Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Delivery: The system must deliver data to the correct destination. Data must be received by the
intended device or user and only by that device or user.
Accuracy: The system must deliver the data accurately. Data that have been altered intransmission
and left uncorrected are unusable.
Timeliness: The system must deliver data in a timely manner. Data delivered late are useless. Inthe
case of video and audio, timely delivery means delivering data as they are produced, in thesame
order that they are produced, and without significant delay. This kind of delivery is calledreal-time
transmission.
Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in thedelivery of
audio or video packets. For example, let us assume that video packets are sent every30 ms. If some
of the packets arrive with 30-ms delay and others with 40-ms delay, an unevenquality in the video
is the result.
Network Components:
A data communications system has five components.
Message: The message is the information (data) to be communicated. Popular forms ofinformation
include text, numbers, pictures, audio, and video.
Sender: The sender is the device that sends the data message. It can be a computer,workstation,
telephone handset, video camera, and so on.
Receiver: The receiver is the device that receives the message. It can be a computer,workstation,
telephone handset, television, and so on.
Transmission medium: The transmission medium is the physical path by which a messagetravels
from sender to receiver. Some examples of transmission media include twisted-pair wire,coaxial
cable, fiber-optic cable, and radio waves.
Protocol: A protocol is a set of rules that govern data communications. It represents anagreement
between the communicating devices. Without a protocol, two devices may beconnected but not
communicating, just as a person speaking French cannot be understood by aperson who speaks
only Japanese.
1
CN Unit 1
Fig:Components of Communication
Data Representation
Data refers to information that conveys some meaning based on some mutually agreed up rulesor
conventions between a sender and a receiver and today it comes in a variety of forms such astext,
graphics, audio, video and animation.
Text
In data communications, text is represented as a bit pattern, a sequence of bits (0s or 1s).Different
sets of bit patterns have been designed to represent text symbols. Each set is called acode, and the
process of representing symbols is called coding. Today, the prevalent codingsystem is called
Unicode, which uses 32 bits to represent a symbol or character used in anylanguage in the world.
Numbers
Numbers are also represented by bit patterns. However, a code such as ASCII is not used
torepresent numbers; the number is directly converted to a binary number to simplifymathematical
operations.
Images
Images are also represented by bit patterns. In its simplest form, an image is composed of amatrix
of pixels (picture elements), where each pixel is a small dot. The size of the pixeldepends on the
resolution. For example, an image can be divided into 1000 pixels or 10,000pixels. In the second
case, there is a better representation of the image (better resolution), butmore memory is needed to
store the image. After an image is divided into pixels, each pixel isassigned a bit pattern. The size
and the value of the pattern depend on the image. For an imagemade of only black and white dots
(e.g., a chessboard), a 1-bit pattern is enough to represent apixel. If an image is not made of pure
white and pure black pixels, you can increase the size ofthe bit pattern to include gray scale. For
example, to show four levels of gray scale, you can use2-bit patterns. A black pixel can be
represented by 00, a dark gray pixel by 01, a light gray pixelby 10, and a white pixel by 11. There
are several methods to represent color images. Onemethod is called RGB, so called because each
color is made of a combination of three primarycolors: red, green, and blue.
Audio
Audio refers to the recording or broadcasting of sound or music. Audio is by nature differentfrom
text, numbers, or images. It is continuous, not discrete. Even when we use a microphone tochange
voice or music to an electric signal, we create a continuous signal.
Video
Video refers to the recording or broadcasting of a picture or movie. Video can either be produced as
2
CN Unit 1
Data Flow
Communications between any two devices may be one of the three modes. The data flow is also
called modes of transmission.
oSimplex
oHalf – Duplex
oFull – Duplex
Simplex
In simplex mode, the communication is unidirectional. Only one of the two devices on a link
cantransmit; the other can only receive. Keyboards and traditional monitors are examples of
simplexdevices. The keyboard can only introduce input; the monitor can only accept output. The
simplexmode can use the entire capacity of the channel to send data in one direction.
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time. When
onedevice is sending, the other can only receive, and vice versa. The half-duplex mode is like a one-
laneroad with traffic allowed in both directions. When cars are traveling in one direction, carsgoing
the other way must wait. In a half-duplex transmission, the entire capacity of a channel istaken over
by whichever of the two devices is transmitting at the time. Walkie-talkies and CB(citizens band)
radios are both half-duplex systems. The half-duplex mode is used in caseswhere there is no need
for communication in both directions at the same time; the entire capacityof the channel can be
utilized for each direction.
