CS8591 CN Unit 1
CS8591 CN Unit 1
CS8591 CN Unit 1
INTRODUCTION
Data communications are the exchange of data between two devices via some form of transmission medium
such as a wire cable. For data communications to occur, the communicating devices must be part of a
communication system made up of a combination of hardware (physical equipment) and software (programs).
The effectiveness of a data communications system depends on four fundamental characteristics: delivery,
accuracy, timeliness, and jitter.
1. Delivery. The system must deliver data to the correct destination. Data must be received by the intended
device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been altered in transmission and left
uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late are useless. In the case of
video and audio, timely delivery means delivering data as
they are produced, in the same order that they are produced, and without significant delay. This kind of
delivery is called real-time transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of audio
or video packets. For example, let us assume that video packets are sent every 30 ms. If some of the packets
arrive with 30-ms delay and others with 40-ms delay, an uneven quality in the video is the result.
Components
A data communications system has five components.
1. Message. The message is the information (data) to be communicated. Popular forms of information include
text, numbers, pictures, audio, and video.
2. Sender. The sender is the device that sends the data message. It can be a computer, workstation, telephone
handset, video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer, workstation, telephone
handset, television, and so on.
4. Transmission medium. The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic
cable, and radio waves.
5. Protocol. A protocol is a set of rules that govern data communications. It represents an agreement between
the communicating devices. Without a protocol, two devices may be connected but not communicating, just as
a person speaking French cannot be understood by a person who speaks only Japanese.
1.NETWORKS
Network is the interconnection of a set of devices capable of communication. In this definition, a device can be
a host (or an end system as it is sometimes called) such as a large computer, desktop, laptop, workstation,
cellular phone, or security system.
A device can also be a connecting device such as a router, which connects the network to other networks, a
switch, which connects devices together, a modem (modulator-demodulator), which changes the form of data,
and so on.
These devices in a network are connected using wired or wireless transmission media such as cable or air.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are performance,
reliability, and security.
Type of Connection
A network is two or more devices connected through links. A link is a communications pathway that
transfers data from one device to another. For visualization purposes, it is simplest to imagine any link as
a line drawn between two points. For communication to occur, two devices must be connected in some
way to the same link at the same time.
There are two possible types of connections: point-to-point and multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire capacity of the
link is reserved for transmission between those two devices. Most point-to-point connections use an
actual length of wire or cable to connect the two ends, but other options, such as microwave or satellite
links, are also possible (see Figure 1.3a). When we change television channels by infrared remote
control, we are establishing a point-to-point connection between the remote control and the television’s
control system.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific devices share a
single link In a multipoint environment, the capacity of the channel is shared, either spatially or temporally. If
several devices can use the link simultaneously, it is a spatially shared connection. If users must take turns, it
is a timeshared connection.
PHYSICAL TOPOLOGY
The term physical topology refers to the way in which a network is laid out physically. Two or more devices
connect to a link; two or more links form a topology. The topology of a network is the geometric
representation of the relationship of all the links and linking devices (usually called nodes) to one another.
There are four basic topologies possible: mesh, star, bus, and ring.
Mesh Topology
Mesh topology, every device has a dedicated point-to-point link to every other device. The term dedicated
means that the link carries traffic only between the two devices it connects.
To find the number of physical links in a fully connected mesh network with n nodes, we first consider that
each node must be connected to every other node.
Node 1 must be connected to n – 1 nodes, node 2 must be connected to n – 1 nodes, and finally node n must be
connected to n – 1 nodes. We need n (n – 1) physical links. However, if each physical link allows
communication in both directions (duplex mode), we can divide the number of links by 2. In other words, we
can say that in a mesh topology, we need n (n – 1) / 2 duplex-mode links. To accommodate that many
links,every device on the network must have n – 1 input/output (I/O) ports (see Figure 1.4) to be connected to
the other n – 1 stations.
III YEAR/V SEM
Page 4
CS8591-COMPUTER NETWORKS-UNIT-1
Advantages:
1. First, the use of dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by multiple devices.
2. Second, a mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire
system.
3. Third, there is the advantage of privacy or security. When every message travels along a dedicated line,
only the intended recipient sees it. Physical boundaries prevent other users from gaining access to
messages.
4. Finally, point-to-point links make fault identification and fault isolation easy. Traffic can be routed to
avoid links with suspected problems. This facility enables the network manager to discover the precise
location of the fault and aids in finding its cause and solution.
Disadvantages
First, because every device must be connected to every other device, installation and
reconnection are difficult.
