est_data communication lecture

47
DATA COMMUNICATIONS  Engr. Marlyn Quiambao-Camingal ECE Table of Contents  Part One I. Introduction of Data Communications II. Data Transmission III. OSI IV. Networking (LAN) V. Internetworking (WAN)  Part Two VI. Modem and Interface VII. ISDN VIII. X.25/Frame Relay/ATM IX. SONET/SDH X. TCP/IP

Upload: giovanni

Post on 10-Jan-2016

12 views

Category:

Documents


0 download

DESCRIPTION

lecture for data comm

TRANSCRIPT

Page 1: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Table of Contents

Part OneI Introduction of Data Communications

II Data Transmission

III OSI

IV Networking (LAN)

V Internetworking (WAN)

Part Two

VI Modem and InterfaceVII ISDN

VIII X25Frame RelayATM

IX SONETSDH

X TCPIP

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

I INTRODUCTION of DATA COMMUNICATIONS

Data Communication

bull is the exchange of data between two devices via some form oftransmission system

(Data Communications amp Networking by Forouzan)

bull is the transmission of binary or digital information from one point to

another

(Communications Electronics by Frenzel)

bull is the process of transmitting and receiving digital information from

one point to another via electrical radio and optical means

(general definition)

Data bull refers to a facts concepts and instructionsbull it is also known as digital information

Bit (binary digit) bull is the smallest unit of information (0s or 1s)

Forms of Information

bull sound (voice music and the like) bull text (alphanumeric and other special characters)

bull video (moving images)

bull images (graphics and pictures)

Components of Data Communication System

1 information source 5 decoder2 encoder 6 destination

3 transmission medium 7 noise

4 repeaters 8 attenuation

1 2 3 4 5 6

7

8

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Five Basic Components of Data Communications

ProtocolProtocol Message

Medium

Sender Receiver

Protocol

bull is a set of rules that governs the data communications

Standards

bull are guidelines to manufacturers government agencies other service

providers to ensure the kind of interconnectivity necessary in todayrsquosmarketplace and international communications

Two Categories of Standards

Standards

Reasons for Standardization

bull Ensure hardware software compatibility

bull Promote competition with high quality

bull Consumer can hold down the pricesbull It opened the possibility to build networks and share information (inter-

operational of different networks)

bull Ensure Reliable communication ndash ldquoprotocolrdquobull Determine standard methods of communications

De facto De jure

Proprietary Non-proprietary

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standard-Making Bodies

ITU ndash International Telecommunication Union

an international standards organization related to the United Nations that develops

standards in telecommunications

ANSI ndash American National Standard Institution

a nonprofit organization is the US voting representative to both the ISO and ITU

IEEE ndash Institute of Electronics amp Electrical Engineers

is the largest national professional group involved in developing standards for

computing communications electrical engineering and electronics

EIA ndash Electronic Industries Association

is an association of electronics manufacturers in the US

FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to

communications

Responsibilities

bull review rate and service-charge applications made by T amp T providers

bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return

bull divide and allocate radio frequencies

bull assign carrier frequencies for radio and television broadcast

ISO ndash International Standard Organization

bull Established in 1947

bull A multinational body dedicated to worldwide agreement on

international standardsbull Covers all aspects of network communication in the OSI model

II DATA TRANSMISSION

According to Request and Response

bull Simplex one way communication

Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time

Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication

Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex

Ex Computer communication

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Timing

bull Asynchronous

bull Sending one start bit (0) at the beginning and one or more stop bits (1) at

the end of each bit

bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same

bull Synchronous

bull Sending bits one after another without startstop bits or gaps It is the

responsibility of the receiver to group the bits

According to Number of Links

bull Serial one at a time bit transmission

1001001

100100

1001001

bull Parallel group of bits transmission

1001001

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

III OPEN SYSTEM INTERCONNECTION

OSI Open System Interconnection

bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications

bull Reference model describes how information from a software applications

in one computer moves through a network medium to a software

application in another computerbull A conceptual model composed of 7 layers each specifying particular

function divides the tasks into more manageable

task groupsbull It is a not a protocol it is a model for understanding and designing a

network architecture that is flexible robust and interoperable

Layer

bull Define as the segment of the process of moving information across a

networkbull Defines a family of functions distinct from other layers

bull Is reasonably self-contained to implement task assigned independently

Solution to update without adversely affecting the other layers

Internetwork

Is a collection of individual networks connected by intermediate devices

that function as a single large network

Open System

Is a set of protocols that allows any two different systems to communicate

regardless of their underlying architecture

Closed System

A vendor specified protocol

OSI-RM Open System Interconnection-Reference Model

Mnemonic Please Do Not Touch Steversquos Pet Alligator

bull Layer 7 Applicationbull Layer 6 Presentation

bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network

bull Layer 2 Datalink

bull Layer 1 Physical

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

A lication

Presentation

Session

Trans ort

Network

Datalink

Ph sical

Characteristics of OSI Layers

Two Categories1 Upper Layers

Deal with application issues and generally are implemented only in software

Refer to any above layers in the OSI model

2 Lower Layers

Handle data transport issues and implemented in both hardware and software

Protocol

Is a formal set of rules and conventions that governs how computers exchange

information over a network medium

Groups of Protocol 1 LAN Protocol (Local Area Network)

Operate at the network and datalink layers define communications over variousLAN media

2 WAN Protocol (Wide Area Network)

Operate at the lowest 3 layers of OSI and define communications over the various

wide area media

3 Routing Protocol

Network layer protocols that are responsible for path determination and traffic

switching

4 Network Protocol

Various upper-layer protocols that exist in a given OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 2: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

I INTRODUCTION of DATA COMMUNICATIONS

Data Communication

bull is the exchange of data between two devices via some form oftransmission system

(Data Communications amp Networking by Forouzan)

bull is the transmission of binary or digital information from one point to

another

(Communications Electronics by Frenzel)

bull is the process of transmitting and receiving digital information from

one point to another via electrical radio and optical means

(general definition)

Data bull refers to a facts concepts and instructionsbull it is also known as digital information

Bit (binary digit) bull is the smallest unit of information (0s or 1s)

Forms of Information

bull sound (voice music and the like) bull text (alphanumeric and other special characters)

bull video (moving images)

bull images (graphics and pictures)

Components of Data Communication System

1 information source 5 decoder2 encoder 6 destination

3 transmission medium 7 noise

4 repeaters 8 attenuation

1 2 3 4 5 6

7

8

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Five Basic Components of Data Communications

ProtocolProtocol Message

Medium

Sender Receiver

Protocol

bull is a set of rules that governs the data communications

Standards

bull are guidelines to manufacturers government agencies other service

providers to ensure the kind of interconnectivity necessary in todayrsquosmarketplace and international communications

Two Categories of Standards

Standards

Reasons for Standardization

bull Ensure hardware software compatibility

bull Promote competition with high quality

bull Consumer can hold down the pricesbull It opened the possibility to build networks and share information (inter-

operational of different networks)

bull Ensure Reliable communication ndash ldquoprotocolrdquobull Determine standard methods of communications

De facto De jure

Proprietary Non-proprietary

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standard-Making Bodies

ITU ndash International Telecommunication Union

an international standards organization related to the United Nations that develops

standards in telecommunications

ANSI ndash American National Standard Institution

a nonprofit organization is the US voting representative to both the ISO and ITU

IEEE ndash Institute of Electronics amp Electrical Engineers

is the largest national professional group involved in developing standards for

computing communications electrical engineering and electronics

EIA ndash Electronic Industries Association

is an association of electronics manufacturers in the US

FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to

communications

Responsibilities

bull review rate and service-charge applications made by T amp T providers

bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return

bull divide and allocate radio frequencies

bull assign carrier frequencies for radio and television broadcast

ISO ndash International Standard Organization

bull Established in 1947

bull A multinational body dedicated to worldwide agreement on

international standardsbull Covers all aspects of network communication in the OSI model

