted. The 23channel is used to carry user information at higher bit rates. This channel can also be used to carry TB% data signals at high speed. Cannel st!u$tu!es in 5S0# 4.".1 3o$al /!ea #etwo!.s 63/#7 The local area networks are also called as ."Ns. They are privately owned networks within a single building or campus of upto a few kilometers in si/e. The personal computers and workstations in the company offices or factories are interconnected by ."N. &ecause of ."N, it becomes easy to share resources like printers and e!change the information. The ."Ns are distinguished from other kinds of networks by three characteristics> $i' their si/e, $ii' their transmission technology, and $iii' their topology. In ."N, the single cable is used and all the machines are connected to this cable. The modern ."Ns operate at hundreds of megabits6sec. Different types of topologies are used for ."Ns. The 1bus1 and 1ring1 topologies are very common. (e will study these topologies in detail in the ne!t section. The broadcast networks are also divided as static or dynamic, depending upon how the channel is allocated. The architecture of the ."N is described in terms of layering protocols that organi/e the basic functions of the ."N. The architecture of ."N consists of physical, medium access control and logical link control layers. (e will see more details of ."N in ne!t section. 4.8 lo$al /!ea #etwo!.s 63/#7 4.8.1 5nt!odu$tion to 3/# In the last section we have already defined and introduced ."N. " .ocal "rea Network $."N' is the network that is specifically designed to operate over the small physical area. Normally ."Ns are privately owned. ."Ns can provide the data rates upto +9 %bps. The main advantage of ."N is the ability to store euipment, data and software. The nature of the ."N is determined by $i' topology, $ii' transmission medium and $iii' medium access control techniues. 2ere we will briefly discuss these concepts. 4.8.2 /tt!ibutes o& 3/# The ."N consists of computers, graphic stations and user terminal stations which are interconnected by the cabling system. ."N has following attributes > $i' The geographical coverage of ."Ns is limited to areas less than 7 suare kilometers. $ii' The data rates in ."N are more than + %bps. $iii' The physical interconnecting medium of ."Ns is owned by private organi/ations. $iv' The physical interconnecting medium is shared by the stations which are connected to ."N. 4.8.' Topolo*ies o& 3/# The topology of ."N means the way in which the stations are physically connected. There are three main topologies> &us, ring and star. The topology of ."N has following reuirements> $i' The topology should be fle!ible, so that changes can be made in physical locations of stations. $ii' The cost of physical media and installation should be minimum. $iii' The network should not have any single point of complete failure. Bus Topolo*%: In the bus topology of ."N, the stations are connected to the cable as shown in )ig. Bus topolo*% o& 3/# In the bus topology the data flows in both the directions on the cable. Every station listens to all the transmissions on the bus. The ends of bus are terminated by appropriate matching impedance to avoid signal reflection. #ince the signal is bidirectional, amplifiers cannot be used on the bus. Two separate buses are used for each. direction if amplifiers are to be used. Every terminal is connected to both the buses. This is called dual bus topology. It is shown in )ig. Bne bus is called transmit bus and other is called receive bus. 0ual bus topolo*% wit ampli&ie!s The transmit and receive buses can be provided on the single bus by using freuency division multiple!ing of transmission channels. )ig. 0.5.- shows this topology. "s shown in. figure, the stations receive data from bus by demodulating receive carrier #%2& The stations send data on the bus by modulating transmit carrier #%'& The head end consists of a freuency translator which changes transmit carrier freuency to receive carrier freuency. 2ence data transmitted by one terminal can be received by other terminal. 0ual bus topolo*% usin* &!e:uen$% division multiplexin* /dvanta*es o& bus topolo*%: $i' The stations are connected to the bus using a passive tap. $ii' The length of physical transmission medium is minimum. $iii' &y e!tending bus through repeaters, the coverage can be increased. $iv' Lust by tapping a working bus, the new stations can be easily added. Rin* Topolo*%: In the ring network, a number of transmission links are Foined together in the form of a ring through repeaters. These repeaters called ?ing Interface Mnits. )ig. 0.5.0 shows ring topology. The transmission is only in one direction on ring. The ?IM receives the signal at its input, it regenerates the signal and sends it to the ?IM of ne!t stations. The station can e!change data on the network through ?IM $also called