Second, the sheer bulk of the wiring can be greater than the available space (in walls, ceilings,
or floors) can accommodate.
Finally, the hardware required to connect each link (I/O ports and cable) can be prohibitively
expensive. For these reasons a mesh topology is usually implemented in a limited fashion,
Example: One practical example of a mesh topology is the connection of telephone regional offices in which
each regional office needs to be connected to every other regional office.
For another Example: Tennis nets and football goals.
Star Topology
Star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub.
The devices are not directly linked to one another. Unlike a mesh topology, a star topology does not allow
direct traffic between devices. The controller acts as an exchange: If one device wants to send data to another,
it sends the data to the controller, which then relays the data to the other connected device.
A star topology is less expensive than a mesh topology. In a star, each device needs only one
In a star, each device needs only one link and one I/O port to connect it to any number of others. This factor
also makes it easy to install and reconfigure. Far less cabling needs to be housed, and additions, moves, and
deletions involve only one connection: between that device and the hub
Advantage
Robustness. If one link fails, only that link is affected. All other links remain active. This factor also
lends itself to easy fault identification and fault isolation. As long as the hub is working, it can be used
to monitor link problems and bypass defective links.
Disadvantage
is the dependency of the whole topology on one single point, the hub. If the hub goes down, the whole
system is dead.
Although a star requires far less cable than a mesh, each node must be linked to a central hub. For this reason,
often more cabling is required in a star than in some other topologies (such as ring or bus).
Example:
The star topology is used in local-area networks (LANs), High-speed LANs often use a star topology with a
central hub.
Bus Topology
A bus topology, on the other hand, is multipoint. One long cable acts as a backbone to link all the devices in a
network.
Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the
device and the main cable. A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone, some of
its energy is transformed into heat. Therefore, it becomes weaker and weaker as it travels farther and farther.
For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
Advantages
bus topology include ease of installation. Backbone cable can be laid along the most efficient path,
then connected to the nodes by drop lines of various lengths.
In a bus, this redundancy is eliminated. Only the backbone cable stretches through the entire facility.
Each drop line has to reach only as far as the nearest point on the backbone.
Disadvantages
Difficult reconnection and fault isolation. A bus is usually designed to be optimally efficient at
installation.
Example: An example of bus topology is connecting two floors through a single line.
Ring Topology
Ring topology, each device has a dedicated point-to-point connection with only the two devices on either side
of it. A signal is passed along the ring in one direction, from device to device, until it reaches its destination.
Each device in the ring incorporates a repeater. When a device receives a signal intended for another device,
its repeater regenerates the bits and passes them along
Advantage
A ring is relatively easy to install and reconfigure. Each device is linked to only its immediate
neighbors (either physically or logically).
To add or delete a device requires changing only two connections. The only constraints are media and
traffic considerations (maximum ring length and number of devices).
In addition, fault isolation is simplified. Generally, in a ring a signal is circulating at all times. If one
device does not receive a signal within a specified period, it can issue an alarm. The alarm alerts the
network operator to the problem and its location.
Disadvantage
Unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a disabled
station) can disable the entire network. This weakness can be solved by using a dual ring or a switch
capable of closing off the break.
Example:
Ring topology was prevalent when IBM introduced its local-area network, Token Ring. Today, the
need for higher-speed LANs has made this topology less popular.
2.TYPES OF NETWORKS
A device in this definition can also be a connecting device such as a router, which connects the
network to other networks, a switch, which connects devices together, a modem (modulator-
demodulator), which changes the form of data, and so on. These devices in a network are
connected using wired or wireless transmission media such as cable or air.
To discuss different types of networks, The criteria of distinguishing one type of network from
another is few criteria such as size, geographical coverage, and ownership. There are two types
of networks, LANs and WANs, we define switching, which is used to connect networks to form
an internetwork (a network of networks).
Local Area Network
A local area network (LAN) is usually privately owned and connects some hosts in a single
office, building, or campus. Depending on the needs of an organization, a LAN can be as simple
as two PCs and a printer in someone’s home office, or it can extend throughout a company and
include audio and video devices. Each host in a LAN has an identifier, an address, that uniquely
defines the host in the LAN. A packet sent by a host to another host carries both the source host’s
and the destination host’s addresses.
All hosts in a network were connected through a common cable, which meant that a packet sent
from one host to another was received by all hosts. The intended recipient kept the packet; the
others dropped the packet. Today, most LANs use a smart connecting switch, which is able to
recognize the destination address of the packet and guide the packet to its destination without
sending it to all other hosts. The switch alleviates the traffic in the LAN and allows more than
one pair to communicate with each other at the same time if there is no common source and
destination among them. Note that the above definition of a LAN does not define the minimum
or maximum number of hosts in a LAN.