II DATA TRANSMISSION

According to Request and Response

bull Simplex one way communication

Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time

Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication

Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex

Ex Computer communication

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Timing

bull Asynchronous

bull Sending one start bit (0) at the beginning and one or more stop bits (1) at

the end of each bit

bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same

bull Synchronous

bull Sending bits one after another without startstop bits or gaps It is the

responsibility of the receiver to group the bits

According to Number of Links

bull Serial one at a time bit transmission

1001001

100100

1001001

bull Parallel group of bits transmission

1001001

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

III OPEN SYSTEM INTERCONNECTION

OSI Open System Interconnection

bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications

bull Reference model describes how information from a software applications

in one computer moves through a network medium to a software

application in another computerbull A conceptual model composed of 7 layers each specifying particular

function divides the tasks into more manageable

task groupsbull It is a not a protocol it is a model for understanding and designing a

network architecture that is flexible robust and interoperable

Layer

bull Define as the segment of the process of moving information across a

networkbull Defines a family of functions distinct from other layers

bull Is reasonably self-contained to implement task assigned independently

Solution to update without adversely affecting the other layers

Internetwork

Is a collection of individual networks connected by intermediate devices

that function as a single large network

Open System

Is a set of protocols that allows any two different systems to communicate

regardless of their underlying architecture

Closed System

A vendor specified protocol

OSI-RM Open System Interconnection-Reference Model

Mnemonic Please Do Not Touch Steversquos Pet Alligator

bull Layer 7 Applicationbull Layer 6 Presentation

bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network

bull Layer 2 Datalink

bull Layer 1 Physical

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

A lication

Presentation

Session

Trans ort

Network

Datalink

Ph sical

Characteristics of OSI Layers

Two Categories1 Upper Layers

Deal with application issues and generally are implemented only in software

Refer to any above layers in the OSI model

2 Lower Layers

Handle data transport issues and implemented in both hardware and software

Protocol

Is a formal set of rules and conventions that governs how computers exchange

information over a network medium

Groups of Protocol 1 LAN Protocol (Local Area Network)

Operate at the network and datalink layers define communications over variousLAN media

2 WAN Protocol (Wide Area Network)

Operate at the lowest 3 layers of OSI and define communications over the various

wide area media

3 Routing Protocol

Network layer protocols that are responsible for path determination and traffic

switching

4 Network Protocol

Various upper-layer protocols that exist in a given OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 3: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Five Basic Components of Data Communications

ProtocolProtocol Message

Medium

Sender Receiver

Protocol

bull is a set of rules that governs the data communications

Standards

bull are guidelines to manufacturers government agencies other service

providers to ensure the kind of interconnectivity necessary in todayrsquosmarketplace and international communications

Two Categories of Standards

Standards

Reasons for Standardization

bull Ensure hardware software compatibility

bull Promote competition with high quality

bull Consumer can hold down the pricesbull It opened the possibility to build networks and share information (inter-

operational of different networks)

bull Ensure Reliable communication ndash ldquoprotocolrdquobull Determine standard methods of communications

De facto De jure

Proprietary Non-proprietary

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standard-Making Bodies

ITU ndash International Telecommunication Union

an international standards organization related to the United Nations that develops

standards in telecommunications

ANSI ndash American National Standard Institution

a nonprofit organization is the US voting representative to both the ISO and ITU

IEEE ndash Institute of Electronics amp Electrical Engineers

is the largest national professional group involved in developing standards for

computing communications electrical engineering and electronics

EIA ndash Electronic Industries Association

is an association of electronics manufacturers in the US

FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to

communications

Responsibilities

bull review rate and service-charge applications made by T amp T providers

bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return

bull divide and allocate radio frequencies

bull assign carrier frequencies for radio and television broadcast

ISO ndash International Standard Organization

bull Established in 1947

bull A multinational body dedicated to worldwide agreement on

international standardsbull Covers all aspects of network communication in the OSI model

II DATA TRANSMISSION

According to Request and Response

bull Simplex one way communication

Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time

Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication

Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex

Ex Computer communication

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Timing

bull Asynchronous

bull Sending one start bit (0) at the beginning and one or more stop bits (1) at

the end of each bit

bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same

bull Synchronous

bull Sending bits one after another without startstop bits or gaps It is the

responsibility of the receiver to group the bits

According to Number of Links

bull Serial one at a time bit transmission

1001001

100100

1001001

bull Parallel group of bits transmission

1001001

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

III OPEN SYSTEM INTERCONNECTION

OSI Open System Interconnection

bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications

bull Reference model describes how information from a software applications

in one computer moves through a network medium to a software

application in another computerbull A conceptual model composed of 7 layers each specifying particular

function divides the tasks into more manageable

task groupsbull It is a not a protocol it is a model for understanding and designing a

network architecture that is flexible robust and interoperable

Layer

bull Define as the segment of the process of moving information across a

networkbull Defines a family of functions distinct from other layers

bull Is reasonably self-contained to implement task assigned independently

Solution to update without adversely affecting the other layers

Internetwork

Is a collection of individual networks connected by intermediate devices

that function as a single large network

Open System

Is a set of protocols that allows any two different systems to communicate

regardless of their underlying architecture

Closed System

A vendor specified protocol

OSI-RM Open System Interconnection-Reference Model

Mnemonic Please Do Not Touch Steversquos Pet Alligator

bull Layer 7 Applicationbull Layer 6 Presentation

bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network

bull Layer 2 Datalink

bull Layer 1 Physical

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

A lication

Presentation

Session

Trans ort

Network

Datalink

Ph sical

Characteristics of OSI Layers

Two Categories1 Upper Layers

Deal with application issues and generally are implemented only in software

Refer to any above layers in the OSI model

2 Lower Layers

Handle data transport issues and implemented in both hardware and software

Protocol

Is a formal set of rules and conventions that governs how computers exchange

information over a network medium

Groups of Protocol 1 LAN Protocol (Local Area Network)

Operate at the network and datalink layers define communications over variousLAN media

2 WAN Protocol (Wide Area Network)

Operate at the lowest 3 layers of OSI and define communications over the various

wide area media

3 Routing Protocol

Network layer protocols that are responsible for path determination and traffic

switching

4 Network Protocol

Various upper-layer protocols that exist in a given OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 4: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standard-Making Bodies

ITU ndash International Telecommunication Union

an international standards organization related to the United Nations that develops

standards in telecommunications

ANSI ndash American National Standard Institution

a nonprofit organization is the US voting representative to both the ISO and ITU

IEEE ndash Institute of Electronics amp Electrical Engineers

is the largest national professional group involved in developing standards for

computing communications electrical engineering and electronics

EIA ndash Electronic Industries Association

is an association of electronics manufacturers in the US

FCC ndash Federal Communication Commissionhas the authority over interstate and international commerce as it relates to

communications

Responsibilities

bull review rate and service-charge applications made by T amp T providers

bull review technical specifications of communications hardwarebull establish reasonable common carriers rates of return

bull divide and allocate radio frequencies

bull assign carrier frequencies for radio and television broadcast

ISO ndash International Standard Organization

bull Established in 1947

bull A multinational body dedicated to worldwide agreement on

international standardsbull Covers all aspects of network communication in the OSI model

II DATA TRANSMISSION

According to Request and Response

bull Simplex one way communication

Ex AMFMTV broadcasting beeperbull Half Duplex two way communication but one at a time

Ex Military radio walkie-talkiebull Full Duplex simultaneous two way communication

Ex Cellfone telephonebull Full-full Duplex more than a half duplex but less than a full duplex

