data communication & networks

128
CS22 DATA COMMUNICATIONS AND NETWORKS UNIT I: Introduction: A brief History Applications Computer networks Categories of networks Standards and Standards Organizations Network architecture Open Systems and OSI models- TCP/IP Architecture. Communication Media and Data Transmission: Fourier Analysis-Analog and digital Data Transmission-Modulation and Demodulation- Transmission Media-Wireless Communication-Data Transmission Basics-Transmission mode- Interfacing-Multiplexing. Data Link Control and Protocol Concepts: Flow Control-error control-Asynchronous Protocols-High Level Data Link Control (HDLC) UNIT II: Local Area Networks: Types of Networks and Topology-LAN Transmission Equipment-LAN Installation and Performance-Ethernet: IEEE Standard802.3-Token Bus: IEEE Standard 802.2-Token Ring: IEEE Standard 802.5-Fiber Distributed Data Interface (FDDI)- Distributed Queue Dual Bus (DQDB)-: IEEE Standard 802.6-LAN Operating Systems and Protocols-Ethernet Technologies. Wide Area Network: WAN Transmission Methods-WAN Carrier Types-WAN Transmission Equipments-WAN Design and Multicast Considerations-WAN Protocols. UNIT III: Integrated Services and Routing Protocols: Integrating Services-ISDN Services-ISDN Topology-ISDN Protocols-Broadband ISDN-Asynchronous Transfer Mode (ATM)-Principal characteristics of ATM-Frame Relay-Comparison of ISDN, ATM and Frame Relay. Wireless LANs: WLAN Applications-Wireless LAN Requirements-Planning for Wireless LANs-Wireless LAN Architecture-IEEE 802.11 Protocol Layer-IEEE 802.11 Physical layer- Designing the Wireless LAN Layout-WAP Services. UNIT IV: Internetworking: Principles of Internetworking-Routing Principles-Internet work Protocols (IP)-Shortcut of IPv4-IP Next Generation. TCP Reliable Transport Services: Transport protocols-The Services TCP provides to Applications- End-to-End Services and Datagram-Transmission Control Protocol-User Datagram Protocol

Upload: ramakrishna-vadlamudi

Post on 19-Oct-2015

664 views

Category:

Documents


156 download

TRANSCRIPT

  • CS22 DATA COMMUNICATIONS AND NETWORKS

    UNIT I:

    Introduction: A brief History Applications Computer networks Categories of networks

    Standards and Standards Organizations Network architecture Open Systems and OSI models-

    TCP/IP Architecture.

    Communication Media and Data Transmission:

    Fourier Analysis-Analog and digital Data Transmission-Modulation and Demodulation-

    Transmission Media-Wireless Communication-Data Transmission Basics-Transmission mode-

    Interfacing-Multiplexing.

    Data Link Control and Protocol Concepts: Flow Control-error control-Asynchronous Protocols-High

    Level Data Link Control (HDLC)

    UNIT II:

    Local Area Networks: Types of Networks and Topology-LAN Transmission

    Equipment-LAN Installation and Performance-Ethernet: IEEE Standard802.3-Token Bus: IEEE

    Standard 802.2-Token Ring: IEEE Standard 802.5-Fiber Distributed Data Interface (FDDI)-

    Distributed Queue Dual Bus (DQDB)-: IEEE Standard 802.6-LAN Operating Systems and

    Protocols-Ethernet Technologies.

    Wide Area Network: WAN Transmission Methods-WAN Carrier Types-WAN Transmission

    Equipments-WAN Design and Multicast Considerations-WAN Protocols.

    UNIT III:

    Integrated Services and Routing Protocols: Integrating Services-ISDN Services-ISDN

    Topology-ISDN Protocols-Broadband ISDN-Asynchronous Transfer Mode (ATM)-Principal

    characteristics of ATM-Frame Relay-Comparison of ISDN, ATM and Frame Relay.

    Wireless LANs:

    WLAN Applications-Wireless LAN Requirements-Planning for Wireless

    LANs-Wireless LAN Architecture-IEEE 802.11 Protocol Layer-IEEE 802.11 Physical layer-

    Designing the Wireless LAN Layout-WAP Services.

    UNIT IV:

    Internetworking: Principles of Internetworking-Routing Principles-Internet work

    Protocols (IP)-Shortcut of IPv4-IP Next Generation.

    TCP Reliable Transport Services: Transport protocols-The Services TCP provides to Applications-

    End-to-End Services and Datagram-Transmission Control Protocol-User Datagram Protocol

  • UNIT V:

    Network Applications: Client Server Model-Domain Name System (DNS)-Telnet-

    File Transfer and remove file access-Electronic Mail-World Wide Web (WWW).

    Network Management: Goal of Network management-Network Management

    Standards-Network Management Model-Infrastructure for Network Management-Simple Network

    Management Protocol (SNMP).

    Text Book:

    Data Communication and Computer Networks Second Edition Brijendra Singh PHI,

    2006.

    Reference:

    1. Computer Networks, Andrew S.Tanenbaum, 4th Edition.

    2. Data Communication and computer Networks-Prakash C.Gupta, Prentice Hall of

    India.

    3. Data and computer communications, William Stallings, PHI, 2007

    4. Data Communication and Networking Behrouz A, Forouzan, TMH, 2005

    5. Data Communications and Computer Networks, Brijendra Singh, PHI, 2006

    6. Data Communications and Networks-Achyut .S.Godbole, Tata McGraw Hill,

    2005

  • INTRODUCTION

    Data communication is the exchange of data between two devices some

    form of transmission medium (such as wire cable). Communicating devices must be

    part of a communication system made up of a combination of hardware and software.

    The effectiveness of data communication system depends on the three characteristics:

    delivery, accuracy, and timeliness.

    There are five components in data communication systems as shown in

    figure 1.1.

    1. Message : Message is the information (data message).

    2. Sender : Device which sends the data message. 3. Receiver : Device which receives the data message. 4. Medium : Physical path by which a message travels from the sender to the

    receiver.

    5. Protocol : Set of rules that govern data communication.

    A BRIEF HISTORY The fields of communications are certainly not new: people have been

    communication. Since the early days when humans grunted and scratched pictures

    on cave walls, which are form of communication based on the auditory and visual

    senses, where you either hear some one speaking or see letters and symbols that

    and symbols that define a message.

    Communications changed drastically in 1837, after the invention of the

    telegraph by Samuel mores. Telegraph invention made possible to send information

    using electrical impulses over a copper wire.

    In 1937, Howard A. Alien of Harvard University began work in the design

    of a fully automatic calculating machine using the concepts of Babbage and those

    used in punch cards in collaboration with the IBM. Seven years later in January

    1994. The design became a reality and was named MARKI.

    Another event important to communications occurred in 1945 with the

    invention of the first electronic computer. ENIAC (electronic numerical integrator

    and calculator). It contains vacuum tubes, registers, capacitors and switches and

    was faster than MARK I.

    The relation between computers and communications began to emerge after

    the invention of transistor of 1947 allowing smaller and cheaper computers to be

  • built. The new generation of computer that emerged during the 1960s made new

    applications such as processing and routing telephone calls economically feasible.

    Another mile stone in computer-networking occurred with the development

    of ARPANET. It was developed by the US department of defense.

    The 1970s and 1980s saw the merger of the fields of computer sciences and

    data communications that profoundly changed the technology, products and

    companies of the now companied-communication industries.

    The 1990s saw the emergence of the world wide web, an application that

    makes information from around the world easily accessible from ones desk.

    Computers and communication have progressed to the point where most

    businesses or schools can no longer function without them.

    APPLICATIONS

    Transferring data between computers is just one area of communications. Data

    communication networks have become an indispensable part of business, industry

    and entertainment. Some of the network application in different fields are the

    following

    Electronic Messaging

    Probably the most widely used network application is electronic mail (e-mail).

    With e-mail). With e-mail, it is possible to send a message to remote locations from

    the privacy of your own home.

    Facsimile Machine (Fax)

    A fax machine creates an electronic equivalent of an image on a sheet of paper

    and then sends the image over Telephone lines. A fax machine at the other and

    creates the original papers image.

    Teleconferencing

    Teleconferencing allows conference to occur without the participants being in

    the same place. Teleconferencing includes.

    *Text conferencing, where participants communicate through their keyboards and

    computer monitors.

    *Voice conferencing, where participants at a number of locations communicate

    simultaneously over the phone.

  • *Video conferencing, where participants can see as well as talk to one another.

    Cellular Telephone

    Hitherto, two parties wishing to use the services of a telephone company had to

    be linked by a fixed physical connection.

    Information services

    Information services include bulletin boards and banks. Bulletin boards allow

    the free exchange of some software, files or other information.