Wide Area Network
communication companies and leased by an organization that uses it. We see two distinct
examples of WANs today: point-to-point WANs and switched WANs.
Point-to-Point WAN
Switched WAN
A switched WAN is a network with more than two ends. A switched WAN, as we will see
shortly, is used in the backbone of global communication today. switched WAN is a combination
of several point-to-point WANs that are connected by switches
Internetwork
it is very rare to see a LAN or a WAN in isolation; they are connected to one another. When two
or more networks are connected, they make an internetwork, or internet. As an example, assume
that an organization has two offices, one on the east coast and the other on the west coast. Each
office has a LAN that allows all employees in the office to communicate with each other. To
make the communication between employees at different offices possible, the management
leases a point-to-point dedicated WAN from a service provider, such as a telephone company,
and connects the two LANs.
When a host in the west coast office sends a message to another host in the same office, the router blocks the
message, but the switch directs the message to the destination. On the other hand, when a host on the west
coast sends a message to a host on the east coast, router R1 routes the packet to router R2, and the packet
reaches the destination.
SWITCHING
An internet is a switched network in which a switch connects at least two links together. A switch needs to
forward data from a network to another network when required. The two most common types of switched
networks are circuit-switched and Packet-switched networks.
In a circuit-switched network, a dedicated connection, called a circuit, is always available between the two end
systems; the switch can only make it active or inactive.
In the above Fig shows a very simple switched network that connects four telephones to each end. We have
used telephone sets instead of computers as an end system because circuit switching was very common in
telephone networks in the past, although part of the telephone network today is a packet-switched network.
The four telephones at each side are connected to a switch. The switch connects a telephone set at one side to a
telephone set at the other side. The thick line connecting two switches is a high-capacity communication line
that can handle four voice communications at the same time; the capacity can be shared between all pairs of
telephone sets. The switches used in this example have forwarding tasks but no storing capability.
Packet-Switched Network
In a computer network, the communication between the two ends is done in blocks of data called packets. In
other words, instead of the continuous communication we see between two telephone sets when they are being
used, we see the exchange of individual data packets between the two computers. This allows us to make the
switches function for both storing and forwarding because a packet is an independent entity that can be stored
and sent later.
A router in a packet-switched network has a queue that can store and forward the packet. Now assume that the
capacity of the thick line is only twice the capacity of the data line connecting the computers to the routers. If
only two computers (one at each site) need to communicate with each other, there is no waiting for the
packets. However, if packets arrive at one router when the thick line is already working at its full capacity, the
packets should be stored and forwarded in the order they arrived. The two simple examples show that a
packet-switched network is more efficient than a circuit switched network, but the packets may encounter
some delays.
THE INTERNET
Internet is two or more networks that can communicate with each other and is composed of thousands of
interconnected networks.
The figure shows the Internet as several backbones, provider networks, and customer networks.
At the top level, the backbones are large networks owned by some communication companies such as
Sprint, Verizon (MCI), AT&T, and NTT. The backbone networks are connected through some
complex switching systems, called peeringpoints.
At the second level, there are smaller networks, called provider networks that use the services of the
backbones for a fee. The provider networks are connected to backbones and sometimes to other
provider networks. The customer networks are networks at the edge of the Internet that actually use the
services provided by the Internet. They pay fees to provider networks for receiving services.
Backbones and provider networks are also called Internet Service Providers (ISPs). The backbones are
often referred to as international ISPs; the provider networks are often referred to as national or
regional ISPs.
DSL Service. Since the advent of the Internet, some telephone companies have upgraded their
telephone lines to provide higher speed Internet services to residences or small businesses. The DSL
service also allows the line to be used simultaneously for voice and data communication.
3.PROTOCOL LAYERING
In data communication and networking, a protocol defines the rules that both the sender and receiver and all
intermediate devices need to follow to be able to communicate effectively. When communication is simple, we
may need only one simple protocol; when the communication is complex, we may need to divide the task
between different layers, in which case we need a protocol at each layer, or protocol layering.
Principles of Protocol Layering
First Principle
The first principle dictates that if we want bidirectional communication, we need to make each layer so that it
is able to perform two opposite tasks, one in each direction. For example, the third layer task is to listen (in one
direction) and talk (in the other direction). The second layer needs to be able to encrypt and decrypt. The first
layer needs to send and receive mail.