Ex Computer communication

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Timing

bull Asynchronous

bull Sending one start bit (0) at the beginning and one or more stop bits (1) at

the end of each bit

bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same

bull Synchronous

bull Sending bits one after another without startstop bits or gaps It is the

responsibility of the receiver to group the bits

According to Number of Links

bull Serial one at a time bit transmission

1001001

100100

1001001

bull Parallel group of bits transmission

1001001

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

III OPEN SYSTEM INTERCONNECTION

OSI Open System Interconnection

bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications

bull Reference model describes how information from a software applications

in one computer moves through a network medium to a software

application in another computerbull A conceptual model composed of 7 layers each specifying particular

function divides the tasks into more manageable

task groupsbull It is a not a protocol it is a model for understanding and designing a

network architecture that is flexible robust and interoperable

Layer

bull Define as the segment of the process of moving information across a

networkbull Defines a family of functions distinct from other layers

bull Is reasonably self-contained to implement task assigned independently

Solution to update without adversely affecting the other layers

Internetwork

Is a collection of individual networks connected by intermediate devices

that function as a single large network

Open System

Is a set of protocols that allows any two different systems to communicate

regardless of their underlying architecture

Closed System

A vendor specified protocol

OSI-RM Open System Interconnection-Reference Model

Mnemonic Please Do Not Touch Steversquos Pet Alligator

bull Layer 7 Applicationbull Layer 6 Presentation

bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network

bull Layer 2 Datalink

bull Layer 1 Physical

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

A lication

Presentation

Session

Trans ort

Network

Datalink

Ph sical

Characteristics of OSI Layers

Two Categories1 Upper Layers

Deal with application issues and generally are implemented only in software

Refer to any above layers in the OSI model

2 Lower Layers

Handle data transport issues and implemented in both hardware and software

Protocol

Is a formal set of rules and conventions that governs how computers exchange

information over a network medium

Groups of Protocol 1 LAN Protocol (Local Area Network)

Operate at the network and datalink layers define communications over variousLAN media

2 WAN Protocol (Wide Area Network)

Operate at the lowest 3 layers of OSI and define communications over the various

wide area media

3 Routing Protocol

Network layer protocols that are responsible for path determination and traffic

switching

4 Network Protocol

Various upper-layer protocols that exist in a given OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 5: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Timing

bull Asynchronous

bull Sending one start bit (0) at the beginning and one or more stop bits (1) at

the end of each bit

bull Means ldquoasynchronous at the byte levelrdquo but the bits are still synchronizedtheir durations are the same

bull Synchronous

bull Sending bits one after another without startstop bits or gaps It is the

responsibility of the receiver to group the bits

According to Number of Links

bull Serial one at a time bit transmission

1001001

100100

1001001

bull Parallel group of bits transmission

1001001

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

III OPEN SYSTEM INTERCONNECTION

OSI Open System Interconnection

bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications

bull Reference model describes how information from a software applications

in one computer moves through a network medium to a software

application in another computerbull A conceptual model composed of 7 layers each specifying particular

function divides the tasks into more manageable

task groupsbull It is a not a protocol it is a model for understanding and designing a

network architecture that is flexible robust and interoperable

Layer

bull Define as the segment of the process of moving information across a

networkbull Defines a family of functions distinct from other layers

bull Is reasonably self-contained to implement task assigned independently

Solution to update without adversely affecting the other layers

Internetwork

Is a collection of individual networks connected by intermediate devices

that function as a single large network

Open System

Is a set of protocols that allows any two different systems to communicate

regardless of their underlying architecture

Closed System

A vendor specified protocol

OSI-RM Open System Interconnection-Reference Model

Mnemonic Please Do Not Touch Steversquos Pet Alligator

bull Layer 7 Applicationbull Layer 6 Presentation

bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network

bull Layer 2 Datalink

bull Layer 1 Physical

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

A lication

Presentation

Session

Trans ort

Network

Datalink

Ph sical

Characteristics of OSI Layers

Two Categories1 Upper Layers

Deal with application issues and generally are implemented only in software

Refer to any above layers in the OSI model

2 Lower Layers

Handle data transport issues and implemented in both hardware and software

Protocol

Is a formal set of rules and conventions that governs how computers exchange

information over a network medium

Groups of Protocol 1 LAN Protocol (Local Area Network)

Operate at the network and datalink layers define communications over variousLAN media

2 WAN Protocol (Wide Area Network)

Operate at the lowest 3 layers of OSI and define communications over the various

wide area media

3 Routing Protocol

Network layer protocols that are responsible for path determination and traffic

switching

4 Network Protocol

Various upper-layer protocols that exist in a given OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 6: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

III OPEN SYSTEM INTERCONNECTION

OSI Open System Interconnection

bull Developed by ISO in 1984 considered as the primary architectural modelfor intercomputer (data) communications

bull Reference model describes how information from a software applications

in one computer moves through a network medium to a software

application in another computerbull A conceptual model composed of 7 layers each specifying particular

function divides the tasks into more manageable

task groupsbull It is a not a protocol it is a model for understanding and designing a

network architecture that is flexible robust and interoperable

Layer

bull Define as the segment of the process of moving information across a

networkbull Defines a family of functions distinct from other layers

bull Is reasonably self-contained to implement task assigned independently

Solution to update without adversely affecting the other layers

Internetwork

Is a collection of individual networks connected by intermediate devices

that function as a single large network

Open System

Is a set of protocols that allows any two different systems to communicate

regardless of their underlying architecture

Closed System

A vendor specified protocol

OSI-RM Open System Interconnection-Reference Model

Mnemonic Please Do Not Touch Steversquos Pet Alligator

bull Layer 7 Applicationbull Layer 6 Presentation

bull Layer 5 Sessionbull Layer 4 Transportbull Layer 3 Network

bull Layer 2 Datalink

bull Layer 1 Physical

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

A lication

Presentation

Session

Trans ort

Network

Datalink

Ph sical

Characteristics of OSI Layers

Two Categories1 Upper Layers

Deal with application issues and generally are implemented only in software

Refer to any above layers in the OSI model

2 Lower Layers

Handle data transport issues and implemented in both hardware and software

Protocol

Is a formal set of rules and conventions that governs how computers exchange

information over a network medium

Groups of Protocol 1 LAN Protocol (Local Area Network)

Operate at the network and datalink layers define communications over variousLAN media

2 WAN Protocol (Wide Area Network)

Operate at the lowest 3 layers of OSI and define communications over the various

wide area media

3 Routing Protocol

Network layer protocols that are responsible for path determination and traffic

switching

4 Network Protocol

Various upper-layer protocols that exist in a given OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 7: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

A lication

Presentation

Session

Trans ort

Network

Datalink

Ph sical

Characteristics of OSI Layers

Two Categories1 Upper Layers

Deal with application issues and generally are implemented only in software

Refer to any above layers in the OSI model

2 Lower Layers

Handle data transport issues and implemented in both hardware and software

Protocol

Is a formal set of rules and conventions that governs how computers exchange

information over a network medium

Groups of Protocol 1 LAN Protocol (Local Area Network)

Operate at the network and datalink layers define communications over variousLAN media

2 WAN Protocol (Wide Area Network)

Operate at the lowest 3 layers of OSI and define communications over the various

wide area media

3 Routing Protocol

Network layer protocols that are responsible for path determination and traffic

switching

4 Network Protocol

Various upper-layer protocols that exist in a given OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 8: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Application Application

Interfaces

The link between two adjacent layers of the OSI model

EncapsulationFraming

The process of putting the data unit into frame

Session

Transport

Presentation Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Datalink

Network

Physical

Interface 3-2

Interface 2-1

Session

Transport

Datalink

Network

Presentation

Interface 7-6

Interface 6-5

Interface 5-4

Interface 4-3

Network

Physical

Interface 3-2Interface 3-2

Datalink

Interface 2-1Interface 2-1

Physical

L7 data

L7 data H6

L6 data H5

H4

L4 data H3

L3 data H2T2

010101011011110110111110111110

L5 data

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 9: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Information Formats in the OSI Layers

A frame is an information unit whose source and destination are datalink layer entities A

frame is composed of the datalink layer header (and possibly a trailer) and upper-layer

data The header and the trailer contain control information intended for the data-link

layer entity in the destination system

A packet is an information unit whose source and destination are network-layer entities

A packet is composed of the network-layer header (and possibly a trailer0 and upper-layer data The header and the trailer contain control information intended for the

network-layer entity in the destination system The data from upper-layer entities is

encapsulated in the network-layer header and trailer

The term datagram usually refers to an information unit whose source and destination

are network-layer entities that use connectionless network services

The term segment usually refers to an information unit whose source and destination aretransport layer entities

A message is an information unit whose source and destination entities exist above the

network layer (often the application layer)

A cell is an information unit of a fixed size whose source and destination are datalink

layer entities Cells are used in switched environments such as ATM and SMDS A cell

is composed of the header and payload The header contains control informationintended for the destination datalink layer entity and is typically 5 bytes long The

payload contains upper-layer data that is encapsulated in the cell header and typically 48 bytes long

