KNR CN Unit-1
KNR CN Unit-1
Data Communication is the process of exchanging data or information between two devices
over a transmission medium, such as cables or wireless signals236. It involves a
communication system made up of hardware (sender, receiver, and intermediate devices) and
software (rules or protocols for how data is exchanged)125.
1. Delivery: Data must reach the correct destination and intended user.
2. Accuracy: Data should be delivered without errors.
3. Timeliness: Data (especially audio/video) should be delivered on time for real-time use.
4. Jitter: Variation in packet arrival time; too much jitter can affect timely delivery8.
Two devices communicate with each other by sending and receiving data. The data can flow
between the two devices in the following ways.
Simplex:
Unidirectional: Only one device sends data; the other only receives.
Example: CPU sends data to a monitor; monitor cannot reply245.
Half Duplex:
Bidirectional, but one at a time: Both devices can send and receive, but not
simultaneously.
Example: Walkie-talkie—each person speaks in turn245.
Full Duplex:
Bidirectional and simultaneous: Both devices can send and receive at the same time.
Example: Mobile phones—both parties can talk and listen at once245.
A computer network connects devices (nodes) through communication links, enabling data
exchange26. The main components are:
Hardware Components
Server: High-powered computer that manages network resources and provides services
to other devices13.
Client: Device (like a PC or smartphone) that requests and accesses network services13.
Peer: Device that both provides and receives services in peer-to-peer networks13.
Transmission Media: Physical or wireless channels (cables, fiber optics, radio waves) that
carry data between devices16.
Software Components
Network Operating System: Installed on servers, manages network resources and user
access16.
Protocol Suite: Set of rules (like TCP/IP or OSI) that govern how devices communicate
over the network16.
A Local Area Network connects computers and devices within a small area (e.g., home,
school, office) using Ethernet or Wi-Fi. It allows sharing files, printers, and resources among
connected devices.
Bus Topology
Structure:
All devices are connected to a single main cable (backbone).
Each node connects to the backbone directly or via a drop cable.
How it works:
When a node sends a message, all nodes receive it, but only the intended recipient
processes it.
Uses CSMA (Carrier Sense Multiple Access) to manage data flow:
CSMA/CD: Detects and recovers from data collisions.
CSMA/CA: Avoids collisions by checking if the media is busy before sending.
Advantages:
Low cost and simple setup.
Easy to add devices.
Failure of one node does not affect others.
Disadvantages:
If the main cable fails, the whole network goes down.
Troubleshooting is difficult.
Adding devices slows down the network.
Signal interference and attenuation can occur.
Ring Topology
Structure:
Each device is connected to two others, forming a closed loop.
Data travels in one direction (unidirectional) around the ring.
How it works:
Uses token passing: A token (frame) circulates; only the node with the token can send
data.
Data moves from node to node until it reaches the intended recipient.
Advantages:
Easy to manage and monitor.
Inexpensive cabling.
Reliable—not dependent on a single host.
Disadvantages:
If one node fails, the entire network can be affected.
Troubleshooting is difficult.
Adding devices increases delay and slows the network.
Star Topology
Structure:
All devices (nodes) are connected to a central hub or switch.
The central device is often called a server; connected devices are clients.
Uses coaxial or RJ-45 cables and hubs/switches for connections126.
Advantages:
Easy troubleshooting: Faults are isolated to individual connections.
Scalable: New devices can be added easily by connecting to the central hub.
Limited failure: Failure of one cable or device does not affect the whole network.
Network control: Centralized management and easy to implement changes.
Familiar and cost-effective: Uses common, inexpensive equipment.
High data speeds: Supports up to 100 Mbps (e.g., Ethernet 100BaseT).
Low data collision: Each device has a dedicated link to the hub.
Disadvantages:
Central point of failure: If the central hub fails, the whole network goes down.
Cable management: Requires a lot of cabling, which can be complex and costly.
Depends on hub capacity: Network performance is limited by the central hub’s
capabilities156.
Tree Topology
Structure:
Combines features of bus and star topologies.
Devices are connected in a hierarchical (parent-child) structure.
Top node is the root; all other nodes are descendants.
Only one path exists between any two nodes.
Advantages:
Broadband transmission: Supports long-distance signal transmission without loss.
Easily expandable: New devices can be added to the network.
Easily manageable: Network is divided into segments (star networks) for easier
management.