Second Principle
The second principle that we need to follow in protocol layering is that the two objects under each layer at
both sites should be identical. For example, the object under layer 3 at both sites should be a plaintext letter.
The object under layer 2 at both sites should be a ciphertext letter. The object under layer 1 at both sites should
be a piece of mail.
Logical Connections
After following the above two principles, we can think about logical connection between each layer as shown
in Figure 2.3. This means that we have layer-to-layer communication. Maria and Ann can think that there is a
logical (imaginary) connection at each layer through which they can send the object created from that layer.
We will see that the concept of logical connection will help us better understand the task of layering
Example:
Assume Maria and Ann are neighbours with a lot of common ideas. Communication between Maria and Ann
takes place in one layer, face to face, in the same language, as shown in Fig
Even in this simple scenario, we can see that a set of rules needs to be followed.
First, Maria and Ann know that they should greet each other when they meet.
Second, they know that they should confine their vocabulary to the level of their friendship.
Third, each party knows that she should refrain from speaking when the other party
is speaking.
Fourth, each party knows that the conversation should be a dialog, not a monolog: both should have the
opportunity to talk about the issue.
Fifth, they should exchange some nice words when they leave.
Scenario 2
Let us assume that Maria sends the first letter to Ann. Maria talks to the machine at the third layer as though
the machine is Ann and is listening to her. The third layer machine listens to what Maria says and creates the
plaintext (a letter in English), which is passed to the second layer machine. The second layer machine takes the
plaintext, encrypts it, and creates the cipher text, which is passed to the first layer machine. The first layer
machine, presumably a robot, takes the cipher text, puts it in an envelope, adds the sender and receiver
addresses, and mails it.
At Ann’s side, the first layer machine picks up the letter from Ann’s mail box, recognizing the letter from
Maria by the sender address. The machine takes out the ciphertext from the envelope and delivers it to the
second layer machine. The second layer machine decrypts the message, creates the plaintext, and passes the
plaintext to the third-layer machine. The third layer machine takes the plaintext and reads it as though Maria is
speaking.
Advantages:
1. It provides modularity and clear interfaces.
2. Implementation simplicity, maintainability, flexibility and scalability are maintained.
3. It provides robustness and preserves stability.
Disadvantage:
1. Data overhead and processing due to duplication of functionality.
2. The more layers having more risks for things to breakdown or data to get lost.
3. Results in complex exploitation of user-intensive applications.
The layers in the TCP/IP protocol suite are involved in communication between two
hosts, we assume that we want to use the suite in a small internet made up of three LANs (links),
each with a link-layer switch
Let us assume that computer A communicates with computer B. As the figure shows, we
have five communicating devices in this communication: source host (computer A), the link-
layer switch in link 1, the router, the link-layer switch in link 2, and the destination host
(computer B). Each device is involved with a set of layers depending on the role of the device in
the internet. The two hosts are involved in all five layers; the source host needs to create a
message in the application layer and send it down the layers so that it is physically sent to the
destination host. The destination host needs to receive the communication at the physical layer
and then deliver it through the other layers to the application layer.
The router is involved in only three layers; there is no transport or application layer in a router as
long as the router is used only for routing. Although a router is always involved in one network
layer, it is involved in n combinations of link and physical layers in which n is the number of
links the router is connected to. The reason is that each link may use its own data-link or physical
protocol. For example, in the above figure, the router is involved in three links, but the message
sent from source A to destination B is involved in two links. Each link may be using different
link-layer and physical-layer protocols; the router needs to receive a packet from link 1 based on
one pair of protocols and deliver it to link 2 based on another pair of protocols. A link-layer
switch in a link, however, is involved only in two layers, data-link and physical. Although each
switch in the above figure has two different connections, the connections are in the same link,
which uses only one set of protocols. This means that, unlike a router, a link-layer switch is
involved only in one data-link and one physical layer.
Figure below shows the second principle discussed previously for protocol layering.
We show the identical objects below each layer related to each device.
Physical Layer
The physical layer is responsible for carrying individual bits in a frame across the link.
Although the physical layer is the lowest level in the TCP/IP protocol suite, the communication
between two devices at the physical layer is still a logical communication because there is
another, hidden layer, the transmission media, under the physical layer. Two devices are
connected by a transmission medium (cable or air).
The transmission medium does not carry bits; it carries electrical or optical signals. So
the bits received in a frame from the data-link layer are transformed and sent through the
transmission media, but the logical unit between two physical layers in two devices is a bit.
There are several protocols that transform a bit to a signal.