Data unit is a generic term that refers to a variety of information units Some commondata units are service data units (SDU) protocol data units (PDU) and bridge protocol

data units (BPDU) SDUs are information units from upper-layer protocols that define a

service request to a lower-layer protocol PDU is OSI terminology for a packet BPDUS

are used by the spanning-tree algorithm as hello messages

Three Basic elements in Layer Services

1 Service User is the OSI layer that requests services from an adjacent OSI layer

2 Service Provider is the OSI layer that provides services to service users

3 Service Access Point is a conceptual location at which one OSI layer can request the

services of another OSI layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 10: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Physical Layerbull It deals with the mechanical and electrical specifications of primary connections

such as cables connectors and signaling options that physically link two nodes on

a network

bull It coordinates the functions required to transmit a bit stream over physical

mediumbull It oversees the changing of a bit stream into EM signals and across the medium

Number of Considerations

Line Configuration

Data transmission modeTopology

Signals

Encoding

InterfaceMedium

Datalink Layerbull It is responsible for delivering data units from one station to the next without

errors

bull It accepts data unit from the third layer and adds meaningful bits to the beginningand end that contain address and other control information

Sublayers

LLC-Logical Link Control

Maintains the link between two nodes

MAC-Media Access ControlControls which computer on a network can be transmitting or receiving

data at a given time

Responsibilities

bull Node to node delivery

bull Access Controlbull Flow Control

bull Error handling

bull Synchronization

PhysicalNode Address

MAC Address Example

Node A - 87DE-FADA-DEAD

Node B - 8576-EDAD-CADE

Node C - CACA-BEAD-1562

Network Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 11: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Responsible for the source-to-destination delivery of a packet across multiple

network linksbull Ensures that each packet gets from its point of origin to its final destination

successfully and efficiently

bull Responsible for switching and routing

Switching

Refers to temporary connections between physical links resulting in longer linksfor network transmission

Routing

Means selecting the best path for sending a packet from one point to another when

more than one path is available

Responsibilities

bull Source-to-destination deliverybull Logical addressing

bull Routingbull Address transformation

bull Multiplexing

Logical Address

Address different from the physical addresses network layer addresses are those

of the original source and the final destination

Example

Quad-Dotted Decimal

0000 to 255255255255

12556242

Transport Layer bull Responsible for source-to-destination (end-to-end) delivery of

the entire message

bull Ensures that the whole message arrives intact and in order

overseeing both error control and flow control at the source-to-

destination levelbull The network layer gets each packets to the correct computer

the transport layer gets the entire message to the correctapplication or that computer

bull Header contains sequences or segmentations numbers

Service Point Address

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 12: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Port address or socket address

bull The type of address in the transport layer header

Connection

bull Is a single logical path between the source and destination that is

associated with all packets in a message

Three Steps for Connections

1 Connection establishment2 Data transfer

3 Connection release

Responsibilities

bull End-to-end message delivery

bull Service point (port) addressingbull Segmentation and reassembly

bull Connection control

Session Layerbull The network dialog controller

bull It establishes maintains and synchronizes the interaction betweencommunicating devices

bull It ensures that each session closes appropriately rather than shutting down

abruptly and leaving the user hanging

bull Validates and establishes connections between usersbull Includes password and log-in verifications

bull Controls the exchange of data

bull Whether the exchange occurs in both directions and simultaneously oronly one direction at a time

Checkpoints

Allow a session to backtrack a certain distance without completely starting over

when problems arises

Responsibilities

1 Session management

2 Synchronization

3 Dialog Control

4 Graceful Close

Presentation Layer

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 13: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Ensures interoperability among communicating devices

bull Possible for two computers to communicate even if their internalrepresentations of data differ

bull Provides the necessary translation of different control codes

character sets graphics characters and so on to allow both devices to

understand the same transmission at the same waybull Responsible for encryptiondecryption of data for security purposes and

for compression and expansion of data when necessary for transmission

efficiency

Application Layerbull Enables the user whether human or software to access the network

bull Provides user interfaces and support for services such as email remote

access and transfer shared database management and other types of

distributed information services

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 14: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IVNETWORKING (Local Area Network)

NETWORK

bull Is a set of devices connected by transmission media

NETWORKING

bull The process of linking devices together to share resources

Classification of Networks

According to area of coverage

LAN - Local Area Network

A connection of computers and other peripheral devices within a

building or clusters of building (campus)

MAN - Metropolitan Area Network

A network with less than 50 km radius within a metro or city

WAN - Wide Area Network

A network that covers a large geographical space such ascountries states continents and even the entire world

According to Configuration

Point-to-Point ndash two and only nodes are connected in a network

Multipoint ndash also known as multidrop network A network with multiple nodes

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 15: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

According to Authority

Peer-to-peer ndash all nodes has equal authority in the networkClient-server ndash a certain node called server has full control over the network and

nodes in the network

LAN Components

1 Server

Is a computer in a network that shared by multiple users

2 Network Interface Card

A printed circuit board that plugs into a network server or client computer It

enables the computer to be physically connected to the network cable which provides the

physical layer connection among the computers in the network It performs electronicfunctions of the access method or datalink protocol

3 HubA device that acts as central connection of certain LAN topology It is capable of

regeneration and switching of signals from one node to another Also known as

concentrator multiple access unit transceiver or repeater

4 Cable

The transmission link in a network These are unshielded twisted pairs (UTP)

shielded twisted pair (STP) coaxial cable and fiber optics cable

5 Connector

The terminating end of the cable to be plug-in or connected to the device

6 Network Operating System (NOS)

The control program that resides in a server or workstation within a LAN Ithandles requests for data transfer from all the users of the networks It interact with the

application programs and the computerrsquos operating system

7 Client

It is the requesting computer from the supplying computers or server

8 Other Peripheral Devices

These are the devices attached to the network such as printers scanners and the

like

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 16: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Transmission Method

1 Unicast

A single packet is sent from the a single source to a specific destination on a

network

2 Multicast

Consists of a single data packet that is copied and sent to a specific subset ofnodes on the network

3 Broadcast

Transmission consists of a single data packet that is copied and sent to all nodes

on the networks

LAN Topology

Physical Topologybull the set up how devices are wired together includes configurations of

cables computers amp other peripherals

Logical Topology

bull the set up of how devices communicate or exchange information to

one another

bull method used to pass information between workstations

Main Types of Physical Topology

1 LINEAR BUSrarr consists of a main run of cable with a terminator at each end

rarr nodes such as file server workstations and peripherals are connected on themain cable

Ex Ethernet and Local talk

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 17: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

2 STAR rarr designed with each node ( file server workstations and peripherals)

connected directly to central network hub or concentrator

rarr data passes through the hub or concentrator before continuing to its

destinationrarr the hub or concentrator manages and controls all functions of the

network

rarr the hub acts as repeater

rarr it is usually used with TP

3 TREE rarr combines characteristic of linear bus and star

rarr it consists of groups of star-configured workstations connected to a linear bus

backbone cable

rarr it allows for the expansion of an existing network and enable to meet network

needs

4 MESH

rarr nodes has connection to all other nodes in the network

rarr every node has available ports for connection to other nodes

rarr it consumes a lot of cable

5 STAR RING

rarr it may appear externally to be the same as a star topology

rarr it consists of groups of star-configured workstations connected to a

linear

rarr internally the MAU ( multistation access unit ) of a star-wired ring

contains wiring that allows information to pass from one device to

another in a circle or ring

Ex Token Ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 18: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

TOPOLOGY ADVANTAGES

LINEAR BUS Easy to connect a node

Requires less cables than star

STAR Easy to install and wire

No disruptions to the network when connecting orremoving devices

Easy to detect faults and remove parts

TREE Point to point wiring for individual segmentsSupported by several HW amp SW vendors

