Data Commu & Networking Notes
Data Commu & Networking Notes
The shorter duration of bit is the cause of the greater the bps rating
of the signal.
Relationship between bit time and bit rate per second:
Bit time Bit rate per Bit time Bit rate per
(milli sec) second(bps) (milli sec) second(bps)
3.3 300 .833 1200
.416 2400 .104 9600
.052 19200
Baud and Bit Rate: Baud is a measure of the digital signaling rate
in a channel. Bit rate is a measure of the digital bit values the
channel conveys with each baud.
The only way to increase the digital bit rate is to decrease the
bit time of the signal. But electrical characteristics of the material
used for conveying the bits limit the reduction in the size of the bit
time and thus fixing the maximum bit- rate per second.
Maximum Data Rate of a Channel: The maximum data rate of a
noisy channel whose bandwidth isin Hertz (Hz), and whose signal-to
noise ratio, shown as S/N in decibels, is given by:
Maximum number of bits/sec = H1092 (1 + S/N)
6.
Transmission Modes
There are three modes of data transmission. These are:
(a) Simplex- Simplex communication imply a simple method
of communication. In simplex communications mode, there is a
one way communication transmission. Television transmission
is a very good example of this type of communication. The
example of the simplex communication is keyboard attached to
the computer system because the keyboard can only send data to
the computer and does not expect any acknowledgement.
Trensmitter Recever
Transmtter Trensmitter
Rocelver Receiver
6.
Asynchronous and Synchronous Transmission
Asynchronous Mode: Asynchronous mode refers to a series of events
that take place which are not synchronized one after the other.
Asynchronous Transmission: Asynchronous transmission is often
referred to as start stop transmission because of its nature, That is
the sender can send a character at any time convenient and the
receiver will accept it. Asynchronous communication lines remain in
an idle state until the hardware on the line is ready to transmit.
Since the line is idle, a series of bits have to be sent to the receiving
node to notify it that there is more data coming. When data is
finished, the node has to be notified that the transmission is complete
and to go back to an idle state, hence the STOP bits are to be sent.
This pattern continues for the duration of the time the link is
operative. This is the characteristic of many terminals when on a
terminal: the time spent between successive keystrokes would vary.
Thus, in asynchronous transmission, data is transmitted character
by character at irregular intervals.
Synchronous Transmission: - Synchronous devices need not use Start
and Stop bitsi so coordination between the two nodes, i.e. the sender
and the receiver, is handled differently. In synchronous
-
communications, there are two "channels" one for data and another
for link Synchronization. The channel for synchronization uses the
integral clock in the hardware for link synchronization between the
two nodes when one of the nodes is ready to transmit data, a unique
combination of bits called a Sync Character is sent to the receiver.
Since the first character will probably get trashed, a second one
usually follows to ensure that synchronization is complete.
Comparison between Asynchronousand Synchronous Transmission:
> Synchronous communications tend to be more expensive than
asynchronous ones as the hardware involved is more costly due to
integral clocking mechanism that have to be used as well as more
sophisticated engineering efforts.
> Synchronous transmission 1S well suited to remote
a
communication between computer and such devices as buffered
card readers and printers. It is also used for computer to
computer communications.
> The primary advantage of synchronous transmission is its
efficiency. Not only does it eliminate the need for individual start
stop bits on each character, but much higher data rates can be
used than with asynchronous transmission.
> Asynchronous transmission is well suited to many keyboard type
terminals. The advantage of this method is that it does not
require any local storage at the terminal or the computer as
transmission takes place character by character. Hence it is
cheaper to implement.
Efficiency of Data Transmission in Synchronous and Asynchronous
Modes: - Asynchronous data incorporates the use of extra framing
bits to establish the start and ending (stop) of a data character word.
A receiver responds to the data stream when it detects a start bit. A
data character is decoded and defined after the stop bit is received
and confirmed. Asynchronous data are easier to detect and
synchronize, but the efficiency of data transmission is reduced by the
addition of framing bits as overhead (no message data) bits.
A comparison of a single character using the two data types is as
follows. For this purpose, the ASCII code of the letter E (1000101) is
used. The order of transmission is to send the Least Significant Bit
(LSB) first. The number of framing bits used for asynchronous data
varies depending on the stations in the communication link. For
example, suppose we use 1 start and 2 stop bits. This adds 3 more
bits to the character 'word. Hence total 10 bits are required to send
the letter E using asynchronous data. However, in' the case of
synchronous transmission, only 7 bits are required for transmission
of the character E.