Data-link Layer
The data-link layer is responsible for taking the datagram and moving it across the link.
The link can be a wired LAN with a link-layer switch, a wireless LAN, a wired WAN, or a
wireless WAN.
TCP/IP does not define any specific protocol for the data-link layer. It supports all the
standard and proprietary protocols. Any protocol that can take the datagram and carry it through
the link suffices for the network layer. The data-link layer takes a datagram and encapsulates it in
a packet called a frame.
Each link-layer protocol may provide a different service. Some link-layer protocols
provide complete error detection and correction, some provide only error correction.
Network Layer
The network layer is responsible for creating a connection between the source computer
and the destination computer. The communication at the network layer is host-to-host. However,
since there can be several routers from the source to the destination, the routers in the path are
responsible for choosing the best route for each packet The network layer in the Internet includes
the main protocol, Internet Protocol (IP), that defines the format of the packet, called a datagram
at the network layer. IP also defines the format and the structure of addresses used in this layer.
IP is also responsible for routing a packet from its source to its destination, which is achieved by
each router forwarding the datagram to the next router in its path. IP is a connectionless protocol
that provides no flow control, no error control, and no congestion control services. This means
that if any of theses services is required for an application, the application should rely only on the
transport-layer protocol. The network layer also includes unicast (one-to-one) and multicast
(one-to-many) routing protocols. A routing protocol does not take part in routing (it is the
responsibility of IP), but it creates forwarding tables for routers to help them in the routing
process. The network layer also has some auxiliary protocols that help IP in its delivery and
routing tasks. The Internet Control Message Protocol (ICMP) helps IP to report some problems
when routing a packet. The Internet Group Management Protocol (IGMP) is another protocol
that helps IP in multitasking. The Dynamic Host Configuration Protocol (DHCP) helps IP to get
the network-layer address for a host. The Address Resolution Protocol (ARP) is a protocol that
helps IP to find the link-layer address of a host.
Transport Layer
The logical connection at the transport layer is also end-to-end. The transport layer at the
source host gets the message from the application layer, encapsulates it in a transport layer
packet (called a segment or a user datagram in different protocols) and sends it, through the
logical (imaginary) connection, to the transport layer at the destination host. In other words, the
transport layer is responsible for giving services to the application layer: to get a message from
an application program running on the source host and deliver it to the corresponding application
program on the destination host.
Application Layer
The logical connection between the two application layers is end to- end. The two
application layers exchange messages between each other as though there were a bridge between
the two layers. Communication at the application layer is between two processes (two programs
running at this layer). To communicate, a process sends a request to the other process and
receives a response.
The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World Wide Web
(WWW). The Simple Mail Transfer Protocol (SMTP) is the main protocol used in electronic
mail (e-mail) service. The File Transfer Protocol (FTP) is used for transferring files from one
host to another. The Terminal Network (TELNET) and Secure Shell (SSH) are used for
accessing a site remotely. The Simple Network Management Protocol (SNMP) is used by an
administrator to manage the Internet at global and local levels. The Domain Name System
(DNS) is used by other protocols to find the network-layer address of a computer. The Internet
Group Management Protocol (IGMP) is used to collect membership in a group .
needed for flow, error control, or congestion control. The result is the transport-layer packet,
which is called the segment (in TCP) and the user datagram (in UDP). The transport layer then
passes the packet to the network layer.
3. The network layer takes the transport-layer packet as data or payload and adds its own header
to the payload. The header contains the addresses of the source and destination hosts and some
more information used for error checking of the header, fragmentation information, and so on.
The result is the network-layer packet, called a datagram. The network layer then passes the
packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or payload and adds its own header,
which contains the link-layer addresses of the host or the next hop (the router). The result is the
link-layer packet, which is called a frame. The frame is passed to the physical layer for
transmission.
Decapsulation and Encapsulation at the Router
At the router, we have both decapsulation and encapsulation because the router is connected
to two or more links.
1. After the set of bits are delivered to the data-link layer, this layer decapsulates the datagram
from the frame and passes it to the network layer.
2. The network layer only inspects the source and destination addresses in the datagram header
and consults its forwarding table to find the next hop to which the datagram is to be delivered.
The contents of the datagram should not be changed by the network layer in the router unless
there is a need to fragment the datagram if it is too big to be passed through the next link. The
datagram is then passed to the data-link layer of the next link.
3. The data-link layer of the next link encapsulates the datagram in a frame and passes it to the
physical layer for transmission.
