Date post: | 06-Apr-2018 |
Category: |
Documents |
Upload: | indizguise |
View: | 220 times |
Download: | 0 times |
of 97
8/2/2019 COM Study Guide 2012 - Complete
1/97
COMComputer Communications
Written by: N.Sadiq Ali
Unit Assessor: Rachakonda Balaraju
Unit Information
8/2/2019 COM Study Guide 2012 - Complete
2/97
1
Welcome to Students
Congratulations on being offered a place in a Diploma in Information Technology (DIT) at
Institute of Business Studies. If this is your first year with us, and you have selected this
unit as one of your initial units, I would like to extend a special welcome to you and wish
you every success in your studies.
This unit will give you a fundamental understanding of computer communications
technology, the underlying principles of data transmission, the electronic equipment and
computers that provide the connectivity. You will also study standard and the role of
standards in data communication.
As a practical component of this unit, you will also gain skills in the use of the worlds
largest network, the Internet.
To successfully complete this unit of study, it will be necessary to have access to a
personal computer and the Internet. To ensure that you are up-to-date, with respect to
your studies, you should cover one topic each week and try not to fall behind.
Wishing you a very successful year!
N. SADIQ ALI, B.Sc, M.C.A, PGDHRD, MACS, FPNGCS, MPNGHRI, MPNGID,
DIRECTOR
8/2/2019 COM Study Guide 2012 - Complete
3/97
2
UNIT STATEMENT
Unit Title: Computer Communications
Unit Code: COM
Type of Unit: Core Unit Diploma in Information Technology
Prerequisites: Nil
Mode of Study: Internal
Semester: 1
Teaching Unit: School of Computing
Staffing: Mr. Shaik Dawood Ansari
Aims
Global networks, wireless data communication, and client-server systems are just some of
the telecommunication concepts driving industry today. The aim of this unit is to provide a
unified overview of the broad field of data and computer communications and explore the
networking components.
Objectives
On successful completion of this subject, candidates should be able to
understand the principles of computer communications with emphasis on the
roles played by different layers of a communication architecture;
describe different transmission media and data transmission techniques;
understand operation principles of common local area networks and
communication protocols;
describe and use of common Internet applications;
realize the potential power of global computer networks and the ethical issues
this raises.
Handbook Entry
This unit serves as an introductory course in data and computer communication. The
scope of this unit is broad, covering three general areas: data communication, networking
and protocols. Data communication deals with the transmission of signals in a reliable and
efficient manner, which covers single transmission, transmission media, encoding,
interfacing, and data link control. Networking deals with the technology and architecture ofthe communications network used to interconnect communication devices. A discussion of
8/2/2019 COM Study Guide 2012 - Complete
4/97
3
communication protocols includes a treatment of protocol architectures as well as an
analysis of individual protocols at various layers of the architecture.
By studying this unit students would attain the operational knowledge on networks,
Internet, communication protocols and communication architecture. This unit will givestudents the skills to analyse the needs and specify network requirements.
Syllabus
Topic 1 Introduction
Topic 2 Protocols and Architecture
Topic 3 Data Transmission
Topic 4 Transmission MediaTopic 5 Data Encoding
Topic 6 The Data Communication Interface
Topic 7 Data Link Control
Topic 8 Circuit Switching
Topic 9 Packet Switching
Topic 10 LAN Technology
Topic 11 LAN Systems
Topic 12 Internet Protocols
Prescribed Text and Materials
William Stallings, Data and Computer Communications, Prentice Hall, Sixth edition, 2000.
Recommended reference materials
Tanenbaum, A. S., Computer Networks, 3rd edition, Prentice Hall, 1996.
Forouzan, B. A., Data Communications and Networking, 2nd edition, McGraw-Hill, 2001.
8/2/2019 COM Study Guide 2012 - Complete
5/97
4
Students Assessment Requirements
The assessment for this unit comprises two assignments and a final three-hour
examination. The allocation of marks is as follows:
Revision Test 1 5%
Revision Test 2 5%Attendance 5%
Assignment 1 10%
Assignment 2 15%
Final Examination 60%
Total 100%
To pass this unit, a total mark of 50% or more is required.
Final Examination
All topics are assessable. To pass this unit, a total mark of 50% or more is required.
Students should note that final results in this unit might be scaled in accordance with
Institute policy on grade distributions.
Study Time Expectations
All topics in this unit require engaging in approximately 60 hours of learning throughout the
semester. This averages out to around 4 hours per week for 15 weeks but some weeks
will always be heavier than others.
8/2/2019 COM Study Guide 2012 - Complete
6/97
5
Program Schedule
WEEK /
COMMENCING
TOPIC
NO.
TOPICS KEY
DATES0
13.02.2012 Induction Week
120.02.2012
1 Introduction
227.02.2012
2 Protocols and Architecture
305.03.2012
3 Data Transmission
412.03.2012
4 Transmission Media Revision Test 1
519.03.2012
5 Data EncodingAssignment 1
due on 23.03.126
26.03.20126 The Data Communication Interface
702.04.2012
7 Data Link Control
809.04.2012
8 Multiplexing
916.04.2012
9 Switching Revision Test 2
1023.04.2012
10 Congestion Control Assignment 2due on 04.05.1211
30.04.201211 Local Area Network
1207.05.2012
12 Protocols
1314.05.2012 Mock Exam
Exam Dates tobe advised
14 & 1524.05.12 02-06-12 Examination Period
Exam Dates tobe advised
8/2/2019 COM Study Guide 2012 - Complete
7/97
6
SAMPLE EXAM QUESTIONSComputer Communications
Answer all the five- (5) questions. All questions are worth equal marks.Time allowed: Reading 15 minutes Writing 3 hours
Question 1 (Total marks 12)
Define or briefly describe the following terms.
(i) Layered communication architecture (2 marks)
(ii) Synchronous data transmission (2 marks)
(iii) Packet switched network (2marks)
(iv) Internet Protocol (IP) (3 marks)
(v) Multimedia communication (3marks)
Question 2 (Total marks 12)
(a) (i) What is a communication protocol?
(ii) Briefly describe three key elements of a communication protocol. (6 marks)
(b) What are the similarities and differences between the ISO Open Systems
Interconnection Reference Model and the Internet architecture? (6 marks)
Question 3 (Total marks 12)
(a) List three types of transmission media and describe their respective advantages and
disadvantages. (4 marks)
(b) Use an example to describe an error correction technique for data transmission.
(4 marks)
(c) (i)What is Manchester coding? (2 marks)
(ii) What is its advantage? (2 marks)
Question 4 (Total marks 12)
(a) (i) What is the main difference between flow control and congestion control?
(ii) Briefly describe a (any) flow control mechanism / technique. (3 marks)
(b) In a network that has a maximum packet size of 100 bytes, a maximum packet lifetime
of 10 seconds, and an 10-bit packet sequence number, what is the maximum data rate per
8/2/2019 COM Study Guide 2012 - Complete
8/97
7
connection (assuming that each packet over a connection must be uniquely identified
using a sequence number)? (3 marks)
(c) Transmission Control Protocol (TCP) is one of the main protocols of the Internet. Briefly
describe the main functions of the TCP. (6 marks)
Question 5 (Total marks 12)
(a) (i) What is MIME?
(ii) What are the main functions of MIME? (3 marks)
(b) One of the main security services is privacy. How does public key encryption achieve
privacy? (3 marks)
(c) Briefly describe the basic operation principle of the World Wide Web (WWW).
(6 marks)
8/2/2019 COM Study Guide 2012 - Complete
9/97
COMComputer Communications
Written by: N.Sadiq Ali
Unit Assessor: Rachakonda Balaraju
StudyGuide
8/2/2019 COM Study Guide 2012 - Complete
10/97
COMPUTERCOMMUNICATIONS
1
INTRODUCTION
8/2/2019 COM Study Guide 2012 - Complete
11/97
COM: Computer Communications 1.1
TOPIC 1
1.0 INTRODUCTION
We begin our study of computer communications with a topic called
introduction to communications. The exchange of information between
computers for the purpose of cooperative action is generally referred to as
computer communications. Similarly, when two or more computers are
interconnected via a communication network, the set The basic task of a
communication system is exchange of data or information between two
parties or two connected devices.
1.1 Communication model
The fundamental purpose of any communication system is to transfer
the data from one location to another location. E.g. Exchange of voice
signals between two telephones over the same network. The simple
communication model uses the following key elements:
Source generates data to be transmitted Transmitter converts data into transmittable signals Transmission system carries data Receiver converts received signals into data Destination takes incoming dataThe key tasks that must be performed in a data communication system
are: transmission system utilization, interfacing, signal generation,
synchronization, exchange management, error detection and correction,
flow control, addressing, routing, recovery, message formatting, security
and network management.
Textbook: Pages 4 7
This section gives you brief description of the communication model and
the tasks performed in a data communication system.