The efficiency of transmission is defined as the ratio of the number of
message bits to the total number of transmitted bits:
Or % efficiency = databits
totalbits
x 100
Cyclic Redundancy Check (CRC): - In synchronous communications,
CRCis used to verify the integrity of the entire packet or block of
data. Integrity of the packet means whether the complete packet of
data is received in its correct form as it was sent at the sending end.
In synchronous communications, parity checking is sufficient to
ensure data integrity. In high speed asynchronous communications,
single bit corrections are not enough. As each packet is created, a
CRC check is placed somewhere in the packet and is verified at the
receiving end.
CRC is a calculation method used to check the accuracy of a
digital transmission over a communication link. The sending
computer uses one of several formulas to calculate a value from the
information contained in the data, and this value is appended to the
message block before it is sent. The receiving computer performs the
same calculation on the same data and should derive the same num
ber. If the two CRCs do not match, indicating that a transmission
error has occurred, the receiving computer asks the sending
computer to retransmit the data.
This procedure is known as a redundancy check because each
transmission includes extra or redundant error checking values as
system.
> Microwaves communication is widely used for telephones,
television redistribution etc.
> Microwave system permit data transmission rate above
about 16 GHz /sec.
> Repeaters are used to extend the coverage area.
Advantage:
>A pair of antennas can be aligned without interfering with
another pair of aligned antennas.
Disadvantage:
> Very high frequency microwaves can't penetrate walls, if
receivers are inside the building.
> Uses of certain portions of band in microwaves require
permission from authorities.
Application:
> Microwaves are used for unicast communication such as
cellular telephones satellite networks and wireless LANs.
Types of Microwave communication svstem:
There are two types of microwave communication system:
1. Terrestrial:
> Such system used directional parabolic antennas to send
and receives signals.
> The signals are highly focused and the physical part must
be line to sight.
> Relay towards are used to extend the signals.
Frequency range between 21 to23 GHz and 4 to 6 GHZ.
>
Cost: Short distance system can be inexpensive but long
distance systems can be expensive.
> Installation: In Terrestrial microwave system line of sight
maintain line of sight requirement can make installation
difficult. Because antennas must be carefully aligned.
> Bandwidth capacity: Data rates are from 1 to 10 m bit/sec.
2. Satellite:
Satellite microwave system transmits signals between
directional parabolic antennas.
> Such as also maintain line of sight.
> One antenna is on a satellite in geosynchronous orbit (The
orbit where the speed of the satellite matches the
rotation speed), about 36000 kms above the equator.
This allows a ground station to aim its antenna at a fixed
point in the sky.
> In satellite communication microwave communication at 6
GHz are transmitted from a transmitter on earth to a
satellite position in space.
The signal reaches the satellite and it become weak due to
the distance of 36,000 km traveled. The transponder in a
satellite amplifies the weak signal and sends them back to
the earth at a frequency of 4 GHz. These signals are
received at a receiving station on the earth.
Characteristics:
Frequency - Range: 4 GHz-6 GHz and 11 GHz - 14 GHz
Advantage: 10 KHz
> Easy to implement
> Used for both digital and analog
> In the case of digital signal, two 530 KHz 1700 KH:
Use:
> FM technique is used to convert digital signal into FM
signals.
3. Phase Modulation – In phase modulation transmission the phase
of carrier signal is modulated to follow the changing voltage level
of modulating signal. The peak of amplitude and frequency of
carrier signal remains constant but the amplitude of information
signal changes the phase of carrier signal. In frequency modulation
the instantaneous change in carrier frequency is proportional to
the amplitude of modulating signal while in phase modulation; the
instantaneous change in carrier frequency is proportional to the
derivative of amplitude of modulating signal.
The actual bandwidth is difficult to determine exactly but it
can be shown empirically that it is several times that of analog or
modulating signal. Although the formula of same bandwidth for
frequency modulation and phase modulation. The value of '®' is
lower in the case of phase modulation around 1 narrow band and 3
for wide band.
Advantage:
> It provides the signal modulation that allows computers to
communicate at higher data rates through telephone system.
Disadvantage:
>
Phase modulation requires two signals with a phase
difference between them.