repeater'. Every data unit has source and destination address. The ?IM checks for the destination address. If the data unit is transmitted for a particular ?IM, it copies the data. The data unit circulates around the ring and comes back to the ?IM from where it was transmitted on the ring. The ?IM of the source then absorbs or removes this data unit from the ring. Thus each data unit completes one round on the ring. The ring topology is not superior to bus topology. Rin* topolo*% in 3/# 0isadvanta*es o& !in* topolo*%: $i' If one ?IM fails in the ring, then there can be total failure of the network. $ii' It is difficult to e!pand the number of users in the ring. $iii' The cost of cables is more in ring topology. Sta! Topolo*%: Each station is directly connected to the common central controller in this topology. It is shown in )ig. 0.5.7. The central controller acts as a switch. The data units from source to the destination are routed through central controller. The star topology is widely used in telephone networks. It can be used for small ."Ns. Sta! topolo*% 0isadvanta*es o& sta! topolo*%: $i' If the central controller fails, then complete network fails. $ii' Every station is connected to the central controller by separate link. 2ence no sharing of transmission medium. T!ee Topolo*%: The tree topology is the generali1ation of bus topology. In tree topology, the cable branches at one or both the ends as shown in )ig. 0.5.<. The cable is branched from the headend. Bbserve that there is only one transmission path between any two nodes. The cables which connect various stations looks like a tree hence the name tree topology is given. %aFority of the ."Ns use bus and tree topologies 3o*i$al Topolo*%: The logical topology means the way in which the stations are logically interconnected. The ring, star, bus and tree topologies are physical topologies. In the bus topology, the data is routed to various nodes through bus. Thus bus is the central controller. It receives data and forwards it to various nodes. Thus the stations have logical connection the bus which acts as central controller. 2ence the logical topology is star. 4.8.4 3a%e!ed /!$ite$tu!e o& 3/# " t the beginning of this chapter we have studied I#B3B#I reference model. It consists of data link layer as layer , above the physical layer. In the .ocal "rea Networks $."Ns', the data link layer is divided into two sublayers > $i' .ogical .ink Control $..C' and $ii' %edia "ccess Control $%"C'. )ig. 0.5.= shows these layers.
The physical layer transmits the data signals through the transmission media to other stations. It also receives data from transmission media and delivers it to sublayers of data link layer. The %edia "ccess Control $%"C' sublayer performs following functions> / It performs control of access to transmission media. 3 Mniue addressing of stations directly connected to ."N. / It also performs error detection. The .ogical .ink Control $..C' sublayer performs following functions> 3 Error recovery 3 )low control 3 Mser addressing Each sub layer appends a header to the user data to perform the above functions. "s shown in )ig. 0.5.5, the data frame is delivered from network layer to the ..C sublayer. The ..C sublayer appends the protocol control information in the form of header $T 2' to the data unit 5It i" also called *rotocol Data Mnit or *DM'. The ..C *rotocol Data Mnit $*DM' thus formed is passed on to the %"C sub layer. The %"C sublayer adds header $%2' and trailer $%T' to the ..C *rotocol Data Mnit $*DM' to form %"C *rotocol Data Mnit $*DM' or frame. This frame is then handled over to physical layer for transmission. 33C and 1/C eade!s o& te 3/# &!ame The ..C header contains control field and address fields. The control field is used for error control, flow control and seuencing of ..C data units. The address field contains the sending and receiving network layer identity. The %"C header contains the media access control field and station address fields. The station address field contains the sending and receiving station addresses. 4.8.2 5EEE Standa!ds 8;2 &o! 3/# )or the layered architecture of ."N, the standards and protocols have been developed by Institution of Electronics and Electrical Engineers $IEEE'. These standards are collectively known as IEEE 59, standards. These standards have been adopted by "N#I, NI#T and I#B as international standards. The IEEE 59, standards are mentioned as follows> 59,.+ "rchitecture, management and internetworking 59,., .ogical .ink Control $..C' protocol 59,.- Carrier #ense %ultiple "ccess $C#%"'6Collision Detection $CD' 59,.0 Token &us 59,.7 Token ?ing 59,.< %etropolitan "rea Networks $%"Ns' 59,.