1.2 Data Communication Networking
In data communication point-to-point connection between two computers
or devices is not usually practical because of one for the following reasons:
Devices are too far apart. Large set of devices would need impractical number of
connections.
8/2/2019 COM Study Guide 2012 - Complete
12/97
COM: Computer Communications1.2
The solution to this problem is a communication network that is to
attach each device to a communication network. Communication networks
are traditionally classified into the following two major categorizes:
LAN Local Area Network
WAN Wide Area Network
1.2.1 Wide Area Networks
Wide Area Networks is the connection between the computers or
devices, which covers a large geographical area and crossing public rights
of way. A WAN consists of a number of interconnected switching nodes.
A transmission from any one device is routed through these internal nodes
to the specified destination device and it relies in part on common carriercircuits. The alternative technologies are:
Circuit Switching - dedicated communications path established for the
duration of the conversation. E.g. telephone network.
Packet Switching
Data sent out of sequence, small chunks (packets) of data at a time Packets passed from node to node between source and destination Used for terminal to computer and computer to computer
communicationsFrame Relay
Packet switching systems have large overheads to compensate forerrors.
Modern systems are more reliable, errors can be caught in endsystem and most overhead for error control is stripped out
Asynchronous Transfer Mode (ATM)
Evolution of frame relay and has little overhead for error control. Fixed packet (called cell) length, anything from 10Mbps to Gbps. Constant data rate using packet switching technique
Integrated Services Digital Network (ISDN)
Designed to replace public telecom system Wide variety of services; entirely digital domain
8/2/2019 COM Study Guide 2012 - Complete
13/97
COM: Computer Communications 1.3
1.2.2 Local Area Networks
Local Area Network is a communications network that interconnects a
variety of devices and provides a means for information exchange among
those devices in smaller scope, that is within a building or small campus.
Usually owned by same organization as attached devices Data rates much higher Usually broadcast systems Now some switched systems and ATM are being introduced
Textbook: Pages 7 12
This section gives you brief description of data communication
networking, LAN, WAN and the technologies used in WAN.
1.3 ProtocolsA protocol is used for communication between entities in different
systems. Here entities refer to user applications, e-mail facilities,
terminals, database management systems and file transfer packages.
Systems refer to computer, terminal and remote sensor. An entity is
anything capable of sending or receiving information and a system is
physically distinct object that contains one or more entities. If two entities
communicate successfully then they must speak same language. The key
elements of a Protocol are:
Syntax - data formats, signal levels Semantics - control information, error handling Timing - speed matching, sequencing
1.3.1 Protocol Architecture
Task of communication broken up into modules For example file transfer could use three modules
File transfer application
Communication service module Network access module
1.3.2 A Three Layer Model
Communications can be said to involve three agents: applications,
computers and networks. The transfer of data from one application to
another involves first getting the data to the computer in which the
application resides and then getting it to the intended application using
8/2/2019 COM Study Guide 2012 - Complete
14/97
COM: Computer Communications1.4
networks. With this concept the communication tasks can be organised
into the following three independent layers:
a) Network Access Layer
Exchange of data between the computer and the network Sending computer provides address of destination May invoke levels of service Dependent on type of network used (LAN, packet switched etc.)
b) Transport Layer
Reliable data exchange Independent of network being used Independent of application
c) Application Layer
Support for different user applications. E.g. e-mail, file transfer1.3.2.1 Addressing Requirements
Each computer on the network must have a unique address; this allows
the network to deliver data to the proper computer. Each application on the
computer must have an address that is unique within the computer; this
allows the transport layer to support multiple applications at each
computer. This is also known as service access point or SAP.
1.3.2.2 Protocol Data Units (PDU)
The combination of data and the control information is known as a
protocol data unit (PDU).
At each layer, protocols are used to communicate Control information is added to user data at each layer Transport layer may fragment user data Each fragment has a transport header added
Destination SAP Sequence number Error detection code
The Network PDU adds the following to the network header:
network address for destination computer Facilities requests
Textbook: Pages 12 19
This section gives you brief description of protocols, protocol architecture
and the three-layer communication model.
8/2/2019 COM Study Guide 2012 - Complete
15/97
COM: Computer Communications 1.5
1.4 TCP/IP Protocol Architecture
The TCP/IP protocol architecture was developed by the US
Defense Advanced Research Project Agency (DARPA) for its packet
switched network (ARPANET) and now it is used by the global Internet. It
has no official model but a working one but the communication task can
be organised into the following five independent layers:
a) Application Layer - support for user applications. E.g. http, SMPT.
b) Transport Layer (TCP) or Host-to-host layer
Reliable delivery of data Ordering of delivery
c) Internet Layer (IP)
Systems may be attached to different networks Routing functions across multiple networks Implemented in end systems and routers
d) Network Access Layer
Exchange of data between end system and network Destination address provision Invoking services like priority
e) Physical Layer
Physical interface between data transmission device (e.g.computer) and transmission medium or network
Characteristics of transmission medium are signal levels, data rates,etc.
Textbook: Pages 19 20
This section gives you brief description of Transmission Control Protocol /
Internet Protocol architecture and its layers.
1.5 OSI Model
The Open Systems Interconnection (OSI) model was developed by
the International Organization for Standardization (ISO) as a model for
computer communication architecture. It consists of the following seven
layers: Application, Presentation, Session, Transport, Network, Data Link,
and Physical
Textbook: Pages 20 22
This section gives you brief description of Open Systems Interconnection
model and its layers.
8/2/2019 COM Study Guide 2012 - Complete
16/97
COMPUTERCOMMUNICATIONS
2
PROTOCOLS &
ARCHITECTURE
8/2/2019 COM Study Guide 2012 - Complete
17/97
COM: Computer Communications 2.1
TOPIC 2
2.0 PROTOCOLS AND ARCHITECTURE
Protocol architecture is the layered structure of hardware and software
that supports the exchange of data between systems and supports
distributed applications, such as electronic mail and file transfer. At each
layer of protocol architecture, one or more common protocols are
implemented in communicating systems. Each protocol provides a set of
rules for the exchange of data between systems.
2.1 Characteristics of protocols
Some important characteristics are as follows:
Direct
Systems share a point to point link or Systems share a multi-point link Data can pass without intervening active agent
Indirect
Switched networks or Internetworks or internets Data transfer depend on other entities
Monolithic or Structured
Communications is a complex task To complex for single unit Structured design breaks down problem into smaller units Layered structure
Symmetric - Communication between peer entities
Asymmetric - Client/server
Standard or Nonstandard Nonstandard protocols built for specific computers and tasks K sources and L receivers leads to K*L protocols and 2*K*L
implementations
If common protocol used, K + L implementations neededTextbook: Pages 32 55
This section gives you brief description of protocols and its
characteristics.
8/2/2019 COM Study Guide 2012 - Complete
18/97
COM: Computer Communications2.2
2.2 Protocol Functions
In the communication architecture a small set of functions forms the
basis of the protocols and not all protocols have all functions. But in many
instances the same type of function will present in protocols at different
levels. The functions can be categorised as follows:
Encapsulation The addition of control information to data is generally
referred as encapsulation. The control information falls into the following
three categories.
Address information Error-detecting code Protocol control
Segmentation (Fragmentation)
A protocol is concerned with exchanging streams of data between
two entities. Data blocks are of bounded size. Application layer messages
may be large and Network packets may be smaller. Splitting larger blocks
into smaller ones is segmentation (or fragmentation in TCP/IP).
ATM blocks (cells) are 53 octets long Ethernet blocks (frames) are up to 1526 octets long
Why Fragment?
Advantages
More efficient error control More equitable access to network facilities Shorter delays Smaller buffers needed
Disadvantages
Overheads Increased interrupts at receiver & More processing time
Connection Control
Connection Establishment Data transfer Connection termination May be connection interruption and recovery Sequence numbers used for
Ordered delivery, Flow control, Error control
8/2/2019 COM Study Guide 2012 - Complete
19/97
COM: Computer Communications 2.3
Ordered Delivery
PDUs may traverse different paths through network PDUs may arrive out of order Sequentially number PDUs to allow for ordering
Flow Control
Done by receiving entity Limit amount or rate of data Stop and wait Credit systems - Sliding window Needed at application as well as network layers
Error Control
Guard against loss or damage Error detection
Sender inserts error detecting bits Receiver checks these bits If OK, acknowledge If error, discard packet
Retransmission - If no acknowledge in given time, re-transmit Performed at various levelsAddressing
Addressing level Addressing scope Connection identifiers Addressing mode
Addressing level
Level in architecture at which entity is named Unique address for each end system (computer) and router Network level address
IP or internet address (TCP/IP) Network service access point or NSAP (OSI)
Process within the system Port number (TCP/IP), Service access point or SAP (OSI)
Addressing Scope
Global nonambiguity Global address identifies unique system
There is only one system with address X
8/2/2019 COM Study Guide 2012 - Complete
20/97
COM: Computer Communications2.4
Global applicability It is possible at any system (any address) to identify anyother system (address) by the global address of the other
system
Address X identifies that system from anywhere on thenetwork. e.g. MAC address on IEEE 802 networks
Connection Identifiers
Connection oriented data transfer (virtual circuits) Allocate a connection name during the transfer phase
Reduced overhead as connection identifiers are shorter thanglobal addresses
Routing may be fixed and identified by connection name Entities may want multiple connections - multiplexing State information
Addressing Mode
Usually an address refers to a single system Unicast address, Sent to one machine or person
May address all entities within a domain Broadcast Sent to all machines or users
May address a subset of the entities in a domain
Multicast, Sent to some machines or a group of usersMultiplexing
Supporting multiple connections on one machine Mapping of multiple connections at one level to a single
connection at another
Carrying a number of connections on one fiber optic cable Aggregating or bonding ISDN lines to gain bandwidth
Transmission Services
Priority - e.g. control messages Quality of service - Minimum acceptable throughput, Maximum
acceptable delay
Security - Access restrictionsTextbook: Pages 35 44
This section gives you brief description of protocol functions.