Use:
> This technique is used to convert colour information in colour
television broadcast.
> This technique is used to convert digital signals into phase
modulated (PM) signal.
Analog to Digital Conversion:
1. Pulse Code Modulation (PCM): - The
common technique in which analog signal
changes to digital data (Digitization) is
called PCM. A PCM encoder has three
procedures: Cuanliged sigpal
(a) Analog signal is sampled
(b) Sampled signalis quantized
Aalg sgnal
ata PAH Sgna
44
negative changes,
called Delta. If the
delta is positive, the process recordsa 1. if it is negative the
process records a 0. However the process needs a base against
which the analog signal is compared. The modulator builds a
second signal that resembles a staircase. Finding the change I then
reduced to comparing the input signal with the gradually made
staircase signal.
Demodulator – The
Digdal data
Demodulator takes the
digital data & using the unil
Aalg cgnal
staircase maker & the
delay unit, creates the
analog signal. The created analog signal needs to pass through a
low pass filter for smoothing. -
Digital to analog Conversion: Digital to analog conversion is the
process of changing one of the characteristics of an analog signal
based on the information in digital data. This is also called Shift
Keying.
Relationship between Data rate signal rate – Data or bit rate is the
&
no. of bits per second. Signal or baud rate is the no. of signal
elements per second.
In the analog transmission of digital data, the baud rate is less
than or equal to the bit rate.
S= signal rate, N= data rate, r no. of
=
S=Nx l/r baud, where
data elements carried in one signal = logl where 1 is the type of
signal element.
Shift Keying: -
> Amplitude Shift Keying (ASK) – In amplitude shift keying the
amplitude of the carrier signal is varied to create signal
can use four frequencies and so on. Bandwidth for FSK for
multilevel,
B=(1+ d) xS+ (L- 1) 2 Af
> Phase Shift Keying (PSK) – In PSK, the phase of the carrier
varied to represent two or more different signal elements. Both
peak amplitude & frequency remain constant as the phase
changes. Today, PSK is more common than ASK & FSK.
(a) Binary PSK (BPSK) The T.
simplest PSK is binary PSK, in
which we have only two signal
elements, one with a phase of 0° and the other with a phase of
180°.
Bandwidth of PSK, B= (1+ d) S
(b) Quadrature PSK (QPSK) – The simplicity of BPSK enticed
designers to use 2 bits at a time in each signal element,
thereby decreasing the baud rate & eventually the required
bandwidth. The scheme is called quadrature PSK because it
uses two separate means out of phase. The incoming bits are
first passed through a serial to parallel conversion that sends
bit to one modulator and the next bit to the other modulator.
If the duration of each bit in the incoming signal is T, the
duration of each bit sent to the corresponding BPSK signal is
2T. This means that the bit to each BPSK signal has one half
the frequency of the signal.
> DPSK–
Encoding Technique and CODEC: -
MODEMS: It is a device converts digital signal generated by
computer into an analog signal to be carried by public access
telephone line. It is also the device converts the analog signals
received over a telephone line into digital signal usable by the
computer. A modem derives its meaning from modulation and
demodulation i.e. a signal modulator and signal demodulator. A
modulator converts digital signals into analog and demodulator
converts analog signal into digital signal. Modems are classified into
many categories. Modem speed range from 300bps to 56kbps. The
tasks which modem can perform are:
Application of FDM:
> FDM is used in AM & FM radio broadcasting with band from
530 to 1700 KHz & 88 to 108 MHz respectively.
FDM is used in television broadcasting
> FDM is used in first generation cellular telephones.
(b) Wavelength division multiplexing: - WDM is an analog
technique that is designed to use the high datarate capability of
fiber opticcable. The optical-fiber data rate is higher than the data
of metallic transmission cable. Using a fiver optic cable fox
one single line wastes the available bandwidth. Multiplexing
allows us to combine several lines into one. In WDM, the
multiplexing & demultiplexing involve optical signals transmitted
through fiber optic channels.
In WDM
technology, we want to M
OEMDXA
combine multiple sources A
light into one single light at
the multiplexer & do the reverse at the demultiplexer. The
combining & splitting of light source are easily handled by a prism.