= &roadband Technical "dvisory Croup 59,.5 )ibre Bptic Technical "dvisory Croup 59,.D Integrated Data and Hoice Networks In ."Ns the common cable $or media' is shared by many stations. The %edia "ccess Control $%"C' sub layer deals with the access of media to transmit or receive signals. The %"C sublayer is important in ."Ns since all the stations use a common cable or media as a basis for their communication. )or ."Ns IEEE has adopted three mechanisms of media access control. They are Carrier #ense %ultiple "ccess6 Collision Detection $C#%"6CD', Token bus and Token ring. Thus these are the three protocols for %"C sublayer. "s shown in )ig. 0.5.D, the C#%"6CD $IEEE 59,.-', Token bus $IEEE 59,.0' and Token ring $IEEE 59,.7' are the three standard protocols for %"C sublayer. 5EEE 8;2 3/# standa!ds The physical layer protocols we have seen earlier. It does the Fob of signal encoding, transmitting and receiving signals from the transmitting media. The .ogical .ink Control $..C' sub layer standards are specified in IEEE 59,.,. 4.8.6 3o*i$al 3in. Cont!ol 633C7<5EEE 8;2.2 (e have seen earlier that .ogical .ink Control $..C' sub layer is the upper layer of data link layer. The specifications of ..C are given in IEEE 59,., standard. The ..C sub layer carriers out error control, flow control, seuencing and user addressing functions. The ..C sub layer provides service to network layer and receives service from %"C sublayer. 33C Se!vi$e : The ..C sublayer provides three types of following sevices to the network layer entity> T"e-l +nac5nowledged connection less-mode service: This is non3reliable data link service, since there is no acknowledgement of delivery or non3delivery of data units. There is no guarantee that data will be delivered in this service. This service is used only for sending and receiving the user data. The error control, flow control or seuencing are performed by higher layers rather than data link layer, since the service is unacknowledged. T"e-# )onnection mode service: In this serviceE the data frames contain source address, a destination address, a seuence number and an acknowledgement number. It provides flow control, error control and seuencing operations. It is more reliable service. This service is provided in three phases > establishment of connection, data transfer and disconnection. T"e-& (c5nowledged connection less mode service : In this service the ..C user gets an acknowledgement to transmission. The data transfer takes place in connectionless mode. Each *rotocol Data Mnit $*DM' is acknowledged to ..C, after it is received properly. This service can also provide poll and response service. 33C (!oto$ol : 33C (0= &o!mat (e have seen in )ig. 0.5.5, that the ..C appends header to the *rotocol Data Mnit $*DM' obtained from network layer. #uch appended data frame is called ..C *DM and is shown in )ig. 0.5.+9. Its address field contains the address of destination data link layer service access point $D#"*' and the address of source data link layer service access point $##"*'. The control field is similar to control field of 2D.C frames. 4.8." 1edia /$$ess Cont!ol 61/C7 The %edia "ccess Control $%"C' sublayer is the lower layer1 of data link layer as we have seen in )ig. 0.5.=. The %"C sublayer performs media access controt error detection and station addressing. This layer receives the service from physical layer and provides service to the ..C sublayer. 1/C Se!vi$e : The %"C sub layer provides connectionless3mode service for the transfer of ..C *DM. 1/C p!oto$ol<&!ame &o!mat : The %"C layer receives *rotocol Data Mnit $*DM' from the ..C layer. The %"C sub layer appends header and trailer to ..C *DM as we have seen earlier in )ig. 0.5.5. Thus the %"C frame consists of header, ..C *DM as data field and trailer. The e!act format of %"C protocol or %"C frame differs somewhat for different media access control techniues. The general format of the %"C frame is shown in )ig> 0.5.++. %n the figure the format of ..C *DM is also shown. (e have discussed this format in last subsection. The various fields of the %"C frame are as follows > 1/C (!oto$ol<&!ame &o!mat MAC control: This field contains the protocol control information reuired for the functioning of the %"C protocol. Destination MAC address: This is the address of the receiving station on ."N. Source MAC address: This is the address of the sending station on ."N. //C PDU : This is the ..C protocol data unit passed from the ..C sublayer. CRC : This is the cyclic redundancy check field. It is also known as )rame Check #euence $)C#' field. It is the error detecting code similar to 2D.C and other data link protocols. The %"C sublayer discards the frames that are in error. Thus it detects errors, but does not correct. The ..C sub layer keeps track of which frames have been successfully received. It sends retransmission reuests for unsuccessful received. It sends retransmission reuests for unsuccessful frames or recovers those frames. Thus the combined Fob of data link layer for error detection and correction is done partially by %"C sublayer and partially by ..C sublayer. 