Data Communications and Networking Overview
Data Communications and Networking Overview
(BCS502)
Textbook
• Behrouz A. Forouzan, Data Communications and Networking, 5th
Edition, Tata McGraw-Hill,2013
Reference Books:
[Link] L. Peterson and Bruce S. Davie: Computer Networks – A
Systems Approach, 4th Edition, Elsevier, 2019.
[Link] F. Mir: Computer and Communication Networks, 2nd
Edition, Pearson Education, 2015.
[Link] Stallings, Data and Computer Communication 10th
Edition, Pearson Education, Inc., 2014
Module 1
Data Communications
• Data communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable
• Four fundamental characteristics of Data Communication are:
1. Delivery: The system must deliver data to the correct destination.
2. Accuracy: The system must deliver the data accurately.
3. Timeliness:
• The system must deliver data in a timely manner.
• Data delivered late are useless.
• In the case of video and audio, timely delivery means delivering data as they are produced, in the same
order that they are produced, and without significant delay. This kind of delivery is called real-time
transmission.
4. Jitter:
• Jitter refers to the variation in the packet arrival time.
• For example, let us assume that video packets are sent every 30 ms. If some of the packets arrive
with 30-ms delay and others with 40-ms delay, an uneven quality in the video is the result.
Data Communications- Components
Data Communications- Components(Contd...)
1. Message: The message is the information (data) to be communicated. Popular
forms of information include text, numbers, audio, and video.
2. Sender: The sender is the device that sends the data message. It can be a
computer, workstation etc
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation etc.
4. Transmission medium: The transmission medium is the physical path by which
a message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol: A protocol is a set of rules that govern data communications. Without
a protocol, two devices may be connected but not communicating
Data Communications- Data Representation
1. Text:
• Text is represented as a bit pattern, a sequence of bits (0s or 1s)
• Different sets of bit patterns have been designed to represent text symbols. Each set is
called a code, and the process of representing symbols is called coding.
2. Numbers:
• Numbers are also represented by bit patterns and the number is directly converted to a
binary number.
Data Communications- Data Representation
3. Images:
• Images are also represented by bit patterns
• In its simplest form, an image is composed of a matrix of pixels (picture elements), where
each pixel is a small dot. The size of the pixel depends on the resolution
• After an image is divided into pixels, each pixel is assigned a bit pattern.
• If the image made only on black and-white dots (0 or 1)
• In the case of Gray scale
• black pixel - 00
• dark gray pixel- 01
• light gray pixel- 10
• white pixel -11
Data Communications- Data Representation
• RGB : Each color is made of a combination of three primary colors: red,
green, and blue
• YCM : color is made of a combination of three other primary colors: yellow,
cyan, and magenta
4. Video:
• Half-duplex
Data Communications-Data Flow
• Full duplex
NETWORKS
• Connecting device :
• Router- which connects the network to other networks
• Switch- which connects devices together
• Modem (modulator-demodulator)- which changes the form of data
1. Performance
• It measures based on transit time and response time
• Performance is often evaluated by two networking metrics: throughput and delay
⮚ Throughput:Number of bits transmitted in per second
⮚ Delay: time taken to transmit data
2. Reliability
• Reliable networking ensures that data is transmitted accurately, in order, and without
errors between devices or systems.
3. Security
• Protecting data from unauthorized access, protecting data from damage,
development.