Full-Duplex
In full-duplex mode also called duplex, both stations can transmit and receive simultaneously.The
full-duplex mode is like a two-way street with traffic flowing in both directions at the sametime. In
full-duplex mode, signals going in one direction share the capacity of the link: withsignals going in
the other direction. This sharing can occur in two ways: Either the link mustcontain two physically
separate transmission paths, one for sending and the other for receiving;or the capacity of the
3
CN Unit 1
channel is divided between signals traveling in both directions. Onecommon example of full-
duplex communication is the telephone network. When two people arecommunicating by a
telephone line, both can talk and listen at the same time. The full-duplexmode is used when
communication in both directions is required all the time. The capacity of thechannel, however,
must be divided between the two directions.
Network Applications
Computer systems and peripherals are connected to form a network. They provide
numerous advantages:
Resource sharing such as printers and storage devices
Exchange of information by means of e-Mails and FTP
Information sharing by using Web or Internet
Interaction with other users using dynamic web pages
IP phones
Video conferences
Parallel computing
Instant messaging
Networks
A network is a collection of nodes connected by communication links. A node can be acomputer,
printer, or any other device capable of sending and/or receiving data generated byother nodes on the
network. A communication link is a transmission medium between thesenodes.
Distributed processing
Most networks use distributed processing, in which a task is divided among multiple
computers.Instead of one single large machine being responsible for all aspects of process,
separatecomputers (usually a personal computer or workstation) handle a subset.
Network criteria
Most of the time, networks are used to transmit sensitive data. So, a network must be able tomeet a
certain number of criteria. The most important of these are performance, reliability, andsecurity.
Performance
Performance can be measured in many ways, including transit time and response time. Transittime
is the amount of time required for a message to travel from one device to another. Responsetime is
the elapsed time between an inquiry and a response. The performance of a networkdepends on a
number of factors, including the number of users, the type of transmissionmedium, the capabilities
of the connected hardware, and the efficiency of the software.Performance is often evaluated by
two networking metrics: throughput and delay. We often needmore throughput and less delay.
However, these two criteria are often contradictory. If we try tosend more data to the network, we
may increase throughput but we increase the delay because oftraffic congestion in the network.
4
CN Unit 1
Reliability
In addition to accuracy of delivery, network reliability is measured by the frequency of failure,the
time it takes a link to recover from a failure, and the network's robustness in a catastrophe.
Security
Network security issues include protecting data from unauthorized access, protecting data
fromdamage and development, and implementing policies and procedures for recovery from
breachesand data losses.
Physical Structures
Types of Connections
Physical Topology
Types of Connections
A network is two or more devices connected through links. A link is a communications pathwaythat
transfers data from one device to another. For visualization purposes, it is simplest toimagine any
link as a line drawn between two points. For communication to occur, two devicesmust be
connected in some way to the same link at the same time. There are two possible typesof
connections:
point-to-point
multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entirecapacity
of the link is reserved for transmission between those two devices.
Most point-to-point connections use an actual length of wire or cable to connect the twoends,
but other options, such as microwave or satellite links, are also possible.
Example: When you change television channels by infrared remote control, you areestablishing
a point-to-point connection between the remote control and the television'scontrol system.
Multipoint
Multipoint A multipoint (also called multidrop) connection is one in which more thantwo
specific devices share a single link.
In a multipoint environment, the capacity of the channel is shared, either spatially ortemporally.
If several devices can use the link simultaneously, it is a spatially shared connection. Ifusers
must take turns, it is a timeshared connection.
5
CN Unit 1
Physical Topology
Topology refers to the way in which the network of computers is connected.
Each topology is suited to specific tasks and has its own advantages and disadvantages.
The choice of topology is dependent upon type and number of equipment being used,planned
applications and rate of data transfer required, response time, and cost.
Topology can also be defined as the geometrically interconnection pattern by which thestations
(nodes/computers) are connected using suitable transmission media
Mesh Topology
In this topology each node or station is connected to every other station.
Two nodes are connected by dedicated point-point links between them. So the totalnumber of
links to connect n nodes = n(n-1)/2; which is proportional to n .
2
Media used for the connection (links) can be twisted pair, co-axial cable or optical fiber.