    Financial Services

    Financial services include credit history searches, foreign exchanges and

    investment services, and electronic fund transfer.

    Marketing and sales

    Computer networks are used extensively in both marketing and sales

    organization.

    COMPUTER NETWORKS

    A network is a set of devices connected by media links. A node can be a

    computer printer, or any other capable of sending and receiving data generated by

    other nodes on the network. The links connecting the devices are called

    communication channels.

    A computer network may be defined as an interconnected collection of

    autonomous computer.

    Topology is the layout of the collection formed between computer. To some

    extent, the reliability and efficiency of a network is determined by its structure.

    Bus Topology

    All computers attached to the cable can sense an electrical signal any computer

    can send data to any other computer.

    Advantages:

    Connecting a computer or peripheral to a linear bus is easy.

  • This topology requires least amount of cabling to connect the computers and

    therefore, less expensive than other cabling arrangements.

    It is easy to extend a bus since two cables can be joined into one longer cable

    with a connector.

    Disadvantage:

    Entire network shuts down if there is a failure in the backbone.

    Heavy traffic can slow down a bus because computers on such networks do

    not coordinate with each other to reserve time to transmit.

    Star Topology

    The star topology is the oldest communications design method, with roots in

    telephone switching systems. However, the advance in network technology have made

    the star technology a good option for modern networks.

    A hub is a central device that joins single cable segments or individual LANs

    into one network.

    A typical hub consists of an electronic device that accepts data from sending

    computer and delivers it to the appropriate destination.

    Advantage:

    Star topology is easy to install and wire.

    The network is not disrupted even if a node fails or is removed from the

    network.

    Fault detection and removal of faulty parts easier in star topology.

    Disadvantage:

    It requires a longer length of cable.

    If the hub fails, node attached to it or disabled.

    The cost of the hubs makes the network expensive as compared to bus and

    ring topology.

  • Ring Topology

    The ring topology is a continuous path for data with no logical beginning or

    ending points and thus no terminators. Workstations and file servers are attached to

    the cable at points round the rings.

    The ring topology is easier to manage than the bus because the equipment used

    to build the ring makes it easier to locate a defective node or cable problem.

    Advantages:

    Ring topology is easy to install and reconfigure.

    Every computer is given equal access to the ring, hence no single computer

    can monopolise the networks.

    Disadvantages:

    Failure in any cable or node breaks the loop and take down the entire

    network.

    Maximum ring length and number of nodes are limited.

    Tree Topology

    A tree topology is a variation of star. As in star, nodes in a tree are linked to a

    central hub that controls the traffic to the network. However, not every device plugs

    directly into the central hub.

    Advantages:

    The distance to which a signal can travel increases as the signal passes

    through a chain of hubs.

    Tree topology allows isolating and prioritizing communications from

    different nodes.

    Disadvantages:

    If the backbone line breaks, the entire segment goes down.

    It is more difficult to configure wire than other topologies.

  • Mesh Topology

    The mesh topology has a direct connection between every pair of devices in the

    network. This is extreme design. Communications becomes very simple because there

    is no common line.

    Advantages:

    The use of large number of links eliminates network congestion.

    If one link becomes unusable, it does not disable the entire system.

    Disadvantages:

    The amount of required cabling is very large.

    The amount of hardware required in this type of topology can make it

    expensive to implement.

    Combined Topologies

    Many computer networks use combinations of the various topologies. It has a

    common bus , sometimes called the backbones, which allows user to access main

    frames and high volume or frequency accessed storage.

    Categories of Networks

    There are two types of networks based on transmission technology

    1. Broadcast networks

    2. Point to point networks

    Broadcast network have a single communication channel that is shared by all

    the machines on the networks. Short messages- called packets. When a packet with

    this code is transmitted, it is received and processed by every machine on the

    network. This mode of operation is called broadcasting.

    Point to point network consist of many connections between individual pairs of

    machines.

  • Local Area Network (LAN)

    LANs are used to interconnect distributed communities of computer based data

    terminal equipment located within a single building or localized group of building.

    LAN interconnect work station distributed around offices within a single building such

    as university campus, factory or hospital campus.

    Metropolitan Area Network (MAN)

    MAN is basically a bigger version of a LAN and normally uses similar

    technology. MAN is designed to extend over an entire city.

    Wide Area Network (WAN)

    A WAN is at the far end of the spectrum because it is for reaching system of

    networks that form a complex whole. One WAN is composed of two or more LANs

    that are connected across a distance of more than 30 miles.

    Multimedia Network

    The term multimedia is used to indicate that the information/data being

    transferred over the network may be composed of one or more of the following media

    types:

    Text

    Images

    Audio

    Video

    There are 5 basic types of communication network that are used to provide multimedia

    communication services:

    1. Telephone networks

    2. Data networks

    3. Broadcast television networks

    4. Integrated services digital networks

  • 5. Broadband multi service networks

    STANDARDS AND STANDARD ORGANISATIONS

    The Need for Standards

    The standards used in the computer industry by the various international bodies

    were concerned primarily with either the internal operation of a computer or the

    connection of a local peripheral devices.

    Several national and international agencies play a strong roll in establishing

    network standards that ensure a common ground for communications and network

    equipments. Key among these agencies are:

    American National Standard Institute (ANSI)

    International Electro Technical Commission (IEC)

    International Telecommunication Unions (ITU)

    Institute Of Electrical And Electronics Engineers (IEEE)

    International organization For Standardization (ISO)

    Internet society and the associated Internet Engineering Task Force (IETF)

    Electronic Industries Alliance (EIA) and the associated Telecommunications

    Industry Association (TIA)

    American National Standard Institute (ANSI)

    ANSI is a private non-government agency where members are manufactures

    users and other interested companies.

    International Electro-Technical Commission (IEC)

    IEC is a non governmental agency devising standards for data processing and

    inter connections and safety in office equipment.

    International Telecommunications Union (ITU)

    ITU is an agency of the United Nations and has three sectors:

    1. ITU-R deals with radio communication.

    2. ITU-D is a development sector.

  • 3. ITU-T deals with telecommunication.

    Institute of Electrical and Electronics Engineering (IEEE)

    The IEEE is the largest professional organization in the world and consists of

    computing and engineering professionals.

    International Organizations for Standardizing (ISO)

    The International Organization is a non-governmental organization based in

    Geneva, Switzerland, in which over 100 countries participate.

    Internet society and the associated Internet Engineering Task Force (IETF)

    IETF focuses on technical internet issues. Important contributions include the

    development of simple network Management Protocol (SNMP).

    Electronic Industries Alliance (EIA) and the associated Telecommunications

    Industry Association (TIA)

    TIA was created as a separate body within a EIA to develop

    telecommunications and cabling standards.

    NETWORK ARCHITECTURE

    Network designers have developed general blue-print-usually called a network

    architecture that guides the design and implementation of network.

    Designing a network to meet these requirements is no small tasks.

    The essential elements of network architecture are:

    Digital transmission lines for the transfer of streams of binary information

    between equipment.

    Exchange of frames of information between adjacent equipment ; those

    frames contain delineation information as well as check bits for error control.

    Address to identify points of attachment to a network or a inter network.

    Exchange of packets of information between packet switches in a network.

    Congestion control mechanism may be used to prevent congestion inside the

    network.

  • Inter networking provides connectivity across multiple, possibly dissimilar,

    networks by using gateways or routers.

    A multiplicity of applications that built on the transfer of messages between

    computers.

    OPEN SYSTEMS AND OSI MODEL

    A set of protocols that would allow any two different systems to communicate

    regardless of their underlying architecture is called an open system.

    Layers of OSI Model

    The OSI Model consists of the following layers:

    1. Application layer

    2. Presentation layer

    3. Session layer

    4. Transport layer

    5. Network layer

    6. Data link layer

    7. Physical layer

    Application layer protocols have been developed for file transfer e-mail, network

    management and other applications.

    The presentation layer is responsible for presenting data in the format the user

    can understand.

    The session layer allows application on two different computers to establish a

    session or logical connections.

    The transport layer is responsible to ensure that data is sent reliable from the

    sending node to the destination node.

    The network layer deals with routing strategies, which are responsible for

    delivery of a packet from source to destination.

    The data link layer provides for the transfer of frames across a transmission link

    that directly connects two nodes.

  • The physical layer deals with the transfer of bits over a communication channel,

    for example, copper wire pairs, coaxial cable, radio or optical fiber.

    TCP/IP ARCHITECTURE

    When the OSI model was developed in 1978, many felt that it would replace

    proprietary, vendor-specific architecture such as IBMs system network architecture,

    which was in wide spread use in the late 1970s and 1980s.