8/2/2019 COM Study Guide 2012 - Complete
21/97
COM: Computer Communications 2.5
2.3 OSI - The Model
A layer model Each layer performs a subset of the required communication
functions
Each layer relies on the next lower layer to perform more primitivefunctions
Each layer provides services to the next higher layer Changes in one layer should not require changes in other layers
Elements of Standardization
Protocol specification Operates between the same layer on two systems May involve different operating system Protocol specification must be precise
Format of data units, Semantics of all fields allowable sequence of PCUs
Service definition - Functional description of what is provided Addressing - Referenced by SAPs
OSI Layers (1)
Physical - Physical interface between devices Mechanical, Electrical, Functional, Procedural
Data Link - Means of activating, maintaining and deactivating areliable link
Error detection and control Higher layers may assume error free transmission
OSI Layers (2)
Network - Transport of information Higher layers do not need to know about underlying
technology
Not needed on direct links Transport - Exchange of data between end systems
Error free, In sequence, No losses No duplicates & Quality of service
OSI Layers (3)
Session - Control of dialogues between applications Dialogue discipline, Grouping & Recovery
Presentation Data formats and coding, Data compression & Encryption
8/2/2019 COM Study Guide 2012 - Complete
22/97
COM: Computer Communications2.6
Application - Means for applications to access OSI environmentTextbook: Pages 44 54
This section gives you brief description of open systems interconnection
model.
2.4 TCP/IP Protocol Suite
Dominant commercial protocol architecture Specified and extensively used before OSI Developed by research funded US Department of Defense Used by the Internet
TCP/IP Protocol Architecture (1)
Application Layer - Communication between processes or applications End to end or transport layer (TCP/UDP/)
End to end transfer of data May include reliability mechanism (TCP) Hides detail of underlying network
Internet Layer (IP) - Routing of dataTCP/IP Protocol Architecture (2)
Network Layer- Logical interface between end system and network Physical Layer Transmission medium & Signal rate and encodingTextbook: Pages 54 60
This section gives you brief description of transmission control protocol
and Internet protocol.
Review Activities:
2.1 Briefly describe Layered protocol architecture
2.2 What is a communication protocol and why is it needed?
2.3 Briefly describe the similarities and differences between OSI
Reference Model and the TCP/IP architecture.
2.4 (a) The ISO OSI Reference Model and TCP/IP both use layered
network architectures. Briefly describe how the layered architectures are
implemented (i.e. how layers communicate with each other?)
(b) The protocol used at the network layer of the Internet is called IP
(Internet Protocol). Describe the main functions of the IP.
8/2/2019 COM Study Guide 2012 - Complete
23/97
COM: Computer Communications 2.7
Feedback to the Review Activities:
Review Activity 2.1
Refers to the communication architecture which consists of a
number of layers and each layer has its own protocols. For example, OSI
reference model consists of seven layers and the Internet architecture
consists of five layers.
Review Activity 2.2
Communication protocol is a set of rules that governs the required
communications. It is needed to ensure that the communication entities can
understand each other and can carry out meaningful communication
Review Activity 2.3
Similarity: both are layered architecture and most layers are similar
in the two architectures. Differences: the OSI reference model has seven
layers while the TCP/IP architecture has only five layers. The main
functions of session later, presentation layer and application layer of the
OSI model are combined to form the application layer in the TCP/IP
architecture
Review Activity 2.4
(a) A network is a complicated system. The layered architecture
makes the design and implementation of a network manageable. Another
advantage of the layered architecture is that it makes the network more
modular so that we can change/upgrade one layer without affecting the
functions / implementation of the other layers. Each layer implements the
well-defined function and interface between layers. It works based on the
concept of encapsulation, whereby functions/instructions of one layer are
included in the header for other layers to use.
(b) The main functions of the network layer are to inter-connect
different networks to form a large network and to route packets from the
source to destination.
8/2/2019 COM Study Guide 2012 - Complete
24/97
COMPUTERCOMMUNICATIONS
3
DATA
TRANSMISSION
8/2/2019 COM Study Guide 2012 - Complete
25/97
COM: Computer Communications 3.1
TOPIC 3
3.0 DATA TRANSMISSION
Transferring information (voice, data, image, and video) from one
device to another device is called as data transmission. The successful
transmission of data depends on two factors: the quality of the signal being
transmitted and the characteristics of the transmission medium.
3.1Concepts
Data transmission occurs between transmitter and receiver over some
transmission medium. The transmission medium can be classified as
Guided media and Unguided media. In guided media, the waves are
guided along a physical path. E.g. twisted pair, coaxial cable and optical
fiber. In unguided media it do not guide them. E.g. propagation through
air, vacuum and sea water.
Direct link - No intermediate devices
Point-to-point - Direct link, Only 2 devices share link.
Multi-point - More than two devices share the link.
The data transmission may be simplex, half-duplex or full duplex.
Simplex - One direction e.g. Television
Half-duplex -Either direction, but only one way at a time. E.g. police radio
Full duplex - Both directions at the same time. E.g. telephone
Textbook: Pages 69 78 V7: 57 - 67
This section gives you brief description of data transmission concepts and
terminology.
3.2 Analog and digital transmission
Data are entities that convey meaning. Signals are the electric or
electromagnetic representations of data. Transmission - Communication of
data by propagation and processing of signals.
The data can be classified as analog and digital data. Analog - continuous
values within some interval. E.g. sound, video. Digital - Discrete values
e.g. text, integers
8/2/2019 COM Study Guide 2012 - Complete
26/97
COM: Computer Communications3.2
Signals - Means by which data are propagated
Analog Continuously variable
Various media- wire, fiber optic, space
Speech bandwidth 100Hz to 7kHz Telephone bandwidth 300Hz to 3400Hz Video bandwidth 4MHz Digital
- Use two DC components
Data and Signals
Usually use digital signals for digital data and analog signals foranalog data
Can use analog signal to carry digital data - Modem Can use digital signal to carry analog data - Compact Disc audio
Analog Transmission
Analog signal transmitted without regard to content May be analog or digital data Attenuated over distance Use amplifiers to boost signal Also amplifies noise
Digital Transmission
Concerned with content
Integrity endangered by noise, attenuation etc. Repeaters used Repeater receives signal Extracts bit pattern Retransmits Attenuation is overcome Noise is not amplified
8/2/2019 COM Study Guide 2012 - Complete
27/97
COM: Computer Communications 3.3
Advantages of Digital Transmission
Digital technology - Low cost LSI/VLSI technology Data integrity - Longer distances over lower quality lines Capacity utilization - High bandwidth links economical; High
degree of multiplexing easier with digital techniques
Security & Privacy - Encryption Integration - Can treat analog and digital data similarly
Textbook: Pages 79 89 V7: 68 - 76
This section gives you brief description of analog and digital data
transmission.
3.3 Transmission Impairments
Signal received may differ from signal transmitted Analog - degradation of signal quality Digital - bit errors Caused by
Attenuation and attenuation distortion Delay distortion Noise
Attenuation
Signal strength falls off with distance Depends on medium Received signal strength: must be enough to be detected must be sufficiently higher than noise to be received without error
Attenuation is an increasing function of frequencyDelay Distortion
Only in guided media Propagation velocity varies with frequencyNoise
Additional signals inserted between transmitter and receiver
8/2/2019 COM Study Guide 2012 - Complete
28/97
COM: Computer Communications3.4
Thermal Due to thermal agitation of electrons Uniformly distributed White noise
Intermodulation Signals that are the sum and difference of original frequencies
sharing a medium
Crosstalk A signal from one line is picked up by another
Impulse Irregular pulses or spikes e.g. External electromagnetic interference Short duration High amplitude
Textbook: Pages 89 98 V7: 76 - 86
This section gives you brief description of different data transmission
impairments.