1edia /$$ess Cont!ol in 3/# (henever any station wants to communicate on ."N, it needs transmission media. #ince many such stations are connected in ."N,E there are fi!ed defined methods for media access. The delay, throughput, e!pandibility of ."N is determined by topology as well as by media access control methods. The Token bus, C#%"6CD and Token ring are maFor media access control techniues. The media access control methods are classified broadly into two categories as follows > $i' Centrally controlled access and $ii' Distributed access control. In the first method, the access to the media is controlled by the central controller. *olling, )D% and TB% are the e!amples of centrally controlled access. The maFor drawback of this method is that the complete network fails if the central controller fails. In the distributed access control, there is no single controller. The various communicating stations manage themselves such that access is given to every station fairly. The advantage of distributed access control is that there is no single point of network failure. Even if some station fails, the network remains fairly operating. )or the bus topologies following two methods are mainly used for media access control> $i' Token bus, $IEEE 59,.0' and $ii' Carrier #ense %ultiple "ccess6Collision Detection $C#%"6CD' IEEE 59,3-. )or the ring topology, Token ring IEEE 59,37 is one of the main methods. "ll these methods are distributed access control methods. 4.9.1 To.en Bus : 5EEE 8;2.4 The IEEE 59,.0 standard for media access control is also called Token bus. *hysically the token bus is a linear or tree shaped cable on which the stations are connected. .ogically, the stations are organi/ed into a ring. )ig. 0.D.+ shows the physical connections and logical ring. )ig. $a' #hows the physical topology and )ig. $b' shows the logical seuence, which is ring. Each station knows the address of the stations to its left and right in the ring. (hen the logical ring is initiali/ed, the highest numbered station sends the first frame. Then it passes the permission to its immediate neighbour by sending a special control frame for that neighbour. This special control frame is called To5en. ) token 'u" 5a) ;$!"ical topolog! 5') .ogical "e=uence of token pa""ing 1edia a$$ess $ont!ol : The token bus operates as follows> $i' The station which holds token is allowed to transmit its data frames on the bus. Every frame carries source and destination addresses. $ii' The stations receive frames e!cept the station which holds a token. $iii' Bnce the transmission time of the station is over, it passes token to the ne!t immediate station in the logical seuence. $iv' In once cycle across the logical ring, every station gets an opportunity to transmit. If any station is given multiple addreses, then it gets multiple opportunities to transmit data. )!ame )o!mat : The frame format of IEEE 59,.0 is shown in )ig. 0.D.,. $e IEEE >0?.4 format The various fields of the frame are as follows > .remable > The premable is one byte $octet' pattern. It is used for bit synchroni/ation. Start Delimiter /SD0: It is one byte pattern used to mark the start of the frame. Frame )ontrol /F)0 > This is one byte long field. It is used to identif! data frames and control frames. Token is one of the control frames. $e ot$er control frames are claim token, set successor and solicit successor frame. Destination (ddress /D(0 > This is , or < bytes long. It contains destination address. Source (ddress /S(0: This is , or < bytes long and it contains source address. Frame )hec5 Se$uence /F)S ' > It is 0 bytes long. It+ contains the C?C code for error detection. This code is used to check D", #",)C and data fields.
<nd Dilimiter /<D0 > It is one byte long and mark" the end of the frame The ma!imum length 1Bf the frame from )C to )C# including. Data is 5+D+octets $bytes'. To.en 1ana*ement: The stations on the bus perform the, control and management N of the token, The stations use claim token frame, solicit successor frame, set successor1 frame and who follows frames to send the token from one to another. (%si$al Spe$i&i$ations : The token bus ."Ns operate at the data rates +,7 or +9 %bps using analog #ignaling over =7 ohms coa!ial cable. Two types of transmission systems are used > $+' Carrierband $single channel' and $,' &roadband $multiple channel'. The carrierband system is based on single channel bidirectional transmission. )or + %bps data rate it uses phase coherent )#@ modulation. The bus is implemented using fle!ible semi rigid co3a!ial cable. )or 7 or +9 %bps data rate the bus uses phase coherent )#@ #ignaling. In the broadband system multiple channel unidirectional transmission is possible. It uses amplitude and phase modulation combinely. It uses separate transmit and receive carriers.