RING It provides equal opportunities to all computers in

the networkInstallation can be simple

Signals do not degrade

MESH Easy transfer of data because of direct connectionsLess time and delay for transmission fast

transmissionThere are other available routes in case of one link

disconnection

TOPOLOGY DISADVANTAGES

LINEAR BUS Entire network shunts down if main cable break

Entire network shuts down it is difficult to identify

the faults Not meant to be used as a solution for stand alone

system in a large buildingSTAR Requires more cable than a linear topology

If the hubs or concentrators fail nodes are disabled

More expensive than linear bus topologies becauseof hubs

TREE Overall length of each segment is limited by the

type of cabling used

If the backbone line breaks the entire segment goesdown

More difficult to configure and wire than other

topologiesRING Failure of any one connections can shut down the

entire network

Reconfiguration is difficult to implementDistance is limited

MESH Very expensive network

Messy to maintain and troubleshoot

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 19: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 1947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN Access Methodrarr it is unnecessary to have a MAC in pt-to-pt full duplex because there are

only two devices on the circuit and full duplex permits either device to

transmit at any time

rarr if it is point-to-point half duplex it needs MAC and also in multipoint full

duplex configurations since several devices share the same channelrarr to ensure that no two devices attempt to transmit data at the same time

1 Controlled Access

a X-on X-off

rarrthe oldest media access control protocols dating back to the days of theteletype

b Polling

rarr the process of sending signal to a terminal to transmit or asking it to receive

rarr it uses ldquoroll call pollingrdquo with scheme or sequence

Node 3its your time to transmitNode 1 its your turn to sendNode 4 you can transmit after node 1

c Token Passing

rarrA channel accessing arrangement that is best suited for ring topology witheither a baseband or broadband network It uses a token and the token circulate in

the network

Token is an electrical signal that circulate around the ring network from onestation to another If the station has the token it can send a message

2 Contention

rarr opposite of controlled access

rarr devices wait until the circuit is free and transmit whenever it has data to send

a Carrier Sense Multiple Access with Collision Detection (CSMACD)

rarrA channel accessing method a node monitors the line to determine if the line is

busy If the station has a message to transmit but the line is busy it waits for an

idle condition before it transmits its message

Collision is the situation when two nodes transmit simultaneously using one link

Backoff Time is the ceasing time before the station attempts to transmit again

With detection

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 20: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

No Detection

I have data to transmit tonode 4 Irsquoll send it now

Irsquoll send mydata to node

2Collision

I have data to transmitLet mecheck the line Node is sending data to

node 3 Irsquoll wait

I have data to transmitLetme check the line

No one is transmitting Irsquollsend my data to node 3

Comparison of Different Access Methods

Access Method Advantages Disadvantages

Polling Guaranteed access

Inefficient use of

network

Fast in low traffic Slow in high traffic

No access guaranteeContention Inexpensive No priority mechanism

Fast in high traffic Slow in low traffic

Guaranteed accessToken Passing

Time-criticalMore expensive

LAN Architecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 21: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

LAN-Local Area Network

A data communication system that allows a number of independent devices tocommunicate directly with each other in a limited geographical area

Project 802

bull 1985 computer society of IEEE set standards to enableintercommunication between equipment from variety of manufacturer

bull specifying functions of physical datalink and portions of network layers

to allow interconnectivity of major LAN protocolsbull The strength of Project 802 is modularity subdividing the functions

necessary for LAN management the designers were able to standardize

that can be generalized and to isolate those that must remain specific

LAN Issues

bull Unregulated single linebull Danger of signals overlapping and destroying each other- ldquoCollisionrdquo

bull As traffic increases on a multiple access line so do collisionsbull A mechanism to coordinate traffic minimize the number of collisions that

occur and maximize the number of frames that are successfully delivered

IEEE 802 Specifications

Number Category

8021 Internetworking

8022 Logical link control8023 Carrier Sense Multiple Access with Collision Detection LAN

8024 Token Bus LAN8025 Token Ring LAN

8026 Metropolitan Area Network

8027 Broadband Technical Advisory Group8028 Fiber-optic technical Advisory Group

8029 Integrated VoiceData Networks

80210 Network Security

80211 Wireless Networks80212 Demand Priority Access LAN

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 22: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Ethernet

IEEE 8023 supports a LAN standard originally developed by Xerox and later extended

by a joint venture between Digital Equipment Corp Intel Corp and Xerox

8023 Categories

1 Baseband Category

Specifying digital signal (Manchester encoding)

2 Broadband Category

Specifying analog signal (PSK encoding)

Note

1st Number

10 1 and 100 indicates data rate in Mbps

Last Number

5 2 T and F indicates the maximum cable length or the type of cable

10-Base-5Thicknet LAN

Information Category Specifications

Advantages Long distances

Disadvantages Expensive difficult to install amp troubleshoot

Topology BusCable Type 50-ohm Thicknet coaxial

Connector Type Vampire Tap TransceiverAccess Method CSMACD

Max Segment Length 500 m (1640 ft)

Max Total Network Length 2500 m (8200 ft)Max length between nodes 25 m

Max Segments 5 only 3 populated

Max of nodessegment 100

Max of nodes for network 300Transmission Speed 10 Mbps

IEEE specifications 8023

Interference High resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 23: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

10-Base 2Thinnet LAN

Information Category Specifications

Advantages Simple to install inexpensive

Disadvantages Difficult to troubleshootTopology Bus

Cable Type 50-ohm Thinnet coaxial-RG 58AU

Connector Type BNCAccess Method CSMACD

Max Segment Length 185 m (607 ft)

Max Total Network Length 925 m (3035 ft)Max length between nodes 05 m

Max Segments 5 only 3 populated

Max of nodessegment 30Max of nodes for network 90

Transmission Speed 10 MbpsIEEE specifications 8023

Interference High resistant

10-Base T

Information Category Specifications

Advantages Very inexpensive simple to connect and easy troubleshootDisadvantages Limited distance

Topology StarCable Type UTP

Connector Type RJ-45

Access Method CSMACDMax Segment Length 100 m (328 ft)

Max Total Network Length NA

Max length between nodes 25 m (8 ft)

Max of connected Segments 1024Max of nodessegment 1

Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 24: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

100-Base T LAN

Information Category Specifications

Advantages Fast simple to connect and easy troubleshoot

Disadvantages Limited distance expensiveTopology Star

Cable Type UTP Cat 3-5

Connector Type RJ-45Access Method CSMACD

Max Segment Length 100 m (328 ft)

Max Total Network Length NAMax length between nodes 25 m (8 ft)

Max of connected Segments1024

Max of nodessegment 1Max of nodes for network 1024

Transmission Speed 10 MbpsIEEE specifications 8023

Interference Low resistant

10-Base F LAN

Information Category Specifications

Advantages Fast and long distances

Disadvantages Very expensive and difficult to install

Topology StarCable Type Fiber optic

Connector Type SpecializedAccess Method CSMACD

Max Segment Length 2000 m (6561 ft)

Max Total Network Length NAMax length between nodes NA

Max of connected Segments1024

Max of nodessegment 1

Max of nodes for network 1024Transmission Speed 10 Mbps

IEEE specifications 8023

Interference Immune to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 25: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring

Its logically token-ring topology but physically wired as a star topology

Token Ring LAN

Information Category Specifications

Advantages Fast and reliable

Disadvantages More expensive than Ethernet solutionsdifficult to troubleshoot

Topology Star-wired ring

Cable Type IBM cable Type 1 STPCat 3 UTPConnector Type RJ-45 IBM Type A

Access Method Token Passing

Max Segment Length 45 m with UTP 101 m with STPMax Total Network Length NA

Max length between nodes 25 m (8 ft)Max of connectedSegments 33 hubs

Max of nodessegment Depends on the hubMax of nodes for network 72 node with UTP 260 nodes with STP

Transmission Speed 4 or 16 Mbps

IEEE specifications 8025Interference Low resistant

Beaconing

Is the process where computers on a token-ring network detect a problem and

attempt to fix it

FDDI (Fiber Distributed Data Interface)

Uses fiber-optic cable and token-passing to create a very fast reliable networkoperating at speeds of 100 Mbps

It includes up to 500 nodes over a distance of 100 km It uses ring topology with two counter-rotating rings It is implement as true physical ring topology A break in a FDDI network results in packets being sent back on the second ring

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 26: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Token Ring LAN