A prism bends a beam of light based on the angle of incidence &
the frequency. Using this technique, a multiplexer can be made to
combine several input beams of light, each containing a narrow
band of frequencies into one output beam of a wider band of
frequencies. A demultiplexer can also be made to reverse the
process.
Dense WDM can
multiplex a very large
number of channels by Gibel- obtic-cabu
i:temnat
tectibn L:feyanašnto!
Chapter-5
Network fundamentals
AN OVERVIEW OF NETWORKING
A network is a group of computers connected in some fashion in
order to share resources. A group of computers in a network provide
Telephone
Switching Office
Block Diagran of Circuit Switehing
Cells
VCI.
3. Segmentation and 16 cbAKB 0-24 16
Reassembly of Cells
CPI Btag User dataN
In order to address BASize
ATMAALI/4 Pcket kormat with
Piqure &12 slze in bits
field
Pad 0 Etag Len
also uses the 802.5 method Flgure 5.19 AN FOOI ing being used es e backbone io connect LANs and computer
of operation.
FDDI is a high performance fiber optic token ring LAN
running at 100 Mbps over distances up to 200 km with up to 1000
stations connected.
It can be used in the same way as any of the other LANs, but
with its high bandwidth, another common use is as a backbone to
connect copper LANs.
How FDDI Works? FDDI (ike Token Ring) uses token-passing
schemes to control network access. But, unlike Token Ring, several
FDDIdevices can transmit data simultaneously. Like Token Ring,
a token is passed around the ring, and the possessor of the token is
allowed to transmit FDDI frames. Unlike Token Ring, a FDDI
network may have several frames simultaneously circulating on
the network. This is possible because the possessor of the token
ATM (Asynchronous
ATM support of various traffic types
Transmission Mode) ATM
networking is the newest topology available at this time. Unlike
others, it can carry both voice and data over network wire or fiber.
ATM transmits all packets as 53-byte cells, that have a variety of
identifiers on them to determine such things as Quality of Service.
> Framing – Some control bits are added to the data packets these
are received from network layer. The bits are associated with
start and end frames.
-
Error Detection and Correction Course Various methods are
use for such purpose. Some popular methods are parity bit,
checksum etc.
3. Network Layer: The Network Layer provides services to the
transport layer. It can be based on ether virtual circuits or data
grams. In both cases its main job is routing packets from source to
destination. In case of virtual circuit subnet, a routing decision is
made when virtual circuit is setup.
In case of datagram subnet, routing decision is made on every
incoming package.
Many Routing algorithms are used in computer Network. All
algorithms are categorized into two categories:
-
) Static Routing Algorithm Static Routing algorithm dies not
decide there routing decision on measurement of current traffic
and topology. Where as dynamic routing algorithm changes
their routing decisions on current traffic and topology.
The function of Network Layer is routing packets from
source machine to destination machine. In most subnets packets
will require multiple hops to reach the destination.
Network Layer also manages congestion. To control
congestion several algorithms are provided.
When to0-many packets are present in the subnet the
performance degrades. This situation is called Congestion.
Subnet can be become congested increasing the delay and
lowering the through put for packets. Network designers
attempt to avoid congestion by proper design. If congestion
occurs it must be dealt.
Congestion can be bought about by several factors:
> If all of a sudden, streams of packets begin arriving from
three for four lines and all need the same output line,
queue is build up. If there is insufficient memory to hold of
them, packets will be lost.
> Slow processor can also caused congestion. If the routers
are slow at performing routing decision.
Checksum Urgent
pointer
Data
Fig:- TCP Segment
Source and Destination Port - Values of this field identifies the
local port no.
Sequence no. - Sequence no. identifies the current sequence no.
of data segment.
DataOffset - Values of this field identifies the start of data.
Flags – Shows individual status:
(a) URG (Urgent Flag) - Value of this field identifies the
urgent pointer. It is considered as Urgent Flag.
(b) ACK (Acknowledgement Flag) – Value of this field
sociated with acknowledgement of the packet.
(c)PSH(Push Flag)- Push Flag performs push function.
(a) RST (Reset Flag) -
(e) SYN (Sequence Synchronization Flag) – The value of
this field associated with sequence synchronization.
(O FIN (Final Flag)- Endof Transmission Flag.
Windowv Size -This field contains the values associated with
strength of destination station, How many byte (data block) the
receiving host can accept at a time.
Checksum - Checksum for data end header.