Addressing
Another concept related to protocol layering in the Internet, addressing. Logical communication between
pairs of layers in this model. Any communication that involves two parties needs two addresses: source
address and destination address. There is a relationship between the layer, the address used in that layer,
and the packet name at that layer. At the application layer, we normally use names to define the site that
provides services, such as someorg.com, or the e-mail
address, such as somebody@coldmail.com. At the transport layer, addresses are called port numbers, and these
define the application-layer programs at the source and destination. Port numbers are local addresses that
distinguish between several programs running at the same time. At the network-layer, the addresses are global,
with the whole Internet as the scope. A network-layer address uniquely defines the connection of a device to
the Internet. The link-layer addresses, sometimes called MAC addresses, are locally defined addresses, each of
which defines a specific host or router in a network (LAN or WAN)
Multiplexing and Demultiplexing
Since the TCP/IP protocol suite uses several protocols at some layers, we can say that we have multiplexing at
the source and demultiplexing at the destination. Multiplexing in this case means that a protocol at a layer can
encapsulate a packet from several next-higher layer protocols (one at a time); demultiplexing means that a
protocol can decapsulate and deliver a packet to several next-higher layer protocols (one at a time).
To be able to multiplex and demultiplex, a protocol needs to have a field in its header to identify to which
protocol the encapsulated packets belong. At the transport layer, either UDP or TCP can accept a message
from several application-layer protocols. At the network layer, IP can accept a segment from TCP or a user
datagram from UDP. IP can also accept a packet from other protocols such as ICMP, IGMP, and so on.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a complete
communication system. They are:
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Datalink Layer
7. Physical Layer
Below we have the complete representation of the OSI model, showcasing all the layers and
how they communicate with each other.
In the table below, we have specified the protocols used and the data unit exchanged by
each layer of the OSI Model.
3. The function of each layer should be chosen with an eye toward defining internationally
standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the
interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that architecture does not
become unwieldly.
Functions of Different Layers
Following are the functions performed by each layer of the OSI model. This is just an
introduction, we will cover each layer in details in the coming tutorials.
OSI Model Layer 1: The Physical Layer
1. Physical Layer is the lowest layer of the OSI Model.
3. It is responsible for transmission and reception of the unstructured raw data over network.
4. Voltages and data rates needed for transmission is defined in the physical layer.
4. This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of non-acknowledgement received frames is also handled by this
layer.
5. This layer establishes a logical layer between two nodes and also manages the Frame
traffic control over the network. It signals the transmitting node to stop, when the frame
buffers are full.
OSI Model Layer 3: The Network Layer
1. Network Layer routes the signal through different channels from one node to other.
4. It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.
OSI Model Layer 4: Transport Layer
1. Transport Layer decides if data transmission should be on parallel path or single path.
2. Functions such as Multiplexing, Segmenting or Splitting on the data are done by this
layer
3. It receives messages from the Session layer above it, convert the message into smaller
units and passes it on to the Network layer.
4. Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled more
2. Transferring of files disturbing the results to the user is also done in this layer. Mail
services, directory services, network resource etc are services provided by application
layer.
3. This layer mainly holds application programs to act upon the received and to be sent data.
1. OSI model distinguishes well between the services, interfaces and protocols.
5,6,7 Application, Session, Application NFS, NIS+, DNS, telnet, ftp, rlogin,
Presentation rsh, rcp, RIP, RDISC, SNMP, and
others
Bandwidth
Throughput
Bandwidth-Delay Product
Jitter
Bandwidth
Latency
The second performance metric, latency, corresponds to how long it takes a message to
travel from one end of a network to the other.
Round-trip time (RTT)
There are many situations in which it is more important to know how long it takes to send
a message from one end of a network to the other and back, rather than the one-way
latency. We call this the round-trip time (RTT) of the network.
Where the latency corresponds to the length of the pipe and the bandwidth gives the
diameter of the pipe, then the delay × bandwidth product gives the volume of the pipe the
III YEAR/V SEM
Page 34
CS8591-COMPUTER NETWORKS-UNIT-1
number of bits it holds.
In data communications the definition of the information and the transmission medium is more specific.
The transmission medium is usually free space, metallic cable, or fiber-optic cable. The information is
usually a signal that is the result of a conversion of data from another form.
The use of long-distance communication using electric signals started with the invention of the telegraph
by Morse in the 19th century. Communication by telegraph was slow and dependent on a metallic medium.
Computers and other telecommunication devices use signals to represent data. These signals are transmitted
from one device to another in the form of electromagnetic energy, which is propagated through
transmission media. Electromagnetic energy, a combination of electric and magnetic fields vibrating in
relation to each other, includes power, radio waves, infrared light, visible light, and ultraviolet rays. Each of
these constitutes a portion of the electromagnetic spectrum.