    In 1970s US Department of Defence wanted to interconnect computer and

    networks it had acquired from the different vendors.

    The government Advanced Research Project Agency (ARPA) developed a set

    of protocols called the TCP/IP to enable the interconnection.

    TCP/IP is also the protocol of choice for most medium and large sized

    networks. It is one of the oldest protocols and is a proven technology that is used by

    millions of computer users around the globe.

    The TCP/IP protocol suite is made of 5 layers:

    Application layer

    Transport layer

    Internet layer

    Network access layer

    Physical layer

    The first four layers provide physical standards, network interface, internet working,

    and transport functions that corresponds to the first 4 layers of the OSI model.

    A number of applications have been standardized to operate on top of TCP/IP.

    There of the most common here.

    Simple Mail Transfer Protocol (SMTP)

    Simple Mail Transfer Protocol (SMTP) provides a basic electronic mail facility.

    It provides a mechanism for transferring messages among separate hosts. Features of

    SMTP include mailing lists, return receipts and forwarding.

  • File Transfer Protocol (FTP)

    FTP is used to send files from one system to another under user command. Both

    text and binary files are accommodated, and the protocol provides features for

    controlling user access.

    The file is transferred over the data connection, without the overhead of any

    headers of control information at the application level.

    TELNET (Terminal Network)

    The main task of the internet and its TCP/IP protocol suite is to provide services

    for users.

    TELNET is an abbreviation of TErminaL NETwork. Client-server application

    program is called TELNET.

  • Communication Media and Data Transmission

    Fourier Analysis:-

    A Famous Mathematician, JeanBaptiste Fourier developed a theory

    that any periodic function can be expressed as an Infinite series of sums of sine and

    cosine function of varying amplitude, frequency and phase shift this series is called

    Fourier series.

    F(t)=1/2C + an sin(2nft)+ an cos(2nft)

    F=1/T is called fundamental frequency.

    The number of times a signal oscillates per unit time is called its frequency

    It measurements are cycle per second or equivalently ,Hrtz(HZ).

    T

    sin (2kft) sin (2nft) dt{0 for k=n}

    0 { T/2 for kn}

    Only one term at summation survives an the bn summation vanishes completely

    C=2/T F(t)dt.

  • Bandwidth limited signals:-

    The transmission of the ASCII character b is encoded in an 8 bit byte.

    Transmitted is 01100010.

    The Maximum Data rate of a channel:-

    The maximum data rate =2hLog2 v bits/sec

    Maximum number of bits/sec=hLog2h s/n)

    Analog And digital Data Transmission:-

    An example of analog data is the human voice.

    Some one speaks; an analog wave is created in the air.

    An example on digital data is data stored in the computer in the form of 0

    and 1.

    Analog Signals:-

    Analog signals can be classified simple or composite.

    A composite analog signal is composed of multiple sine wave.

    S (t) =A sin (2ft+)

    S->Instaneous amplitude

    A->peak amplitude

    f->frequency

    ->phase

    Frequency refers to the number at periods in one second

  • Frequency is the inverse of periods f=1/T.

    Unit Equivalent

    Second(s) 1s

    Millisecond(ms) 10power-3s

    Microsecond(s) 10power-6s

    Nanosecond(ns) 10power-9s

    Picosecond(ps) 10power-12s

    Unit Equivalent

    Hertz(HZ) 1HZ

    kilo Hertz (KHZ) 10power3HZ

    mega Hertz(MHZ) 10power6HZ

    giga Hertz(GHZ) 10power9HZ

    Tera Hertz(THZ) 10power12HZ

    The position of the waveform relative to time zero.

    The phase is measured in degrees or radians.

    The phase shift of 360 degree corresponds to a shift of completed period.

    180 degree corresponds to a shift one half of the period.

    90 degree corresponds to a shift quarter of the period.

  • Digital Signals:-

    Data can be represented by a digital signal.

    1can be encoded as a positive voltage

    0can be encoded as a negative voltage

    Analog transmission can use a Band pass channel.

    Modulation and Demodulation:-

    Computer are Digital devices,computer communication such as

    terminal to computer or computer to disk transmission use digital signals.

    Modulation means Digital signal into analog signal.

    Example:

    PC and a telephone,PC and a digital signal via its modem port Modem convert digital

    signal to analog signal .

    Telephone lines carry frequencies between 300 and 3300 HZ.its used for voice

    transmission.

    Digital to Analog Conversion:-

    1.frequency modulation

    2.amplitude modulation

    3. phase modulation

    Frequency modulation:-

    Its also called the frequency shift keying it assign the frequency range 0 and 1

  • Amplitude modulation:-

    Its also called the amplitude shift keying it similar to frequency

    shift keying. it assign the range 0 and 1.

    Phase modulation:-

    Its also called the phase shift keying it similar to frequency shift keying. it assign the

    range 0 and 1.

    Analog to Digital conversion:-

    Reverse of modulation method. Incoming signals are frequency amplitude

    phase shifting.

    Transmission Media:-

    It can classified as guided or unguided .

    Guided media provide physical path for example twisted pair coaxial

    cable, optical fibers.

    Unguided media employee an antenna for transmitting air, vacuum or

    water

    Twisted Pair:-

    The Twisted pair is a Telephone System, telephones are connected to the

    telephone company office by a twisted pair

    Twisted pair can run several kilometers and repeater are needed.

    The wires are connected in helical form.

    Its used for either analog to digital transmission

  • Electronic Industries association has developed the standards for twisted pair

    cables. It comes in several types.

    1) category 3 twisted pair

    1) category 5 twisted pair

    Base band Coaxial Cable:-

    It carry signals of higher frequency .it consistence of shift copper wire.

    It have outer conductor of metal foil, braid.

    It contains the high bandwidth and excellent noise immunity.

    Two kinds of cables 50 ohm(digital) 75 ohm (analog)

    Base band Coaxial cable:-

    It comes from telephone world. 4 KHZ used in transmission. It used analog

    transmission. It is also called the brand band.

    Base band differ from broad band it need analog amplifiers to strengthen.

    Two types of broadband system.

    Optical Fiber:-

    Optical fiber uses light, not electricity, to transmit information.

    An optical fiber cable has a cylindrical shape and consists of three sections.

    1) The core

    2) The Cladding

    3) The jacket

    Core is the innermost section and consists of fiber mode of glass or plastic.

    Core has a diameter in the range 8 to 100 m

  • The jacket is composed at plastic and other material layered to protect against

    moisture

    Single mode fiber

    Multi mode fiber

    Single mode fiber is manufacture in much smaller diameter than that of multi mode

    fiber and with substantially lower density.

    Optical transmission system has three components

    1)Light source

    2)Transmission media

    3) Detector

    Wireless Communication:-

    Wireless communication transport electromagnetic waves without using

    physical conductor.

    They are several wireless media available for transmitting network package.

    1)Radio waves.

    2) Infrared signals.

    3) Micro waves

    Radio Waves:-

    Radio network transmission, signal is transmitted one or multiple direction,

    depending on the type of antenna

    Electromagnetic waves having frequency between 3KH Z 1GHZ are called

    radio waves.

  • Advantages:-

    Inexpensive, option for portable communication.

    Disadvantages:-

    Not feasible, when higher speed communication are need.

    Microwaves:-

    Electromagnetic waves having frequency is between 1 and 300 GHZ are called

    microwaves.

    It is used to link two are more ground based microwave transmitted or receiver

    know as earth station or ground station.

    It handles two links uplink and downlink. uplink is used to receives

    transmission on one frequency band .

    Down link is used to transmit it on another frequency band.

    Single orbiting satellite operate on a number frequency called transponders

    channels.

    Infrared :-

    Can also be used as a media for network communication.

    This communication used in remote control device using in television and

    stereo.

    Does not penetrate walls.

    Infrared transmission may not be feasible when high speed communication is

    needed.

  • Data Transmission Basics:-

    Data into a computer via a keyboard.

    Each selected key elements an alphabetic or numeric

    The two most widely used codes that have been adopted for this function are

    the Extended Binary Coded Decimal Interchange Code(EBCDIC).

    The ASCII American Standards Committee for Information Interchange.

    EBCDIC is an 8 bit code .manufactured by IBM.

    ASCII is an 7 bit code manufactured by ITUT.

    Transmission Mode:-

    They are three types of transmission mode.

    1) Simplex

    2) Half duplex

    3) Full duplex

    Simplex mode the communication is unidirectional as one way street.

    Only one transmit and receiver.

    Half duplex mode communication both transmit and receivers.

    Full duplex mode communication both transmit and receivers simultaneously.

    There are two categories of transmission:-

    1) parallel transmission.