-
Urgent Pointer The value of this field identifies specific type of
data area.
> UDP (User DataProtocol) - The protocol supports
connectionless transportation with internet protocol. The
Protocol encapsulates all the necessary information with data
packet to transport them from source to destination, without
having to establish a connection.
UDP Segment (the packet i.e. segmented by UDP) consist of
header followed by the data in UDP header source code no. and
destination port no. are also available like TCP header, which
contains address of source machine and address of destination
machine. UDP length field contains the value which includes
header length + data length. The UDP Checksum field contains
the value i.e. helpful in checking the errors at destination
(c)Timeout exceeded
(a) Parameter problems
(e) Redirection
Internet Architecture: Internet is an interconnection of multiple
networks. The word internet (lowercase i) is
Application Service
different from Internet (uppercase 1). While
internet means network of networks, Internet is the Service Provider Protocol
term used to refer to a specific worldwide network, Internetworking
www (World Wide Web).
Internetwork (internet) consists of multiple Subnetworks
networks in which LANs are attached to other Internet Architecture
LANS, other communications networks, remote
sites, individual stations- and -Wide Area Networks (WANS). It
permits data to move freely 'among large numbers of networks and
populations.
All internetworks, including the Internet, have a layered
architecture. Internet has four layers. These are as follows:
(a) Subnetwork Layer All the machines connected together in a local
area network (LAN) reside in this layer.
(b) Internetwork Layer This layer provides the functionality for
communications between networks through gateways. Each sub
network uses gateways to connect to the other sub networks in the
internetwork. The internetwork layer is where data gets transferred
from gateway to gateway until it reaches its destination and then
passes intothe sub network layer. The internetwork layer runs the
Internet Protocol (IP).
(c) Service Provider Protocol Layer This layer is responsible for the
overall end-toend communications of the network. This is the layer
that runs the Transmission Control Protocol (TCP) and other
protocols.It handles the data traffic flow itself and ensures reliability
for the message transfer.
(d) Application Services Layer This layer supports the interfaces to
the user applications. This layer interfaces to electronic mail, remote
file transfers, and remote access.
Chapter -7
Data link protocol
PROTOCOL
included in the •
F
Flag to indicate Begining of Frame (0110)
CRC (Cyclic -
A Address
Redundancy C
-
Control
Check). It uses -
Information
bit-stuffing for FCS Fame Check Scquence
-
data F2 Flag to indicate End of Frame (01 1Il10)
HDLC format
transparency.
In HDLC, all
information is carried by frames that can be of the following types:
> Information Frames (1-frames)
Supervisory control sequences (S-frames), or unnumbered
command/ responses (U-firames).
Figure shows one information frame as a angular block divided into
six fields. These fields are:
>A beginning Flag (F1) field.
> An address (A) field. It is used to identify ME the terminals. It is
of 8 bits.
A control (C) field. It is used for sequence numbers and
acknowledgements. It is of 8 bits.
> An information field () or data field contain information.
>Aframe check sequence (FCS) field. It is situ to CRC.
>A final flag (F2) field.
There are three kinds of controls. Control field Information ([
Frame), Control field for Supervisory (S-Frame) and control field for
Unnumbered frame). The contents are shown in Figure. S-frames
and U-frames have the same fields except that the I field is left out.
The P/F bits stand for Poll/Final. It is used when a computer
polling a group of terminals. When used as P, the computer
inviting the term send data. All the frames sent by the terminal,
except the final one, have the P/F bit set to P. The final one is set to
F.
currently in
use. LAN -
Ehgtal signaling Anakog arme
data Baseband and broadband transmission, using single digital channel in baseband and several channels in
broadband communication system in bounded media
transfer
speeds may be as high as 80 million bits per second (80 Mbps),
or slightly less than 10 million characters per second (10 Meps).
Compare this to the maximum data transfer speed of 56 Kbps
(7000 Cps) for high-grade telephone company digital trunk lines,
or the 1200/2500 bps (120/250 Cps) transmission speed used by
most personal computer communications systems.
> LANs are private networks, not subject to tariffs or other
regulatory controls.