Easy error detection: Errors are simple to detect and correct.
Limited failure: Failure of one node does not affect the whole network.
Point-to-point wiring: Each segment has dedicated wiring.
Disadvantages:
Difficult troubleshooting: Faults in nodes can be hard to locate.
High cost: Equipment for broadband transmission is expensive.
Main bus failure: Failure of the main bus cable damages the whole network.
Difficult reconfiguration: Adding new devices can be complicated6.
Mesh Topology
Structure:
All devices are interconnected with multiple redundant connections.
No central device (switch, hub, or server) required.
Multiple paths exist between any two devices.
Categories:
Use Cases:
Mainly used in WANs and wireless networks.
Internet is an example of mesh topology.
Advantages:
Highly reliable: Failure of one link does not disrupt the whole network.
Fast communication: Multiple paths allow quick data transfer.
Easy reconfiguration: Adding devices is simple and does not disrupt others.
Disadvantages:
High cost: Requires many devices and cables.
Difficult management: Large networks are hard to monitor and maintain.
Reduced efficiency: Redundant connections can lower overall network efficiency.
Hybrid Topology
Structure:
Combines two or more different topologies (e.g., star and bus, ring and mesh).
Connecting similar topologies does not make a hybrid topology.
Advantages:
Reliable: Fault in one part does not affect the whole network.
Scalable: Easy to expand by adding new devices.
Flexible: Can be designed to meet specific needs.
Effective: Maximizes strengths and minimizes weaknesses of individual topologies.
Disadvantages:
Complex design: Architecture is difficult to plan and implement.
High cost: Hubs and infrastructure are expensive.
Costly infrastructure: Requires a lot of cabling and devices.
Protocol:
A set of agreed rules and procedures for successful communication between devices
in a network124.
Defines what, how, and when data is sent and received.
Key Elements of Protocols:
1. Syntax:
Defines the structure or format of the data being transmitted (e.g., header, data,
footer)3.
2. Semantics:
Explains the meaning or interpretation of each part of the data (control, error
handling, etc.)3.
3. Timing:
Determines the sequence and speed at which data is sent and received3.
Standards:
Simplifies Understanding:
Helps you understand how communication happens over a network.
Easier Troubleshooting:
Separates network functions into layers, making it easier to find and fix problems.
Supports New Technologies:
Makes it easier to understand and integrate new technologies as they emerge.
Enables Comparison:
Allows you to compare how different network layers and devices work together.
Late 1970s:
ISO started developing general networking standards.
1973:
UK’s Experimental Packet Switched System highlighted the need for higher-level
protocol standards.
1983:
OSI model first created as a detailed specification for network interfaces.
1984:
OSI architecture officially adopted as an international standard by ISO.
Switch, bridge.
Note:
Data Link Layer is handled by the NIC and device drivers.
Packets at this layer are called frames.
Number of Layers 4 7
Transport Layer Assurance Does not guarantee packet Guarantees packet delivery
delivery
2. Internet Layer
Corresponds to:
OSI Network layer.
Functions:
Responsible for logical transmission of data across the network.
Routes packets from source to destination using IP addresses.
Protocols:
IP (Internet Protocol):
Delivers packets using IP addresses.
Versions: IPv4 (most common), IPv6 (newer, larger address space).
ICMP (Internet Control Message Protocol):
Reports network problems and errors.
ARP (Address Resolution Protocol):
Finds hardware (MAC) address from a known IP address.
Types: Reverse ARP, Proxy ARP, Gratuitous ARP, Inverse ARP.
3. Host-to-Host/Transport Layer
Corresponds to:
OSI Transport layer.
Functions:
Provides end-to-end communication and error-free data delivery.
Shields upper-layer applications from network complexities.
Protocols:
TCP (Transmission Control Protocol):
Reliable, connection-oriented, with sequencing, acknowledgment, and flow
control.
Higher overhead due to reliability features.
UDP (User Datagram Protocol):
Connectionless, unreliable, but fast and cost-effective.
No sequencing or acknowledgment.
4. Application Layer
Corresponds to:
OSI Application, Presentation, and Session layers.
Functions:
Handles user interface and node-to-node communication.
Manages data exchange between applications.
Protocols:
HTTP/HTTPS:
Manages web browser-server communication (HTTPS is secure).
FTP, TFTP:
File transfer protocols.
Telnet, SSH:
Remote terminal access (SSH is secure).