    2) serial transmission

  • parallel transmission:-

    binary data consisting on 1 and 0 may be organized into group of n bits each.

    Parallel transmission means that a group of bits is transmitted simultaneously by

    using separate line.

    Parallel transmission are commonly used when the distance between the two

    devices are short.

    Example communication between computer and peripheral devices.

    Serial transmission:-

    It means that a group of bits is transmitted one by one using one line for all bits.

    There are two types of serial communication:

    1.asynchronous transmission.

    2. synchronous transmission.

    Asynchronous transmission means that bits are divided into small groups.

    Interfacing :-

    Data terminal equipments do not connect to a network directly. The DTE, DCE

    interface has 4 important categories :

    1.mechanical

    2.electronical

    3.functional

    4.procedural

  • The mechanical characteristics pertain to the actual physical connection of the DTE

    and DCE.

    DTE and DCE are connected by pin conductors . Functions can be classified into

    the broad categories of data control timing and electrical ground.

    Procedural specify the sequence of events for transmitting data based on the

    functional .

    The difference between x.21 and the RS standers is that x.21 was defined as the

    digital signaling interface.

    x.21 is useful both as an interface to connect digital computer to analog devices

    Such as ISDN.

    MULTIPLIXING:-

    Multiplexing is the techniques by which simultaneously transmission of multiple

    signals through data link is possible.

    Multiplexing techniques are:-

    1) Frequency division multiplexing.

    2) Time division multiplexing.

    Frequency division multiplexing:-

    It used with analog signals. Perhaps its most common use is in television and

    radio transmission.

    It accept signals from multiple sources.

    It has a specified bandwidth, the signals are combined into another, more

    complex signal with large bandwidth.

    MUX extracts and separates the individual components its carries frequencies .

  • Time division multiplexing:-

    It has many input signals are combined and transmitted to another its used with

    digital signals. Multiple transmission can occupy a single linked for specific time .

    Each source are transmission is authorized .

    Two basic forms are TDM are synchronous TDM and asynchronous TDM.

    synchronous TDM :-

    The multiplexer allocates the exactly the same timeslot to each transmission

    devices at all times.

    Time slots are grouped into frames. A frame consists of one complete cycle of

    time slots.

    Asynchronous TDM :-

    Asynchronous TDM are also called statistical time division multiplexing it

    avoid this type of waste .

    The number of times slot is an Asynchronous TDM frame

    To transmit any given point. Each slot is available to any of the attached input

    lines that has data to send.

    DATALINK CONTROL AND PROTOCOL CONCEPTS

    Protocol is a set of rules that governs the operation of functional units to

    achieve communication. The type of protocol used to establish a link between two

  • stations in accordance with the second layer of OSI model is known as data link

    protocol.

    Data link protocol can be divided into two small subgroups: asynchronous

    and synchronous protocols.

    Asynchronous protocols treat each character in a bit stream independently.

    Synchronous protocols take the whole bit stream and chop it into characters of equal

    size.

    FLOW CONTROL:

    Flow control is the technique which implies on the data link layer that tells

    the sender how much data it can transmit before it must wait for an acknowledgement

    from the receiver. Any receiving device has a limited amount of memory in which to

    store incoming data. So, the sending station must not send frames at a rate faster then

    the receiving station can absorb them.

    Two techniques are developed to control the flow of data across

    communication links: stop-and-wait flow control and sliding window flow control.

    STOP-AND-WAIT FLOW CONTROL:

    The sender waits for an acknowledgement from the receiver after every

    frame, which it transmitted by the source. It indicates the willingness of the receiver to

    accept another frame by sending back an acknowledgement to the sender. The source

    must wait until it receives the acknowledgement before sending the next frame. The

    destination can thus stop the flow of data simply by withholding acknowledgement.

    ADVANTAGES:

    Simplicity.

    DISADVANTAGE:

    Inefficiency.

  • SLIDING WINDOW FLOW CONTROL:

    In the previous case, only one frame at a time can be in transmitting and the

    sender waits for an acknowledgement from the receiver after every frame. In sliding

    window, multiple frames can be transmitted at a time.

    Suppose two stations A and B are connected via a full-duplex link. Station B

    allocates buffer space for F frames. Thus station B can accept F frames, and station A

    is allowed to send F frames without waiting for any acknowledgement. To keep track

    of which frames can be acknowledged, each is labeled with a sequence number of the

    next frame expected.

    This acknowledgement also implicitly announces that station B is prepared

    to receive the next frame, beginning with the number specified. The frames are

    numbered modulo-n, which means they are numbered from 0 to n-1.For example, if

    n=8,the frames are numbered 0,1,2,3,4,5,6,7.

    They have sender sliding window and receiver sliding window. The

    sliding window of the sender expands to the right when acknowledgements are

    received. .The sliding window of the receiver expands to the left when

    acknowledgements are received.

    ERROR CONTROL:

    Error control in the data link layers is based on automatic repeat

    request(ARQ)which means retransmission of data in three cases:

    1. Damaged frame

    2. Lost frame

    3. Lost acknowledgement

  • DAMAGED FRAME:

    A recognizable frame does arrive, but some of the bits are in error.

    LOST FRAME:

    A frame fails to arrive at the other side. for example, a noise burst may

    damage a frame to the extent that the receiver is not aware that frame has been

    transmitted.

    LOST ACKNOWLEDGEMENT:

    An acknowledgement fails to arrive at the source. The sender is not

    aware that acknowledgement has been transmitted from the receiver.

    The purpose of ARQ is to turn an unreliable data link into a reliable one.

    Three versions of ARQ have been standardized.

    1. stop-and-wait ARQ

    2. Go-back-N ARQ

    3. selective-reject ARQ

    STOP-AND-WAIT ARQ:

    Stop-and-wait ARQis based on the stop-and-wait flow control technique. The

    sender transmits a single frame and then must await an acknowledgement. No other

    data frames can be sent until the receivers reply arrives at the source station.

    The sender sends a single frame to the receiver. There is a chance that a

    frame that arrives at the destination is damaged. The receiver detects this by using the

    error detection technique. To avoid such type of error, the source station is equipped

    with a timer. The sender waits for an acknowledgement for a specified timing after

  • transmitting the frame. If no acknowledgement is received by the time that the timer

    expires, then the same frame is transmitted again.

    GO-BACK-N ARQ:

    The station A is sending frames to station B. After each

    transmission, station A sets an acknowledgement timer for the frame just transmitted.

    Suppose that station B has previously successfully received frame

    (i-1) and A just frame i.e. We will illustrate go-back-n technique based on damaged

    frame, lost frame and lost acknowledgement.

    SELECTIVE-REJECT ARQ:

    In selective-reject ARQ, only the specific damaged or lost frame is

    retransmitted. If a frame is corrupted in transit, a NACK is returned and the frame is

    retransmitted out of sequence. The receiving device must be able to send the frames it

    has and insert the retransmitted frame into its proper place in its sequence. We will

    illustrate selective-reject ARQ based on damaged frame, lost frame and lost

    acknowledgement.

    ASYNCHRONOUS PROTOCOLS:

    Asynchronous protocols-used primarily in modems-feature start and

    stop bits and variable-length gaps between characters. A variety of Asynchronous

    protocols have been developed. That is

    1. X-modem

    2. Y-modem

    3. Z-modem

    4. Blocked Asynchronous transmission (BLAST)

  • X-MODEM:

    File transfer communication for telephone line communication between

    PCs, designed by Ward Christiansen in 1979, is known as X-modem. It is a half

    duplex stop-and-wait ARQ protocol. In this protocol, transmission begins with the

    sending of a NACK frame from the receiver to the sender. each time the sender sends

    a frame, it must wait for an acknowledgement before the next frame can be sent. A

    frame can be resend either if response is not received by the sender after a specified

    period of time or if NACK is received by the sender.

    Y-MODEM:

    Y-modem is a protocol similar to X-modem, with the following major

    differences:

    1. The data unit is 1024 bytes.

    2. ITU-T CRC-16 is used for error checking

    3. Multiple files can be sent simultaneously.

    Z-MODEM:

    Z-modem is a protocol which combines features of both X-modem and Y-

    modem.

    BLAST:

    BLAST is more powerful than X-modem. It is full duplex with sliding window

    flow control. It allows the transfer of data and binary files.

    SYNCHRONOUS PROTOCOLS:

    Synchronous protocols can be divided into two classes. That is

  • 1. Character oriented protocols

    2. Bit-oriented protocols.

    CHARACTER ORIENTED PROTOCOLS:

    Character oriented protocols also called byte-oriented protocols interpret a

    transmission frame or packets as a succession of characters, each usually composed of

    one byte. These are in use in both point-to-point and multipoint applications. They are

    characterized by the selected transmission control characters used to perform the

    various transmission control functions associated with link management, flow control,

    error control and data transparency.