Review Activities:
3.1 Suppose an analog audio signal has the frequency range of 0 to 20
kHz. This analog signal is to be converted into digital signal.
(i) What should be the minimum sampling rate in order to convert the
signal correctly?
(ii) Assume that 16 bits are used to represent each sample. Calculate the
amount of storage required to store 2 hours of above digital signal
Solution:
(i) According to Nyquist theorem, the sampling rate should be at least 20
kHz.
(ii) Amount of storage = 20000 x 2 x 3600 x 16/8= 288,
000, 000 bytes = 274.66 Mbytes.
8/2/2019 COM Study Guide 2012 - Complete
29/97
COM: Computer Communications 3.5
3.2
Bandwidth
Is the maximum amount of data that can travel a communication path in a
given time period and is often measured in bits per second.
Latency
Latency is the amount of time that it takes a packet to travel from the
source to the destination.
Throughput
Is the data transfer rate that is achieved by combining the effects of
Bandwidth and Latency putting it simple bandwidth is what you pay for
and throughput is what you actually receive.
Capacity
Is the practical maximum data carrying capability.
Bottleneck
A bottleneck is a delay that occurs when part of a network is slower than
others.
Collisions
Are Frames that were not sent successfully on a shared medium because
the senders tried to send frames at the same time.
8/2/2019 COM Study Guide 2012 - Complete
30/97
COMPUTERCOMMUNICATIONS
4
TRANSMISSION
MEDIA
8/2/2019 COM Study Guide 2012 - Complete
31/97
COM: Computer Communications 4.1
TOPIC 4
4.0 TRANSMISSION MEDIA
Transmission media is used to convey the information and which
carries the information from one device to another device. The
transmission media can be classified as guided and unguided.
4.1Guided transmission media
The transmission medium is the physical path between transmitter and
receiver and the communication is in the form of electromagnetic waves.
In the guided medium, the waves are guided along a solid medium, such as
copper twisted pair, copper coaxial cable, and optical fiber.
Twisted pair wire
Twisted pair wire consists of two insulated wires arranged in a
regular spiral pattern. A wire pair acts as a single communication link.
Often bundles into cables and usually installed in buildings during
construction.
Twisted Pair Applications
Most common medium Telephone network Between house and local exchange (subscriber loop)
Within buildings - To private branch exchange (PBX) For local area networks (LAN) - 10Mbps or 100MbpsTwisted Pair - Pros and Cons
Cheap Easy to work with Low data rate Short range
Twisted Pair - Transmission Characteristics
Analog - Amplifiers every 5km to 6km Digital - Use either analog or digital signals; repeater every 2km or
3km
Limited distance
8/2/2019 COM Study Guide 2012 - Complete
32/97
COM: Computer Communications4.2
Limited bandwidth (1MHz) Limited data rate (100MHz) Susceptible to interference and noise
Unshielded Twisted Pair (UTP)
Ordinary telephone wire Cheapest Easiest to install Suffers from external EM interference
Shielded Twisted Pair (STP)
Metal braid or sheathing that reduces interference
More expensive Harder to handle (thick, heavy)
Cat 3
up to 16MHz Voice grade found in most offices Twist length of 7.5 cm to 10 cmCat 4 - up to 20 MHzCat 5
up to 100MHz Commonly pre-installed in new office buildings Twist length 0.6 cm to 0.85 cm
Coaxial Cable
The coaxial cable consists of a hallow outer cylindrical conductor thatsurrounds a single inner wire conductor. The inner conductor is held in
place by either regularly spaced insulating rings or a solid dielectric
material. The outer conductor is covered with a jacket or shield.
Coaxial Cable Applications
Most versatile medium Television distribution - Ariel to TV, Cable TV
Long distance telephone transmission
8/2/2019 COM Study Guide 2012 - Complete
33/97
COM: Computer Communications 4.3
Can carry 10,000 voice calls simultaneously Being replaced by fiber optic
Short distance computer systems links
Local area networksCoaxial Cable - Transmission Characteristics
Analog
Amplifiers every few km Closer if higher frequency Up to 500MHz
Digital
Repeater every 1km
Closer for higher data rates
Optical Fiber
An optical fiber is a thin, flexible capable of guiding an optical ray.
Various glasses and plastics can be used to make optical fibers. An optical
fiber cable has a cylindrical shape and consists of three concentric
sections: the core, the cladding, and the jacket.
Optical Fiber Benefits
Greater capacity - Data rates of hundreds of Gbps Smaller size & weight Lower attenuation Electromagnetic isolation Greater repeater spacing - 10s of km at least
Optical Fiber Applications
Long-haul trunks Metropolitan trunks Rural exchange trunks Subscriber loops LANs
8/2/2019 COM Study Guide 2012 - Complete
34/97
COM: Computer Communications4.4
Textbook: Pages 110 119 V7: 95 - 106
This section give you brief description of guided transmission media.
4.2 Wireless Transmission
Unguided media Transmission and reception via antenna Directional
Focused beam Careful alignment required
Omnidirectional Signal spreads in all directions Can be received by many antennae
Terrestrial Microwave
Parabolic dish Focused beam Line of sight Long haul telecommunications Higher frequencies give higher data rates
Satellite Microwave
Satellite is relay station Satellite receives on one frequency, amplifies or repeats signal and
transmits on another frequency
Requires geo-stationary orbit - Height of 35,784km Television Long distance telephone Private business networksBroadcast Radio
Omnidirectional FM radio
UHF and VHF television
8/2/2019 COM Study Guide 2012 - Complete
35/97
COM: Computer Communications 4.5
Line of sight Suffers from multipath interference
Text book: Pages 119 126 V7: 107 - 123This section gives you brief description of wireless data transmission.
Review Activities:
4.1 List three types of transmission media and describe their respective
advantages and disadvantages.
Solution:
Advantages Disadvantages
Twisted pair Cheap Low bandwidth
Optical fiber High bandwidth Expensive to install
Infrared Secure Short distance and cannot penetrate
solid objects
4.2 Name three different transmission media and describe their strengths
and weaknesses.
Solution:
Media type strength weakness
Coaxial cable Large capacity / bandwidth More expensive than
twisted par
Twisted pair Cheap Low capacity/bandwidth
Optic fiber High bandwidth Relatively expensive in
initial cost
8/2/2019 COM Study Guide 2012 - Complete
36/97
COMPUTERCOMMUNICATIONS
5
DATA ENCODING
8/2/2019 COM Study Guide 2012 - Complete
37/97
COM: Computer Communications 5.1
TOPIC 5
5.0 DATA ENCODING
Both digital and analog information can be encoded as either
analog or digital signals. The particular encoding that is chosen depends on
the specific requirements to be met and the media and communications
facilities available.
Encoding Techniques
Digital data, digital signal Analog data, digital signal Digital data, analog signal Analog data, analog signal
5.1 Digital Data, Digital Signal
Digital signal
Discrete, discontinuous voltage pulses Each pulse is a signal element Binary data encoded into signal elements
Unipolar
All signal elements have same signPolar
One logic state represented by positive voltage the other bynegative voltage
Data rate - Rate of data transmission in bits per second
Duration or length of a bit - Time taken for transmitter to emit the bit
Modulation rate
Mark and Space Rate at which the signal level changes Measured in baud = signal elements per second Binary 1 and Binary 0 respectivelyComparison of Encoding Schemes
Signal Spectrum
Lack of high frequencies reduces required bandwidth
8/2/2019 COM Study Guide 2012 - Complete
38/97
COM: Computer Communications5.2
Lack of dc component allows ac coupling via transformer,providing isolation
Concentrate power in the middle of the bandwidthClocking
Synchronizing transmitter and receiver External clock Sync mechanism based on signal
Error detection - Can be built in to signal encoding
Signal interference and noise immunity - Some codes are better than others
Cost and complexity - Higher signal rate (& thus data rate) lead to higher
costs. Some codes require signal rate greater than data rate
Encoding Schemes
Nonreturn to Zero-Level (NRZ-L) Nonreturn to Zero Inverted (NRZI) Bipolar -AMI Pseudoternary Manchester Differential Manchester
B8ZS HDB3Textbook: Pages 132 142 V7: 131 - 141
This section gives you brief description of digital to digital data encoding.
5.2 Digital Data, Analog Signal
Public telephone system 300Hz to 3400Hz Use modem (modulator-demodulator)
Amplitude shift keying (ASK) Frequency shift keying (FSK) Phase shift keying (PK)
Text book: Pages 142 148 V7: 142 152
This section gives you brief description of digital to analog encoding.