NETWORKS -Types of Connection
Types of connection describe the way devices communicate with each other over
a network
• Point-to-Point
• Multipoint or Multidrop
NETWORKS -Types of Connection
• Point-to-Point
– Dedicated link between two devices
– The entire capacity of the channel is reserved
– Eg., Microwave link, TV remote control
• Multipoint or Multidrop
⮚ Find the number of physical links in a fully connected mesh network with n node is n (n – 1)
NETWORKS -Physical Topology
Advantages:
1. Eliminating the traffic problem
2. Robust- A network to maintain its performance and functionality despite failures, errors, or
unpredictable conditions
3. Privacy or security
4. Fault identification and fault isolation
Disadvantages:
5. Amount of cabling and the number of I/O ports
6. Installation and reconnection
7. Hardware required to connect each link is expensive
NETWORKS -Physical Topology
❖ Star Topology
• Advantages:
1. less expensive than a mesh topology, easy to install and
reconfigure and less cabling needed
2. If one link fails, only that link is affected
• Disadvantage
1. The dependency of the whole topology on one single point,
the hub. If the hub goes down, the whole system is dead.
NETWORKS -Physical Topology
❖Bus Topology
❖ Long cable acts as a backbone to link all the devices in a network
network
• Disadvantage
1. Unidirectional traffic
2. A break in the ring (such as a disabled station) can disable
the entire network
This weakness can be solved by using a dual ring or a
switch capable of closing off the break
Network Types- LAN ( Local Area Network)
⮚In the past, all hosts in a network were connected ⮚Most LANs use a smart connecting switch, which is
through a common cable, which meant that a packet able to recognize the destination address of the
sent from one host to another was received by all packet and guide the packet to its destination
hosts without sending it to all other hosts
⮚The intended recipient kept the packet; the others
dropped the packet
Network Types- WAN ( Wide Area Network)
• WAN has a wide geographical span,
spanning a town, a state, a country, or
even the world
• WAN interconnects connecting devices
such as switches, routers, or modems. point-to-point WAN
• WANs today:
• Point-to-point WANs- Establishes a dedicated and
direct connection between two devices like router,switched etc
• Switched WANs -Uses a shared infrastructure, where
multiple devices or sites are connected through switching
nodes.
Switched WAN
Network Types- Switching
• Switching refers to the process of selecting the path that data will take
across a network to reach its destination
•A switch needs to forward data from a network to another network when
required
Two types of switched networks are,
• Circuit-Switched Network
• Packet-Switched Network
1.27
Circuit-Switched Network
• In a circuit-switched network, a dedicated connection, called a circuit, is
always available between the two end systems; the switch can only make it
active or inactive.
• This phrase highlights how the Internet is not a single network but a
vast, interconnected system of smaller networks (like local area
networks or LANs, wide area networks or WANs, and others) that work
together to form a global communication infrastructure.
1.32
The Internet today
1.33
The Internet today
1. Customer Networks:
These are individual networks belonging to users or organizations (e.g., home users,
businesses, educational institutions). These networks rely on Internet service providers
(ISPs) for access to the wider Internet
2. Provider Networks: Provider networks manage traffic between customer networks
and core infrastructure like Internet backbones.
3. Backbones: The backbone represents the core infrastructure of the Internet. These are
high-capacity networks that carry large amounts of traffic across long distances, such as
between cities or countries.
4. Peering points are locations where different networks (such as provider networks and
backbone networks) connect and exchange traffic. These points help ensure that data can
flow efficiently between different networks without bottlenecks.
1.34
Accessing the Internet
• The Internet today is an internetwork that allows any user to become part of it. The user,
however, needs to be physically connected to an ISP. The physical connection is normally
done through a point-to-point WAN.
• Dial-up service: The first solution is to add to the telephone line a modem that converts
data to voice. The software installed on the computer dials the ISP and imitates making a
telephone connection.
• DSL Service (Digital Subscriber Line): Since the advent of the Internet, some telephone
companies have upgraded their telephone lines to provide higher speed Internet services to
residences or small businesses.