    In all data link protocols, control information is inserted into the data stream

    either as separate control frames or as additions to existing data frames.

    In character oriented protocols, this information is in the form code words

    taken from existing character sets such as ASCII or EBCDIC. The binary Synchronous

    communication protocol often referred to as BSC or character-oriented data link

    protocol was developed by IBM. It is used with Synchronous, half-duplex

    communications and uses a stop-and-wait flow control. Binary Synchronous

    communication protocol (BSC) does not support full-duplex communication or sliding

    window protocol.

    BIT-ORIENTED PROTOCOLS:

    In 1975, IBM pioneered the development of bit-oriented protocols with

    Synchronous data link control and lobbied the ISO to make SDLC the standard. ANSI

    modified SDLC and it became ADCCP and subsequently ISO modified ADCCP to

    HDLC. All of these protocols are based on the same stuffing for data transparency.

    Since 1981,ITU-T has developed a series of protocols called link access protocols

    such as:

    1. Link access procedures, balanced (LAPB)

  • 2. Link access procedures, D-channel (LAPD)

    3. link access procedures, modem(LAPM)

    All link access protocols are based on HDLC. All bit oriented protocols are related to

    the HDLC bit-oriented protocol published by ISO.

    HIGH LEVEL DATALINK CONTROL:

    PRIMARY STATION (CONTROL STATION):

    Primary station is responsible for controlling the operation of the link.

    It means, the station manages dataflow by issuing commands to other stations and

    acting on their responses.

    SECONDARY STATION (GUEST STATION):

    This station operates under the control of primary station. It means the

    secondary station responds to commands issued by a primary station.

    COMBINED STATION:

    This station combines the features of primary and secondary station.

    UNBALANCED CONFIGURATION:

    Consists of one primary and one or more secondary stations ans supports

    both full duplex and half duplex transmissions.

    BALANCED CONFIGURATION:

    Consists of two combined stations and supports both full duplex and half

    duplex transmissions. HDLC defines three data transfer modes:

    1. Normal response mode

    2. Asynchronous response mode

    3. Asynchronous balanced mode

  • It is used with a balanced configuration. ABM is used in configuration connecting

    combined stations.

    CHAPTER -6

    LOCAL AREA NETWORKS (LAN)

    Introduction:

    Local area networks which we normally refer to simply as LANs.

    Local area networks or LANs are used to interconnect distributed

    communities of computer-based DTE is located within a single building.

    For example: University campus,

    All the equipment is located within a single establishment; LANs are

    normally installed and maintained by the organization.

    LAN standards have been developed by the IEEE 802 committee of the

    Institute Electronic Engineers (IEEE) and accredited in the area of LAN by

    the American National Standards Institute (ANSI).

    The following are the examples of requirements that call for higher-speed

    LANs:

    Centralized server farms:

    Many applications are a need for user, systems to be able to draw a

    huge amount of data from multiple centralized servers called server farms.

    An example is a color publishing operation, in which servers contain tens of

    gigabytes of image data that must be downloaded to imaging work stations.

    The servers themselves has increased, the bottleneck has shifted to the

    network. Switched Ethernet alone would not solve this problem because of

    the limit of 10 Mbps on a single link to the client.

    Power workgroups:

    These groups typically consist of a small number of cooperating

    users who need to draw massive data files across the network. Examples are

  • a software development group that runs tests on a new software version or a

    computer-aided design (CAD). In such cases, large amounts of data are

    distributed to several workstations, processed, and updated at very high

    speed for multiple iterations.

    High-speed local backbone:

    As the processing demand grows, LANs proliferate at a site, and

    high-speed interconnections are necessary.

    6.1:TYPES OF NETWORKS AND TOPOLOGY :-

    Each types of network require cabling, network equipment, file

    servers, workstations, software and training. Some types of networks have

    low start-up costs, but are expensive to maintain or upgrade. The topology

    is the physical layout of a network combined with its logical characteristics.

    The logical side of the network is the way the signal is transferred from

    point-to-point along the cable. The layout may be centralized, with each

    station physically connected to a central device that dispatches packets

    from workstation to workstation. Centralized layouts are like a star with

    workstations as its points.

    There are three main topologies:

    Bus topology, Ring topology, Star topology.

    Client/server applications generate a medium to high level of network

    traffic, depending on the client/server software design. Networks on which

    there is frequent exchange of database information, scientific programs and

    publications software generate high levels of traffic. The impact of hosts

    and servers on a network is closely linked to the type of software

    applications that are used. The network topology for a small business.

    Heavily trafficked networks need high-speed data transmission capabilities.

    Security, i.e. the protection of data so that only authorized persons have

    access, is another issue that influences network design. It may also use data

  • encryption, which encodes packets and allows only authorized computers to

    decode them. High-security networks use fiber-optic cable.

    When a new LAN is installed, there are several factors that affect its design,

    including the following:

    *Anticipated network traffic

    *Redundancy requirements

    *User movement

    *Future growth

    *Security consideration

    *WAN connectivity

    6.2: LAN Transmission Equipment:

    LAN Transmission Equipment is used to connect devise on a single

    network, to create and connect multiple networks or sub-networks, and to

    set up a campus enterprise.

    These are included the followings:

    1. Network Interface Card 2. Repeaters 3. Hubs 4. Bridges 5. Routers 6. Brouters 7. Switches 8. Gateway

    6.2.1:Network Interface Card

    It is used to enable a network device, such as a computer equipment, to

    connect to the network. The network connection requires four components:

    *An appropriate connector for the network medium.

  • *A transceiver

    *A controller to support the Media Access Control data link protocol

    *Protocol control firmware

    The connector and its associated circuits are designed for a specific type of

    medium, for example, coax, and twisted pair or optical fiber. The cable

    connector is attached to the transceiver, which may be external to the NIC

    or built into it.

    The MAC controller unit and the firmware work together to correctly

    encapsulate source and destination address, the data to be transported and

    the CRC information into the service data unit.

    The MAC controller and firmware are customized for particular type of

    network transport, which can be any one of the following:

    Ethernet

    Fast Ethernet

    Gigabit Ethernet

    Token ring

    Fast token ring

    Fast Distributed Data Interface

    Asynchronous Transfer Mode Ethernet, Fast Ethernet, high speed communication. It is able to handle both

    half and full duplex transmission.

    6.2.2:Repeaters:

    It is an electronic device that operates on only the physical layer of

    the OSI model. It connects one or more cable segments and retransmits any

    incoming signal to all other segments.

    For example the maximum distance that a single can travel on an Ethernet

    cable segment is 500 meters but one repeater cans double the effective

    length of an Ethernet to 1,000 meters.

    Repeaters are not capable of connecting two dissimilar network

    technologies.

  • 6.2.3:Hub:

    It is a central network device that connects network nodes. It

    contains the star topology. Hub may be referred to as a connector, and is a

    device that can have multiple inputs and outputs, all active at one time.

    Provide a central unit from which to connect multiple nodes into one

    network.

    Permit large numbers of computers to be connected on single or multiple LANs.

    Reduce network congestion by centralizing network design.

    Provide multi-protocol services.

    Consolidate the network backbone.

    Enable high speed communication.

    Provide connections for several different media types.

    Enable centralizes network management. It also called multistation access unit.

    Operating as a central hub an MAU functions at the OSI physical and data

    link layers.

    There are different kinds of hubs:

    1. Passive hub(acts as path way) Data to follow from one device to another.

    2. Intelligent hub: It can detect errors and provide assistance to a technician when

    attempting to locate a failing component.

    3. Active hub: Regenerate and process signals.

    6.2.4:Bridge:

    It is a network device that connects one LAN segment to another. It

    is high efficiency and security. It performs error detection, frame

    formatting, frame routing.

    Bridges are used:

  • Extend a LAN when the maximum connection limit such as the 30-node limit on an Ethernet segment, has been reached.

    Extend a LAN beyond the length limit, for example beyond 185metres with thin-net Ethernet.

    Segment LANs to reduce data traffic bottlenecks. Prevent unauthorized access to a LAN.

    If the bridge knows that the destination of a frame is on the segment as

    the source of the frame, it drops the frame because there is no need to

    forward it.

    If the bridge does not know the destination segment, the bridge

    transmits the frame to all segments except the source segments, a process

    that is called flooding.

    Bridges can greatly enhance the performance of a network because

    they offer the ability to segment network traffic, limiting traffic to those

    networks where it belongs.

    A firewall is software or hardware that sources data from being

    accessed outside a network and that can also prevent data from leaving the

    network through an inside source.