With this topology there is no need to provide any additional information that is fromwhere the
packet is coming, along with the packet because two nodes have a point-pointdedicated link
between them.
Advantages
6
CN Unit 1
A mesh offers several advantages over other network topologies. First, the use of dedicated
linksguarantees that each connection can carry its own data load. Second, a mesh topology is
robust.If one link becomes unusable, it does not incapacitate the entire system. Third, there is
theadvantage of privacy or security. When every message travels along a dedicated line, only
theintended recipient sees it. Finally, point-to-point links make fault identification and faultisolation
easy.
Disadvantages
The main disadvantages of a mesh are related to the amount of cabling and the number of I/Oports
required. Installations and reconnections are difficult. Wiring can be greater than theavailable space
(in walls, ceilings, or floors). Finally, the hardware required to connect each link(I/O ports and
cable) can be expensive.
Bus Topology
In Bus Topology, all stations attach through appropriate hardware interfacing known as atap,
directly to a linear transmission medium, or bus.
Full-duplex operation between the station and the tap allows data to be transmitted ontothe bus
and received from the bus.
A transmission from any station propagates the length of the medium in both directionsand can
be received by all other stations.
At each end of the bus there is a terminator, which absorbs any signal, preventingreflection of
signal from the endpoints. If the terminator is not present, the endpoint actslike a mirror and reflects
the signal back causing interference and other problems.
Advantages
Advantages of a bus topology include ease of installation. Backbone cable can be laid along
themost efficient path, then connected to the nodes by drop lines of various lengths. Only
thebackbone cable stretches through the entire facility. Each drop line has to reach only as far as
thenearest point on the backbone.
Disadvantages
Disadvantages include difficult reconnection and fault isolation. A bus is usually designed to
beoptimally efficient at installation. It can therefore be difficult to add new devices.
Signalreflection at the taps can cause degradation in quality. Adding new devices may
thereforerequire modification or replacement of the backbone.
Star Topology
7
CN Unit 1
In the star topology, each station is directly connected to a common central nodegenerally called
as HUB.
Typically, each station attaches to a central node, referred to as the star coupler, via twopoint-to-
point links, one for transmission and one for reception.
In general, there are two alternatives for the operation of the central node.
One approach is for the central node to operate in a broadcast fashion. A transmission ofa frame
from one station to the node is retransmitted on all of the outgoing links.
Another approach is for the central node to act as a frame-switching device. An incomingframe
is buffered in the node and then retransmitted on an outgoing link to thedestination station.
Advantages
A star topology is less expensive than a mesh topology. In a star, each device needs only onelink
and one I/O port to connect it to any number of others. This factor also makes it easy toinstall and
reconfigure. Other advantages include robustness. If one link fails, only that link isaffected. All
other links remain active. This factor also lends itself to easy fault identificationand fault isolation.
As long as the hub is working, it can be used to monitor link problems andbypass defective links.
Disadvantages
One big disadvantage of a star topology is the dependency of the whole topology on one
singlepoint, the hub. If the hub goes down, the whole system is dead. Although a star requires far
lesscable than a mesh, each node must be linked to a central hub. For this reason, often more
cablingis required in a star than in some other topologies.
Ring Topology
In the ring topology, the network consists of a set of repeaters joined by point-to-pointlinks in a
closed loop.
The repeater is a comparatively simple device, capable of receiving data on one link
andtransmitting them, bit by bit, on the other link as fast as they are received, with nobuffering at
the repeater.
The links are unidirectional; that is data are transmitted in one direction only and all areoriented
in the same way. Thus, data circulate around the ring in one direction (clockwiseor
counterclockwise).
Each station attaches to the network at a repeater and can transmit data onto the networkthrough
that repeater. As with the bus and tree, data are transmitted in frames.
8
CN Unit 1
Advantages
A ring is relatively easy to install and reconfigure. Each device is linked to only its
immediateneighbors (either physically or logically). To add or delete a device requires changing
only twoconnections. In addition, fault isolation is simplified. Generally in a ring, a signal is
circulatingat all times. If one device does not receive a signal within a specified period, it can issue
analarm. The alarm alerts the network operator to the problem and its location.
Disadvantages
However, unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (suchas a
disabled station) can disable the entire network. This weakness can be solved by using adual ring or
a switch capable of closing off the break.