1-42
Accessing the Internet(Cont…)
Using Cable Networks
• More and more residents over the last two decades have begun using cable TV services instead of
antennas to receive TV broadcasting
• The cable companies have been upgrading their cable networks and connecting to the Internet. A
residence or a small business can be connected to the Internet by using this service
• It provides a higher speed connection, but the speed varies depending on the number of neighbors
that use the same cable
• Internet Control Message Protocol (ICMP) : Helps IP to report some problems when
routing a packet
• Internet Group Management Protocol (IGMP) : Helps IP in multitasking
Description of Each Layer
• Protocols :
• Dynamic Host Configuration Protocol (DHCP) : Helps IP to get the network-layer
address for a host
• Address Resolution Protocol (ARP): Helps IP to find the MAC Address(Media
Access Control ) of a host or a router
Data-link Layer:
• The data-link layer takes a datagram and encapsulates it in a packet called a frame
1. A header (which includes the source and destination MAC addresses)
2. The payload (the fragment of the datagram)
3. A trailer (which often includes error-checking data like CRC).
• TCP/IP does not define any specific protocol for the data-link layer.
Description of Each Layer
• Physical Layer:
• Physical layer is responsible for carrying individual bits in a frame across
the link
• Bits received in a frame from the data-link layer are trans_x0002_formed
and sent through the transmission media
Description of Each Layer
Description of Each Layer
Description of Each Layer
Description of Each Layer
Encapsulation and Decapsulation
Encapsulation and Decapsulation
• Encapsulation at the Source Host:
2. The transport layer takes the message as the payload, the load that the transportlayer
should take care of. It adds the transport layer header to the payload, which contains the
identifiers of the source and destination application programs that want to
communicate plus some more information that is needed for the end-to-end delivery of
the message, such as information needed for flow, error control, or congestion control.
The result is the transport-layer packet, which is called the segment (in TCP) and the
user datagram (in UDP). The transport layer then passes the packet to the network layer.
Encapsulation and Decapsulation
• Encapsulation at the Source Host:
3. The network layer takes the transport-layer packet as data or payload and adds its
own header to the payload. The header contains the addresses of the source and
destination hosts and some more information used for error checking of the
header, fragmentation information, and so on. The result is the network-layer
packet, called a datagram. The network layer then passes the packet to the data-link
layer.
4. The data-link layer takes the network-layer packet as data or payload and adds its
own header, which contains the link-layer addresses of the host or the next hop
(the router). The result is the link-layer packet, which is called a frame. The frame is
passed to the physical layer for transmission.
Encapsulation and Decapsulation
• Decapsulation and Encapsulation at the Router
1. After the set of bits are delivered to the data-link layer, this layer decapsulates the
datagram from the frame and passes it to the network layer
2. The network layer only inspects the source and destination addresses in the datagram
header and consults its forwarding table to find the next hop to which the datagram is
to be delivered. The contents of the datagram should not be changed by the network
layer in the router unless there is a need to fragment the datagram if it is too big to be
passed through the next link. The datagram is then passed to the data-link layer of the
next link
3. The data-link layer of the next link encapsulates the datagram in a frame and passes it
to the physical layer for transmission.
Encapsulation and Decapsulation
RJ - Registered Jack
Unshielded Twisted-Pair Cable-
Connectors
Twisted-Pair Cable- Performance
• I - Angle of incidence
Fiber- Optic Cable - Propagation Modes
Fiber- Optic Cable - Fiber Size
Fiber-Optic Cable Connectors
• Subscriber channel (SC) connector -
• Used for cable TV
• uses a push/pull locking system
• Straight-tip (ST) connector
• used for connecting cable to
networking devices
• uses a bayonet locking system and is
more reliable than SC
• MT-RJ is a connector that is the same
size as RJ45
Fiber-Optic Cable - Applications
• Fiber-optic cable is often found in backbone networks because its wide
bandwidth is cost-effective
Applications:
Microwaves are used for unicast communication such as cellular telephones,
satellite networks, and wireless LANs
UNGUIDED MEDIA: Infrared
• Frequencies from 300 GHz to 400 THz can be used for short-range
communication
• Having high frequencies, cannot penetrate walls
Advantages:
• A short-range communication system in one room cannot be affected
by another system in the next room
• We use our infrared remote control, we do not interfere with the use
of the remote by our neighbors.