8/2/2019 COM Study Guide 2012 - Complete
39/97
COM: Computer Communications 5.3
5.3 Analog Data, Digital Signal
Digitization
Conversion of analog data into digital data
Digital data can then be transmitted using NRZ-L Digital data can then be transmitted using code other than NRZ-L Digital data can then be converted to analog signal Analog to digital conversion done using a code. Pulse code modulation Delta modulation
Pulse Code Modulation(PCM)
If a signal is sampled at regular intervals at a rate higher than twice thehighest signal frequency, the samples contain all the information of the
original signal - (Proof - Stallings appendix 4A)
Voice data limited to below 4000Hz Require 8000 sample per second Analog samples (Pulse Amplitude Modulation, PAM) Each sample assigned digital value 4 bit system gives 16 levels Quantized
Quantizing error or noise Approximations mean it is impossible to recover original
exactly
8 bit sample gives 256 levels Quality comparable with analog transmission
8000 samples per second of 8 bits each gives 64kbpsText book: Pages 148 155 V7: 152 158
This section gives you brief description of digital to analog encoding.
5.4 Analog Data, Analog Signals
Why modulate analog signals?
Higher frequency can give more efficient transmission Permits frequency division multiplexing (chapter 8)
8/2/2019 COM Study Guide 2012 - Complete
40/97
COM: Computer Communications5.4
Types of modulation
Amplitude Frequency Phase
Spread Spectrum
Analog or digital data Analog signal Spread data over wide bandwidth Makes jamming and interception harder Frequency hoping
Signal broadcast over seemingly random series offrequencies
Direct Sequence Each bit is represented by multiple bits in transmitted
signal
Chipping codeTextbook: Pages 155 166 V7: 159 165
This section gives you brief description of wireless data transmission.
Review Activities:
5.1 In pulse code modulation, how is the sampling rate decided?The sampling rate is determined by the Nyquist theorem, i.e., the
sampling rate should be at least being twice of the signal frequency in
order to represent the signal completely.
5.2 Briefly describe the Manchester encoding format.
In the Manchester code, there is a transition at the middle of each
bit period. The mid-bit transition serves as a clocking mechanism and as
data: a low to high transition represents a 1, and a high to low transition
represents a 0. In Differential Manchester, the mid bit transition is used
only to provide clocking. The encoding of a 0 is represented by the
presence of a transition at the beginning of a bit periods and a 1 is
represented by the absence of a transition at the beginning of a bit periods.
Differential Manchester has the added advantage of employing differential
encoding.
8/2/2019 COM Study Guide 2012 - Complete
41/97
COMPUTERCOMMUNICATIONS
6
DATACOMMUNICATION
INTERFACE
8/2/2019 COM Study Guide 2012 - Complete
42/97
COM: Computer Communications 6.1
TOPIC 6
6.0 DATA COMMUNICATION INTERFACE
The transmission of a stream of bits from one device to another
across a transmission link involves a great deal of cooperation and
agreement between the two sides. One of the most fundamental
requirements is synchronization. The receiver at regular intervals to
determine the value of each received bit. Two techniques are in common
for this purpose. They are synchronous transmission and asynchronous
transmission.
6.1 Asynchronous transmission
Data transmitted on character at a time - 5 to 8 bits Timing only needs maintaining within each character Resync with each character
Asynchronous Behavior
In a steady stream, interval between characters is uniform (lengthof stop element)
In idle state, receiver looks for transition 1 to 0 Then samples next seven intervals (char length) Then looks for next 1 to 0 for next char Simple Cheap Overhead of 2 or 3 bits per char (~20%) Good for data with large gaps (keyboard)
Synchronous - Bit Level
Block of data transmitted without start or stop bits Clocks must be synchronized Can use separate clock line
Good over short distances Subject to impairments
8/2/2019 COM Study Guide 2012 - Complete
43/97
COM: Computer Communications6.2
Embed clock signal in data Manchester encoding Carrier frequency (analog)
Synchronous - Block Level
Need to indicate start and end of block Use preamble and postamble
e.g. series of SYN (hex 16) characters e.g. block of 11111111 patterns ending in 11111110
More efficient (lower overhead) than asyncText book: Pages 174 178 V7: 173 - 176
This section gives you brief description of asynchronous and synchronous
transmission.
6.2 Line Configuration
Topology
Physical arrangement of stations on medium Point to point Multi point - Computer and terminals, local area network
Half duplex
Only one station may transmit at a time Requires one data path
Full duplex
Simultaneous transmission and reception between two stations Requires two data paths (or echo canceling)
Text book: Pages 178 180 V7: 191 - 193
This section gives you brief description of line configurations and its
characteristics..
8/2/2019 COM Study Guide 2012 - Complete
44/97
COM: Computer Communications 6.3
6.3 Interfacing
Data processing devices (or data terminal equipment, DTE) do not(usually) include data transmission facilities
Need an interface called data circuit terminating equipment (DCE)e.g. modem, NIC
DCE transmits bits on medium DCE communicates data and control info with DTE Done over interchange circuits Clear interface standards required
Characteristics of Interface
Mechanical - Connection plugs
Electrical - Voltage, timing, encoding
Functional - Data, control, timing, grounding
Procedural - Sequence of events
Text book: Pages 180 190 V7: 193 - 203
This section gives you brief description of interfacing and its
characteristics.
Review Activities:
6.1 Briefly describe the following:
Synchronous data transmission Asynchronous data transmission
Synchronous data transmission
In this transmission mode, synchronization between the transmitter
and receiver fully depends on the clock synchronization. No start bit and
stops bit are used.
Asynchronous data transmission
It refers to data transmission where start bits and stop element are
used for each character (represented by a number of bits) so that the
transmitter and the receiver can be synchronized. This is opposed to
synchronous transmission where no start and stop bits are used and
synchronization between the transmitter and receiver fully depends on the
clock synchronization.
8/2/2019 COM Study Guide 2012 - Complete
45/97
COMPUTERCOMMUNICATIONS
7
DATA LINK
CONTROL
8/2/2019 COM Study Guide 2012 - Complete
46/97
COM: Computer Communications 7.1
TOPIC 7
7.0 DATA LINK CONTROL
Because of the possibility of transmission errors and because the
receiver of data may need to regulate the rate at which data arrive,
synchronization and interfacing are insufficient by themselves. It is
necessary to impose a layer of control in each communicating device that
provides functions such as flow control, error detection, and error control.
This layer of control is known as a data link control protocol.
7.1 Flow Control
Ensuring the sending entity does not overwhelm the receivingentity
Preventing buffer overflow Transmission time
Time taken to emit all bits into medium Propagation time
Time for a bit to traverse the link
Stop and Wait
Source transmits frame Destination receives frame and replies with acknowledgement Source waits for ACK before sending next frame Destination can stop flow by not send ACK Works well for a few large frames
Fragmentation
Large block of data may be split into small frames
Limited buffer size Errors detected sooner (when whole frame received) On error, retransmission of smaller frames is needed Prevents one station occupying medium for long periods Stop and wait becomes inadequate
8/2/2019 COM Study Guide 2012 - Complete
47/97
COM: Computer Communications7.2
Sliding Windows Flow Control
Allow multiple frames to be in transit Receiver has buffer W long
Transmitter can send up to W frames without ACK Each frame is numbered ACK includes number of next frame expected Sequence number bounded by size of field (k)
Frames are numbered modulo 2k
Sliding Window Enhancements
Receiver can acknowledge frames without permitting furthertransmission (Receive Not Ready)
Must send a normal acknowledge to resume If duplex, use piggybacking
If no data to send, use acknowledgement frame If data but no acknowledgement to send, send last
acknowledgement number again, or have ACK valid flag
(TCP)
Text book: Pages 194 200 V7: 208 - 215
This section gives you brief description of flow control and its techniques.
7.2 Error Detection
Additional bits added by transmitter for error detection code Parity - Value of parity bit is such that character has even (even
parity) or odd (odd parity) number of ones.
Even number of bit errors goes undetected
Cyclic Redundancy Check
For a block ofkbits transmitter generates n bit sequence Transmit k+n bits which is exactly divisible by some number
8/2/2019 COM Study Guide 2012 - Complete
48/97
COM: Computer Communications 7.3
Receive divides frame by that number - If no remainder, assume noerror.
Text book: Pages 201 207 V7: 177 - 185This section gives you brief description of error detection and parity
checking.