Tree Topology
9
CN Unit 1
Unconstrained Topology
All the topologies discussed so far are symmetric and constrained by well-
definedinterconnection pattern. However, sometimes no definite pattern is followed and nodesare
interconnected in an arbitrary manner using point-to-point links as shown in
Figure.Unconstrained topology allows a lot of configuration flexibility but suffers from
thecomplex routing problem.
Complex routing involves unwanted overhead and delay.
Hybrid Topology
A network can be hybrid. For example, we can have a main star topology with each
branchconnecting several stations in a bus topology as shown in Figure.
10
CN Unit 1
Categories of Networks
Networks are divided into Local Area (LAN), Metropolitan Area Network (MAN) and WideArea
Networks (WAN) based on their size.
LANs are designed to allow resources to be shared between personal computers orworkstations.
The resources to be shared can include hardware (e.g., a printer), software(e.g., an application
program), or data.
11
CN Unit 1
A common example of a LAN, found in many business environments, links a workgroupof task-
related computers, for example, engineering workstations or accounting PCs. Oneof the computers
may be given a large capacity disk drive and may become a server toclients. Software can be stored
on this central server and used as needed by the wholegroup.
In this example, the size of the LAN may be determined by licensing restrictions on thenumber of
users per copy of software, or by restrictions on the number of users licensedto access the operating
system.
In addition to size, LANs are distinguished from other types of networks by theirtransmission
media and topology. In general, a given LAN will use only one type oftransmission medium. The
most common LAN topologies are bus, ring, and star.
Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range. Today,however,
speeds are normally 100 or 1000 Mbps.
Wireless LANs are the newest evolution in LAN technology.
It normally covers the area inside a town or a city. It is designed for customers who needa high-
speed connectivity, normally to the Internet, and have endpoints spread over a cityor part of city.
A good example of a MAN is the part of the telephone company network that canprovide a high-
speed DSL line to the customer.
Another example is the cable TV network that originally was designed for cable TV, buttoday can
also be used for high-speed data connection to the Internet.
13
CN Unit 1
Layered Tasks:
In layered architecture of Network Model, one whole network process is divided into small
tasks. Each small task is then assigned to a particular layer which works dedicatedly to process the
task only. Every layer does only specific work.
In layered communication system, one layer of a host deals with the task done by or to be done by
its peer layer at the same level on the remote host. The task is either initiated by layer at the lowest
level or at the top most level. If the task is initiated by the topmost layer, it is passed on to the layer
below it for further processing. The lower layer does the same thing, it processes the task and
passes on to lower layer. If the task is initiated by lowermost layer, then the reverse path is taken.
Every layer clubs together all procedures, protocols, and methods which it requires to execute its
piece of task. All layers identify their counterparts by means of encapsulation header and tail.
1.OSI Model:
Open System Interconnect is an open standard for all communication systems. OSI model is
established by International Standard Organization (ISO). This model has seven layers:
Application Layer: This layer is responsible for providing interface to the application user. This
layer encompasses protocols which directly interact with the user.
Presentation Layer: This layer defines how data in the native format of remote host should be
presented in the native format of host.
14
CN Unit 1
Session Layer: This layer maintains sessions between remote hosts. For example, once
user/password authentication is done, the remote host maintains this session for a while and does
not ask for authentication again in that time span.
Transport Layer: This layer is responsible for end-to-end delivery between hosts.
Network Layer: This layer is responsible for address assignment and uniquely addressing hosts in
a network.
Data Link Layer: This layer is responsible for reading and writing data from and onto the line.
Link errors are detected at this layer.
Physical Layer: This layer defines the hardware, cabling, wiring, power output, pulse rate etc.
2.Internet Model:
Internet uses TCP/IP protocol suite, also known as Internet suite. This defines Internet
Model which contains four layered architecture. OSI Model is general communication model but
Internet Model is what the internet uses for all its communication. The internet is independent of its
underlying network architecture so is its Model. This model has the following layers:
Application Layer: This layer defines the protocol which enables user to interact with the
network. For example, FTP, HTTP etc.
Transport Layer: This layer defines how data should flow between hosts. Major protocol at this
layer is Transmission Control Protocol (TCP). This layer ensures data delivered between hosts is in-
order and is responsible for end-to-end delivery.
Internet Layer: Internet Protocol (IP) works on this layer. This layer facilitates host addressing
and recognition. This layer defines routing.
Link Layer: This layer provides mechanism of sending and receiving actual data. Unlike its OSI
Model counterpart, this layer is independent of underlying network architecture and hardware.
15