UNGUIDED MEDIA: Infrared
• Disadvantages:
We cannot use infrared waves outside a building because the sun’s
rays contain infrared waves that can interfere with the communication.
Applications:
Infrared signals can be used for short-range communication in a
closed area using line-of-sight propagation
Switching: Packet Switching and its types
• Datagram Networks
• Virtual-Circuit Networks
1. Datagram Networks:
● The routing tables are dynamic and are updated periodically. The
destination addresses and the corresponding forwarding output ports are
recorded in the tables.
1. Setup Phase:
2. Data transfer phase
3. Teardown phases
● Setup phase: the source and destination use their global addresses to help
switches make table entries for the connection.
● Small number that has only switch scope; it is used by a frame between two
Virtual-Circuit Networks:
Virtual-Circuit Networks:
Virtual-Circuit Networks: Setup Phase
Setup Request:
Virtual-Circuit Networks: Setup request
Virtual-Circuit Networks: Setup Phase
1. Source A sends a setup frame to switch 1.
2. Switch 1 receives the setup request frame. It knows that a frame going
from A to B goes out through port 3 For the moment, assume that it
knows the output port. The switch creates an entry in its table for this
virtual circuit, but it is only able to fill three of the four columns. The
switch assigns the incoming port (1) and chooses an available incoming
VCI (14). It does not yet know the outgoing VCI, which will be found
during the acknowledgment step. The switch then forwards the frame
through port 3 to switch 2.
3. Switch 3 receives the setup request frame. Again, three columns are
completed: incoming port (2), incoming VCI (22), and outgoing port
(3).
Virtual-Circuit Networks: Setup Phase
[Link] 2 receives the setup request frame. The same events happen
here as at switch 1; three columns of the table are completed: in this
case, incoming port (1), incoming VCI (66), and outgoing port (2).
[Link] 3 receives the setup request frame. Again, three columns are
completed: incoming port (2), incoming VCI (22), and outgoing port
(3).
[Link] B receives the setup frame, and if it is ready to receive
frames from A, it assigns a VCI to the incoming frames that come from
A, in this case 77. This VCI lets the destination know that the frames
come from A, and not other sources.
Virtual-Circuit Networks: Acknowledgment
Phase
Virtual-Circuit Networks: Acknowledgment
Phase
1. The destination sends an acknowledgment to switch 3. The
acknowledgment carries the global source and destination addresses so
the switch knows which entry in the table is to be completed. The frame
also carries VCI 77, chosen by the destination as the incoming VCI for
frames from A. Switch 3 uses this VCI to complete the outgoing VCI
column for this entry. Note that 77 is the incoming VCI for destination
B, but the outgoing VCI for switch 3.
2. Switch 3 sends an acknowledgment to switch 2 that contains its
incoming VCI in the table, chosen in the previous step. Switch 2 uses
this as the outgoing VCI in the table.
3. Switch 2 sends an acknowledgment to switch 1 that contains its
incoming VCI in the table, chosen in the previous step. Switch 1 uses
this as the outgoing VCI in the table
Virtual-Circuit Networks: Acknowledgment
Phase
[Link] switch 1 sends an acknowledgment to source A that contains
its incoming VCI in the table, chosen in the previous step.
[Link] source uses this as the outgoing VCI for the data frames to be
sent to destination B.
Virtual-Circuit Networks:Data Transfer
Phase
Virtual-Circuit Networks:Data Transfer
Phase
Virtual-Circuit Networks:Tear DownPhase
● In this phase, source A, after sending all frames to B, sends a special frame called
a teardown request. Destination B responds with a teardown confirmation frame.
All switches delete the corresponding entry from their tables
Efficiency:
In virtual-circuit switching, all packets belonging to the same source and destination
travel the same path, but the packets may arrive at the destination with different
delays if resource allocation is on demand.