7.3 Error Control
Detection and correction of errors Lost frames
Damaged frames Automatic repeat request
Error detection Positive acknowledgment Retransmission after timeout Negative acknowledgement and retransmission
Automatic Repeat Request (ARQ)
Stop and wait Go back N Selective reject (selective retransmission)
Stop and Wait
Source transmits single frame Wait for ACK If received frame damaged, discard it
Transmitter has timeout If no ACK within timeout, retransmit
If ACK damaged, transmitter will not recognize it Transmitter will retransmit Receive gets two copies of frame Use ACK0 and ACK1
8/2/2019 COM Study Guide 2012 - Complete
49/97
COM: Computer Communications7.4
Go Back N
Based on sliding window If no error, ACK as usual with next frame expected Use window to control number of outstanding frames If error, reply with rejection
Discard that frame and all future frames until error framereceived correctly
Transmitter must go back and retransmit that frame and allsubsequent frames
Selective Reject
Also called selective retransmission Only rejected frames are retransmitted Subsequent frames are accepted by the receiver and buffered Minimizes retransmission Receiver must maintain large enough buffer More complex login in transmitter
Text book: Pages 208 213 V7: 215 - 220
This section gives you brief description of error control techniques.
7.4 High Level Data Link Control (HDLC)
The HDLC is not only widely used but it is the basis for many
other important data link control protocols, which use the same or similar
formats and the same mechanisms as employed in HDLC.
HDLC Station Types
Primary station Controls operation of link Frames issued are called commands Maintains separate logical link to each secondary station
Secondary station Under control of primary station Frames issued called responses
Combined station May issue commands and responses
Text book: Pages 213 223 V7: 221 - 228
This section gives you brief description of high-level data link control and
other data link control protocols.
8/2/2019 COM Study Guide 2012 - Complete
50/97
COM: Computer Communications 7.5
Review Activities:
7.1 Describe Flow control
Flow control is a technique for assuring that a transmitting entity
does not overwhelm a receiving entity with data. The receiving entity
typically allocates a data buffer of some maximum length for a transfer.
When data are received, the receiver must do a certain amount of
processing before passing the data to the higher-level software. In the
absence of flow control, the receivers buffer may fill up and overflow
while it is processing old data.
7.2 What are the main functions of the data link layer?
Data link layer is the second layer of the OSI reference model. Itsmain function is to break the continuous bit stream of physical layer into
meaningful frames/blocks. In addition, it provides medium access control
function.
7.3 Briefly describe two flow control techniques.
Stop-and-wait: the transmitter sends a packet and waist for the
acknowledgement from the receiver before sending another packet.
Sliding-window flow control: it can be treated as an extension of stop-and-
wait. Instead of sending one packet and then waiting, a transmitter can
continuously sends a fixed number of packets (window size) without
needing acknowledgement from the receiver. When a packet is
acknowledged, the number of packets equal to the window size can be
transmitted.
7.4 Using an example, explain how parity check is used to detect data
error. OR Use an example to describe an error detection technique for data
transmission.
Parity check is a simple error detection method where a parity bit is
added to detect if a bit error occurred. For example, if we want to send
data 10101110 and even parity is used, then the data including parity bit is
101011101. If any bit is changed, the number of 1 bits will be odd and we
will be sure that one error has occurred.
8/2/2019 COM Study Guide 2012 - Complete
51/97
COMPUTERCOMMUNICATIONS
8
MULTIPLEXING
8/2/2019 COM Study Guide 2012 - Complete
52/97
COM: Computer Communications 8.1
TOPIC 8
8.0 MULTIPLEXING
To make efficient use of high-speed telecommunication lines, some
form of multiplexing is used. Multiplexing allows several transmission
sources to share a larger transmission capacity. The two common
multiplexing are frequency division multiplexing (FDM) and time division
multiplexing (TDM).
8.1 Frequency Division Multiplexing
Useful bandwidth of medium exceeds required bandwidth ofchannel
Each signal is modulated to a different carrier frequency Carrier frequencies separated so signals do not overlap (guard
bands)
e.g. broadcast radio Channel allocated even if no data
Analog Carrier Systems
Hierarchy of FDM schemes Group 12 voice channels (4kHz each) = 48kHz Range 60kHz to 108kHz
Supergroup
60 channel FDM of 5 group signals on carriers between 420kHz and 612 kHzMastergroup - 10 supergroups
Text book: Pages 237 244 V7: 243 - 250
This section gives you brief description of frequency division multiplexing.
8/2/2019 COM Study Guide 2012 - Complete
53/97
COM: Computer Communications8.2
8.2 Synchronous Time Division Multiplexing
Data rate of medium exceeds data rate of digital signal to betransmitted
Multiple digital signals interleaved in time
May be at bit level of blocks Time slots preassigned to sources and fixed Time slots allocated even if no data Time slots do not have to be evenly distributed amongst sourcesTDM Link Control
No headers and tailers
Data link control protocols not neededFlow control
Data rate of multiplexed line is fixed If one channel receiver can not receive data, the others must carry
on
The corresponding source must be quenched This leaves empty slots
Error control - Errors are detected and handled by individual channel
systems
Framing
No flag or SYNC characters bracketing TDM frames Must provide synchronizing mechanism Added digit framing One control bit added to each TDM frame - Looks like another
channel - control channel
Identifiable bit pattern used on control channel e.g. alternating 01010101unlikely on a data channel Can compare incoming bit patterns on each channel with sync
pattern
Pulse Stuffing
Problem - Synchronizing data sources Clocks in different sources drifting
8/2/2019 COM Study Guide 2012 - Complete
54/97
COM: Computer Communications 8.3
Data rates from different sources not related by simple rational number Solution - Pulse Stuffing Outgoing data rate (excluding framing bits) higher than sum of
incoming rates Stuff extra dummy bits or pulses into each incoming signal until it
matches local clock
Stuffed pulses inserted at fixed locations in frame and removed atdemultiplexer
Text book: Pages 244 256 V7: 250 - 259
This section gives you brief description of synchronous time-division
multiplexing.
8.3 Statistical TDM
In Synchronous TDM many slots are wasted Statistical TDM allocates time slots dynamically based on demand Multiplexer scans input lines and collects data until frame full Data rate on line lower than aggregate rates of input linesPerformance
Output data rate less than aggregate input rates May cause problems during peak periods Buffer inputs Keep buffer size to minimum to reduce delay
Asymmetrical Digital Subscriber Line
Link between subscriber and network - Local loop Uses currently installed twisted pair cable - Can carry broader
spectrum; 1 MHz or more
ADSL Design
Asymmetric - Greater capacity downstream than upstream
8/2/2019 COM Study Guide 2012 - Complete
55/97
COM: Computer Communications8.4
Frequency division multiplexing - Lowest 25kHz for voice; Plain oldtelephone service (POTS)
Use echo cancellation or FDM to give two bands
Use FDM within bands Range 5.5km
Textbook: Pages 257 268 V7: 260 - 271
This section gives you brief description of statistical time division
multiplexing.
Review Activities:
8.1 Describe Synchronous data transmission. Compare synchronous time-
division multiplexing and statistical time-division multiplexing
In this transmission mode, synchronization between the transmitter
and receiver fully depends on the clock synchronization. No start bit and
stop bit are used.In both types of multiplexing, the transmission time is divided into
fixed length time slots. In synchronous time division, a transmitter can use
certain time slots (for example, every 4th slot). But in statistical time
division, a transmitter can use any un-used slot. Statistical time division is
more efficient that synchronous time division multiplexing.
8/2/2019 COM Study Guide 2012 - Complete
56/97
COMPUTERCOMMUNICATIONS
9
SWITCHING
8/2/2019 COM Study Guide 2012 - Complete
57/97
COM: Computer Communications 9.1
TOPIC 9
9.0 SWITCHING
For Transmission of data beyond a local area, communication is
typically achieved by transmitting data from source to destination through
a network of intermediate switching nodes; this switched network design is
sometimes used to implement Local Area Networks as well.
9.1 Switching Networks
Long distance transmission is typically done over a network ofswitched nodes
Nodes not concerned with content of data End devices are stations - Computer, terminal, phone, etc. A collection of nodes and connections is a communications
network
Data routed by being switched from node to nodeNodes
Nodes may connect to other nodes only, or to stations and othernodes
Node to node links usually multiplexed Network is usually partially connected - Some redundant
connections are desirable for reliability
Two different switching technologies : Circuit switching, Packetswitching
9.2 Circuit Switching
Dedicated communication path between two stations Three phases Establish, Transfer and, Disconnect Must have switching capacity and channel capacity to establish
connection
Must have intelligence to work out routing
8/2/2019 COM Study Guide 2012 - Complete
58/97
COM: Computer Communications9.2
Circuit Switching - Applications
Inefficient - Channel capacity dedicated for duration of connection,If no data, capacity wasted
Set up (connection) takes time
Once connected, transfer is transparent Developed for voice traffic (phone)
Telecommunication Components
Subscriber -Devices attached to network Local Loop - Subscriber loop, Connection to network Exchange - Switching centers, End office - supports subscribers
Trunks - Branches between exchanges - MultiplexedCircuit Switching Concepts
Digital Switch - Provide transparent signal path between devices Network Interface Control Unit
Establish connections Generally on demand Handle and acknowledge requests Determine if destination is free construct path
Maintain connection Disconnect
Blocking or Non-blocking
Blocking
A network is unable to connect stations because all paths are in use
A blocking network allows this Used on voice systems - Short duration calls
Non-blocking
Permits all stations to connect (in pairs) at once Used for some data connections
Space Division Switching
Developed for analog environment
8/2/2019 COM Study Guide 2012 - Complete
59/97
COM: Computer Communications 9.3
Separate physical paths Crossbar switch
Number of crosspoints grows as square of number ofstations
Loss of crosspoint prevents connection Inefficient use of crosspoints - All stations connected, only
a few crosspoints in use
Non-blockingTime Division Switching
Partition low speed bit stream into pieces that share higher speedstream
e.g. TDM bus switching based on synchronous time division multiplexing Each station connects through controlled gates to high
speed bus
Time slot allows small amount of data onto bus Another lines gate is enabled for output at the same time
Routing
Many connections will need paths through more than one switch Need to find a route Efficiency, Resilience Public telephone switches are a tree structure - Static routing uses
the same approach all the time
Dynamic routing allows for changes in routing depending on traffic- Uses a peer structure for nodes
Text book: Pages 276 288 v7: 299 - 307
This section gives you brief description of circuit switching networks and
circuit switching concept..