SMTP, SNMP:
Email and network management.
NTP:
Synchronizes clocks for accurate timekeeping (important for transactions).
DNS, DHCP, NFS, X Window, LPD:
Domain name resolution, dynamic IP assignment, network file sharing, etc.
Line Coding
Definition:
Converts digital data into digital signals using voltage levels.
Types of Line Coding Schemes:
1. Uni-polar Encoding:
Single voltage level: High voltage for binary 1, no voltage for binary 0.
Also called: Unipolar-Non-Return-to-Zero (Unipolar NRZ).
1. Polar Encoding:
Multiple voltage levels: Different voltages for binary 1 and 0.
Subtypes:
Polar NRZ: Two voltage levels (positive for 1, negative for 0).
Block Coding
Purpose:
Adds redundant bits to ensure data accuracy (error detection/correction).
Example:
Even-parity: Adds a parity bit to make the number of 1s even.
Notation:
mB/nB: Substitutes an m-bit block with an n-bit block (n > m).
Steps:
1. Division: Divides data into blocks.
2. Substitution: Replaces each m-bit block with an n-bit block.
3. Combination: Combines the substituted blocks for transmission.
After block coding:
Data is line coded for transmission.
Quantization:
Each sample’s amplitude is approximated to the nearest discrete value.
This step converts the continuous range of amplitudes into a limited set of levels.
3 Encoding:
Multiplexing
Definition:
Sharing a single medium or bandwidth by combining multiple signals from different
sources and transmitting them over one communication line.
Purpose:
Efficiently utilizes available bandwidth or resources.
Types of Multiplexing
Uses:
Analog signals.
Method:
Divides the carrier bandwidth into logical channels.
Each user gets a unique frequency channel.
Channels are separated by guard bands (unused frequencies).
Advantage:
Users have exclusive access to their assigned frequency.
Uses:
Primarily digital signals (can also be used for analog).
Method:
Divides the shared channel into time slots.
Each user transmits data only during their assigned time slot.
Digital signals are divided into frames, each frame fits into a time slot.
Synchronization:
Multiplexer and De-multiplexer are synchronized; both switch channels at the same
time.
Advantage:
Efficient use of bandwidth for digital communication.
Uses:
Optical signals (fiber optics).
Method:
Combines multiple optical signals (each with a different wavelength/color) into one
fiber.
Conceptually similar to FDM, but uses light instead of electrical signals.
Extension:
TDM can be applied on each wavelength to increase data capacity.
4. Code Division Multiplexing (CDM)
Uses:
Digital signals.
Method:
Transmits multiple signals over a single frequency by assigning each user a unique
code (chip).
Signals are spread using orthogonal codes and transmitted simultaneously.
Receiver uses the known code to extract the intended signal.
Advantage:
Users can use the full bandwidth all the time.
Network Switching
Definition:
Switching is the process of forwarding packets from an input (ingress) port to an
output (egress) port leading to the destination.
Categories:
Connectionless Switching:
Data is forwarded using routing tables.
No prior circuit setup is needed.
Acknowledgements are optional.
Connection-Oriented Switching:
A circuit is established before data transfer.
Data is sent over this dedicated path.
Circuit can be kept open or closed after use.
1. Circuit Switching
Process:
A dedicated communication path is set up between sender and receiver.
Data travels only over this pre-established route.
Phases:
1. Circuit Establishment:
A connection request is sent and acknowledged.
2. Data Transfer:
Data is transmitted along the established path.
3. Circuit Disconnect:
The path is terminated after data transfer.
Examples:
Traditional telephone networks (PSTN).
Features:
Circuits can be permanent or temporary.
Designed for voice applications.
2. Message Switching
Process:
The entire message is treated as a single unit and sent in one go.
Uses a store-and-forward mechanism.
Operation:
Each switch buffers the whole message until resources are available to forward it.
If resources are unavailable, the message is stored and waits.
Drawbacks:
Each switch needs enough storage for the entire message.
Slow due to storage and waiting for resources.
Not suitable for real-time or streaming applications.
3. Packet Switching
Process:
The message is divided into smaller chunks called packets.
Each packet has a header with switching information and is sent independently.
Advantages:
Intermediate devices need less storage.
Enhances line efficiency (multiple applications can share the line).
Packets can be prioritized for quality of service.
Usage:
The internet uses packet switching.
Suitable for real-time and streaming applications.