    6.2.5:ROUTER:

    A router performs some of the same function as a bridge.

    Routers connect LANs at the network layer of the OSI model, which

    enables them to interpret more information from packet traffic than bridges

    can.

    In general, routers are used to:

    Efficiently direct packets from one network to another, reducing excessive traffic.

    Join neighboring or distant network. Connect dissimilar networks. Prevent network bottlenecks by isolating portions of a network. Secure portions of a network from intruders.

    The logic that routers use to determine how to forward data is called a

    routing algorithm.

  • 6.2.6:BROUTER:

    A bridge router (brouter) performs both the functions of a bridge (OSI

    layer 2) and a router (OSI layer 3) in a single device.

    A brouter is a network device that acts as a bridge in one circumstance and

    as a router in another.

    Brouters are used to:

    Handle packets efficiently on a multiprotocol network that includes some protocols that can be routed and some that cannot be.

    Isolate and direct network traffic to reduce congestion. Join networks. Secure a certain portion of a network by controlling who can access it.

    6.2.7:SWITCHES:

    A switch is a device that connects two or more network segments and

    allows different nodes to communicate smoothly with each other as if they

    are the only two connecting at the time.

    Switches provide bridging capacity Along with the ability to increase the

    bandwidth on existing networks.

    Switches used on LANs are similar to bridges.

    A switch may act as a multiport bridge to connect devices or segments

    in a LAN.

    A store-and-forward switch stores the frame in the input buffer until

    the whole packet has arrived. A cut-through switch on the other hand.

    Forwards the packet to the output buffer as soon as the destination address

    is received.

  • 6.2.8:GATEWAYS:

    Gateways usually operate at OSI layer 4 or higher, and basically

    translate the protocols to allow terminals on two dissimilar networks to

    communicate.

    Gateways can be either/or combinations of hardware and software.

    An internet service provider (ISP), which connects users in a home to the

    Internet, is a gateway.

    Gateways can suffer from slow performance.

    A dedicated computer acting as a gateway, if it is of reasonable speed,

    usually eliminates any performance problems.

    For examples, you might use a gateway to:

    Convert commonly used protocols (e.g. TCP/IP) to a specialized protocol (for example, an SNA: System Network Architecture).

    Convert message formats from one format to another. Translate different addressing schemes. Link a host computer to a LAN. Provide terminal emulation for connections to a host computer. Direct electronic mail to the right network destination. Connect networks with different architectures.

    6.3:LAN Installation and Performance:

    Once the LAN has been selected based on the requirements of the

    organization, it must be installed by the people within the organization.

    Several suppliers of LAN hardware or software may be contacted in the

    course of evaluating and selecting the LAN and these companies may offer

    installation and maintenance services. Important tasks of installation a LAN

    are given below:

    Install: New workstations NICs on existing workstations

  • Wiring or cabling Server hardware Bridges, routers, brouters, or gateways LAN software Determine the access and capability required by each user Document the LANs hardware and software configuration Train the users Using the LAN and its new capabilities Troubleshoot any startup problems

    The performance of LAN is based on several factors, including the

    protocol that is used, the speed of the transmission, the amount of traffic,

    the error rate, the efficiency of the LAN software, and the speed of server

    computers and disks.

    6.4:ETHERNET: IEEE STANDARD 802.3

    IEEE 802.3 supports a LAN standard originally developed by Xerox

    and later extended by a joint venture between Digital Equipment

    Corporation, Intel Corporation and Xerox. This was called Ethernet.

    Ethernet has a bus topology. Stations contended for the segment using

    a form of the CSMA/CD contention protocol. It is commonly used to

    connect PCs, workstations, and printers and file servers and even

    mainframes.

    Specifically, the data link layer is responsible for accurate

    communication between two nodes in a network. This involves frame

    formats, error checking a d flow control. Data link layer is further divided

    into two sub layers:

    1. Logical Link Control(LIC)

    2. Medium Access Control(MAC)

  • Medium access sub layer

    Network can be divided into two categories: point-to-point network

    and broadcast network.

    Broadcast channels are sometimes referred to as multi-access

    channels or random access channels. The protocols used to determine who

    goes next on multi-access channel belong to a sub layer of the data link

    layer called the multiple access protocols. Many algorithms for allocating

    multiple access channels are known. Some of these are:

    Pure Aloha

    Slotted Aloha

    Carrier Sense Multiple Access (CSMA)

    CSMA with Collision Detection.

    6.4.1:Pure Aloha

    In pure Aloha, frames are transmitted at completely arbitrary times.

    We have made the frames all of the same length because the throughput of

    Aloha systems is maximized by having a uniform frame size rather than

    allowing variable length frames.

    Whenever two frames try to occupy the channel at the same time,

    there will be a collision and both will be confused. If the first bit of a new

    frame overlaps with just the last bit of a frame almost finished, both frames

    will be totally destroyed and both will have to be transmitted later.

  • 6.4.2:Slotted Aloha

    Slotted Aloha has double the capacity of an Aloha system. In slotted

    Aloha, time is divided into discrete intervals, each interval corresponding to

    one frame. This approach requires the users to agree on slot boundaries.

    In slotted Aloha, as against in pure Aloha, a computer is not permitted

    to send whenever a carriage return is typed. Instead, it is required to wait

    for the beginning of the next slot. Thus the continuous pure Aloha is turned

    into a discrete one.

    6.4.3:Carrier Sense Multiple Access (CSMA) Protocols

    Protocols in which stations listen for a carrier (transmission) and act

    accordingly are called carrier sense protocols.

    The first carrier sense protocol is 1-persistent CSMA. When a station

    has data to send, it first listens to the channel to see if anyone else is

    transmitting at the moment. If the channel is busy, the station waits until it

    detects an ideal channel.

    The second carrier sense protocol is non-persistent CSMA. In this

    protocol, a conscious attempt is made to be less greedy than in the previous

    one. Before sending, a station senses the channel. If no one else is sending,

    the station begins doing so itself.

    6.4.4:CSMA with Collision Detection (CSMA/CD)

    Persistent and non-persistent CSMA protocols are clearly an

    improvement over Aloha because they ensure that no station begins to

    transmit when it senses the channel busy.

  • The interference between two signals is called a collision.

    Technically, monitoring a cable during transmission is known as collision

    detection (CD), and the Ethernet mechanism is known as Carrier Sense

    Multiple Access with Collision Detection (CSMA/CD).

    The access mechanism used in an Ethernet is called Carrier Sense

    Multiple Access with Collision Detection (CSMA/CD standardized in IEEE

    802.3).

    6.5:Token Bus: IEEE Standard 802.4:

    LAN have a direct application in factory automation and process

    control, where the nodes are computers controlling the manufacturing

    process. It is a real time processing with minimum delay is needed.

    Ethernet is not suitable for this purpose because the number of collisions is

    not predictable. It support for factory automation and process control

    application that required real time process. It combines features of Ethernet

    and collisions free. It is physical bus that operates as a logical ring using

    tokens. For example A-B-C-D. A send to D then it passes the information

    through B and C. The bus token specify the destination address in the

    source. A station receives a token from its predecessor and sends a token to

    its successor.

    Token bus is limited to factory automation and process control and

    has no commercial application in data communication.

    6.6:Token Ring: IEEE Standard 802.5:

    It is defined by the IEEE standard 802.5. The token ring is a MAC

    protocol sitting between the Logical Link Control and the physical layer in

    the OSI model.

    Station on a token ring LAN is connected in a ring using a NIC.

  • All the stations are connected to the NIC and then connected to another

    one. The network access mechanism used by Ethernet is not infallible and

    may result in collision.

    6.7:FIBRE DISTRIBUTED DATA INTERFACE (FDDI)

    The fiber distributed data interface (FDDI) standard for a 100Mbps

    fiber optic LAN was developed during the mid-1980s by a subcommittee of

    ANSI and was completed in 1990. LANs based on the IEEE 802 standards

    reached capacity, optical fiber LANs based on the FDDI standard became

    an alternative growth path. FDDI LANs were used to provide high-speed

    backbone connections between distributed LANs

    Two types:

    Single mode fiber (SMF) and Multimode fiber (MMF)

    Single mode fiber: it can deliver connectivity over longer distances,

    with higher performance than MMF.

    Multimode fiber is usually used to connect devices within a building or

    a small geographically contained area.

    FDDI has implemented over twisted pair copper wire. The copper

    distributed data interface (CDDI) called uses only shielded twisted pair or

    unshielded twisted pair category 5 cabling but supports distances of 100

    meters and data rates of 100 Mbps. FDDI network contains two complete

    rings one that is used to send data when everything is working correctly,

    and another that is used only when the first ring fails.