Information Category Specifications

Advantages Very fast and reliable long distances high secure

Disadvantages More expensive and difficult to installTopology Ring

Cable Type Fiber optic

Connector Type SpecializedAccess Method Token Passing

Max Segment Length NA

Max Total Network Length 100 kmMax length between nodes NA

Max of connectedSegments NA

Max of nodessegment NAMax of nodes for network 500

Transmission Speed 100 MbpsIEEE specifications No IEEE specification ANSI X3T95

Interference Resistant to EMI

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 27: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

V INTERNETWORKING

Hierarchy of Networks

1 End system (ES) is a network device that does not perform routing or other traffic

forwarding functions Typical ESs include such devices as terminals PCs and printers

2 Intermediate System (IS) is a network device that performs routing or other traffic-forwarding functions it includes devices such as routers switches and bridges

Intradomain IS communicates within a single autonomous system Interdomain IS communicates within and between autonomous systems

3 Area is a logical group of network segments and their attached devices Areas aresubdivisions of autonomous systems

4 Autonomous System (AS) is a collection of networks under a common administrationthat share a common routing strategy Autonomous system are subdivided into areas and

an AS is also known as a domain

Typical

Network

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 28: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Connection-oriented Vs Connectionless Network

Connection-oriented

It involves three phases connection establishment- a single path between the

source and the destination systems is determined data transfer ndash transmitted sequentially

over the path that has been established and connection termination ndash termination of paththat has been establish

Connectionless

Offers two important advantages over connection-oriented service dynamic path

selection ndash enables traffic to be routed around network failures because paths are selectedon a packet-to-packet basis dynamic bandwidth allocation ndash used more efficiently

because network resources are not allocated a bandwidth that they will not use

Virtual Circuits

Switched Virtual CircuitA virtual circuit that is dynamically established on demand and terminated when

transmission is completed It has three phases circuit establishment data transfer and

circuit termination

Permanent Virtual Circuit

A permanently established virtual circuit consists of one mode the data transfer

Internetworking Devices

Hubs

bull A hub is a central network device that connects network devices in a startopology

bull Advanced hubs provide very high speed connectivity for FDDI Fast Ethernet

frame relay and ATM networks

bull It is also referred to as a concentrator (or switch) which is a device that can

have multiple inputs and outputs all active at a one time

bull Services offered by hubs

bull Provide a central unit from which to connect multiple nodes into one network

bull Permit large numbers of computers to be connected on single or multipleLANs

bull Reduce network congestion through centralizing network design

bull Provide multiprotocol services such as Ethernet-to-FDDI connectivity

bull Consolidate the network backbone

bull Enable high-speed communications

bull Provide connections for several different media types

bull Enable centralized network management

Multiplexers

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 29: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 2947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Multiplexers are network devices that can receive multiple inputs and transmit

them to a shared network medium

bull A multiplexer is a switch that divides a communication medium into multiple

channels so several nodes can communicate at the same time

bull A signal that is multiplexed must be demultiplexed at the other endbull Multiplexers simply are switches used in old and new technology such as the

following

Telephone switching

Switching telecommunications lines to create multiple channels on a

single line Serial communications to enable more than one terminal to

communicate over a single line Fast Ethernet X25 ISDN frame relay ATM and other networking

technologies to create multiple communication channels over a single

communications cable

bull Work at the OSI physical level switching from channel to channel using one

of three physical methods

bull Time division multiplexing (TDM)

bull Frequency division multiplexing (FDM)

bull Wavelength division multiplexing (WDM)

Bridges

A bridge is a network device that connects different LAN segments using the same accessmethod

Bridges are used to

bull To extend a LAN when the maximum connections limit has been reached

bull To extend a LAN beyond the length limit

bull To segment LANs to reduce data traffic bottlenecks

bull To prevent unauthorized access to LAN (for security)

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 30: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Routers

Routers can connect networks that have dissimilar data links

A router forwarding a packet to the right network

It forwards packets to networks by using a decision-making process based on

bull Routing table data

bull Discovery of the most efficient routes

bull Preprogrammed information from the network administrator

How routers are used

bull To efficiently direct packets from one network to another reducing excessive

traffic

bull To join neighboring or distant networksbull To connect dissimilar networks

bull To prevent network bottlenecks by isolating portions of network

bull To secure portions of a network from intruders

Switching

Is a method by which multiple communication devices are connected tp oneanother efficiently

Switch

An intermediary hardwaresoftware that links devices together temporarily

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 31: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Types of Switching

Circuit Switching

Packets from a single device travel on dedicated link to the destination

Temporary connection usually used for voice communications

Sender

Receiver

A

B

C

D

A B C D

Connection

Propagation

Data

Finish

Return Si nal

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 32: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Message Switching

Also known as store and forward switching a node receives a message store itand then send it

Receiver

A

B

C

D

A B C D

Processin Dela

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 33: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Packet Switching

Generally more efficient than circuit switching for nonvoice communication

Sender

Receiver

A

B

C

D

A B C D

Processing Delay

Header

Data

Finish

Start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 34: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIMODEMS amp INTERFACES

Interfaces

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 35: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

DTE-DCE INTERFACE

DTE- Data TerminalTerminating Equipment

bull Any device that serves as source or destination for binary digital data

DCE-Data Circuit-terminatingCommunicating Equipment

bull Any device that transmits or receives data in the form of an analog or

digital signal through a network

Development of DTE-DCE Standards

bull To define the connection between the DTE-DCE each standard provides amodel for the mechanical electrical and the functional characteristics of

the connection

bull The EIA and the ITU-T have been involved in developing DTE-DCEinterface standards The ITU-T standards are called the V series and X

series The EIA standards are the following

EIA-232 Interface

Originally issued in 1962 as the RS-232 (Recommended Standard) the EIA has

revised several times the recent is the EIA-232D defines not only the type of connectors

to be used but also the specific cable and plugs and the functionality of each pin

Mechanical Specification

bull Defines the interface as a 25 wire cable with male and female DB-25 pinor receptacles connector attached to either end at each which is attached

to a single wire with a specific functionbull The length of the cable may not exceed 15 meters ( 50 feet)

bull Male connector refers to a plug with each wire in the cable connecting to a

pin bull Female connector refers to a receptacle with each wire in the cable

connecting to a metal tube or sheath

bull DB-25 pins and tubes are arranged in two rows with 13 on the top and 12

on the bottom

Electrical Specification

bull Defines the voltage levels and the type of signal to be transmitted in either

direction between the DTE and the DCEbull All data must be transmitted as logical 1s and 0s (called mark and space) using

non-return to zero level encoding with 0 defined as a positive voltage and 1

defined as a negative voltagebull The electrical specification that signals other than data must be sent using OFF is

less than -3 volts and ON is greater than 3 volts

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 36: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Functional Specification

bull Defines the function of each pin in the connector

Other Concerns

bull Null modem

bull Crossing connectionsbull Other differences

EIA-449 Interface

Mechanical Specification

bull One with 37 pins (DB-37) and one with 9 pins (DB-9) for a combined 46 pins

Functional Specification

bull Defines the function of each pin in the connector

bull Similar to DB-25 the difference between the 25- and 37-pin connectors isthat all functions relating to the secondary channel have been removed

from DB-37

Category I Pins

bull Both pins 4 and 22 are called send data These two pins have theequivalent functionality of pin 2 in EIA-232 both pins 5 and 23 are called

send timing And both pins 6 and 24 are called receive data Even more

interesting these pairs of pins are vertically adjacent to one another in theconnector with the pin from the second column occupying the position

Category II Pins

Local loopback Pin 10 is used for local loopback testing

Remote loopback Pin 14 is used for remote loopback testing

Select frequency Pin 16 is used to choose between two different frequency rates

Receive common Pin 20 provides a common signal return line to unbalanced circuitsfrom the DCE to the DTE

Terminal in service Pin 28 indicates to the DCE whether or not the DTE is operational

Select standby Pin 32 allows the DTE to request the use of standby equipment in the

event of failure

New signal Pin 34 is available for multiple point applications where a primary DTE

controls several secondary DTEs When activated pin 34 indicates that one DTE hasfinished its data exchange and a new one is about to start

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 37: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3747

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Standby indicator Pin 36 provides the confirmation signal from the DCE in response to

select standby (pin 32)