9.3 Control Signaling Functions
Audible communication with subscriber Transmission of dialed number
8/2/2019 COM Study Guide 2012 - Complete
60/97
COM: Computer Communications9.4
Call can not be completed indication Call ended indication Signal to ring phone
Billing info Equipment and trunk status info Diagnostic info Control of specialist equipment
Text book: Pages 289 300 V7: 307 - 316
This section gives you brief description of control signaling.
9.4 Packet SwitchingPacket switching was designed to provide a more efficient facility
than circuit switching for bursty data traffic. With packet switching, a
station transmits data in small blocks, called packets. Each packet contains
some portion of the user data plus control information needed for proper
functioning of the network.
Basic Operation Data transmitted in small packets
Typically 1000 octets Longer messages split into series of packets Each packet contains a portion of user data plus some
control info
Control info - Routing (addressing) info Packets are received, stored briefly (buffered) and past on to the
next node - Store and forward
Advantages
Line efficiency
Single node to node link can be shared by many packets over time Packets queued and transmitted as fast as possible
Data rate conversion
Each station connects to the local node at its own speed
8/2/2019 COM Study Guide 2012 - Complete
61/97
COM: Computer Communications 9.5
Nodes buffer data if required to equalize ratesPackets are accepted even when network is busy
Delivery may slow downPriorities can be usedSwitching Technique
Station breaks long message into packets Packets sent one at a time to the network Packets handled in two ways : Datagram, Virtual circuit
Datagram
Each packet treated independently
Packets can take any practical route Packets may arrive out of order Packets may go missing Up to receiver to re-order packets and recover from missing
packets
Virtual Circuit
Preplanned route established before any packets sent
Call request and call accept packets establish connection(handshake)
Each packet contains a virtual circuit identifier instead ofdestination address
No routing decisions required for each packet Clear request to drop circuit Not a dedicated path
Routing - Complex, crucial aspect of packet switched networksCharacteristics required : Correctness, Simplicity, Robustness, Stability,
Fairness, Optimality and Efficiency,
Text book: Pages 304 332 V7: 316 - 332
This section gives you brief description of packet switching network,
routing and X.25.
8/2/2019 COM Study Guide 2012 - Complete
62/97
COM: Computer Communications9.6
Review Activities:
9.1 What is circuit switching? What is packet switching? What are their
respective advantages and disadvantages?
This is a switching technique in which a physical path is set up between
the transmitter and receiver for the duration of data transmission.
definition advantages disadvantages
Circuit
switching
A dedicated physical
connection between
transmitter and receiver is
established for the duration of
Communication
Low delay and
delay jitter. Can
Guarantee
quality.
May be expensive and
less efficient.
Packet
switching
Routers are used to send
packets to different
destinations.
Cheap and
efficient.
Difficult to guarantee
quality.
9.2 In a network that has a maximum packet size of 100 bytes, a maximum
packet lifetime of 10 seconds, and an 10-bit packet sequence number, what
is the maximum data rate per connection (assuming that each packet over a
connection must be uniquely identified using a sequence number)?
Within the lifetime of 10 second, each packet must be uniquely
identified with 10 bits. That is, within 10 seconds, 210
=1024 packets can be
sent. The number of packet per second = 1024/10 packets. So the
maximum data rate = the number of packets per second x packet size =
(1024/10) x 100 x 8 =81920 bps (bits per second).
9.3 In a network that has a maximum packet size of 128 bytes, a maximum
packet lifetime of 20 seconds, and an 8-bit packet sequence number, what
is the maximum data rate per connection (assuming that each packet over a
connection must be uniquely identified using a sequence number)?
Within the lifetime of 20 second, each packet must be uniquely
identified with 8bits. That is within 20 seconds, 28=256 packets can be
sent. The number of packet per second = 256/20 packets. So the maximum
data rate = the number of packets per second x packet size = (256/20) x
128 x 8 =13107.2 bps (bits per second).
8/2/2019 COM Study Guide 2012 - Complete
63/97
COMPUTERCOMMUNICATIONS
10
CONGESTION
CONTROL
8/2/2019 COM Study Guide 2012 - Complete
64/97
COM: Computer Communications 10.1
TOPIC 10
10.0 CONGESTION CONTROL
Congestion occurs when the number of packets being transmitted
through the network approaches the packet handling capacity of the
network. Congestion control aims to keep number of packets below level
at which performance falls off dramatically. Data network is a network of
queues, Generally 80% utilization is critical. Finite queues mean data may
be lost.
10.1 Effects of Congestion
Packets arriving are stored at input buffers Routing decision made Packet moves to output buffer Packets queued for output transmitted as fast as possible
Statistical time division multiplexing If packets arrive to fast to be routed, or to be output, buffers will
fill
Can discard packets Can use flow control
Can propagate congestion through network
Text book: Pages 385 389 V7: 397 - 401
This section gives you brief description of the effect of the congestion.
10.2 Congestion Control
Backpressure
If node becomes congested it can slow down or halt flow ofpackets from other nodes
May mean that other nodes have to apply control on incomingpacket rates
Propagates back to source
8/2/2019 COM Study Guide 2012 - Complete
65/97
COM: Computer Communications10.2
Can restrict to logical connections generating most traffic Used in connection oriented that allow hop by hop congestion
control (e.g. X.25)
Not used in ATM nor frame relay
Only recently developed for IP
Choke Packet
Control packet Generated at congested node Sent to source node e.g. ICMP source quench
From router or destination Source cuts back until no more source quench
message
Sent for every discarded packet, or anticipated Rather crude mechanism
Implicit Congestion Signaling
Transmission delay may increase with congestion Packet may be discarded Source can detect these as implicit indications of congestion Useful on connectionless (datagram) networks. E.g. IP based (TCP
includes congestion and flow control )
Used in frame relay LAPF
Explicit Congestion Signaling
Network alerts end systems of increasing congestion End systems take steps to reduce offered load Backwards
o Congestion avoidance in opposite direction to packetrequired
8/2/2019 COM Study Guide 2012 - Complete
66/97
COM: Computer Communications 10.3
Forwards -Congestion avoidance in same direction aspacket required
Text book: Pages 390 393 V7: 401 - 404This section gives you brief description of various congestion control
techniques.
Review Activities:
10.1 What is the main difference between flow control and congestion
control?
Flow control is concerned with if the receiver can cope with the
data sent by the transmitter and congestion control is concerned with if the
network is overload to the extent that performance is reduced dramatically.
Flow control is an issue specific to a pair of hosts while congestion control
is a global issue.
(b) In a network that has a maximum packet size of 1000 bytes, a
maximum packet lifetime of 10 seconds, and an 8-bit packet sequence
number, what is the maximum data rate per connection (assuming that
each packet over a connection must be uniquely identified using a
sequence number)?
Within 10 second, only 256 packets can be sent, so the data rate =
256 x 1000 x 8/10=204.8 kbps
10.2 A 8920-octet IP datagram is to be transmitted and needs to be
fragmented because it has to pass through an Ethernet with a maximum
payload of 1500 octets. (i) How many fragments are needed? (ii) Explain
how these fragments can be reassembled into the original datagram at
the destination.
(i) Since the IP header has 20 octets, the 8920-octets
Datagram contains 8900 octets of actual data.
8/2/2019 COM Study Guide 2012 - Complete
67/97
COM: Computer Communications10.4
A payload of 1500 octets can carry a maximum 1480
octets of data (the remaining are IP header and other
Headers).
8900/1480= 6.014.
So at least 7 fragments are needed.
(ii) Each fragment contains the fields of length of the
fragment and the offset from the start of the datagram and
a flag to indicate if it is the last fragment of the datagram.
The destination can assemble the original datagram based
on these three pieces of information.