  • 6.8:DISTRIBUTED QUEUE DUAL BUS (DQDB): IEEE

    STANDARD 802.6

    Local area networks are usually restricted to a single site.

    Metropolitan Area Network (MAN) expands network coverage to include

    several buildings or sites within a limited area.

    IEEE standard 802.6 defines the Distributed Queue Dual Bus (DQDB)

    which resembles a LAN standard. It is designed to be used in MAN.

    DQDB uses a dual bus configuration.

    Each device in the system connects to two backbone links.

    Access to these links is granted not by contention (as in 802.3) or token

    passing (as in 802.4 and 802.5) but by a mechanism called distributed

    queues.

    This protocol specifies a dual-bus topology to carry data in forward

    and reverse directions.

    The forward direction bus carries data while the reverse direction

    handles queuing and control information.

    For example:

    Two unidirectional buses are labeled Bus A and Bus B. Two unidirectional buses (cables) to which all computers are

    connected.

    Each bus has a head-end. Each bus connects to the stations directly through input and output

    ports; no drops lines are used. To send data on one bus, a station must

    use the other bus to make a reservation.

  • 6.9:LAN OPERATING SYSTEM AND PROTOCOLS

    Several LAN operating systems are associated with specific protocols

    that are transported within Ethernet or Token ring.

    LAN operating systems include the following:

    Novell Netware Windows NT LAN Manage and LAN Server Apple Talk

    A local area network can transport several network protocols

    individually or in combinations of two, three or more protocols.

    For example routers, are often set up to automatically configure themselves

    by recognizing the different protocols.

    A single Ethernet LAN might host one protocol for a mainframe

    computer, a different protocol for Novell servers, and still another protocol

    for Windows NT servers.

    Internet Packet Exchange (IPX) protocol is designed for use with

    Netware. The advantage of IPX over some other early protocols is that it

    can be routed, meaning that it can transport data over multiple networks in

    an enterprise.

    Novell implemented a comparison protocol called Sequence Packet

    Exchange (SPX)

    The native protocol for Windows NT is NetBEUI, which was

    developed for LAN manager and LAN server before the creation of

    Windows NT. NetBEUI was developed when computer networking

    primarily meant local area networking for a relatively small number of

    computers, from just a few to as many as 200.

    The advantage of having multiple LAN protocols on a network is that

    such a network can perform many different functions on the same LAN,

    such as enabling Internet access and access to mainframe computers and

    servers.

  • The disadvantage is that some protocols operate in broadcast mode,

    meaning that they frequently send out packets to identify devices on the

    network causing a significant amount of redundant network traffic.

    The properties of a LAN protocols are similar to those of other

    communication protocols, but some LAN protocol were developed in the

    early days of networking.

    In general, LAN protocols must provide the following:

    Reliable network Links Relatively high speeds Source and destination node address handling Adherence to network standards, particularly the IEEE, 802 standards.

    6.10:Ethernet Technologies:

    Most common Ethernet Technologies are,

    10 Base-2 Ethernet Base-5 Thick Ethernet Technology 10 Base-7 and 100 Base-T Gigabit Ethernet

    6.10.1:10 Base-2 Ethernet:

    Popular and more flexible coaxial cable only 0.25inches in diameters. It is used in PC LANs. In 10 Base-2, 10 is stands for 10Mbps and 2 is denote for 200

    meters.

    It use bus topology and is the approximate maximum distance between any two nodes.

    A dozen PCs need 12 Ethernet cards. It is a cheap-net.

  • 6.10.2:Base-5 thick Technology:

    It is using standard coaxial cable, which is 0.4inch in diameter. A speed of 10Mbps using base band transmission for a maximum

    distance of 500 meters. It is frequently called thick Ethernet.

    6.10.3:10 Base-T and 100 Base-T:

    10Base-T transmits at 10Mbps and 100 Base-T Ethernet transmits at 100Mbps.

    100Base-T is also commonly called fast Ethernet. It uses a star topology. It has a central office device called a hub. Each adapter on each node has a direct, point-to-point connection to

    the hub.

    It is used in different building in the same campus.

    6.10.4:Gigabit Ethernet:

    It is highly successful 10Mbps and 100Mbps Ethernet standards. It offering a raw data of 1000Mbps. It referred to as IEEE802.3z

    standard.

    It uses CSMA/CD for shared broadcast channels. his allows a full-duplex operation at 1000Mbps in both directions for

    point-to point channels. It has a star topology with a hub or switch at its centre. It is a backbone of the interconnecting multiple 10Mbps and 100Mbps

    Ethernet LANs.

  • Local Area Networks

    Introduction:

    Local Area Networks (LANs), discussed in Chapter 6, typically cover small

    geographical areas. They are designed around relatively simple bus or ring topologies.

    Some networks such as Wide Area Networks (WAN) however, cover much larger

    areas, sometimes panning several continents. In such cases the LAN protocols are

    inappropriate and new ones must be defined.

    LAN uses include file transfer, electronic mail and file servers just as for WAN.

    WAN can be used for remote log-ins also (An application in which a user in one

    location logs into a computer at another). WAN protocols must distinguish between

    various applications.

    There is a difference in routing between LAN and WAN. Routing strategies are

    more complex in WAN than in LAN. The fact that there are many ways to go from

    one point to another by itself makes the situation more complex.

    To add to the complexity, sometimes a link in a chosen route experiences a

    failure. What does the network protocol do with all the date traveling in that route? In

    some cases a route may prove to be so popular that too much data travels over it. The

    result is congestion and sometimes failures. Can network protocols avoid such

    situations? If they can not, what can they do to minimize their effects? When data is

    delayed due to failures and congestion, it must be stored somewhere while WAN

    protocols decide what to do with it. Network nodes must be equipped with software

    and buffers to do this.

    LANs are controlled and managed by a single organization or department. If a

    problem occurs, users know whom to call. Some WANs such as the Internet have

    evolved mainly due to voluntary efforts of universities and government agencies.

    Consequently, there is no central authority responsible for fixing problems or updating

  • protocols so that problems do not recur. The success of such network operations

    depends on the cooperation of the organizations that use them.

    7.1 WAN TRANSMISSION METHODS

    WAN transmission methods use different switching techniques. Switching

    techniques are use to create one or more data paths called channels for transmitting

    data. The channels may be created using one communication cable or using several

    cables that offer a range of paths along which data can be transmitted. Switching can

    enable multiple nodes to simultaneously transmit and receive data or it can enable data

    to be transmitted over different routes to achieve maximum efficiency in terms of

    speed and cost. The following are the common switching techniques used in WANs:

    Time Division Multiple Access (TDMA)

    Frequency Division Multiple Access (FDMA)

    Statistical Multiple Access

    Circuit Switching

    Message Switching

    Packet Switching

    7.1.1. Time-Division Multiple Access (TDMA)

    TDMA divides the channels into distinct time slots. Each time slot is

    designated for a particular networks node, as if it were a dedicated line. The WAN

    switching deice rotates from time slot to time slot for each channel. This is similar to

    a 24-hour television programming, where the time has been specified for a particular

    program. TDMA does not guarantee the most efficient use of the network medium

    since transmission occurs only via one channel at a time. The timing of node

    transmission is also important, since a node may transmit at an interval that is out of

    synchronization with its time slot.

  • 7.1.2. Frequency Division Multiple Access (FDMA)

    FDMA divides the channels into frequencies instead of time slots. Each

    channel has its own broadcast frequency and bandwidth. The switching device

    switches from frequency to frequency as it sends data. This is similar to four listeners

    with headsets sharing a radio modified to have four channels. The first listener might

    be listening to a classical station, the send to a talk show the third to a base ball game

    and thr fourth to the news. Each listener is at a different frequency. The radio inputs

    to each channel so quickly that none can tell it is quickly switching from channel to

    channel as it receives the signal on each frequency.

    7.1.3. Statistical Multiple Access (SMA)

    Statistical multiple access or statistical multiplexing, is sued by many WAN

    technologies, such as X.25, ISDN and frame relay. This method is more efficient than

    TDMA and FDMA, because the physical medium bandwidth is dynamically allocated

    according to the application need. The switching device continuously monitors each

    channel to determine the communication requirements. For example, at one moment a

    channel may need to transmit a large graphics file, and then be quiet. Algorithms on

    the switch determine the bandwidth needed to transmit the file. After the file is

    transmitted, the switch reallocates bandwidth to another channel. This might be

    compared to the way in which a workstation operating system automatically decides

    how much memory to give to three applications running at the same time. It might

    give 15 KB for an active word processing file, 7 MB for an image from a scanner and

    1.2MB for printing a graphic.