Send common Pin 37 provides a common signal return line for unbalanced circuits from

the DTE to the DCE

Electrical Specifications

bull EIA 449 uses two other standards to define its electrical specifications

RS-423 (for unbalanced circuits) and RS-422 (for balanced circuits)

RS-423 Unbalanced Mode

bull An unbalanced circuit specification meaning that it defines only one linefor propagating a signal All signals in this standard use a common return

(or ground) to complete the circuit

RS-422 Balanced Mode

bull A balanced circuit specification meaning that it defines two lines for the propagation of each signal Signals again use a common return (or ground)

for the return of the signal In balanced mode EIA-449 utilizes both pinsin each Category I but does not use the Category II pins The ratio of data

rate to distance is much higher that that of the unbalanced standard or of

EIA-232 10 Mbps for transmission of 40 feet bull In balanced mode two lines carry the same transmission it do not carry

identical signals The signal on one line is the complement of the signal

on the other When plotted the complement looks like a mirror image ofthe original signal Instead of listening to either actual signal the receiver

detects the differences between the two This mechanism makes a balanced circuit less susceptible to noise than an unbalanced circuit and

improves performance

EIA-530

bull A version of EIA-449 that uses DB-25 pins

bull The pin functions of EIA-530 are essentially the same of EIA-449

Category I plus three pins from Category II (the loopback circuits) Other pins in EIA-232 are omitted in EIA-530 such as ring indicator signal

quality detector and data signal rate selector

X21

bull Is an interface standard designed by ITU-T to address many problems

existing in the EIA interfaces and at the same time paves the way for alldigital communications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 38: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3847

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Using Data Circuits for Control

bull A large proportion of the circuits in the EIA interfaces are used forcontrol since these are necessary to implement control functions as

separate signals With a separate line control information is represented

only by positive and negative voltages But if control signals are encoded

using a meaningful control characters from a system such as ASCII it can be transmitted over data lines

bull X21 eliminates most of the control circuits of the EIA standards and

instead directs its traffic over the data circuits To make this consolidationof functionality possible both the DTE and the DCE must have added

circuit logic that enables them to transform the control codes into bit

streams that can be sent over the data line Both also need additional logicto discriminate between control information and data upon receipt

bull Design of X21 allows not only to use fewer pins but also to be used in

digital telecommunications where control information is sent from deviceto device over a network rather than just between a DTE and a DCE

bull X21 is useful both as an interface to connect digital computers to analogdevices such as modems and as a connector between digital computers and

digital interfaces such as ISDN and X25

Byte Timing

bull Another advantage offered by X21 is that of timing lines to control bytesynchronization in addition to the bit synchronization provided by the EIA

standards By adding a byte timing pulse improves the overall

synchronization of transmissions

Control and indication

bull Pins 3 and 5 of the DB-15 connector are used for the initial handshake or

agreement to begin transmitting Pin 3 is the equivalent of request to send

Pin 5 is the equivalent of clear to send

MODEMbull Modem stands for modulatordemodulator

bull A modulator converts a digital to an analog signalbull A demodulator converts an analog signal to a digital signal

bull The series of 1s and 0s are transformed through the mechanism of ASK

FSK PSK and QAM

Transmission Rate

Bandwidth

bull Every line has upper limit and a lower limit on the frequencies of the

signals it carry this limited range is called the bandwidth

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 39: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 3947

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

Modem Speed

Type of digital to analog encoding used in Modems

ASK-manipulates the amplitude

FSK-manipulates the frequency

PSK-manipulates the phaseQAM-manipulates both the amplitude and the phase

Theoretical Bit Rate of Modems

Encoding Half Duplex Full Duplex

ASKFSK2-PSK 2400 12004-PSK4-QAM 4800 2400

8-PSK8-QAM 7200 3600

16-PSK16-QAM 9600 480032-PSK32-QAM 12000 6000

64-PSK64-QAM 14400 7200128-PSK128-QAM 16800 8400

256-PSK256-QAM 19200 9600

Modem Standards

Bell Modems

Standard Tx Mode Baud Rate Bit Rate No of Wire Modulation

Bell 103 FDX 300 baud 300 bps 2-wire FSK

Bell 202 HDX 1200 baud 1200 bps 2-wire FSK

Bell 212 FDX 600 baud 1200 bps 2-wire 4-PSK

Bell 201 HDXFDX 1200 baud 2400 bps 24wire 4-PSKBell 208 FDX 1600 baud 4800 bps 4-wire 8-PSK

Bell 209 FDX 2400 baud 9600 bps 4-wire 16-QAM

ITU-T Modems

Standard Tx Mode Baud Rate Bit RateNo ofWire Modulation

V22 bis FDX 600 baud 12002400 bps 2-wire 4-DPSK16-QAM

V32 FDX 2400 baud 9600 bps 2-wire 32-QAM (trellis)

V32bis FDX 2400 baud 14400 bps 4-wire 64-QAM

V32terbo FDX 2400 baud 19200 bps 4-wire 256-QAM

V33 FDX 2400 baud 14400 bps 4-wire 128-QAM (trellisV34 FDX 2400 baud 28800 bps 4-wire 4096-QAM

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 40: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4047

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VII ISDN

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)

A technology that incorporates all communication connections in a home or

building into a single interface providing all services such as voice data image facsimile

and so onA circuit-switched networks an evolving communications network standard that

provides universal end-to-end connectivity over digital links

ISDN Services Three Categories

Bearer Services

Provide means to transfer information (voice data and video) between users

without the network manipulating the content of that information it belongs to the first

three layers of OSI model

TeleservicesThe network may change or process the contents of the data these services

correspond to layer 4 to 7 of the OSI model

Supplementary Services

Services that provide additional functionality to the bearer services andteleservices It canrsquot stand alone with the two services

Channel

Channel Data Rate (kbps)

B 64

D 16 64H 384 1536 1920

B Channel

Bearer channel is the basic user channel and can carry any type of digital

information in full duplex mode that doesnrsquot exceed to 64 kbps

D Channel

Data channel is for control of B channels low-rate data transfer and otherapplications

H ChannelHybrid channel is for high-data-rate applications

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 41: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4147

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

User Interfaces

BRI Basic rate interface

Is a digital pipe composed of two B channels and one D channel

Data rate of 192 Kbps (4000 framessec 48 bitsframe)

PRI Primary rate interfaceIs a digital pipe composed of 23 channels and one D channel

Data rate of 1544 Mbps (8000 framessec 193 bitsframe)

ISDN Three Functional Groupings of Equipment

1 Network terminations (NT)

Two types of network terminations

a NT1-equipment that controls the physical and electrical termination of the

ISDN at the userrsquos premises

b NT2-equipment that performs functions related to layers one through three ofthe OSI model

2 Terminal equipment (TE)

Classifications of Terminal Equipment

a TE1-subscriber equipment conforming to ISDN standards

b TE2-subscriber equipment that does not conform to ISDN standards

3 Terminal adapters (TA)-converts data from TE2s to ISDN format

Broadband ISDN (B-ISDN)

Using fiber-optic media fulfills the needs of users who require a higher data rate

that offered by ISDN It has a data rate of 600 Mbps

B-ISDN Two services

1 Interactive- two way services (two subscribers or a subscriber-service provider pair)

2 Distributive-one way service from service provider to subscriber

B-ISDN Three Access Methods

1 155520 Mbps full duplex2 155520 Mbps outgoing and 622080 Mbps incoming asymmetric full duplex

3 622080 Mbps full duplex

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 42: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4247

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

VIII X25FRAME RELAYATM

X25 TECHNOLOGY

bull The packet switching protocol used in ISDNbull Defines the procedures for data transmission between a DTE and DCE

bull A protocol specifies three layers that correspond to the OSI model

1 Physical layer

2 Link access procedure balanced (LAPB) = datalink layer3 Packet layer protocol (PLP) = network layer

It handles connection establishment and termination data transfer

and packet creation protocols Two types of PLP packets information and control

Up to 4096 channels may be multiplexed at the PLP level Specifies protocols to handle resizing of messages