BASEBAND Vs BROADBAND
Bandwidth use refers to the ways of allocating the capacity of
transmission media. The total media capacity or bandwidth can be
divided into channels. A channel is simply a portion of the bandwidth
that can be used for transmitting data. The two ways of allocating
the capacity of bounded transmission media are the following:
1. Baseband These transmissions use the entire media bandwidth
The term Media refers to the cabling used for transmitting data
from one node to another. Examples of media in local area networks
include Coaxial cabling, Twisted-pair Cabling and Fiberoptic cab
ling.
damaged, the entire network is not shut down, as may be the case
with coaxial cable.
Twisted-pair wires use connectors called RJ-11 connectors.
The RJ connector is inserted into a socket on the NIC.
3. Implementation of LAN using Fiber Optic Cables Fiber optic
cables are becoming popular as a networking cable because of its
high transmission speed. Also, since light signal is not subject to
electrical disturbances, it is free from transmission errors. It can
transmit reliable signals as far as 10 km. However, it is more
expensive to buy, install and maintain fiber optic cables. It also
requires special equipments, called fiber line drivers,, to convert
electrical signal into light signals.
Fiber optic cable is tailormade and comes equipped with its
own connectors. If you wish to connect a workstation with
equipment that is not compatible with fiber optic cable, attach the
workstation to fiber-line driver.
4. Implementation of LAN using Wireless Technology Another
alternative for LAN implementation is through wireless
technology. The technology consists of hardware that manages the
connection using radio or infrared signaling devices. This
eliminates the need for cables all together. A wireless network can
make use of existing cellular telephony, satellite communication
system and paging systems. It may be necessary to implement the
LAN using wireless technology in areas where cabling is extremely
difficult or impossible. For example, when offices are located across
the river or hill side.
FAST LNS:
Fast LANs are LANs that are capable of carrying voice, data
and video at 100 Mbps, which is 10 times faster than traditional
LANS. They can be implemented using IEEE 100BaseFX or
100BaseT specifications. These standards can be implemented using
either copper twisted-pair wires or fiber optics.
100BaseFX is often used for wiring campus backbones.
100BaseFX networks are wired together in a star topology using
fiber-optic cabling and fiber optic hubs or Ethernet switches. Fiber
optic cabling uses either two strand multimode or three strand
single-mode optical fiber, with each strand carrying data in opposite
and user terminals, and may als0 enable LANs to communicate with
each other. This type of network may be developed to operate
nationwide or worldwide. The transmission media used in WANs are
normally public systems such as telephone lines, microwave and
satellite links.
WAN is used to interconnect LANs which may be at opposite
sides of a country or located around the globe.
Wide area networks (WANs) combine the continuous error
detection and correction techniques included in synchronous
communications with robust network problem determination and
data routing to form powerful backbones that ensure high quality,
reliable service for end users.
Network Using Wan and Network Services:
Many wide area network services are emerging these days due
to the increasing demand of corporate business houses and public
and private sectors for these services at the lowest possible cost.
Users are demanding Wide area network accesses that offer
support for transmission of data, video, imaging, fax and voice. The
primary driving forces of increased capacity and sophistication for
wide area network services are:
() Host to terminal connection A terminal is an I/O device,
consisting of a keyboard and a monitor and the host is a backend
processing computer. Hosts and terminals may be located in
different locations. Hosts can be connected to the different
terminals through local area network connections or through
remote dial-up connections. User's commandsare typically entered
through a terminal. This information is transmitted to a host
computer (generally Mainframe computer) over an Ethernet or
Token Ring local area network connection. The mainfram
processes the input and sends the output over the network to the
terminal monitor. Thus, application runs in the host and the
terminal does user interfacing function.
Terminals can be of two types:
Local Terminals: directly connected to the host via a serial
or LAN connection.
> Remote Terminals: connected to the host via a phone line
with a modem at both the ends.
(i) LAN to LAN connection Wide area networking may be used for
communicating with devices that reside beyond one's local LAN.
For the communication to take place, the two LANs must be in the
same WAN. Routers can be used to connect LANs that employ
similar protocols.
When two dissimilar LANs are to be connected, tunnels and
gateways are made use of.
A gateway is any device that is capable of interconnecting
networks with dissimilar routing protocols.
WAN links can be grouped into the following three main
categories:
> Circuit switched services -
A temporary switched circuit
established through the telecommunications system for the
duration of the communication session. When the connection is
terminated, the carrier's switches are freed up for other uses.
Examples are modems and dial-up Integrated Services Digital
Network (1SDN) connections.