10.3 Data transfer rate
The speed with which data can be transmitted from one device to another.
Data rates are often measured in megabits (million bits) or megabytes
(million bytes) per second. These are usually abbreviated as Mbps and
MBps, respectively.
http://www.webopedia.com/TERM/D/data.htmlhttp://www.webopedia.com/TERM/D/device.htmlhttp://www.webopedia.com/TERM/D/data_transfer_rate.html##http://www.webopedia.com/TERM/D/megabit.htmlhttp://www.webopedia.com/TERM/D/bit.htmlhttp://www.webopedia.com/TERM/D/megabyte.htmlhttp://www.webopedia.com/TERM/D/byte.htmlhttp://www.webopedia.com/TERM/D/byte.htmlhttp://www.webopedia.com/TERM/D/megabyte.htmlhttp://www.webopedia.com/TERM/D/bit.htmlhttp://www.webopedia.com/TERM/D/megabit.htmlhttp://www.webopedia.com/TERM/D/data_transfer_rate.html##http://www.webopedia.com/TERM/D/device.htmlhttp://www.webopedia.com/TERM/D/data.html8/2/2019 COM Study Guide 2012 - Complete
68/97
COMPUTERCOMMUNICATIONS
11
LOCAL AREA
NETWORK
8/2/2019 COM Study Guide 2012 - Complete
69/97
COM: Computer Communications 11.1
TOPIC 11
11.0 LOCAL AREA NETWORK
A Local Area Network (LAN) consists of a shared transmission
medium and a set of hardware and software for interfacing devices to the
medium and regulating the orderly access to the medium. The topologies
that have been used for LANs are ring, bus, tree and star. Traditional LAN
provides data rate in a range from about 1 to 20 Mbps and high-speed
LANs provides data rate of 100 Mbps to 1 Gbps.
11. LAN Applications
Personal computer LANs Low cost Limited data rate
Back end networks and storage area networks Interconnecting large systems (mainframes and large
storage devices)
High data rate High speed interface Distributed access Limited distance Limited number of devices
High speed office networks Desktop image processing High capacity local storage
Backbone LANs
Interconnect low speed local LANs Reliability Capacity & Cost
Text book: Pages 425 427 V7: 466 - 475
This section gives you brief description of Local area network
applications.
8/2/2019 COM Study Guide 2012 - Complete
70/97
COM: Computer Communications1.2
11.2 LAN Architecture
Protocol Architecture
Lower layers of OSI model
IEEE 802 reference model Physical Logical link control (LLC) Media access control (MAC)
Media Access Control
Assembly of data into frame with address and error detection fields Disassembly of frame
Address recognition
Error detection Govern access to transmission medium
Not found in traditional layer 2 data link control For the same LLC, several MAC options may be available
LAN Topologies
Bus and Tree
Multipoint medium Transmission propagates throughout medium Heard by all stations
Need to identify target station - Each station has uniqueaddress
Full duplex connection between station and tap Allows for transmission and reception
Need to regulate transmission To avoid collisions To avoid hogging - Data in small blocks - frames
Terminator absorbs frames at end of medium
Ring Topology
Repeaters joined by point to point links in closed loop
8/2/2019 COM Study Guide 2012 - Complete
71/97
COM: Computer Communications 11.3
Receive data on one link and retransmit on another Links unidirectional Stations attach to repeaters
Data in frames Circulate past all stations Destination recognizes address and copies frame Frame circulates back to source where it is removed
Media access control determines when station can insert frame
Star Topology
Each station connected directly to central node Usually via two point to point links
Central node can broadcast Physical star, logical bus Only one station can transmit at a time
Central node can act as frame switch
Text book: Pages 428 439 V7: 475 - 483
This section gives you brief description of protocol architecture LAN
topologies and media access control.
11.3 Ethernet
The most commonly used medium access control technique for bus
and star topologies is carrier sense multiple access with collision detection
(CSMA/CD). CSMA/CD and its precursors can be termed random
(stations access medium randomly) or contention (station content for time
on medium) techniques.
ALOHA
Packet Radio When station has frame, it sends Station listens (for max round trip time)plus small increment If ACK, fine. If not, retransmit
8/2/2019 COM Study Guide 2012 - Complete
72/97
COM: Computer Communications1.4
If no ACK after repeated transmissions, give up Frame check sequence (as in HDLC) If frame OK and address matches receiver, send ACK
Frame may be damaged by noise or by another station transmittingat the same time (collision)
Any overlap of frames causes collision Max utilization 18%
Slotted ALOHA
Time in uniform slots equal to frame transmission time Need central clock (or other sync mechanism) Transmission begins at slot boundary Frames either miss or overlap totally Max utilization 37%
CSMA
Propagation time is much less than transmission time All stations know that a transmission has started almost
immediately
First listen for clear medium (carrier sense) If medium idle, transmit If two stations start at the same instant, collision Wait reasonable time (round trip plus ACK contention) No ACK then retransmit Max utilization depends on propagation time (medium length) and
frame length
Longer frame and shorter propagation gives betterutilization
CSMA/CD
With CSMA, collision occupies medium for duration oftransmission
Stations listen whilst transmitting If medium idle, transmit If busy, listen for idle, then transmit
8/2/2019 COM Study Guide 2012 - Complete
73/97
COM: Computer Communications 11.5
If collision detected, jam then cease transmission After jam, wait random time then start again
Binary exponential back offCollision Detection
On baseband bus, collision produces much higher signal voltagethan signal
Collision detected if cable signal greater than single station signal Signal attenuated over distance Limit distance to 500m (10Base5) or 200m (10Base2) For twisted pair (star-topology) activity on more than one port is
collision Special collision presence signal
Text book: Pages 470 481 V7: 502 - 515
This section gives you brief description of carrier sense multiple access
with collision detection technique.
Review Activities:
11.1 Describe three medium access control techniques commonly used in
local area networks.
(i) Carrier sense multiple access (CSMA): It is a contention media access
control mechanism. The access rules are:
(1) Check if the transmission medium is busy. If the medium is
idle, transmit; otherwise, go to step (2).
(2) If the medium is busy, continue checking until it is idle, then
transmit data immediately.
(ii) Carrier sense multiple access with collision detection (CSMA/CD): It
is a contention media access control mechanism. The access rules are:
(1) Check if the transmission medium is busy. If the medium is
idle, transmit; otherwise, go to step (2).
(2) If the medium is busy, continue checking until it is idle, then
transmit data immediately.
8/2/2019 COM Study Guide 2012 - Complete
74/97
COM: Computer Communications1.6
(3) If a collision is detected during transmission, send a signal to
ensure all stations know the collision and then stop transmission.
(4) After sending the collision signal, wait a random amount of
time and then transmit again. (repeat from step (1)).
(iii) Token passing: A token circulates around the network. A station
captures a free token can send certain amount of data. Once completing
data transmission, the station set the token free and another station can
capture it and send data.
11.2 Describe the operating principle of the token ring network.
The following are layers and corresponding common protocols:
Network access: CSMA/CD, token bus. Internet layer: IP Transport layer: TCP, UDP Application layer: SMTP, FTP, MIME, and HTTP.
11.3 What is a medium access control (MAC) layer? Describe two MAC
protocols?
11.4 WANConnection Types (Public Carriers):
When designing a wide area network (WAN), one of the most challenging
issues is choosing the correct connection type. You need to consider
several factors before implementation can beginand a solid
understanding of all the connection types is critical to making the right
choice. Most carriers offer three connection types:
1. Circuit-switched connections2. Packet-switched or cell-switched connections3. Dedicated connections
Each type of connection has its advantages and disadvantages. This article
will summarize what each connection type has to offer, with consideration
given to bandwidth, availability, cost, and ease of management.
8/2/2019 COM Study Guide 2012 - Complete
75/97
COM: Computer Communications 11.7
Circuit-switched connections
Circuit-switched connections are currently the most popular type of WAN
connection. Circuit switching transmits data streams and datagrams across
dedicated physical circuits. To provide asynchronous dial-in and ISDN
services, the telephone companies use circuit switching.
Asynchronous dial-in
The public switched telephone network (PSTN) uses circuit-switched
technology to provide asynchronous services (otherwise known as normal
telephone service). Asynchronous dial-in connections offer a low-
bandwidth, easily managed, cost-effective solution that is available almost
anywhere in the world.
ISDN
Integrated Services Digital Network(ISDN) is a digital circuit switching
technology used to transport voice, data, and video. With speeds up to 1.54
Mbps (T1) in North America and 2.048 Mbps (E1) in Europe, ISDN is a
low- to medium-bandwidth solution with relatively low cost. However,
availability is somewhat limited and configuration and support are more
difficult than for asynchronous communication.
Packet-switched or cell-switched connections
Packet-switched and cell-switched networks are point-to-point connections
that travel across a public carriers n