In telecommunications, transmission media can be divided into two broad categories:
Guided media include twisted-pair cable, coaxial cable, and fiber-optic cable.
Unguided medium is free space.
1. Guided Media:
It is also referred to as Wired or Bounded transmission media. Signals being transmitted are
directed and confined in a narrow pathway by using physical links.
III YEAR/V SEM
Page 36
CS8591-COMPUTER NETWORKS-UNIT-1
Features:
High Speed
Secure
Used for comparatively shorter distances
There are 3 major types of Guided Media:
(i) Twisted Pair Cable –It consists of 2 separately insulated conductor wires wound about each other.
Generally, several such pairs are bundled together in a protective sheath. They are the most .
The most common twisted-pair cable used in communications is referred to as unshielded twisted-pair
(UTP). IBM has also produced a version of twisted-pair cable for its use, called shielded twisted-pair (STP).
STP cable has a metal foil or braided mesh covering that encases each pair of insulated conductors.
Categories
Connectors
The most common UTP connector is RJ45 (RJ stands for registered jack), as shown in Figure. The RJ45 is
a keyed connector, meaning the connector can be inserted in only one way.
Performance
One way to measure the performance of twisted-pair cable is to compare attenuation versus frequency and
distance. A twisted-pair cable can pass a wide range of frequencies. However, Figure 7.6 shows that with
increasing frequency, the attenuation, measured in decibels per kilometer (dB/km), sharply increases with
frequencies above 100 kHz. Note that gauge is a measure of the thickness of the wire.
Applications
Twisted-pair cables are used in telephone lines to provide voice and data channels. The local loop—the line
that connects subscribers to the central telephone office—commonly consists of unshielded twisted-pair
cables. The DSL lines that are used by the telephone companies to provide high-data-rate connections also
use the high-bandwidth capability of unshielded twisted- pair cables.
Least expensive
Easy to install
Disadvantages:
Comparatively faster
Disadvantages:
More expensive
Bulky
3. Coaxial Cable –
It has an outer plastic covering containing 2 parallel conductors each having a separate insulated
protection cover. Coaxial cable transmits information in two modes: Baseband mode(dedicated
cable bandwidth) and Broadband mode(cable bandwidth is split into separate ranges). Cable TVs
and analog television networks widely use Coaxial cables.
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
In multimode step-index fiber, the density of the core remains constant from the center to the edges. A
beam of light moves through this constant density in a straight line until it reaches the interface of the core
and the cladding. At the interface, there is an abrupt change due to a lower density; this alters the angle of
the beam’s motion. The term step-index refers to the suddenness of this change, which contributes to the
distortion of the signal as it passes through the fiber.
A second type of fiber, called multimode graded-index fiber, decreases this distortion of the signal through
the cable. The word index here refers to the index of refraction. As we saw above, the index of refraction is
related to density. A graded index fiber, therefore, is one with varying densities. Density is highest at the
center of the core and decreases gradually to its lowest at the edge. Figure 7.13 shows the impact of this
variable density on the propagation of light beams.
Single-Mode
Single-mode uses step-index fiber and a highly focused source of light that limits beams to a small range of
angles, all close to the horizontal. The single-mode fiber itself is manufactured with a much smaller
diameter than that of multimode fiber, and with substantially lowers density (index of refraction). The
decrease in density results in a critical angle that is close enough to 90° to make the propagation of beams
almost horizontal. In this case, propagation of different beams is almost identical, and delays are negligible.
All the beams arrive at the destination “together” and can be recombined with little distortion to the signal.
Fiber Sizes
Optical fibers are defined by the ratio of the diameter of their core to the diameter of their cladding, both
expressed in micrometers.
Fiber-Optic Cable Connectors
Disadvantages:
(ii) Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional. When an antenna transmits microwaves, they can be narrowly
focused. This means that the sending and receiving antennas need to be aligned. The unidirectional
property has an obvious advantage. A pair of antennas can be aligned without interfering with
another pair of aligned antennas. The following describes some characteristics of microwave
propagation:
❑ Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to be
in direct sight of each other, towers that are far apart need to be very tall. The curvature of the earth
as well as other blocking obstacles do not allow two short towers to communicate by using
microwaves. Repeaters are often needed for long distance communication.
❑ Very high-frequency microwaves cannot penetrate walls. This characteristic can be a
disadvantage if receivers are inside buildings.