    7.1.4. Circuit Switching

    Circuit switching involves creating a dedicated physical circuit between the

    sending and receiving nodes. This acts as a straight channel on which to send data

    back and forth without interruption, similar to a telephone call between two parties.

    The transmission channel remains in the service until the two nodes disconnect.

    Communication via circuit switching implies that there is a dedicated communication

  • path between two stations. The path is a connected sequence of links between

    network nodes. On each physical link, a logical channel is dedicated to the

    connection. Communication via circuit switching involves there phases.

    Phase I: Circuit establishment.

    Before any signals can be transmitted an end-to-end (station to station) circuit

    must be established. For example, station A sends a request to node4, requesting a

    connection to Station E. Typically, the link from A to 4 is a dedicated line, so that part

    of the connection already exists. Node 4 must find the next leg in a route leading to

    node 6 based on routing information and measures of availability and perhaps cost.

    Node 4 selects the link to node 5, allocates a free channel (using FDM or TDM) on

    that link and sends a message requesting connection to E. So far, a dedicated path has

    been established from A through 4 to 5. Because a number of stations may attach to 4,

    it must be able to establish internal paths from multiple stations to multiple nodes.

    The remainder of the process proceeds similarly. Node 5 dedicates a channel to node

    6 and internally ties that channel to the channel from node 4. Node 6 completes the

    connection to E. In completing the connection, a test is made to determine if E is busy

    or is prepared to accept the connection.

    Phase II: Data Transfer.

    Information can now be transmitted from A through the network to E. The data

    may be analog or digital, depending on the nature of the network. As the carriers

    evolve the fully integrated digital networks, the use of digital (binary) transmission for

    both voice and data is becoming the dominant method. The path is: A-4 link, internal

    switching through4; 4-5 channel, internal switching through 5; 5-6 channel, internal

    switching through 6; 6-E link. Generally the connection is fully duplex.

  • Phase III: Circuit disconnect.

    After some period of data transfer, the connection is terminated, usually by the

    action of one of the two stations. Signals must be propagated to nodes 4,5 and 6 to de-

    allocate the dedicated resources.

    Note that the connection path is established before data transmission begins.

    Thus, channel capacity must be reserved between each pair of nodes in the path and

    each node must have available internal switching capacity to handle the request

    connection. The switches must have the intelligence to make these allocations and to

    devise a route through the network.

    Circuit switching can be rather inefficient. Channel capacity is dedicated for the

    duration of a connection, even if no data are being transferred. For a voice

    connection, utilization may be rather high, but it still does not approach 100 per cent.

    For a terminal-to-computer connection, the capacity may be ideal during most of the

    time of the connection. In terms of performance, there is delay prior to signal transfer

    for call establishment. However, once the circuit is established, the network is

    effectively transparent to the users. Information is transmitted at a fixed data rate with

    no delay other than the propagation delay through the transmission links. The delay at

    each node is negligible.

    Circuit switching was developed to handle voice traffic but is now also used for

    data traffic. The best known example of a circuit-switching network is the public

    telephone network. This is actually a collection of national networks intern-connected

    to form the international service. Although originally designed and implemented to

    service analog telephone subscribers, it handles substantial data traffic via modem and

    is gradually being converted to a digital network. Another well known application of

    circuit switching is the private branch exchange (PBX) used to interconnect telephones

    within a building or office

  • 7.1.5 Message Switching

    Message switching uses a store-and-forward communication method to transmit

    data from the sending to the receiving node. The data is send from one node to

    another, which stores is temporarily until a route towards the datas final destination

    becomes available. Several nodes along the route store and forward the data until it

    reaches the destination node. Message switching is used for example, when you send

    an e-mail message on an enterprise network with file servers acting as post offices.

    The message goes from one post office to the next until it reaches the intended

    recipient.

    7.1.6 Packet Switching

    Circuit switching was designed for voice communication. In a telephone

    conversation, for example once a circuit is established it remains connected for the

    duration of the session. Circuit switching creates temporary (dialed) or permanent

    (leased) dedicated links that are well suited to this type of communication.

    A key characteristic of circuit-switching networks is that resources within the

    network are dedicated to a particular call. For voice connections, the resulting circuit

    will enjoy a high percentage of utilization because most of the time, one party or the

    other is talking. However, as the circuit-switching network began to be used

    increasingly for data connections, two shortcomings became apparent.

    1) In a typical user/host data connection (for example, a personal computer user

    logged on to a database server) much of the time the line is idle. Thus, with data

    connections, a circuit-switching approach is inefficient.

    2) In a circuit-switching network, the connection provides for transmission at a

    constant data rate. Thus, each of the two devices that are connected must transmit and

    receive at the same data rate as the other. This limits the utility of the network in

    interconnecting a variety of the host computers and workstations.

    To understand how packet switching addresses these problems, let us briefly

    summarize the packet-switching operation. Data are transmitted in short packets. A

  • typical upper bound on packet length is 1000 octets (bytes). If the source has no

    longer message to send, the message is broken up into a series of packets as shown in

    Figure 7.2 Each packet contains a portion (or all for a short message) of the users

    data, plus some control information that the network requires to be able to route the

    packet through the network and deliver it to the intended destination. At each node en

    route, the packet is received, stored briefly and passed on to the next node.

    Now assume that Figure 7.2 depicts a simple packet-switching network.

    Consider a packet to be send from Station A to Station E. The packet includes control

    information that indicates that the intended destination is E. the packet is send from A

    to node 4 stores the packet, determines the next leg of the route (say 5) and queues

    the packet to to-out on that link (the 4-5 link). When the link is available, the packet is

    transmitted to node 5, which forwards the packet to node 6 and finally to E. This

    approach has a number of advantages over circuit switching:

    Line efficiency is greater, because a single node-to-node link can be

    dynamically shared by many packets over time. The packets are queued up and

    transmitted as rapidly as possible over the link. By contrast, with circuit switching,

    time on a node-to-node link is pre-allocated using synchronous time-division

    multiplexing. Much of the time, such a link may be ideal because a portion of its time

    is dedicated to a connection that is ideal.

    A packet-switching network can perform date-rate conversion. Two stations of

    different data rates can exchange packets because each connects to its node as its

    proper data rate.

    When traffic becomes heavy on a circuit-switching network, some calls are

    blocked; that is, the network refuses to accept additional connection requests until the

    load on the network decreases. On a packet-switching network, packets are still

    accepted, but delivery delay increases.

    Priorities can be used. Thus, if a node has a number of packets queued for

    transmission; it can transmit the higher-priority packets first. These packets will

    therefore experience less delay than lower-priority packets.

  • If the station has a message to send through a packet-switching network that is of

    length greater than the maximum packet size, it breaks the message up into packets

    and sends these packets, one at a time, to the network. A question arises as to how the

    network will handle this stream of packets as it attempts to route them through the

    network and deliver them to the intended destination. There are two approaches that

    are used in contemporary networks: datagram and virtual circuit

    In the datagram approach to packet switching, each packet is treated

    independently from all others. Even when one packet represents just a piece of a multi

    packet transmission, the network (and network layer functions) treats it as though it

    existed alone. Packets in this technology are referred to as datagrams. Figure 7.1

    shows how the datagram approach can be used to deliver three packets from Station A

    to Station E. In this example, all the three packets (or datagram)belong to the same

    message, but may go by different paths to reach their destination. This approach can

    cause the datagrams of transmission to arrive at their destination out of order. It is the

    responsibility of the transport layer in most protocols to reorder the datagrams before

    passing them on to the destination port. The link joining each pair of nodes can

    contain multiple channels. Each of these channels is capable, in turn, of carrying

    datagrams either from several different sources or from one source. Multiplexing can

    be done using TDM or FDM.

    In the virtual circuit approach to packet switching. The relationship between all

    packets belonging to a message or session is preserved. A single route is chosen

    between the send and receiver at the beginning of the session. When the data are sent,

    all packets of the transmission travel one after another along that route. The difference

    from the datagram approach is that, with virtual circuits, the node need not make a

    routing decision for each packet. It is made only once for all packets using the virtual

    circuit.

  • 7.2 WAN CARRIER TYPES

    There are several physical signaling or carrier methods for transporting data on

    WANS. Some of the most common include the following:

    Point to point

    T-carrier

    SONET

    ISDN

    Wireless

    7.2.1 Point-to-Point

    Point-to-point carrier communications through public dial-up lines and leased

    telephone lines represent the most basic WAN carrier communications. For example,

    a simple WAN is established every time you employ a modem to make a modem-to-

    modem to make a modem-to-modem connection over a dial-up line. The modem at

    the other end may be connected to a network or to a computer that is a few miles away

    or a few thousand mi