FRAME RELAY LAYERSbull A technology that operates only at the physical and datalink layers No protocol is

specified for the physical layer the choice is up to the user

bull Eliminates the extensive error checking necessary in X25 protocol

bull It uses simplified version of HDLC protocol in the datalink layerbull It uses routing and switching functions of the datalink layers Frames not packets

are switched

bull It uses PVCs (permanent virtual circuits) Identified through a DLCI (dalta linkconnection identifier)

bull A switch in frame relay performs error checking and routing Error correction is

left to the other protocols at the higher layers

bull Flow control is handled through setting the BECN (backwards explicit congestionnotification) and FECN (forward explicit congestion notification) in the address

field of the frame

bull

ASYNCHRONOUS TRANSFER MODE (ATM)

bull Is the cell relay protocol designed by the ATM forum and adopted by theITU-T

bull In ATM some software functions have moved to hardware this can

increase the data rate

Terms

Cell is the data packet is called a and is composed of 53 bytes (5 bytes of header and 48 bytes of payload) Because each cell is the same size and all are relatively small delay

and other problems associated with multiplexing different sized packets are avoided

A cell network is based on permanent virtual circuit (PVC) routing

bull Virtual Path Identifier (VPI) specifies the path a cell should take

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 43: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4347

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

bull Virtual Channel Identifier (VCI) specifies the channel a cell should take

bull User Network Interface (UNI) is the interface between the user and the wide

area ATM network

bull Network-to-Network Interface (NNI) is the interface between two wide area

ATM networks

ATM Standard Defines Three Layers

1 Application adaptation layer (AAL) accepts transmissions from upper layer services

and maps them into ATM cells

2 ATM layer provides routing traffic management switching and multiplexing

services It has 5-byte header to be added to each 48 byte segment

3 Physical layer defines the transmission medium bit transmission encoding and

electrical to optical specifications

Two Sublayers of AAL

1 Convergence sublayer (CS) adds overhead and manipulates the data stream at the

sending station performs the opposite function at the receiving station

2 Segmentation and reassembly (SAR) at the sending station segments the bit stream

into same-sized packets adds headers and trailers performs the opposite function at thereceiving station

Four Different AAL for specific data type

1 AAL1- constant bit-rate stream

2 AAL2- variable bit-rate stream

3 AAL3AAL4-conventional packet switching (virtual circuit approach or datagramapproach)

4 AAL5- packets requiring no information from the SAR layer

ATM Switches provide both switching and multiplexing

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 44: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4447

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

ATM Two Types of Switching

1 Virtual path (VP) switching ndash channels within each VP remain with the VP

2 Virtual path and channel (VPC) switching ndash a channel from one VP may pass into

another VP

IXSDHSONET

Synchronous Optical Network (SONET)

Developed by ANSI

Synchronous Digital Hierarchy (SDH)

Developed by ITU-T

SONETSDH

The two are nearly identical ANSI and ITU-T defined standards that arefundamentally similar and ultimately compatible

Is a synchronous network a single clock is used to handle the timing of

transmissions and equipment across the entire network

SONET

It defines the hierarchy of signals called synchronous transport signals (STS)

Optical carrier (OC) levels are the implementation of STS

SONETSDH Rates

STS OC Rate (Mbps) STM

STS-1 OC-1 5184

STS-3 OC-3 15552 STM-1

STS-9 OC-9 46656 STM-3

STS-12 OC-12 62208 STM-4

STS-18 OC-18 93312 STM-6

STS-24 OC-24 124416 STM-8

STS-36 OC-36 186623 STM-12

STS-48 OC-48 248832 STM-16

STS-96 OC-96 497664 STM-32

STS-192 OC-192 995328 STM-64

STM-synchronous transport module

SONET Four Layers

1 Photonic layer is the lowest and performs physical layer activities

A frame at the photonic layer for STS-1 consists of 6480 bits (8000 framessec)

2-4 Section Line and Path layers correspond to the OSI modelrsquos datalink layer Eachof these layers is responsible for signal transfer across a specific portion of the

transmission path

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 45: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4547

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

SONET Equipment

1 STS multiplexer combines several optical signals to make an STS signal2 Regenerator removes noise from optical signal

3 Adddrop multiplexer adds STS signals from different paths and removes STS signal

from a path

XTCPIP

Transmission Control ProtocolInternetworking Protocol (TCPIP)

Is a set of rules and procedures that governs the exchange of messages in an

internetwork Originally developed as a protocol for networks that wanted to be connected to

ARPANET a US Department of Defense project now known as Internet

Is a five-layer protocol suite whose bottom four layers match the OSI model fairly

closely The highest level the application layer corresponds to OSIrsquos top threelayers

Internet Protocol (IP) Is defined at the network layer

Unreliable and connectionless Is basically the set of rules for one network communicating with any other To be part of internet organization needs an internet network number unique

number to be included in any packet sent out of the network onto the internet

IP packet is known as datagram consists of a variable header and a variable data

field

IP Address

Uniquely defines the connection of a host to its network The host with more than

one IP address is multi-homed host

IP Addressing

32 bit binary number usually represented as 4 decimal values Equivalent to 4 octets ( 8 bits each decimal value ) Dotted decimal notation Consists of 2 parts the network and the node

Network ndash identifier of particular network on the internet

Host ndash identifier of a particular device which can be a server or a

workstations

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 46: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4647

DATA COMMUNICATIONS

Engr Marlyn Quiambao-CamingalECE

IP Address Classifications

Classes Format Application

High order

bits Address range

Max No

of Host

A NHHH Few large size org 0 1000 - 126000 16777214

B NNHH Medium size org 10 128100-19125400 65543

C NNNHRelatively smallorg 110 192010-2232552540 245

D NA Multicast 1110 224000-239255255255 NA

E NA Experimental 1111 240000-254255255255 NA

Other Protocols

1 Address Resolution Protocol (ARP)

Finds the physical address of a device if its IP address is known

2 Reverse Address Resolution Protocol (RARP)

Find the hostrsquos IP address from its physical address

3 Internet Control Message Protocol (ICMP)

Handles control and error messages in the IP layer

4 Protocol Port

Is a source or destination point of an executing program in the application layer

Transport Level Two Protocols

1 User Datagram Protocol (UDP)

Unreliable and connectionless

Communication is also port-to-portUDP packet is known as datagram

2 Transport Control Protocol (TCP)

Is reliable and connection-oriented

Communication is also port-to-portTCP packet is known as segment

Application Layer Protocols

Telnet a remote login application is a client-server application using TCPIP

Trivial File Transfer Protocol (TFTP) uses UDP for file transfer

File Transfer Protocol (FTP) uses two TCPIP connections (one for control and one for

data) for file transfer

Network File System (NFS) is an application available on TCPIP that allows file access

and manipulation on a remote system

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd

Page 47: EST_Data Communication Lecture

7172019 EST_Data Communication Lecture

httpslidepdfcomreaderfullestdata-communication-lecture 4747

DATA COMMUNICATIONS

Simple Mail Transfer Protocol (SMTP) is the electronic mail application available on

TCPIP It provide alias capabilities and a spool based on the first come firast searchedconcept

Simple Network Management Protocol (SNMP) is an application on TCPIP used to

monitor and manage hosts on a network The manager checks variable values on amanaged host It can change these values to effect a desired outcome

Hypertext transfer protocol (HTTP) is an advanced application program that links fileson the WWW

Terms

Gopher is a menu-driven file retrieval method The user sorts through menus to find the

files needed

Archie is an automated title-searched application program

Veronica using the services of gopher is an automated retrieval application programthat uses conditional expressions in the search field

Wide area information service (WAIS) is a application program that searches filecontents for key words It returns the file names of successful finds

World Wide Web (www) consists of information repositories located all over the world

that are linked togetherHypertext and hypermedia are documents linked to each other through the concept of

pointers

Uniform source locator (URL) requires method a host computer and a pathname tolocate information on the www

Browsers interpret and display a web documentHyper markup language (HTML) is a language used to create static web pages

A dynamic web document is created by a server at a browser request

Common gateway interface (CGI) is a standard for building dynamic web documents

Active document is a copy of a program retrieved by the client and run at the client site

Java is a technology and a language that enables the running of an active document

ldquoWinners are made not bornhellip

A winner makes it happen a loser lets it happenrdquo

God bless on your examEnd