> Leased lines - These are dedicated connections that establish
permanent switched circuit that is always ready to carry
network traffic.
Leased lines are very expensive because then are dedicated
to the customer even when they are not in use.
> Packet switched services These are dedicated or dial-up
connections to a public packet switching network such as X.25, a
public frame-relay network, or even a virtual private network
(VPN). Intermediary switches send data packets along the best
route possible by using the logical address of the destination
node, which is contained in the packet header.
(iii) Remote LAN connection Remote access to a LAN can be either
through dial-up connection using a modem or through a leased
line. Remote access to the office LAN gives the employees and/or
customers access to the following services:
> File and print services
> Client/Server applications such as database applications
> Applications for remote network administration
Programs such as PcAnywhere control the networkaccess
remotely. However, since remote connection is mainly made using
connect it to the destination LAN. One can also use a leased line to
connect to the Internet.
Leased lines are very expensive as compared to dial-up lines.
In return, they are always available, active and secure.
The fee for a leased line is dependent on bandwidth and
distance. The fee is usually charged monthly or quarterly.
3. X.25 X.25 was designed as a global standard for a packet
switching network. It was originally designed to connect remote
terminals with mainframe hosts. X.25 was designed when analog
telephone transmissions were done on copper wire. Therefore, it
has a large overhead of error correction information, resulting in
inefficient use of bandwidth.
Although newer WAN technologies such as Frame Relay,
Integrated Services Digital Network ([SDN) and T-carrier services
are preferred these days, X.25 networks are widely used in credit
card verification, automatic teller machine transactions and other
dedicated business and financial uses.
An X.25 network consists of a backbone of X. 25 switches that
are called packet switching exchanges (PSEs). These switches pro
vide packet switching services. PSEs connect DCEs at the local
facilities of X.25 carriers to the X.25 Public Data Network (PDN).
DTEs at customer premises connect to DCEs at X.25 carrier
facilities by using a device called a packet assembler/disassembles
(PAD).
One DTE (computer terminal) can initiate a communication
session with another by dialing its X.21 address and establishing
either permanent virtual circuit or switched virtual circuit.
Messages are transmitted in the form of packets. Maximum packet
sizes range from 64 to 4096 bytes, depending on the system.
Packets are routed through the X.25 backbone network by using
the ID number (a 12-bit number) of the virtual circuit established
for this particular communication session. This ID number is also
known as the Logical Channel Identifier (LCI).
Some important Networks and its characteristics:
1. Public Switched Telephone Network (PSTN) -
> Analog nature of transmission.
> It has restricted bandwidth.
With its BRI and PRI servers ISDN has the flexibility to meet
the bandwidth needs of home office or company head quarter small
office can use ISDN BRI to support al of its voice and data
communication requirement and users in a very large office can
benefits from ISN PRI's capacity.
Advantage ISDN:
of
Physual layed
coaxial cable, and fiber optics network for local area network as
well as WAN communication. In other words such technology
compatible with existing network.
> ATM technology is also compatible with wireless and satellite
communication.
ATM Layered Structure: The new wide area service is called B
ISDN. It will offer video on demand, Live television from many
es, full motion multimedia e mail, CD quality music, high speed
data transport and many other services. The underline technology
that makes B-ISDN possible is called ATM. Following are the
different layers of ATM:
) Physical Layer - The physical layers deals with physical
devices and medium.
(ii) ATM Layer - ATM Layer mainly deals with cell and cell
transport. It defines the layout of a cell and tells what the
header fields mean. The size of a cell is 53 bytes (5 bytes of
header and 48 bytes of data/payload). Because each cell is the
same size and small, delay and other problems with
multiplexing different sized packets are avoided. Congestion
control is also located here. Functionality of this layer is same as
the network layer of OSI Model.
(ii) ATM Adaptation Layer - ATM Adaptation Layer is divided in
two sub layers:
(a) Segmentation and Reassembly (SAR) - This is the lower
part of ATM Adaptation Layer. The SAR sub layer breaks
packets intocell on the transmission side and put them back
together again at the destination.
(b) CS - This layer is responsible for accepting messages from
the application and breaking them into 48 bytes for
transmission.
> How ATM Protocol works?
When a user sends data over the ATM network. The higher level
data unit is passed down to the CS, which prepares the data for the
ATM layers. The data is then passed down the SAR sub layer, which
divides the data into appropriately sized segment.