❑The microwave band is relatively wide, almost 299 GHz. Therefore wider subbands can be
assigned, and a high data rate is possible.
❑ Use of certain portions of the band requires permission from authorities.
Radio waves are used for multicast communications, such as radio and television, and paging systems.
A parabolic dish antenna is based on the geometry of a parabola: Every line parallel to the line of
symmetry (line of sight) reflects off the curve at angles such that all the lines intersect in a common point
called the focus. The parabolic dish works as a funnel, catching a wide range of waves and directing them to
a common point. In this way, more of the signal is recovered than would be possible with a single-point
receiver.
Outgoing transmissions are broadcast through a horn aimed at the dish. The microwaves hit the dish and are
deflected outward in a reversal of the receipt path. A horn antenna looks like a gigantic scoop. Outgoing
transmissions are broadcast up a stem (resembling a handle) and deflected outward in a series of narrow
parallel beams by the curved head. Received transmissions are collected by the scooped shape of the horn, in
a manner similar to the parabolic dish, and are deflected down into the stem.
Applications
Microwaves, due to their unidirectional properties, are very useful when unicast (oneto-one)
communication is needed between the sender and the receiver. They are used in cellular
phones, satellite networks, and wireless LANs.
(iii) Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770 nm),
The end systems (communicating devices) are labelled A, B, C, D, and so on, and the switches are labelled
I, II, III, IV, and V. Each switch is connected to multiple links.
Figure shows a trivial circuit-switched network with four switches and fourlinks. Each link is divided
into n (n is 3 in the figure) channels by using FDM or TDM.We have explicitly shown the
multiplexing symbols to emphasize the division ofthe link into channels even though multiplexing
can be implicitly included in the switchfabric.
The end systems, such as computers or telephones, are directly connected to a switch. We have shown only
two end systems for simplicity. When end system A needs to communicate with end system M, system A
needs to request a connection to M that must be accepted by all switches as well as by M itself. This is called
the setup phase; a circuit (channel) is reserved on each link, and the combination of circuits or channels
defines the dedicated path. After the dedicated path made of connected circuits (channels)is established, the
data-transfer phase can take place. After all data have been transferred, the circuits are torn down.
We need to emphasize several points here:
Circuit switching takes place at the physical layer.
Before starting communication, the stations must make a reservation for the resources to be used
during the communication. These resources, such as channels (bandwidth in FDM and time slots in
TDM), switch buffers, switch processing time, and switch input/output ports, must remain dedicated
during the entire duration of data transfer until the teardown phase.
Data transferred between the two stations are not packetized (physical layer transfer of the signal). The
data are a continuous flow sent by the source station and received by the destination station, although
there may be periods of silence.
There is no addressing involved during data transfer. The switches route the data based on their
occupied band (FDM) or time slot (TDM). Of course, there is end-to end addressing used during the
setup phase.
Three Phases
8.2PACKET SWITCHING
ent
nodes within the network.)
Two Types
Datagram
connection between the sender and receiver.
dedicated path between the sender and receiver
congestion, provided that a call has been setup, the subsequent packets should get through;
be generated per call and not per packet.
calls that are passing through it and to allocate capacity for any traffic that each call could generate
.Examples of virtual circuit switching are X.25 and Frame Relay.
Message Switching
The source comp sends the data to the switching office first which stores the data in its buffer.
It then looks for a free link to another switching office and then sends the data to this office.
Process is continued till the data is delivered to the destination computer.
It is also known as store and forward technique.
Disadvantages
PART-A
1. List out the Principles of protocol layering
2. What are the categories of twisted pair cables available in the market?
3. What is the role of Virtual Circuit identifier?
4. What is piggybacking?
5. For n devices in a network, what is the number of cable links required for a mesh, ring, bus, and star topology?
6. What is the difference between half duplex and full duplex transmission modes?
7. Define latency.
8. Draw male and female connectors of RJ45.
9. What do you meant by cladding?
10. List out some advantages of Fiber optic cable.
11. What is payload?
12. How CSMA/CA works?
13. There are 10 nodes in a mesh topology, find out how many links are needed to form mesh network?
14.A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each
frame carrying an average of 10,000 bits. What is the throughput of this network?
15. What is the propagation time if the distance between the two points is 12,000 km? Assume the
propagation speed to be 2.4 × 108 m/s in cable.
16. Draw circuit-switched network to connect eight telephones in a small area. Communication is through 4-
kHz voice channels. Assume that each link uses FDM to connect a maximum of two voice channels. The
bandwidth of each link is then 8 kHz.
17. Explain the meaning of the following diagram