These segments are then passed on to the ATM layer, which
defines and appropriate cell header for each segment and
encapsulate the header and payload into 53 byte cell. The cells are
then passed down to the physical layer, which streams the cell and
an appropriate place.
Benefits of ATM:
High bandwidth medium with low delay.
>
Meets the requirement of the telephone, cable television, radio
and data industries.
> Ability to transmit video without creating a glittering or loosing
the synchronization of sound and picture.
> ATM switches capable of transmitting 20 gigabits of data/second
and a shared switch can transmit up to 662 Gbits/sec.
> It isextremely fast and provides dynamic bandwidth.
>
ATMis designed for high performance multimedia networking.
Chapter - 11
Wireless communication
Introduction: Mobile devices such as laptop, palmtop, mobile,
phones etc. are now available at affordable prices. These devices,
based on the wireless communication techniques, help us to achieve
mobility. Mobility is the ability to access information and services
anyme and anywhere. Through wireless computing, one can access
information, on traffic, ticket booking, check account balance, e-mail
from one's home, cafeteria, or even from a grocery store.
Wireless communication makes use of spread, spectrum radio,
infrared, cellular radio and satellite communication technologies.
Since discussing each of them is out of the scope of this book, only the
Cellular radio and Satellite communication technologies are
discussed in the following sub-sections.
Cellular Radio: Cellular Radio means using a large number of low
power base stations for transmission, each having a limited coverage
area.
An area is divided into a number of smaller areas, called cells.
Each of these smaller areas is served by its own lowpower radio base
station. Frequency channels are allocated to these radio stations in
such a way that the channels (frequencies) used in one cell can be
reused in another cell some distance away.
Principle of Operation The principle behind cellular radio is this:
Instead of using one powerful transmitter,er, many lowpower
> Base Station Controllers (BSC) - They provide all the control
functions and physical links between the BTS (Base Transceiver
Stations) and MSC (Mobile Services Switching Centre). They
control handoffs, radio frequency (RF), power levels in base
transceiver stations (BTS) etc.
Base Transceiver Stations (BTS) BTS is the radio equipment
(transceiver + antenna) needed to service a cell. They handle the
radio interface to the mobile stations. A group of BTSs is con
trolled by a single BSC(Base Station Controller).
(ii) Operation and Support System (OSS) OS is connected to all
the elements of Switching System (SS) and to the Base Station
Controller (BSC). It is the functional entity through which the
network operator monitors and controls the system. It offers cost
effective support for centralized, regional and local operational and
maintenance activities required for a GSM network.
GSM Specifications Following is the list of GSM specifications:
> Frequency Range: 1,850 to 1,990 MHz.
> Duplex Distance: Duplex distance is the distance between the
uplink and downlink frequencies. Duplex distance specified for
GSM is 80 MHz.
>
Channel Separation: For GSM, separation between-adjacent
carrier frequencies is 200 KHz.
> Modulation: Modulation in GSM is done through Gaussian
minimum shift keying (GMSK).
> Transmission rate: GSM has a data rate of 270 kbps.
> Access Method: GSM utilizes the Time Division Multiple Access
(TDMA concept.
> Coding: GSM uses Linear Predictive Coding (LPC). Speech is
encoded at 13 kbps.
VSAT (VERY SMALL APERTURE TERMINAL):
Very Small Aperture Terminals (VSATs) are tiny terminals that have
1·meter antennas and can put out about 1 watt of power. The uplink
is generally good for 19.2 kbps, but the downlink is more, often. 512
kbps. In many VSAT systems, the micro stations do not have enough
power to communicate directly with one another. Instead, a special
ground station, the hub, with a large high gain antenna is needed to
relay traffic between VSATs as shown in Figure 11.7.
and access for share the common resource that's why security must
be maintained among network users. Following are the major
consideration to maintain network security:
> Information that is stored in the system only accessed through
authorized users.
> Sharable resources should be available for only authorized
members.
> Unauthorized users should not be able to insert unnecessary
information.
> Unauthorized users should not be able to access the information
of the system.
Protection against Unauthorized use: To prevent the use of
information through outsiders, legal users are assigned an
identification in the form of User ID with Password.
-
Types ofATTACK: There are two types of ATTACK:
Finish